tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"Linux.Rekoobe",
"variant"
] | [
1,
3
] |
[
"Sex",
"sells,",
"and",
"nowhere",
"is",
"that",
"more",
"true",
"than",
"the",
"Chinese",
"mobile",
"landscape."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"BAIJIU's",
"goal",
"in",
"this",
"attack",
"was",
"to",
"deploy",
"a",
"set",
"of",
"espionage",
"tools",
"through",
"a",
"downloader",
"we",
"call",
"TYPHOON",
"and",
"a",
"set",
"of",
"backdoors",
"we",
"call",
"LIONROCK."
] | [
6,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
3,
16,
16,
3,
16,
16,
16,
16,
3,
16,
16,
3
] |
[
"Adding",
"AV",
"exceptions"
] | [
16,
5,
1
] |
[
"The",
"first",
"one",
"is",
"used",
"to",
"receive",
"a",
"list",
"of",
"logins",
"and",
"passwords,",
"the",
"second",
"one—for",
"operation",
"of",
"the",
"SOCKS",
"proxy",
"server."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
1,
16,
16,
16,
16,
16,
5,
13,
13,
13
] |
[
"Variants",
"of",
"H-Worm,",
"primarily",
"connecting",
"to",
"command",
"and",
"control",
"servers",
"located",
"in",
"Algeria."
] | [
3,
16,
3,
16,
16,
16,
1,
9,
9,
9,
16,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.ShipUp.90112",
"W32.VisuDir.A3",
"Trojan.Zusy.D2CF33",
"PE_SHIPUP.A",
"Win32.Worm.ShipUp.h",
"Win32/Gamarue.ISACBfC",
"PE_SHIPUP.A",
"Trojan.Win32.ShipUp.futk",
"TrojWare.Win32.ShipUp.AR",
"Trojan.KillFiles.28137",
"Worm.Win32.ShipUp",
"Worm:Win32/Lecna.A!dha",
"Trojan.Win32.ShipUp.futk",
"Trojan/Win32.Cossta.R120893",
"Trojan.FakeDoc",
"Trojan.Win32.Csyr.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Some",
"recent",
"campaigns",
"against",
"other",
"bank",
"customers",
"also",
"used",
"“",
".gdn",
"”",
"TLDs",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malicious",
"macro",
"inside",
"the",
"Office",
"document",
"is",
"obfuscated",
"as",
"shown",
"in",
"the",
"code",
"snapshot",
"below",
"-Recently",
"[Kaspersky]",
"came",
"across",
"a",
"new",
"family",
"of",
"cross-platform",
"backdoors",
"for",
"desktop",
"environments."
] | [
16,
7,
15,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
4,
16,
16,
16,
16,
3,
11,
11,
11,
16,
5,
5
] |
[
"The",
"user",
"needs",
"to",
"press",
"the",
"\"",
"close",
"''",
"button",
"to",
"finish",
"the",
"installation",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Typhon",
"is",
"an",
"info",
"stealer",
"first",
"that",
"was",
"reported",
"in",
"mid-2022",
"for",
"the",
"first",
"time."
] | [
3,
16,
16,
16,
3,
16,
16,
16,
16,
16,
0,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Zenshirsh.SL7",
"Trojan.Win32.Pigeon.cxszod",
"Uds.Dangerousobject.Multi!c",
"Win32.Trojan.Mikey.Swlc",
"BackDoor.Pigeon.8805",
"Backdoor.Hupigon.Win32.185096",
"Trojan.Mikey.D9181",
"HackTool:Win32/Goldoseri.A",
"Win32/HackTool.DoSer.AE",
"BackDoor.Pigeon!",
"Win32/Trojan.6bf"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"On",
"July",
"6,",
"2017,",
"RSA",
"FirstWatch",
"noted",
"renewed",
"MONSOON",
"APT",
"campaign",
"activity",
"submitted",
"from",
"a",
"community",
"user",
"in",
"India",
"to",
"Virus",
"Total."
] | [
16,
0,
8,
8,
4,
12,
16,
16,
6,
14,
14,
16,
16,
16,
16,
4,
12,
16,
2,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"RDN/BackDoor-AWQ.b",
"Heur.Corrupt.PE",
"Backdoor.Win32.Hupigon",
"TrojanDropper:Win32/Arbinder.B.dam#2",
"Backdoor/Win32.Graybird.C194482"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"Overlay",
"attack",
"Ginp",
"uses",
"the",
"Accessibility",
"Service",
"to",
"check",
"which",
"application",
"runs",
"is",
"the",
"foreground",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Zenshirsh.SL7",
"Hacktool.Flooder",
"BehavesLike.Win32.RAHack.xc",
"Trojan-DDoS.Win32.Resod",
"TrojanDDoS.Resod.g",
"TR/DDoS.Maker.11.B",
"Trojan[DDoS]/Win32.Resod",
"DDoS:Win32/Resod.dam#2",
"Win32/Trojan.DDoS.835"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"FakeSpy",
"Masquerades",
"as",
"Postal",
"Service",
"Apps",
"Around",
"the",
"World",
"July",
"1",
",",
"2020",
"KEY",
"FINDINGS",
"The",
"Cybereason",
"Nocturnus",
"team",
"is",
"investigating",
"a",
"new",
"campaign",
"involving",
"FakeSpy",
",",
"an",
"Android",
"mobile",
"malware",
"that",
"emerged",
"around",
"October",
"2017",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"60",
"%",
"of",
"devices",
"containing",
"or",
"accessing",
"enterprise",
"data",
"are",
"mobile",
",",
"and",
"mobile",
"devices",
"tend",
"to",
"include",
"a",
"significant",
"amount",
"of",
"personal",
"and",
"business",
"data",
",",
"assuming",
"the",
"organization",
"has",
"a",
"bring-your-own-device",
"policy",
"in",
"place",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Wurmark.A@mm",
"Win32.Wurmark.A@mm",
"W32/Mugly.h@MM",
