tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "Each", "of", "the", "phishing", "sites", "contained", "links", "to", "a", "distribution", "manifest", ",", "which", "contained", "metadata", "such", "as", "the", "application", "name", ",", "version", ",", "icon", ",", "and", "a", "URL", "for", "the", "IPA", "file", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Clicker.BHO.ncs", "Win32.Trojan.WisdomEyes.16070401.9500.9639", "Win32/TrojanClicker.BHO.NCS", "Win32.Trojan.Spnr.Pfjg", "TrojWare.Win32.TrojanClicker.BHO.NCS", "Dropper.BHO.Win32.500", "TrojanDropper.BHO.pj", "TR/Rogue.kdv.655157", "Trojan[Dropper]/Win32.BHO", "Trojan.Zusy.Elzob.D1C26", "TrojanDropper:Win32/Hufysk.A", "Dropper/Win32.BHO.R25331", "TrojanDropper.BHO", "Trojan-Dropper.Win32.Hufysk", "W32/TrojanClicker_BHO.NCS", "Trj/CI.A", "Win32/Trojan.a73" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Overall", ",", "it", "has", "a", "fairly", "common", "feature", "list", ",", "but", "it", "is", "expected", "to", "expand", "in", "future", "updates", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Downloader.Msil.H", "Trojan-Downloader.Win32.FraudLoad!O", "Win32/SillyDl.YBL", "Win.Downloader.134626-1", "Trojan.Downloader.Msil.H", "Trojan-Downloader.Win32.FraudLoad.iei", "Trojan.Downloader.Msil.H", "Trojan.Win32.A.Downloader.229376.FL", "Trojan.Downloader.Msil.H", "Win32.HLLW.Myscan.1", "BehavesLike.Win32.BadFile.pm", "Trojan[Downloader]/Win32.FraudLoad", "TrojanDownloader:Win32/Hesto.A", "Trojan-Downloader.Win32.FraudLoad.iei", "Trojan.Downloader.Msil.H", "TrojanDownloader.FraudLoad", "Trojan.Downloader.Msil.H" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Packed.Win32.TDSS!O", "Win32.Trojan.WisdomEyes.16070401.9500.9885", "Trojan.Win32.Drop.dajhso", "Trojan.MulDrop5.32960", "Trojan/PSW.LdPinch.adoe", "Backdoor:Win32/Nosrawec.A", "Trojan.Delf.279", "Backdoor.W32.Beastdoor.l7a6", "Trojan/Win32.Nosrawec.R198886", "RiskWare.Tool.CK" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.SasfisQKC.Fam.Trojan", "Trojan/W32.PornoBlocker.60928.F", "TrojanDropper.Bamital.I3", "Trojan/PornoBlocker.hhu", "TROJ_BAMITAL.SM2", "Win32.Trojan.Kryptik.ct", "TROJ_BAMITAL.SM2", "Win.Trojan.Ransom-740", "Trojan-Ransom.Win32.PornoBlocker.hts", "Trojan.Win32.PornoBlocker.bwvwe", "Trojan.Hottrend", "Trojan.PornoBlocker.Win32.1248", "Trojan/PornoBlocker.axt", "TR/Qhost.60928", "Trojan[Ransom]/Win32.PornoBlocker", "Trojan.VIZ.1", "Trojan:Win32/Bamital.I", "Trojan.SB.01742", "Bck/Qbot.AO", "Win32/Bamital.FA", "Win32.Trojan.Pornoblocker.Lkxy", "Trojan.PornoBlocker!v14Do0CXdgA", "Win32/Trojan.3c3" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Adware", "commonly", "found", "on", "Play", "collects", "profits", "from", "ad", "networks", ",", "but", "mobile", "ransomware", "inflicts", "direct", "harm", "to", "users", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "ATM", "malware", "is", "not", "new,", "back", "in", "2013", "and", "2014", "threats", "like", "Ploutus", "or", "PadPin", "Tyupkin", "were", "used", "to", "empty", "ATMs", "in", "Mexico,", "Russia", "and", "other", "countries,", "but", "SUCEFUL", "offers", "a", "new", "twist", "by", "targeting", "the", "cardholders." ]
[ 3, 11, 16, 16, 16, 16, 16, 0, 16, 0, 16, 16, 3, 16, 3, 11, 16, 16, 16, 16, 5, 16, 2, 10, 16, 16, 2, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4 ]
[ "]", "172", "cdncool", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "As", "an", "active", "threat", "under", "development,", "we", "decided", "to", "take", "a", "closer", "look", "at", "this", "RAT", "to", "understand", "some", "of", "its", "inner", "workings", "and", "capabilities." ]
[ 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9980", "Trojan.Win32.Zusy.rjrdd", "TrojWare.Win32.TrojanDownloader.Murlo.~JH2", "Trojan.Sasfis.Win32.30609", "Trojan/Sasfis.xqr", "TR/Zusy.3171.28", "Trojan/Win32.Sasfis", "Trojan.Zusy.DC63", "Backdoor:Win32/Usinec.A", "Trojan/Win32.Sasfis.C97816", "Trojan.Sasfis", "Trojan.Sasfis!LKZhl2Eyglg", "Trojan.Win32.Sasfis" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Although", "state-sponsored", "attacks", "against", "the", "United", "States", "by", "Chinese", "threat", "actors", "have", "decreased", "dramatically", "since", "the", "signing", "of", "the", "US-China", "Cyber", "Agreement", "in", "2016,", "Proofpoint", "researchers", "have", "continued", "to", "observe", "advanced", "persistent", "threat", "APT", "activity", "associated", "with", "Chinese", "actors", "targeting", "other", "regions." ]
