tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"Heur.Win32.VBKrypt.1!O",
"Trojan/Dropper.VB.nxw",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Pws.BCWZ",
"Win.Spyware.47661-2",
"Trojan-Dropper.Win32.Dorifel.atjn",
"Win32.Trojan-dropper.Dorifel.Akos",
"TrojWare.Win32.VB.fmmu",
"Trojan.DownLoader9.62284",
"BehavesLike.Win32.Trojan.gh",
"Trojan-Dropper.Win32.Duon",
"W32/PWS.IDDR-8868",
"Trojan.Heur.E019B0",
"Trojan-Dropper.Win32.Dorifel.atjn",
"Malware-Dropper.VB.WLCrypt"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Malware",
"authors",
"in",
"the",
"past",
"have",
"often",
"coded",
"a",
"β",
"safety",
"net",
"β",
"into",
"their",
"malware",
"to",
"prevent",
"them",
"from",
"accidentally",
"infecting",
"their",
"own",
"computers",
"and",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Some",
"of",
"the",
"C2",
"servers",
"are",
"located",
"in",
"Thailand",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"An",
"example",
"of",
"the",
"string",
"which",
"is",
"sent",
"to",
"the",
"command-and-control",
"would",
"be",
"β",
"phone",
"26.03.2013",
"β",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Script.SWF.Cxx+.C173",
"SWF.Kit.Angler.G",
"Exploit-SWF.x",
"Bloodhound.Flash.31",
"SWF/Exploit.CVE-2015-3090.A",
"SWF_EKSPLOYT.ED",
"Swf.Packer.Angle-1",
"Script.SWF.Cxx+.C173",
"Script.SWF.Cxx+.C173",
"Script.SWF.Cxx+.C173",
"Script.SWF.Cxx+.C173",
"Exploit.SWF.438",
"SWF_EKSPLOYT.ED",
"BehavesLike.Flash.Exploit.kb",
"EXP/CVE-2015-3090.AU",
"Exploit:SWF/Netis.B",
"Script.SWF.Cxx+.C173",
"Script.SWF.Cxx+.C173",
"SWF.Win32.Script.800529",
"Exploit.SWF",
"SWF/ExKit.AQ!exploit"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"article",
"will",
"discuss",
"the",
"malware",
"delivered",
"from",
"that",
"exploit",
"kit."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
16,
3,
11
] |
[
"]",
"it",
"Milano",
"server2rc.exodus.connexxa",
"[",
"."
] | [
9,
9,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Win32.VBNA.bvts",
"Trojan.Win32.VB.exmtrp",
"Win32.Worm.Vbna.Wqdi",
"Trojan.MSILPerseus.D2341B",
"Worm.Win32.VBNA.bvts",
"Worm:Win32/Esfury.T",
"TScope.Trojan.MSIL",
"Trj/CI.A",
"Win32/Trojan.Dropper.6ac"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"An",
"old",
"banking",
"Trojan",
"has",
"been",
"operating",
"in",
"Europe",
"on",
"a",
"low",
"level",
"has",
"spiked",
"in",
"activity",
"after",
"migrating",
"to",
"Japan."
] | [
16,
16,
3,
11,
16,
16,
16,
16,
2,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
2
] |
[
"This",
"article",
"revolves",
"around",
"the",
"macro",
"tricks",
"it",
"uses",
"to",
"stall",
"analysts,",
"and",
"new",
"commands",
"that",
"it",
"utilizes",
"to",
"better",
"persist",
"on",
"infected",
"devices."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
5,
13
] |
[
"Recently",
"we",
"were",
"able",
"to",
"observe",
"these",
"actors",
"making",
"modifications",
"to",
"their",
"ClaySlide",
"delivery",
"documents",
"in",
"an",
"attempt",
"to",
"evade",
"antivirus",
"detection."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"After",
"building",
"an",
"initial",
"rapport",
"with",
"targets",
",",
"the",
"actors",
"behind",
"these",
"social",
"media",
"accounts",
"would",
"instruct",
"victims",
"to",
"install",
"an",
"additional",
"app",
"for",
"easier",
"communication",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"If",
"an",
"unsuspecting",
"user",
"grants",
"these",
"permissions",
"(",
"see",
"Figure",
"4",
")",
",",
"the",
"trojan",
"can",
"read",
"any",
"text",
"displayed",
"in",
"any",
"app",
"the",
"user",
"may",
"launch",
"β",
"and",
"send",
"it",
"to",
"the",
"attackers",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Within",
"this",
"blog",
"post,",
"a",
"payload",
"containing",
"a",
"function",
"named",
"forkmeiamfamous'",
"was",
"mentioned."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
1,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Lewor.B@mm",
"Win32.Lewor.B@mm",
"Worm.Lewor.Win32.28",
"W32/Lewor.b",
"Win32.Lewor.E2C45E",
"Win32.Trojan.WisdomEyes.16070401.9500.9944",
"W32.HLLW.Leox",
"Win32.Lewor.B@mm",
"Win32.Lewor.B@mm",
"Trojan.Win32.Lewor.gptp",
"W32.W.Lewor.b!c",
"Win32.Lewor.B@mm",
"Win32.Lewor.B@mm",
"Trojan.PWS.Legmir",
"BehavesLike.Win32.Pykse.kc",
"I-Worm/Lewor.b",
"Worm:Win32/Lewor.B@mm",
"W32/Lewor.AP.worm",
"Worm.Lewor!B42TpjAm9iw",
"Trojan-Banker.Win32.Banker",
"W32/GamePSW.B@mm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"These",
"threat",
"actors",
"frequently",
"offer",
"malicious",
"apps",
"purporting",
"to",
"be",
"legitimate",
"apps",
"that",
"are",
"broadly",
"used",
"or",
"important",
"to",
"a",
"targeted",
"population",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"exploit",
"has",
"since",
"been",
"added",
"into",
"the",
"Angler",
"Exploit",
"Kit",
"and",
"integrated",
"into",
"Metasploit."
