tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAdware.B36E",
"Application.Bundler.DomaIQ.Q",
"PUP.Optional.BundleInstaller",
"Adware.DomaIQ.Win32.132",
"Adware.DomaIQ/Variant",
"Application.Bundler.DomaIQ.Q",
"Win32.Adware.DomnIQ.b",
"Infostealer.Limitail",
"Win32/DomainIQ.eOTUWS",
"Win.Adware.Domaiq-1",
"not-a-virus:AdWare.MSIL.DomaIQ.clek",
"Application.Bundler.DomaIQ.Q",
"Trojan.Win32.DomaIQ.ctadmg",
"Adware.Win32.Lollipop.f",
"Application.Bundler.DomaIQ.Q",
"Application.Win32.DomaIQ.URT",
"Trojan.DownLoader9.21779",
"AdWare/MSIL.ps",
"Pua.Tuguu",
"GrayWare[AdWare]/MSIL.DomaIQ",
"TrojanDownloader:Win32/Tugspay.A",
"not-a-virus:AdWare.MSIL.DomaIQ.clek",
"Win32.Application.DomalQ.G",
"PUP/Win32.DomaIQ.R99208",
"BScope.Downware.DomaIQ",
"PUA.DomaIQ!",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"app",
"also",
"creates",
"hooks",
"to",
"prevent",
"the",
"phone",
"from",
"rebooting",
",",
"going",
"to",
"sleep",
"or",
"allowing",
"the",
"user",
"from",
"pressing",
"hardware",
"buttons",
"during",
"the",
"account",
"creation",
"process",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"the",
"analysis",
"that",
"follows",
",",
"we",
"describe",
"in",
"detail",
"the",
"capabilities",
"of",
"this",
"new",
"variant",
"and",
"a",
"β",
"kill",
"switch",
"β",
"that",
"can",
"remotely",
"eliminate",
"the",
"malware",
"from",
"a",
"mobile",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Between",
"December",
"2021",
"and",
"July",
"2022,",
"the",
"Mandiant",
"Managed",
"Defense",
"and",
"Incident",
"Response",
"teams",
"responded",
"to",
"three",
"UNC961",
"intrusions",
"at",
"different",
"organizations",
"that",
"each",
"started",
"in",
"similar",
"fashion."
] | [
16,
0,
8,
16,
0,
8,
4,
12,
12,
12,
12,
12,
12,
12,
16,
16,
16,
6,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16
] |
[
"Thanks",
"to",
"this",
"data",
"leak",
",",
"we",
"were",
"able",
"to",
"confirm",
"that",
"the",
"malware",
"really",
"worked",
"as",
"designed",
":",
"the",
"attacker",
"had",
"access",
"to",
"the",
"victims",
"β",
"entered",
"credentials",
",",
"displayed",
"or",
"written",
"emails",
"and",
"messages",
",",
"etc",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Stealing",
"SMS",
"The",
"Gxextsxms",
"command",
"is",
"responsible",
"for",
"fetching",
"all",
"the",
"SMS",
"messages",
"from",
"the",
"victim",
"'s",
"device",
"and",
"sending",
"it",
"over",
"to",
"the",
"C",
"&",
"C",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"VM",
"dispatcher",
"loop",
"routine",
"ends",
"with",
"a",
"JMP",
"to",
"another",
"routine",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"When",
"the",
"user",
"tries",
"to",
"open",
"one",
"of",
"these",
"legitimate",
"apps,",
"the",
"malware",
"replaces",
"the",
"genuine",
"app",
"window",
"with",
"a",
"phishing",
"window",
"that",
"asks",
"for",
"banking",
"information."
