tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"SMS",
"Billing",
"Carriers",
"may",
"partner",
"with",
"vendors",
"to",
"allow",
"users",
"to",
"pay",
"for",
"services",
"by",
"SMS",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"com/api/s2s/tracks/",
"and",
"is",
"used",
"for",
"activation",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16
] |
[
"In",
"later",
"versions",
",",
"instead",
"of",
"the",
"name",
"of",
"the",
"command",
",",
"its",
"numerical",
"code",
"was",
"transmitted",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Rotbrow.KK6",
"PUP.Optional.BProtector",
"Trojan.Bromngr.Win32.445",
"Win32.Adware.Bprotector.a",
"Adware.GoonSquad",
"Win.Adware.BProtector-1",
"Win32.Application.BHO.A",
"Trojan.Win32.BGuard.cunxgw",
"Application.Win32.bProtector.KA",
"Adware.BGuard.47",
"Trojan-Dropper.Win32.Rotbrow",
"Trojan.Bromngr.ed",
"W32.Adware.Installbrain",
"Trojan.Adware.BHO.Bprotector.1",
"TrojanDropper:Win32/Rotbrow.A",
"W32/Bprotect.B!tr",
"Trj/CI.A",
"Win32/Trojan.10d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Kryptik.ASES",
"Trojan.MulDrop1.32726",
"Win32/Tnega.CZG"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"What",
"was",
"taken",
"The",
"actors",
"behind",
"ViperRAT",
"seem",
"to",
"be",
"particularly",
"interested",
"in",
"image",
"data",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Further",
"research",
"of",
"the",
"attacker",
"β",
"s",
"infrastructure",
"revealed",
"more",
"related",
"mimicking",
"domains",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Crypt.Delf.AL",
"Worm/W32.G_Spot.200704",
"Backdoor.G_Spot.r8",
"W32/Grandspot.worm!p2p",
"Trojan.Crypt.Delf.AL",
"W32/G_Spot.c",
"Trojan.Win32.GSpot.dzdidh",
"W32.HLLW.Sambut",
"Win32/GrandSpot.C",
"BKDR_GSPOT.15",
"P2P-Worm.Win32.G_Spot.c",
"Worm.P2P.G_Spot!iWsciEZCFG4",
"W32.W.G_Spot.c!c",
"Trojan-Downloader.win32.Delf.xoq",
"Trojan.Crypt.Delf.AL",
"Worm.Win32.GrandSpot.C",
"Trojan.Crypt.Delf.AL",
"WIN.WORM.Virus",
"Worm.GSpot.Win32.1",
"BKDR_GSPOT.15",
"BehavesLike.Win32.Eggnog.ch",
"Worm/Sramota.qs",
"BDS/GSpot.15.Srv",
"W32/G_Spot.C",
"Trojan[Backdoor]/Win32.G_Spot",
"Trojan.Crypt.Delf.AL",
"Win32/KorGameHack.worm.200704",
"Worm:Win32/Gespo.C",
"Win32/Spotbot.15",
"Worm.G_Spot",
"Trojan-PWS.Win32.Lmir.mw",
"Trojan.Crypt.Delf.AL",
"Worm/Gspot.C"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.Exetemp!O",
"W32/Backdoor.GJUL-4537",
"TROJ_DROPER.SMJN",
"Trojan-Dropper.Win32.Exetemp.a",
"Troj.Dropper.W32.Exetemp.tnGD",
"Trojan.MulDrop.30795",
"TROJ_DROPER.SMJN",
"W32/Backdoor2.FAQY",
"Backdoor/Huigezi.2009.api",
"W32.Trojan.Exetemp",
"Trojan[Dropper]/Win32.Exetemp",
"TrojanDropper:Win32/Exetemp.A!bit",
"Trojan.Graftor.D45DD",
"Trojan-Dropper.Win32.Exetemp.a",
"TrojanDropper.Exetemp",
"Trojan.DL.Win32.Small.grn",
"W32/Exetemp.A!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Hydrochasma,",
"the",
"threat",
"actor",
"behind",
"this",
"campaign,",
"has",
"not",
"been",
"linked",
"to",
"any",
"previously",
"identified",
"group,",
"but",
"appears",
"to",
"have",
"a",
"possible",
"interest",
"in",
"industries",
"that",
"may",
"be",
"involved",
"in",
"COVID-19-related",
"treatments",
"or",
"vaccines."
] | [
6,
14,
14,
14,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"is",
"usually",
"packaged",
"with",
"apps",
"that",
"users",
"may",
"download",
"from",
"third-party",
"app",
"stores."
] | [
3,
11,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
5,
13,
13
] |
[
"Analysis",
"from",
"cyintanalysis.com",
"describing",
"infrastructure",
"of",
"an",
"actor",
"using",
"PoisonIvy",
"and",
"PlugX",
"implants."
] | [
16,
16,
4,
16,
5,
16,
16,
6,
16,
3,
16,
3,
11
] |
[
"Once",
"infected,",
"Mansoor's",
"phone",
"would",
"have",
"become",
"a",
"digital",
"spy",
"in",
"his",
"pocket,",
"capable",
"of",
"employing",
"his",
"iPhone's",
"camera",
"and",
"microphone",
"to",
"snoop",
"on",
"activity",
"in",
"the",
"vicinity",
"of",
"the",
"device,",
"recording",
"his",
"WhatsApp",
"and",
"Viber",
"calls,",
"logging",
"messages",
"sent",
"in",
"mobile",
"chat",
"apps,",
"and",
"tracking",
"his",
"movements."