] | [
3,
11,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojandownloader.Kagayab",
"Trojan.Razy.D18A59",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"BehavesLike.Win32.Dropper.mm",
"W32/Trojan.GGCJ-3154",
"TrojanDownloader:Win32/Kagayab.A",
"Trj/GdSda.A",
"Win32/Trojan.a98"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.12BD",
"Trojanspy.Babar",
"Trojan.Badbar",
"Win32.Trojan.Babar.A",
"Trojan-Spy.Win32.Babar.a",
"Trojan.Win32.Babar.dqhfcx",
"Troj.Spy.W32!c",
"Trojan.Babar.1",
"Trojan.Babar.Win32.3",
"BehavesLike.Win32.Trojan.fc",
"TrojanSpy.Babar.c",
"TR/AD.Babar.royis",
"Trojan.Zusy.D42EE8",
"PWS:Win32/Babar.A!dha",
"Trj/GdSda.A",
"Win32.Trojan-spy.Babar.Dwsy",
"Win32/Trojan.Spy.8fc"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DaltetoD.Trojan",
"Trojan/Fbphotofake.b",
"Win32.Trojan.WisdomEyes.16070401.9500.9992",
"HV_CARDPAY_CA222928.TOMC",
"Win.Trojan.Ag-4254306-1",
"Trojan-Dropper.Win32.FrauDrop.cth",
"Trojan.Win32.Drop.mssht",
"TrojWare.Win32.Downloader.Fraudload.AB",
"Trojan.AVKill.14860",
"Dropper.FrauDrop.Win32.3001",
"BehavesLike.Win32.PWSZbot.fc",
"Trojan.Win32.Fifesock",
"W32.Malware.Downloader",
"Trojan[Dropper]/Win32.FrauDrop",
"Trojan-Dropper.Win32.FrauDrop.cth",
"Trojan/Win32.CardPay.R21713",
"TrojanDropper.FrauDrop"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Mauvaise.SL1",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win32.Ddosaz.elmrbx",
"TrojWare.Win32.ServStart.DQ",
"Trojan.DownLoader23.31518",
"BehavesLike.Win32.Backdoor.kh",
"Trojan.Graftor.D53379",
"Trojan:Win32/Ddosaz.A",
"BScope.TrojanDDoS.Macri",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"was",
"used",
"to",
"bypass",
"2FA",
"methods",
"by",
"intercepting",
"the",
"SMS",
"messages",
"coming",
"from",
"the",
"bank",
"and",
"stealing",
"the",
"mTANs",
"without",
"the",
"victim",
"β",
"s",
"knowledge",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Palo",
"Alto",
"Networks",
"has",
"observed",
"a",
"recent",
"high-threat",
"spam",
"campaign",
"that",
"is",
"serving",
"malicious",
"macro",
"documents",
"used",
"to",
"execute",
"PowerShell",
"scripts",
"which",
"injects",
"malware",
"similar",
"to",
"the",
"Ursnif",
"family",
"directly",
"into",
"memory."
] | [
4,
12,
12,
16,
16,
16,
16,
3,
6,
14,
16,
16,
16,
3,
11,
1,
16,
16,
16,
1,
9,
16,
16,
3,
16,
16,
16,
3,
11,
7,
15,
15
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.WintaskLTE.Trojan",
"Win32/Bancos.ABHY",
"Trojan.Phisher.G",
"Trojan.Dynamer.D9",
"Trojan.Phisher.G",
"Troj.PSW.PHP.AccPhish.lstI",
"Win32.Trojan.WisdomEyes.16070401.9500.9987",
"PHP/PSW.Phishack.AT",
"Trojan.Phisher.G",
"Trojan.Phisher.G",
"Trojan.PWS.Stealer.895",
"BehavesLike.Win32.PWSMmorpg.vc",
"Trojan/PSW.VKont.pq",
"TR/Spy.PHP.psb",
"Trojan[PSW]/PHP.AccPhish.rr",
"Trojan.Phisher.G",
"Trojan:Win32/Phishacco.A",
"Trojan.Phisher.G",
"Trj/CI.A",
"Php.Trojan-qqpass.Qqrob.Sxxq",
"Trojan.PHP.PSW",
"W32/AccPhish.EU!tr.pws",
"Win32/Trojan.d71"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.TenoesaASN.Trojan",
"Worm/W32.WBNA.102405",
"Win32.Trojan.WisdomEyes.16070401.9500.9978",
"Worm.Win32.WBNA.oaw",
"Downloader.VB.Win32.98815",
"BehavesLike.Win32.Downloader.cm",
"Win32.Sality",
"TR/AD.Maywidmzi.brqly",
"TrojanDownloader:Win32/Maywidmzi.A",
"Worm.Win32.WBNA.oaw",
"Worm/Win32.WBNA.C1716518",
"Worm.WBNA",
"Trj/GdSda.A",
"Win32/TrojanDownloader.VB.QXP",
"Win32.Worm.Wbna.Ects",
"Trojan.DL.VB!tTzkeI6oupQ"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Login",
"details",
"are",
"sent",
"to",
"attackers",
"using",
"an",
"HTTP",
"GET",
"connection",
"ONLY",
"once."
