tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"Each",
"of",
"the",
"phishing",
"sites",
"contained",
"links",
"to",
"a",
"distribution",
"manifest",
",",
"which",
"contained",
"metadata",
"such",
"as",
"the",
"application",
"name",
",",
"version",
",",
"icon",
",",
"and",
"a",
"URL",
"for",
"the",
"IPA",
"file",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Clicker.BHO.ncs",
"Win32.Trojan.WisdomEyes.16070401.9500.9639",
"Win32/TrojanClicker.BHO.NCS",
"Win32.Trojan.Spnr.Pfjg",
"TrojWare.Win32.TrojanClicker.BHO.NCS",
"Dropper.BHO.Win32.500",
"TrojanDropper.BHO.pj",
"TR/Rogue.kdv.655157",
"Trojan[Dropper]/Win32.BHO",
"Trojan.Zusy.Elzob.D1C26",
"TrojanDropper:Win32/Hufysk.A",
"Dropper/Win32.BHO.R25331",
"TrojanDropper.BHO",
"Trojan-Dropper.Win32.Hufysk",
"W32/TrojanClicker_BHO.NCS",
"Trj/CI.A",
"Win32/Trojan.a73"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Overall",
",",
"it",
"has",
"a",
"fairly",
"common",
"feature",
"list",
",",
"but",
"it",
"is",
"expected",
"to",
"expand",
"in",
"future",
"updates",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Downloader.Msil.H",
"Trojan-Downloader.Win32.FraudLoad!O",
"Win32/SillyDl.YBL",
"Win.Downloader.134626-1",
"Trojan.Downloader.Msil.H",
"Trojan-Downloader.Win32.FraudLoad.iei",
"Trojan.Downloader.Msil.H",
"Trojan.Win32.A.Downloader.229376.FL",
"Trojan.Downloader.Msil.H",
"Win32.HLLW.Myscan.1",
"BehavesLike.Win32.BadFile.pm",
"Trojan[Downloader]/Win32.FraudLoad",
"TrojanDownloader:Win32/Hesto.A",
"Trojan-Downloader.Win32.FraudLoad.iei",
"Trojan.Downloader.Msil.H",
"TrojanDownloader.FraudLoad",
"Trojan.Downloader.Msil.H"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Packed.Win32.TDSS!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9885",
"Trojan.Win32.Drop.dajhso",
"Trojan.MulDrop5.32960",
"Trojan/PSW.LdPinch.adoe",
"Backdoor:Win32/Nosrawec.A",
"Trojan.Delf.279",
"Backdoor.W32.Beastdoor.l7a6",
"Trojan/Win32.Nosrawec.R198886",
"RiskWare.Tool.CK"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.SasfisQKC.Fam.Trojan",
"Trojan/W32.PornoBlocker.60928.F",
"TrojanDropper.Bamital.I3",
"Trojan/PornoBlocker.hhu",
"TROJ_BAMITAL.SM2",
"Win32.Trojan.Kryptik.ct",
"TROJ_BAMITAL.SM2",
"Win.Trojan.Ransom-740",
"Trojan-Ransom.Win32.PornoBlocker.hts",
"Trojan.Win32.PornoBlocker.bwvwe",
"Trojan.Hottrend",
"Trojan.PornoBlocker.Win32.1248",
"Trojan/PornoBlocker.axt",
"TR/Qhost.60928",
"Trojan[Ransom]/Win32.PornoBlocker",
"Trojan.VIZ.1",
"Trojan:Win32/Bamital.I",
"Trojan.SB.01742",
"Bck/Qbot.AO",
"Win32/Bamital.FA",
"Win32.Trojan.Pornoblocker.Lkxy",
"Trojan.PornoBlocker!v14Do0CXdgA",
"Win32/Trojan.3c3"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Adware",
"commonly",
"found",
"on",
"Play",
"collects",
"profits",
"from",
"ad",
"networks",
",",
"but",
"mobile",
"ransomware",
"inflicts",
"direct",
"harm",
"to",
"users",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"ATM",
"malware",
"is",
"not",
"new,",
"back",
"in",
"2013",
"and",
"2014",
"threats",
"like",
"Ploutus",
"or",
"PadPin",
"Tyupkin",
"were",
"used",
"to",
"empty",
"ATMs",
"in",
"Mexico,",
"Russia",
"and",
"other",
"countries,",
"but",
"SUCEFUL",
"offers",
"a",
"new",
"twist",
"by",
"targeting",
"the",
"cardholders."
] | [
3,
11,
16,
16,
16,
16,
16,
0,
16,
0,
16,
16,
3,
16,
3,
11,
16,
16,
16,
16,
5,
16,
2,
10,
16,
16,
2,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4
] |
[
"]",
"172",
"cdncool",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"As",
"an",
"active",
"threat",
"under",
"development,",
"we",
"decided",
"to",
"take",
"a",
"closer",
"look",
"at",
"this",
"RAT",
"to",
"understand",
"some",
"of",
"its",
"inner",
"workings",
"and",
"capabilities."
] | [
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9980",
"Trojan.Win32.Zusy.rjrdd",
"TrojWare.Win32.TrojanDownloader.Murlo.~JH2",
"Trojan.Sasfis.Win32.30609",
"Trojan/Sasfis.xqr",
"TR/Zusy.3171.28",
"Trojan/Win32.Sasfis",
"Trojan.Zusy.DC63",
"Backdoor:Win32/Usinec.A",
"Trojan/Win32.Sasfis.C97816",
"Trojan.Sasfis",
"Trojan.Sasfis!LKZhl2Eyglg",
"Trojan.Win32.Sasfis"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Although",
"state-sponsored",
"attacks",
"against",
"the",
"United",
"States",
"by",
"Chinese",
"threat",
"actors",
"have",
"decreased",
"dramatically",
"since",
"the",
"signing",
"of",
"the",
"US-China",
"Cyber",
"Agreement",
"in",
"2016,",
"Proofpoint",
"researchers",
"have",
"continued",
"to",
"observe",
"advanced",
"persistent",
"threat",
"APT",
"activity",
"associated",
"with",
"Chinese",
"actors",
"targeting",
"other",
"regions."