] | [
16,
16,
4,
16,
16,
16,
16,
16,
16,
5,
13,
16,
3,
1,
16,
1,
16,
1,
16,
16,
1,
1,
15,
1,
9,
9,
9
] |
[
"Infrastructure",
"The",
"infrastructure",
"supporting",
"this",
"malware",
"is",
"rather",
"complex",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"the",
"past",
",",
"we",
"have",
"seen",
"other",
"activity",
"groups",
"like",
"LEAD",
"employ",
"a",
"similar",
"attacker",
"technique",
"named",
"β",
"proxy-library",
"β",
"to",
"achieve",
"persistence",
",",
"but",
"not",
"with",
"this",
"professionalism",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.TikoraxaDSB.Trojan",
"Trojandownloader.Script",
"W32/Snojan.OHXS-3777",
"VBS/TrojanDownloader.Small.NGH",
"Trojan.Win32.Mlw.evnleg",
"Troj.Downloader.Script!c",
"BehavesLike.Win32.Downloader.dh",
"Trojan-Downloader.VBS.Small",
"W32/Snojan.Q",
"Trojan.Pincav.aer",
"VBS/Dldr.Small.vxbdh",
"Trojan.DL.Alien!",
"Trojan.Snojan",
"Trj/CI.A",
"Script/Virus.72d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Lookout",
"uncovered",
"nine",
"secondary",
"payload",
"applications",
":",
"*",
"These",
"apps",
"have",
"not",
"been",
"previously",
"reported",
"and",
"were",
"discovered",
"using",
"data",
"from",
"the",
"Lookout",
"global",
"sensor",
"network",
",",
"which",
"collects",
"app",
"and",
"device",
"information",
"from",
"over",
"100",
"million",
"sensors",
"to",
"provide",
"researchers",
"and",
"customers",
"with",
"a",
"holistic",
"look",
"at",
"the",
"mobile",
"threat",
"ecosystem",
"today",
"."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DownLoadRiniLTN.Trojan",
"Trojan.Win32.Scar!O",
"Trojan.Popureb.B4",
"Trojan/Scar.ejkj",
"Trojan.Zusy.D2E760",
"TROJ_POPUREB.SM",
"Win32.Trojan.Scar.i",
"Win32/Scar.ZF",
"TROJ_POPUREB.SM",
"Win.Trojan.Scar-8452",
"Trojan.Win32.Scar.bccuvv",
"Trojan.Win32.A.Scar.86016.F",
"Backdoor.Win32.Popwin.~IT",
"Trojan.DownLoader11.5691",
"Trojan.Scar.Win32.75436",
"BehavesLike.Win32.Dropper.mm",
"Backdoor.Win32.Poison",
"TR/Popureb.B.20",
"Trojan/Win32.Scar",
"Win32.Troj.Poison.b.29696",
"Trojan:Win32/Popureb.B",
"Trojan/Win32.PbBot.R3997",
"Trojan.Scar",
"Trojan.Scar",
"Trojan.Win32.Scar.tgh",
"Trojan.Ghodow!qzMoVFGUIfc",
"W32/Scar.ENA!tr",
"Win32/Trojan.285"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"the",
"past,",
"we",
"investigated",
"TorLocker",
"and",
"its",
"flawed",
"encryption,",
"which",
"was",
"created",
"and",
"negotiated",
"worldwide",
"by",
"a",
"Brazilian",
"cybercriminal."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
7,
15,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14
] |
[
"The",
"Trojan",
"itself",
"is",
"well",
"known",
"and",
"contained",
"x32",
"and",
"x64",
"rootkits."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
5,
16,
5,
3
] |
[
"The",
"multiple",
"downloads",
"is",
"probably",
"a",
"redundancy",
"measure",
"in",
"case",
"some",
"sources",
"are",
"taken",
"down."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"this",
"case",
"it",
"capitalized",
"on",
"the",
"recent",
"terrorist",
"attack",
"in",
"New",
"York",
"City."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
2,
10,
10
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BackDoor-CYK.srv",
"Backdoor/VB.alk",
"Backdoor.VB!XZJVRUVgqYg",
"W32/Backdoor.LPS",
"TROJ_MALKZR.A",
"Backdoor.Win32.VB.alk",
"Backdoor.Win32.VB.37168",
"Backdoor.Win32.VB!IK",
"Backdoor.Win32.Delf.~EC",
"TROJ_MALKZR.A",
"Heuristic.BehavesLike.Win32.Downloader.D",
"Backdoor/VB.rj",
"Backdoor:Win32/Norachs.A",
"W32/Backdoor.LPS",
"Win-Trojan/Xema.variant",
"Trojan.Win32.VB.ALK",
"Win32/VB.ALK",
"Backdoor.Win32.VB",
"W32/VB.ALK!tr",
"BackDoor.VB.FLP"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Our",
"analysis",
"reveals",
"connections",
"between",
"these",
"attacks,",
"recent",
"strategic",
"web",
"compromises",
"against",
"Burmese",
"government",
"websites,",
"and",
"previous",
"campaigns",
"targeting",
"groups",
"in",
"the",
"Tibetan",
"community."