] | [
16,
16,
16,
16,
16,
6,
16,
16,
1,
9,
9,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Lodap",
"Trojan/Exploit.CVE-2010-2568.f",
"TROJ_STUXNET.DX",
"W32.Stuxnet",
"TROJ_STUXNET.DX",
"Win.Trojan.Stuxnet-36",
"Exploit.Win32.CVE-2010-2568.b",
"Exploit.Win32.CVE20102568f.bkuia",
"Exploit.W32.CVE-2010-2568.f!c",
"Win32.Exploit.Cve-2010-2568.Wopr",
"Exploit.CVE.Win32.14",
"Trojan.Win32.Exploit",
"Trojan[Exploit]/Win32.CVE-2010-2568",
"Exploit.Win32.CVE-2010-2568.b",
"Exploit.Stuxnet",
"Trj/ChymineLNK.A",
"Win32/Exploit.CVE-2010-2568",
"Win32/Trojan.Exploit.406"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"MrWhite",
"can",
"profile",
"the",
"victim",
"systems",
"for",
"the",
"presence",
"of",
"running",
"POS",
"software",
"before",
"dropping",
"further",
"POS",
"payloads."
] | [
3,
16,
1,
16,
5,
13,
16,
16,
1,
16,
16,
5,
13,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.48F3",
"Trojan.Kazy.D8696E",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TROJ_CRYPCTB.SME",
"Troj.Downloader.W32.FraudLoad.kYSC",
"TROJ_CRYPCTB.SME",
"BehavesLike.Win32.Upatre.tc",
"Trojan:Win32/Triflearch.B",
"Trojan.FakeAV.01657",
"Win32.Trojan.Crypt.Dzag",
"Trojan.Win32.Crypt",
"Win32/Trojan.8cf"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Malicious",
"code",
"identified,",
"simple",
"UDP",
"DDoS",
"attacks",
"recorded."
] | [
3,
11,
16,
1,
9,
9,
9,
16
] |
[
"If",
"you",
"follow",
"the",
"military",
"analogy",
"β",
"those",
"are",
"the",
"scouts",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"At",
"line",
"5",
",",
"local",
"variable",
"v4",
"specifies",
"the",
"first",
"parameter",
"url",
",",
"which",
"can",
"be",
"changed",
"by",
"the",
"remote",
"C2",
"server",
"later",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"steals",
"sensitive",
"information,",
"such",
"as",
"cryptocurrency",
"wallet",
"data,",
"from",
"different",
"applications",
"and",
"uses",
"a",
"file",
"grabber",
"for",
"collecting",
"a",
"predefined",
"list",
"of",
"file",
"types,",
"then",
"exfiltrates",
"them",
"via",
"Telegram."
] | [
16,
1,
9,
9,
16,
16,
5,
13,
16,
16,
16,
5,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
5
] |
[
"Forcepoint",
"Security",
"Labsβ’",
"have",
"observed",
"today",
"a",
"major",
"malicious",
"email",
"campaign",
"from",
"the",
"Necurs",
"botnet",
"spreading",
"a",
"new",
"ransomware",
"which",
"appears",
"to",
"call",
"itself",
"Jaff",
"peaking",
"within",
"our",
"telemetry",
"at",
"nearly",
"5m",
"emails",
"per",
"hour."
] | [
4,
12,
12,
16,
16,
16,
16,
6,
14,
14,
14,
16,
3,
11,
11,
16,
16,
16,
3,
16,
16,
16,
16,
16,
3,
16,
16,
16,
5,
16,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Downloader.Dapato.cjt",
"Trojan.Kryptik!UYVcX29KF20",
"W32/Krypt.DZ",
"Trojan.Win32.Cleaman!IK",
"TrojWare.Win32.Kryptik.ZLB",
"Trojan.DownLoad2.49842",
"TR/FakeAV.bzqra",
"TrojanDownloader.Dapato.ace",
"TrojanDownloader:Win32/Cred.B",
"Trojan/Win32.Menti",
"TrojanDownloader.Dapato.cfq",
"Trojan.Win32.Cleaman",
"W32/Kryptik.ACD!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"'s",
"restarted",
"in",
"the",
"next",
"cycle",
"independently",
"based",
"on",
"if",
"WhatsApp",
"is",
"running",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16
] |
[
"Machine",
"translation",
"of",
"this",
"tweet",
"reads",
":",
"β",
"Watch",
"out",
"for",
"online",
"banking",
":",
"Emotet",
"reloads",
"TrickBot",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
16
] |
[
"PwC's",
"cyber",
"security",
"practice",
"has",
"worked",
"closely",
"with",
"BAE",
"Systems",
"and",
"other",
"members",
"of",
"the",
"security",
"community,",
"along",
"with",
"the",
"UK's",
"National",
"Cyber",
"Security",
"Centre",
"NCSC,",
"to",
"uncover",
"and",
"disrupt",
"what",
"is",
"thought",
"to",
"be",
"one",
"of",
"the",
"largest",
"ever",
"sustained",
"global",
"cyber",
"espionage",
"campaigns",
"in",
"an",
"operation",
"referred",
"to",
"as",
"Operation",
"Cloud",
"Hopper'."
