tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"It",
"then",
"calls",
"a",
"routine",
"that",
"adds",
"a",
"code",
"section",
"to",
"a",
"target",
"module",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom.Kangaroo",
"Win32.Trojan.WisdomEyes.16070401.9500.9872",
"Trojan.Randsom.A",
"Ransom_Apocalypse.R039C0DAT18",
"Win32.Trojan-Ransom.Apocalypse.D",
"Trojan-Ransom.Win32.Kangar.a",
"Trojan.Win32.Filecoder.epdfna",
"Trojan.Encoder.5883",
"Ransom_Apocalypse.R039C0DAT18",
"BehavesLike.Win32.Worm.lt",
"W32/Trojan.ATNA-2545",
"Ransom:Win32/Apocalypse.A!bit",
"Trojan-Ransom.Win32.Kangar.a",
"Trojan/Win32.Kangaroo.R194907",
"Trj/GdSda.A",
"Trojan.Mikey.D127AA",
"Win32/Filecoder.NIC"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.AceDeciever.15",
"Trojan:Win32/AceDeceiver.A",
"Trojan.Win32.Acedeceiver"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"The",
"last",
"time",
"I",
"saw",
"proshuto8.exe",
"it",
"was",
"Trickbot,",
"but",
"these",
"malware",
"gangs",
"do",
"mix",
"match",
"and",
"reuse",
"file",
"names",
"and",
"delivery",
"methods",
"to",
"deliver",
"multiple",
"different",
"malwares."
] | [
16,
16,
16,
16,
16,
1,
16,
16,
3,
16,
16,
6,
14,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"The",
"emergence",
"of",
"XLoader",
"6.0",
"does",
"not",
"only",
"indicate",
"that",
"the",
"threat",
"actors",
"behind",
"it",
"remain",
"active",
";",
"it",
"also",
"holds",
"fresh",
"evidence",
"of",
"its",
"connection",
"to",
"FakeSpy",
"."
] | [
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"PE:Malware.XPACK/RDM!5.1"
] | [
16,
3,
16,
16,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Dropper.ALXP",
"Trojan.Dropper",
"Trojan.Dropper-23429",
"Trojan-Dropper.Win32.Injector.hrpm",
"Exploit.Servu!8cjzV0go40I",
"Trojan.MulDrop.30820",
"Muster.c",
"W32/Risk.XPXS-2512",
"TR/Expl.Servu.AK",
"Trojan/Win32.Sasfis",
"TrojanDropper:Win32/Apptom.B",
"Virus.Win32.Part.a",
"BScope.Trojan.Win32.Inject.2",
"Exploit.Win32.Servu"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"core",
"malware",
"extracts",
"the",
"device",
"’",
"s",
"installed",
"app",
"list",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"And",
",",
"of",
"course",
",",
"remember",
"to",
"always",
"be",
"wary",
"of",
"unsolicited",
",",
"unusual",
"text",
"messages",
"and",
"installing",
"apps",
"from",
"third-party",
"sources",
"on",
"your",
"Android",
"smartphone",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"The",
"first",
"variant",
"involves",
"social",
"engineering",
"the",
"target",
"into",
"downloading",
"a",
"trojanized",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"review",
"of",
"the",
"bit.ly",
"statistics",
"for",
"these",
"campaigns",
"shows",
"that",
"they",
"were",
"at",
"least",
"as",
"effective",
"in",
"driving",
"end-user",
"clicks",
"as",
"the",
"Bank",
"Austria",
"campaign",
"analyzed",
"above",
"."
] | [
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16
] |
[
"The",
"overwriting",
"of",
"the",
"data",
"files",
"will",
"make",
"it",
"extremley",
"difficult",
"and",
"costly,",
"if",
"not",
"impossible,",
"to",
"recover",
"the",
"data",
"using",
"standard",
"forensic",
"methods."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Android.Bankosy",
"is",
"a",
"Trojan",
"horse",
"for",
"Android",
"devices",
"that",
"steals",
"information",
"from",
"the",
"compromised",
"device."
] | [
1,
16,
16,
3,
11,
11,
5,
13,
16,
1,
9,
16,
16,
5,
13
] |
[
"Series",
"of",
"attacks",
"mostly",
"against",
"Israel-based",
"organisations."
] | [
16,
16,
16,
16,
16,
4,
12
] |
[
"The",
"commands",
"supported",
"by",
"the",
"analyzed",
"version",
"of",
"the",
"Cerberus",
"bot",
"are",
"listed",
"below",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16
] |
[
"You",
"can",
"find",
"a",
"full",
"list",
"with",
"short",
"descriptions",
"in",
"the",
"Appendix",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"On",
"Android",
",",
"an",
"Intent",
"is",
"a",
"software",
"mechanism",
"that",
"allows",
"users",
"to",
"coordinate",
"the",
"functions",
"of",
"different",
"Activities",
"to",
"achieve",
"a",
"task",
"."