] | [
16,
16,
16,
16,
16,
16,
1,
16,
16,
1,
9,
16,
1,
9,
9,
16,
16,
6,
14,
14,
16,
16,
2,
10
] |
[
"In",
"past",
"revivals,",
"the",
"botnet",
"has",
"been",
"distributed",
"through",
"malicious",
"emails",
"containing",
"attachments",
"or",
"links",
"to",
"compromised",
"websites",
"hosting",
"exploit",
"kit",
"content."
] | [
16,
16,
16,
3,
11,
16,
16,
16,
16,
1,
9,
9,
9,
16,
1,
9,
9,
9,
16,
3,
11,
16
] |
[
"This",
"was",
"probably",
"done",
"for",
"debugging",
"purposes",
",",
"indicating",
"the",
"malware",
"may",
"be",
"an",
"early",
"prototype",
"version",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"PWS-Xema.dr",
"PWS-Xema.dr",
"Trojan.Win32.Malware.4",
"W32/Smalltroj.IUNZ",
"Win32.TRCrypt.XPACK",
"Trojan.Win32.Pincav.cay",
"Trojan.MulDrop.29150",
"Trojan:Win32/Cinject.B",
"Win-Trojan/Ristix.8192",
"Trojan.Win32.Pincav.cay",
"Packer.Win32.UnkPacker.a",
"Trj/Downloader.MDW"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"However,",
"after",
"reverse",
"analysis,",
"we",
"found",
"that",
"it",
"to",
"be",
"part",
"of",
"a",
"brand",
"new",
"family,",
"which",
"we",
"called",
"Alice."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
3
] |
[
"]",
"it",
"server1fi.exodus.connexxa",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"]",
"it",
"(",
"\"",
"attiva",
"''",
"is",
"the",
"Italian",
"for",
"\"",
"activate",
"''",
")",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"App",
"Swap",
"Per",
"Device",
"Avg",
"."
] | [
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.OnGameZLEU.Worm",
"Trojan.Reval.28280",
"TROJ_SPNR.05AD13",
"TROJ_SPNR.05AD13",
"Worm.MSIL.Autorun",
"Trojan/MSIL.hcf",
"TR/BAS.Samca.22510458",
"Trojan/MSIL.Hor",
"Trojan:MSIL/Reval.A",
"Trojan.Zusy.D53EB"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"These",
"analysts",
"were",
"linked",
"by",
"their",
"coverage",
"of",
"the",
"telecommunications",
"industry,",
"making",
"this",
"targeting",
"very",
"similar",
"to,",
"and",
"likely",
"a",
"continuation",
"of,",
"activity",
"described",
"in",
"our",
"In",
"Pursuit",
"of",
"Optical",
"Fibers",
"and",
"Troop",
"Intel",
"blog."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Perhaps",
"the",
"most",
"interesting",
"aspect",
"of",
"the",
"Snake",
"Wine",
"group",
"is",
"the",
"number",
"of",
"techniques",
"used",
"to",
"obscure",
"attribution."