] | [
4,
12,
12,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
4,
12,
12,
16,
16,
4,
12,
12,
12,
12,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
14,
16,
16,
16,
16,
16,
16,
6,
14,
14
] |
[
"If",
"some",
"malware",
"samples",
"remain",
"simple",
"see",
"my",
"previous",
"diary,",
"others",
"try",
"to",
"install",
"malicious",
"files",
"in",
"a",
"smooth",
"way",
"to",
"the",
"victim",
"computers."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Kazy.D55679",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Trojan.Win32.Starter.cuyepr",
"Trojan.Starter.2890",
"BehavesLike.Win32.Trojan.vm",
"Trojan.Dropper",
"MSIL/Injector.WSX!tr",
"Win32/Trojan.e6d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"malware",
"is",
"not",
"really",
"advanced",
"and",
"is",
"based",
"on",
"a",
"lot",
"of",
"copy/paste",
"from",
"public",
"sources",
"available",
"on",
"the",
"Internet",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Among",
"their",
"most",
"notable",
"presumed",
"targets",
"are",
"the",
"American",
"Democratic",
"National",
"Committee,",
"the",
"German",
"parliament",
"and",
"the",
"French",
"television",
"network",
"TV5Monde."
] | [
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
12,
12,
12,
12,
16,
4,
12,
12,
12,
12
] |
[
"]",
"today",
"svcws",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"Enterprise",
"and",
"government",
"employees",
"all",
"use",
"these",
"devices",
"in",
"their",
"day-to-day",
"work",
",",
"which",
"means",
"IT",
"and",
"security",
"leaders",
"within",
"these",
"organizations",
"must",
"prioritize",
"mobile",
"in",
"their",
"security",
"strategies",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"BlackEnergy",
"is",
"a",
"Trojan",
"that",
"was",
"created",
"by",
"a",
"hacker",
"known",
"as",
"Cr4sh."
] | [
6,
16,
16,
3,
16,
16,
16,
16,
16,
6,
16,
16,
6
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Sylavriu",
"BKDR_SYLAVRIU.SM",
"Win32.Trojan.WisdomEyes.16070401.9500.9996",
"Trojan.Zbot",
"BKDR_SYLAVRIU.SM",
"Win.Trojan.Torct-1",
"W32.Trojan.Torct",
"Trojan/MSIL.Crypt",
"Trojan.MSIL.Krypt.2",
"Backdoor:MSIL/Sylavriu.A",
"Dropper/Win32.Adminuser.R118179",
"Trojan.MSIL.Crypt",
"Trojan.Crypt!ZlAnMaNuAFw",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"However",
",",
"a",
"few",
"PHA",
"authors",
"spend",
"substantial",
"effort",
",",
"time",
",",
"and",
"money",
"to",
"create",
"and",
"install",
"their",
"harmful",
"app",
"on",
"one",
"or",
"a",
"very",
"small",
"number",
"of",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"addition",
",",
"it",
"collects",
"identifiers",
"and",
"some",
"data",
"from",
"the",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Tricky",
"Configurations",
"TrickMo",
"uses",
"the",
"shared",
"preferences",
"mechanism",
"to",
"store",
"settings",
"and",
"data",
"that",
"the",
"malware",
"uses",
"at",
"runtime",
"."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"uses",
"the",
"base",
"Dalvik",
"User-Agent",
"string",
"for",
"the",
"device",
"it",
"β",
"s",
"running",
"on",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win32.Redsip!O",
"Trojandropper.Redsip",
"Backdoor.Redsip.k",
"Backdoor.Redsip.Win32.8",
"Backdoor/Redsip.k",
"Win32.Trojan.WisdomEyes.16070401.9500.9970",
"W32/Backdoor2.HIOH",
"Hacktool.Keylogger",
"Win32/Redsip.A",
"Backdoor.Win32.Redsip.a",
"Trojan.Win32.Redsip.dcevd",
"Backdoor.Win32.A.Redsip.159744",
"Backdoor.W32.Redsip.k!c",
"BehavesLike.Win32.Ramnit.ct",
"W32/Backdoor.VDXS-0842",
"BDS/Redsip.B",
"W32/Redsip.A!tr",
"Trojan[Backdoor]/Win32.Redsip",
"Backdoor.Win32.Redsip.a",
"TrojanDropper:Win32/Redsip.B",
"Trojan/Win32.Redsip.C245513",
"Backdoor.Redsip",
"Win32/Redsip.AA",
"Win32.Backdoor.Redsip.Amvr",
"Backdoor.Win32.Redsip"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Phony",
"Tech",
"Support",
"Scams",
"Now",
"Target",
"Macs"
] | [
