tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"]",
"infoacount-manager",
"[",
"."
] | [
9,
9,
1,
9
] |
[
"THREAT",
"ANALYSIS",
"Infection",
"Vector",
":",
"Smishing",
"Your",
"Device",
"Thus",
"far",
",",
"FakeSpy",
"campaigns",
"are",
"characterized",
"by",
"SMS",
"phishing",
"(",
"a.k.a",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.VB!O",
"Trojan.VB",
"Trojan/VB.bmd",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"W32/Trojan.ZJNQ-3376",
"TROJ_VB.FVH",
"Win.Trojan.VB-3241",
"Trojan.Win32.VB.bmd",
"Trojan.Win32.VB.crkyqv",
"Troj.W32.Vb!c",
"Trojan.Win32.VB.aae",
"Trojan.SimSun",
"Trojan.VB.Win32.1599",
"TROJ_VB.FVH",
"BehavesLike.Win32.PJTbinder.qz",
"Trojan.Win32.Elkmil",
"W32/Trojan2.YLV",
"W32/VB.QRB!tr",
"Trojan/Win32.VB",
"Win32.Troj.VB.kcloud",
"Trojan.Heur.E1F0CA",
"Trojan.Win32.VB.28672.K",
"Trojan.Win32.VB.bmd",
"Trojan/Win32.Xema.R125410",
"TScope.Trojan.VB",
"Trj/QQPass.AWP",
"Virus.Win32.HideDoc.C"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"orgmary-crawley",
"[",
"."
] | [
9,
9,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.PPdoor.159232",
"Backdoor.Win32.PPdoor!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9989",
"Backdoor.Trojan",
"BKDR_PPDOOR.AL",
"Win.Trojan.PPDoor-3",
"Backdoor.Win32.PPdoor.bo",
"Trojan.Win32.PPdoor.qstx",
"Backdoor.Win32.PPdoor.A",
"BackDoor.Srvlite",
"BKDR_PPDOOR.AL",
"BehavesLike.Win32.Pykse.ch",
"W32/PPdoor.GR",
"Backdoor/PPdoor.bo",
"DR/Pere.103936.E.2",
"Trojan[Backdoor]/Win32.PPdoor",
"Backdoor:Win32/Ppdoor.AJ",
"Backdoor.Win32.PPdoor.bo",
"Trojan/Win32.Ppdoor.C139757",
"Virus.Win32.Bayan-based",
"Backdoor.PPdoor!lYc+pVWanGQ",
"Backdoor.Win32.PPdoor",
"Trj/PPDoor.FD"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Check",
"Point",
"Mobile",
"Threat",
"Prevention",
"has",
"detected",
"a",
"new,",
"unknown",
"mobile",
"malware",
"that",
"targeted",
"two",
"customer",
"Android",
"devices",
"belonging",
"to",
"employees",
"at",
"a",
"large",
"financial",
"services",
"institution."
] | [
4,
12,
12,
12,
12,
16,
16,
16,
16,
3,
12,
11,
16,
16,
16,
16,
5,
13,
16,
16,
4,
16,
16,
4,
12,
12,
12
] |
[
"This",
"is",
"further",
"corroborated",
"by",
"some",
"older",
"and",
"unobfuscated",
"samples",
"from",
"2016",
",",
"whose",
"primary",
"classes",
"are",
"named",
"CheckValidTarget",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"FireEye",
"recommends",
"that",
"Microsoft",
"Office",
"users",
"apply",
"the",
"patch",
"from",
"Microsoft."
] | [
4,
16,
16,
5,
13,
16,
16,
16,
16,
16,
4
] |
[
"It",
"is",
"very",
"easy",
"to",
"trick",
"victims",
"to",
"fall",
"for",
"such",
"attacks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Hacktool.Flystudio.16558",
"TSPY_AKSULA_CA083865.TOMC",
"Win32.Trojan-PSW.Alipay.a",
"TSPY_AKSULA_CA083865.TOMC",
"Trojan-PSW.Win32.Alipay.peq",
"Troj.Downloader.W32.BaiDload.lhQG",
"TR/Aksula.jqeqy",
"Trojan:Win32/Aksula.A",
"Trojan.Mikey.D906C",
"Trojan-PSW.Win32.Alipay.peq",
"Trojan/Win32.Aksula.R27086",
"Win32.Trojan-qqpass.Qqrob.Phqe"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"IOCs",
"C",
"&",
"C",
"IP",
"addresses",
":",
"155.133.82.181",
"155.133.82.240",
"155.133.82.244",
"185.234.218.59",
"195.22.126.160",
"195.22.126.163",
"195.22.126.80",
"195.22.126.81",
"5.45.73.24",
"5.45.74.130",
"IP",
"addresses",
"from",
"which",
"the",
"Trojan",
"was",
"downloaded",
":",
"185.174.173.31",
"185.234.218.59",
"188.166.156.110",
"195.22.126.160",
"195.22.126.80",
"195.22.126.81",
"195.22.126.82",
"195.22.126.83",
"SHA256",
":",
"158c7688877853ffedb572ccaa8aa9eff47fa379338151f486e46d8983ce1b67",
"3aedbe7057130cf359b9b57fa533c2b85bab9612c34697585497734530e7457d",
"f3ae6762df3f2c56b3fe598a9e3ff96ddf878c553be95bacbd192bd14debd637",
"df61a75b7cfa128d4912e5cb648cfc504a8e7b25f6c83ed19194905fef8624c8",
"c0cfd462ab21f6798e962515ac0c15a92036edd3e2e63639263bf2fd2a10c184",
"d791e0ce494104e2ae0092bb4adc398ce740fef28fa2280840ae7f61d4734514",
"38dcec47e2f4471b032a8872ca695044ddf0c61b9e8d37274147158f689d65b9",
"27cea60e23b0f62b4b131da29fdda916bc4539c34bb142fb6d3f8bb82380fe4c",
"31edacd064debdae892ab0bc788091c58a03808997e11b6c46a6a5de493ed25d",
"87ffec0fe0e7a83e6433694d7f24cfde2f70fc45800aa2acb8e816ceba428951",
"eabc604fe6b5943187c12b8635755c303c450f718cc0c8e561df22a27264f101",
"Kernel",
"Backdoor",
"found",
"in",
"Gadgets",
"Powered",
"by",
"Popular",
"Chinese",
"ARM",
"Maker",
"May",
"12",
",",
"2016",
"Mohit",
"Kumar",
"How",
"to",
"Hack",
"an",
"Android",
"device",
"?",
"It",
"is",
"possibly",
"one",
"of",
"the",
"most",
"frequently",
"asked",
"questions",
"on",
"the",
"Internet",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"All",
"born",
"in",
"the",
"90s,",
"these",
"neophytes",
"are",
"not",
"afraid",
"to",
"get",
"caught,",
"carelessly",
"leaving",
"a",
"trail",
"of",
"traceable",
"contact",
"details",
"online."