] | [
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dumpy.A6",
"Trojan.Zusy.DFB8F",
"W32.Dompie",
"WORM_DUMPY.SM23",
"Trojan.Win32.Hesv.apqe",
"Trojan.Win32.AVKill.dqemmh",
"Troj.W32.Scar.tnl2",
"TrojWare.Win32.Injector.XYNZ",
"Trojan.AVKill.33151",
"WORM_DUMPY.SM23",
"WORM/Taranis.2225",
"Trojan.Win32.Hesv.apqe",
"HEUR/Fakon.mwf",
"Trojan.Scar",
"Worm.AutoRun",
"Worm.Win32.Dumpy"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"SEND_SMS",
"-",
"Allows",
"the",
"application",
"to",
"send",
"SMS",
"messages",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"mainly",
"targets",
"Chinese",
"users,",
"but",
"has",
"also",
"successfully",
"affected",
"people",
"and",
"organizations",
"in",
"the",
"United",
"States,",
"United",
"Kingdom,",
"Thailand,",
"Spain,",
"and",
"Ireland."
] | [
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
4,
16,
4,
16,
2,
10,
10,
10,
10,
10,
10,
16,
2
] |
[
"If",
"rooting",
"is",
"successful",
",",
"the",
"attacker",
"has",
"full",
"control",
"of",
"the",
"device",
"and",
"can",
"execute",
"privileged",
"commands",
"remotely",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Swisyn!O",
"VirTool.VBInject.DZ",
"Trojan.Swisyn.Win32.11562",
"Troj.W32.Swisyn.lsGr",
"Win32.Worm.IRCBot.ad",
"W32/MalwareS.BHPN",
"Win32/Swisyn.DJ",
"TROJ_SWISYN.SMK",
"Trojan.Win32.Swisyn.ahwe",
"Trojan.Win32.Swisyn.btyha",
"Trojan.Win32.A.Swisyn.327680",
"Trojan.VbCrypt.68",
"TROJ_SWISYN.SMK",
"BehavesLike.Win32.VBObfus.fm",
"Trojan.Win32.Swisyn",
"Trojan/Swisyn.lxc",
"Trojan.Symmi.D2474",
"Trojan.Win32.Swisyn.ahwe",
"Trojan/Win32.Swisyn.R2925",
"Trojan.VBRA.03646",
"W32/Swisyn.F.worm",
"Win32/AutoRun.IRCBot.FL",
"Virus.Win32.Virut.ue",
"Win32/RootKit.Rootkit.7e5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"our",
"9002",
"blog",
"we",
"noted",
"some",
"additional",
"infrastructure",
"used",
"either",
"as",
"C2s",
"for",
"related",
"Poison",
"Ivy",
"samples",
",",
"or",
"domain",
"registrant",
"overlap",
"with",
"those",
"C2",
"domains",
"."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
")",
"You",
"should",
"also",
"avoid",
"the",
"temptation",
"to",
"play",
"games",
"from",
"sources",
"other",
"than",
"legitimate",
"app",
"stores",
";",
"such",
"games",
"are",
"not",
"safe",
"and",
"may",
"bring",
"harm",
"to",
"your",
"reputation",
"and",
"your",
"bank",
"account",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"has",
"functionality",
"to",
"steal",
"user",
"credentials,",
"provide",
"shell",
"access,",
"and",
"persist",
"through",
"firmware",
"upgrades."
] | [
3,
11,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
1,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Zum.Razy.1",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Zum.Razy.1",
"Zum.Razy.1",
"BehavesLike.Win32.Trojan.dh",
"Zum.Razy.1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Agent",
"Smith",
":",
"A",
"New",
"Species",
"of",
"Mobile",
"Malware",
"July",
"10",
",",
"2019",
"Check",
"Point",
"Researchers",
"recently",
"discovered",
"a",
"new",
"variant",
"of",
"mobile",
"malware",
"that",
"quietly",
"infected",
"around",
"25",
"million",
"devices",
",",
"while",
"the",
"user",
"remains",
"completely",
"unaware",
"."
] | [
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"However",
",",
"thanks",
"to",
"the",
"infrastructure",
"sharing",
"and",
"forgotten",
"panel",
"names",
",",
"we",
"assess",
"with",
"high",
"confidence",
"that",
"this",
"actor",
"is",
"still",
"active",
",",
"it",
"is",
"still",
"developing",
"malware",
"and",
"has",
"been",
"using",
"it",
"from",
"mid-June",
"to",
"today",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"These",
"malware",
"pose",
"as",
"legitimate",
"Facebook",
"or",
"Chrome",
"applications",
"."