] | [
16,
16,
16,
5,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
7,
15,
16,
7,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
13,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16
] |
[
"Once",
"installed,",
"it",
"hides",
"itself",
"and",
"then",
"tricks",
"the",
"user",
"into",
"typing",
"his",
"or",
"her",
"credentials",
"into",
"fake",
"bank",
"web",
"pages",
"that",
"have",
"been",
"injected",
"onto",
"the",
"device's",
"screen."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
16,
5,
13,
13
] |
[
"EventBot",
"uses",
"this",
"permission",
"in",
"order",
"to",
"achieve",
"persistence",
"and",
"run",
"in",
"the",
"background",
"as",
"a",
"service",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"As",
"a",
"modern",
"Android",
"spyware",
"it",
"is",
"also",
"capable",
"of",
"exfiltrating",
"data",
"from",
"messaging",
"applications",
"(",
"WhatsApp",
",",
"Viber",
",",
"Facebook",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
16,
5,
16,
16
] |
[
"Extract",
"information",
"from",
"th",
"GMail",
"app",
"."
] | [
16,
16,
16,
16,
5,
16,
16
] |
[
"It",
"requires",
"root",
"privileges",
"to",
"be",
"installed,",
"and",
"relies",
"on:",
"A",
"userland",
"binary,",
"providing",
"an",
"encrypted",
"backdoor",
"with",
"remote",
"code",
"execution",
"and",
"proxy",
"functionalities",
"A",
"lightweight",
"Linux",
"Loadable",
"Kernel",
"Module,",
"providing",
"an",
"additional",
"port-knocking",
"service",
"for",
"the",
"userland",
"backdoor"
] | [
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
1,
9,
9,
16,
1,
9,
16,
5,
13,
13,
13,
13,
16,
16,
16,
5,
13,
16,
16,
16,
3
] |
[
"This",
"may",
"imply",
"the",
"β",
"Concipit1248",
"β",
"app",
"is",
"still",
"incubating",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Recently,",
"FortiGuard",
"Labs",
"found",
"a",
"phishing",
"campaign",
"targeting",
"French",
"Nationals."
] | [
16,
4,
12,
16,
6,
14,
14,
16,
4,
12
] |
[
"Palo",
"Alto",
"Networks",
"has",
"discovered",
"a",
"previously",
"unknown",
"remote",
"access",
"Trojan",
"RAT",
"that",
"has",
"been",
"active",
"for",
"over",
"two",
"years."
] | [
4,
12,
12,
16,
16,
16,
16,
3,
11,
11,
11,
11,
16,
16,
16,
16,
16,
0,
8,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Mauvaise.SL1",
"TROJ_ETERNALROM.A",
"TROJ_ETERNALROM.A",
"Win32.Exploit.EqEternalRomance.A",
"Exploit.Win32.ShadowBrokers.aj",
"Exploit.Win32.ShadowBrokers.epajub",
"Exploit.Win32.ShadowBrokers.~",
"Trojan.Equation.37",
"Exploit.ShadowBrokers.Win32.13",
"Trojan.Exploit.Equation",
"Exploit.ShadowBrokers.v",
"W32.Hacktool.Equation",
"TR/Eqtonex.HG",
"Trojan[Exploit]/Win32.ShadowBrokers",
"Uds.Dangerousobject.Multi!c",
"Exploit.Win32.ShadowBrokers.aj",
"Exploit:Win32/Eqtonex.A",
"Trojan/Win32.ShadowBrokers.C1919146",
"Exploit.ShadowBrokers",
"Trj/CI.A",
"Win32/Exploit.Equation.EternalRomance.A",
"HackTool.Win32.ShadowB.a",
"Exploit.ShadowBrokers!",
"Win32/Trojan.Multi.daf"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Corebot",
"malware",
"family",
"is",
"relatively",
"new",
"and",
"was",
"first",
"documented",
"by",
"Security",
"Intelligence."