"W32.W.Wurmark.g!c",
"W32/Wurmark.g",
"Win32.Wurmark.A@mm",
"Win32.Wurmark.E90817",
"I-Worm.Wurmark!utsCc3R91ZU",
"W32/Wurmark.F",
"W32.Mugly.G@mm",
"Win32/Wurmark.G",
"WORM_MUGLY.H",
"Worm.Wurmark.G",
"Email-Worm.Win32.Wurmark.g",
"Trojan.Win32.Wurmark.fsml",
"Virus.Win32.Heur.c",
"Win32.Wurmark.A@mm",
"Worm.Win32.Wurmark.G",
"Win32.Wurmark.A@mm",
"Worm.Wurmark.Win32.11",
"WORM_MUGLY.H",
"BehavesLike.Win32.VBObfus.fc",
"W32/Wurmark.JPAN-1543",
"I-Worm.Wurmark.a",
"WORM/Uglatad.2",
"Worm[Email]/Win32.Wurmark",
"Worm:Win32/Mugly.H@mm",
"Win32/Mugly.worm.351744",
"Win32.Wurmark.A@mm",
"Win32/Mugly.G",
"Worm.Wurmark",
"Win32.Wurmark.A@mm",
"Virus.Win32.QQRob.AS",
"W32/Mugly.H@mm",
"I-Worm/Wurmark.E",
"Worm.Win32.Wurmark.AGmW"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Device",
"admin",
"policies",
"Looking",
"at",
"the",
"policy",
"'s",
"definition",
",",
"we",
"can",
"see",
"that",
"it",
"lists",
"all",
"the",
"available",
"policies",
"even",
"if",
"most",
"of",
"them",
"are",
"deprecated",
"on",
"Android",
"10.0",
"and",
"their",
"usage",
"results",
"in",
"a",
"security",
"exception",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Darkhotel",
"APT",
"attacks",
"dated",
"2014",
"and",
"earlier",
"are",
"characterized",
"by",
"the",
"misuse",
"of",
"stolen",
"certificates,",
"the",
"deployment",
"of",
".hta",
"files",
"with",
"multiple",
"techniques,",
"and",
"the",
"use",
"of",
"unusual",
"methods",
"like",
"the",
"infiltration",
"of",
"hotel",
"Wi-Fi",
"to",
"place",
"backdoors",
"in",
"targets'",
"systems."
] | [
6,
14,
16,
16,
0,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
3,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Symmi.D11236",
"Win32.Trojan.WisdomEyes.16070401.9500.9993",
"DLOADER.Trojan",
"Trojan-Downloader.Win32.Small",
"Trojan/Win32.Rozepads.R172444",
"BScope.Trojan.Win32.Inject.2"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Smartphones",
"are",
"the",
"dominant",
"form",
"of",
"internet",
"access",
"in",
"the",
"region",
"and",
"Xinjiang",
"was",
"recently",
"above",
"the",
"national",
"average",
"of",
"internet",
"users",
"in",
"China",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Androm.1289728",
"Trojan.Skeeyah",
"Backdoor.Bot",
"Win32.Trojan.WisdomEyes.16070401.9500.9989",
"W32/Trojan.UWVT-1669",
"W32.Golroted",
"TROJ_INJECTOR_FE31022B.UVPM",
"Backdoor.Win32.Androm.hjzg",
"Trojan.PWS.Stealer.13025",
"TROJ_INJECTOR_FE31022B.UVPM",
"BehavesLike.Win32.Trojan.tc",
"W32/Trojan2.PTAY",
"Backdoor/Androm.gyi",
"Trojan[Backdoor]/Win32.Androm",
"Trojan.MSIL.Androm.9",
"Backdoor.Win32.Androm.hjzg",
"Trojan:MSIL/Loksec.A",
"Trojan/Win32.Inject.R140951",
"Backdoor.Androm",
"Trojan.Injector",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Dropper.Delf.bl",
"TROJ_DROPPER.IPJ",
"W32/Risk.CLFC-1497",
"Backdoor.Acropolis",
"TrojanDropper.Delf",
"TROJ_DROPPER.IPJ",
"Win.Trojan.Acropolis-1",
"Trojan-Dropper.Win32.Delf.bl",
"Trojan.Win32.Delf.ffej",
"Dropper.Delf.972288",
"Troj.Dropper.W32.Delf.bl!c",
"TrojWare.Win32.TrojanDropper.Delf.BL",
"BackDoor.Acropolis.10",
"Dropper.Delf.Win32.1638",
"Trojan-Dropper.Win32.Delf",
"W32/Dropper.HL",
"TrojanDropper.Delf.cj",
"W32.Trojan.Dropper-Tetris",
"BDS/Acropolis.3",
"Trojan[Dropper]/Win32.Delf",
"Win32.Troj.Delf.bl.kcloud",
"Backdoor:Win32/Tetris.A",
"Trojan.Graftor.D2B929",
"Trojan-Dropper.Win32.Delf.bl",
"Win32/TrojanDropper.Delf.BL",
"Win32.Trojan-dropper.Delf.Efao",
"TrojanDropper.Delf!n6JtRIRZLjo",
"W32/Acrop.A!tr.bdr",
"Win32/Trojan.Dropper.605"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.ExpiroPC.PE",
"Backdoor.Win32.Nucleroot!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9750",
"Adware.Lop",
"Win32/Talpalk.C",
"Win.Trojan.Maha-2",
"Backdoor.Win32.Nucleroot.c",
"Trojan.Win32.Maha.gubp",
"Packer.W32.PePatch.l5Ml",
"Packed.Win32.Klone.~KE",
"Trojan.Maya",
"BehavesLike.Win32.Ipamor.ch",
"Trojan-Dropper.Delf",
"Backdoor/Nucleroot.fk",
"Trojan[PSW]/Win32.Maha",
"Backdoor.Win32.A.Nucleroot.130560",
"Backdoor.Win32.Nucleroot.c",
"PWS:Win32/Bividon.A",
"Backdoor.Nucleroot",
"W32/Nucleroot.C!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Earlier",
"this",
"year",
",",
"the",
"actor",
"used",
"“",
".pw",
"”",
"TLDs",
"while",
"the",
"Bank",
"Austria",
"scheme",
"highlighted",
"above",
"used",
"“",
".info",
"”",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Security",
"researchers",
"have",
"identified",
"and",
"identified",
"a",
"new",
"type",
"of",
"malware,",
"which",
"they",
"believe",
"is",
"being",
"developed",
"by",
"threat",
"actors",
"operating",
"from",
"North,",
"East",
"and",
"South-East",
"Asia,",
"and",
"is",
"capable",
"of",
"being",
"fully",
"undetectable."