] | [
16,
16,
16,
16,
16,
5,
16,
5,
16,
16
] |
[
"This",
"creates",
"a",
"chain",
"of",
"events",
"that",
"triggers",
"the",
"automatic",
"pop-up",
"of",
"the",
"ransomware",
"screen",
"without",
"doing",
"infinite",
"redraw",
"or",
"posing",
"as",
"system",
"window",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"According",
"to",
"our",
"telemetry",
",",
"that",
"was",
"the",
"year",
"the",
"distribution",
"campaign",
"was",
"at",
"its",
"most",
"active",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.NSIS.NeksMiner.A",
"WORM_CO.331300D2",
"Win32.Trojan.WisdomEyes.16070401.9500.9766",
"W32/Adware.DEZV-3749",
"Trojan.Coinbitminer",
"WORM_CO.331300D2",
"Win.Trojan.Virtob-1633",
"Worm.NSIS.BitMin.d",
"Trojan.Win32.BitCoinMiner.ddjqfi",
"Trojan.BtcMine.1665",
"BehavesLike.Win32.TrojanCoinMiner.vc",
"Trojan-PSW.Win32.Tepfer",
"W32/Adware.ALRW",
"RiskTool.BitCoinMiner.bf",
"Trojan[PSW]/Win32.Tepfer",
"Worm:Win32/NeksMiner.A",
"Trojan.Strictor.D1B5F4",
"Worm.NSIS.BitMin.d",
"Trojan/Win32.BitCoinMiner.C931392",
"TScope.Malware-Cryptor.SB",
"RiskWare.BitCoinMiner",
"NSIS/CoinMiner.T",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"addition",
"to",
"official",
"banking",
"applications",
",",
"the",
"target",
"list",
"includes",
"111",
"other",
"global",
"financial",
"applications",
"for",
"banking",
"and",
"credit",
"card",
"management",
",",
"money",
"transfers",
",",
"and",
"cryptocurrency",
"wallets",
"and",
"exchanges",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Like",
"all",
"of",
"Microsoft",
"β",
"s",
"security",
"solutions",
",",
"these",
"new",
"capabilities",
"are",
"likewise",
"backed",
"by",
"a",
"global",
"network",
"of",
"threat",
"researchers",
"and",
"security",
"experts",
"whose",
"deep",
"understanding",
"of",
"the",
"threat",
"landscape",
"guide",
"the",
"continuous",
"innovation",
"of",
"security",
"features",
"and",
"ensure",
"that",
"customers",
"are",
"protected",
"from",
"ever-evolving",
"threats",
"."
] | [
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Recently",
"observed",
"initial",
"threat",
"activities",
"targeting",
"the",
"telecommunication",
"sector."
] | [
16,
16,
16,
3,
11,
16,
4,
12,
12
] |
[
"We",
"decided",
"to",
"check",
"the",
"original",
"plugin",
"package",
"and,",
"to",
"our",
"surprise,",
"found",
"the",
"file",
"in",
"the",
"source!",
"We",
"also",
"discovered",
"that",
"we",
"were",
"not",
"the",
"only",
"ones",
"that",
"found",
"this",
"file",
"although",
"people",
"on",
"the",
"forum",
"seemed",
"to",
"believe",
"that",
"the",
"file",
"was",
"just",
"vulnerable",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Late",
"last",
"year",
",",
"after",
"receiving",
"a",
"list",
"of",
"suspicious",
"package",
"names",
"from",
"Lookout",
",",
"we",
"discovered",
"that",
"a",
"few",
"dozen",
"Android",
"devices",
"may",
"have",
"installed",
"an",
"application",
"related",
"to",
"Pegasus",
",",
"which",
"we",
"named",
"Chrysaor",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
3,
16
] |
[
"It",
"is",
"interesting",
"to",
"see",
"that",
"the",
"group",
"has",
"expanded",
"their",
"operation",
"to",
"other",
"regions",
",",
"such",
"as",
"the",
"United",
"States",
"and",
"Europe",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"way,",
"the",
"HTA",
"effectively",
"serves",
"as",
"a",
"wrapper",
"to",
"try",
"and",
"slip",
"passed",
"traditional",
"file",
"type-based",
"scanning",
"in",
"the",
"network",
"as",
"well",
"as",
"anti-spam",
"services."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
5,
16,
16,
5,
13,
13
] |
[
"In",
"addition",
"to",
"the",
"look",
"and",
"feel",
"of",
"DroidVPN",
",",
"this",
"HenBox",
"variant",
"also",
"contained",
"a",
"legitimate",
"DroidVPN",
"app",
"within",
"its",
"APK",
"package",
"as",
"an",
"asset",
",",
"which",
"could",
"be",
"compared",
"to",
"a",
"resource",
"item",
"within",
"a",
"Windows",
"Portable",
"Executable",
"(",
"PE",
")",
"file",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
3,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16
] |
[
"ESET",
"researchers",
"discovered",
"a",
"campaign",
"that",
"we",
"attribute",
"with",
"high",
"confidence",
"to",
"the",
"APT",
"group",
"Tick."