] | [
3,
11,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.Cosmu.PE",
"Win32.Worm.VB.NZQ",
"Trojan.Win32.Cosmu!O",
"W32.Lamer.EL3",
"Downloader.VB.Win32.95",
"Trojan/Downloader.VB.eex",
"Win32.Virus.VBbind.a",
"W32.Besverit",
"Win32/VB.JU",
"TROJ_DLOADR.SMM",
"Win.Trojan.Cosmu-4",
"Virus.Win32.Lamer.el",
"Win32.Worm.VB.NZQ",
"Trojan.Win32.VB.ltch",
"Troj.Downloader.W32.VB.l4ji",
"Worm.Win32.VB.kp",
"Win32.Worm.VB.NZQ",
"Win32.Worm.VB.NZQ",
"Win32.HLLW.Autoruner.6014",
"TROJ_DLOADR.SMM",
"BehavesLike.Win32.Autorun.th",
"Trojan/Cosmu.lan",
"Trojan.Win32.Cosmu.887991",
"Virus.Win32.Lamer.el",
"Win32.Worm.VB.NZQ",
"Win32/Lamer.D",
"Win32.Worm.VB.NZQ",
"SIM.Trojan.VBO.0859",
"Trojan.Downloader",
"Win32/VB.NUP",
"Worm.Win32",
"W32/AutoRun.RPV!worm",
"W32/OverDoom.A",
"Virus.Win32.Lamer.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"mechanism",
"is",
"similar",
"to",
"premium",
"rate",
"SMS",
"messages",
"but",
"Trojans",
"do",
"not",
"need",
"to",
"send",
"any",
"SMS",
"in",
"this",
"case",
"β",
"they",
"just",
"need",
"to",
"click",
"on",
"a",
"button",
"on",
"a",
"web-page",
"with",
"WAP-billing."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
3,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9
] |
[
"The",
"stages",
"of",
"the",
"FinFisher",
"multi-layered",
"protection",
"mechanisms",
"Stage",
"0",
":",
"Dropper",
"with",
"custom",
"virtual",
"machine",
"The",
"main",
"dropper",
"implements",
"the",
"VM",
"dispatcher",
"loop",
"and",
"can",
"use",
"32",
"different",
"opcodes",
"handlers",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Conclusion",
"Gooligan",
"has",
"breached",
"over",
"a",
"million",
"Google",
"accounts",
"."
] | [
16,
3,
16,
16,
16,
16,
16,
4,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Keylogger.88",
"Win32.Backdoor.Ciadoor.13.y.2.Pack",
"Backdoor/Ciadoor.13",
"Backdoor.Ciadoor!4PAHfVwkIvk",
"W32/BackdoorX.FCC",
"Backdoor.Ciadoor",
"Win32/Ciadoor.J",
"BKDR_CIADOOR.E",
"Win32.Stration",
"Backdoor.Win32.Ciadoor.cia",
"Trojan.Keylogger.88",
"Backdoor.Win32.Ciadoor.13",
"Trojan.Keylogger.88",
"Trojan.DownLoader.62487",
"BDS/Ciadoor.13.A",
"BKDR_CIADOOR.E",
"Backdoor.Win32.Ciadoor!IK",
"Backdoor/Ciadoor.az",
"Backdoor/Win32.Ciadoor",
"VirTool:Win32/VB.L",
"Backdoor.Win32.Ciadoor.60726",
"Trojan.Keylogger.88",
"W32/BackdoorX.FCC",
"OScope.Backdoor.VB",
"Win32/Ciadoor.13",
"Backdoor.Win32.Ciadoor",
"W32/Ciadoor.13!tr.bdr",
"BackDoor.Ciadoor.3.AH",
"Bck/Ciadoor.FQ"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Indicators",
"for",
"the",
"TripleNine",
"backdoor",
"used",
"by",
"an",
"actor."
] | [
1,
16,
16,
3,
11,
16,
16,
16,
6
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Pakes",
"Troj.W32.Pakes!c",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"W32/Trojan.ZCVD-4026",
"Trojan.Win32.Encoder.euxeay",
"Trojan.Encoder.15133",
"Trojan.Pakes.Win32.41830",
"Trojan.Win32.Injector",
"Backdoor.Backboot.s",
"TR/Crypt.Xpack.frnur",
"W32/Injector.DSRQ!tr",
"Trojan.Graftor.D67C49",
"Ransom:Win32/Criakl.D",
"Backdoor.Backboot",
"Ransom.FileCryptor",
"Trj/GdSda.A",
"Trojan.Pakes!3sBO8Lnk+/0",
"Win32/Trojan.7d4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Some",
"of",
"the",
"stolen",
"Skype",
"databases",
"included",
"chat",
"history",
"going",
"back",
"to",
"2012",
"and",
"activity",
"as",
"recent",
"as",
"January",
"2014"
] | [
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
0,
16,
16,
16,
16,
16,
0,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Rootkit.Win32.Xanfpezes!O",
"Trojan.Rootkitdrv",
"Rootkit.Xanfpezes.Win32.13",
"Trojan/Xanfpezes.bru",
"Trojan.Symmi.DC01B",
"Win32.Trojan.WisdomEyes.16070401.9500.9873",
"W32/Trojan.VQCP-2977",
"Win32/Rootkit.KX",
"RTKT_HIDEPROC.BB",
"Win.Trojan.Hideproc-77",
"Rootkit.Win32.Xanfpezes.bru",
"Riskware.Win32.HideProc.crvalg",
"Trojan.Fakealert.28173",
"RTKT_HIDEPROC.BB",
"BehavesLike.Win32.PUP.wc",
"Downloader.Delphi",
"TrojanDropper.Delf.cdq",
"RiskWare[RiskTool]/Win32.HideProc",
"Win32.Hack.Rootkit.kcloud",
"Rootkit.Win32.Xanfpezes.bru",
"Backdoor/Win32.Xanfpezes.C131817",
"TrojanDownloader.Banload",
"HackTool.Win32.ProcHide.ad",
"Rootkit.Xanfpezes!kqbV3Mm24ww"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Nsis.Ocna.eqkruk",
"Trojan.InstallCoreCRTD.Win32.3467",
"Win32/RA-based.AB"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Worm.Mariofev.O",
"Win32.Worm.Mariofev.O",
"WORM_MARIOFEV.TO",
"Win32.Trojan.WisdomEyes.16070401.9500.9961",
"W32/Backdoor2.CSNQ",
"W32.Spamuzle",
"WORM_MARIOFEV.TO",
"Win.Spyware.53855-2",
"Worm.Win32.Pinit.piv",
"Win32.Worm.Mariofev.O",
"Trojan.Win32.Pinit.bmcqcd",
"W32.W.Pinit.piv!c",
"Win32.Worm.Pinit.Ljul",
"Win32.Worm.Mariofev.O",
"Win32.Worm.Mariofev.O",
"BackDoor.Zapinit.81",
"BehavesLike.Win32.VTFlooder.nc",
"Trojan-Ransom.HydraCrypt",
"W32/Backdoor.CNPZ-8382",
"TrojanDropper:Win32/Mariofev.H",
"Worm.Win32.Pinit.piv",
"Worm.Pinit",
"Worm.Mariofev!HCn84tcMG2k"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"capability",
"was",
"confirmed",
"when",
"the",
"Android",
"permission",
",",
"called",
"android.permission.RECORD_AUDIO",
",",
"was",
"being",
"requested",
"along",
"with",
"code",
"found",
"in",
"the",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Readers",
"who",
"are",
"interested",
"in",
"this",
"campaign",
"should",
"start",
"with",
"our",
"first",
"blog",
"that",
"lays",
"out",
"the",
"overall",
"functionality",
"of",
"the",
"malware",
"and",
"introduces",
"its",
"many",
"components."