] | [
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
2,
10,
16,
2,
10,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Trojan.Zbot",
"Backdoor.Win32.DarkKomet.zvj",
"Trojan.Win32.DarkKomet.dklzqc",
"Trojan-Dropper.Win32.Injector",
"Trojan[Backdoor]/Win32.DarkKomet",
"Trojan.MSIL.Krypt.3",
"Backdoor.Win32.DarkKomet.zvj",
"PWS:MSIL/Skonpri.A",
"Backdoor/Win32.DarkKomet.R90638",
"Backdoor.DarkKomet",
"Trj/CI.A",
"Trojan.Krypt!XrXGvmn0xR4",
"W32/DarkKomet.FZ!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"main",
"goal",
"of",
"the",
"xDedic",
"forum",
"is",
"to",
"facilitate",
"the",
"buying",
"and",
"selling",
"of",
"credentials",
"for",
"hacked",
"servers",
"which",
"are",
"available",
"through",
"RDP."
] | [
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
11,
5,
13,
16,
16,
16,
16,
5
] |
[
"This",
"report",
"is",
"the",
"first",
"to",
"detail",
"the",
"attack",
"against",
"strategic",
"US",
"interests",
"to",
"China."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
2,
16,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Archbomb.ZIP",
"Trojan-ArcBomb.ZIP.Bubl.b",
"Trojan.Zip.Arch-Bomb.yngkq",
"BehavesLike.Win32.Trojan.dh",
"Trojan.Archbomb",
"BOMB/ArcBomb.O",
"Trojan-ArcBomb.ZIP.Bubl.b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"threat",
"actors",
"registered",
"at",
"least",
"seven",
"subdomains",
"through",
"the",
"hosting",
"provider",
",",
"each",
"consisting",
"of",
"eight",
"random-looking",
"characters",
"(",
"asdfgjcr",
",",
"cacama18",
",",
"cacamadf",
",",
"konkonq2",
",",
"mmsmtsh5",
",",
"riveroer",
",",
"and",
"sdfkjhl2",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
1,
16,
1,
16,
1,
16,
1,
16,
1,
16,
16,
1,
16
] |
[
"The",
"abuse",
"of",
"shortcut",
"LNK",
"files",
"is",
"steadily",
"gaining",
"traction",
"among",
"cybercriminals."
] | [
16,
1,
16,
1,
9,
9,
16,
16,
16,
16,
16,
6
] |
[
"Initially,",
"we've",
"called",
"it",
"Matrix",
"Banker",
"based",
"on",
"its",
"command",
"and",
"control",
"C2",
"login",
"panel,",
"but",
"it",
"seems",
"that",
"Matrix",
"Admin",
"is",
"a",
"template",
"available",
"for",
"the",
"Bootstrap",
"web",
"framework."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
5,
13,
13,
13
] |
[
"Visually",
",",
"this",
"can",
"be",
"represented",
"as",
"follows",
":",
"Android",
"ID",
"When",
"combined",
"with",
"our",
"analysis",
"of",
"indexed",
"directories",
"on",
"C2",
"infrastructure",
",",
"we",
"were",
"able",
"to",
"easily",
"automate",
"the",
"generation",
"of",
"the",
"password",
"used",
"by",
"each",
"device",
"and",
",",
"in",
"turn",
",",
"successfully",
"decompress",
"all",
"exfiltrated",
"content",
"from",
"compromised",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32/Shuq.B",
"W32/Shuq.g",
"I-Worm.Shuq!TBLjXfxv+A8",
"W32.SillyFDC",
"Win32/Shuq.NAA",
"TROJ_ANGEL.F",
"Worm.Shuq.B",
"Email-Worm.Win32.Shuq.g",
"Trojan.Win32.Shuq.epjd",
"Trojan.Win32.S.HDC.66048[h]",
"W32.W.Shuq.g!c",
"Backdoor.Win32.Shuq.NAA",
"BackDoor.HSV.1013",
"Worm.Shuq.Win32.5",
"TROJ_ANGEL.F",
"W32/Risk.OPXF-7688",
"Worm/Sramota.aws",
"W32/ANGEL.G@mm",
"Worm[Email]/Win32.Shuq",
"Trojan/Win32.HDC",
"Backdoor:Win32/Shuq.A",
"Worm.Shuq",
"Win32.Worm-email.Shuq.Eerm",
"Email-Worm.Win32.Shuq",
"I-Worm/Shuqing.E"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Update",
"as",
"of",
"July",
"23",
",",
"2015",
"1:00",
"AM",
"PDT",
"(",
"UTC-7",
")",
"We",
"have",
"added",
"a",
"link",
"to",
"a",
"previous",
"report",
"discussing",
"this",
"threat",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Reasons",
"for",
"Taiwan",
"being",
"targeted",
"range",
"from",
"being",
"one",
"of",
"the",
"sovereign",
"states",
"of",
"the",
"disputed",
"South",
"China",
"Sea",
"region",
"to",
"its",
"emerging",
"economy",
"and",
"growth",
"with",
"Taiwan",
"being",
"one",
"of",
"the",
"most",
"innovative",
"countries",
"in",
"the",
"High-Tech",
"industry",
"in",
"Asia."
