tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"But",
"our",
"researchers",
"have",
"predicted",
"that",
"these",
"small",
"Trojans",
"would",
"certainly",
"be",
"used",
"to",
"download",
"some",
"really",
"bad",
"malware",
"that",
"can",
"actually",
"harm",
"the",
"owners",
"of",
"the",
"infected",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader.Win32.Gamarue.2!O",
"TrojanDropper.Dexel.A5",
"Trojan.Blocker.Win32.18819",
"WORM_DEXEL.SM",
"Win32.Trojan.WisdomEyes.16070401.9500.9869",
"W32/Autorun.LWDQ-2252",
"W32.SillyFDC",
"Win32/Dapato.AY",
"WORM_DEXEL.SM",
"Trojan.Win32.Blocker.dbnfux",
"Troj.Dropper.W32.FrauDrop.tnsr",
"BehavesLike.Win32.Trojan.fh",
"W32/Autorun.ABG",
"TrojanDropper.Dapato.pgs",
"Trojan[Dropper]/Win32.Dapato",
"TrojanDropper:Win32/Dexel.A",
"Trojan.Zusy.D26D16",
"Win32.Trojan.Dapato.B",
"HEUR/Fakon.mwf",
"TrojanDropper.FrauDrop",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Threat",
"actors",
"can",
"register",
"subdomains",
"through",
"the",
"hosting",
"provider",
"and",
"use",
"the",
"provider",
"β",
"s",
"services",
"for",
"a",
"short-period",
"campaign",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.SvchostVS.Trojan",
"Worm.Moarider",
"Trojan/Autoit.nlq",
"Win32.Trojan.AutoIt.a",
"Bloodhound.Malautoit",
"WORM_SOHANAD_EH110001.UVPC",
"Trojan.Win32.Autoit.aza",
"Trojan.Script.AutoIt.dbycya",
"Troj.W32.Autoit.lWNh",
"TrojWare.Win32.Autoit.AZA",
"Trojan.DownLoader19.27399",
"WORM_SOHANAD_EH110001.UVPC",
"BehavesLike.Win32.Comame.fc",
"Trojan.Win32.Autoit",
"TR/BAS.Samca.1188111",
"Trojan:Win32/Svhoder.A",
"Trojan.Heur.E6CE86",
"Trojan.Win32.Autoit.aza",
"HEUR/Fakon.mwf",
"Trojan.Autoit.Wirus",
"Trojan.Autoit.NLQ",
"Win32/Autoit.NLQ",
"W32/Autoit.NLQ!tr",
"W32/Sality.AH"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Summary",
"PHA",
"authors",
"go",
"to",
"great",
"lengths",
"to",
"come",
"up",
"with",
"increasingly",
"clever",
"ways",
"to",
"monetize",
"their",
"apps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"com/gate_cb8a5aea1ab302f0_c",
"online",
"185.158.248",
"[",
"."
] | [
9,
9,
16,
1,
9,
9
] |
[
"This",
"infection",
"is",
"based",
"on",
"previously",
"reported",
"Gozi",
"ISFB/Ursnif",
"activity",
"from",
"March",
"6,",
"2023."
] | [
16,
3,
16,
16,
16,
16,
16,
6,
14,
16,
16,
0,
8,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"PUP.Optional.BrSoftware",
"Trojan.ADH",
"Trojan-Banker.Win32.Lohmys.a",
"Application.Win32.Midia.BR",
"MalSign.Skodna.BRS",
"Adware.Win32.Midia.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"The",
"majority",
"of",
"droppers",
"in",
"9Apps",
"are",
"games",
",",
"while",
"the",
"rest",
"fall",
"into",
"categories",
"of",
"adult",
"entertainment",
",",
"media",
"player",
",",
"photo",
"utilities",
",",
"and",
"system",
"utilities",
"."
] | [
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"is",
"designed",
"to",
"steal",
"money",
"from",
"unsuspecting",
"victims",
"right",
"off",
"their",
"bank",
"accounts",
"without",
"them",
"even",
"noticing."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9866",
"W32/Trojan.IKAJ-5854",
"Infostealer.Banker.C",
"Win32/Kollah.MWH",
"Trojan.JarDrop.1",
"W32.Trojan.Dropper",
"TR/Spy.ZBot.aww",
"TrojanDropper:Win32/Jazuz.A",
"Win32/Trojan.Spy.d85"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Indicators",
"about",
"some",
"panels",
"hosting",
"the",
"DDoS",
"Blue",
"Botnet"
] | [
1,
16,
16,
16,
16,
16,
3,
11,
11
] |
[
"]",
"com",
"hxxp",
":",
"//nttdocomo-qaw",
"[",
"."
] | [
9,
9,
1,
9,
9,
9,
9
] |
[
"The",
"utility",
"can",
"be",
"installed",
"on",
"smartphones",
"and",
"tablets",
"as",
"a",
"program",
"named",
"Insta",
"Plus,",
"Profile",
"Checker,",
"and",
"Cleaner",
"Pro."