] | [
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16
] |
[
"The",
"fake",
"applications",
"are",
"built",
"using",
"WebView",
",",
"a",
"popular",
"extension",
"of",
"Android",
"β",
"s",
"View",
"class",
"that",
"lets",
"the",
"developer",
"show",
"a",
"webpage",
"."
] | [
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Novel.DOS.1",
"PSW.Novel",
"TROJ_PSWNOVEL.A",
"Trojan-PSW.DOS.Novel",
"Trojan.Dos.Novel.fnqs",
"DOS.S.PSWNovel.7120",
"Troj.PSW.DOS.Novel!c",
"TrojWare.PSW.Novel",
"TROJ_PSWNOVEL.A",
"Trojan/PSW.Novel",
"TR/PSW.Novel",
"Trojan[PSW]/DOS.Novel",
"Trojan-PSW.DOS.Novel",
"Login.7120",
"Dos.Trojan-qqpass.Qqrob.Aenr",
"W32/HLLW_NewStory.A!tr.pws",
"Win32/Trojan.99d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Losicoa.S18597",
"Trojan.Zusy.D39F92",
"TrojanDownloader:Win32/Qdownb.A",
"Trojan.Win32.BHO",
"Win32/Trojan.cb1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"The",
"group",
"effectively",
"controls",
"an",
"arsenal",
"of",
"over",
"85",
"million",
"mobile",
"devices",
"around",
"the",
"world."
] | [
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16
] |
[
"Last",
"week,",
"a",
"new",
"version",
"was",
"spotted",
"in",
"the",
"wild,",
"and",
"based",
"on",
"our",
"analysis,",
"we",
"believe",
"that",
"this",
"variant",
"is",
"the",
"one",
"used",
"in",
"a",
"recent",
"attack",
"against",
"San",
"Francisco",
"Municipal",
"Transport",
"Agency",
"SFMTA."
] | [
0,
8,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
1,
16,
4,
12,
12,
12,
12,
12
] |
[
"Retrieve",
"the",
"browsing",
"history",
"and",
"bookmarks",
"from",
"Chrome",
"and",
"SBrowser",
"(",
"the",
"browser",
"shipped",
"with",
"Samsung",
"phones",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
16,
16,
16,
16,
16,
4,
16,
16,
16
] |
[
"Interestingly",
",",
"\"",
"mundizza",
"''",
"is",
"typical",
"of",
"Calabria",
",",
"a",
"region",
"in",
"the",
"south",
"of",
"Italy",
",",
"and",
"more",
"specifically",
"it",
"appears",
"to",
"be",
"language",
"native",
"of",
"the",
"city",
"of",
"Catanzaro",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"observed",
"3",
"squatting",
"domain",
"registrations",
"related",
"to",
"a",
"victim",
"in",
"the",
"media",
"sector."
] | [
16,
16,
16,
16,
1,
16,
16,
16,
16,
4,
16,
4,
12,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Razy.D1558E",
"Win32.Trojan.WisdomEyes.16070401.9500.9566",
"Trojan.MSIL.Crypt",
"W32/Trojan.UXDY-5009",
"TR/Kryptik.udtxo",
"TrojanDropper:MSIL/Vibes.A",
"Trj/GdSda.A",
"MSIL/Kryptik.GXI!tr",
"Win32/Trojan.855"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"PowerShell.DownLoader.36",
"BehavesLike.Win32.Trojan.dh",
"Trojan-Dropper.PowerShell.Ploty",
"W32/Trojan.ZKDA-3628",
"TrojanDropper:PowerShell/Ploty.C",
"Trj/CI.A",
"JS/Psdl.A!tr.dldr",
"Win32/Trojan.f31"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Analysis",
"of",
"HackingTeam",
"Android",
"malware"
] | [
16,
16,
4,
3,
11
] |
[
"We",
"refer",
"to",
"this",
"backdoor",
"as",
"T9000,",
"which",
"is",
"a",
"newer",
"variant",
"of",
"the",
"T5000",
"malware",
"family,",
"also",
"known",
"as",
"Plat1."