] | [
16,
16,
2,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
2,
10,
10,
10,
16,
16,
16,
16,
16,
16,
16,
2,
16,
16,
16,
16,
16,
16,
2,
16,
16,
4,
12,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm/W32.DipNet.139264",
"W32/DipNet.f",
"Trojan.Win32.DipNet.emkm",
"W32/Dipnet.F",
"Trojan.Netdepix.B",
"Win32/Dipnet.NAD",
"Net-Worm.Win32.DipNet.f",
"Worm.DipNet!vTuZ7jF3dLw",
"Worm.Win32.DipNet.139264[h]",
"W32.W.DipNet.f!c",
"Virus.Win32.Part.a",
"Worm.Win32.Dipnet.NAD",
"BackDoor.Xdoor.351",
"Worm.DipNet.Win32.8",
"BehavesLike.Win32.Trojan.ch",
"W32/Dipnet.XULH-0302",
"Worm/DipNet.a",
"WORM/DipNet.b",
"W32/Netdepix.B!worm",
"Worm[Net]/Win32.DipNet",
"Win32/Dipnet.worm.139264",
"Worm:Win32/DipNet.H",
"Win32/Oddbob.E",
"Net-Worm.DipNet",
"W32/Oddbob.E.worm",
"Backdoor.Win32.Xdoor",
"Worm/Dipnet.M",
"Worm.Win32.DipNet.aMVE"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"RECEIVE_SMS",
"-",
"allow",
"the",
"application",
"to",
"receive",
"text",
"messages",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.DL.VB.IHEW",
"Trojan-Spy.Win32.Bancos.alh!IK",
"Trojan-Downloader.Win32.VB.tbx",
"TR/Spy.65536.194",
"TSPY_ZBOT.SMDM",
"Trojan.Spy.65536.194",
"TrojanDownloader.VB.vhu",
"TrojanSpy:Win32/Bancos.KY",
"Trojan-Downloader.Win32.VB.tbx",
"Trojan-Spy.Win32.Bancos.alh"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"On",
"July",
"5,",
"2015",
"an",
"unknown",
"hacker",
"publicly",
"announced",
"on",
"Twitter",
"that",
"he",
"had",
"breached",
"the",
"internal",
"network",
"of",
"Hacking",
"Team",
"–",
"an",
"Italian",
"pentesting",
"company",
"known",
"to",
"purchase",
"0-day",
"exploits",
"and",
"produce",
"their",
"own",
"trojans."
] | [
16,
0,
8,
8,
16,
6,
14,
16,
16,
16,
4,
16,
16,
16,
1,
16,
1,
9,
16,
4,
12,
16,
16,
2,
4,
12,
16,
16,
16,
3,
11,
16,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader.Win32.Harnig!O",
"Win32.Trojan-Downloader.Harnig.cu",
"Trojan.Gobrena",
"TROJ_HARNIG.FC",
"Trojan-Downloader.Win32.Harnig.cu",
"Trojan.Win32.Harnig.dpsezu",
"PE:Trojan.DL.Tibs.fxl!1074175505",
"Trojan.DownLoader.13549",
"Downloader.Harnig.Win32.2",
"TROJ_HARNIG.FC",
"TrojanDownloader.Harnig.alh",
"TR/Dldr.Small.dib.6",
"Trojan[Downloader]/Win32.Harnig.cu",
"Win32.TrojDownloader.Harnig.co.kcloud",
"Trojan/Win32.Harnig",
"Trojan-Downloader.Revelation.Tibs.B",
"Trojan-Downloader.Win32.Harnig.cr",
"W32/Harnig.CU!tr.dldr",
"Downloader.Harnig.AP",
"Trojan.Win32.Harnig.Aj"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Receiver",
"was",
"involved",
"in",
"receiving",
"commands",
"from",
"the",
"Server",
"and",
"the",
"main",
"functionality",
"of",
"Sender",
"was",
"to",
"send",
"all",
"the",
"data",
"collected",
"to",
"the",
"C",
"&",
"C",
"over",
"Wi-Fi",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Every",
"one",
"of",
"these",
"campaigns",
"involved",
"a",
"Windows",
"version",
"of",
"Derusbi."
] | [
16,
16,
16,
16,
6,
16,
16,
5,
13,
16,
3
] |
[
"On",
"October",
"10,",
"2017,",
"Kaspersky",
"Lab's",
"advanced",
"exploit",
"prevention",
"systems",
"identified",
"a",
"new",
"Adobe",
"Flash",
"zero",
"day",
"exploit",
"used",
"in",
"the",
"wild",
"against",
"our",
"customers."
] | [
16,
0,
8,
8,
4,
12,
5,
13,
13,
13,
16,
16,
16,
7,
15,
15,
15,
3,
16,
16,
16,
16,
16,
16,
4
] |
[
"The",
"service",
"offers",
"a",
"binder",
"tool",
"that",
"allows",
"users",
"to",
"masquerade",
"their",
"malware",
"as",
"legitimate",
"software."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
1,
16,
3,
16,
1,
9
] |
[
"]",
"com",
"(",
"and",
"third-levels",
"of",
"this",
"domain",
")",
"www3.mefound",
"[",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"Malwarebytes",
"has",
"been",
"observing",
"a",
"surge",
"in",
"drive-by",
"download",
"attacks",
"since",
"the",
"recent",
"Flash",
"zero-day",
"now",
"patched."