] | [
16,
16,
16,
16,
16,
16,
5,
16,
5,
16,
16,
1,
16,
1,
9,
9,
9,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Minnerchek",
"Trojan.Win32.S.Downloader.31046816",
"Trojan.Win32.Minnerchek",
"Adware.Installcore",
"Trojan:Win32/Minnerchek.A",
"Dropper/Win32.CoinMiner.C2322242",
"Trj/Downloader.MEP"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"sux",
"library",
"appears",
"to",
"be",
"a",
"customized",
"super",
"user",
"(",
"su",
")",
"tool",
"that",
"includes",
"code",
"from",
"the",
"com.koushikdutta.superuser",
"app",
"and",
"carries",
"the",
"equivalent",
"of",
"a",
"super",
"user",
"(",
"su",
")",
"binary",
"in",
"order",
"to",
"run",
"privileged",
"commands",
"on",
"the",
"system",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"opens",
"the",
"URLs",
"using",
"the",
"user",
"agent",
"that",
"imitates",
"a",
"PC",
"browser",
"in",
"a",
"hidden",
"webpage",
"and",
"receives",
"a",
"redirection",
"to",
"another",
"website",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAdware.689E",
"PUP.Firseria/Variant",
"Trojan.Application.Bundler.Morstar.30",
"Trojan.Dropper",
"Win32/Tnega.ZRdFDZD",
"Win.Adware.Morstar-136",
"not-a-virus:Downloader.Win32.Morstar.dhp",
"Trojan.Win32.Morstar.dmuxrd",
"Adware.Win32.Firseria.b",
"Trojan.DownLoader11.57090",
"AdWare/Solimba.h",
"RiskWare[Downloader]/Win32.Morstar",
"TrojanDropper:Win32/Sventore.C",
"not-a-virus:Downloader.Win32.Morstar.dhp",
"Win32.Application.Morstar.E",
"PUP/Win32.Solimba.R133806",
"PUP.Optional.Firseria",
"PUA.Downloader!",
"AdWare.BundleApp",
"Win32/Application.164"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Kazy.D4E7E3",
"Win32.Trojan.WisdomEyes.16070401.9500.9858",
"Trojan.Win32.CFI.eurnzt",
"Trojan.Win32.Z.Kazy.253952.EN",
"TrojWare.Win32.FraudPack.P",
"Trojan.Click2.54806",
"W32/Trojan.JQCG-7679",
"PWS:Win32/Reteged.B",
"TrojanSpy.Dibik",
"Trojan-Spy.Reteged",
"Adware/Win32.180solutions.BM"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win32.Mlw.ewmnqj",
"W32/Trojan.MKOX-6072",
"TR/Dropper.MSIL.citga",
"Trj/CI.A",
"Win32/Trojan.5e4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Cyn.18944.B",
"Backdoor.Cyn",
"Email-Worm.Win32.GOPworm.196",
"BKDR_CYN.C",
"Backdoor.Trojan",
"BKDR_CYN.C",
"Backdoor.Win32.Cyn.12.a",
"Trojan.Win32.Cyn.dotopq",
"Backdoor.Win32.Cyn_12.EditSvr",
"BackDoor.Cyn.12",
"Trojan.Cyn.Win32.1",
"BehavesLike.Win32.Trojan.lh",
"W32/Risk.EBIW-7264",
"Backdoor/Cyn.f",
"BDC/Cyn.12.A.EdS",
"Backdoor:Win32/Cyn.1_02",
"Backdoor.Win32.Cyn.12.a",
"Win-Trojan/Cyn_v12.18944",
"Email-Worm.Win32.GOPworm.196",
"SScope.Trojan.VBRA.3344",
"Bck/Cyn.12",
"Win32/Cyn.12",
"Backdoor.Cyn!pLjU0MDAXWM",
"W32/Cyn.12!tr.bdr",
"Win32/Backdoor.ac7"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Code",
"snippets",
"showing",
"how",
"GolfSpy",
"monitors",
"phone",
"calls",
"via",
"register",
"receiver",
"(",
"top",
"left",
")",
",",
"its",
"actions",
"when",
"the",
"device",
"is",
"woken",
"up",
"(",
"top",
"right",
")",
",",
"and",
"how",
"it",
"encrypts",
"the",
"stolen",
"data",
"(",
"bottom",
")",
"The",
"malware",
"retrieves",
"commands",
"from",
"the",
"C",
"&",
"C",
"server",
"via",
"HTTP",
",",
"and",
"attackers",
"can",
"steal",
"specific",
"files",
"on",
"the",
"infected",
"device",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom.Exxroute.A3",
"Ransom.Cerber",
"Win32.Trojan.Kryptik.bjk",
"Ransom_CERBER.SM37",
"Win.Ransomware.Cerber-6162277-0",
"Trojan.Win32.Zerber.eltxmx",
"Troj.Ransom.W32.Zerber.toho",
"Trojan.DownLoader23.53130",
"Trojan.Kryptik.Win32.1113485",
"Ransom_CERBER.SM37",
"BehavesLike.Win32.Ransom.kh",
"Trojan.Zerber.atr",
"Backdoor:Win32/Crugup.B",
"W32/Kryptik.FOLJ!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Typically,",
"these",
"campaigns",
"leverage",
"spear",
"phishing",
"as",
"the",
"delivery",
"vector",
"and",
"often",
"include",
"malicious",
"attachments",
"designed",
"to",
"bypass",
"typical",
"detection",
"controls."