] | [
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"David",
"Manouchehri",
"released",
"the",
"information",
"about",
"the",
"backdoor",
"through",
"its",
"own",
"Github",
"account",
"(",
"Pastebin",
")",
"and",
"then",
"apparently",
"deleted",
"it",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16
] |
[
"As",
"we",
"’",
"ve",
"seen",
"in",
"last",
"year",
"’",
"s",
"mobile",
"threat",
"landscape",
",",
"we",
"expect",
"more",
"cyberespionage",
"campaigns",
"targeting",
"the",
"mobile",
"platform",
"given",
"its",
"ubiquity",
",",
"employing",
"tried-and-tested",
"techniques",
"to",
"lure",
"unwitting",
"users",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.OnlineGameGLISC.Trojan",
"W32/Mydoom.cf.dll",
"WORM_MYDOOM.EA",
"W32/Downloader.EZUZ-6892",
"Trojan.Dozer",
"Win32/Mydoom.BS",
"WORM_MYDOOM.EA",
"Win.Downloader.73527-1",
"DDoS.Config.6",
"W32/Mydoom.cf.dll",
"Trojan.Win32.Lyzapo",
"W32/Downldr2.FZUB",
"W32.Trojan.Worm-myDoom",
"Trojan:Win32/Lyzapo.A",
"Trojan/Win32.DDoS.R528",
"W32/MyDoom.HN.worm",
"Win32/Lyzapo.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader.Win32.Theefdl",
"Trojan-Downloader.Win32!O",
"Trojandownloader.Theefdl",
"Downloader.Theefdl.Win32.5",
"TrojanDownloader.Win32.Theefdl",
"W32/Theef.G@bd",
"Downloader.Trojan",
"Win32/TrojanDownloader.Theefdl",
"TROJ_THEEFDL.A",
"TrojanDownloader.Win32.Theefdl",
"Trojan-Downloader.Win32.Theefdl",
"TrojanDownloader.Win32.Theefdl",
"Trojan.Win32.Theefdl.fydt",
"Trojan.Win32.A.Downloader.81920.VZ",
"TrojanDownloader.Win32.Theefdl",
"TrojWare.Win32.TrojanDownloader.Theefdl",
"Trojan.Thedl",
"BehavesLike.Win32.Backdoor.mh",
"Trojan-Downloader.Win32.Theefdl",
"W32/Theef.TVQD-5666",
"TrojanDownloader.Theefdl",
"Trojan[Downloader]/Win32.Theefdl",
"TrojanDownloader:Win32/Theefdl.1_0",
"Trojan/Win32.Downloader.R94200",
"Trojan-Downloader.Win32.Theefdl",
"TrojanDownloader.Win32.Theefdl",
"TrojanDownloader.Theefdl",
"Trojan.DL.Theefdl!lWNJHAF8U1M",
"W32/Theefdl.G!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Next",
",",
"the",
"dropper",
"checks",
"its",
"own",
"parent",
"process",
"for",
"indications",
"that",
"it",
"is",
"running",
"in",
"a",
"sandbox",
"setup",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.NSAnti.1",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win32.Riskware.NoobyProtect.B",
"Trojan.Win32.NobodyProtect.eviakq",
"TrojWare.Win32.Amtar.KNB",
"Trojan.DownLoader4.12788",
"BehavesLike.Win32.Pate.tc",
"Trojan:Win32/Gee.B",
"Dropper/Win32.PcClient.R6061",
"Trojan.Cryptic"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"At",
"the",
"same",
"time,",
"in",
"previous",
"update",
"activities,",
"due",
"to",
"the",
"setting",
"of",
"a",
"specific",
"named",
"planned",
"task,",
"the",
"researchers",
"named",
"it",
"Blue",
"Tea",
"Action",
"based",
"on",
"the",
"name",
"and",
"Operation",
"Black",
"Ball",
"。"
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
6,
14,
14,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.SunimodG.Trojan",
"Worm.Win32.Juched!O",
"WORM_GANELP.SMIA",
"W32.Griptolo",
"WORM_GANELP.SMIA",
"Win.Worm.Autorun-9195",
"Worm.Win32.Juched.209429",
"Worm.Win32.Jushed.KA",
"Trojan.Proxy.20270",
"Trojan.Win32.Webprefix",
"W32.Worm.Ganelp",
"Worm/Win32.Juched",
"Worm.Juched.d.kcloud",
"Worm:Win32/Ganelp.E",
"Trojan/Win32.Npkon.R18258",
"Worm.Juched",
"Trojan.FakeJava",
"Trojan.Win32.FakeFolder.bba"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.WpechkLTD.Trojan",
"Trojan-Spy/W32.Vskim.160256",
"Trojan.Mauvaise.SL1",
"Dropper.Dapato.Win32.16801",
"Trojan/Spy.POSCardStealer.k",
"Win32.Trojan.WisdomEyes.16070401.9500.9904",
"Backdoor.Trojan",
"BKDR_HESETOX.SMJ",
"Trojan.Win32.Vskim.cqipth",
"Backdoor.Win32.Hesetox.160260",
"Trojan.DownLoader8.15980",
"BKDR_HESETOX.SMJ",
"BehavesLike.Win32.Dropper.ch",
"Trojan[Dropper]/Win32.Dapato",
"Backdoor:Win32/Hesetox.A",
"Win-Trojan/Hesetox.160256",
"TrojanSpy.Vskim",
"Backdoor.Bot.X",
"Backdoor.Win32.Hesetox",
"Win32/Trojan.IM.73c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Here",
"are",
"some",
"highlights",
"."