] | [
4,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
7,
15,
16,
16
] |
[
"Android",
"remains",
"a",
"prime",
"target",
"for",
"malicious",
"attacks",
"."
] | [
5,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanAPT.BrowsPass.ST3",
"Trojan.MSIL.Ubibila.1",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"MSIL.Trojan.Pinject.A",
"Trojan-Dropper.Win32.Sysn.bgns",
"Trojan.Win32.MailPassView.dzxrgp",
"Tool.MailPassView.236",
"BehavesLike.Win32.Trojan.gc",
"Trojan.PSW.Fareit.te",
"TR/Dropper.MSIL.sbcsg",
"Trojan:MSIL/Golbla.B",
"Trojan-Dropper.Win32.Sysn.bgns",
"Trojan/Win32.Golbla.C1246680",
"Trj/CI.A",
"Win32.Trojan-dropper.Sysn.Akyi",
"Trojan.Inject",
"MSIL/Injector.MRD!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.AutorunXjyv.Worm",
"Trojan.Dropper.VIO",
"Trojan/W32.Chydo.569344.E",
"Trojan.KillAv.DR",
"Trojan.Chydo",
"Win32.Worm.Autorun.j",
"Win32/Pykspa.C",
"WORM_MESSEN.SMF",
"Trojan.Dropper.VIO",
"Worm.Win32.AutoRun.iea",
"Trojan.Dropper.VIO",
"Trojan.Win32.Chydo.eahreo",
"Trojan.Win32.Chydo.516096.B",
"Trojan.Dropper.VIO",
"Trojan.MulDrop5.14836",
"Worm.AutoRun.Win32.116380",
"WORM_MESSEN.SMF",
"BehavesLike.Win32.Backdoor.hc",
"Trojan/Chydo.bj",
"Trojan.Dropper.VIO",
"Worm.Win32.AutoRun.iea",
"TrojanDropper:Win32/Pykspa.A",
"Trojan/Win32.Chydo.R40147",
"Trojan.Dropper.VIO",
"Trojan.Chydo",
"Trojan.Win32.FakeAlert.ate",
"Trojan.Win32.KillAV.Y"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"this",
"post,",
"we",
"will",
"be",
"pulling",
"apart",
"and",
"dissecting",
"the",
"Rambo",
"backdoor",
"and",
"discussing",
"several",
"of",
"its",
"evasion",
"techniques."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16
] |
[
"DarkKomet",
"variant,",
"often",
"dropped",
"as",
"patcher.exe"
] | [
3,
11,
16,
16,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clodee5.Trojan.2bfc",
"Trojan.Proxy.Wopla.Q",
"Trojan-Proxy/W32.Wopla.20992.D",
"Trojan.Wopla.Win32.59",
"Trojan/Proxy.Wopla.q",
"Trojan.PR.Wopla!heGrkrdKLNg",
"Trojan.Tannick.B",
"Win32/Pokier.V",
"TSPY_WOPLA.Q",
"Trojan.Proxy.Wopla.Q",
"Trojan-Proxy.Win32.Wopla.q",
"Trojan.Proxy.Wopla.Q",
"Trojan.Win32.Wopla.csuaej",
"PE:Trojan.Proxy.Wopla.ay!100004534",
"Trojan.Proxy.Wopla.Q",
"TrojWare.Win32.TrojanDownloader.Small.AA",
"Trojan.Proxy.Wopla.Q",
"TSPY_WOPLA.Q",
"BehavesLike.Win32.Downloader.mc",
"W32/Trojan.AXS",
"TrojanProxy.Wopla.d",
"TR/Proxy.Wopla.Q.4",
"Win32.Troj.Wopla.q.kcloud",
"Trojan.Proxy.Wopla.Q",
"Win-Trojan/Wopla.20992",
"TrojanProxy.Wopla",
"Trj/Alpiok.A",
"Trojan-Proxy.Win32.Wopla.Q",
"Multidr.J!tr",
"Proxy.BKA.dropper",
"Trojan.Win32.Wopla.AdJ"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"rapidly",
"determined",
"that",
"this",
"spam",
"campaign",
"was",
"attempting",
"to",
"broadly",
"deliver",
"TeslaCrypt",
"4.1A",
"to",
"individuals."
] | [
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
3,
11,
16,
4
] |
[
"The",
"red",
"fields",
"are",
"used",
"as",
"the",
"shortcode",
"and",
"keyword",
"for",
"SMS",
"billing",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"appears",
"to",
"be",
"necessary",
"to",
"determine",
"the",
"number",
"of",
"banks",
"the",
"victim",
"may",
"use",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"FireEye",
"Threat",
"Intelligence",
"analysts",
"identified",
"a",
"spear",
"phishing",
"campaign",
"carried",
"out",
"in",
"August",
"2015",
"targeting",
"Hong",
"Kong-based",
"media",
"organizations."