] | [
16,
16,
6,
16,
1,
9,
16,
16,
1,
9,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.BackdoorKasidetAF.Trojan",
"Backdoor/W32.Kasidet.87040",
"Trojan.Dynamer.20568",
"Backdoor.W32.Kasidet.tnrA",
"BKDR_NEUTRINO.SM",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Kasidet.J",
"BKDR_NEUTRINO.SM",
"Backdoor.Win32.Kasidet.bgo",
"Trojan.Win32.Kasidet.dpmgpp",
"Worm.Win32.Kasidet.CAK",
"BackDoor.Neutrino.19",
"Backdoor.Kasidet.Win32.519",
"BehavesLike.Win32.TrojanShifu.mh",
"Worm.Win32.Kasidet",
"W32/Kasidet.INNN-8495",
"Backdoor/Kasidet.by",
"TR/Hijacker.ldiu",
"Trojan[Backdoor]/Win32.Kasidet",
"Backdoor:Win32/Kasidet.C",
"Backdoor.Win32.Kasidet.bgo",
"Trojan/Win32.Dynamer.R156738",
"Backdoor.Kasidet",
"Spyware.PasswordStealer",
"Win32/Kasidet.AB",
"Win32.Backdoor.Kasidet.Phgi",
"Win32/Trojan.cd8"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9978",
"Trojan.Win32.Infospy.everjh",
"Trojan.Infospy.13",
"BehavesLike.Win32.FakeAlert.lh",
"Trojan-Dropper.Win32.Jscrpt",
"W32.Trojan.Emotet",
"TrojanDropper:Win32/Jscrpt.A!bit",
"Trj/CI.A",
"Win32/Trojan.f75"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Country",
"selection",
"The",
"administration",
"console",
"screenshots",
"also",
"show",
"the",
"ability",
"to",
"filter",
"the",
"results",
"by",
"country",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"However",
"it",
"β",
"s",
"unclear",
"whether",
"organizations",
"that",
"later",
"reported",
"on",
"ViperRAT",
"performed",
"their",
"own",
"independent",
"research",
"or",
"simply",
"based",
"their",
"content",
"on",
"the",
"original",
"Israeli",
"report",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"So",
"I",
"think",
"that",
"the",
"authors",
"are",
"still",
"testing",
"this",
"malware",
",",
"because",
"they",
"use",
"some",
"techniques",
"which",
"can",
"break",
"the",
"infected",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"agent",
"has",
"two",
"core",
"modules",
",",
"the",
"Evidence",
"Collector",
"and",
"the",
"Event",
"Action",
"Trigger",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Overlapping",
"Infrastructure",
"with",
"eSurv",
"Surveillance",
"Cameras",
"The",
"Command",
"&",
"Control",
"domain",
"configured",
"in",
"several",
"of",
"the",
"malicious",
"applications",
"found",
"on",
"Google",
"Play",
"Store",
",",
"ws.my-local-weather",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
1,
9,
9
] |
[
"The",
"overall",
"image",
"of",
"these",
"ties",
"is",
"below",
"in",
"Figure",
"5",
"and",
"paints",
"a",
"picture",
"of",
"an",
"adversary",
"with",
"at",
"least",
"5",
"malware",
"families",
"in",
"their",
"toolbox",
"dating",
"back",
"to",
"at",
"least",
"2015",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"He",
"matched",
"both",
"PDB",
"paths",
"as",
"wel",
"as",
"behaviour",
"to",
"these",
"samples,",
"this",
"blog",
"describes",
"the",
"changed",
"made",
"to",
"CryptoApp",
"as",
"well",
"as",
"the",
"active",
"campaign."
] | [
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
6,
14,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojanpws.Tepfer",
"Trojan-PSW.Win32.Tepfer.psxgjz",
"Troj.Psw.W32.Tepfer!c",
"Trojan.MSIL.Crypt",
"TR/Dropper.MSIL.273998",
"Trojan-PSW.Win32.Tepfer.psxgjz",
"Trojan:Win32/Matta.A!gfc",
"TrojanPSW.Tepfer",
"Trj/GdSda.A",
"Win32.Trojan.Falsesign.Agbe",
"MSIL/Injector.ONL!tr",
"Win32/Trojan.Dropper.28b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"PowerShell/Rozena.AF",
"BehavesLike.Win64.Dropper.cc",
"Trojan/Scar.bmid"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.RSM.2.0",
"Backdoor/W32.RSM.204800",
"Backdoor.RSM",
"Backdoor.RSM.2.0",
"Backdoor.RSM.2.0",
"Backdoor.Trojan",
"Backdoor.RSM.2.0",
"Backdoor.Win32.RSM.20",
"Backdoor.RSM.2.0",
"Trojan.Win32.RSM.dmmg",
"Backdoor.Win32.Z.Rsm.204800",
"Backdoor.W32.RSM.20!c",
"Backdoor.RSM.2.0",
"Backdoor.RSM.2.0",
"BackDoor.RMS.20",
"Backdoor.RSM.Win32.4",
"BehavesLike.Win32.Dropper.dc",
"Backdoor.Win32.Intruder",
"W32/Risk.WUUC-5425",
"Backdoor/RSM.28.b",
"BDS/RSM.20.2",
"Backdoor:Win32/RSM.2_0",
"Backdoor.Win32.RSM.20",
"Backdoor.RSM",
"Win32/RSM.20",
"Win32.Backdoor.Rsm.Sysb",
"Backdoor.RSM!gcfh+QxIfXE",
"W32/RSM.20!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Security",
"researchers",
"have",
"discovered",
"that",
"Cl0p",
"is",
"now",
"targeting",
"Linux",
"systems,",
"using",
"a",
"new",
"variant",
"specifically",
"designed",
"for",
"this",
"operating",
"system."