[ 16, 1, 9, 16, 2, 10, 10, 16, 6, 14, 14, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 0, 4, 12, 16, 16, 16, 16, 6, 14, 14, 14, 16, 16, 16, 6, 14, 16, 16, 2 ]
[ "They", "mentioned", "an", "Android", ",", "iOS", "and", "Windows", "remote", "access", "tool", "(", "RAT", ")", "." ]
[ 16, 16, 16, 5, 16, 5, 16, 5, 16, 16, 16, 16, 16, 16, 16 ]
[ "With", "each", "new", "version", ",", "the", "malware", "adds", "new", "features", "like", "dynamic", "library", "loading", ",", "encryption", ",", "and", "adjustments", "to", "different", "locales", "and", "manufacturers", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Over", "the", "past", "year", "or", "so,", "we", "have", "seen", "numerous", "techniques", "and", "tactics", "employed", "by", "this", "campaign,", "such", "as", "the", "use", "of", "an", "iOS", "espionage", "app,", "and", "the", "inclusion", "of", "new", "targets", "like", "the", "White", "House." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12 ]
[ "Cknife", "is", "a", "Chinese", "cross-platform", "compatible", "Java", "web", "shell", "framework", "—", "that", "operates", "more", "like", "a", "RAT", "for", "web", "servers", "—", "based", "on", "China", "Chopper." ]
[ 3, 16, 16, 3, 11, 11, 11, 11, 11, 11, 16, 16, 16, 16, 16, 16, 3, 16, 5, 13, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Menti.184320.T", "Trojan.Graftor.D557F", "Win32.Trojan.Farfli.ai", "Trojan.DownLoader6.3217", "BehavesLike.Win32.BadFile.cm", "Trojan.Win32.MMM", "Trojan/Win32.Menti", "PWS:Win32/Quopax.A!dll", "Trojan.Win32.A.Menti.184320.YN", "BScope.Trojan.SvcHorse.01643", "Backdoor.Win32.Gh0st.EB" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "For", "the", "entry", "point,", "this", "Locky", "variant", "uses", "spam", "emails", "with", ".ZIP", "file", "attachments", "that", "contain", "WSF", "files." ]
[ 16, 16, 1, 9, 16, 3, 11, 16, 1, 9, 9, 9, 9, 9, 16, 1, 9, 9 ]
[ "In", "late", "August,", "WildFire", "Locker", "disappeared", "after", "the", "organizations", "behind", "NoMoreRansom.org", "were", "able", "to", "seize", "control", "of", "the", "ransomware", "s", "Command", "Control", "servers." ]
[ 16, 0, 8, 3, 11, 16, 16, 16, 4, 16, 1, 16, 16, 16, 16, 16, 16, 16, 3, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojanspy.Smetsb.FC.4036", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Trojan.MSIL.Krypt.4", "Trojan/Win32.ZBot.R155926", "Trojan.InfoStealer.KL" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "This", "version", "masquerades", "as", "CryptoWall." ]
[ 16, 16, 16, 16, 3 ]
[ "It", "’", "s", "also", "worth", "noting", "that", "both", "campaigns", "repackage", "apps", "that", "are", "commonly", "used", "in", "their", "target", "’", "s", "countries", ",", "such", "as", "Telegram", ",", "Kik", ",", "and", "Plus", "messaging", "apps", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 16, 16, 5, 16, 16, 16 ]
[ "Tick's", "most", "recent", "attacks", "have", "concentrated", "on", "the", "technology,", "aquatic", "engineering,", "and", "broadcasting", "sectors", "in", "Japan." ]
[ 3, 16, 16, 1, 16, 16, 16, 4, 12, 12, 12, 16, 4, 12, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.OnionDuke", "W32/Trojan3.XZO", "Trojan.Cozer.B", "BKDR_COZER.LP", "Backdoor.Win32.MiniDuke.cb", "Trojan.Win32.AD.ekdqnf", "Win32.Backdoor.Miniduke.Lplm", "BackDoor.CozyDuke.49", "BehavesLike.Win32.RansomwareLocky.gh", "W32/Trojan.QFCN-8527", "Backdoor.MiniDuke.av", "TR/AD.OnionDuke.trltr", "Backdoor.Win32.MiniDuke.cb", "Backdoor.MiniDuke" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "FIN4", "is", "a", "financially", "motivated", "threat", "actor", "which", "has", "consistently", "targeted", "this", "population." ]
[ 6, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16 ]
[ "To", "lure", "the", "victims", "to", "download", "the", "malware", ",", "threat", "actors", "use", "SMS", "phishing", "–", "sending", "a", "short", "SMS", "message", "containing", "a", "malicious", "URL", "to", "the", "potential", "victims", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "kill", "switch", "can", "also", "be", "turned", "on", "by", "SMS", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "newly", "discovered", "campaign", "targets", "the", "Indian", "Ministry", "of", "Defense", "using", "malicious", "documents", "as", "lures" ]