] | [
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.4904",
"Trojan.Clicker.Delf.CN",
"Trojan.Clicker.Delf.CN",
"Trojan/Clicker.Delf.cn",
"Trojan.Win32.Delf.ifph",
"Trojan.Adclicker",
"TROJ_ADCLICKE.AS",
"Trojan-Clicker.Win32.Delf.cn",
"Trojan.CL.Delf!GHMyZMRoBZw",
"Trojan.Win32.Clicker.197194[h]",
"Troj.Clicker.W32.Delf.cn!c",
"Virus.Win32.Heur.e",
"Trojan.Clicker.Delf.CN",
"Backdoor.Win32.Popwin.~IQ",
"Trojan.Clicker.Delf.CN",
"Trojan.Dasist",
"Trojan.Delf.Win32.8103",
"TROJ_ADCLICKE.AS",
"BehavesLike.Win32.PWSZbot.cc",
"Trojan/Delf.ab",
"TR/Click.Delf.CN.5",
"Trojan[Clicker]/Win32.Delf",
"Trojan.Clicker.Delf.CN",
"Win-Trojan/Xema.variant",
"Trojan:Win32/Adcliker.K",
"TrojanClicker.Delf",
"Win32.Trojan.Delf.Lhxa",
"Trojan.Clicker.Delf.CN",
"Clicker.CSA"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win32.Noobot!O",
"Backdoor.Poftsyun",
"Backdoor.W32.Noobot.h!c",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"Trojan.Ecltys",
"Backdoor.Win32.Noobot.h",
"Trojan.Win32.Noobot.ylgzy",
"Backdoor.Win32.A.Noobot.158756",
"Backdoor.Noobot.Win32.6",
"BehavesLike.Win32.Downloader.ch",
"Backdoor.Win32.Ecltys",
"W32/Trojan.SKHW-8707",
"Backdoor/Noobot.d",
"BDS/Noobot.A.14",
"Backdoor:Win32/Poftsyun.A",
"Backdoor.Win32.Noobot.h",
"Trojan/Win32.Noobot.R214072",
"Backdoor.Noobot",
"Trojan.Zusy.D49A6",
"Win32.Backdoor.Noobot.Pfts",
"Backdoor.Noobot!KDSSDgztHWQ",
"W32/Noobot.H!tr.bdr",
"Win32/Trojan.231"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Strazzere",
"'s",
"colleague",
",",
"Jon",
"Sawyer",
",",
"suggested",
"on",
"Twitter",
"that",
"the",
"vulnerabilities",
"might",
"have",
"not",
"been",
"there",
"by",
"mistake",
",",
"but",
"rather",
"included",
"as",
"intentionally",
"coded",
"backdoors",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader.Win32.ChePro.aaa",
"WIN.MACRO.SCRIPT.IRC.WORM.Virus",
"Trojan-Downloader.Win32.ChePro.aaa",
"PUP/Win32.Avdownloader.C2126268"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"Threat",
"actors",
"keep",
"taking",
"advantage",
"of",
"the",
"tax",
"season",
"in",
"the",
"US,",
"using",
"tax-related",
"phishing",
"scams",
"to",
"US-based",
"victims",
"to",
"infect",
"systems",
"with",
"stealthy",
"malware."
] | [
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
2,
16,
16,
1,
9,
16,
4,
12,
16,
5,
13,
16,
16,
3
] |
[
"In",
"early",
"May,",
"the",
"phishing",
"lures",
"leveraged",
"RTF",
"attachments",
"that",
"exploited",
"the",
"Microsoft",
"Windows",
"vulnerability",
"described",
"in",
"CVE",
"2017-0199."
] | [
16,
0,
8,
16,
1,
16,
16,
1,
9,
16,
7,
15,
15,
15,
15,
16,
16,
1,
9
] |
[
"Back",
"then",
"it",
"was",
"detected",
"as",
"Trojan-Spy.AndroidOS.SmsThief",
",",
"but",
"later",
"versions",
"were",
"assigned",
"to",
"another",
"family",
"–",
"Trojan-Banker.AndroidOS.Rotexy",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"These",
"threats",
"are",
"usually",
"exacerbated",
"by",
"the",
"further",
"abuse",
"of",
"legitimate",
"tools",
"such",
"as",
"PowerShell,",
"or",
"script",
"automation",
"utility",
"AutoIt.",
"It's",
"thus",
"not",
"surprising",
"that",
"we",
"discovered",
"an",
"information",
"stealer",
"employing",
"LNK",
"files,",
"which",
"our",
"sensors",
"detected",
"in",
"Israeli",
"hospitals."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
1,
16,
1,
9,
9,
3,
16,
16,
16,
16,
15,
16,
16,
16,
12,
1,
9,
9,
9,
16,
16,
16,
16,
16,
4,
12
] |
[
"]",
"251",
"2d108ff3a735dea1d1fdfa430f37fab2",
"com.psiphon3",
"dexlib",
"2.x",
"188.165.49",
"[",
"."