] | [
16,
16,
16,
16,
0,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16
] |
[
"]",
"975685",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DefayliLTO.Trojan",
"Trojan.Win32.Cosmu!O",
"Trojan.Hosts",
"Trojan.Cosmu.Win32.8116",
"Win32.Trojan.Qhost.y",
"W32/Trojan2.OIIF",
"Trojan.Qhosts",
"TROJ_COSMU_000001b.TOMA",
"Win.Trojan.Cosmu-1352",
"Trojan.Win32.Hosts2.wog",
"Trojan.Win32.Drop.rqzxb",
"Troj.W32.Hosts2.toz0",
"Virus.Win32.Virut.ua",
"TrojWare.Win32.Qhost.rqj",
"Trojan.MulDrop3.7647",
"TROJ_COSMU_000001b.TOMA",
"BehavesLike.Win32.PUPXAN.tz",
"W32/Trojan.VWTG-6346",
"Win32/Virut.bv",
"TR/Cosmu.oiqea",
"Trojan/Win32.Cosmu",
"Worm:Win32/Makc.A",
"Trojan.Graftor.D2333",
"Trojan.Win32.A.Cosmu.577633",
"Trojan.Win32.Hosts2.wog",
"HEUR/Fakon.mwf",
"BScope.Trojan.IRCbot",
"Win32/Qhost.ONX",
"Trojan.Cosmu!mnslE6bxKwc",
"Worm.Win32.AutoIt",
"W32/Qhost.ONX!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"As",
"soon",
"as",
"a",
"user",
"tries",
"to",
"open",
"the",
"app",
",",
"it",
"launches",
"a",
"fake",
"notification",
"and",
"soon",
"the",
"notification",
"as",
"well",
"as",
"the",
"app",
"icon",
"disappears",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Gezak",
"Trojan.Vir.HLL",
"Trojan.Heur.ED5CCE",
"WORM_GEZAK.A",
"W32/Risk.GNIP-0600",
"W32.Osapex",
"Win32/Gezak.A",
"WORM_GEZAK.A",
"Win.Trojan.Gezak-1",
"Virus.Win32.HLLW.Gezak",
"Virus.Win32.HLLW.gjmh",
"W32.HLLW.Gezak!c",
"Win32.HLLW.Gezak",
"Win32.HLLW.Osapex",
"Virus.Gezak.Win32.1",
"W32/Osapex.b.worm",
"Win32/HLLW.Gezak",
"Virus/Win32.Gezak",
"Win32.HLLW.kcloud",
"Virus.Win32.HLLW.Gezak",
"Win32/Osapex.worm.31744",
"W32/Osapex.b.worm",
"Trojan.Worm",
"Univ.AP.K",
"Win32/HLLW.Gezak",
"Win32.Virus.Hllw.Hnbi",
"Win32.HLLW.Gezak",
"Virus.Win32.HLLW",
"W32/Gezak.A!worm",
"Win32/Worm.fc8"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Some",
"examples",
"are",
"email",
"messages",
"claiming",
"to",
"be",
"in",
"regards",
"to",
"an",
"overdue",
"bill",
"or",
"invoice,",
"utilizing",
"such",
"terminology",
"in",
"the",
"subject",
"line",
"and",
"given",
"file",
"name,",
"such",
"as",
"invoice.zip",
"or",
"payment_doc_298427.zip"
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
1,
16,
16,
1,
16,
16,
1,
9,
16,
1,
9,
9,
16,
16,
1,
16,
1
] |
[
"Figure",
"13",
":",
"Popup",
"asking",
"for",
"a",
"credit",
"card",
"number",
"The",
"application",
"also",
"supports",
"stealing",
"credit",
"card",
"verification",
"information",
"(",
"Figures",
"14",
"and",
"15",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"is",
"important",
"to",
"note",
"that",
"the",
"activity",
"conducted",
"by",
"the",
"malware",
"is",
"not",
"borderline",
"advertising",
",",
"but",
"definitely",
"an",
"illegitimate",
"use",
"of",
"the",
"users",
"β",
"mobile",
"devices",
"for",
"generating",
"fraudulent",
"clicks",
",",
"benefiting",
"the",
"attackers",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"haven't",
"seen",
"Locky",
"for",
"a",
"long",
"time,",
"so",
"I",
"was",
"quite",
"surprised",
"to",
"see",
"this",
"one."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Zen",
"'s",
"rooting",
"trojan",
"apps",
"target",
"a",
"specific",
"device",
"model",
"with",
"a",
"very",
"specific",
"system",
"image",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"WHO",
"IS",
"BEHIND",
"FAKESPY",
"β",
"S",
"SMISHING",
"CAMPAIGNS",
"?",
"The",
"Cybereason",
"Nocturnus",
"team",
"suspects",
"that",
"the",
"malware",
"operators",
"and",
"authors",
"are",
"Chinese",
"speakers",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"was",
"hosting",
"an",
"Adobe",
"Flash",
"exploit",
"targeting",
"one",
"of",
"the",
"newly",
"disclosed",
"vulnerabilities",
"from",
"the",
"Hacking",
"Team",
"data",
"breach,",
"CVE-2015-5122."
