tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "Heur.Win32.VBKrypt.1!O", "Trojan/Dropper.VB.nxw", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Pws.BCWZ", "Win.Spyware.47661-2", "Trojan-Dropper.Win32.Dorifel.atjn", "Win32.Trojan-dropper.Dorifel.Akos", "TrojWare.Win32.VB.fmmu", "Trojan.DownLoader9.62284", "BehavesLike.Win32.Trojan.gh", "Trojan-Dropper.Win32.Duon", "W32/PWS.IDDR-8868", "Trojan.Heur.E019B0", "Trojan-Dropper.Win32.Dorifel.atjn", "Malware-Dropper.VB.WLCrypt" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Malware", "authors", "in", "the", "past", "have", "often", "coded", "a", "β€œ", "safety", "net", "”", "into", "their", "malware", "to", "prevent", "them", "from", "accidentally", "infecting", "their", "own", "computers", "and", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Some", "of", "the", "C2", "servers", "are", "located", "in", "Thailand", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "An", "example", "of", "the", "string", "which", "is", "sent", "to", "the", "command-and-control", "would", "be", "β€œ", "phone", "26.03.2013", "”", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Script.SWF.Cxx+.C173", "SWF.Kit.Angler.G", "Exploit-SWF.x", "Bloodhound.Flash.31", "SWF/Exploit.CVE-2015-3090.A", "SWF_EKSPLOYT.ED", "Swf.Packer.Angle-1", "Script.SWF.Cxx+.C173", "Script.SWF.Cxx+.C173", "Script.SWF.Cxx+.C173", "Script.SWF.Cxx+.C173", "Exploit.SWF.438", "SWF_EKSPLOYT.ED", "BehavesLike.Flash.Exploit.kb", "EXP/CVE-2015-3090.AU", "Exploit:SWF/Netis.B", "Script.SWF.Cxx+.C173", "Script.SWF.Cxx+.C173", "SWF.Win32.Script.800529", "Exploit.SWF", "SWF/ExKit.AQ!exploit" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "article", "will", "discuss", "the", "malware", "delivered", "from", "that", "exploit", "kit." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 16, 3, 11 ]
[ "]", "it", "Milano", "server2rc.exodus.connexxa", "[", "." ]
[ 9, 9, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Win32.VBNA.bvts", "Trojan.Win32.VB.exmtrp", "Win32.Worm.Vbna.Wqdi", "Trojan.MSILPerseus.D2341B", "Worm.Win32.VBNA.bvts", "Worm:Win32/Esfury.T", "TScope.Trojan.MSIL", "Trj/CI.A", "Win32/Trojan.Dropper.6ac" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "An", "old", "banking", "Trojan", "has", "been", "operating", "in", "Europe", "on", "a", "low", "level", "has", "spiked", "in", "activity", "after", "migrating", "to", "Japan." ]
[ 16, 16, 3, 11, 16, 16, 16, 16, 2, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 2 ]
[ "This", "article", "revolves", "around", "the", "macro", "tricks", "it", "uses", "to", "stall", "analysts,", "and", "new", "commands", "that", "it", "utilizes", "to", "better", "persist", "on", "infected", "devices." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 5, 13 ]
[ "Recently", "we", "were", "able", "to", "observe", "these", "actors", "making", "modifications", "to", "their", "ClaySlide", "delivery", "documents", "in", "an", "attempt", "to", "evade", "antivirus", "detection." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "After", "building", "an", "initial", "rapport", "with", "targets", ",", "the", "actors", "behind", "these", "social", "media", "accounts", "would", "instruct", "victims", "to", "install", "an", "additional", "app", "for", "easier", "communication", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "If", "an", "unsuspecting", "user", "grants", "these", "permissions", "(", "see", "Figure", "4", ")", ",", "the", "trojan", "can", "read", "any", "text", "displayed", "in", "any", "app", "the", "user", "may", "launch", "–", "and", "send", "it", "to", "the", "attackers", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Within", "this", "blog", "post,", "a", "payload", "containing", "a", "function", "named", "forkmeiamfamous'", "was", "mentioned." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 1, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Lewor.B@mm", "Win32.Lewor.B@mm", "Worm.Lewor.Win32.28", "W32/Lewor.b", "Win32.Lewor.E2C45E", "Win32.Trojan.WisdomEyes.16070401.9500.9944", "W32.HLLW.Leox", "Win32.Lewor.B@mm", "Win32.Lewor.B@mm", "Trojan.Win32.Lewor.gptp", "W32.W.Lewor.b!c", "Win32.Lewor.B@mm", "Win32.Lewor.B@mm", "Trojan.PWS.Legmir", "BehavesLike.Win32.Pykse.kc", "I-Worm/Lewor.b", "Worm:Win32/Lewor.B@mm", "W32/Lewor.AP.worm", "Worm.Lewor!B42TpjAm9iw", "Trojan-Banker.Win32.Banker", "W32/GamePSW.B@mm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "These", "threat", "actors", "frequently", "offer", "malicious", "apps", "purporting", "to", "be", "legitimate", "apps", "that", "are", "broadly", "used", "or", "important", "to", "a", "targeted", "population", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "exploit", "has", "since", "been", "added", "into", "the", "Angler", "Exploit", "Kit", "and", "integrated", "into", "Metasploit." ]
[ 3, 11, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojandownloader.Kagayab", "Trojan.Razy.D18A59", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "BehavesLike.Win32.Dropper.mm", "W32/Trojan.GGCJ-3154", "TrojanDownloader:Win32/Kagayab.A", "Trj/GdSda.A", "Win32/Trojan.a98" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.12BD", "Trojanspy.Babar", "Trojan.Badbar", "Win32.Trojan.Babar.A", "Trojan-Spy.Win32.Babar.a", "Trojan.Win32.Babar.dqhfcx", "Troj.Spy.W32!c", "Trojan.Babar.1", "Trojan.Babar.Win32.3", "BehavesLike.Win32.Trojan.fc", "TrojanSpy.Babar.c", "TR/AD.Babar.royis", "Trojan.Zusy.D42EE8", "PWS:Win32/Babar.A!dha", "Trj/GdSda.A", "Win32.Trojan-spy.Babar.Dwsy", "Win32/Trojan.Spy.8fc" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DaltetoD.Trojan", "Trojan/Fbphotofake.b", "Win32.Trojan.WisdomEyes.16070401.9500.9992", "HV_CARDPAY_CA222928.TOMC", "Win.Trojan.Ag-4254306-1", "Trojan-Dropper.Win32.FrauDrop.cth", "Trojan.Win32.Drop.mssht", "TrojWare.Win32.Downloader.Fraudload.AB", "Trojan.AVKill.14860", "Dropper.FrauDrop.Win32.3001", "BehavesLike.Win32.PWSZbot.fc", "Trojan.Win32.Fifesock", "W32.Malware.Downloader", "Trojan[Dropper]/Win32.FrauDrop", "Trojan-Dropper.Win32.FrauDrop.cth", "Trojan/Win32.CardPay.R21713", "TrojanDropper.FrauDrop" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Mauvaise.SL1", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Win32.Ddosaz.elmrbx", "TrojWare.Win32.ServStart.DQ", "Trojan.DownLoader23.31518", "BehavesLike.Win32.Backdoor.kh", "Trojan.Graftor.D53379", "Trojan:Win32/Ddosaz.A", "BScope.TrojanDDoS.Macri", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "was", "used", "to", "bypass", "2FA", "methods", "by", "intercepting", "the", "SMS", "messages", "coming", "from", "the", "bank", "and", "stealing", "the", "mTANs", "without", "the", "victim", "’", "s", "knowledge", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Palo", "Alto", "Networks", "has", "observed", "a", "recent", "high-threat", "spam", "campaign", "that", "is", "serving", "malicious", "macro", "documents", "used", "to", "execute", "PowerShell", "scripts", "which", "injects", "malware", "similar", "to", "the", "Ursnif", "family", "directly", "into", "memory." ]
[ 4, 12, 12, 16, 16, 16, 16, 3, 6, 14, 16, 16, 16, 3, 11, 1, 16, 16, 16, 1, 9, 16, 16, 3, 16, 16, 16, 3, 11, 7, 15, 15 ]
[ "A", "backdoor", "also", "known", "as:", "W32.WintaskLTE.Trojan", "Win32/Bancos.ABHY", "Trojan.Phisher.G", "Trojan.Dynamer.D9", "Trojan.Phisher.G", "Troj.PSW.PHP.AccPhish.lstI", "Win32.Trojan.WisdomEyes.16070401.9500.9987", "PHP/PSW.Phishack.AT", "Trojan.Phisher.G", "Trojan.Phisher.G", "Trojan.PWS.Stealer.895", "BehavesLike.Win32.PWSMmorpg.vc", "Trojan/PSW.VKont.pq", "TR/Spy.PHP.psb", "Trojan[PSW]/PHP.AccPhish.rr", "Trojan.Phisher.G", "Trojan:Win32/Phishacco.A", "Trojan.Phisher.G", "Trj/CI.A", "Php.Trojan-qqpass.Qqrob.Sxxq", "Trojan.PHP.PSW", "W32/AccPhish.EU!tr.pws", "Win32/Trojan.d71" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.TenoesaASN.Trojan", "Worm/W32.WBNA.102405", "Win32.Trojan.WisdomEyes.16070401.9500.9978", "Worm.Win32.WBNA.oaw", "Downloader.VB.Win32.98815", "BehavesLike.Win32.Downloader.cm", "Win32.Sality", "TR/AD.Maywidmzi.brqly", "TrojanDownloader:Win32/Maywidmzi.A", "Worm.Win32.WBNA.oaw", "Worm/Win32.WBNA.C1716518", "Worm.WBNA", "Trj/GdSda.A", "Win32/TrojanDownloader.VB.QXP", "Win32.Worm.Wbna.Ects", "Trojan.DL.VB!tTzkeI6oupQ" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Login", "details", "are", "sent", "to", "attackers", "using", "an", "HTTP", "GET", "connection", "ONLY", "once." ]