] | [
16,
1,
9,
16,
2,
10,
10,
16,
6,
14,
14,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
0,
4,
12,
16,
16,
16,
16,
6,
14,
14,
14,
16,
16,
16,
6,
14,
16,
16,
2
] |
[
"They",
"mentioned",
"an",
"Android",
",",
"iOS",
"and",
"Windows",
"remote",
"access",
"tool",
"(",
"RAT",
")",
"."
] | [
16,
16,
16,
5,
16,
5,
16,
5,
16,
16,
16,
16,
16,
16,
16
] |
[
"With",
"each",
"new",
"version",
",",
"the",
"malware",
"adds",
"new",
"features",
"like",
"dynamic",
"library",
"loading",
",",
"encryption",
",",
"and",
"adjustments",
"to",
"different",
"locales",
"and",
"manufacturers",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Over",
"the",
"past",
"year",
"or",
"so,",
"we",
"have",
"seen",
"numerous",
"techniques",
"and",
"tactics",
"employed",
"by",
"this",
"campaign,",
"such",
"as",
"the",
"use",
"of",
"an",
"iOS",
"espionage",
"app,",
"and",
"the",
"inclusion",
"of",
"new",
"targets",
"like",
"the",
"White",
"House."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12
] |
[
"Cknife",
"is",
"a",
"Chinese",
"cross-platform",
"compatible",
"Java",
"web",
"shell",
"framework",
"—",
"that",
"operates",
"more",
"like",
"a",
"RAT",
"for",
"web",
"servers",
"—",
"based",
"on",
"China",
"Chopper."
] | [
3,
16,
16,
3,
11,
11,
11,
11,
11,
11,
16,
16,
16,
16,
16,
16,
3,
16,
5,
13,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Menti.184320.T",
"Trojan.Graftor.D557F",
"Win32.Trojan.Farfli.ai",
"Trojan.DownLoader6.3217",
"BehavesLike.Win32.BadFile.cm",
"Trojan.Win32.MMM",
"Trojan/Win32.Menti",
"PWS:Win32/Quopax.A!dll",
"Trojan.Win32.A.Menti.184320.YN",
"BScope.Trojan.SvcHorse.01643",
"Backdoor.Win32.Gh0st.EB"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"For",
"the",
"entry",
"point,",
"this",
"Locky",
"variant",
"uses",
"spam",
"emails",
"with",
".ZIP",
"file",
"attachments",
"that",
"contain",
"WSF",
"files."
] | [
16,
16,
1,
9,
16,
3,
11,
16,
1,
9,
9,
9,
9,
9,
16,
1,
9,
9
] |
[
"In",
"late",
"August,",
"WildFire",
"Locker",
"disappeared",
"after",
"the",
"organizations",
"behind",
"NoMoreRansom.org",
"were",
"able",
"to",
"seize",
"control",
"of",
"the",
"ransomware",
"s",
"Command",
"Control",
"servers."
] | [
16,
0,
8,
3,
11,
16,
16,
16,
4,
16,
1,
16,
16,
16,
16,
16,
16,
16,
3,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojanspy.Smetsb.FC.4036",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Trojan.MSIL.Krypt.4",
"Trojan/Win32.ZBot.R155926",
"Trojan.InfoStealer.KL"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"This",
"version",
"masquerades",
"as",
"CryptoWall."
] | [
16,
16,
16,
16,
3
] |
[
"It",
"’",
"s",
"also",
"worth",
"noting",
"that",
"both",
"campaigns",
"repackage",
"apps",
"that",
"are",
"commonly",
"used",
"in",
"their",
"target",
"’",
"s",
"countries",
",",
"such",
"as",
"Telegram",
",",
"Kik",
",",
"and",
"Plus",
"messaging",
"apps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
16,
16,
5,
16,
16,
16
] |
[
"Tick's",
"most",
"recent",
"attacks",
"have",
"concentrated",
"on",
"the",
"technology,",
"aquatic",
"engineering,",
"and",
"broadcasting",
"sectors",
"in",
"Japan."
] | [
3,
16,
16,
1,
16,
16,
16,
4,
12,
12,
12,
16,
4,
12,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.OnionDuke",
"W32/Trojan3.XZO",
"Trojan.Cozer.B",
"BKDR_COZER.LP",
"Backdoor.Win32.MiniDuke.cb",
"Trojan.Win32.AD.ekdqnf",
"Win32.Backdoor.Miniduke.Lplm",
"BackDoor.CozyDuke.49",
"BehavesLike.Win32.RansomwareLocky.gh",
"W32/Trojan.QFCN-8527",
"Backdoor.MiniDuke.av",
"TR/AD.OnionDuke.trltr",
"Backdoor.Win32.MiniDuke.cb",
"Backdoor.MiniDuke"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"FIN4",
"is",
"a",
"financially",
"motivated",
"threat",
"actor",
"which",
"has",
"consistently",
"targeted",
"this",
"population."