] | [
16,
16,
16,
16,
3,
16,
3,
16,
16,
16,
16,
3,
16,
16,
3,
11,
11,
16,
16,
16,
3
] |
[
"In",
"2016",
",",
"these",
"services",
"protected",
"over",
"1.4",
"billion",
"devices",
",",
"making",
"Google",
"one",
"of",
"the",
"largest",
"providers",
"of",
"on-device",
"security",
"services",
"in",
"the",
"world",
":",
"Identify",
"PHAs",
"using",
"people",
",",
"systems",
"in",
"the",
"cloud",
",",
"and",
"data",
"sent",
"to",
"us",
"from",
"devices",
"Warn",
"users",
"about",
"or",
"blocking",
"users",
"from",
"installing",
"PHAs",
"Continually",
"scan",
"devices",
"for",
"PHAs",
"and",
"other",
"harmful",
"threats",
"Additionally",
",",
"we",
"are",
"providing",
"detailed",
"technical",
"information",
"to",
"help",
"the",
"security",
"industry",
"in",
"our",
"collective",
"work",
"against",
"PHAs",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Check",
"Point",
"Software",
"So",
"far",
",",
"HummingBad",
"has",
"been",
"observed",
"using",
"its",
"highly",
"privileged",
"status",
"only",
"to",
"engage",
"in",
"click",
"fraud",
",",
"display",
"pop-up",
"ads",
",",
"tamper",
"with",
"Google",
"Play",
",",
"and",
"install",
"additional",
"apps",
"that",
"do",
"more",
"of",
"the",
"same",
"."
] | [
4,
12,
12,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom.Pottieq",
"Win32.Trojan.WisdomEyes.16070401.9500.9786",
"Trojan.Win32.Aura.evxqqg",
"Trojan.Encoder.2667",
"BehavesLike.Win32.BadFile.th",
"TrojanDropper.FrauDrop.annq",
"Trojan[Ransom]/Win32.Aura",
"Ransom:Win32/Pottieq.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"6",
"2020-02-29",
"http",
":",
"//themoil",
"[",
"."
] | [
9,
9,
16,
1,
9,
9,
9,
9
] |
[
"The",
"Trapwot",
"malware",
"family",
"is",
"considered",
"scareware",
"or",
"rogue",
"antivirus",
"because",
"it",
"attempts",
"to",
"mislead",
"victims",
"into",
"believing",
"their",
"machine",
"is",
"infected",
"with",
"malware."
] | [
16,
3,
11,
11,
16,
16,
3,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16
] |
[
"In",
"comparison",
"to",
"other",
"threat",
"groups,",
"TG-3390",
"is",
"notable",
"for",
"its",
"tendency",
"to",
"compromise",
"Microsoft",
"Exchange",
"servers",
"using",
"a",
"custom",
"backdoor",
"and",
"credential",
"logger."
] | [
16,
16,
16,
16,
6,
14,
14,
16,
16,
11,
16,
16,
16,
16,
5,
13,
13,
16,
16,
3,
11,
16,
3,
11
] |
[
"The",
"malware",
"sets",
"a",
"registry",
"value",
"(",
"whose",
"name",
"is",
"read",
"from",
"the",
"configuration",
"file",
")",
"to",
"β",
"C",
":",
"\\Windows\\system32\\rundll32.exe",
"c",
":",
"\\ProgramData\\AuditApp\\d3d9.dll",
",",
"Control_Run",
"β",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
1,
9,
9,
9,
1,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dynamer",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"MSIL.Packed.Skaldring.D",
"Win32.Trojan.Fsysna.Hwwo",
"Trojan.DownLoader14.15241",
"BehavesLike.Win32.Trojan.cc",
"Trojan.Crypt",
"TR/Dropper.MSIL.rpjh",
"Trojan.Barys.DCAFA",
"Trojan:Win32/Bshan.A",
"Trojan.Fsysna!",
"MSIL/Injector.PKZ!tr",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Yamato",
"Transport",
"-",
"One",
"of",
"Japan",
"'s",
"largest",
"door-to-door",
"delivery",
"service",
"companies",
",",
"also",
"in",
"Tokyo",
"."
] | [
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Alien",
"Trojan.Zusy.D3E06C",
"Win32.Trojan.WisdomEyes.16070401.9500.9952",
"Worm.Win32.Alien.oe",
"W32/Trojan.RDLO-7674",
"WORM/Alien.ugxeq",
"TrojanDownloader:VBS/Kaloki.A",
"Worm.Win32.Alien.oe",
"Trj/CI.A",
"Win32/Trojan.9de"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"malware",
"was",
"included",
"as",
"an",
"attachment",
"intended",
"to",
"trick",
"the",
"user",
"into",
"opening",
"the",
"malware."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"Cybercriminals,",
"however,",
"are",
"equal",
"opportunity",
"exploiters,",
"so",
"just",
"recently",
"an",
"interesting",
"targeted",
"malware",
"campaign",
"was",
"found",
"to",
"be",
"using",
"another",
"document",
"vulnerability."
] | [
6,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
7
] |
[
"The",
"backdoor",
"code",
"was",
"found",
"between",
"Display",
"Widgets",
"version",
"2.6.1",
"released",
"June",
"30",
"and",
"version",
"2.6.3",
"released",
"September",
"2."