] | [
16,
16,
16,
16,
5,
13,
3,
16,
16,
16,
16,
16,
16,
7,
16,
16,
4,
12,
16,
16,
1
] |
[
"After",
"that",
"it",
"β",
"s",
"necessary",
"to",
"send",
"β",
"stop_blocker",
"β",
"to",
"the",
"same",
"number",
"β",
"this",
"will",
"disable",
"the",
"display",
"of",
"HTML",
"pages",
"that",
"extort",
"money",
"and",
"block",
"the",
"screen",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Small.14848.GD",
"Trojan.Win32.Small!O",
"Trojan/Small.cnp",
"Trojan.Conjar.8",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Ransomlock",
"TROJ_IKYTOK.SMI",
"Trojan.Win32.Small.djdxj",
"TROJ_IKYTOK.SMI",
"Trojan/Small.kgz",
"TR/Zapchast.I",
"Trojan:Win32/Ikytoky.A",
"Trojan.Win32.A.Small.14848",
"Trojan/Win32.Menti.R9065",
"Trojan.Karagany",
"Trojan.Downloader.MB",
"Trj/Hexas.HEU"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Injector.dtxv",
"TROJ_INJECTOR_HA010038.UVPM",
"Win32.Trojan-PSW.Fareit.a",
"W32/Injector.GBX",
"TROJ_INJECTOR_HA010038.UVPM",
"Win.Trojan.Fareit-403",
"Riskware.Win32.Stealer.evlqpt",
"Trojan.PWS.Stealer.18592",
"Trojan.Ekstak.Win32.3539",
"W32/Injector.ELVO-4299",
"DR/Delphi.rghyi",
"Trojan/Win32.Ekstak.R214290",
"Backdoor.Androm",
"Trojan.Injector",
"Win32/PSW.Fareit.A",
"Trojan.Win32.Injector",
"W32/Kryptik.GCFM!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"site/gate_cb8a5aea1ab302f0_c",
"online",
"208.91.197",
"[",
"."
] | [
9,
9,
16,
1,
9,
9
] |
[
"Many",
"domains",
"in",
"this",
"report",
"are",
"compromised",
"domains",
"-",
"traffic",
"to",
"them",
"may",
"not",
"be",
"malicious."
] | [
1,
9,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"tweet",
"stated",
"that",
"TrickBot",
",",
"a",
"well-known",
"banking",
"Trojan",
"owned",
"by",
"an",
"organized",
"cybercrime",
"gang",
",",
"uses",
"man-in-the-browser",
"(",
"MITB",
")",
"web",
"injects",
"in",
"online",
"banking",
"sessions",
"to",
"ask",
"infected",
"users",
"for",
"their",
"mobile",
"phone",
"number",
"and",
"device",
"type",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"14",
"."
] | [
16,
16,
16
] |
[
"It",
"can",
"not",
"act",
"independently",
"and",
"operates",
"strictly",
"in",
"accordance",
"with",
"commands",
"received",
"from",
"the",
"C",
"&",
"C",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Analysis",
"of",
"TG-3390's",
"operations,",
"targeting,",
"and",
"tools",
"led",
"CTU",
"researchers",
"to",
"assess",
"with",
"moderate",
"confidence",
"the",
"group",
"is",
"located",
"in",
"the",
"People's",
"Republic",
"of",
"China."
] | [
16,
16,
6,
14,
16,
16,
3,
16,
4,
9,
16,
16,
16,
16,
16,
16,
12,
16,
16,
16,
2,
10,
10,
10,
10
] |
[
"In",
"January",
"2016",
"Forcepoint",
"Security",
"Labs",
"reported",
"an",
"email",
"campaign",
"delivering",
"the",
"Ursnif",
"banking",
"Trojan",
"which",
"used",
"the",
"Range'",
"feature",
"within",
"its",
"initial",
"HTTP",
"requests",
"to",
"avoid",
"detection."
] | [
16,
0,
8,
4,
12,
12,
16,
16,
6,
14,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16
] |
[
"The",
"Lazarus",
"group,",
"which",
"has",
"been",
"identified",
"as",
"the",
"backbone",
"of",
"the",
"report,",
"has",
"been",
"active",
"in",
"the",
"past,",
"and",
"Novetta's",
"research",
"is",
"helping",
"to",
"preemptively",
"counteract",
"and",
"prevent",
"Lazarus",
"attacks",
"around",
"the",
"world."
] | [
6,
14,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
6,
1,
16,
16,
2
] |
[
"While",
"vertical",
"targeting",
"varies,",
"we",
"observed",
"a",
"significant",
"focus",
"on",
"Financial",
"Services."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12
] |
[
"Figure",
"6",
":",
"bit.ly",
"statistics",
"for",
"the",
"fake",
"Bank",
"Austria",
"Android",
"app",
"download",
"link",
"From",
"this",
"small",
"sample",
",",
"we",
"see",
"that",
"7",
"%",
"of",
"visitors",
"clicked",
"through",
"to",
"download",
"the",
"application",
",",
"which",
"is",
"actually",
"a",
"version",
"of",
"the",
"Marcher",
"banking",
"Trojan",
"named",
"β",
"BankAustria.apk",
"β",
",",
"continuing",
"the",
"fraudulent",
"use",
"of",
"the",
"bank",
"β",
"s",
"branding",
"to",
"fool",
"potential",
"victims",
"."