] | [
6,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16
] |
[
"To",
"lure",
"the",
"victims",
"to",
"download",
"the",
"malware",
",",
"threat",
"actors",
"use",
"SMS",
"phishing",
"–",
"sending",
"a",
"short",
"SMS",
"message",
"containing",
"a",
"malicious",
"URL",
"to",
"the",
"potential",
"victims",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"kill",
"switch",
"can",
"also",
"be",
"turned",
"on",
"by",
"SMS",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"newly",
"discovered",
"campaign",
"targets",
"the",
"Indian",
"Ministry",
"of",
"Defense",
"using",
"malicious",
"documents",
"as",
"lures"
] | [
16,
16,
16,
6,
16,
4,
12,
12,
12,
12,
16,
1,
9,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Recyl",
"Trojan.Injector.Win32.557110",
"Worm.Win32.Recyl.afr",
"BehavesLike.Win32.Dropper.rc",
"Worm.Recyl.v",
"TrojanDropper:Win32/Injector.D",
"Worm.Win32.Recyl.afr",
"Worm/Win32.Recyl.R213857",
"MalwareScope.Trojan-PSW.Game.16",
"Worm.Recyl!"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Instead",
"of",
"embedding",
"core",
"malware",
"payload",
"in",
"droppers",
",",
"the",
"actor",
"switches",
"to",
"a",
"more",
"low-key",
"SDK",
"approach",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"most",
"recent",
"FakeSpy",
"campaign",
"appears",
"to",
"target",
"users",
"of",
"postal",
"services",
"around",
"the",
"world",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Malware",
"code",
"showing",
"handover",
"from",
"initial",
"module",
"to",
"main",
"payload",
"Figure",
"13",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Uztuby.11",
"Trojan.Uztuby.11",
"Trojan.Uztuby.11",
"Trojan.Uztuby.11",
"Trojan.Win32.Delphi.elmrxd",
"Trojan.Uztuby.11",
"Trojan.Uztuby.11",
"backdoor.win32.fynloski.a",
"Backdoor/Win32.fynloski.pwi",
"Trojan.GUSX-6",
"TR/AD.AVKiller.reish",
"Win32/Remtasu.AI",
"Backdoor.NanoBot!",
"Trojan.Win32.Remtasu",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Small!O",
"Hacktool.Hashenfill",
"Trojan.Small.Win32.19365",
"Trojan.Win32.Small.cpa",
"Trojan.Win32.Small.cwxrxw",
"Troj.W32.Small.cpa!c",
"Trojan.Hooker.21682",
"BehavesLike.Win32.FakeAlert.xh",
"Trojan/Small.ouz",
"HackTool:Win32/Hashenfill.A",
"Trojan.Win32.Small.cpa",
"Trojan/Win32.Connapts.C256359",
"Trojan.Small",
"Win32.Trojan.Small.Dxcs",
"Trojan.Small!tZ/zbi7RotE",
"Win32/Trojan.d54"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"appears",
"the",
"entity",
"behind",
"this",
"campaign",
"took",
"steps",
"to",
"make",
"reverse",
"engineering",
"more",
"difficult",
"and",
"chose",
"the",
"use",
"of",
"Cisco's",
"AnyConnect",
"Client",
"as",
"a",
"lure",
"to",
"trick",
"victims",
"into",
"installing",
"the",
"malware."
] | [
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"Sample",
"2",
",",
"has",
"the",
"package",
"name",
"cn.android.setting",
"masquerading",
"as",
"Android",
"’",
"s",
"Settings",
"app",
",",
"which",
"has",
"a",
"similar",
"package",
"name",
"(",
"com.android.settings",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16
] |
[
"A",
"new",
"stealer",
"with",
"keylogging",
"and",
"clipper",
"capabilities",
"is",
"making",
"the",
"rounds",
"on",
"cybercrime",
"forums,",
"according",
"to",
"research",
"by",
"Uptycs",
"threat",
"research",
"team",
"and",
"Shilpesh",
"Trivedi",
"and",
"Tejaswini",
"Sandapolla."
] | [
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
4,
12,
12,
12,
16,
4,
12,
16,
4,
12
] |
[
"Our",
"team",
"went",
"ahead",
"and",
"hunted",
"for",
"samples",
"of",
"the",
"app",
"and",
"analyzed",
"it",
"in",
"our",
"labs",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9828",
"Trojan.Win32.Fsysna.csibjc",
"Trojan.DownLoader9.58423",
"BehavesLike.Win32.BadFile.mh",
"Trojan/Fsysna.anj",
"TR/Terzib.wrdas",
"Trojan:Win32/Terzib.A",
"Worm/Win32.Stration.R523",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"android.intent.action.PACKAGE_INSTALL",
"System",
"notification",
"that",
"the",
"download",
"and",
"eventual",
"installation",
"of",
"an",
"app",
"package",
"is",
"happening",
"(",
"this",
"is",
"deprecated",
")",
"android.intent.action.PACKAGE_ADDED",
"System",
"notification",
"that",
"a",
"new",
"app",
"package",
"has",
"been",
"installed",
"on",
"the",
"device",
",",
"including",
"the",
"name",
"of",
"said",
"package",
"."
] | [
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"As",
"the",
"team",
"at",
"Scandinavian",
"security",
"group",
"CSIS",
"describes",
",",
"malware",
"known",
"as",
"MazarBOT",
"is",
"being",
"distributed",
"via",
"SMS",
"in",
"Denmark",
"and",
"is",
"likely",
"to",
"also",
"be",
"encountered",
"in",
"other",
"countries",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"TUESDAY",
",",
"APRIL",
"9",
",",
"2019",
"Gustuff",
"banking",
"botnet",
"targets",
"Australia",
"EXECUTIVE",
"SUMMARY",
"Cisco",
"Talos",
"has",
"uncovered",
"a",
"new",
"Android-based",
"campaign",
"targeting",
"Australian",
"financial",
"institutions",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16
] |
[
"El",
"Machete",
"is",
"one",
"of",
"these",
"threats",
"that",
"was",
"first",
"publicly",
"disclosed",
"and",
"named",
"by",
"Kaspersky."
