From 4378c55fa56b77d0d8b1c5bdc9840c65eab2b1f4 Mon Sep 17 00:00:00 2001
From: t-tani <31282248+t-tani@users.noreply.github.com>
Date: Mon, 22 Apr 2019 20:13:49 +0900
Subject: [PATCH] fix typo in README.md
---
README.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/README.md b/README.md
index 0b990e7..051b696 100644
--- a/README.md
+++ b/README.md
@@ -2,7 +2,7 @@
## Introduction
[__MalConfScan__](https://github.com/JPCERTCC/MalConfScan) integration for [__Cuckoo Sandbox__](https://github.com/cuckoosandbox/cuckoo).
-This plugin will let you integrate MalConfScan into Cuckoo Sandbox with the patch file. The plugin would add the function to extract known malware's configuration data from memory dump and, add the MalConfScan report into Cuckoo Sandbox.
+This plugin lets you integrate MalConfScan into Cuckoo Sandbox with the patch file. The plugin would add the function to extract known malware's configuration data from memory dump and, add the MalConfScan report into Cuckoo Sandbox.
### Sample report
@@ -51,7 +51,7 @@ MalConfScan is a [Volatility](https://github.com/volatilityfoundation/volatility
Modify the source code of Cuckoo Sandbox with the deploy-script and deploy Cuckoo Sandbox. If you want to know more detail, please check the [Wiki](https://github.com/JPCERTCC/MalConfScan-with-Cuckoo/wiki).
## How to use
-1. Setup your Cucukoo Sandbox and patch it with `malconfscan.patch`.
+1. Setup your Cuckoo Sandbox and patch it with `malconfscan.patch`.
2. Submit your sample to the sandbox.
3. Check the report.