] | [
4,
12,
16,
16,
16,
3,
16,
16,
16,
5,
13,
16,
16,
3,
11,
16,
16,
16,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9951",
"Worm.BAT.Autorun.ex",
"TrojWare.Win32.StartPage.~AO",
"Win32.HLLW.Autoruner2.11336",
"Worm.AutoRun.Win32.42154",
"BehavesLike.Win32.Virus.cz",
"Trojan-Dropper.Win32.Autorun",
"Worm.BAT.al",
"Win32.HeurC.KVM007.a.kcloud",
"Worm.BAT.Autorun.ex",
"TrojanDropper:Win32/Autorun.AC",
"Worm/Win32.AutoRun.R74164",
"TScope.Trojan.Delf",
"Trj/CI.A",
"BAT/Autorun.BK",
"Bat.Worm.Autorun.Aihw",
"BAT/Autorun.EX!worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"have",
"directly",
"observed",
"multiple",
"copies",
"of",
"Exodus",
"with",
"more",
"than",
"50",
"installs",
"and",
"we",
"can",
"estimate",
"the",
"total",
"number",
"of",
"infections",
"to",
"amount",
"in",
"the",
"several",
"hundreds",
",",
"if",
"not",
"a",
"thousand",
"or",
"more",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Nonetheless,",
"we",
"can",
"obtain",
"targeting",
"information",
"and",
"insight",
"into",
"tactics",
"from",
"the",
"spearphish",
"messages",
"used",
"by",
"the",
"threat",
"actors."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
6,
14
] |
[
"The",
"primary",
"goal",
"of",
"sux",
"appears",
"to",
"be",
"steal",
"messages",
"and",
"other",
"data",
"from",
"popular",
"messaging",
"and",
"social",
"media",
"apps",
"specified",
"within",
"the",
"HenBox",
"sample",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16
] |
[
"The",
"idea",
"is",
"simple",
"-",
"if",
"the",
"infected",
"device",
"belongs",
"to",
"a",
"real",
"person",
",",
"sooner",
"or",
"later",
"this",
"person",
"will",
"move",
"around",
",",
"increasing",
"the",
"step",
"counter",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"recent",
"campaign",
"compromised",
"Taiwan",
"and",
"Hong",
"Kong",
"sites",
"to",
"deliver",
"Flash",
"exploits",
"related",
"to",
"Hacking",
"Team",
"and",
"eventually",
"download",
"PoisonIvy",
"and",
"other",
"payloads",
"in",
"user",
"systems."
] | [
16,
16,
6,
16,
2,
16,
2,
10,
1,
16,
16,
7,
15,
16,
16,
4,
12,
16,
16,
16,
3,
16,
16,
3,
16,
5,
13
] |
[
"This",
"trojanized",
"version",
"of",
"PuTTY",
"harvests",
"credentials",
"and",
"relays",
"the",
"information",
"back",
"to",
"a",
"collection",
"server",
"in",
"the",
"same",
"way",
"too."
] | [
16,
3,
11,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"For",
"example",
",",
"this",
"could",
"be",
"when",
"the",
"victim",
"β",
"s",
"device",
"connects",
"to",
"a",
"Wi-Fi",
"access",
"point",
"that",
"is",
"infected",
"or",
"controlled",
"by",
"the",
"attackers",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.SysAntiH.Worm",
"Worm.Win32.AutoRun!O",
"Worm.Yeltminky.A2",
"Win32.Trojan.KillAV.y",
"W32.SillyFDC",
"Win32/SillyAutorun.BBA",
"Trojan.Win32.AntiAV.ciuz",
"Trojan.Win32.AutoRun.btmkp",
"Worm.Win32.Autorun.70144.E",
"Trojan.Win32.KillAV.tco",
"Win32.HLLW.Autoruner.25125",
"BehavesLike.Win32.Backdoor.lc",
"Trojan-PWS.Win32.Lmir",
"Worm/AutoRun.inq",
"Virus/Win32.Virut.ce",
"Worm:Win32/Yeltminky.A",
"Trojan.Win32.AntiAV.ciuz",
"Trojan/Win32.Hupigon.C73726",
"MalwareScope.Trojan-PSW.Game.7",
"RiskWare.Tool.CK",
"Worm.AutoRun!snJYP2M4Pvg",
"W32/QQPass.BTC",
"Win32/Trojan.2ff"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"When",
"a",
"suitable",
".exe",
"file",
"candidate",
"is",
"found",
",",
"it",
"is",
"copied",
"into",
"the",
"malware",
"installation",
"folder",
"(",
"for",
"example",
",",
"C",
":",
"\\ProgramData",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16
] |
[
"This",
"data",
"structure",
"is",
"24",
"bytes",
"and",
"is",
"composed",
"of",
"some",
"fixed",
"fields",
"and",
"a",
"variable",
"portion",
"that",
"depends",
"on",
"the",
"opcode",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Ransomware",
"has",
"been",
"responsible",
"for",
"many",
"millions",
"of",
"dollars",
"in",
"damages,",
"and",
"CryptoWall",
"is",
"one",
"of",
"the",
"most",
"lucrative",
"ransomware",
"families",
"in",
"use",
"today."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
0
] |
[
"GolfSpy",
"β",
"s",
"infection",
"chain",
"GolfSpy",
"'s",
"Potential",
"Impact",
"Given",
"GolfSpy",
"β",
"s",
"information-stealing",
"capabilities",
",",
"this",
"malware",
"can",
"effectively",
"hijack",
"an",
"infected",
"Android",
"device",
"."
] | [
3,
16,
16,
16,
16,
3,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"The",
"MQTT",
"connection",
"to",
"broker",
"The",
"MQTT",
"connection",
"to",
"broker",
"The",
"MQTT",
"communication",
"is",
"used",
"primarily",
"to",
"update",
"the",
"device",
"state",
"and",
"get",
"commands",
"from",
"the",
"C",
"&",
"C",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"March",
"2017,",
"FireEye",
"observed",
"both",
"nation",
"state",
"and",
"financially",
"motivated",
"actors",
"using",
"EPS",
"zero",
"day",
"exploits",
"assigned",
"as",
"CVE-2017-0261",
"and",
"CVE-2017-0262,",
"prior",
"to",
"Microsoft",
"disabling",
"EPS",
"rendering",
"in",
"its",
"Office",
"products",
"with",
"an",
"update",
"in",
"April",
"2017."