] | [
3,
11,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
4
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Lamer.K8",
"Trojan.Kryptik.Win32.801927",
"Trojan/Delf.nlr",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"WORM_GATE_GE2300D6.UVPA",
"Win.Trojan.Fileinfector-76",
"Trojan.Win32.Delphi.danila",
"Worm.Win32.Delf.DA",
"WORM_GATE_GE2300D6.UVPA",
"BehavesLike.Win32.Gate.tc",
"W32.Infector",
"Worm/Win32.Unknown",
"Worm:Win32/Gate.A",
"W32.Lamer.lwJ1",
"Spyware/Win32.Delf.C43787",
"W32/Gate.worm",
"Trojan.Cosmu",
"Win32/Delf.NLR",
"Worm.Delf!2LR1nmaG85k",
"Trojan-PWS.Win32.Delf"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"On",
"May",
"12,",
"at",
"the",
"onset",
"of",
"the",
"WannaCry",
"attack,",
"Cyphort",
"Labs",
"researchers",
"have",
"seen",
"a",
"similar",
"SMB",
"attack",
"to",
"one",
"of",
"our",
"honeypot",
"servers."
] | [
16,
0,
8,
16,
16,
16,
16,
16,
3,
1,
4,
12,
12,
16,
16,
16,
16,
1,
9,
16,
16,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Mramak.A",
"W32.Mkar.A4",
"Win32.Mramak.A",
"Win32.Mramak.A",
"Win32.Trojan.WisdomEyes.16070401.9500.9981",
"W32/Mkar.PJKY-3509",
"W32.Marak",
"Win.Trojan.Mkar-3",
"Win32.Mramak.A",
"Virus.Win32.Mkar.b",
"Win32.Mramak.A",
"Virus.Win32.Packed.deljve",
"Win32.Mrak.A",
"Win32.Mramak.A",
"Win32.HLLP.Mrak.10",
"BehavesLike.Win32.Dropper.mc",
"W32/Mkar.L",
"W32/Mkar.b.Dropper",
"Worm:Win32/Mkar.B",
"Virus.Win32.Mkar.b",
"Malware/Win32.Mkar.C408081",
"Win32/Mkar.B",
"Win32.Virus.Mkar.Agle"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Based",
"on",
"the",
"evolution",
"of",
"Ginp",
"it",
"is",
"clear",
"that",
"it",
"isn",
"’",
"t",
"based",
"on",
"Anubis",
",",
"but",
"rather",
"reuses",
"some",
"of",
"its",
"code",
"."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Screenshots",
"from",
"this",
"developer",
"’",
"s",
"YouTube",
"video",
"shows",
"history",
"of",
"checking",
"Ashas",
"adware",
"on",
"Google",
"Play",
"ESET",
"telemetry",
"Figure",
"15",
"."
] | [
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
3,
16,
16,
5,
13,
4,
16,
16,
16,
16
] |
[
"Fraud",
"Both",
"of",
"the",
"billing",
"methods",
"detailed",
"above",
"provide",
"device",
"verification",
",",
"but",
"not",
"user",
"verification",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"attack",
"has",
"been",
"active",
"for",
"more",
"than",
"a",
"year",
"and",
"is",
"ongoing",
"elsewhere,",
"but",
"this",
"particular",
"infection",
"pathway",
"was",
"shut",
"down",
"when",
"the",
"site",
"operator",
"and",
"ad",
"network",
"were",
"notified",
"of",
"the",
"activity."
] | [
16,
1,
16,
16,
16,
16,
0,
8,
8,
8,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
12,
12,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"JS:Trojan.JS.Downloader.HZQ",
"Trojan.JS.Downloader.2455.A",
"JS/Nemucod.tm",
"JS/Downldr.HX2!Eldorado",
"JS.Downloader",
"JS/TrojanDownloader.Nemucod.DFV",
"JS_NEMUCOD.ELDSAUHG",
"JS:Trojan.JS.Downloader.HZQ",
"JS:Trojan.JS.Downloader.HZQ",
"Trojan.Script.Heuristic-js.iacgm",
"JS.S.Downloader.1658",
"JS:Trojan.JS.Downloader.HZQ",
"JS:Trojan.JS.Downloader.HZQ",
"Trojan.DownLoader25.3813",
"JS_NEMUCOD.ELDSAUHG",
"JS/Nemucod.tm",
"JS/Downldr.HX2!Eldorado",
"Trojan[Downloader]/JS.Nemucod.dfv",
"JS:Trojan.JS.Downloader.HZQ",
"JS/Obfus.S237",
"Trojan-Dowloader.JS.Nemucod",
"JS/Nemucod.DFV!tr.dldr",
"Win32/Trojan.Downloader.50a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"said",
"exploits",
"will",
"root",
"the",
"device",
"and",
"install",
"a",
"shell",
"backdoor",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"However",
",",
"this",
"time",
",",
"the",
"permission",
"is",
"actually",
"used",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"allocates",
"and",
"fills",
"four",
"chunks",
"of",
"memory",
"inside",
"the",
"service",
"process",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"MITRE",
"TAGS",
"Action",
"Tag",
"ID",
"App",
"auto-start",
"at",
"device",
"boot",
"T1402",
"Input",
"prompt",
"T1411",
"Capture",
"SMS",
"messages",
"T1412",
"Application",
"discovery",
"T1418",
"Capture",
"audio",
"T1429",
"Location",
"tracking",
"T1430",
"Access",
"contact",
"list",
"T1432",
"Access",
"call",
"log",
"T1433",
"Commonly",
"used",
"port",
"T1436",
"Standard",
"application",
"layer",
"protocol",
"T1437",
"Masquerage",
"as",
"legitimate",
"application",
"T1444",
"Suppress",
"application",
"icon",
"T1508",
"Capture",
"camera",
"T1512",
"Screen",
"capture",
"T1513",
"Foreground",
"persistence",
"T1541",
"DualToy",
":",
"New",
"Windows",
"Trojan",
"Sideloads",
"Risky",
"Apps",
"to",
"Android",
"and",
"iOS",
"Devices",
"By",
"Claud",
"Xiao",
"September",
"13",
",",
"2016",
"at",
"5:00",
"AM",
"Over",
"the",
"past",
"two",
"years",
",",
"we",
"’",
"ve",
"observed",
"many",
"cases",