] | [
9,
9,
1,
1,
16,
16,
1,
9,
9
] |
[
"INDEX",
"MNEMONIC",
"DESCRIPTION",
"0x0",
"JMP",
"Special",
"obfuscated",
"conditional",
"Jump",
"(",
"always",
"taken",
"or",
"always",
"ignored",
")",
"0x1",
"JMP",
"Jump",
"to",
"a",
"function",
"(",
"same",
"as",
"opcode",
"0x10",
")",
"0x2",
"CALL",
"Call",
"to",
"the",
"function",
"pointed",
"by",
"the",
"internal",
"VM",
"value",
"0x3",
"CALL",
"Optimized",
"CALL",
"function",
"(",
"like",
"the",
"0x1E",
"opcode",
"of",
"the",
"32-bit",
"VM",
")",
"0x4",
"EXEC",
"Execute",
"code",
"and",
"move",
"to",
"the",
"next",
"packet",
"0x5",
"JMP",
"Jump",
"to",
"an",
"internal",
"function",
"0x6",
"NOP",
"No",
"operation",
",",
"move",
"to",
"the",
"next",
"packet",
"0x7",
"CALL",
"Call",
"an",
"imported",
"API",
"(",
"whose",
"address",
"is",
"stored",
"in",
"the",
"internal",
"VM",
"value",
")",
"0x8",
"LOAD",
"Load",
"a",
"value",
"into",
"the",
"VM",
"descriptor",
"structure",
"*",
"0x9",
"STORE",
"Store",
"the",
"internal",
"VM",
"value",
"inside",
"a",
"register",
"0xA",
"WRITE",
"Resolve",
"a",
"pointer",
"and",
"store",
"the",
"value",
"of",
"a",
"register",
"in",
"its",
"content",
"0xB",
"READ",
"Move",
"the",
"value",
"pointed",
"by",
"the",
"VM",
"internal",
"value",
"into",
"a",
"register",
"0xC",
"LOAD",
"Load",
"a",
"value",
"into",
"the",
"VM",
"descriptor",
"structure",
"(",
"not",
"optimized",
")",
"0xD",
"CMP",
"Compare",
"the",
"value",
"pointed",
"by",
"the",
"internal",
"VM",
"descriptor",
"with",
"a",
"register",
"0xE",
"CMP",
"Compare",
"the",
"value",
"pointed",
"by",
"the",
"internal",
"VM",
"descriptor",
"with",
"an",
"immediate",
"value",
"0xF",
"XCHG",
"Exchange",
"the",
"value",
"pointed",
"by",
"the",
"internal",
"VM",
"descriptor",
"with",
"a",
"register",
"0x10",
"SHL",
"Jump",
"to",
"a",
"function",
"(",
"same",
"as",
"opcode",
"0x1",
")",
"This",
"additional",
"virtual",
"machine",
"performs",
"the",
"same",
"duties",
"as",
"the",
"one",
"already",
"described",
"but",
"in",
"a",
"64-bit",
"environment",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"campaign",
"was",
"found",
"to",
"have",
"delivered",
"several",
"types",
"of",
"malware",
"including",
"Redline",
"Stealer,",
"AgentTesla,",
"Eternity,",
"Blackmoon",
"and",
"Philadelphia",
"Ransomware."
] | [
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
11,
11,
11,
11,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Otwyacal.C",
"Win32.Trojan.WisdomEyes.16070401.9500.9748",
"W32.Wapomi.C!inf",
"Win.Trojan.Vjadtre-6170948-0",
"Win32.HLLP.Protil.1",
"BehavesLike.Win32.Virut.ch",
"W32/Jadtre.C",
"Trojan.Symmi.D4E83",
"Trj/CI.A",
"Win32/Wapomi.Z",
"Virus.Win32.Wapomi.a",
"Exploit.Win32.ShellCode"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Msil",
"Trojan.Kazy.D4D672",
"TrojanDownloader:MSIL/Winpud.A",
"Trojan/Win32.Inject.C149530",
"Win32/Trojan.a9f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Enlarge",
"/",
"Hummingbad/Shedun",
"infections",
"by",
"Android",
"version",
"."
] | [
16,
16,
3,
16,
16,
5,
16,
16
] |
[
"However,",
"the",
"attacks",
"against",
"targets",
"in",
"the",
"Middle",
"East",
"except",
"Israel",
"were",
"renewed",
"in",
"less",
"than",
"20",
"days."
] | [
16,
16,
1,
16,
16,
16,
16,
2,
10,
16,
2,
16,
16,
16,
0,
8,
8,
8
] |
[
"rename",
".APK",
"Android",
"application",
"package",
"files",
"used",
"to",
"install",
"the",
"malicious",
"apps,"
] | [
1,
9,
5,
13,
13,
1,
16,
16,
16,
16,
3,
11
] |
[
"Malicious",
"code",
"was",
"appended",
"to",
"the",
"compromised",
"script",
"file,",
"which",
"redirected",
"a",
"visitor."
] | [
3,
11,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16
] |
[
"The",
"backdoor",
"provided",
"an",
"alternative",
"foothold",
"in",
"several",
"observed",
"instances",
"for",
"the",
"group",
"and",
"employed",
"a",
"few",
"tricks",
"like",
"using",
"the",
"Intel",
"SSE",
"extended",
"instruction",
"set",
"to",
"avoid",
"emulation",
"and",
"obscure",
"analysis."
] | [
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
7,
15,
15,
15,
15,
15,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"uses",
"the",
"Tor",
"anonymity",
"network",
"for",
"command",
"and",
"control",
"C2",
"and",
"does",
"not",
"require",
"network",
"connectivity",
"to",
"encrypt",
"files,",
"which",
"complicates",
"detection,",
"prevention,",
"and",
"remediation."
] | [
16,
3,
16,
16,
1,
9,
9,
16,
1,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"trojan",
"will",
"receive",
"instructions",
"from",
"the",
"C2",
"to",
"spread",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"list",
"of",
"vulnerable",
"devices,",
"as",
"well",
"as",
"the",
"logins",
"and",
"passwords",
"that",
"go",
"with",
"them,",
"are",
"stored",
"on",
"the",
"server",
"belonging",
"to",
"the",
"cybercriminals."
] | [
16,
16,
16,
7,
15,
16,
16,
16,
16,
7,
16,
7,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
6
] |
[
"NexusLogger",
"is",
"a",
"cloud-based",
"keylogger",
"that",
"uses",
"the",
"Microsoft",
".NET",
"Framework",
"and",
"has",
"a",
"low",
"level",
"of",
"sophistication."