] | [
4,
12,
12,
16,
16,
16,
6,
14,
14,
16,
16,
16,
0,
8,
16,
2,
10,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"DoS.Small",
"W32/VirTool.OH",
"Bloodhound.W32.EP",
"DoS.Win32.Small.e",
"Trojan.Win32.Small.dosb",
"Flooder.Upsend",
"W32/Tool.GNXW-3960",
"DoS.Small.c",
"HackTool[DoS]/Win32.Small",
"DoS:Win32/Small.E",
"DoS.Win32.Small.e",
"DoS.Small",
"Win32.Trojan.Small.Lnoh",
"DoS.Win32.Small",
"W32/Small.E!dos"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Code",
"snippet",
"showing",
"GolfSpy",
"generating",
"UUID",
"The",
"value",
"of",
"%",
"is",
"in",
"the",
"range",
"of",
"1-9",
"or",
"a-j",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.UsernameReimuatH.Trojan",
"Worm/W32.WBNA.294912.AU",
"Trojan.Win32.Diple!O",
"Trojan.Beebone.D",
"Trojan/VBObfus.fz",
"Win32.Worm.Pronny.d",
"Win32/VB.KXfdHDB",
"WORM_VOBFUS.SM37",
"Win.Packer.VBCrypt-5731517-0",
"Worm.Win32.Vobfus.erof",
"Trojan.Win32.Vobfus.enwdjc",
"Win32.Worm.Vobfus.Wvay",
"Win32.HLLW.Autoruner2.18084",
"WORM_VOBFUS.SM37",
"BehavesLike.Win32.Autorun.dh",
"Win32.Virut.ce.57344",
"Trojan.Symmi.D13A73",
"Trojan.Win32.A.Diple.299008.BAT",
"Worm.Win32.Vobfus.erof",
"Worm/Win32.WBNA.R108353",
"TScope.Trojan.VB",
"Worm.Win32.Vobfus"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"source",
"process",
"tries",
"to",
"determine",
"the",
"location",
"of",
"dlopen",
",",
"dlsym",
",",
"and",
"dlclose",
"functions",
"in",
"the",
"target",
"process",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"capabilities",
"remained",
"unchanged",
",",
"but",
"a",
"new",
"endpoint",
"was",
"added",
"to",
"the",
"Trojan",
"C2",
"allowing",
"it",
"to",
"handle",
"the",
"generic",
"card",
"grabber",
"overlay",
"and",
"specific",
"target",
"overlays",
"(",
"banking",
"apps",
")",
"separately",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Once",
"OSX/Dok",
"infection",
"is",
"complete,",
"the",
"attackers",
"gain",
"complete",
"access",
"to",
"all",
"victim",
"communication,",
"including",
"communication",
"encrypted",
"by",
"SSL."
] | [
16,
3,
16,
16,
16,
16,
6,
1,
9,
9,
16,
16,
1,
9,
9,
9,
9,
9,
9
] |
[
"By",
"going",
"on",
"the",
"offensive",
"and",
"hunting",
"the",
"attackers",
",",
"our",
"team",
"was",
"able",
"to",
"unearth",
"the",
"early",
"stages",
"of",
"what",
"may",
"be",
"a",
"very",
"dangerous",
"mobile",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Once",
"in",
"the",
"live",
"session,",
"if",
"there",
"is",
"a",
"file",
"in",
"/var/lib/man.cy,",
"then",
"this",
"is",
"an",
"infected",
"ISO."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
3,
11
] |
[
"At",
"a",
"high",
"level,",
"Romberik",
"is",
"a",
"complex",
"piece",
"of",
"malware",
"that",
"is",
"designed",
"to",
"hook",
"into",
"the",
"user's",
"browser",
"to",
"read",
"credentials",
"and",
"other",
"sensitive",
"information",
"for",
"exfiltration",
"to",
"an",
"attacker",
"controlled",
"server,",
"similar",
"to",
"Dyre."
] | [
3,
16,
16,
16,
3,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
1,
9,
9,
9,
9,
16,
1,
9,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-PWS/W32.Avisa.69632",
"Trojan-PSW.Win32!O",
"W32/Inttest.worm",
"PWS-Inttest.B",
"TROJ_AVISA.B",
"Win32.Trojan.WisdomEyes.16070401.9500.9757",
"W32/Risk.CNKX-3667",
"Infostealer.Avisa",
"Win32/PSW.Cript.B",
"Trojan-PSW.Win32.Deintel",
"Trojan.Win32.Avisa-Psw.fdrj",
"Trojan.Win32.Avisa.69632",
"Trojan.Avisa.Win32.2",
"BehavesLike.Win32.PJTbinder.km",
"Worm.Pws.Inttest",
"Trojan/PSW.Avisa",
"Trojan[PSW]/Win32.Deintel",
"Trojan-PSW.Win32.Deintel",
"Trojan/Win32.HDC.C89238",
"TrojanPSW.Deintel",
"Trj/PSW.Intetest",
"Win32/PSW.Avisa.A",
"Win32.Trojan-qqpass.Qqrob.Sxoe",
"Trojan.PSW.Avisa",
"W32/Avisa.A!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"new",
"mobile",
"ransomware",
"variant",
"is",
"an",
"important",
"discovery",
"because",
"the",
"malware",
"exhibits",
"behaviors",
"that",
"have",
"not",
"been",
"seen",
"before",
"and",
"could",
"open",
"doors",
"for",
"other",
"malware",
"to",
"follow",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"To",
"maximize",
"profit",
",",
"variants",
"with",
"“",
"MinSDK",
"”",
"or",
"“",
"OTA",
"”",
"SDK",
"are",
"present",
"to",
"further",
"infect",
"victims",
"with",
"other",
"adware",
"families",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Related",
"insfrastructure",
"shows",
"another",
"suspicious",
"looking",
"domain",
"that",
"mimics",
"the",
"Court",
"of",
"Arbitration",
"for",
"Sport"
] | [
16,
5,
16,
16,
16,
16,
1,
16,
16,
4,
12,
12,
12,
12,
12
] |
[
"Their",
"primary",
"interest",
"appears",
"to",
"be",
"gathering",
"intelligence",
"related",
"to",
"foreign",
"and",
"security",
"policy",
"in",
"the",
"Eastern",
"Europe",
"and",
"South",
"Caucasus",
"regions."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
4,
12,
16,
2,
10,
10,
16,
2,
10,
10
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Backdoor.Bifrose",
"Trojan.Win32.Small.cup",
"Trojan.Win32.Buzus.rbpz",
"Trojan.Win32.Buzus.86895",
"Trojan.MulDrop.18143",
"BehavesLike.Win32.Backdoor.hc",
"Trojan/Buzus.fcx",
"Virus.Trojan.Win32.Buzus.acj",
"W32/Trojan2.AGMZ",
"Trojan/Buzus.cf",
"TrojanDropper:Win32/Buzus.B",
"W32.W.Ridnu.ls5O",
"Trojan.Win32.Small.cup",
"Trojan/Win32.Buzus.C71809",
"Trojan.Buzus",
"W32/Kryptix.KZB!tr",
"Win32/Trojan.6a2"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.771B",
"Ransom.Cerber.A4",
"Ransom.Cerber",
"Trojan.Symmi.D13E52",
"Ransom_HPCERBER.SM3",
"Win32.Trojan.Kryptik.avs",
"Ransom_HPCERBER.SM3",
"Trojan-Ransom.Win32.Rack.hly",
"Trojan.Win32.Rack.evkhfe",
"Trojan.Encoder.761",
"BehavesLike.Win32.Ransomware.gh",
"Ransom.Win32.Teerac",
"Trojan.Rack.dk",
"Trojan-Ransom.Win32.Rack.hly",
"Trojan.Menti",
"Trj/GdSda.A",
"W32/Kryptik.FSUS!tr",
"Win32/Trojan.Ransom.7c1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Coronavirus",
"Update",
"App",
"Leads",
"to",
"Project",
"Spy",
"Android",
"and",
"iOS",
"Spyware",
"We",
"discovered",
"a",
"cyberespionage",
"campaign",
"we",
"have",
"named",
"Project",
"Spy",
"infecting",
"Android",
"and",
"iOS",
"devices",
"with",
"spyware",
"by",
"using",
"the",
"coronavirus",
"disease",
"(",
"Covid-19",
")",
"as",
"a",
"lure",
"."