[ 16, 16, 16, 6, 16, 4, 12, 12, 12, 12, 16, 1, 9, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Recyl", "Trojan.Injector.Win32.557110", "Worm.Win32.Recyl.afr", "BehavesLike.Win32.Dropper.rc", "Worm.Recyl.v", "TrojanDropper:Win32/Injector.D", "Worm.Win32.Recyl.afr", "Worm/Win32.Recyl.R213857", "MalwareScope.Trojan-PSW.Game.16", "Worm.Recyl!" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Instead", "of", "embedding", "core", "malware", "payload", "in", "droppers", ",", "the", "actor", "switches", "to", "a", "more", "low-key", "SDK", "approach", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "most", "recent", "FakeSpy", "campaign", "appears", "to", "target", "users", "of", "postal", "services", "around", "the", "world", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Malware", "code", "showing", "handover", "from", "initial", "module", "to", "main", "payload", "Figure", "13", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Uztuby.11", "Trojan.Uztuby.11", "Trojan.Uztuby.11", "Trojan.Uztuby.11", "Trojan.Win32.Delphi.elmrxd", "Trojan.Uztuby.11", "Trojan.Uztuby.11", "backdoor.win32.fynloski.a", "Backdoor/Win32.fynloski.pwi", "Trojan.GUSX-6", "TR/AD.AVKiller.reish", "Win32/Remtasu.AI", "Backdoor.NanoBot!", "Trojan.Win32.Remtasu", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Small!O", "Hacktool.Hashenfill", "Trojan.Small.Win32.19365", "Trojan.Win32.Small.cpa", "Trojan.Win32.Small.cwxrxw", "Troj.W32.Small.cpa!c", "Trojan.Hooker.21682", "BehavesLike.Win32.FakeAlert.xh", "Trojan/Small.ouz", "HackTool:Win32/Hashenfill.A", "Trojan.Win32.Small.cpa", "Trojan/Win32.Connapts.C256359", "Trojan.Small", "Win32.Trojan.Small.Dxcs", "Trojan.Small!tZ/zbi7RotE", "Win32/Trojan.d54" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "appears", "the", "entity", "behind", "this", "campaign", "took", "steps", "to", "make", "reverse", "engineering", "more", "difficult", "and", "chose", "the", "use", "of", "Cisco's", "AnyConnect", "Client", "as", "a", "lure", "to", "trick", "victims", "into", "installing", "the", "malware." ]
[ 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "Sample", "2", ",", "has", "the", "package", "name", "cn.android.setting", "masquerading", "as", "Android", "’", "s", "Settings", "app", ",", "which", "has", "a", "similar", "package", "name", "(", "com.android.settings", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16 ]
[ "A", "new", "stealer", "with", "keylogging", "and", "clipper", "capabilities", "is", "making", "the", "rounds", "on", "cybercrime", "forums,", "according", "to", "research", "by", "Uptycs", "threat", "research", "team", "and", "Shilpesh", "Trivedi", "and", "Tejaswini", "Sandapolla." ]
[ 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 4, 12, 12, 12, 16, 4, 12, 16, 4, 12 ]
[ "Our", "team", "went", "ahead", "and", "hunted", "for", "samples", "of", "the", "app", "and", "analyzed", "it", "in", "our", "labs", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9828", "Trojan.Win32.Fsysna.csibjc", "Trojan.DownLoader9.58423", "BehavesLike.Win32.BadFile.mh", "Trojan/Fsysna.anj", "TR/Terzib.wrdas", "Trojan:Win32/Terzib.A", "Worm/Win32.Stration.R523", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "android.intent.action.PACKAGE_INSTALL", "System", "notification", "that", "the", "download", "and", "eventual", "installation", "of", "an", "app", "package", "is", "happening", "(", "this", "is", "deprecated", ")", "android.intent.action.PACKAGE_ADDED", "System", "notification", "that", "a", "new", "app", "package", "has", "been", "installed", "on", "the", "device", ",", "including", "the", "name", "of", "said", "package", "." ]
[ 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "As", "the", "team", "at", "Scandinavian", "security", "group", "CSIS", "describes", ",", "malware", "known", "as", "MazarBOT", "is", "being", "distributed", "via", "SMS", "in", "Denmark", "and", "is", "likely", "to", "also", "be", "encountered", "in", "other", "countries", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "TUESDAY", ",", "APRIL", "9", ",", "2019", "Gustuff", "banking", "botnet", "targets", "Australia", "EXECUTIVE", "SUMMARY", "Cisco", "Talos", "has", "uncovered", "a", "new", "Android-based", "campaign", "targeting", "Australian", "financial", "institutions", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16 ]