] | [
1,
9,
9,
16,
16,
16,
1,
9,
9,
9,
16,
0,
8,
16,
1,
9,
16,
0,
8
] |
[
"Most",
"devices",
"can",
"be",
"controlled",
"by",
"Xiaomi",
"β",
"s",
"β",
"MiHome",
"β",
"Android",
"app",
",",
"which",
"is",
"available",
"on",
"Google",
"Play",
"with",
"between",
"1,000,000",
"and",
"5,000,000",
"downloads",
"."
] | [
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
5,
16,
5,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16
] |
[
"However,",
"over",
"the",
"past",
"few",
"years,",
"we",
"have",
"been",
"tracking",
"a",
"separate,",
"less",
"widely",
"known",
"suspected",
"Iranian",
"group",
"with",
"potential",
"destructive",
"capabilities,",
"whom",
"we",
"call",
"APT33."
] | [
16,
16,
0,
8,
8,
8,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
6
] |
[
"Because",
"all",
"the",
"URLs",
"used",
"in",
"this",
"campaign",
"have",
"the",
"form",
"of",
"hxxp",
":",
"//yyyyyyyy",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"If",
"the",
"registration",
"is",
"successful,",
"it",
"uses",
"the",
"received",
"unique",
"identifier",
"to",
"further",
"communicate",
"with",
"the",
"C&C",
"server",
"and",
"receive",
"commands."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Avosim",
"Backdoor.Trojan",
"W32/Trojan.BPEV-1033",
"BDS/Avosim.azmiq",
"W32/ISMdoor.5E1D!tr",
"Trj/GdSda.A",
"Win32/Backdoor.ed0"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"run",
"a",
"malicious",
"DEX",
"file",
"without",
"notification,"
] | [
16,
16,
3,
1,
9,
12,
16
] |
[
"As",
"this",
"approach",
"was",
"not",
"a",
"great",
"success",
",",
"their",
"last",
"attempt",
"was",
"to",
"quickly",
"create",
"a",
"World",
"Cup",
"app",
"and",
"this",
"time",
"distribute",
"it",
"to",
"Israeli",
"citizens",
",",
"not",
"just",
"soldiers",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"further",
"blog",
"by",
"FireEye",
"titled",
"Acknowledgement",
"of",
"Attacks",
"Leveraging",
"Microsoft",
"Zero-Day",
"provided",
"additional",
"useful",
"information."
] | [
16,
16,
16,
16,
4,
16,
16,
16,
1,
7,
15,
15,
16,
16,
16,
16
] |
[
"The",
"Trojan",
"uses",
"this",
"counter",
"to",
"activate",
"the",
"bot",
"-",
"if",
"aforementioned",
"step",
"counter",
"hits",
"the",
"pre-configured",
"threshold",
"it",
"considers",
"running",
"on",
"the",
"device",
"to",
"be",
"safe",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Sage",
"ransomware",
"variant",
"appears",
"to",
"have",
"been",
"out",
"of",
"circulation",
"for",
"a",
"while",
"in",
"the",
"malware",
"scene."
] | [
3,
11,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"PDF/Trojan.PGPW-0"
] | [
16,
3,
16,
16,
16,
1
] |
[
"After",
"further",
"research,",
"we",
"found",
"the",
"malware",
"has",
"been",
"repackaged",
"into",
"several",
"pirated",
"iOS",
"apps",
"that",
"are",
"available",
"for",
"download",
"via",
"multiple",
"channels."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
1,
9,
9,
15,
16,
16,
16,
16,
16,
1,
9
] |
[
"Crypt0l0cker",
"has",
"gone",
"through",
"a",
"long",
"evolution,",
"the",
"adversaries",
"are",
"updating",
"and",
"improving",
"the",
"malware",
"on",
"a",
"regular",
"basis."
] | [
3,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
3,
16,
0,
8,
8
] |
[
"These",
"attacks",
"are",
"only",
"becoming",
"more",
"common",
",",
"with",
"one",
"third",
"of",
"all",
"malware",
"now",
"targeting",
"mobile",
"endpoints",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Handover",
"from",
"initial",
"module",
"to",
"the",
"main",
"payload",
"As",
"mentioned",
",",
"the",
"initial",
"handover",
"component",
"called",
"triggerInfection",
"with",
"an",
"instance",
"of",
"appObj",
"and",
"a",
"method",
"that",
"returns",
"the",
"value",
"for",
"the",
"variable",
"config",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Let",
"β",
"s",
"take",
"a",
"closer",
"look",
"at",
"the",
"suspicious",
"file",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Sofacy",
"group,",
"also",
"known",
"as",
"APT28",
"and",
"Sednit,",
"is",
"a",
"fairly",
"well",
"known",
"cyber",
"espionage",
"group",
"believed",
"to",
"have",
"ties",
"to",
"Russia."