] | [
16,
16,
16,
1,
16,
16,
16,
16,
5,
13,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.LRSgzengelSvrA.Trojan",
"Trojan/W32.Rootkit.78592",
"Trojan.Festi.C6",
"Trojan/Tent.cow",
"Trojan.Rootkit.1",
"RTKT_FESTI.SM",
"Win32.Trojan.WisdomEyes.16070401.9500.9989",
"Trojan.Festi",
"RTKT_FESTI.SM",
"Win.Trojan.Rootkit-4345",
"Trojan.Win32.Tent.ddfje",
"Trojan.NtRootKit.12267",
"Rootkit.Tent.Win32.134",
"Rootkit.Tent.fc",
"RKIT/Tent.aui",
"Trojan[Rootkit]/Win32.Tent",
"Backdoor:WinNT/Festi.C",
"Win-Trojan/Festi.78592",
"TScope.Malware-Cryptor.SB",
"Trj/CI.A",
"Win32.Exploit.Tent.cmvx"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"order",
"to",
"simulate",
"this",
"technique",
",",
"we",
"took",
"two",
"videos",
"side",
"by",
"side",
"of",
"how",
"FakeSpy",
"(",
"the",
"Royal",
"Mail",
"sample",
")",
"behaves",
"differently",
"on",
"a",
"physical",
"device",
"versus",
"an",
"emulator",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.downCN.Adware",
"Trojan-Downloader.Win32.Petus!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"TROJ_DLDR.SMIH",
"Trojan.Win32.Petus.efjtuk",
"Trojan.Win32.A.Downloader.69153",
"Troj.Dropper.W32.StartPage.lmCy",
"Trojan.DownLoader4.54937",
"Downloader.Petus.Win32.9",
"TROJ_DLDR.SMIH",
"Trojan-Downloader.Win32.Petus",
"Trojan[Downloader]/Win32.Petus",
"TrojanDownloader:Win32/Petus.C",
"Trojan/Win32.Petus.R4023",
"Win32/Trojan.c81"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Android",
"malware",
"Android.Oldboot",
"is",
"almost",
"impossible",
"to",
"remove",
",",
"not",
"even",
"with",
"formatting",
"your",
"device",
"."
] | [
16,
5,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.Cosmu.PE",
"Win32.Worm.VB.NZQ",
"Trojan.Win32.Cosmu!O",
"W32.Lamer.EL3",
"Trojan.Downloader",
"Worm.VB.Win32.26804",
"Trojan/VB.nup",
"Win32.Virus.VBbind.a",
"W32.Besverit",
"Win32/VB.JU",
"TROJ_DLOADR.SMM",
"Win.Trojan.Cosmu-4",
"Virus.Win32.Lamer.el",
"Win32.Worm.VB.NZQ",
"Trojan.Win32.VB.ltch",
"Trojan.Win32.Cosmu.887991",
"Worm.Win32.VB.kp",
"Win32.Worm.VB.NZQ",
"Win32.Worm.VB.NZQ",
"Win32.HLLW.Autoruner.6014",
"TROJ_DLOADR.SMM",
"BehavesLike.Win32.Autorun.vh",
"Worm.Win32.VB",
"Trojan/Cosmu.lan",
"Win32.Worm.VB.NZQ",
"Troj.Downloader.W32.VB.l4ji",
"Virus.Win32.Lamer.el",
"Win32.Worm.VB.NZQ",
"Win32/Lamer.D",
"Win32.Worm.VB.NZQ",
"SIM.Trojan.VBO.0859",
"Win32/VB.NUP",
"W32/AutoRun.RPV!worm",
"W32/OverDoom.A",
"Virus.Win32.Lamer.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"early",
"2015,",
"FIN1",
"updated",
"their",
"toolset",
"to",
"include",
"a",
"utility",
"that",
"modifies",
"the",
"legitimate",
"system",
"Volume",
"Boot",
"Record",
"VBR",
"and",
"hijacks",
"the",
"system",
"boot",
"process",
"to",
"begin",
"loading",
"Nemesis",
"components",
"before",
"the",
"Windows",
"operating",
"system",
"code."
] | [
16,
0,
8,
6,
16,
16,
16,
16,
16,
16,
16,
16,
7,
1,
9,
9,
9,
9,
9,
9,
16,
1,
1,
1,
1,
1,
16,
16,
16,
3,
11,
16,
16,
5,
13,
13,
1
] |
[
"The",
"precautions",
"you",
"take",
"online",
"have",
"been",
"covered",
"extensively",
"in",
"almost",
"all",
"of",
"our",
"blogs",
";",
"even",
"so",
",",
"we",
"believe",
"this",
"information",
"bears",
"repeating",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Exploit.Java.CVE20130422.crcqcf",
"Exploit:Java/CVE-2013-0422.A",
"heur:Exploit.CVE-2013-0422",
"Exploit:Java/Obfuscator.AS",
"Trojan.Java.Downloader",
"virus.java.bot.a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"All",
"encrypted",
"archives",
"can",
"be",
"divided",
"into",
"two",
"groups",
":",
"the",
"first",
"comprises",
"Game321.res",
",",
"Game322.res",
",",
"Game323.res",
"and",
"Game642.res",
"β",
"and",
"these",
"are",
"used",
"in",
"the",
"initial",
"phase",
"of",
"infection",
",",
"while",
"the",
"second",
"group",
":",
"Game324.res",
"and",
"Game644.res",
",",
"are",
"used",
"in",
"the",
"main",
"phase",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
1,
16,
1,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.PasistA.Worm",
"Worm.Sfone.A3",
"Worm.Sform",
"Worm.Sfone",
"W32/Worm.BLGI",
"W32.SillyWNSE",
"Win32/Sfone.A",
"BehavesLike.Win32.Trojan.ch",
"W32/Worm.KOKR-0749",
"Worm:Win32/Sfone.A",
"Worm.Sfone.A",
"W32/WinSxsBot.A.worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Malicious",
"iOS",
"profile",
"In",
"the",
"case",
"of",
"Apple",
"devices",
",",
"the",
"downloaded",
"malicious",
"iOS",
"profile",
"gathers",
"the",
"following",
":",
"Unique",
"device",
"identifier",
"(",
"UDID",
")",
"International",
"Mobile",
"Equipment",
"Identity",
"(",
"IMEI",
")",
"Integrated",
"Circuit",
"Card",
"ID",
"(",
"ICCID",
")",
"Mobile",
"equipment",
"identifier",
"(",
"MEID",
")",
"Version",
"number",
"Product",
"number",
"The",
"profile",
"installations",
"differ",
"depending",
"on",
"the",
"iOS",
"."