[ "El", "Machete", "is", "one", "of", "these", "threats", "that", "was", "first", "publicly", "disclosed", "and", "named", "by", "Kaspersky." ]
[ 3, 11, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 4 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Lamer.K8", "Trojan.Kryptik.Win32.801927", "Trojan/Delf.nlr", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "WORM_GATE_GE2300D6.UVPA", "Win.Trojan.Fileinfector-76", "Trojan.Win32.Delphi.danila", "Worm.Win32.Delf.DA", "WORM_GATE_GE2300D6.UVPA", "BehavesLike.Win32.Gate.tc", "W32.Infector", "Worm/Win32.Unknown", "Worm:Win32/Gate.A", "W32.Lamer.lwJ1", "Spyware/Win32.Delf.C43787", "W32/Gate.worm", "Trojan.Cosmu", "Win32/Delf.NLR", "Worm.Delf!2LR1nmaG85k", "Trojan-PWS.Win32.Delf" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "On", "May", "12,", "at", "the", "onset", "of", "the", "WannaCry", "attack,", "Cyphort", "Labs", "researchers", "have", "seen", "a", "similar", "SMB", "attack", "to", "one", "of", "our", "honeypot", "servers." ]
[ 16, 0, 8, 16, 16, 16, 16, 16, 3, 1, 4, 12, 12, 16, 16, 16, 16, 1, 9, 16, 16, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Mramak.A", "W32.Mkar.A4", "Win32.Mramak.A", "Win32.Mramak.A", "Win32.Trojan.WisdomEyes.16070401.9500.9981", "W32/Mkar.PJKY-3509", "W32.Marak", "Win.Trojan.Mkar-3", "Win32.Mramak.A", "Virus.Win32.Mkar.b", "Win32.Mramak.A", "Virus.Win32.Packed.deljve", "Win32.Mrak.A", "Win32.Mramak.A", "Win32.HLLP.Mrak.10", "BehavesLike.Win32.Dropper.mc", "W32/Mkar.L", "W32/Mkar.b.Dropper", "Worm:Win32/Mkar.B", "Virus.Win32.Mkar.b", "Malware/Win32.Mkar.C408081", "Win32/Mkar.B", "Win32.Virus.Mkar.Agle" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Based", "on", "the", "evolution", "of", "Ginp", "it", "is", "clear", "that", "it", "isn", "’", "t", "based", "on", "Anubis", ",", "but", "rather", "reuses", "some", "of", "its", "code", "." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Screenshots", "from", "this", "developer", "’", "s", "YouTube", "video", "shows", "history", "of", "checking", "Ashas", "adware", "on", "Google", "Play", "ESET", "telemetry", "Figure", "15", "." ]
[ 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 3, 16, 16, 5, 13, 4, 16, 16, 16, 16 ]
[ "Fraud", "Both", "of", "the", "billing", "methods", "detailed", "above", "provide", "device", "verification", ",", "but", "not", "user", "verification", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "attack", "has", "been", "active", "for", "more", "than", "a", "year", "and", "is", "ongoing", "elsewhere,", "but", "this", "particular", "infection", "pathway", "was", "shut", "down", "when", "the", "site", "operator", "and", "ad", "network", "were", "notified", "of", "the", "activity." ]
[ 16, 1, 16, 16, 16, 16, 0, 8, 8, 8, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 12, 12, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "JS:Trojan.JS.Downloader.HZQ", "Trojan.JS.Downloader.2455.A", "JS/Nemucod.tm", "JS/Downldr.HX2!Eldorado", "JS.Downloader", "JS/TrojanDownloader.Nemucod.DFV", "JS_NEMUCOD.ELDSAUHG", "JS:Trojan.JS.Downloader.HZQ", "JS:Trojan.JS.Downloader.HZQ", "Trojan.Script.Heuristic-js.iacgm", "JS.S.Downloader.1658", "JS:Trojan.JS.Downloader.HZQ", "JS:Trojan.JS.Downloader.HZQ", "Trojan.DownLoader25.3813", "JS_NEMUCOD.ELDSAUHG", "JS/Nemucod.tm", "JS/Downldr.HX2!Eldorado", "Trojan[Downloader]/JS.Nemucod.dfv", "JS:Trojan.JS.Downloader.HZQ", "JS/Obfus.S237", "Trojan-Dowloader.JS.Nemucod", "JS/Nemucod.DFV!tr.dldr", "Win32/Trojan.Downloader.50a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "said", "exploits", "will", "root", "the", "device", "and", "install", "a", "shell", "backdoor", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "However", ",", "this", "time", ",", "the", "permission", "is", "actually", "used", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "allocates", "and", "fills", "four", "chunks", "of", "memory", "inside", "the", "service", "process", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "MITRE", "TAGS", "Action", "Tag", "ID", "App", "auto-start", "at", "device", "boot", "T1402