] | [
3,
16,
16,
3,
11,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Crypt.CC",
"Packed.Win32.CPEX-based!O",
"Backdoor.PePatch.Win32.2676",
"Trojan.Crypt.CC",
"W32/Trojan.GQIB-3577",
"TrojanSpy.KeyLogger",
"Trojan.Win32.Llac.laav",
"Trojan.Win32.CPEXbased.oyaq",
"Trojan.Win32.Buzus.589824[UPX]",
"Packer.W32.CPEX-based.kZ3Y",
"Trojan.Crypt.CC",
"Trojan.PWS.Lineage.4319",
"BehavesLike.Win32.PUPXAO.dh",
"W32/Trojan2.ANIR",
"Trojan/Buzus.afzu",
"TR/Dldr.Buzus.dhk",
"Trojan[Packed]/Win32.CPEX-based",
"TrojanDropper:Win32/Sharke.C",
"Trojan.Crypt.CC",
"Trojan.Win32.Llac.laav",
"Trojan.Crypt.CC",
"Trojan/Win32.Buzus.C22005",
"Trojan.Crypt.CC",
"Trojan.Crypt.CC",
"HackTool.Win32.Crypt"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"URLs",
"for",
"Sundown",
"requests",
"for",
"Flash",
"files",
"end",
"in",
".swf,",
"while",
"Silverlight",
"requests",
"end",
"in",
".xap."
] | [
16,
1,
16,
3,
16,
16,
1,
9,
9,
9,
9,
16,
3,
1,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Trojan",
"Trojan.Win32.Mlw.euwoug",
"Backdoor:Win32/DarkEnergy.A!bit",
"Backdoor.Bot",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"After",
"laying",
"low",
"for",
"a",
"few",
"years,",
"it",
"had",
"a",
"sudden",
"resurgence",
"last",
"May."
] | [
16,
16,
16,
16,
16,
0,
8,
16,
16,
16,
16,
16,
16,
0
] |
[
"This",
"archive",
"is",
"stored",
"in",
"the",
"same",
"host",
"has",
"the",
"webviews",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Surabaya.Worm",
"Worm.Win32.AutoRun!O",
"Worm.SillyShare.EE2",
"W32/Pitin.worm",
"Worm.AutoRun",
"W32.W.AutoRun.luA8",
"WORM_VB.DTH",
"Win32.Trojan.VB.iy",
"W32/Worm.BGBK",
"W32.SillyFDC",
"Win32/Dodaykil.B",
"WORM_VB.DTH",
"Win.Worm.VB-632",
"Worm.Win32.AutoRun.bant",
"Trojan.Win32.AutoRun.cnwrek",
"Trojan.Win32.Autorun.40960.R",
"Worm.Win32.VB.~E",
"Win32.HLLW.Autoruner.874",
"Virus.VB.Win32.86",
"BehavesLike.Win32.Dropper.ch",
"Worm.Win32.AutoRun",
"W32/Worm.DPLM-0673",
"Worm/AutoRun.tyn",
"TR/VB.aei",
"Worm/Win32.AutoRun",
"Trojan.Heur.E9EB80",
"Worm.Win32.AutoRun.bant",
"Worm:Win32/SillyShareCopy.E",
"HEUR/Fakon.mwf",
"SScope.Trojan.VBO.0348",
"Trj/Yabarasu.A",
"Worm.Pitin",
"Win32/VB.DG",
"Trojan.Win32.Autorun.bep",
"Worm.SillyShareCopy!GFdqFqCX45w"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W97M.Dropper.MM",
"W97M/Dropper.x",
"W97M/Mdropper.G",
"W2KM_FAREIT.IAV",
"Trojan.Script.Drop.dyxcgh",
"Trojan-Dropper:W97M/MaliciousDoc.A",
"Trojan.PWS.Stealer.4118",
"W2KM_FAREIT.IAV",
"W97M/Mdropper.G",
"TR/Crypt.Xpack.310779",
"Trojan[PSW]/Win32.Fareit",
"TrojanPSW.Fareit",
"possible-Threat.Embedded.ExeInOffice",
"virus.office.qexvmc.1100"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Operation",
"Groundbait",
"Russian:",
"Прикормка,",
"Prikormka",
"is",
"an",
"ongoing",
"cyber-surveillance"
] | [
6,
14,
16,
6,
14,
16,
16,
16,
16
] |
[
"This",
"malicious",
"app",
",",
"detected",
"by",
"ESET",
"as",
"a",
"variant",
"of",
"Android/Twitoor.A",
",",
"can",
"’",
"t",
"be",
"found",
"on",
"any",
"official",
"Android",
"app",
"store",
"–",
"it",
"probably",
"spreads",
"by",
"SMS",
"or",
"via",
"malicious",
"URLs",
"."
] | [
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"has",
"been",
"shortened",
"for",
"brevity",
"."
] | [
16,
16,
16,
16,
16,
16,
16
] |
[
"July",
"21",
"Analysis",
"of",
"the",
"RCSAndroid",
"spying",
"tool",
"revealed",
"that",
"Hacking",
"Team",
"can",
"listen",
"to",
"calls",
"and",
"roots",
"devices",
"to",
"get",
"in",
"."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"When",
"reviewing",
"the",
"decrypted",
"packet",
",",
"it",
"’",
"s",
"clear",
"it",
"has",
"the",
"same",
"content",
"as",
"previous",
"versions",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"net",
"."