] | [
16,
5,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16
] |
[
"]",
"com",
"Counter",
"Measures",
"Use",
"an",
"up",
"to",
"date",
"anti-malware",
"software",
"that",
"is",
"capable",
"of",
"identifying",
"this",
"threat",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Communicates",
"via",
"TOR"
] | [
1,
16,
5
] |
[
"ONLINE",
"β",
"send",
"information",
"about",
"Trojan",
"β",
"s",
"current",
"status",
"to",
"C",
"&",
"C",
":",
"whether",
"it",
"has",
"device",
"administrator",
"privileges",
",",
"which",
"HTML",
"page",
"is",
"currently",
"displayed",
",",
"whether",
"screen",
"is",
"on",
"or",
"off",
",",
"etc",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Without",
"the",
"use",
"of",
"SSL",
"interception",
"traditional",
"IDS/IPS",
"systems",
"could",
"cease",
"to",
"detect",
"compromised",
"systems."
] | [
16,
16,
16,
16,
1,
9,
16,
5,
13,
16,
16,
16,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Theals",
"W32/Theals.dam",
"Worm.Theals.Win32.2",
"Win32.Trojan.WisdomEyes.16070401.9500.9975",
"Win32/VB.VOMRAe",
"Win.Exploit.DCOM-5",
"Net-Worm.Win32.Theals.c",
"Virus.Win32.Theals.vvbf",
"Net.Worm.W32!c",
"Virus.Win32.Theals_re.c",
"Win32.Zombie.4214",
"BehavesLike.Win32.Virut.ch",
"Worm/Theals.i",
"W32/Theals.D",
"Win32.Theals.bd.8704",
"Net-Worm.Win32.Theals.c",
"Worm/Win32.Theals.C1456665",
"Virus.Win32.Stealth.c",
"W32/Theals.C!worm.im",
"Win32/Trojan.529"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Delf.S10",
"Trojan.Delf.Win32.63014",
"Troj.W32.Bcex.tnto",
"Win32.Trojan.Delf.ah",
"Downloader.Ponik",
"Win.Trojan.Delf-33216",
"Win32.Trojan-Dropper.FakeDoc.B",
"Trojan.Win32.Broskod.rb",
"Trojan.Win32.Delf.cqqvkh",
"TrojWare.Win32.Delf.DHHK",
"BehavesLike.Win32.AdwareDealPly.ch",
"Worm.Win32.Takc",
"Trojan/Win32.Unknown",
"Worm:Win32/Takc.A",
"Trojan.Win32.Broskod.rb",
"Hoax.Blocker",
"Win32.Virus.Delf.Wsjq",
"Trojan.Delf!8gjXiSoqNjg",
"W32/Delf.NBJ!tr",
"Win32/Trojan.Delf.I"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"very",
"unique",
"technique",
"is",
"being",
"used",
"to",
"inject",
"this",
"Trojan",
"into",
"an",
"Android",
"system",
"where",
"an",
"attacker",
"places",
"a",
"component",
"of",
"it",
"into",
"the",
"boot",
"partition",
"of",
"the",
"file",
"system",
"and",
"modify",
"the",
"'init",
"'",
"script",
"(",
"initialize",
"the",
"operating",
"system",
")",
"to",
"re-load",
"the",
"malware",
"as",
"you",
"switch",
"on",
"your",
"android",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom.Apollo",
"Ransom.Apollo",
"Ransom_Apollo.R058C0TLR17",
"Win32.Trojan.WisdomEyes.16070401.9500.9925",
"W32/Trojan.MNOB-4766",
"Ransom_Apollo.R058C0TLR17",
"Win32.Trojan-Ransom.ApolloLocker.A",
"Trojan.Win32.Crypted.ewmuiu",
"W32.Troj.Ransom!c",
"Ransom.Win32.Apollo",
"Ransom:Win32/Apollo.A",
"Trj/CI.A",
"Win32/Trojan.160"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.JobLaunch.ODB",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Backdoor.Memsyl",
"TROJ_NECURS.SMJ10",
"Trojan.Win32.Crypted.dgzzxe",
"Trojan.DownLoader11.38598",
"TROJ_NECURS.SMJ10",
"W32/Trojan.TVCC-2701",
"TrojanDropper.Injector.atzu",
"Trojan.Zusy.D1B5A0",
"Dropper/Win32.Necurs.R121870",
"TrojanDropper.Injector",
"Trojan.MSIL.Inject",
"MSIL/Injector.FWI!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.C675",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Trojan2.IUJL",
"SecurityRisk.Downldr",
"Trojan.DownLoad.42343",
"W32.Malware.Downloader",
"Trojan.Kelios.1",
"TScope.Malware-Cryptor.SB",
"Trojan.Win32.Dogrobot"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Initial",
"research",
"identified",
"that",
"the",
"filename",
"suggested",
"a",
"relationship",
"to",
"the",
"D-30",
"122mm",
"towed",
"howitzer,",
"an",
"artillery",
"weapon",
"first",
"manufactured",
"in",
"the",
"Soviet",
"Union",
"in",
"the",
"1960s",
"but",
"still",
"in",
"use",
"today."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
12,
16,
4,
12,
16,
16,
16,
2,
10,
10,
16,
16,
0,
16,
16,
16,
16,
0
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9772",
"Win.Trojan.Adwind-9",
"W32/Trojan.YEAY-3186",
"W32.Dropper.Java",
"Trj/CI.A",
"Win32/Application.22f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.38CB",
"Virus.Win32.Virut"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"This",
"ransomware",
"family",
"is",
"known",
"for",
"being",
"hosted",
"on",
"arbitrary",
"websites",
"and",
"circulated",
"on",
"online",
"forums",
"using",
"various",
"social",
"engineering",
"lures",
",",
"including",
"masquerading",
"as",
"popular",
"apps",
",",
"cracked",
"games",
",",
"or",
"video",
"players",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Until",
"now,",
"it",
"was",
"widely",
"believed",
"the",
"actor's",
"activities",
"had",
"largely",
"subsided",
"in",
"2013,",
"following",
"numerous",
"public",
"disclosures",
"and",
"detailed",
"analyses",
"of",
"their",
"backdoors."