", "Input", "prompt", "T1411", "Capture", "SMS", "messages", "T1412", "Application", "discovery", "T1418", "Capture", "audio", "T1429", "Location", "tracking", "T1430", "Access", "contact", "list", "T1432", "Access", "call", "log", "T1433", "Commonly", "used", "port", "T1436", "Standard", "application", "layer", "protocol", "T1437", "Masquerage", "as", "legitimate", "application", "T1444", "Suppress", "application", "icon", "T1508", "Capture", "camera", "T1512", "Screen", "capture", "T1513", "Foreground", "persistence", "T1541", "DualToy", ":", "New", "Windows", "Trojan", "Sideloads", "Risky", "Apps", "to", "Android", "and", "iOS", "Devices", "By", "Claud", "Xiao", "September", "13", ",", "2016", "at", "5:00", "AM", "Over", "the", "past", "two", "years", ",", "we", "’", "ve", "observed", "many", "cases", "of", "Microsoft", "Windows", "and", "Apple", "iOS", "malware", "designed", "to", "attack", "mobile", "devices", "." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 5, 16, 16, 16, 16, 16, 5, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.MSILInject.A4", "TROJ_NECURS.SMJ6", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Backdoor.Trojan", "Win32/Inject.fcAMLbC", "TROJ_NECURS.SMJ6", "Trojan.MSIL.Inject.aqjr", "Trojan.Win32.Inject.ddhqep", "Troj.Dropper.W32.Injector.m7mC", "TrojWare.Win32.Zusy.XYN", "Trojan.Inject1.44093", "Trojan.Win32.Inject", "TR/Zusy.xynynabm", "Trojan/Win32.Inject", "Trojan.Zusy.D1889E", "Trojan.MSIL.Inject.aqjr", "Trojan:MSIL/Injector.P", "Dropper/Win32.Necurs.R121870", "Trojan.Inject", "Trojan.Injector", "Trojan.Injector!AbCu/r2al/E", "MSIL/Injector.ERR!tr", "Win32/Trojan.304" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "targeting", "is", "also", "consistent", "with", "previous", "attacker", "TTPs;", "Ke3chang", "historically", "targeted", "the", "Ministry", "of", "Affairs,", "and", "also", "conducted", "several", "prior", "campaigns", "against", "India." ]
[ 16, 16, 16, 16, 16, 16, 16, 6, 16, 3, 16, 16, 4, 12, 12, 12, 16, 16, 16, 16, 16, 6, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Pws.Gadu.L", "Trojan-PSW.Win32.Gadu!O", "TrojanPWS.Gadu", "Trojan/PSW.Gadu.l", "W32/PWStealer.FCG", "Backdoor.Trojan", "Win.Spyware.8306-2", "Trojan.Pws.Gadu.L", "Trojan-PSW.Win32.Gadu.l", "Trojan.Pws.Gadu.L", "Trojan.Win32.Gadu.wwgc", "Trojan.Win32.PSWGadu.197820", "Troj.Psw.W32!c", "Trojan.Pws.Gadu.L", "Trojan.PWS.Gadu", "Trojan.Gadu.Win32.1", "BehavesLike.Win32.Trojan.cc", "W32/PWS.FWUF-5609", "Trojan/PSW.Gadu.a", "Trojan[PSW]/Win32.Gadu", "Win32.PSWTroj.Gadu.g.kcloud", "Trojan.Pws.Gadu.L", "Trojan-PSW.Win32.Gadu.l", "PWS:Win32/Gadu.H", "Trojan/Win32.Xema.C89273", "TrojanPSW.Gadu", "Trojan.Pws.Gadu.L", "Trojan.Pws.Gadu.L", "Bck/Gadu.Q", "Win32/PSW.Delf.OQP", "Win32.Trojan-qqpass.Qqrob.Wxrk", "Trojan.PWS.Gadu!8+g7gjB8P1Q", "Trojan-PWS.Win32.Gadu", "W32/Gadu.L!tr.pws", "Win32/Trojan.3ea" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Figure", "7", "lists", "the", "IP", "addresses", "of", "these", "C2", "servers", ",", "the", "number", "of", "RuMMS", "apps", "that", "connect", "to", "each", "of", "them", ",", "and", "the", "example", "URL", "used", "as", "the", "first", "parameter", "of", "the", "HttpPost", "operation", "(", "used", "in", "the", "code", "of", "Figure", "3", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "are", "constantly", "on", "the", "lookout", "for", "new", "threats", "and", "we", "are", "expanding", "our", "protections", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "MSIL/Filecoder.EO", "Trojan-Ransom.FileCoder", "MSIL/Filecoder.EO!tr", "Trojan.Ransom.MSIL.1", "Trojan.Ransom.SureRansom", "MSIL.Trojan-Ransom.SureRansom.A", "Win32/Trojan.Ransom.935" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win32.Hupigon!O", "Win32.Trojan.WisdomEyes.16070401.9500.9960", "Trojan.Malcol", "Win32/Tnega.bcLXSH", "Trojan.Win32.Slym.cufsch", "Troj.Rogue.lC4c", "Backdoor.Win32.Hupigon.rgqw", "Trojan.DownLoader11.11699", "BehavesLike.Win32.Backdoor.vh", "TR/Rogue.kdv.679349", "Packed.Win32.MalPackedSN", "Win32.Application.PUPStudio.A", "Unwanted/Win32.HackTool.R40115", "Spyware.OnlineGames" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "the", "course", "of", "further", "research", ",", "we", "found", "a", "number", "of", "related", "samples", "that", "point", "to", "a", "long-term", "development", "process", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.ShizNHm.Trojan", "Ransom.TeslaCrypt.WR4", "Trojan/Spy.Shiz.nct", "Ransom_HPLOCKY.SM1", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Ransom_HPLOCKY.SM1", "Win.Trojan.Blocker-380", "Trojan.Win32.Shifu.jt", "Trojan.Win32.Blocker.dxvhyb", "Packer.W32.Tpyn.toCt", "Trojan.DownLoader17.27888", "Trojan.Blocker.Win32.32151", "BehavesLike.Win32.Ransomware.hz", "Trojan.Win32.Pariham", "Trojan.Blocker.iv", "TR/Crypt.Xpack.whza", "Trojan[Ransom]/Win32.Blocker", "Ransom.Locky/Variant", "Trojan.Win32.Shifu.jt", "Trojan:Win32/Pariham.A", "Hoax.Blocker", "Trojan.Shifu", "Win32/Spy.Shiz.NCT", "Win32.Trojan.Shifu.Eehh", "Trojan.Blocker!epDzUGNGGeo", "W32/Kryptik.EFAD!tr", "Win32/Trojan.ff4" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Rackcrypt", "Trojan.Graftor.D5D262", "Ransom_Rackcrypt.R002C0DKE17", "Trojan.Win32.Z.Graftor.1886447", "Ransom_Rackcrypt.R002C0DKE17", "BehavesLike.Win32.FakeAlertSecurityTool.tc", "Virus.Win32.Vundo", "Trojan[Spy]/Win32.KeyLogger.dwl", "Ransom:Win32/Rackcrypt.A", "Trj/CI.A", "Win32.Trojan.Dropper.Wsjz" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Dump", "data", "from", "the", "IMO", "messenger", "app", "." ]
[ 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "It", "sends", "all", "of", "this", "data", "to", "the", "C2", "server", "using", "the", "URL", "ending", "with", "/servlet/AppInfos", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16 ]
[ "JS/Nemucod", "usually", "arrives", "on", "an", "infected", "machine", "through", "malicious", "spam", "emails", "with", ".zip", "extensions." ]
[ 1, 16, 16, 16, 16, 16, 5, 16, 1, 9, 9, 9, 9, 9 ]
[ "Money", "then", "disappears", "from", "the", "victim", "’", "s", "account", "and", "is", "cashed", "in", "without", "the", "owner", "’", "s", "knowledge", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Although", "it", "claims", "to", "be", "using", "asymmetric", "RSA-2048", "to", "encrypt", "files,", "it", "is", "making", "use", "of", "symmetric", "AES", "instead." ]
[ 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16 ]
[ "Once", "archive", "is", "loaded", ",", "the", "application", "uses", "reflection", "api", "to", "call", "methods", "from", "the", "class", "names", "specified", "in", "the", "json", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", "performs", "malicious", "activities", "such", "as", "reading", "login", "credentials,", "accessing", "files,", "keylogging,", "remote", "desktop", "control,", "and", "remote", "control", "of", "compromised", "machines." ]
[ 3, 11, 16, 3, 11, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clod14e.Trojan.9d88", "Irc.Worm.Golember.V", "Worm/W32.Golember.34816", "I-Worm.Golember.v.n3", "Worm.Golember.Win32.8", "Trojan/Golember.v", "Worm.Golember!SM/OEFSeEEs", "W32/Golember.P", "IRC-Worm.Win32.Golember.v", "Irc.Worm.Golember.V", "Trojan.Win32.Golember.furx", "Irc.Worm.Golember.V", "Worm.Win32.Golember.V", "Irc.Worm.Golember.V", "BehavesLike.Win32.Dropper.nc", "W32/Golember.YQQU-9034", "I-Worm/Golember.e", "Worm/Irc.Golember.V", "Worm[IRC]/Win32.Golember", "Worm.Golember.v.kcloud", "Worm:Win32/Flip.A", "Irc.Worm.Golember.V", "Win32/Golember.worm.34816", "IRCWorm.Golember", "Win32/Golember.V", "Win32.Worm-irc.Golember.Aojg", "IRC/ROSYA.V!worm", "IRC-Worm/Golember.O", "Worm.Win32.Golember.AxNU" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "To", "be", "distributed", "outside", "the", "app", "store", ",", "an", "IPA", "package", "must", "contain", "a", "mobile", "provisioning", "profile", "with", "an", "enterprise", "’", "s", "certificate", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HEUR_PDF.D2", "PDF/Trojan.SHCJ-8", "possible-Threat.PDF.Acmd" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Worm/W32.Mintal.309248", "W32/Mintal.003", "Trojan.Win32.Mintal.hgbj", "W32.Mintal.Worm", "Win32/Howeem.A", "Email-Worm.Win32.Mintal.003", "I-Worm.Mintal!SHAyifSwe/s", "I-Worm.Win32.A.Mintal.309248[h]", "Worm.Win32.Howeem.A", "Win32.HLLM.Hwm.3", "Worm.Mintal.Win32.1", "W32/Howeem.worm", "W32/Risk.CCZK-5590", "I-Worm/Mintal.003", "WORM/Mintal.003.A", "Worm[Email]/Win32.Mintal", "W32.W.Mintal.003!c", "Win32/Mintal.worm.309248", "Worm:Win32/Mintal.A@mm", "W32/Howeem.worm", "Worm.Mintal", "Worm.Win32.Mintal.Ao", "Win32.Worm-email.Mintal.Hxqd" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Lizarbot.FC.2716", "Backdoor.IRCBot", "BKDR_LIZARBOT.SMVJ18", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "W32/Trojan.QJOG-5659", "Backdoor.IRC.Bot", "BKDR_LIZARBOT.SMVJ18", "Win.Trojan.Lizarbot-1", "MSIL.Trojan.IRCBot.I", "Trojan.DownLoader24.64862", "Trojan.Zusy.D3A924", "Backdoor:MSIL/Lizarbot.A", "Trojan/Win32.Bladabindi.C230655", "Trj/CI.A", "Trojan.MSIL.IRCBot", "Win32/Trojan.158" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.FA61", "Trojan.Zonidel", "Win32.Trojan.WisdomEyes.16070401.9500.9990", "Backdoor.Trojan", "Win32/TrojanDownloader.Wauchos.CY", "BKDR_ANDROM.YYSMQH", "Trojan.Win32.Zonidel.bko", "Trojan.Win32.Wauchos.eujxed", "Win32.Trojan.Zonidel.Agux", "Trojan.DownLoader25.48331", "BehavesLike.Win32.Backdoor.fm", "W32/Trojan.EGNB-8448", "Malicious_Behavior.SB", "Trojan/Win32.Zonidel", "Trojan.Win32.Zonidel.bko", "Trojan:Win32/Koneqzu.A", "Trojan/Win32.Zonidel.C2210520", "Trojan.PasswordStealer", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Bart", "has", "a", "payment", "screen", "like", "Locky", "but", "encrypts", "files", "without", "first", "connecting", "to", "a", "command", "and", "control", "C", "C", "server." ]
[ 3, 16, 16, 1, 9, 16, 3, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9 ]
[ "The", "transaction", "would", "only", "be", "authorized", "after", "the", "client", "enters", "the", "TAN", "into", "the", "online", "banking", "website", "in", "their", "browser", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Vetor.PE", "Virus.Win32.Virut.1!O", "W32.Virut.G", "Virus.Virut.Win32.27", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "W32.Virut.CF", "Win32/Virut.17408", "PE_VIRUX.A", "Virus.Win32.Virut.ce", "Virus.Win32.Virut.hpeg", "PE_VIRUX.A", "BehavesLike.Win32.AdwareYTBlock.mh", "Trojan-Downloader.Win32.Dldwp", "Win32/Virut.bn", "Virus/Win32.Virut.ce", "Win32.Virut.nf.53248", "Virus.Win32.Virut.ce", "Win32/Virut.F", "Virus.Virut.06", "Win32.Virut.E", "Virus.Win32.Virut.tt", "W32/Virut.CE", "W32/Sality.AO", "Virus.Win32.VirutChangeEntry.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "''", "Package", "permissions", "The", "trojan", "declares", "numerous", "permissions", "in", "the", "manifest", ",", "from", "which", "we", "should", "highlight", "the", "BIND_DEVICE_ADMIN", ",", "which", "provides", "nearly", "full", "control", "of", "the", "device", "to", "the", "trojan", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Risk.VHAX-4717", "Backdoor.NetBus.svr", "Win.Trojan.NBSpy-2", "Backdoor.Win32.NBSpy.b", "Trojan.Win32.Inject.cwlwfo", "Backdoor.W32.NBSpy.b!c", "BackDoor.NetBus", "Backdoor.Win32.Netbus", "BDS/Netbus.20.F", "Trojan[Backdoor]/Win32.NBSpy", "Backdoor:Win32/Netbus.C", "Backdoor.Win32.NBSpy.b", "TrojanDropper.Injector", "Trj/CI.A", "Win32/Netbus.20.C", "W32/Netbus.20C!tr", "Win32/Backdoor.55f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "it", "Bologna", "server1bs.exodus.connexxa", "[", "." ]
[ 9, 9, 16, 1, 9, 9 ]
[ "The", "server", "replies", "with", "the", "actual", "malicious", "payload", ",", "which", "includes", "JavaScript", "code", ",", "a", "user-agent", "string", "and", "URLs", "controlled", "by", "the", "malware", "author", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Emulator", "and", "location", "conditions", "for", "the", "malware", "’", "s", "activity", "Check", "Point", "Mobile", "Threat", "Prevention", "customers", "are", "protected", "from", "Charger", "and", "similar", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16 ]
[ "The", "Korean", "malware", "Wroba", ",", "in", "addition", "to", "the", "traditional", "vector", "of", "infection", "via", "file-sharing", "services", ",", "spreads", "via", "alternative", "app", "stores", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "While", "there", "have", "been", "several", "Suckfly", "campaigns", "that", "infected", "organizations", "with", "the", "group's", "custom", "malware", "Backdoor.Nidiran,", "the", "Indian", "targets", "show", "a", "greater", "amount", "of", "post-infection", "activity", "than", "targets", "in", "other", "regions." ]
[ 16, 16, 16, 16, 16, 6, 14, 16, 16, 4, 16, 16, 6, 3, 11, 1, 16, 2, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "EITest:", "HoeflerText", "Popups", "Targeting", "Google", "Chrome", "Users", "Now", "Push", "RAT", "Malware" ]