] | [
4,
12,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Small.eivvce",
"Trojan.Inject2.21676",
"BehavesLike.Win64.BadFile.wc",
"PUA.Zzinfor",
"TrojanDropper.Dinwod.aml",
"Dropper/Win32.Dinwod.C1833968",
"Trojan.Mikey.D1229E",
"Rootkit.Small!LMZdSa8k9cE",
"Win32/Trojan.45a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"injected",
"DLL",
"then",
"downloads",
"the",
"fileless",
"Gootkit",
"and",
"saves",
"it",
"in",
"the",
"registry",
"as",
"binary",
"data,",
"then",
"loading",
"it",
"in",
"memory",
"only."
] | [
1,
9,
9,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
1,
16,
1,
9,
16,
16,
16,
16,
1,
16
] |
[
"On",
"April",
"3",
",",
"2016",
",",
"we",
"still",
"observed",
"new",
"RuMMS",
"samples",
"emerging",
"in",
"the",
"wild",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16
] |
[
"This",
"article",
"mainly",
"analyzes",
"the",
"controlling",
"end,",
"the",
"generator",
"and",
"Windows",
"and",
"Linux",
"variants",
"in",
"controlled",
"end",
"of",
"this",
"tool",
"and",
"makes",
"a",
"display",
"of",
"the",
"homologous",
"analysis",
"and",
"network",
"infection",
"of",
"these",
"samples."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16
] |
[
"By",
"monitoring",
"the",
"package",
"installation",
"broadcast",
"event",
",",
"XLoader",
"can",
"start",
"their",
"packages",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16
] |
[
"Distribution",
"of",
"victims",
"."
] | [
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Zlob",
"Adware.NetAdware.BD"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"If",
"brother.apk",
"application",
"is",
"removed",
",",
"mcpef.apk",
"reinstalls",
"brother.apk",
"from",
"assets",
"."
] | [
16,
5,
16,
16,
16,
16,
5,
16,
5,
16,
16,
16
] |
[
"Command",
"to",
"change",
"the",
"beaconing",
"changeArchive",
":",
"The",
"final",
"command",
"of",
"the",
"activation",
"cycle",
"is",
"the",
"download",
"of",
"an",
"archive",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"figure",
"below",
"shows",
"a",
"fragment",
"of",
"encrypted",
"JAR",
"stored",
"in",
".rodata",
"section",
"of",
"a",
"shared",
"object",
"shipped",
"with",
"the",
"APK",
"as",
"well",
"as",
"the",
"XOR",
"key",
"used",
"for",
"decryption",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FakeSvchostXKRB.Trojan",
"Trojan-Downloader.Win32.Geral!O",
"Downloader.Dogrobot.20415",
"Win32/SillyDl.QAC",
"Trojan-Dropper.Win32.Injector.paib",
"Trojan.Win32.Vilsel.iini",
"Troj.Downloader.W32.Geral.kYTA",
"Trojan.Win32.Downloader.wzh",
"BackDoor.Guan.14",
"Downloader.Geral.Win32.1376",
"BehavesLike.Win32.StartPage.lm",
"W32.Malware.Downloader",
"Trojan[Dropper]/Win32.Injector",
"Trojan.Win32.Downloader.16384.BHH",
"Trojan-Dropper.Win32.Injector.paib",
"TrojanDownloader:Win32/Dogrobot.D",
"Trojan.Win32.Qhost"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"/proc",
"filesystem",
"is",
"now",
"mounted",
"with",
"a",
"hidepid=2",
"parameter",
",",
"which",
"means",
"that",
"the",
"process",
"can",
"not",
"access",
"other",
"process",
"/proc/",
"[",
"pid",
"]",
"directory",
"."
