idaholab / cape2stix

This software allows for the conversion, extraction, and transformation of malware behavior data from "Malware Configuration And Payload Extraction" (CAPEv2) sandbox reports, to Structured Threat Information eXpression (STIX). This allows for further analysis to be performed, sharing of threat data, and transit to a graph database.
BSD 3-Clause "New" or "Revised" License
6 stars 2 forks source link

Catch emty tlsh hash in cape report #16

Closed wrbrant closed 1 year ago

wrbrant commented 1 year ago

If tlsh hash is not in cape report, tlsh key needs to be removed from the dictionary of hashes

wrbrant commented 1 year ago

Closed with commit 3431409b663c0d9a4c580d29d35e6f734278fd78