"of",
"Microsoft",
"Windows",
"and",
"Apple",
"iOS",
"malware",
"designed",
"to",
"attack",
"mobile",
"devices",
"."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
5,
16,
16,
16,
16,
16,
5,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.MSILInject.A4",
"TROJ_NECURS.SMJ6",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Backdoor.Trojan",
"Win32/Inject.fcAMLbC",
"TROJ_NECURS.SMJ6",
"Trojan.MSIL.Inject.aqjr",
"Trojan.Win32.Inject.ddhqep",
"Troj.Dropper.W32.Injector.m7mC",
"TrojWare.Win32.Zusy.XYN",
"Trojan.Inject1.44093",
"Trojan.Win32.Inject",
"TR/Zusy.xynynabm",
"Trojan/Win32.Inject",
"Trojan.Zusy.D1889E",
"Trojan.MSIL.Inject.aqjr",
"Trojan:MSIL/Injector.P",
"Dropper/Win32.Necurs.R121870",
"Trojan.Inject",
"Trojan.Injector",
"Trojan.Injector!AbCu/r2al/E",
"MSIL/Injector.ERR!tr",
"Win32/Trojan.304"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"targeting",
"is",
"also",
"consistent",
"with",
"previous",
"attacker",
"TTPs;",
"Ke3chang",
"historically",
"targeted",
"the",
"Ministry",
"of",
"Affairs,",
"and",
"also",
"conducted",
"several",
"prior",
"campaigns",
"against",
"India."
] | [
16,
16,
16,
16,
16,
16,
16,
6,
16,
3,
16,
16,
4,
12,
12,
12,
16,
16,
16,
16,
16,
6,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Pws.Gadu.L",
"Trojan-PSW.Win32.Gadu!O",
"TrojanPWS.Gadu",
"Trojan/PSW.Gadu.l",
"W32/PWStealer.FCG",
"Backdoor.Trojan",
"Win.Spyware.8306-2",
"Trojan.Pws.Gadu.L",
"Trojan-PSW.Win32.Gadu.l",
"Trojan.Pws.Gadu.L",
"Trojan.Win32.Gadu.wwgc",
"Trojan.Win32.PSWGadu.197820",
"Troj.Psw.W32!c",
"Trojan.Pws.Gadu.L",
"Trojan.PWS.Gadu",
"Trojan.Gadu.Win32.1",
"BehavesLike.Win32.Trojan.cc",
"W32/PWS.FWUF-5609",
"Trojan/PSW.Gadu.a",
"Trojan[PSW]/Win32.Gadu",
"Win32.PSWTroj.Gadu.g.kcloud",
"Trojan.Pws.Gadu.L",
"Trojan-PSW.Win32.Gadu.l",
"PWS:Win32/Gadu.H",
"Trojan/Win32.Xema.C89273",
"TrojanPSW.Gadu",
"Trojan.Pws.Gadu.L",
"Trojan.Pws.Gadu.L",
"Bck/Gadu.Q",
"Win32/PSW.Delf.OQP",
"Win32.Trojan-qqpass.Qqrob.Wxrk",
"Trojan.PWS.Gadu!8+g7gjB8P1Q",
"Trojan-PWS.Win32.Gadu",
"W32/Gadu.L!tr.pws",
"Win32/Trojan.3ea"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Figure",
"7",
"lists",
"the",
"IP",
"addresses",
"of",
"these",
"C2",
"servers",
",",
"the",
"number",
"of",
"RuMMS",
"apps",
"that",
"connect",
"to",
"each",
"of",
"them",
",",
"and",
"the",
"example",
"URL",
"used",
"as",
"the",
"first",
"parameter",
"of",
"the",
"HttpPost",
"operation",
"(",
"used",
"in",
"the",
"code",
"of",
"Figure",
"3",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"are",
"constantly",
"on",
"the",
"lookout",
"for",
"new",
"threats",
"and",
"we",
"are",
"expanding",
"our",
"protections",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"MSIL/Filecoder.EO",
"Trojan-Ransom.FileCoder",
"MSIL/Filecoder.EO!tr",
"Trojan.Ransom.MSIL.1",
"Trojan.Ransom.SureRansom",
"MSIL.Trojan-Ransom.SureRansom.A",
"Win32/Trojan.Ransom.935"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win32.Hupigon!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9960",
"Trojan.Malcol",
"Win32/Tnega.bcLXSH",
"Trojan.Win32.Slym.cufsch",
"Troj.Rogue.lC4c",
"Backdoor.Win32.Hupigon.rgqw",
"Trojan.DownLoader11.11699",
"BehavesLike.Win32.Backdoor.vh",
"TR/Rogue.kdv.679349",
"Packed.Win32.MalPackedSN",
"Win32.Application.PUPStudio.A",
"Unwanted/Win32.HackTool.R40115",
"Spyware.OnlineGames"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"the",
"course",
"of",
"further",
"research",
",",
"we",
"found",
"a",
"number",
"of",
"related",
"samples",
"that",
"point",
"to",
"a",
"long-term",
"development",
"process",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.ShizNHm.Trojan",
"Ransom.TeslaCrypt.WR4",
"Trojan/Spy.Shiz.nct",
"Ransom_HPLOCKY.SM1",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Ransom_HPLOCKY.SM1",
"Win.Trojan.Blocker-380",
"Trojan.Win32.Shifu.jt",
"Trojan.Win32.Blocker.dxvhyb",
"Packer.W32.Tpyn.toCt",
"Trojan.DownLoader17.27888",
"Trojan.Blocker.Win32.32151",
"BehavesLike.Win32.Ransomware.hz",
"Trojan.Win32.Pariham",
"Trojan.Blocker.iv",
"TR/Crypt.Xpack.whza",
"Trojan[Ransom]/Win32.Blocker",
"Ransom.Locky/Variant",
"Trojan.Win32.Shifu.jt",
"Trojan:Win32/Pariham.A",
"Hoax.Blocker",
"Trojan.Shifu",
"Win32/Spy.Shiz.NCT",
"Win32.Trojan.Shifu.Eehh",
"Trojan.Blocker!epDzUGNGGeo",
"W32/Kryptik.EFAD!tr",
"Win32/Trojan.ff4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Rackcrypt",
"Trojan.Graftor.D5D262",
"Ransom_Rackcrypt.R002C0DKE17",
"Trojan.Win32.Z.Graftor.1886447",
"Ransom_Rackcrypt.R002C0DKE17",
"BehavesLike.Win32.FakeAlertSecurityTool.tc",
"Virus.Win32.Vundo",
"Trojan[Spy]/Win32.KeyLogger.dwl",
"Ransom:Win32/Rackcrypt.A",
"Trj/CI.A",
"Win32.Trojan.Dropper.Wsjz"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Dump",
"data",
"from",
"the",
"IMO",
"messenger",
"app",
"."