] | [
5,
13,
13,
16,
16,
3,
11,
5,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
5,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"addition",
"to",
"the",
"feature",
"base",
"it",
"already",
"possesses",
"and",
"the",
"money",
"that",
"can",
"be",
"made",
"from",
"the",
"rental",
",",
"it",
"could",
"evolve",
"to",
"compete",
"with",
"the",
"mightiest",
"Android",
"banking",
"Trojans",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16
] |
[
"For",
"example",
",",
"the",
"botnet",
"Trojan-SMS.AndroidOS.Opfake.a",
",",
"in",
"addition",
"to",
"its",
"own",
"activity",
",",
"also",
"spread",
"Backdoor.AndroidOS.Obad.a",
"by",
"sending",
"spam",
"containing",
"a",
"link",
"to",
"the",
"malware",
"to",
"the",
"victim",
"’",
"s",
"list",
"of",
"contacts",
"."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader.Yafive.A.mue",
"Win32.Trojan.WisdomEyes.16070401.9500.9991",
"Trojan-Downloader.Win32.QQHelper.air",
"Troj.Spy.W32.Zbot.kYVW",
"TrojWare.Win32.TrojanDownloader.Tiny.~CA",
"BackDoor.Update.293",
"Win32.Hack.XComp.a.410674",
"TrojanDownloader:Win32/Yafive.A",
"Trojan-Downloader.Win32.QQHelper.air",
"TrojanDownloader.QQHelper",
"Trojan-Downloader.Win32.QQHelper"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Malware",
"Features",
"Android",
"According",
"to",
"the",
"observed",
"samples",
"and",
"their",
"signatures",
",",
"early",
"versions",
"of",
"this",
"Android",
"malware",
"were",
"developed",
"by",
"the",
"end",
"of",
"2014",
"and",
"the",
"campaign",
"has",
"remained",
"active",
"ever",
"since",
"."
] | [
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"recently",
"resurfaced",
"in",
"November",
"2016",
"W32.Disttrack.B,",
"again",
"attacking",
"targets",
"in",
"Saudi",
"Arabia."
] | [
16,
16,
16,
16,
0,
8,
1,
16,
16,
16,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Yodo.A@mm",
"Worm/W32.Yodo.1273856",
"W32/Yodo.a",
"Win32.Yodo.E90817",
"WORM_YODO.F",
"W32.Yodo@mm",
"Win32/Yodo.D",
"WORM_YODO.F",
"Win32.Yodo.A@mm",
"Email-Worm.Win32.Yodo.a",
"Win32.Yodo.A@mm",
"Trojan.Win32.Yodo.bdnumu",
"W32.W.Yodo.a!c",
"Win32.Yodo.A@mm",
"Worm.Win32.Yodo.B.Dropper",
"Win32.Yodo.A@mm",
"Trojan.MulDrop.572",
"Worm.Yodo.Win32.1",
"BehavesLike.Win32.VBObfus.tm",
"W32/Risk.OQBD-6759",
"Worm/Yodo.b",
"Worm:Win32/Yodo.B.dr",
"WORM/Yodo.A.1",
"Worm[Email]/Win32.Yodo",
"Worm.Yodo.a.kcloud",
"Worm:Win32/Yodo.B.dr",
"Email-Worm.Win32.Yodo.a",
"Worm.Yodo",
"Win32/Yodo.B.Dropper",
"Win32.Worm-email.Yodo.Eddu",
"I-Worm.Yodo!uEen0717POE",
"W32/Yodo.A!worm",
"Win32/Worm.bde"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"don't",
"have",
"the",
"statistics",
"of",
"devices",
"vulnerable",
"to",
"both",
"issues",
"at",
"the",
"same",
"time."
] | [
16,
16,
16,
16,
16,
16,
7,
15,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Krypt.8",
"TROJ_TDSS.SMA",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TROJ_TDSS.SMA",
"Packed.Win32.TDSS.aa",
"Trojan.Win32.Tdss.btyvr",
"Win32.PkdTdss",
"Trojan.Packed.2936",
"BehavesLike.Win32.Adware.kc",
"TrojanDropper:Win32/Sudiet.A",
"Packer.W32.Tdss!c",
"Packed.Win32.TDSS.aa",
"Trojan/Win32.ADH.R21764",
"Trojan.TDSS.01414",
"Win32.Packed.Tdss.Akox",
"Packer.Win32.Tdss",
"W32/PackTDss.K!tr",
"Win32/Trojan.5b8"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"But",
"Dvmap",
"is",
"very",
"special",
"rooting",
"malware",
"."