] | [
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Dialer!O",
"Trojan.Zenshirsh.SL7",
"Trojan.Dialer",
"Win32.Trojan.WisdomEyes.16070401.9500.9746",
"Win32/Startpage.RT",
"TROJ_CJ.A",
"Win.Trojan.Dialer-61",
"Trojan.Win32.Dialer.cj",
"Trojan.Win32.MLW.wvye",
"Troj.W32.Diamin.l3NB",
"TrojWare.Win32.Dialer.A",
"Dialer.Virgilio",
"TROJ_CJ.A",
"Trojan/Dialer.cio",
"Trojan/Win32.Dialer",
"Trojan.Win32.Dialer.cj",
"Trojan/Win32.Dialer.R2306",
"MalwareScope.Dialer.Small.1",
"Dialer.LBU",
"Win32.Trojan.Dialer.Pgxd",
"Trojan.Win32.Dialer.cj"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Thanks",
"to",
"Bulwarkz",
"for",
"additional",
"Forensic",
"Analysis:",
"-",
"Clears",
"the",
"windows",
"event",
"log",
"-",
"Clears",
"the",
"journal",
"log",
"-",
"Drops",
"executables",
"to",
"the",
"windows",
"directory",
"and",
"starts",
"them",
"-",
"Shows",
"the",
"ability",
"to",
"spread",
"by",
"using",
"its",
"contained",
"functionality",
"to",
"enumerate",
"network",
"shares",
"of",
"other",
"attached",
"devices",
"-",
"Uses",
"shutdown.exe",
"to",
"shutdown",
"or",
"reboot",
"the",
"system",
"-",
"Contains",
"functionality",
"to",
"register",
"a",
"low",
"level",
"keyboard",
"hook",
"-",
"Contains",
"functionality",
"to",
"infect",
"the",
"boot",
"sector."
] | [
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
1,
9,
9,
9,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
16,
1,
9,
9,
9,
9,
9,
9,
9,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
1,
9,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9894",
"Trojan.Win32.CsDown.bdcfvq",
"Trojan.CsDown.25",
"TrojanDropper:Win32/Waltrodock.B",
"Trojan.Graftor.D4ACD",
"Trojan.CsNowDown!qDe+BhsdQ1Y",
"W32/WDockDrp.A!tr",
"Trj/CI.A",
"Win32/Trojan.8ea"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"decoy",
"documents",
"and",
"filenames",
"used",
"in",
"the",
"attacks",
"suggest",
"the",
"intended",
"targets",
"include",
"organisations",
"with",
"political",
"interests",
"or",
"influence",
"in",
"Israel",
"and",
"Palestine."