] | [
16,
0,
8,
4,
16,
16,
6,
14,
16,
6,
14,
14,
16,
5,
7,
15,
15,
16,
16,
1,
16,
1,
16,
16,
4,
1,
5,
16,
16,
16,
5,
13,
16,
16,
16,
16,
0,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Coantor.11",
"Win.Trojan.Cuegoe-6336261-0",
"BehavesLike.Win32.Dropper.vc",
"Trojan:Win32/Salgorea.C!dha"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"While",
"some",
"of",
"these",
"acquisition",
"are",
"performed",
"purely",
"through",
"code",
"in",
"mike.jar",
",",
"some",
"others",
"that",
"require",
"access",
"to",
",",
"for",
"example",
",",
"SQLite",
"databases",
"or",
"other",
"files",
"in",
"the",
"application",
"'s",
"storage",
"are",
"performed",
"through",
"rootdaemon",
"instead",
",",
"which",
"should",
"be",
"running",
"with",
"root",
"privileges",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"a",
"story",
"which",
"reminds",
"us",
"of",
"the",
"Bangladesh",
"Bank",
"case",
"β",
"the",
"culprits",
"had",
"compromised",
"the",
"bank's",
"system",
"connected",
"to",
"the",
"SWIFT",
"network",
"and",
"used",
"this",
"to",
"perform",
"the",
"transfers."
] | [
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
16,
16,
6,
16,
1,
5,
13,
13,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"could",
"be",
"very",
"dangerous",
"and",
"cause",
"some",
"devices",
"to",
"crash",
"following",
"the",
"overwrite",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clodcaf.Trojan.0256",
"Worm/W32.Opanki.176640",
"W32.Allim",
"W32/Funmov.a",
"Win32.Trojan.WisdomEyes.151026.9950.9984",
"W32.Allim",
"Win32/Opanki.R",
"WORM_OPANKI.Q",
"Backdoor.Win32.Aimbot.d",
"Trojan.Win32.Aimbot.fujn",
"Win32.Backdoor.Aimbot.Syse",
"Worm.Win32.Opanki.R",
"BackDoor.Oscar",
"Worm.Opanki.Win32.38",
"WORM_OPANKI.Q",
"BehavesLike.Win32.Sdbot.cc",
"W32/Risk.ZUMS-8015",
"I-Worm/Opanki.b",
"W32/Opanki.A1D5!worm",
"Trojan[Backdoor]/Win32.Aimbot",
"Backdoor.W32.Aimbot.d!c",
"Win32/Funmov.worm.176640",
"Worm:Win32/Funmov.A",
"Win32/Trykid.Y",
"W32/Opanki.worm",
"W32.Allim",
"Bck/Sdbot.JED.worm",
"Worm.Funmov!UUJQui2L6no",
"Backdoor.Win32.Aimbot",
"Worm/Opanki.N",
"Backdoor.Win32.Aimbot.aLdg"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"During",
"the",
"past",
"few",
"weeks,",
"we",
"have",
"received",
"information",
"about",
"a",
"new",
"campaign",
"of",
"targeted",
"ransomware",
"attacks."
] | [
16,
16,
0,
8,
8,
16,
16,
16,
16,
16,
16,
16,
6,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoA.DAEE",
"W32.Virut.G",
"W32.Virut.CF",
"Trojan.Win32.Crypt.dzf",
"Virus.Win32.Virut.CE",
"BehavesLike.Win32.BadFile.pt",
"W32/Trojan.UBPC-4784",
"Trojan.Crypt.cm",
"Trojan/Win32.Crypt",
"TrojanDownloader:Win32/Dothemt.A",
"Trojan.Win32.Crypt.dzf",
"Trojan.Crypt",
"W32/Sality.AO",
"Win32/Virut.NBP",
"Virus.Win32.Virut.ug",
"W32/Virut.CE",
"Virus.Win32.VirutChangeEntry.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"actor",
"also",
"built",
"solid",
"backend",
"infrastructures",
"which",
"can",
"handle",
"high",
"volume",
"concurrent",
"requests",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Japan",
"Post",
"-",
"A",
"private",
"Japanese",
"post",
",",
"logistics",
"and",
"courier",
"headquartered",
"in",
"Tokyo",
"."
] | [
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"144",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9962",
"Trojan.Win32.Graftor.dcgcrd",
"TrojWare.Win32.Kryptik.~NT",
"Trojan-Downloader.Win32.Banload",
"Trojan:Win32/BrobanAda.A",
"TScope.Trojan.Delf"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"They",
"represent",
"features",
"and",
"can",
"be",
"turned",
"on",
"and",
"off",
"from",
"the",
"command-and-control",
"(",
"C",
"&",
"C",
")",
"server",
"or",
"by",
"an",
"SMS",
"message",
",",
"effectively",
"instructing",
"the",
"malware",
"to",
"execute",
"certain",
"tasks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Package",
"names",
"for",
"infected",
"apps",
"typically",
"contain",
"a",
"common",
"naming",
"structure",
"that",
"includes",
"com.XXXXXXXXX.camera",
",",
"for",
"example",
"com.bird.sky.whale.camera",
"(",
"app",
"name",
":",
"Whale",
"Camera",
")",
",",
"com.color.rainbow.camera",
"(",
"Rainbow",
"Camera",
")",
",",
"and",
"com.fishing.when.orangecamera",
"(",
"Orange",
"Camera",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
1,
16,
16,
16,
16,
5,
13,
16,
16,
1,
16,
5,
13,
16,
16,
16,
1,
16,
5,
13,
16,
16
] |
[
"Apart",
"from",
"including",
"the",
"country",
"β",
"s",
"name",
",",
"the",
"app",
"β",
"s",
"name",
"is",
"probably",
"intended",
"to",
"imply",
"a",
"relationship",
"with",
"the",
"antifraud",
"solution",
"named",
"GAS",
"Tecnologia",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.BadApp!O",
"TrojanDownloader.Small.AGT4",
"PWS-Mmorpg.e",
"TSPY_RUNAE.SM",
"Infostealer.Gampass",
"Win32/AdClicker.DZX",
"Win.Trojan.Toopu-1",
"Trojan.Win32.Dwn.bxzwi",
"Backdoor.Win32.A.Rbot.65536",
"TrojWare.Win32.TrojanDownloader.Nirava.~clj",
"Trojan.DownLoader1.38650",
"Adware.FloodAd.Win32.2",
"PWS-Mmorpg.e",
"Trojan/Win32.Unknown",
"Win32.Troj.Undef.kcloud",
"TrojanClicker:Win32/Runae.A",
"Trojan/Win32.OnlineGameHack.R1804",
"Adware.FloodAd",
"Win32/Adware.FloodAd.AA",
"Trojan.Win32.Clicker.sa",
"W32/FLOODAD.SM!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"These",
"have",
"been",
"highly",
"active",
"in",
"the",
"Middle",
"East",
"region",
"and",
"unveiled",
"ongoing",
"targeted",
"attacks",
"in",
"multiple",
"regions."