6,
14,
14,
1,
16,
16,
5
] |
[
"This",
"sample",
"only",
"includes",
"Dalvik",
"bytecode",
"and",
"resources",
"without",
"any",
"native",
"libraries",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"first",
"table",
"contains",
"205",
"devices",
"with",
"some",
"Linux",
"properties",
";",
"the",
"second",
"contains",
"the",
"specific",
"memory",
"addresses",
"associated",
"with",
"them",
"that",
"are",
"needed",
"for",
"successful",
"exploitation",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Hexzone.bdlvxl",
"Adware.Margoc",
"MalCrypt.Indus!",
"VirTool.Win32.Obfuscator.a",
"Trojan:Win32/Procesemes.A.dll",
"Trojan/Win32.Xema",
"Adware.Margoc!rem"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom.Urausy.E4",
"Ransom_Urausy.R038C0CB418",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Trojan.Ransomlock.Q",
"Ransom_Urausy.R038C0CB418",
"Trojan.Win32.Winlock.crahoz",
"TrojWare.Win32.FakeAv.ASC",
"Trojan.Winlock.9260",
"Trojan/Foreign.shn",
"Ransom:Win32/Urausy.E",
"Trojan.Zusy.D10991",
"Trojan/Win32.Foreign.R84961",
"SScope.Malware-Cryptor.Hlux",
"Win32/LockScreen.AQD",
"Trojan.Win32.Urausy"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"addition,",
"HummingBad",
"installs",
"fraudulent",
"apps",
"to",
"increase",
"the",
"revenue",
"stream",
"for",
"the",
"fraudster."
] | [
16,
16,
3,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
6
] |
[
"This",
"can",
"be",
"packaged",
"and",
"\"",
"sold",
"''",
"in",
"many",
"different",
"ways",
"to",
"customers",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"can",
"save",
"an",
"SMS",
"message",
"on",
"the",
"device",
",",
"marking",
"with",
"β",
"internal",
"β",
"in",
"the",
"phone",
"number",
"field",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32/SillyDl.XXJ!packed",
"Trojan-Dropper.Win32.Dorifel.acvt",
"Trojan.DownLoader1.46415",
"BehavesLike.Win32.Adware.cc",
"TrojanDownloader:Win32/Plingky.A",
"Trojan.Heur.EDD31E",
"Trojan-Dropper.Win32.Dorifel.acvt",
"Trojan-Downloader.Win32.Small",
"W32/Dorifel.ACVT!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Clicker.BHO.ncx",
"Trojan.Zbot",
"Win32/TrojanClicker.BHO.NCX",
"TROJ_SPNR.30BB13",
"Trojan.Win32.Starter.amcr",
"Trojan.Win32.Starter.dzdloa",
"Win32.Trojan.Starter.Suef",
"TROJ_SPNR.30BB13",
"BehavesLike.Win32.Downloader.gh",
"TR/Lickore.B.7",
"W32/TrojanClicker_BHO.NCX",
"PUP/Win32.Msbuyn.N640533768",
"Trojan:Win32/Lickore.B",
"Win32/Lickore.B",
"Trojan-Clicker.BAHK",
"Clicker.BAHK"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"command",
"and",
"control",
"C&C",
"communications",
"for",
"new",
"variants",
"use",
"the",
"same",
"AES256",
"encryption",
"for",
"any",
"traffic",
"to",
"the",
"attacker's",
"server;",
"in",
"previous",
"variants,",
"only",
"Base64",
"encoding",
"was",
"used."
] | [
16,
1,
9,
9,
9,
9,
11,
16,
3,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
1,
9,
16,
16
] |
[
"Disttrack",
"is",
"a",
"multipurpose",
"tool",
"that",
"exhibits",
"worm-like",
"behavior",
"by",
"attempting",
"to",
"spread",
"to",
"other",
"systems",
"on",
"a",
"local",
"network",
"using",
"stolen",
"administrator",
"credentials."
] | [
3,
16,
16,
16,
3,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
5,
13,
16,
1,
9,
9
] |
[
"Since",
"the",
"beginning",
"of",
"January",
"2017,",
"the",
"BSI,",
"as",
"the",
"national",
"cyber",
"security",
"agency,",
"has",
"been",
"in",
"close",
"contact",
"with",
"the",
"German",
"Bundestag,",
"due",
"to",
"the",
"network",
"traffic",
"of",
"the",
"German",
"Bundestag."
] | [
16,
16,
0,
8,
8,
8,
16,
4,
16,
4,
12,
12,
12,
12,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
16,
16,
5,
13,
16,
4,
12,
12
] |
[
"Additionally,",
"when",
"we",
"searched",
"for",
"the",
"decoded",
"string",
"value",
"we",
"found",
"a",
"single",
"search",
"engine",
"result",
"that",
"pointed",
"to",
"a",
"Pastebin",
"page."