[ 16, 1, 16, 16, 5, 13, 4, 16, 3, 11, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/ZAccess.zmv", "Win.Trojan.Autoit-452", "Trojan.Win32.Inject.eyew", "Trojan.Packed.23726", "Trojan.Win32.Inject.eyew", "Win32/Injector.Autoit.DG", "W32/Autoit.DG!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "Happy", "belated", "birthday", "to", "RIG", "exploit", "kit!", "First", "seen", "around", "April", "2014,", "RIG", "has", "been", "in", "the", "news", "several", "times", "over", "the", "past", "year." ]
[ 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 0, 8, 3, 16, 16, 16, 16, 16, 16, 12, 16, 16, 0, 8 ]
[ "As", "recorded", "in", "several", "other", "Ursnif", "campaigns", "reported", "since", "April", "2017,", "this", "Word", "document", "contains", "several", "obfuscated", "VBS", "files", "which", "load", "malicious", "DLLs", "through", "WMI." ]
[ 16, 16, 16, 16, 16, 6, 14, 16, 16, 0, 8, 16, 1, 9, 16, 16, 16, 1, 9, 16, 4, 12, 12, 12, 12 ]
[ "Describing", "this", "additional", "piece", "of", "code", "in", "detail", "is", "outside", "the", "scope", "of", "this", "analysis", "and", "may", "require", "a", "new", "dedicated", "blog", "post", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.VidroKDI.Worm", "Trojan-Dropper.Win32.Vidro!O", "Trojan.Vidro.S978560", "Dropper.Vedro.Win32.4", "Trojan/Dropper.Vidro.aei", "TROJ_KRYPTIK.SM", "Win32.Trojan-Downloader.Small.e", "W32/Trojan2.NPXJ", "Win32/Vidro.A", "TROJ_KRYPTIK.SM", "Win.Trojan.Vidro-11", "Trojan.Win32.Vidro.bcqjb", "Trojan.Win32.Inject.dc", "Trojan.Inject.8798", "BehavesLike.Win32.PWSZbot.qh", "Trojan-Dropper.Win32.Vidro", "W32/Trojan.SIZW-6937", "TrojanDropper.Vidro.ko", "Trojan/Win32.Diple", "TrojanDropper:Win32/Vidro.C", "Trojan.Heur.ED30AD", "Dropper.Vidro.32768", "Win-Trojan/Vidro.60416.B", "Trojan.Ahent.0322", "Trojan.Vidro", "Trojan.Vidro", "Win32/TrojanDownloader.Small.OXH", "Trojan.Diple!gc4cFvq58+U", "W32/P2PWorm.HO.worm", "Backdoor.Win32.Vidro.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "recently", "observed", "a", "new", "sample", "Detected", "by", "Trend", "Micro", "as", "TROJ_CVE20170199.JVU", "exploiting", "CVE-2017-0199", "using", "a", "new", "method", "that", "abuses", "PowerPoint", "Slide", "Show—the", "first", "time", "we", "have", "seen", "this", "approach", "used", "in", "the", "wild", "before." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 4, 12, 16, 1, 7, 1, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Starter.49160", "Trojan.Win32.Starter!O", "Trojan.Mauvaise.SL1", "Trojan/Starter.ast", "Win32.Trojan.FakeMicro.d", "Win32/Chekafe.N", "TROJ_STRTER.SMUK", "Win.Trojan.Starter-293", "Trojan.Win32.Starter.trq", "Trojan.Win32.Starter.brvob", "Trojan.Win32.Starter.65536.C", "TrojWare.Win32.Starter.clj", "Trojan.Starter.1524", "Trojan.Starter.Win32.261", "TROJ_STRTER.SMUK", "Trojan/Starter.fd", "TR/Starter.TV", "Trojan/Win32.Starter", "Trojan.Starter.1", "Trojan.Win32.Starter.trq", "Trojan:Win32/Chekafev.C", "Trojan/Win32.Starter.R1734", "Trojan.Starter", "Win32/Spy.Chekafev.AA", "Trojan.Starter!lzYxQhoD/t8", "Trojan.Win32.Starter" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dropper", "Waledac.M", "Win32.Waledac.b", "Trojan.Win32.Meredrop!IK", "Win32/Xema.worm.31232.I", "Trojan.Win32.Meredrop", "W32/Waledac.B!tr", "Injector.CD", "Trj/Downloader.MDW" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "UPDATE_PATTERNS", "–", "reregister", "in", "the", "administration", "panel", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom.Crowti.MUE.A6", "Ransom.Cerber", "Trojan.Zusy.D3175D", "Ransom.CryptXXX!g17", "Ransom_HPCRYPMIC.SM4", "Trojan.Win32.Z.Zusy.92672.FP", "Trojan.Encoder.5047", "Ransom_HPCRYPMIC.SM4", "TR/Crypt.Xpack.pzdls", "Ransom:Win32/Tovicrypt.A", "Trojan/Win32.CryptXXX.R185958", "Trojan-Ransom.Locky", "Win32/Trojan.f15" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "code", "responsible", "for", "this", "verification", "is", "shown", "in", "the", "following", "snippet", ":", "How", "it", "works", "When", "the", "malware", "is", "first", "started", "on", "the", "device", "it", "will", "begin", "by", "hiding", "its", "icon", "from", "the", "application", "drawer", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]