[ 16, 16, 16, 16, 16, 6, 16, 16, 1, 9, 9, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Lodap", "Trojan/Exploit.CVE-2010-2568.f", "TROJ_STUXNET.DX", "W32.Stuxnet", "TROJ_STUXNET.DX", "Win.Trojan.Stuxnet-36", "Exploit.Win32.CVE-2010-2568.b", "Exploit.Win32.CVE20102568f.bkuia", "Exploit.W32.CVE-2010-2568.f!c", "Win32.Exploit.Cve-2010-2568.Wopr", "Exploit.CVE.Win32.14", "Trojan.Win32.Exploit", "Trojan[Exploit]/Win32.CVE-2010-2568", "Exploit.Win32.CVE-2010-2568.b", "Exploit.Stuxnet", "Trj/ChymineLNK.A", "Win32/Exploit.CVE-2010-2568", "Win32/Trojan.Exploit.406" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "MrWhite", "can", "profile", "the", "victim", "systems", "for", "the", "presence", "of", "running", "POS", "software", "before", "dropping", "further", "POS", "payloads." ]
[ 3, 16, 1, 16, 5, 13, 16, 16, 1, 16, 16, 5, 13, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.48F3", "Trojan.Kazy.D8696E", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "TROJ_CRYPCTB.SME", "Troj.Downloader.W32.FraudLoad.kYSC", "TROJ_CRYPCTB.SME", "BehavesLike.Win32.Upatre.tc", "Trojan:Win32/Triflearch.B", "Trojan.FakeAV.01657", "Win32.Trojan.Crypt.Dzag", "Trojan.Win32.Crypt", "Win32/Trojan.8cf" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Malicious", "code", "identified,", "simple", "UDP", "DDoS", "attacks", "recorded." ]
[ 3, 11, 16, 1, 9, 9, 9, 16 ]
[ "If", "you", "follow", "the", "military", "analogy", "β€”", "those", "are", "the", "scouts", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "At", "line", "5", ",", "local", "variable", "v4", "specifies", "the", "first", "parameter", "url", ",", "which", "can", "be", "changed", "by", "the", "remote", "C2", "server", "later", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "steals", "sensitive", "information,", "such", "as", "cryptocurrency", "wallet", "data,", "from", "different", "applications", "and", "uses", "a", "file", "grabber", "for", "collecting", "a", "predefined", "list", "of", "file", "types,", "then", "exfiltrates", "them", "via", "Telegram." ]
[ 16, 1, 9, 9, 16, 16, 5, 13, 16, 16, 16, 5, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 5 ]
[ "Forcepoint", "Security", "Labsβ„’", "have", "observed", "today", "a", "major", "malicious", "email", "campaign", "from", "the", "Necurs", "botnet", "spreading", "a", "new", "ransomware", "which", "appears", "to", "call", "itself", "Jaff", "peaking", "within", "our", "telemetry", "at", "nearly", "5m", "emails", "per", "hour." ]
[ 4, 12, 12, 16, 16, 16, 16, 6, 14, 14, 14, 16, 3, 11, 11, 16, 16, 16, 3, 16, 16, 16, 16, 16, 3, 16, 16, 16, 5, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Downloader.Dapato.cjt", "Trojan.Kryptik!UYVcX29KF20", "W32/Krypt.DZ", "Trojan.Win32.Cleaman!IK", "TrojWare.Win32.Kryptik.ZLB", "Trojan.DownLoad2.49842", "TR/FakeAV.bzqra", "TrojanDownloader.Dapato.ace", "TrojanDownloader:Win32/Cred.B", "Trojan/Win32.Menti", "TrojanDownloader.Dapato.cfq", "Trojan.Win32.Cleaman", "W32/Kryptik.ACD!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "'s", "restarted", "in", "the", "next", "cycle", "independently", "based", "on", "if", "WhatsApp", "is", "running", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16 ]
[ "Machine", "translation", "of", "this", "tweet", "reads", ":", "β€œ", "Watch", "out", "for", "online", "banking", ":", "Emotet", "reloads", "TrickBot", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 3, 16 ]