] | [
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
5,
13,
16,
15,
16,
16,
1,
9,
9
] |
[
"First,",
"Winnti",
"uses",
"Cobalt",
"Strike",
"to",
"collect",
"credentials",
"and",
"move",
"laterally."
] | [
16,
6,
16,
6,
14,
16,
16,
16,
16,
16,
16
] |
[
"At",
"the",
"time",
"of",
"investigation",
"this",
"malware",
"was",
"not",
"correctly",
"detected",
"by",
"any",
"existing",
"antivirus",
"engines,",
"and",
"domains",
"/",
"IP",
"s",
"were",
"not",
"found",
"in",
"any",
"commercial",
"threat",
"intelligence",
"feeds."
] | [
3,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
1,
16,
1,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Razy.D31A9",
"Win32.Trojan.WisdomEyes.16070401.9500.9960",
"TROJ_HOYGUNER.SM",
"Trojan.Win32.Drop.dhxynu",
"TROJ_HOYGUNER.SM",
"Virus.MSIL",
"W32.Trojan.Dropper",
"Trojan:MSIL/Hoygunver.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DeadBeef.Worm",
"Worm/W32.AutoRun.175104",
"Worm.Win32.AutoRun!O",
"Worm.AutoRun.Win32.8121",
"W32/AutoRun.pv",
"W32.SillyFDC",
"Win32/Wainlas.A",
"WORM_AUTORUN_000002c.TOMA",
"Win.Worm.Autorun-1414",
"Worm.Win32.AutoRun.pv",
"Trojan.Win32.AutoRun.ltul",
"Win32.Worm.Autorun.Tbim",
"Worm.Win32.AutoRun.~MAA",
"Win32.HLLW.Autoruner.748",
"WORM_AUTORUN_000002c.TOMA",
"Worm/AutoRun.bhu",
"TR/Drop.AutoRun.BM",
"Worm/Win32.AutoRun",
"Worm.Win32.Autorun.12728",
"Worm.Win32.AutoRun.pv",
"Worm/Win32.AutoRun.R16694",
"Worm.AutoRun",
"Worm.Win32.AutoRun",
"W32/AutoRun.NTQ!worm",
"Trj/Debat.A",
"Trojan.PSW.Win32.QQPass.CF"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"During",
"the",
"WannaCry",
"pandemic",
"attack,",
"CyphortLabs",
"discovered",
"that",
"other",
"threat",
"actors",
"have",
"been",
"using",
"the",
"same",
"EternalBlue",
"exploit",
"to",
"deliver",
"other",
"malware."
] | [
16,
16,
3,
1,
9,
4,
16,
16,
16,
4,
12,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
3
] |
[
"Although",
"bitcoin",
"miners",
"have",
"been",
"used",
"by",
"cybercriminals",
"before",
"as",
"a",
"way",
"to",
"monetize",
"their",
"malicious",
"activities,",
"this",
"recent",
"sample",
"MD5:",
"522f8ba8b2dec299cc64c0ccf5a68000",
"caught",
"our",
"attention",
"because",
"it",
"is",
"unusually",
"heavy,",
"persistent,",
"and",
"obfuscated."
] | [
16,
3,
11,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.kowinHA.Worm",
"Backdoor.Win32.Popwin!O",
"Trojan.Heur.amuaxSBiYpji",
"Win32.Trojan.WisdomEyes.16070401.9500.9769",
"W32.Popwin",
"Win32/Pipown.NW",
"TROJ_NSPAK.A",
"Trojan.Win32.Popwin.jgms",
"Constructor.W32.VB.lgxd",
"Backdoor.Win32.Popwin.~IQ",
"Trojan.Popwin",
"TROJ_NSPAK.A",
"BehavesLike.Win32.Downloader.lc",
"Trojan/PSW.GamePass.pjs",
"Worm:Win32/Winko.A",
"Backdoor.Popwin",
"Worm.Win32.AutoRun",
"W32/Winko.A!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"two",
"0-days",
"in",
"question",
"targeted",
"Adobe",
"Flash",
"and",
"were",
"subsequently",
"labeled",
"CVE-2015-5119",
"and",
"CVE-2015-5122."
] | [
16,
16,
7,
16,
16,
16,
5,
13,
16,
16,
16,
16,
1,
16,
1
] |
[
"TrickMo",
"β",
"s",
"Persistence",
"Capabilities",
"When",
"it",
"comes",
"to",
"Android-based",
"devices",
",",
"many",
"applications",
"must",
"find",
"a",
"way",
"to",
"run",
"on",
"the",
"device",
"after",
"a",
"system",
"reboot",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Fakedos.A",
"Backdoor.Fakedos!ktjmxmN20Kc",
"W32/Backdoor.MDB",
"Backdoor.Trojan",
"BKDR_BACKDOOR4.B",
"Backdoor.Win32.Fakedos.a",
"Backdoor.Fakedos.A",
"Backdoor.Fakedos.A",
"Backdoor.Fakedos.A",
"Email-Worm.Win32.GOPworm.196",
"BDS/Fakedos.A.1",
"BKDR_BACKDOOR4.B",
"Win32.Hack.Fakedos.a.kcloud",
"Backdoor.Fakedos.A",
"W32/Backdoor.CVVK-7742",
"Win-Trojan/Fakedos.94208",
"TScope.Trojan.VB",
"PE:Backdoor.Fakedos.a!1073830334",
"BackDoor.Fakedos.C"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Check",
"Point",
"Software",
"Hummingbad/Shedun",
"infections",
"by",
"Android",
"version",
"."