] | [
16,
3,
16,
16,
16,
16,
16,
16
] |
[
"Potential",
"targets",
"The",
"actors",
"behind",
"FrozenCell",
"used",
"an",
"online",
"service",
"that",
"geolocates",
"mobile",
"devices",
"based",
"on",
"nearby",
"cell",
"towers",
"to",
"track",
"targets",
"."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Worm.Bundpil.d",
"Win32.Worm.Resparc.B",
"Trojan:Win32/Lodbak.A",
"Trojan/Win32.Lodbak.R151670",
"Trj/Gamarue.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"Intrusions",
"began",
"as",
"early",
"as",
"1996."
] | [
1,
16,
16,
16,
16,
0
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Scrop.exbmlp",
"BehavesLike.Win32.AdwareConvertAd.fh",
"W32/Trojan.YEZU-6096",
"TrojanDropper.Scrop.ns",
"Trojan[Dropper]/Win32.Scrop",
"Backdoor:Win32/Blopod.A!bit",
"Trojan.Symmi.D13661",
"Dropper/Win32.Scrop.C2319178",
"TrojanDropper.Scrop",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Data",
"is",
"eventually",
"exfiltrated",
"over",
"a",
"TLS",
"connection",
"to",
"the",
"Command",
"&",
"Control",
"server",
"ws.my-local-weather",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Netstop.A",
"Backdoor.Padmin",
"Backdoor.W32.Padmin.08!c",
"Trojan/wGet.d",
"Backdoor.Padmin.0.8",
"W32/Risk.LANR-3940",
"Win.Trojan.Padmin-2",
"Backdoor.Padmin.0.8",
"Trojan.Netstop.A",
"Trojan.Win32.Padmin.dyyica",
"Backdoor.Win32.Padmin.08",
"Trojan.Netstop.A",
"BackDoor-ATM.dr",
"Backdoor/Padmin.08.Install",
"DR/Padmin.08",
"BackDoor-ATM.dr",
"Backdoor.Padmin",
"Bck/Iroffer.BG",
"Win32/Padmin.08.A.dropper",
"W32/Padmin.A!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Adware.Heur.cmSfNKMeS5mk",
"WORM_AMBLER.SMI",
"Win32.Trojan.WisdomEyes.16070401.9500.9938",
"WORM_AMBLER.SMI",
"Trojan.Win32.BHO.bmciwr",
"Trojan.PWS.Finanz.origin",
"W32/Ambler.dll",
"TrojanDownloader:Win32/BHO.A",
"TrojanDownloader.BHO",
"Trj/CI.A",
"Win32.Trojan.Spy.Hrza",
"TrojanSpy.Banker!l0YgZsorMww",
"Trojan-Spy.Finanz.J",
"W32/Ambler.A!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"app",
"then",
"continues",
"to",
"run",
"in",
"the",
"background",
"without",
"the",
"user",
"’",
"s",
"knowledge",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"new",
"report",
"is",
"an",
"updated",
"dissection",
"of",
"the",
"group's",
"attacks",
"and",
"methodologies—something",
"to",
"help",
"organizations",
"gain",
"a",
"more",
"comprehensive",
"and",
"current",
"view",
"of",
"these",
"processes",
"and",
"what",
"can",
"be",
"done",
"to",
"defend",
"against",
"them."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
1,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"email",
"messages",
"used",
"in",
"the",
"attacks",
"leverage",
"themes",
"related",
"to",
"economic",
"development",
"and",
"politics",
"in",
"Burma,",
"which",
"is",
"relevant",
"to",
"the",
"work",
"of",
"the",
"NGO."
] | [
16,
1,
9,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
16,
1,
16,
2,
16,
16,
16,
16,
16,
16,
16,
16,
4
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan:Win32/Vareids.A",
"Trojan.FakeAV"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.VBKrypt!O",
"Worm.Rebhip.B3",
"Troj.W32.Scar!c",
"Trojan/Injector.eyu",
"Trojan.Win32.Scar.odxb",
"Trojan.Win32.VBKrypt.ecjqdh",
"Trojan.Win32.A.VBKrypt.200710",
"TrojWare.Win32.VBKrypt.cjb",
"Trojan.Inject.27856",
"Trojan.VBKrypt.Win32.39868",
"BehavesLike.Win32.PWSSpyeye.cc",
"W32/Trojan.FNVH-2986",
"Trojan/VBKrypt.bgwm",
"Trojan/Win32.VBKrypt",
"Trojan.ManBat.1",
"Trojan.Win32.Scar.odxb",
"Trojan/Win32.VBKrypt.C66955",
"PWS-Spyeye.el",
"SScope.Malware-Cryptor.VBCR.1841",
"Win32.Trojan.Scar.Tccd",
"Trojan.VBKrypt!joEshOiwspo",
"Win32/Trojan.00c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/VB.qtt",
"Backdoor.Win32.Sdbot.aeua",
"Trojan.Win32.Nifclop.bbwtga",
"Trojan.DownLoader6.34031",
"TR/Nifclop.A.6",
"Trojan:Win32/Nifclop.A",
"Backdoor.Win32.Sdbot.aeua",
"Win32/VB.QTT",
"Trojan.Win32.Nifclop",
"Win32/Trojan.fdb"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"During",
"the",
"last",
"few",
"days,",
"we",
"have",
"observed",
"a",
"campaign",
"redirecting",
"visitors",
"from",
"large",
"websites",
"to",
"the",
"Angler",
"EK."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
1,
9,
16,
16,
3,
11
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.