[ "PwC's", "cyber", "security", "practice", "has", "worked", "closely", "with", "BAE", "Systems", "and", "other", "members", "of", "the", "security", "community,", "along", "with", "the", "UK's", "National", "Cyber", "Security", "Centre", "NCSC,", "to", "uncover", "and", "disrupt", "what", "is", "thought", "to", "be", "one", "of", "the", "largest", "ever", "sustained", "global", "cyber", "espionage", "campaigns", "in", "an", "operation", "referred", "to", "as", "Operation", "Cloud", "Hopper'." ]
[ 4, 12, 12, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 4, 12, 12, 16, 16, 4, 12, 12, 12, 12, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 14, 16, 16, 16, 16, 16, 16, 6, 14, 14 ]
[ "If", "some", "malware", "samples", "remain", "simple", "see", "my", "previous", "diary,", "others", "try", "to", "install", "malicious", "files", "in", "a", "smooth", "way", "to", "the", "victim", "computers." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Kazy.D55679", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Trojan.Win32.Starter.cuyepr", "Trojan.Starter.2890", "BehavesLike.Win32.Trojan.vm", "Trojan.Dropper", "MSIL/Injector.WSX!tr", "Win32/Trojan.e6d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "malware", "is", "not", "really", "advanced", "and", "is", "based", "on", "a", "lot", "of", "copy/paste", "from", "public", "sources", "available", "on", "the", "Internet", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Among", "their", "most", "notable", "presumed", "targets", "are", "the", "American", "Democratic", "National", "Committee,", "the", "German", "parliament", "and", "the", "French", "television", "network", "TV5Monde." ]
[ 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 12, 12, 12, 12, 16, 4, 12, 12, 12, 12 ]
[ "]", "today", "svcws", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "Enterprise", "and", "government", "employees", "all", "use", "these", "devices", "in", "their", "day-to-day", "work", ",", "which", "means", "IT", "and", "security", "leaders", "within", "these", "organizations", "must", "prioritize", "mobile", "in", "their", "security", "strategies", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "BlackEnergy", "is", "a", "Trojan", "that", "was", "created", "by", "a", "hacker", "known", "as", "Cr4sh." ]
[ 6, 16, 16, 3, 16, 16, 16, 16, 16, 6, 16, 16, 6 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Sylavriu", "BKDR_SYLAVRIU.SM", "Win32.Trojan.WisdomEyes.16070401.9500.9996", "Trojan.Zbot", "BKDR_SYLAVRIU.SM", "Win.Trojan.Torct-1", "W32.Trojan.Torct", "Trojan/MSIL.Crypt", "Trojan.MSIL.Krypt.2", "Backdoor:MSIL/Sylavriu.A", "Dropper/Win32.Adminuser.R118179", "Trojan.MSIL.Crypt", "Trojan.Crypt!ZlAnMaNuAFw", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "However", ",", "a", "few", "PHA", "authors", "spend", "substantial", "effort", ",", "time", ",", "and", "money", "to", "create", "and", "install", "their", "harmful", "app", "on", "one", "or", "a", "very", "small", "number", "of", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "addition", ",", "it", "collects", "identifiers", "and", "some", "data", "from", "the", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Tricky", "Configurations", "TrickMo", "uses", "the", "shared", "preferences", "mechanism", "to", "store", "settings", "and", "data", "that", "the", "malware", "uses", "at", "runtime", "." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "uses", "the", "base", "Dalvik", "User-Agent", "string", "for", "the", "device", "it", "’", "s", "running", "on", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win32.Redsip!O", "Trojandropper.Redsip", "Backdoor.Redsip.k", "Backdoor.Redsip.Win32.8", "Backdoor/Redsip.k", "Win32.Trojan.WisdomEyes.16070401.9500.9970", "W32/Backdoor2.HIOH", "Hacktool.Keylogger", "Win32/Redsip.A", "Backdoor.Win32.Redsip.a", "Trojan.Win32.Redsip.dcevd", "Backdoor.Win32.A.Redsip.159744", "Backdoor.W32.Redsip.k!c", "BehavesLike.Win32.Ramnit.ct", "W32/Backdoor.VDXS-0842", "BDS/Redsip.B", "W32/Redsip.A!tr", "Trojan[Backdoor]/Win32.Redsip", "Backdoor.Win32.Redsip.a", "TrojanDropper:Win32/Redsip.B", "Trojan/Win32.Redsip.C245513", "Backdoor.Redsip", "Win32/Redsip.AA", "Win32.Backdoor.Redsip.Amvr", "Backdoor.Win32.Redsip" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Phony", "Tech", "Support", "Scams", "Now", "Target", "Macs" ]