] | [
16,
16,
16,
16,
16,
16,
16,
2,
10,
10,
16,
16,
16,
1,
9,
16,
2,
10
] |
[
"One",
"of",
"Strider's",
"targets",
"had",
"also",
"previously",
"been",
"infected",
"by",
"Regin."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dyname",
"TROJ_WOONIKY.B",
"TROJ_WOONIKY.B",
"W32/Trojan.TZVR-6635",
"TR/Kazy.196035.1",
"Trojan.MSIL.Krypt.2",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"When",
"DualToy",
"began",
"to",
"spread",
"in",
"January",
"2015",
",",
"it",
"was",
"only",
"capable",
"of",
"infecting",
"Android",
"devices",
"."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"Check",
"Point",
"β",
"s",
"Analysis",
"and",
"Response",
"Team",
"(",
"ART",
")",
"disclosed",
"the",
"finding",
"to",
"Android",
"β",
"s",
"Security",
"team",
"who",
"took",
"the",
"appropriate",
"security",
"steps",
"to",
"remove",
"the",
"infected",
"app",
"and",
"added",
"the",
"malware",
"to",
"Android",
"β",
"s",
"built-in",
"protection",
"mechanisms",
"."
] | [
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.KowinPC.Worm",
"Win32.Trojan.WisdomEyes.16070401.9500.9820",
"W32.Kaxela.A",
"Win32/Pipown.KJ",
"Win.Worm.Autorun-2398",
"Worm.Win32.AutoRun.zt",
"Trojan.Win32.ARSleep.gcbz",
"W32.W.AutoRun.yo!c",
"TrojWare.Win32.Magania.~L",
"Trojan.Popwin.651",
"Worm.AutoRun.Win32.11126",
"BehavesLike.Win32.Dropper.lc",
"Trojan/DiskAutorun.px",
"BDS/Exaal.45056",
"Worm/Win32.AutoRun",
"Win32.Troj.OnlineGames.w.kcloud",
"Trojan.Win32.Autorun.21043",
"Worm.Win32.AutoRun.zt",
"Trojan:Win32/Malamiko.A",
"Worm.AutoRun",
"Trojan/Win32.lssj.2cc.rgrk"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm/W32.SdBoter.28496",
"I-Worm.SdBoter.r2",
"Worm.SdBoter!97XSxLq3xLE",
"W32/Sdbot.GFWC-1787",
"Win32/SdBoter.J",
"WORM_SDBOTER.J",
"Worm.W32.SdBoter.J",
"Net-Worm.Win32.SdBoter.j",
"Trojan.Win32.SdBoter.oxfz",
"W32.W.SdBoter.j!c",
"Win32.Worm-net.Sdboter.Star",
"Worm.Win32.SdBoter.J",
"BackDoor.IRC.Sdbot",
"Worm.SdBoter.Win32.7",
"WORM_SDBOTER.J",
"BehavesLike.Win32.Worm.mc",
"W32/Sdbot.DMQ",
"WORM/NetBot.A.2",
"W32/KWBOT.H",
"Worm[Net]/Win32.SdBoter",
"Win32/IRCBot.worm.28496",
"Worm:Win32/Sdboter.J",
"W32/Sdbot.XT.worm",
"Net-Worm.Win32.SdBoter.I",
"IRC/BackDoor.SdBot.24.AC"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"During",
"our",
"investigation",
"we",
"found",
"several",
"backdoors",
"that",
"the",
"HDRoot",
"bootkit",
"used",
"for",
"infecting",
"operating",
"systems."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
3,
11,
16,
16,
16,
5,
13
] |
[
"We",
"labeled",
"this",
"new",
"variant",
"XLoader",
"version",
"7.0",
",",
"because",
"of",
"the",
"different",
"deployment",
"method",
"and",
"its",
"use",
"of",
"the",
"native",
"code",
"to",
"load",
"the",
"payload",
"and",
"hide",
"in",
"Instagram",
"and",
"Tumblr",
"profiles",
"."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
4,
16,
16
] |
[
"One",
"of",
"the",
"top",
"targets",
"is",
"the",
"Japan",
"Pension",
"Service,",
"but",
"the",
"list",
"of",
"targeted",
"industries",
"includes",
"government",
"and",
"government",
"agencies,",
"local",
"governments,",
"public",
"interest",
"groups,",
"universities,",
"banks,",
"financial",
"services,",
"energy,",
"communication,",
"heavy",
"industry,",
"chemical,",
"automotive,",
"electrical,",
"news",
"media,",
"information",
"services",
"sector,",
"health",
"care,",
"real",
"estate,",
"food,",
"semiconductor,",
"robotics,",
"construction,",
"insurance,",
"transportation",
"and",
"so",
"on."