] | [
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
0,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"Surprisingly,",
"there",
"is",
"a",
"lot",
"of",
"media",
"attention",
"going",
"on",
"at",
"the",
"moment",
"on",
"a",
"macOS",
"malware",
"called",
"OSX/Dok."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
3,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Symmi.DEFF7",
"W32.Extrat",
"Win.Trojan.B-471",
"BackDoor.Cybergate.4022",
"BehavesLike.Win32.Backdoor.gc",
"Troj.W32.Scar.lByG",
"Trojan.Win32.Xtrat.ldu",
"Backdoor/Win32.Poison.R139029",
"Trojan.Xtrat",
"Trojan.Win32.Remtasu"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"If",
"that",
"doesn",
"β",
"t",
"work",
",",
"they",
"try",
"to",
"use",
"queryUsageStats",
":",
"When",
"the",
"malware",
"invokes",
"queryUsageStats",
",",
"it",
"asks",
"for",
"the",
"list",
"of",
"applications",
"that",
"ran",
"in",
"the",
"last",
"1",
"million",
"milliseconds",
"(",
"16",
"minutes",
"and",
"40",
"seconds",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Trojan",
"may",
"send",
"the",
"following",
"information",
"to",
"one",
"of",
"the",
"remote",
"locations:",
"Computer",
"name"
] | [
16,
3,
16,
16,
16,
16,
12,
16,
16,
16,
16,
1,
9,
9,
9
] |
[
"Mobile",
"implant",
"evolution",
"timeline",
"However",
",",
"some",
"facts",
"indicate",
"that",
"the",
"APK",
"samples",
"from",
"stage",
"two",
"can",
"also",
"be",
"used",
"separately",
"as",
"the",
"first",
"step",
"of",
"the",
"infection",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.DoS.751104",
"DoS.Win32.Delf!O",
"Trojan/DOS.Delf.j",
"DoS.Delf!7331ealGHQM",
"W32/Worm.ATZ",
"Hacktool.Flooder",
"TROJ_DELF.FOE",
"DoS.Delf",
"DoS.Win32.Delf.j",
"Trojan.Win32.Delf.hdtu",
"PE:Hack.DDoSer.Win32.Delf.j!1074949418",
"Tool.Delf.Win32.630",
"TROJ_DELF.FOE",
"BehavesLike.Win32.Trojan.bh",
"W32/Worm.OXOE-7458",
"Trojan/DDoS.Delf.f",
"DDOS/Delf.J.4",
"HackTool[DoS]/Win32.Delf",
"Win32.Hack.Delf.j.kcloud",
"Trojan.Win32.Dos-Delf.626688[h]",
"Win-Trojan/Xema.variant",
"DoS.Delf",
"Trojan.Win32.Delf.j",
"Win32.Trojan.Delf.brp",
"Trojan-Dropper.Delf",
"W32/Delf.A!tr",
"DoS.BRY",
"Win32/Trojan.2ff"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"the",
"months",
"leading",
"up",
"to",
"August,",
"the",
"Sofacy",
"group",
"launched",
"several",
"waves",
"of",
"attacks",
"relying",
"on",
"zero-day",
"exploits",
"in",
"Microsoft",
"Office,",
"Oracle",
"Sun",
"Java,",
"Adobe",
"Flash",
"Player",
"and",
"Windows",
"itself."
] | [
16,
16,
0,
16,
16,
16,
0,
16,
6,
14,
16,
16,
16,
16,
1,
16,
16,
7,
15,
16,
5,
13,
13,
13,
13,
13,
13,
13,
16,
5,
16
] |
[
"A",
"new",
"variant",
"of",
"the",
"notorious",
"ransomware",
"Petya",
"is",
"back",
"-",
"again",
"-",
"and",
"with",
"yet",
"another",
"James",
"Bond",
"reference",
"for",
"a",
"name:",
"Goldeneye."