] | [
9,
9,
16
] |
[
"The",
"entered",
"data",
"is",
"then",
"checked",
"and",
"the",
"last",
"four",
"digits",
"of",
"the",
"bank",
"card",
"number",
"are",
"also",
"checked",
"against",
"the",
"data",
"sent",
"in",
"the",
"C",
"&",
"C",
"command",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"separate",
"app",
"from",
"Check",
"Point",
"competitor",
"Lookout",
"also",
"detects",
"the",
"threat",
"as",
"a",
"variant",
"of",
"the",
"Shedun",
"malware",
"family",
"."
] | [
16,
16,
16,
16,
4,
12,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16
] |
[
"]",
"com",
"www5.zyns",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"Microsoft",
"Defender",
"for",
"Endpoint",
"on",
"Android",
"further",
"enriches",
"organizations",
"’",
"visibility",
"into",
"malicious",
"activity",
",",
"empowering",
"them",
"to",
"comprehensively",
"prevent",
",",
"detect",
",",
"and",
"respond",
"to",
"against",
"attack",
"sprawl",
"and",
"cross-domain",
"incidents",
"."
] | [
5,
13,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"next",
"stage",
"in",
"device",
"infection",
"could",
"be",
"the",
"use",
"of",
"exploit",
"kits",
"and",
"malvertising",
",",
"which",
"would",
"be",
"quite",
"effective",
"due",
"the",
"many",
"Android",
"vulnerabilities",
"and",
"consumers",
"with",
"unpatched",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
7,
15,
16,
16,
16,
7,
15,
16
] |
[
"The",
"developer",
"name",
"used",
",",
"GAS",
"Brazil",
",",
"suggests",
"the",
"criminals",
"behind",
"the",
"app",
"targeted",
"Brazilian",
"users",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"VB:Trojan.Valyria.849",
"W97M.Downloader.BLR",
"Troj.Downloader.Msoffice!c",
"W97M.Downloader",
"W2KM_HANCITOR.YYSYN",
"VB:Trojan.Valyria.849",
"VB:Trojan.Valyria.849",
"Trojan.Script.Downloader.espmja",
"VB:Trojan.Valyria.849",
"VB:Trojan.Valyria.849",
"W2KM_HANCITOR.YYSYN",
"TrojanDownloader:O97M/Damatak.A",
"VB:Trojan.Valyria.849",
"virus.office.qexvmc.1080"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Extract",
"data",
"from",
"WeChat",
"app",
"."
] | [
16,
16,
16,
5,
16,
16
] |
[
"Volexity",
"has",
"tied",
"this",
"attack",
"campaign",
"to",
"an",
"advanced",
"persistent",
"threat",
"APT",
"group",
"first",
"identified",
"as",
"OceanLotus",
"by",
"SkyEye",
"Labs",
"in",
"2015."
] | [
4,
16,
16,
16,
6,
14,
16,
16,
6,
14,
14,
14,
14,
16,
16,
16,
6,
16,
4,
12,
16,
0
] |
[
"Probably,",
"attackers",
"used",
"web",
"site",
"vulnerabilities",
"for",
"placing",
"malicious",
"files."
] | [
16,
6,
16,
1,
9,
7,
16,
16,
1,
9
] |
[
"Since",
"our",
"previous",
"publication,",
"we",
"have",
"found",
"another,",
"similar",
"but",
"different",
"payload",
"used",
"to",
"target",
"a",
"second",
"organization",
"in",
"Saudi",
"Arabia",
"that",
"was",
"configured",
"to",
"wipe",
"systems",
"twelve",
"days",
"later",
"on",
"November",
"29,",
"2016."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
2,
10,
15,
16,
16,
16,
5,
13,
0,
8,
8,
16,
0,
8,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Losya.gg",
"Trojan-Ransom.Win32.Losya.gg",
"Trojan-Ransom.Win32.Losya!IK",
"Trojan.Winlock.2932",
"Trojan/Losya.cs",
"Trojan:Win32/LockScreen.BA",
"Hoax.Losya.bd",
"Trojan-Ransom.Win32.Losya",
"W32/Krap.A!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Servers",
"of",
"The",
"Left",
"in",
"German",
"Bundestag",
"have",
"been",
"infected",
"with",
"malware,",
"apparently",
"by",
"a",
"state-sponsored",
"group",
"of",
"Russian",
"origin."
] | [
5,
13,
13,
13,
16,
2,
10,
16,
16,
16,
16,
3,
16,
16,
16,
6,
14,
16,
2,
10
] |
[
"Sakula",
"also",
"leverages",
"single-byte",
"XOR",
"encoding",
"to",
"obfuscate",
"various",
"strings",
"and",
"files",
"embedded",
"in",
"the",
"resource",
"section,",
"which",
"are",
"subsequently",
"used",
"for",
"User",
"Account",
"Control",
"UAC",
"bypass",
"on",
"both",
"32",
"and",
"64-bit",
"systems."
] | [
3,
16,
16,
1,
9,
9,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
13
] |
[
"Svpeng",
"is",
"capable",
"of",
"doing",
"lots",
"of",
"things",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.ICQNuker.19456",
"Trojan.ICQNuker!jj+ciDVRnhs",
"Hacktool.Nuker",
"Smalltroj.EAH",
"TROJ_ICQNUKER.A",
"Trojan.ICQNuker",
"Trojan.Win32.ICQNuker",
"Trojan.Win32.ICQNuker",
"Trojan.Win32.ICQNuker.dhzl",
"TrojWare.Win32.ICQNuker",
"Trojan.Win32.ICQNuker",
"Trojan.ICQNuker",
"TROJ_ICQNUKER.A",
"Trojan/Win32.ICQNuker",
"Trojan.Win32.ICQNuker.19456",
"Trojan.Win32.ICQNuker",
"Win32.Trojan.ICQNuker",
"Hacktool.Nuker"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Linux",
"malware",
"is",
"slowly",
"becoming",
"more",
"popular."