[ 6, 14, 14, 1, 16, 16, 5 ]
[ "This", "sample", "only", "includes", "Dalvik", "bytecode", "and", "resources", "without", "any", "native", "libraries", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "first", "table", "contains", "205", "devices", "with", "some", "Linux", "properties", ";", "the", "second", "contains", "the", "specific", "memory", "addresses", "associated", "with", "them", "that", "are", "needed", "for", "successful", "exploitation", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Hexzone.bdlvxl", "Adware.Margoc", "MalCrypt.Indus!", "VirTool.Win32.Obfuscator.a", "Trojan:Win32/Procesemes.A.dll", "Trojan/Win32.Xema", "Adware.Margoc!rem" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom.Urausy.E4", "Ransom_Urausy.R038C0CB418", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Trojan.Ransomlock.Q", "Ransom_Urausy.R038C0CB418", "Trojan.Win32.Winlock.crahoz", "TrojWare.Win32.FakeAv.ASC", "Trojan.Winlock.9260", "Trojan/Foreign.shn", "Ransom:Win32/Urausy.E", "Trojan.Zusy.D10991", "Trojan/Win32.Foreign.R84961", "SScope.Malware-Cryptor.Hlux", "Win32/LockScreen.AQD", "Trojan.Win32.Urausy" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "addition,", "HummingBad", "installs", "fraudulent", "apps", "to", "increase", "the", "revenue", "stream", "for", "the", "fraudster." ]
[ 16, 16, 3, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 6 ]
[ "This", "can", "be", "packaged", "and", "\"", "sold", "''", "in", "many", "different", "ways", "to", "customers", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "can", "save", "an", "SMS", "message", "on", "the", "device", ",", "marking", "with", "β€œ", "internal", "”", "in", "the", "phone", "number", "field", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32/SillyDl.XXJ!packed", "Trojan-Dropper.Win32.Dorifel.acvt", "Trojan.DownLoader1.46415", "BehavesLike.Win32.Adware.cc", "TrojanDownloader:Win32/Plingky.A", "Trojan.Heur.EDD31E", "Trojan-Dropper.Win32.Dorifel.acvt", "Trojan-Downloader.Win32.Small", "W32/Dorifel.ACVT!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Clicker.BHO.ncx", "Trojan.Zbot", "Win32/TrojanClicker.BHO.NCX", "TROJ_SPNR.30BB13", "Trojan.Win32.Starter.amcr", "Trojan.Win32.Starter.dzdloa", "Win32.Trojan.Starter.Suef", "TROJ_SPNR.30BB13", "BehavesLike.Win32.Downloader.gh", "TR/Lickore.B.7", "W32/TrojanClicker_BHO.NCX", "PUP/Win32.Msbuyn.N640533768", "Trojan:Win32/Lickore.B", "Win32/Lickore.B", "Trojan-Clicker.BAHK", "Clicker.BAHK" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "command", "and", "control", "C&C", "communications", "for", "new", "variants", "use", "the", "same", "AES256", "encryption", "for", "any", "traffic", "to", "the", "attacker's", "server;", "in", "previous", "variants,", "only", "Base64", "encoding", "was", "used." ]
[ 16, 1, 9, 9, 9, 9, 11, 16, 3, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 1, 9, 16, 16 ]
[ "Disttrack", "is", "a", "multipurpose", "tool", "that", "exhibits", "worm-like", "behavior", "by", "attempting", "to", "spread", "to", "other", "systems", "on", "a", "local", "network", "using", "stolen", "administrator", "credentials." ]
[ 3, 16, 16, 16, 3, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 5, 13, 16, 1, 9, 9 ]
[ "Since", "the", "beginning", "of", "January", "2017,", "the", "BSI,", "as", "the", "national", "cyber", "security", "agency,", "has", "been", "in", "close", "contact", "with", "the", "German", "Bundestag,", "due", "to", "the", "network", "traffic", "of", "the", "German", "Bundestag." ]
[ 16, 16, 0, 8, 8, 8, 16, 4, 16, 4, 12, 12, 12, 12, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 16, 16, 5, 13, 16, 4, 12, 12 ]