] | [
6,
14,
14,
16,
16,
16,
6,
16,
6,
16,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16,
2
] |
[
"Even",
"harder",
"is",
"when",
"you",
"do",
"not",
"receive",
"telemetry",
"data",
"from",
"products",
"that",
"contains",
"information",
"about",
"infected",
"machines."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
5,
13
] |
[
"]",
"205",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"What",
"is",
"more,",
"they",
"are",
"tied",
"to",
"the",
"attacked",
"applications,",
"which",
"creates",
"an",
"illusion",
"that",
"they",
"are",
"legitimate",
"and",
"belong",
"to",
"the",
"corresponding",
"software."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
1,
5,
16,
16,
16,
1,
15,
16,
16,
1,
16,
1,
9,
9,
9,
9
] |
[
"However,",
"there",
"are",
"several",
"good",
"reasons",
"for",
"an",
"attacker",
"to",
"use",
"this",
"particular",
"feature."
] | [
16,
16,
16,
16,
16,
16,
11,
16,
6,
16,
16,
16,
16,
7
] |
[
"NCC",
"Group",
"is",
"monitoring",
"a",
"number",
"of",
"OOXML",
"and",
"RTF",
"techniques",
"our",
"red",
"team",
"has",
"been",
"using",
"since",
"September",
"2016,",
"which",
"uncovered",
"multiple",
"malicious",
"documents",
"from",
"around",
"August",
"2017."
] | [
4,
12,
16,
16,
16,
16,
16,
1,
16,
1,
9,
16,
4,
12,
16,
16,
16,
16,
0,
8,
16,
16,
1,
9,
9,
16,
16,
0,
8
] |
[
"β",
"Agent",
"Smith",
"β",
"will",
"replace",
"the",
"original",
"application",
"β",
"s",
"activities",
"with",
"an",
"in-house",
"SDK",
"β",
"s",
"activity",
",",
"which",
"will",
"show",
"the",
"banner",
"received",
"from",
"the",
"server",
"."
] | [
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"has",
"modular",
"architecture",
"implemented",
"in",
"the",
"form",
"of",
"plugins",
",",
"or",
"it",
"can",
"receive",
"new",
".NET",
"source",
"code",
",",
"which",
"will",
"be",
"compiled",
"on",
"the",
"device",
"in",
"runtime",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Virus.Win32.Sality!O",
"Tool.Transmit.Win32.60",
"Win32.Trojan.WisdomEyes.16070401.9500.9549",
"not-a-virus:NetTool.Win32.Transmit.a",
"Riskware.Win32.Transmit.exlakv",
"Trojan.Win32.Z.Transmit.67795",
"Backdoor.Win32.VanBot.24",
"Tool.Transmit",
"BehavesLike.Win32.VirRansom.kc",
"Trojan/Pakes.emd",
"not-a-virus:NetTool.Win32.Transmit.a",
"Trj/CI.A",
"Trojan.TenThief.DNFTrojan.tnh"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"attacks",
"leveraged",
"a",
"malware",
"named",
"EyePyramid",
"to",
"target",
"a",
"dozen",
"politicians,",
"bankers,",
"prominent",
"freemasons",
"and",
"law",
"enforcement",
"personalities",
"in",
"Italy."
] | [
16,
1,
16,
16,
3,
16,
3,
16,
16,
16,
16,
4,
12,
12,
12,
16,
4,
12,
12,
16,
2
] |
[
"Recently,",
"we've",
"seen",
"a",
"number",
"of",
"reports",
"related",
"to",
"9002",
"remote",
"access",
"Trojan",
"RAT."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
11,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Kadena.B4",
"Trojan.Ipatre.1",
"Win32.Trojan.Kryptik.lx",
"TROJ_UPATRE.SMX7",
"Win32.Trojan.Kryptik.CI",
"Trojan.Win32.Kryptik.expevv",
"Trojan.Win32.Z.Upatre.71168.AI",
"TrojWare.Win32.TrojanDownloader.Upatre.EMD",
"Trojan.DownLoader26.15470",
"TROJ_UPATRE.SMX7",
"W32/Trojan.DPWC-8231",
"TR/Crypt.ZPACK.karjs",
"Trojan/Win32.Upatre.R160419",
"Trojan-Downloader.Win32.Waski",
"W32/Kryptic.ABGK!tr",
"Win32/Trojan.8c5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Under",
"these",
"conditions",
",",
"the",
"app",
"continues",
"executing",
"and",
"the",
"intent",
"of",
"targeting",
"Xiaomi",
"devices",
"and",
"users",
"could",
"be",
"inferred",
",",
"however",
"poorly",
"written",
"code",
"results",
"in",
"execution",
"in",
"more",
"environments",
"than",
"perhaps",
"intended",
";",
"further",
"checks",
"are",
"made",
"to",
"ascertain",
"whether",
"the",
"app",
"is",
"running",
"on",
"an",
"emulator",
",",
"perhaps",
"to",
"evade",
"researcher",
"analysis",
"environments",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"EventBot",
"Updated",
"library",
"naming",
"convention",
"EventBot",
"New",
"library",
"naming",
"convention",