] | [
15,
3,
16,
16,
16,
16,
16
] |
[
"This",
"porn",
"clicker",
"Trojan,",
"which",
"we",
"detect",
"as",
"Android/Clicker,",
"has",
"once",
"more",
"become",
"available",
"for",
"download",
"from",
"Play",
"Store."
] | [
16,
3,
11,
11,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Downloader.LoadAdv.ABV",
"Trojan.Piptea",
"Downloader.Small.Win32.11983",
"Trojan.Downloader.LoadAdv.ABV",
"Multi.Threats.InArchive",
"W32/Downldr2.FZLV",
"Trojan.Dropper",
"Win.Downloader.65024-1",
"Trojan-Downloader.Win32.Small.agns",
"Trojan.Downloader.LoadAdv.ABV",
"Trojan.Win32.Small.bcwtvk",
"Trojan.Win32.Downloader.246584",
"Trojan.Downloader.LoadAdv.ABV",
"W32/Downloader.UPFZ-7129",
"Trojan[Downloader]/Win32.Small",
"Trojan:Win32/Piptea.E",
"Trojan-Downloader.Win32.Small.agns",
"Trojan.DL.Small!mUFJjjvpkTw",
"Email-Worm.Win32.Joleee",
"Win32/Trojan.8ed"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32/Adclicker.DH",
"Trojan-Clicker.Win32.Small!O",
"Trojan/Clicker.Small.tc",
"Trojan.Zusy.D730F",
"Win32.Trojan.WisdomEyes.16070401.9500.9905",
"W32/Trojan.HWTO-6812",
"Trojan.KillAV",
"Win32/TrojanClicker.Small.QZ",
"TROJ_CLICKER.UU",
"Win.Trojan.Clicker-1328",
"Trojan.Win32.Small.pbsu",
"Trojan.Win32.Clicker.20480.C",
"TrojWare.Win32.TrojanClicker.Small.QZ",
"Trojan.PWS.Gamania.16782",
"Trojan.Small.Win32.16009",
"W32/Trojan2.AUEO",
"TrojanClicker.Small.aps",
"W32.Email.Worm.Silly",
"TR/Click.Mon.1",
"Trojan[Clicker]/Win32.Small",
"Dropper/Win32.Small.R41509",
"TrojanClicker.Small",
"Trj/CI.A",
"Trojan-Downloader.Win32.Small",
"W32/CLICKER.UU!tr",
"Win32/Trojan.d06"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Another",
"chunk",
"is",
"used",
"to",
"copy",
"a",
"basic",
"Ntdll",
"and",
"Kernel32",
"import",
"address",
"table",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Sometimes",
",",
"we",
"can",
"attribute",
"different",
"apps",
"to",
"the",
"same",
"author",
"based",
"on",
"a",
"small",
",",
"unique",
"pieces",
"of",
"evidence",
"that",
"suggest",
"similarity",
",",
"such",
"as",
"a",
"repetition",
"of",
"an",
"exceptionally",
"rare",
"code",
"snippet",
",",
"asset",
",",
"or",
"a",
"particular",
"string",
"in",
"the",
"debug",
"logs",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"seems",
"that",
"the",
"people",
"who",
"filled",
"these",
"roles",
"are",
"key",
"to",
"“",
"Agent",
"Smith",
"’",
"s",
"success",
",",
"yet",
"not",
"quite",
"necessary",
"for",
"actor",
"’",
"s",
"legitimate",
"side",
"of",
"business",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"SpyNote",
"RAT",
"is",
"capable",
"of",
"performing",
"a",
"variety",
"of",
"alarming",
"functions",
"that",
"includes",
":",
"Activating",
"the",
"device",
"’",
"s",
"microphone",
"and",
"listening",
"to",
"live",
"conversations",
"Executing",
"commands",
"on",
"the",
"device",
"Copying",
"files",
"from",
"the",
"device",
"to",
"a",
"Command",
"&",
"Control",
"(",
"C",
"&",
"C",
")",
"center",
"Recording",
"screen",
"captures",
"Viewing",
"contacts",
"Reading",
"SMS",
"messages",
"The",
"screenshot",
"below",
"shows",
"part",
"of",
"the",
"sandbox",
"’",
"s",
"report",
"on",
"the",
"SpyNote",
"RAT",
"’",
"s",
"signature",
"and",
"detected",
"functions",
":",
"The",
"fake",
"Netflix",
"app",
"we",
"are",
"analyzing",
"in",
"this",
"blog",
"appears",
"to",
"be",
"built",
"using",
"an",
"updated",
"version",
"of",
"SpyNote",
"RAT",
"builder",
",",
"which",
"was",
"leaked",
"last",
"year",
"."
] | [
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"details",
"we",
"are",
"releasing",
"are",
"to",
"provide",
"insight",
"into",
"attack",
"methodologies",
"being",
"employed",
"by",
"sophisticated",
"groups",
"such",
"as",
"FIN7",
"who",
"are",
"consistently",
"changing",
"techniques",
"between",
"attacks",
"to",
"avoid",
"detection."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
6,
16,
16,
6,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16
] |
[
"The",
"Dyre",
"group,",
"a",
"major",
"malware",
"spam",
"producer,",
"has",
"changed",
"their",
"initial",
"malware",
"dropper",
"to",
"utilize",
"Microsoft",
"Word",
"document",
"macros",
"instead",
"of",
"the",
"usual",
"executable",
"types,",
"such",
"as",
".exe",
"files",
"contained",
"in",
"a",
".zip."