] | [
16,
3,
11,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"This",
"particular",
"HenBox",
"variant",
",",
"as",
"listed",
"in",
"Table",
"3",
"above",
",",
"harvests",
"data",
"from",
"two",
"popular",
"messaging",
"and",
"social",
"media",
"apps",
":",
"Voxer",
"Walkie",
"Talkie",
"Messenger",
"(",
"com.rebelvox.voxer",
")",
"and",
"Tencent",
"β",
"s",
"WeChat",
"(",
"com.tencent.mm",
")",
"."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
5,
13,
5,
16,
1,
16,
16,
4,
16,
16,
5,
16,
1,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9996",
"Trojan.Cridex",
"Trojan.Win64.Kryptik.exmlew",
"Trojan.Win32.Z.Mikey.577536.K",
"Trojan.Kryptik.Win64.1541",
"Trojan.Win64.Crypt",
"W64/Trojan.WNTM-1890",
"TR/Crypt.ZPACK.fzarm",
"Trojan/Win64.Dridex",
"Trojan.Mikey.D123A2",
"Backdoor.NanoCore",
"Trj/CI.A",
"Win32.Trojan.Mikey.Szbg",
"Win32/Trojan.4d2"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"REQUEST_INSTALL_PACKAGES",
"-",
"make",
"a",
"request",
"to",
"install",
"packages",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.PePatch.Win32.108052",
"Trojan.Razy.D2AD35",
"Win32.Trojan.WisdomEyes.16070401.9500.9515",
"Trojan.Win32.Wencho.eqsozv",
"Backdoor.Win32.Wencho",
"Backdoor:Win32/Wencho.A",
"Downloader/Win32.Paph.C1961981",
"TrojanDownloader.Paph",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Exploit/W32.IMG-WMF.23552.O",
"Trojan-GameThief.Win32.OnLineGames!O",
"Exploit.IMG.Win32.498",
"Trojan/Exploit.IMG-WMF.axd",
"TROJ_BEHAV.FL",
"Win32.Trojan.WisdomEyes.16070401.9500.9981",
"TROJ_BEHAV.FL",
"Win.Trojan.Exploit-289",
"Exploit.Win32.IMGWMF.bekdjb",
"Exploit.W32.IMG-WMF.loBk",
"TrojWare.Win32.GameThief.Magania.~EV",
"Trojan.DownLoad.15186",
"BehavesLike.Win32.Worm.mc",
"Exploit.IMG-WMF.agp",
"Rootkit.Small",
"Trojan.Win32.KillAv.hd",
"Exploit.Win32.IMG-WMF",
"Win32/Trojan.Exploit.a54"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"While",
"Google",
"did",
"not",
"share",
"with",
"us",
"the",
"total",
"number",
"of",
"infected",
"devices",
",",
"they",
"confirmed",
"that",
"one",
"of",
"these",
"malicious",
"apps",
"collected",
"over",
"350",
"installations",
"through",
"the",
"Play",
"Store",
",",
"while",
"other",
"variants",
"collected",
"few",
"dozens",
"each",
",",
"and",
"that",
"all",
"infections",
"were",
"located",
"in",
"Italy",
"."
] | [
16,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Delf",
"Trojan.Heur.iO0au4aNrMf",
"Win32.Trojan.WisdomEyes.16070401.9500.9705",
"W32/Trojan.UNZI-1320",
"W32.Datom.Worm",
"Trojan.Win32.Delf.enaz",
"Trojan.Win32.Datom.euwmlv",
"Worm.Win32.Datom.A~1",
"Win32.HLLW.Datom",
"BehavesLike.Win32.Sality.cc",
"Virus.Worm.Datom",
"Trojan.Win32.Delf.enaz",
"Trojan/Win32.Buzus.C104859",
"Trojan.Delf",
"Win32.Trojan.Delf.Swlf"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"keylogger",
"can",
"track",
"three",
"different",
"events",
"(",
"Figure",
"5",
")",
":",
"TYPE_VIEW_CLICKED",
"Represents",
"the",
"event",
"of",
"clicking",
"on",
"a",
"View-like",
"Button",
",",
"CompoundButton",
",",
"etc",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"allows",
"the",
"source",
"process",
"to",
"trace",
"the",
"target",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"SANS",
"has",
"published",
"a",
"new",
"blog",
"regarding",
"a",
"tax",
"filing",
"service",
"that",
"has",
"been",
"compromised."
] | [
4,
16,
16,
16,
16,
16,
16,
5,
13,
13,
13,
16,
16,
16,
7
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Application.NirSoft.PSPassView.C",
"PSWTool.Win32.PassView!O",
"HackTool.Pspv.SD4",
"W32/PWS.IMQI-4038",
"Hacktool.PStorRevealer",
"Application.NirSoft.PSPassView.C",
"not-a-virus:PSWTool.Win32.PassView.iv",
"Application.NirSoft.PSPassView.C",
"Riskware.Win32.PassView.exmcew",
"Application.NirSoft.PSPassView.C",
"ApplicUnsaf.Win32.PSWTool.PassView.A",
"Tool.PassView",
"Tool.PassView.Win32.6",
"W32/PWStealer.CAT",
"PSWTool.PassView.k",
"Trojan[PSWTool]/Win32.PassView",
"Application.NirSoft.PSPassView.C",
"not-a-virus:PSWTool.Win32.PassView.iv",
"TScope.Malware-Cryptor.SB",
"PUP.Optional.PassView",
"Trj/CI.A",
"HackTool.IcqSmiley.A",
"not-a-virus:PSWTool.Win32.PassView",
"Win32/Application.40e"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Unit",
"42",
"recently",
"identified",
"a",
"targeted",
"attack",
"against",
"an",
"individual",
"working",
"for",
"the",
"Foreign",
"Ministry",
"of",
"Afghanistan",
"in",
"China."
] | [
4,
12,
16,
16,
16,
1,
9,
16,
16,
4,
12,
11,
4,
12,
12,
12,
12,
16,
2
] |
[
"What",
"we",
"found",
"were",
"several",
"other",
"fake",
"apps",
"developed",
"using",
"the",
"SpyNote",
"builder",
",",
"which",
"should",
"come",
"as",
"a",
"warning",
"to",
"Android",
"users",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"This",
"threat",
"targets",
"Russians",
"but",
"the",
"apps",
"are",
"accessible",
"worldwide."