] | [
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
16,
16,
16,
16,
4,
16,
4,
16,
4,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
16,
16,
16
] |
[
"Another",
"interesting",
"feature",
"in",
"FakeSpy",
"β",
"s",
"code",
"is",
"the",
"collection",
"of",
"the",
"device",
"'s",
"IMEI",
"(",
"International",
"Mobile",
"Station",
"Equipment",
"Identity",
")",
"number",
"and",
"all",
"installed",
"applications",
"using",
"the",
"function",
"upAppinfos",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Our",
"security",
"app",
"allows",
"us",
"to",
"transmit",
"this",
"sensitive",
"data",
"encrypted",
"to",
"you",
",",
"thus",
"increasing",
"the",
"security",
"that",
"you",
"will",
"not",
"suffer",
"any",
"financial",
"loss",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Email-Flooder.Win32.DaMailer!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Win.Trojan.Damailer-4",
"Email-Flooder.Win32.DaMailer.119",
"TrojWare.Win32.Flooder.DarkMail",
"Flooder.Damail",
"Tool.DaMailer.Win32.2",
"BehavesLike.Win32.BadFile.th",
"Email-Flooder.DaMailer.d",
"Email-Flooder.Win32.DaMailer.119",
"Trojan/Win32.HDC.C123509",
"EmailFlooder.DaMailer",
"Trj/CI.A",
"Win32/Flooder.DarkMail",
"Win32.Trojan.Damailer.Htwm",
"Flooder.DaMailer!LiHdaVOdIDQ",
"Email-Flooder.Win32.DaMailer"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32/Hamer.B!utility",
"Trojan-Dropper/W32.Hamer_Packed.700928",
"Dropper.Hamer.Win32.41",
"Trojan/Dropper.Hamer.20",
"Trojan.DR.Hammer!WTBuq6wvib0",
"W32/Hamer.B@tool",
"Backdoor.Beasty.Family",
"Win32/TrojanDropper.Hamer.20",
"TROJ_HAMER.R",
"Trojan.Downloader.Small-12",
"Trojan-Dropper.Win32.Hamer.20",
"Trojan.Win32.Hamer.dztpdb",
"Dropper.A.Hamer.700928[h]",
"Troj.Dropper.W32.Hamer.20!c",
"TrojWare.Win32.TrojanDropper.Hamer.20",
"Trojan.DownLoader.225",
"Backdoor.Beasty.Family",
"TROJ_HAMER.R",
"BehavesLike.Win32.Dropper.jc",
"W32/Hamer.PMZI-8206",
"TrojanDropper.Hammer.20",
"TR/Drop.Hamer.20",
"W32/Hamer.20!tr",
"Trojan[Dropper]/Win32.Hamer",
"Dropper/Hamer.700928",
"Backdoor.Beasty.Family",
"TrojanDropper.Hamer",
"Trojan.Win32.Dropper.20",
"Win32.Trojan-dropper.Hamer.Pkra",
"Trojan-Dropper.Win32.Delf",
"Dropper.Hamer.B",
"Win32/Trojan.ece"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"One",
"involves",
"drive-by",
"downloads",
",",
"possibly",
"on",
"booby-trapped",
"porn",
"sites",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"If",
"it",
"finds",
"apps",
"on",
"its",
"prey",
"list",
"(",
"hard-coded",
"or",
"sent",
"from",
"C",
"&",
"C",
"server",
")",
",",
"it",
"will",
"extract",
"the",
"base",
"APK",
"of",
"the",
"target",
"innocent",
"app",
"on",
"the",
"device",
",",
"patch",
"the",
"APK",
"with",
"malicious",
"ads",
"modules",
",",
"install",
"the",
"APK",
"back",
"and",
"replace",
"the",
"original",
"one",
"as",
"if",
"it",
"is",
"an",
"update",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Before",
"doing",
"this",
",",
"the",
"malware",
"makes",
"a",
"screenshot",
"of",
"the",
"screen",
"and",
"displays",
"it",
"on",
"top",
"of",
"all",
"other",
"windows",
"for",
"few",
"seconds",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16
] |
[
"Security",
"solutions",
"can",
"detect",
"it",
"in",
"countless",
"combinations",
"with",
"other",
"suspicious",
"permissions",
"and",
"functions",
",",
"or",
"malicious",
"functionalities",
"β",
"but",
"when",
"faced",
"with",
"no",
"additional",
"functionality",
"nor",
"permission",
",",
"all",
"failed",
"to",
"trigger",
"any",
"alarm",
"on",
"DEFENSOR",
"ID",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16
] |
[
"We",
"covered",
"this",
"attack",
"in",
"detail",
"in",
"our",
"blog",
"titled",
"Shamoon",
"2:",
"Return",
"of",
"the",
"Disttrack",
"Wiper,",
"which",
"targeted",
"a",
"single",
"organization",
"in",
"Saudi",
"Arabia",
"and",
"was",
"set",
"to",
"wipe",
"systems",
"on",
"November",
"17,",
"2016."
] | [
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
3,
8,
16,
16,
16,
3,
11,
16,
16,
16,
4,
12,
16,
2,
10,
16,
16,
16,
16,
1,
9,
16,
0,
8,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win32.Zombam!O",
"Win32.Backdoor.Zombam.b",
"W32/Zombam.BWLR-3283",
"Backdoor.Zombam.B",
"Win.Trojan.Small-4082",
"Backdoor.Win32.Zombam.m",
"Trojan.Win32.Zombam.mpym",
"Backdoor.Win32.Zombam.M",
"BackDoor.Httprat.2",
"Backdoor.Zombam.Win32.32",
"BehavesLike.Win32.Rontokbro.nc",
"Backdoor.Win32.Zombam.m",
"W32/Zombam.N@bd",
"Backdoor/Zombam.m",
"BDS/Zombam.L.1",
"Trojan[Backdoor]/Win32.Zombam",
"Backdoor:Win32/Zombam.L",
"Backdoor.Win32.Zombam.31444",
"Backdoor.Win32.Zombam.m",
"Backdoor.Zombam",
"Win32/Zombam.M",
"Backdoor.Zombam!rqjS+1zkQfU",
"W32/Zombam.M!tr.bdr",
"Win32/Backdoor.009"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"examples",
"below",
"show",
"the",
"plaintext",
"key",
"β",
"TEST",
"β",
"to",
"decrypt",
"encoded",
"hexadecimal",
"strings",
"(",
"jUtils.decrypt",
"(",
")",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"this",
"case,",
"though,",
"running",
"the",
"troubleshooter",
"leads",
"to",
"the",
"installation",
"of",
"LatentBot,",
"a",
"well-documented",
"modular",
"bot",
"used",
"for",
"surveillance,",
"information",
"stealing,",
"and",
"remote",
"access."