] | [
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"It",
"sends",
"all",
"of",
"this",
"data",
"to",
"the",
"C2",
"server",
"using",
"the",
"URL",
"ending",
"with",
"/servlet/AppInfos",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16
] |
[
"JS/Nemucod",
"usually",
"arrives",
"on",
"an",
"infected",
"machine",
"through",
"malicious",
"spam",
"emails",
"with",
".zip",
"extensions."
] | [
1,
16,
16,
16,
16,
16,
5,
16,
1,
9,
9,
9,
9,
9
] |
[
"Money",
"then",
"disappears",
"from",
"the",
"victim",
"’",
"s",
"account",
"and",
"is",
"cashed",
"in",
"without",
"the",
"owner",
"’",
"s",
"knowledge",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Although",
"it",
"claims",
"to",
"be",
"using",
"asymmetric",
"RSA-2048",
"to",
"encrypt",
"files,",
"it",
"is",
"making",
"use",
"of",
"symmetric",
"AES",
"instead."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16
] |
[
"Once",
"archive",
"is",
"loaded",
",",
"the",
"application",
"uses",
"reflection",
"api",
"to",
"call",
"methods",
"from",
"the",
"class",
"names",
"specified",
"in",
"the",
"json",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"performs",
"malicious",
"activities",
"such",
"as",
"reading",
"login",
"credentials,",
"accessing",
"files,",
"keylogging,",
"remote",
"desktop",
"control,",
"and",
"remote",
"control",
"of",
"compromised",
"machines."
] | [
3,
11,
16,
3,
11,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clod14e.Trojan.9d88",
"Irc.Worm.Golember.V",
"Worm/W32.Golember.34816",
"I-Worm.Golember.v.n3",
"Worm.Golember.Win32.8",
"Trojan/Golember.v",
"Worm.Golember!SM/OEFSeEEs",
"W32/Golember.P",
"IRC-Worm.Win32.Golember.v",
"Irc.Worm.Golember.V",
"Trojan.Win32.Golember.furx",
"Irc.Worm.Golember.V",
"Worm.Win32.Golember.V",
"Irc.Worm.Golember.V",
"BehavesLike.Win32.Dropper.nc",
"W32/Golember.YQQU-9034",
"I-Worm/Golember.e",
"Worm/Irc.Golember.V",
"Worm[IRC]/Win32.Golember",
"Worm.Golember.v.kcloud",
"Worm:Win32/Flip.A",
"Irc.Worm.Golember.V",
"Win32/Golember.worm.34816",
"IRCWorm.Golember",
"Win32/Golember.V",
"Win32.Worm-irc.Golember.Aojg",
"IRC/ROSYA.V!worm",
"IRC-Worm/Golember.O",
"Worm.Win32.Golember.AxNU"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"To",
"be",
"distributed",
"outside",
"the",
"app",
"store",
",",
"an",
"IPA",
"package",
"must",
"contain",
"a",
"mobile",
"provisioning",
"profile",
"with",
"an",
"enterprise",
"’",
"s",
"certificate",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HEUR_PDF.D2",
"PDF/Trojan.SHCJ-8",
"possible-Threat.PDF.Acmd"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm/W32.Mintal.309248",
"W32/Mintal.003",
"Trojan.Win32.Mintal.hgbj",
"W32.Mintal.Worm",
"Win32/Howeem.A",
"Email-Worm.Win32.Mintal.003",
"I-Worm.Mintal!SHAyifSwe/s",
"I-Worm.Win32.A.Mintal.309248[h]",
"Worm.Win32.Howeem.A",
"Win32.HLLM.Hwm.3",
"Worm.Mintal.Win32.1",
"W32/Howeem.worm",
"W32/Risk.CCZK-5590",
"I-Worm/Mintal.003",
"WORM/Mintal.003.A",
"Worm[Email]/Win32.Mintal",
"W32.W.Mintal.003!c",
"Win32/Mintal.worm.309248",
"Worm:Win32/Mintal.A@mm",
"W32/Howeem.worm",
"Worm.Mintal",
"Worm.Win32.Mintal.Ao",
"Win32.Worm-email.Mintal.Hxqd"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Lizarbot.FC.2716",
"Backdoor.IRCBot",
"BKDR_LIZARBOT.SMVJ18",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"W32/Trojan.QJOG-5659",
"Backdoor.IRC.Bot",
"BKDR_LIZARBOT.SMVJ18",
"Win.Trojan.Lizarbot-1",
"MSIL.Trojan.IRCBot.I",
"Trojan.DownLoader24.64862",
"Trojan.Zusy.D3A924",
"Backdoor:MSIL/Lizarbot.A",
"Trojan/Win32.Bladabindi.C230655",
"Trj/CI.A",
"Trojan.MSIL.IRCBot",
"Win32/Trojan.158"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.FA61",
"Trojan.Zonidel",
"Win32.Trojan.WisdomEyes.16070401.9500.9990",
"Backdoor.Trojan",
"Win32/TrojanDownloader.Wauchos.CY",
"BKDR_ANDROM.YYSMQH",
"Trojan.Win32.Zonidel.bko",
"Trojan.Win32.Wauchos.eujxed",
"Win32.Trojan.Zonidel.Agux",
"Trojan.DownLoader25.48331",
"BehavesLike.Win32.Backdoor.fm",
"W32/Trojan.EGNB-8448",
"Malicious_Behavior.SB",
"Trojan/Win32.Zonidel",
"Trojan.Win32.Zonidel.bko",
"Trojan:Win32/Koneqzu.A",
"Trojan/Win32.Zonidel.C2210520",
"Trojan.PasswordStealer",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Bart",
"has",
"a",
"payment",
"screen",
"like",
"Locky",
"but",
"encrypts",
"files",
"without",
"first",
"connecting",
"to",
"a",
"command",
"and",
"control",
"C",
"C",
"server."