] | [
16,
3,
16,
2,
16,
16,
5,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Qhost.Win32.10597",
"Trojan/Qhost.pdq",
"Trojan.Zusy.D5AFC",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win32.Hosts.bgaqwt",
"Troj.Banker.W32.Qhost.lE9S",
"Trojan.Hosts.5268",
"Trojan.Win32.Hider",
"Trojan/Win32.Unknown",
"Trojan:WinNT/QHosts.B",
"Win32/Qhost.PDQ",
"Trojan.Qhost!QXppfUGnhzI",
"W32/Kryptic.QHS!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Spymel.A4",
"Trojan.ReconycCRTD.Win32.8402",
"Trojan.Zusy.D1E1BE",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win32.Reconyc.inec",
"Trojan.DownLoader13.49710",
"Trojan/Win32.Reconyc",
"Backdoor:MSIL/Moidirat.A",
"Trojan.Win32.Reconyc.inec",
"Trojan.MSIL.Spy",
"Win32/Backdoor.a11"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Nymaim.561152",
"Trojan.NymaimCS.S1199370",
"TROJ_NYMAIM.SMR2",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TROJ_NYMAIM.SMR2",
"Trojan.Win32.Nymaim.eqlfnf",
"TrojWare.Win32.Nymaim.CH",
"Trojan.Nymaim.143",
"BehavesLike.Win32.MultiPlug.hh",
"Trojan-Downloader.Nymaim",
"Trojan.Nymaim.czv",
"TR/Crypt.Xpack.owrka",
"Trojan/Win32.Nymaim",
"Win32.Trojan.Nymaim.M",
"Trojan/Win32.Nymaim.C2027429",
"Trojan.Nymaim",
"Trojan.Nymaim",
"Win32/TrojanDownloader.Nymaim.BA",
"Trojan.Nymaim!ovdfLq+hmM4",
"W32/Nymaim.BA!tr",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"this",
"case",
"we",
"found",
"traces",
"of",
"dx/dexmerge",
"compilers",
",",
"which",
"means",
"that",
",",
"this",
"time",
",",
"the",
"attackers",
"just",
"imported",
"the",
"original",
"source",
"code",
"into",
"an",
"Android",
"IDE",
"(",
"such",
"as",
"Android",
"Studio",
",",
"for",
"instance",
")",
"and",
"compiled",
"it",
"with",
"their",
"own",
"modifications",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"On",
"installation",
",",
"the",
"app",
"requests",
"the",
"user",
"to",
"provide",
"SMS",
"storage",
"access",
"and",
"high",
"Android",
"privileges",
"such",
"as",
"Device",
"Admin",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Java.Downloader.1096",
"BehavesLike.Win32.Trojan.vc",
"Java.Obfus"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"By",
"comparison",
",",
"the",
"DataLust",
"ransomware",
"demanded",
"merely",
"$",
"15",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16
] |
[
"Microsoft",
"Publisher",
"is",
"included",
"and",
"installed",
"by",
"default",
"in",
"Office",
"365."
] | [
4,
12,
16,
16,
16,
16,
16,
16,
16,
5,
13
] |
[
"Kaspersky",
"Lab",
"began",
"this",
"ongoing",
"research",
"in",
"the",
"autumn",
"of",
"2011."
] | [
4,
12,
16,
16,
16,
4,
16,
16,
0,
8,
8
] |
[
"In",
"this",
"post",
"we",
"will",
"review",
"the",
"research",
"results",
"of",
"Votiro",
"Labs",
"and",
"ClearSky,",
"the",
"weaponized",
"documents",
"and",
"campaign",
"infrastructure."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
4,
1,
9,
9,
16,
5,
13
] |
[
"At",
"the",
"same",
"time",
",",
"it",
"hides",
"an",
"icon",
"and",
"starts",
"background",
"services",
"to",
"hide",
"further",
"actions",
"from",
"the",
"user",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Heur.TP.ED1233C",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Trojan.Win32.Z.Starter.204271",
"Trojan.Win32.Starter",
"Exploit.ShellCode",
"Trojan:Win32/Starter.P",
"Trojan.Win32.Starter",
"Trj/CI.A",
"Win32.Trojan.Crypt.Dzkb",
"Win32/Trojan.6f7"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"DustySky",
"called",
"NeD",
"Worm",
"by",
"its",
"developer",
"is",
"a",
"multi-stage",
"malware",
"in",
"use",
"since",
"May",
"2015."
] | [
3,
16,
3,
11,
16,
16,
6,
16,
16,
3,
11,
16,
16,
16,
0,
8
] |
[
"When",
"a",
"user",
"opens",
"the",
".zip",
"file",
"and",
"double",
"clicks",
"the",
"JavaScript,",
"the",
"default",
"browser",
"Internet",
"Explorer,",
"Mozilla,",
"etc.",
"opens",
"and",
"executes",
"JavaScript."
] | [
16,
16,
4,
16,
16,
1,
9,
16,
1,
9,
9,
9,
16,
16,
16,
5,
13,
13,
16,
16,
16,
1,
9
] |
[
"We",
"have",
"identified",
"a",
"new",
"distribution",
"campaign",
"which",
"took",
"place",
"on",
"4th",
"July."
] | [
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
0,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Minxer",
"Win32.Trojan.WisdomEyes.16070401.9500.9994",
"W32/Trojan.CFWS-6788",
"Win32.Application.Bitcoinminer.W",
"Riskware.Win64.BtcMine.eiegeg",
"Trojan.BtcMine.604",
"Worm.WBNA.Win32.419008",
"W32.Trojan.Minxer",
"Trojan.Razy.D197C7",
"Trojan.BitCoinMiner",
"Trj/CI.A",
"Riskware.BitCoinMiner!",
"Win32/Trojan.582"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.