"."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16
] |
[
"When",
"clicked",
"it",
"launches",
"an",
"infection",
"chain",
"made",
"up",
"of",
"JavaScript,",
"and",
"a",
"final",
"shellcode",
"payload",
"that",
"makes",
"use",
"of",
"DNS",
"to",
"load",
"additional",
"shellcode",
"from",
"a",
"remote",
"command",
"and",
"control",
"server."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
1,
9,
9,
16,
16,
16,
16,
5,
16,
16,
16,
3,
16,
1,
9,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.IRC.MRAK.A",
"Virus.Win32.Mkar!O",
"W32.Mkar.A4",
"Backdoor.IRC.MRAK.A",
"Virus.Mkar.Win32.5",
"Backdoor.IRC.MRAK.A",
"Win32.Trojan.WisdomEyes.16070401.9500.9981",
"W32/Mkar.C",
"W32.Marak",
"PE_MKAR.A.DAM",
"Win.Trojan.Mkar-3",
"Virus.Win32.Mkar.a",
"Backdoor.IRC.MRAK.A",
"Virus.Win32.Mkar.cyau",
"Backdoor.IRC.MRAK.A",
"Win32.Mkar.A",
"Backdoor.IRC.MRAK.A",
"Win32.HLLP.Mrak.9",
"PE_MKAR.A.DAM",
"BehavesLike.Win32.Koobface.mc",
"W32/Mkar.LNJG-1026",
"WORM/Mkar.A",
"Backdoor:Win32/Mkar.A",
"Win32.Mrak.A",
"Virus.Win32.Mkar.a",
"Backdoor.IRC.MRAK.A",
"Malware/Win32.Mkar.C408081",
"Win32/Mkar.A",
"Win32.Mkar.E",
"Virus.Win32.Mkar",
"W32/Mkar.D",
"W32/Mkar.E"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"CrowdStrike",
"Services",
"Inc.,",
"our",
"Incident",
"Response",
"group,",
"was",
"called",
"by",
"the",
"Democratic",
"National",
"Committee",
"DNC,",
"the",
"formal",
"governing",
"body",
"for",
"the",
"US",
"Democratic",
"Party,",
"to",
"respond",
"to",
"a",
"suspected",
"breach."
] | [
4,
12,
12,
16,
16,
16,
12,
16,
16,
16,
4,
12,
12,
12,
16,
16,
4,
12,
12,
16,
16,
4,
12,
12,
16,
16,
16,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Buzus.32878.D",
"TrojanDownloader.Small.grk",
"Trojan/Downloader.Small.grk",
"Trojan.DL.Small.ALEE",
"Win32/SlhBack.B",
"W32/Downldr2.BDIE",
"W32/DLoader.DZIA",
"Trojan.Downloader-20119",
"Trojan-Downloader.Win32.Small.grk",
"Trojan.Downloader.Delf.OJS",
"Backdoor.Win32.SlhBack.B",
"Trojan.Downloader.Delf.OJS",
"Trojan.DownLoader.50258",
"TR/Dldr.Small.grk.24",
"TROJ_DELF.HXO",
"Heuristic.BehavesLike.Win32.Backdoor.H",
"Win32/SillyDl.ETL",
"W32/Downldr2.BDIE",
"TrojanDownloader.Small.zhn",
"Trojan-PWS.Win32.OnLineGames!IK",
"TrojanDownloader:Win32/Small.AAAL",
"Trojan.Win32.Downloader.35496",
"Trojan.Downloader.Delf.OJS",
"Win-Trojan/Downloader.32877",
"Trojan-Downloader.Win32.Small.grk",
"Trojan.DL.Small.AJEZ",
"Trojan.DL.Win32.Small.grk",
"Trojan-PWS.Win32.OnLineGames",
"W32/Small.GRK!tr",
"Trj/Downloader.REB"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"C",
"&",
"C",
"server",
"IP",
"addresses",
"used",
"also",
"appear",
"to",
"be",
"disparate",
",",
"as",
"they",
"were",
"located",
"in",
"many",
"European",
"countries",
"like",
"Russia",
",",
"France",
",",
"Holland",
",",
"and",
"Germany",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"McAfee",
"Labs",
"research",
"team",
"has",
"tracked",
"an",
"advanced",
"persistent",
"threat",
"for",
"the",
"past",
"couple",
"of",
"months."
] | [
16,
4,
12,
12,
12,
16,
16,
16,
6,
14,
14,
11,
16,
0,
8,
8,
8
] |
[
"Install",
"a",
"mobile",
"security",
"solution",
"to",
"secure",
"your",
"device",
"from",
"threats",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"means",
"that",
"the",
"malware",
"can",
"be",
"remotely",
"eliminated",
"by",
"an",
"SMS",
"message",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Vilsel!O",
"BackDoor-EZO.a",
"Trojan/Bewymids.a",
"Trojan.Vilsel!fjBL+ssgwjs",
"Infostealer.Hoardy",
"Win.Trojan.Vilsel-265",
"Trojan.Win32.Vilsel.aybc",
"Trojan.Win32.Vilsel.djwjt",
"Trojan.Win32.S.Vilsel.61544[h]",
"Trojan.DownLoader2.44985",
"Trojan.Vilsel.Win32.20666",
"BehavesLike.Win32.Downloader.km",
"Trojan/Vilsel.uxx",
"TR/Bewymids.A.2",
"Trojan/Win32.Vilsel",
"Win32.Troj.Vilsel.kcloud",
"Trojan:Win32/Bewymids.A",
"Trojan/Win32.Vilsel",
"Spyware.Infostealer.Flea.APT",
"Trojan.Vilsel",
"Win32.Trojan.Vilsel.Phqe",
"Trojan.Win32.Vilsel",
"W32/Vilsel.AYBC!tr",
"Trojan.Win32.Bewymids.BA",
"Win32/Trojan.bab"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.