[ "Additionally,", "when", "we", "searched", "for", "the", "decoded", "string", "value", "we", "found", "a", "single", "search", "engine", "result", "that", "pointed", "to", "a", "Pastebin", "page." ]
[ 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 5, 13, 16, 15, 16, 16, 1, 9, 9 ]
[ "First,", "Winnti", "uses", "Cobalt", "Strike", "to", "collect", "credentials", "and", "move", "laterally." ]
[ 16, 6, 16, 6, 14, 16, 16, 16, 16, 16, 16 ]
[ "At", "the", "time", "of", "investigation", "this", "malware", "was", "not", "correctly", "detected", "by", "any", "existing", "antivirus", "engines,", "and", "domains", "/", "IP", "s", "were", "not", "found", "in", "any", "commercial", "threat", "intelligence", "feeds." ]
[ 3, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 1, 16, 1, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Razy.D31A9", "Win32.Trojan.WisdomEyes.16070401.9500.9960", "TROJ_HOYGUNER.SM", "Trojan.Win32.Drop.dhxynu", "TROJ_HOYGUNER.SM", "Virus.MSIL", "W32.Trojan.Dropper", "Trojan:MSIL/Hoygunver.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DeadBeef.Worm", "Worm/W32.AutoRun.175104", "Worm.Win32.AutoRun!O", "Worm.AutoRun.Win32.8121", "W32/AutoRun.pv", "W32.SillyFDC", "Win32/Wainlas.A", "WORM_AUTORUN_000002c.TOMA", "Win.Worm.Autorun-1414", "Worm.Win32.AutoRun.pv", "Trojan.Win32.AutoRun.ltul", "Win32.Worm.Autorun.Tbim", "Worm.Win32.AutoRun.~MAA", "Win32.HLLW.Autoruner.748", "WORM_AUTORUN_000002c.TOMA", "Worm/AutoRun.bhu", "TR/Drop.AutoRun.BM", "Worm/Win32.AutoRun", "Worm.Win32.Autorun.12728", "Worm.Win32.AutoRun.pv", "Worm/Win32.AutoRun.R16694", "Worm.AutoRun", "Worm.Win32.AutoRun", "W32/AutoRun.NTQ!worm", "Trj/Debat.A", "Trojan.PSW.Win32.QQPass.CF" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "During", "the", "WannaCry", "pandemic", "attack,", "CyphortLabs", "discovered", "that", "other", "threat", "actors", "have", "been", "using", "the", "same", "EternalBlue", "exploit", "to", "deliver", "other", "malware." ]
[ 16, 16, 3, 1, 9, 4, 16, 16, 16, 4, 12, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 3 ]
[ "Although", "bitcoin", "miners", "have", "been", "used", "by", "cybercriminals", "before", "as", "a", "way", "to", "monetize", "their", "malicious", "activities,", "this", "recent", "sample", "MD5:", "522f8ba8b2dec299cc64c0ccf5a68000", "caught", "our", "attention", "because", "it", "is", "unusually", "heavy,", "persistent,", "and", "obfuscated." ]
[ 16, 3, 11, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.kowinHA.Worm", "Backdoor.Win32.Popwin!O", "Trojan.Heur.amuaxSBiYpji", "Win32.Trojan.WisdomEyes.16070401.9500.9769", "W32.Popwin", "Win32/Pipown.NW", "TROJ_NSPAK.A", "Trojan.Win32.Popwin.jgms", "Constructor.W32.VB.lgxd", "Backdoor.Win32.Popwin.~IQ", "Trojan.Popwin", "TROJ_NSPAK.A", "BehavesLike.Win32.Downloader.lc", "Trojan/PSW.GamePass.pjs", "Worm:Win32/Winko.A", "Backdoor.Popwin", "Worm.Win32.AutoRun", "W32/Winko.A!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "two", "0-days", "in", "question", "targeted", "Adobe", "Flash", "and", "were", "subsequently", "labeled", "CVE-2015-5119", "and", "CVE-2015-5122." ]
[ 16, 16, 7, 16, 16, 16, 5, 13, 16, 16, 16, 16, 1, 16, 1 ]
[ "TrickMo", "’", "s", "Persistence", "Capabilities", "When", "it", "comes", "to", "Android-based", "devices", ",", "many", "applications", "must", "find", "a", "way", "to", "run", "on", "the", "device", "after", "a", "system", "reboot", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Fakedos.A", "Backdoor.Fakedos!ktjmxmN20Kc", "W32/Backdoor.MDB", "Backdoor.Trojan", "BKDR_BACKDOOR4.B", "Backdoor.Win32.Fakedos.a", "Backdoor.Fakedos.A", "Backdoor.Fakedos.A", "Backdoor.Fakedos.A", "Email-Worm.Win32.GOPworm.196", "BDS/Fakedos.A.1", "BKDR_BACKDOOR4.B", "Win32.Hack.Fakedos.a.kcloud", "Backdoor.Fakedos.A", "W32/Backdoor.CVVK-7742", "Win-Trojan/Fakedos.94208", "TScope.Trojan.VB", "PE:Backdoor.Fakedos.a!1073830334", "BackDoor.Fakedos.C" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Check", "Point", "Software", "Hummingbad/Shedun", "infections", "by", "Android", "version", "." ]