] | [
4,
12,
12,
3,
16,
16,
5,
16,
16
] |
[
"Example",
"of",
"traffic",
"from",
"an",
"early",
"version",
"of",
"Asacub",
"(",
"2015",
")",
"The",
"data",
"transmitted",
"and",
"received",
"is",
"encrypted",
"with",
"the",
"RC4",
"algorithm",
"and",
"encoded",
"using",
"the",
"base64",
"standard",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"opens",
"a",
"socket",
"on",
"the",
"victim",
"β",
"s",
"machine",
"and",
"connects",
"with",
"a",
"server-side",
"component",
"of",
"the",
"implant",
"located",
"at",
"54.67.109.199:6500",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.44AD",
"Win32.Virus.Downloader.Aojh",
"Trojan-Downloader.Win32.Cekar",
"W32/Noia.B",
"Trj/CI.A",
"Win32/Trojan.dd1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Used",
"in",
"Pawn",
"Storm",
"to",
"target",
"certain",
"foreign",
"affairs",
"ministries,",
"the",
"vulnerability",
"identified",
"as",
"CVE-2015-7645",
"represents",
"a",
"significant",
"change",
"in",
"tactics",
"from",
"previous",
"exploits."
] | [
16,
16,
6,
14,
16,
16,
16,
4,
12,
12,
16,
7,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
7
] |
[
"Based",
"on",
"infrastructure",
"overlaps",
"and",
"leaked",
"information",
",",
"we",
"assess",
"with",
"high",
"confidence",
"that",
"the",
"malware",
"we",
"identified",
"and",
"present",
"in",
"this",
"paper",
"is",
"linked",
"to",
"Wolf",
"Research",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16
] |
[
"Then",
"the",
"application",
"downloads",
"java",
"archive",
"from",
"the",
"URL",
"specified",
"in",
"json",
",",
"dynamically",
"loads",
"it",
"with",
"class",
"loader",
"API",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"However",
",",
"a",
"simple",
"Google",
"search",
"for",
"the",
"adware",
"package",
"name",
"returned",
"a",
"β",
"TestDelete",
"β",
"project",
"that",
"had",
"been",
"available",
"in",
"his",
"repository",
"at",
"some",
"point",
"The",
"malicious",
"developer",
"also",
"has",
"apps",
"in",
"Apple",
"β",
"s",
"App",
"Store",
"."
] | [
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
5,
13,
16
] |
[
"Both",
"of",
"these",
"types",
"of",
"fraud",
"take",
"advantage",
"of",
"mobile",
"billing",
"techniques",
"involving",
"the",
"user",
"β",
"s",
"carrier",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Evidence",
"Collector",
"module",
"is",
"responsible",
"for",
"the",
"spying",
"routines",
"outlined",
"above",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"7",
"β",
"C2",
"As",
"seen",
"in",
"Figure",
"8",
",",
"this",
"version",
"of",
"Anubis",
"is",
"built",
"to",
"run",
"on",
"several",
"iterations",
"of",
"the",
"Android",
"operating",
"system",
",",
"dating",
"back",
"to",
"version",
"4.0.3",
",",
"which",
"was",
"released",
"in",
"2012",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"So",
"far",
",",
"the",
"attackers",
"relied",
"entirely",
"on",
"social",
"engineering",
"to",
"infect",
"the",
"targets",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.D995",
"Virus.Win32.Sality!O",
"Backdoor.PMax",
"Trojan.Win32.PMax.deplgs",
"Backdoor.Win32.PMax.atcf",
"MULDROP.Trojan",
"BehavesLike.Win32.Downloader.mc",
"W32/Poweliks.A!tr",
"Trojan.Zusy.D19DC7",
"Trojan/Win32.VBKrypt",
"Trojan:Win32/Powessere.A",
"Backdoor.PMax",
"Trojan.Poweliks",
"Trojan.Win32.Poweliks.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Over",
"the",
"past",
"few",
"months,",
"the",
"tr1adx",
"team",
"has",
"been",
"tracking",
"a",
"Threat",
"Actor",
"which",
"we",
"codenamed",
"TelePort",
"Crew."
] | [
16,
16,
0,
8,
8,
16,
4,
12,
16,
16,
16,
16,
6,
14,
16,
16,
16,
6,
14
] |
[
"One",
"method",
",",
"which",
"was",
"popular",
"in",
"Germany",
",",
"is",
"known",
"as",
"mobile",
"TAN",
"(",
"mTAN",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"campaign",
"β",
"s",
"attack",
"vector",
"is",
"also",
"interesting",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"infection",
"vector",
"was",
"a",
"drive-by",
"download",
"attack,",
"and",
"the",
"Check",
"Points",
"Threat-Cloud",
"indicates",
"some",
"adult",
"content",
"sites",
"served",
"the",
"malicious",
"payload."