] | [
3,
16,
16,
1,
9,
16,
3,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9
] |
[
"The",
"transaction",
"would",
"only",
"be",
"authorized",
"after",
"the",
"client",
"enters",
"the",
"TAN",
"into",
"the",
"online",
"banking",
"website",
"in",
"their",
"browser",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Vetor.PE",
"Virus.Win32.Virut.1!O",
"W32.Virut.G",
"Virus.Virut.Win32.27",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"W32.Virut.CF",
"Win32/Virut.17408",
"PE_VIRUX.A",
"Virus.Win32.Virut.ce",
"Virus.Win32.Virut.hpeg",
"PE_VIRUX.A",
"BehavesLike.Win32.AdwareYTBlock.mh",
"Trojan-Downloader.Win32.Dldwp",
"Win32/Virut.bn",
"Virus/Win32.Virut.ce",
"Win32.Virut.nf.53248",
"Virus.Win32.Virut.ce",
"Win32/Virut.F",
"Virus.Virut.06",
"Win32.Virut.E",
"Virus.Win32.Virut.tt",
"W32/Virut.CE",
"W32/Sality.AO",
"Virus.Win32.VirutChangeEntry.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"''",
"Package",
"permissions",
"The",
"trojan",
"declares",
"numerous",
"permissions",
"in",
"the",
"manifest",
",",
"from",
"which",
"we",
"should",
"highlight",
"the",
"BIND_DEVICE_ADMIN",
",",
"which",
"provides",
"nearly",
"full",
"control",
"of",
"the",
"device",
"to",
"the",
"trojan",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Risk.VHAX-4717",
"Backdoor.NetBus.svr",
"Win.Trojan.NBSpy-2",
"Backdoor.Win32.NBSpy.b",
"Trojan.Win32.Inject.cwlwfo",
"Backdoor.W32.NBSpy.b!c",
"BackDoor.NetBus",
"Backdoor.Win32.Netbus",
"BDS/Netbus.20.F",
"Trojan[Backdoor]/Win32.NBSpy",
"Backdoor:Win32/Netbus.C",
"Backdoor.Win32.NBSpy.b",
"TrojanDropper.Injector",
"Trj/CI.A",
"Win32/Netbus.20.C",
"W32/Netbus.20C!tr",
"Win32/Backdoor.55f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"it",
"Bologna",
"server1bs.exodus.connexxa",
"[",
"."
] | [
9,
9,
16,
1,
9,
9
] |
[
"The",
"server",
"replies",
"with",
"the",
"actual",
"malicious",
"payload",
",",
"which",
"includes",
"JavaScript",
"code",
",",
"a",
"user-agent",
"string",
"and",
"URLs",
"controlled",
"by",
"the",
"malware",
"author",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Emulator",
"and",
"location",
"conditions",
"for",
"the",
"malware",
"’",
"s",
"activity",
"Check",
"Point",
"Mobile",
"Threat",
"Prevention",
"customers",
"are",
"protected",
"from",
"Charger",
"and",
"similar",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16
] |
[
"The",
"Korean",
"malware",
"Wroba",
",",
"in",
"addition",
"to",
"the",
"traditional",
"vector",
"of",
"infection",
"via",
"file-sharing",
"services",
",",
"spreads",
"via",
"alternative",
"app",
"stores",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"While",
"there",
"have",
"been",
"several",
"Suckfly",
"campaigns",
"that",
"infected",
"organizations",
"with",
"the",
"group's",
"custom",
"malware",
"Backdoor.Nidiran,",
"the",
"Indian",
"targets",
"show",
"a",
"greater",
"amount",
"of",
"post-infection",
"activity",
"than",
"targets",
"in",
"other",
"regions."