] | [
6,
14,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
5,
13,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom_Shieldcrypt.R00WC0DEQ17",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"W32/Ransom.WTYO-5087",
"Ransom.Troldesh",
"Ransom_Shieldcrypt.R00WC0DEQ17",
"Win32.Trojan-Ransom.Filecoder.BO",
"Trojan.Win32.Encoder.ephyjr",
"Trojan.Encoder.11787",
"Ransom:Win32/Shieldcrypt.A",
"Trj/GdSda.A",
"Win32.Trojan.Raas.Auto",
"Trojan-Ransom.Shieldcrypt"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Backdoor2.DBLT",
"WS.Reputation.1",
"Win32.TRVirtl",
"HackTool.Patcher!7MmWKbVM2EE",
"Tool.DVTPatch",
"TR/Virtl.7341",
"Trojan/Virtl.b",
"Win32.HACKTOOL.pocomail.cx.kcloud",
"W32/Backdoor2.DBLT",
"Trojan.Virtl.7341"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"IOC",
"s",
"for",
"the",
"Wildifre",
"ransomware"
] | [
1,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/PinkBlocker.arw",
"Trojan.Heloag",
"BKDR_HELOAG.SM",
"PUA.Packed.ASPack",
"BDS/Heloag.A.30",
"BKDR_HELOAG.SM",
"Backdoor.Win32.Heloag!IK",
"Backdoor:Win32/Heloag.A",
"Trojan.Heloag",
"Backdoor.Win32.Heloag",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Symantec",
"discovered",
"the",
"Greenbug",
"cyberespionage",
"group",
"during",
"its",
"investigation",
"into",
"previous",
"attacks",
"involving",
"W32.Disttrack.B",
"aka",
"Shamoon."
] | [
4,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16,
1,
16,
1,
16,
6
] |
[
"Most",
"of",
"the",
"network",
"traffic",
"we",
"’",
"ve",
"observed",
"is",
"HTTP",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16
] |
[
"In",
"this",
"post",
",",
"we",
"show",
"how",
"Google",
"Play",
"Protect",
"has",
"defended",
"against",
"a",
"well",
"organized",
",",
"persistent",
"attacker",
"and",
"share",
"examples",
"of",
"their",
"techniques",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win32.Rbot!O",
"Backdoor.Rbot.20414",
"Win32.Trojan.WisdomEyes.16070401.9500.9964",
"Win.Trojan.Mybot-4324",
"Trojan.Win32.Rbot.cuqnmc",
"Win32.HLLW.MyBot.based",
"Backdoor.RBot.Win32.38765",
"BehavesLike.Win32.Msposer.jz",
"Backdoor.Win32.SdBot",
"EXP/DameWare.ggg",
"Trojan[Backdoor]/Win32.Rbot",
"Win32.Hack.RBotT.a.83968",
"Backdoor.Win32.Sdbot.yx",
"W32/SdBot.IT!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Cylance",
"SPEAR",
"has",
"uncovered",
"a",
"long-standing",
"persistent",
"threat",
"targeting",
"numerous",
"major",
"industries",
"spread",
"across",
"Japan,",
"South",
"Korea,",
"the",
"United",
"States,",
"Europe,",
"and",
"several",
"other",
"Southeast",
"Asian",
"countries."
] | [
4,
12,
16,
16,
16,
16,
6,
14,
16,
16,
16,
4,
16,
16,
2,
10,
10,
10,
10,
10,
10,
16,
16,
16,
2,
10,
10
] |
[
"After",
"obtaining",
"the",
"desired",
"rights",
",",
"the",
"Trojan",
"sets",
"itself",
"as",
"the",
"default",
"SMS",
"app",
"(",
"by",
"independently",
"clicking",
"Yes",
"in",
"AccessibilityService",
")",
",",
"before",
"vanishing",
"from",
"the",
"device",
"screen",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojandownloader.Script",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win32.Drop.etdypm",
"Trojan.MulDrop7.42636",
"BehavesLike.Win32.Dropper.fh",
"W32/Trojan.EURA-7093",
"Trojan:VBS/Sminager.D",
"Exploit.UACSkip",
"Trj/CI.A",
"Exploit.UACSkip!",
"Win32/Trojan.Downloader.251"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.424D",
"Virus.Hupigon.Win32.5",
"Trojan/PSW.QQShou.is",
"TSPY_QQSHOU.GY",
"Win32.Trojan.WisdomEyes.16070401.9500.9956",
"W32/Trojan.KBAU-5151",
"Trojan.PWS.QQPass",
"TSPY_QQSHOU.GY",
"Backdoor.Win32.Hupigon.vpk",
"Trojan.Win32.QQShou.lofh",
"Backdoor.W32.Rbot.lgxa",
"Backdoor.Win32.Popwin.~IQ",
"Trojan.PWS.Gamania.5830",
"W32/Trojan.LGV",
"Trojan/PSW.QQShou.eu",
"Trojan[Backdoor]/Win32.Hupigon.vpk",
"PWS:Win32/Whoran.A",
"Backdoor.Win32.Hupigon.vpk",
"Trojan.PWS.QQShou!NqwrJPeZllY",
"W32/Hupigon.VPK!tr.pws"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.