[ 4, 12, 12, 3, 16, 16, 5, 16, 16 ]
[ "Example", "of", "traffic", "from", "an", "early", "version", "of", "Asacub", "(", "2015", ")", "The", "data", "transmitted", "and", "received", "is", "encrypted", "with", "the", "RC4", "algorithm", "and", "encoded", "using", "the", "base64", "standard", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "opens", "a", "socket", "on", "the", "victim", "’", "s", "machine", "and", "connects", "with", "a", "server-side", "component", "of", "the", "implant", "located", "at", "54.67.109.199:6500", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.44AD", "Win32.Virus.Downloader.Aojh", "Trojan-Downloader.Win32.Cekar", "W32/Noia.B", "Trj/CI.A", "Win32/Trojan.dd1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "Used", "in", "Pawn", "Storm", "to", "target", "certain", "foreign", "affairs", "ministries,", "the", "vulnerability", "identified", "as", "CVE-2015-7645", "represents", "a", "significant", "change", "in", "tactics", "from", "previous", "exploits." ]
[ 16, 16, 6, 14, 16, 16, 16, 4, 12, 12, 16, 7, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 7 ]
[ "Based", "on", "infrastructure", "overlaps", "and", "leaked", "information", ",", "we", "assess", "with", "high", "confidence", "that", "the", "malware", "we", "identified", "and", "present", "in", "this", "paper", "is", "linked", "to", "Wolf", "Research", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16 ]
[ "Then", "the", "application", "downloads", "java", "archive", "from", "the", "URL", "specified", "in", "json", ",", "dynamically", "loads", "it", "with", "class", "loader", "API", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "However", ",", "a", "simple", "Google", "search", "for", "the", "adware", "package", "name", "returned", "a", "β€œ", "TestDelete", "”", "project", "that", "had", "been", "available", "in", "his", "repository", "at", "some", "point", "The", "malicious", "developer", "also", "has", "apps", "in", "Apple", "’", "s", "App", "Store", "." ]
[ 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 5, 13, 16 ]
[ "Both", "of", "these", "types", "of", "fraud", "take", "advantage", "of", "mobile", "billing", "techniques", "involving", "the", "user", "’", "s", "carrier", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "Evidence", "Collector", "module", "is", "responsible", "for", "the", "spying", "routines", "outlined", "above", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "7", "–", "C2", "As", "seen", "in", "Figure", "8", ",", "this", "version", "of", "Anubis", "is", "built", "to", "run", "on", "several", "iterations", "of", "the", "Android", "operating", "system", ",", "dating", "back", "to", "version", "4.0.3", ",", "which", "was", "released", "in", "2012", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "So", "far", ",", "the", "attackers", "relied", "entirely", "on", "social", "engineering", "to", "infect", "the", "targets", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.D995", "Virus.Win32.Sality!O", "Backdoor.PMax", "Trojan.Win32.PMax.deplgs", "Backdoor.Win32.PMax.atcf", "MULDROP.Trojan", "BehavesLike.Win32.Downloader.mc", "W32/Poweliks.A!tr", "Trojan.Zusy.D19DC7", "Trojan/Win32.VBKrypt", "Trojan:Win32/Powessere.A", "Backdoor.PMax", "Trojan.Poweliks", "Trojan.Win32.Poweliks.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Over", "the", "past", "few", "months,", "the", "tr1adx", "team", "has", "been", "tracking", "a", "Threat", "Actor", "which", "we", "codenamed", "TelePort", "Crew." ]
[ 16, 16, 0, 8, 8, 16, 4, 12, 16, 16, 16, 16, 6, 14, 16, 16, 16, 6, 14 ]
[ "One", "method", ",", "which", "was", "popular", "in", "Germany", ",", "is", "known", "as", "mobile", "TAN", "(", "mTAN", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "campaign", "’", "s", "attack", "vector", "is", "also", "interesting", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "infection", "vector", "was", "a", "drive-by", "download", "attack,", "and", "the", "Check", "Points", "Threat-Cloud", "indicates", "some", "adult", "content", "sites", "served", "the", "malicious", "payload." ]