] | [
7,
15,
15,
16,
16,
1,
9,
9,
16,
4,
12,
12,
12,
16,
16,
1,
9,
9,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Motd.A",
"Backdoor.Motd.A",
"Trojan.Win32.Malware.a",
"Backdoor.Trojan",
"Backdoor.Motd.A",
"Backdoor.Win32.MOTD",
"Backdoor.Motd.A",
"Trojan.Win32.MOTD.glgl",
"Troj.Spy.W32.Delf.mczC",
"Backdoor.Motd.A",
"Backdoor.Motd.A",
"BackDoor.Motd",
"Backdoor.MOTD.Win32.1",
"BehavesLike.Win32.Ipamor.hh",
"Backdoor.Win32.Y3KRat",
"Trojan[Backdoor]/Win32.MOTD",
"Backdoor.Motd.A",
"Backdoor.Win32.MOTD",
"Trojan.Win32.Malware.a",
"Backdoor.MOTD"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"CloudDuke",
"also",
"greatly",
"expands",
"on",
"the",
"Duke",
"group's",
"usage",
"of",
"cloud",
"storage",
"services,",
"specifically",
"Microsoft's",
"OneDrive,",
"as",
"a",
"channel",
"for",
"both",
"command",
"and",
"control",
"as",
"well",
"as",
"the",
"exfiltration",
"of",
"stolen",
"data."
] | [
3,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
1,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Crypt.CG",
"Downloader.Vidlo.Win32.11",
"Backdoor.W32.IRCBot.mA1F",
"Trojan.Crypt.CG",
"Win32.Trojan.WisdomEyes.16070401.9500.9959",
"W32/Downloader.PQKB-6890",
"Win32/InjectDown.B",
"TROJ_DLOADER.JR",
"Win.Downloader.Small-886",
"Trojan-Downloader.Win32.Vidlo.k",
"Trojan.Crypt.CG",
"Trojan.Crypt.CG",
"TrojWare.Win32.TrojanDownloader.Vidlo.K",
"Trojan.Crypt.CG",
"Trojan.DownLoader.3548",
"TROJ_DLOADER.JR",
"Packer.Win32.Mondera",
"W32/Downloader.BEC",
"TrojanDownloader.Small.zu",
"TR/Dldr.Vidlo.K",
"Trojan[Downloader]/Win32.Vidlo",
"Win32.Troj.Vidlo.k.kcloud",
"TrojanDownloader:Win32/Vidlo.I",
"Trojan.Win32.A.Downloader.3584.CB",
"Trojan-Downloader.Win32.Vidlo.k",
"Trojan.Crypt.CG",
"Trojan.Crypt.CG",
"TScope.Malware-Cryptor.SB",
"Win32/TrojanDownloader.Vidlo.K"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"All",
"the",
"text",
"is",
"then",
"copied",
"and",
"-",
"again",
"hidden",
"in",
"the",
"background",
"-",
"sent",
"to",
"a",
"foreign",
"server."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Just",
"like",
"the",
"old-school",
"mail",
"worms",
"that",
"used",
"the",
"victim",
"'s",
"address",
"book",
"to",
"select",
"the",
"next",
"victims",
",",
"this",
"banking",
"trojan",
"'s",
"activation",
"cycle",
"includes",
"the",
"exfiltration",
"of",
"the",
"victim",
"'s",
"address",
"book",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Black.r5",
"Trojan.Win32.Black.deckbe",
"Backdoor.Vinself.C",
"Win32/Leouncia.D",
"TROJ_ORCARAT.A",
"Packed.Win32.Black.d",
"Packed.Win32.Aspack.AB",
"Trojan.DownLoader11.40855",
"Trojan.Packed.Win32.43496",
"TROJ_ORCARAT.A",
"BehavesLike.Win32.Dropper.fc",
"W32/Trojan.QUXL-7354",
"Packed.Black.ahku",
"W32/Black.D!tr",
"Trojan.Heur.wuXa774c9jj",
"Packer.W32.Black.d!c",
"VirTool:Win32/Obfuscator.XY",
"Win32.Packed.Black.Ebzx",
"Trojan-Downloader.Win32.Banload",
"Trojan.Win32.Black.d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Upon",
"successful",
"exploitation,",
"a",
"new",
"process",
"is",
"created",
"with",
"the",
"PE",
"file",
"embedded",
"in",
"the",
"uploadpref.dat",
"file."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.ScriptKD.6648",
"Trojan.Tiggre",
"Trojan.ScriptKD.6648",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan-Downloader.VBS.Small.l",
"Trojan.Script.Small.dczplj",
"Trojan.ScriptKD.6648",
"Tool.BtcMine.1036",
"BehavesLike.Win32.AdwareLinkury.hc",
"W32/Trojan.LHYZ-8303",
"Trojan[Downloader]/Win32.Betload",
"TrojanDownloader:Win32/Streamto.A",
"Zum.BitCoinMiner.1",
"Trojan-Downloader.VBS.Small.l",
"Zum.BitCoinMiner.1",
"Trojan.ScriptKD.6648",
"Trojan.ScriptKD.6648",
"Trj/CI.A",
"Trojan.Bitcoinminer",
"Vbs.Trojan-downloader.Small.Stty",
"Trojan-Downloader.VBS.Small.L",
"Win32/Trojan.f11"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.