] | [
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
3,
16,
16,
16,
3,
16,
1,
9,
9,
9,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9705",
"Trojan.Win32.SchoolBoy.bhk",
"Troj.Banker.W32.Qadars.mtwx",
"Win32.Trojan.Schoolboy.Hvtb",
"Trojan.MulDrop4.3547",
"BehavesLike.Win32.RAHack.nc",
"Trojan.Heur.GM.D439A5C",
"Trojan.Win32.SchoolBoy.bhk",
"Trojan.Win32.PSW",
"W32/SchoolBoy.BHK!tr",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Bookworm's",
"functional",
"code",
"is",
"radically",
"different",
"from",
"PlugX",
"and",
"has",
"a",
"rather",
"unique",
"modular",
"architecture",
"that",
"warranted",
"additional",
"analysis",
"by",
"Unit",
"42."
] | [
3,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
5,
15,
16,
16,
16,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9973",
"Backdoor.Truebot",
"Win.Trojan.Silence-6367671-0",
"W32/Trojan.JFGA-0175",
"Backdoor:Win32/Truebot.A",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Antilam.gzgw",
"Backdoor.Trojan",
"Antilam.FE",
"BKDR_ANTILAM.A",
"Backdoor.Win32.Antilam.20.b",
"Backdoor.Antilam!vJ4jD43D2/o",
"NORMAL:Trojan.SERVER_3!27802",
"Backdoor.Win32.Antilam.dfer",
"BackDoor.AntiLame.23",
"BKDR_ANTILAM.A",
"BehavesLike.Win32.Backdoor.cc",
"W32/Risk.BTKH-4955",
"Backdoor/Antilam.20.ao",
"BDS/Antilam.20.C",
"Trojan[Backdoor]/Win32.Antilam",
"Backdoor:Win32/Antilam.20.B",
"Trojan/Win32.Xema",
"Backdoor.AntiLamer",
"Win32/Antilam.20.B",
"Backdoor.Win32.Antilam",
"W32/Antilam.B!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"β",
"s",
"a",
"messaging",
"object",
"that",
"can",
"be",
"used",
"to",
"request",
"an",
"action",
"from",
"another",
"app",
"component",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"FortiGuard",
"Labs",
"decided",
"to",
"analyze",
"some",
"of",
"them,",
"and",
"in",
"this",
"report,",
"I",
"will",
"discuss",
"its",
"evolution",
"over",
"the",
"past",
"10",
"months."
] | [
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
0,
8,
8,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Exploit.ShellCode.a",
"Trojan.Mdropper.C",
"TROJ_SAMSA.H",
"Trojan-Dropper.MSWord.1Table.ai",
"Exploit.OleMacroPrj.CVE-2003-0347.cezzve",
"DOC.Z.CVE-2003-0347.75864",
"Win32.Trojan-Dropper.1table.swy",
"BackDoor.Mask",
"TROJ_SAMSA.H",
"Troj.Dropper.Msword!c",
"Trojan-Dropper.MSWord.1Table.ai",
"Trojan-Dropper.MSWord.1Table.ai",
"possible-Threat.Embedded.ExeInOffice"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Something",
"that",
"makes",
"Ginp",
"special",
"is",
"that",
"all",
"of",
"its",
"overlay",
"screens",
"for",
"banking",
"apps",
"are",
"consist",
"of",
"multiple",
"steps",
",",
"first",
"stealing",
"the",
"victim",
"β",
"s",
"login",
"credentials",
",",
"then",
"stealing",
"the",
"credit",
"card",
"details",
"(",
"to",
"β",
"validate",
"β",
"the",
"user",
"identity",
")",
",",
"as",
"shown",
"in",
"the",
"screenshots",
"hereafter",
":",
"The",
"following",
"code",
"snippet",
"shows",
"that",
"after",
"the",
"second",
"overlay",
"is",
"filled-in",
"and",
"validated",
",",
"it",
"disappears",
"and",
"the",
"targeted",
"application",
"is",
"added",
"to",
"the",
"list",
"of",
"packages",
"names",
"to",
"be",
"ignored",
"for",
"future",
"overlays",
"attacks",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"cyberattacks",
"against",
"the",
"Ukrainian",
"electric",
"power",
"industry",
"continue."
] | [
16,
1,
16,
4,
12,
12,
12,
12,
16
] |
[
"Researchers",
"from",
"the",
"IBM",
"X-Force",
"Incident",
"Response",
"and",
"Intelligence",
"Services",
"IRIS",
"team",
"identified",
"a",
"missing",
"link",
"in",
"the",
"operations",
"of",
"a",
"threat",
"actor",
"involved",
"in",
"recent",
"Shamoon",
"malware",
"attacks",
"against",
"Gulf",
"state",
"organizations."
] | [
4,
16,
16,
4,
12,
12,
12,
16,
4,
12,
12,
12,
16,
16,
1,
9,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
3,
11,
1,
16,
2,
10,
4
] |
[
"RuMMS",
"Code",
"Analysis",
"All",
"RuMMS",
"samples",
"share",
"the",
"same",
"behaviors",
",",
"major",
"parts",
"of",
"which",
"are",
"shown",
"in",
"Figure",
"1",
"."
] | [
3,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.