[ 7, 15, 15, 16, 16, 1, 9, 9, 16, 4, 12, 12, 12, 16, 16, 1, 9, 9, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Motd.A", "Backdoor.Motd.A", "Trojan.Win32.Malware.a", "Backdoor.Trojan", "Backdoor.Motd.A", "Backdoor.Win32.MOTD", "Backdoor.Motd.A", "Trojan.Win32.MOTD.glgl", "Troj.Spy.W32.Delf.mczC", "Backdoor.Motd.A", "Backdoor.Motd.A", "BackDoor.Motd", "Backdoor.MOTD.Win32.1", "BehavesLike.Win32.Ipamor.hh", "Backdoor.Win32.Y3KRat", "Trojan[Backdoor]/Win32.MOTD", "Backdoor.Motd.A", "Backdoor.Win32.MOTD", "Trojan.Win32.Malware.a", "Backdoor.MOTD" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "CloudDuke", "also", "greatly", "expands", "on", "the", "Duke", "group's", "usage", "of", "cloud", "storage", "services,", "specifically", "Microsoft's", "OneDrive,", "as", "a", "channel", "for", "both", "command", "and", "control", "as", "well", "as", "the", "exfiltration", "of", "stolen", "data." ]
[ 3, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 1, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Crypt.CG", "Downloader.Vidlo.Win32.11", "Backdoor.W32.IRCBot.mA1F", "Trojan.Crypt.CG", "Win32.Trojan.WisdomEyes.16070401.9500.9959", "W32/Downloader.PQKB-6890", "Win32/InjectDown.B", "TROJ_DLOADER.JR", "Win.Downloader.Small-886", "Trojan-Downloader.Win32.Vidlo.k", "Trojan.Crypt.CG", "Trojan.Crypt.CG", "TrojWare.Win32.TrojanDownloader.Vidlo.K", "Trojan.Crypt.CG", "Trojan.DownLoader.3548", "TROJ_DLOADER.JR", "Packer.Win32.Mondera", "W32/Downloader.BEC", "TrojanDownloader.Small.zu", "TR/Dldr.Vidlo.K", "Trojan[Downloader]/Win32.Vidlo", "Win32.Troj.Vidlo.k.kcloud", "TrojanDownloader:Win32/Vidlo.I", "Trojan.Win32.A.Downloader.3584.CB", "Trojan-Downloader.Win32.Vidlo.k", "Trojan.Crypt.CG", "Trojan.Crypt.CG", "TScope.Malware-Cryptor.SB", "Win32/TrojanDownloader.Vidlo.K" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "All", "the", "text", "is", "then", "copied", "and", "-", "again", "hidden", "in", "the", "background", "-", "sent", "to", "a", "foreign", "server." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Just", "like", "the", "old-school", "mail", "worms", "that", "used", "the", "victim", "'s", "address", "book", "to", "select", "the", "next", "victims", ",", "this", "banking", "trojan", "'s", "activation", "cycle", "includes", "the", "exfiltration", "of", "the", "victim", "'s", "address", "book", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Black.r5", "Trojan.Win32.Black.deckbe", "Backdoor.Vinself.C", "Win32/Leouncia.D", "TROJ_ORCARAT.A", "Packed.Win32.Black.d", "Packed.Win32.Aspack.AB", "Trojan.DownLoader11.40855", "Trojan.Packed.Win32.43496", "TROJ_ORCARAT.A", "BehavesLike.Win32.Dropper.fc", "W32/Trojan.QUXL-7354", "Packed.Black.ahku", "W32/Black.D!tr", "Trojan.Heur.wuXa774c9jj", "Packer.W32.Black.d!c", "VirTool:Win32/Obfuscator.XY", "Win32.Packed.Black.Ebzx", "Trojan-Downloader.Win32.Banload", "Trojan.Win32.Black.d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Upon", "successful", "exploitation,", "a", "new", "process", "is", "created", "with", "the", "PE", "file", "embedded", "in", "the", "uploadpref.dat", "file." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.ScriptKD.6648", "Trojan.Tiggre", "Trojan.ScriptKD.6648", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan-Downloader.VBS.Small.l", "Trojan.Script.Small.dczplj", "Trojan.ScriptKD.6648", "Tool.BtcMine.1036", "BehavesLike.Win32.AdwareLinkury.hc", "W32/Trojan.LHYZ-8303", "Trojan[Downloader]/Win32.Betload", "TrojanDownloader:Win32/Streamto.A", "Zum.BitCoinMiner.1", "Trojan-Downloader.VBS.Small.l", "Zum.BitCoinMiner.1", "Trojan.ScriptKD.6648", "Trojan.ScriptKD.6648", "Trj/CI.A", "Trojan.Bitcoinminer", "Vbs.Trojan-downloader.Small.Stty", "Trojan-Downloader.VBS.Small.L", "Win32/Trojan.f11" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]