] | [
16,
16,
16,
16,
16,
6,
14,
16,
16,
4,
16,
16,
6,
3,
11,
1,
16,
2,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"EITest:",
"HoeflerText",
"Popups",
"Targeting",
"Google",
"Chrome",
"Users",
"Now",
"Push",
"RAT",
"Malware"
] | [
16,
1,
16,
16,
5,
13,
4,
16,
3,
11,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/ZAccess.zmv",
"Win.Trojan.Autoit-452",
"Trojan.Win32.Inject.eyew",
"Trojan.Packed.23726",
"Trojan.Win32.Inject.eyew",
"Win32/Injector.Autoit.DG",
"W32/Autoit.DG!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"Happy",
"belated",
"birthday",
"to",
"RIG",
"exploit",
"kit!",
"First",
"seen",
"around",
"April",
"2014,",
"RIG",
"has",
"been",
"in",
"the",
"news",
"several",
"times",
"over",
"the",
"past",
"year."
] | [
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
0,
8,
3,
16,
16,
16,
16,
16,
16,
12,
16,
16,
0,
8
] |
[
"As",
"recorded",
"in",
"several",
"other",
"Ursnif",
"campaigns",
"reported",
"since",
"April",
"2017,",
"this",
"Word",
"document",
"contains",
"several",
"obfuscated",
"VBS",
"files",
"which",
"load",
"malicious",
"DLLs",
"through",
"WMI."
] | [
16,
16,
16,
16,
16,
6,
14,
16,
16,
0,
8,
16,
1,
9,
16,
16,
16,
1,
9,
16,
4,
12,
12,
12,
12
] |
[
"Describing",
"this",
"additional",
"piece",
"of",
"code",
"in",
"detail",
"is",
"outside",
"the",
"scope",
"of",
"this",
"analysis",
"and",
"may",
"require",
"a",
"new",
"dedicated",
"blog",
"post",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.VidroKDI.Worm",
"Trojan-Dropper.Win32.Vidro!O",
"Trojan.Vidro.S978560",
"Dropper.Vedro.Win32.4",
"Trojan/Dropper.Vidro.aei",
"TROJ_KRYPTIK.SM",
"Win32.Trojan-Downloader.Small.e",
"W32/Trojan2.NPXJ",
"Win32/Vidro.A",
"TROJ_KRYPTIK.SM",
"Win.Trojan.Vidro-11",
"Trojan.Win32.Vidro.bcqjb",
"Trojan.Win32.Inject.dc",
"Trojan.Inject.8798",
"BehavesLike.Win32.PWSZbot.qh",
"Trojan-Dropper.Win32.Vidro",
"W32/Trojan.SIZW-6937",
"TrojanDropper.Vidro.ko",
"Trojan/Win32.Diple",
"TrojanDropper:Win32/Vidro.C",
"Trojan.Heur.ED30AD",
"Dropper.Vidro.32768",
"Win-Trojan/Vidro.60416.B",
"Trojan.Ahent.0322",
"Trojan.Vidro",
"Trojan.Vidro",
"Win32/TrojanDownloader.Small.OXH",
"Trojan.Diple!gc4cFvq58+U",
"W32/P2PWorm.HO.worm",
"Backdoor.Win32.Vidro.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"recently",
"observed",
"a",
"new",
"sample",
"Detected",
"by",
"Trend",
"Micro",
"as",
"TROJ_CVE20170199.JVU",
"exploiting",
"CVE-2017-0199",
"using",
"a",
"new",
"method",
"that",
"abuses",
"PowerPoint",
"Slide",
"Show—the",
"first",
"time",
"we",
"have",
"seen",
"this",
"approach",
"used",
"in",
"the",
"wild",
"before."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
4,
12,
16,
1,
7,
1,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Starter.49160",
"Trojan.Win32.Starter!O",
"Trojan.Mauvaise.SL1",
"Trojan/Starter.ast",
"Win32.Trojan.FakeMicro.d",
"Win32/Chekafe.N",
"TROJ_STRTER.SMUK",
"Win.Trojan.Starter-293",
"Trojan.Win32.Starter.trq",
"Trojan.Win32.Starter.brvob",
"Trojan.Win32.Starter.65536.C",
"TrojWare.Win32.Starter.clj",
"Trojan.Starter.1524",
"Trojan.Starter.Win32.261",
"TROJ_STRTER.SMUK",
"Trojan/Starter.fd",
"TR/Starter.TV",
"Trojan/Win32.Starter",
"Trojan.Starter.1",
"Trojan.Win32.Starter.trq",
"Trojan:Win32/Chekafev.C",
"Trojan/Win32.Starter.R1734",
"Trojan.Starter",
"Win32/Spy.Chekafev.AA",
"Trojan.Starter!lzYxQhoD/t8",
"Trojan.Win32.Starter"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dropper",
"Waledac.M",
"Win32.Waledac.b",
"Trojan.Win32.Meredrop!IK",
"Win32/Xema.worm.31232.I",
"Trojan.Win32.Meredrop",
"W32/Waledac.B!tr",
"Injector.CD",
"Trj/Downloader.MDW"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"UPDATE_PATTERNS",
"–",
"reregister",
"in",
"the",
"administration",
"panel",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom.Crowti.MUE.A6",
"Ransom.Cerber",
"Trojan.Zusy.D3175D",
"Ransom.CryptXXX!g17",
"Ransom_HPCRYPMIC.SM4",
"Trojan.Win32.Z.Zusy.92672.FP",
"Trojan.Encoder.5047",
"Ransom_HPCRYPMIC.SM4",
"TR/Crypt.Xpack.pzdls",
"Ransom:Win32/Tovicrypt.A",
"Trojan/Win32.CryptXXX.R185958",
"Trojan-Ransom.Locky",
"Win32/Trojan.f15"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"code",
"responsible",
"for",
"this",
"verification",
"is",
"shown",
"in",
"the",
"following",
"snippet",
":",
"How",
"it",
"works",
"When",
"the",
"malware",
"is",
"first",
"started",
"on",
"the",
"device",
"it",
"will",
"begin",
"by",
"hiding",
"its",
"icon",
"from",
"the",
"application",
"drawer",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.