] | [
16,
1,
9,
9,
9,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
2,
16,
2
] |
[
"A",
"lot",
"of",
"additional",
"anti-sandbox",
"checks",
"are",
"performed",
"in",
"this",
"exact",
"order",
":",
"Check",
"that",
"the",
"malware",
"is",
"not",
"executed",
"under",
"the",
"root",
"folder",
"of",
"a",
"drive",
"Check",
"that",
"the",
"malware",
"file",
"is",
"readable",
"from",
"an",
"external",
"source",
"Check",
"that",
"the",
"hash",
"of",
"base",
"path",
"is",
"not",
"3D6D62AF1A7C8053DBC8E110A530C679",
"Check",
"that",
"the",
"full",
"malware",
"path",
"contains",
"only",
"human",
"readable",
"characters",
"(",
"β",
"a-z",
"β",
",",
"β",
"A-Z",
"β",
",",
"and",
"β",
"0-9",
"β",
")",
"Check",
"that",
"no",
"node",
"in",
"the",
"full",
"path",
"contains",
"the",
"MD5",
"string",
"of",
"the",
"malware",
"file",
"Fingerprint",
"the",
"system",
"and",
"check",
"the",
"following",
"registry",
"values",
":",
"HKLM\\SOFTWARE\\Microsoft\\Cryptography\\MachineGuid",
"should",
"not",
"be",
"β",
"6ba1d002-21ed-4dbe-afb5-08cf8b81ca32",
"β",
"HKLM\\SOFTWARE\\Microsoft\\Windows",
"NT\\CurrentVersion\\DigitalProductId",
"should",
"not",
"be",
"β",
"55274-649-6478953-23109",
"β",
",",
"β",
"A22-00001",
"β",
",",
"or",
"β",
"47220",
"β",
"HARDWARE\\Description\\System\\SystemBiosDate",
"should",
"not",
"contain",
"β",
"01/02/03",
"β",
"Check",
"that",
"the",
"mutex",
"WininetStartupMutex0",
"does",
"not",
"already",
"exist",
"Check",
"that",
"no",
"DLL",
"whose",
"base",
"name",
"has",
"hash",
"value",
"of",
"0xC9CEF3E4",
"is",
"mapped",
"into",
"the",
"malware",
"address",
"space",
"The",
"hashes",
"in",
"these",
"checks",
"are",
"most",
"likely",
"correspond",
"to",
"sandbox",
"or",
"security",
"products",
"that",
"the",
"FinFisher",
"authors",
"want",
"to",
"avoid",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
1,
16,
1,
9,
16,
16,
16,
16,
1,
16,
16,
16,
1,
16,
16,
16,
16,
1,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16
] |
[
"Halloween",
"is",
"still",
"a",
"month",
"from",
"now",
"and",
"yet",
"Android",
"users",
"are",
"already",
"being",
"haunted",
"by",
"the",
"previously",
"reported",
"Ghost",
"Push",
"malware,",
"which",
"roots",
"devices",
"and",
"makes",
"them",
"download",
"unwanted",
"ads",
"and",
"apps."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
5,
13,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"Last",
"March,",
"we",
"reported",
"on",
"Operation",
"C-Major,",
"an",
"active",
"information",
"theft",
"campaign",
"that",
"was",
"able",
"to",
"steal",
"sensitive",
"information",
"from",
"high",
"profile",
"targets",
"in",
"India."
] | [
16,
0,
16,
16,
16,
6,
14,
16,
16,
16,
6,
14,
16,
16,
16,
16,
1,
9,
9,
16,
4,
12,
12,
16,
2
] |
[
"Custom",
"Content",
"Type",
"Manager",
"CCTM",
"is",
"a",
"relatively",
"popular",
"plugin",
"with",
"three",
"years",
"of",
"development,",
"10,000+",
"active",
"installs,",
"and",
"a",
"satisfaction",
"rating",
"of",
"4.8.",
"It",
"helps",
"create",
"custom",
"post",
"types."
] | [
4,
12,
12,
12,
12,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"extent",
"of",
"information",
"that",
"these",
"kinds",
"of",
"threats",
"can",
"steal",
"is",
"also",
"significant",
",",
"as",
"it",
"lets",
"attackers",
"virtually",
"take",
"over",
"a",
"compromised",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Heur.AutoIT.13",
"Win32/Fynloski.STBTHUD",
"Trojan.Win32.DarkKomet.dokuem",
"Trojan.DownLoader12.11337",
"Trojan.Script.abcv",
"Trojan:Win32/Manger.A",
"Trojan.Autoit.Wirus",
"Win32/TrojanDropper.Autoit.IC",
"Win32/Trojan.Script.ed4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Moreover,",
"the",
"Sednit",
"group",
"has",
"a",
"special",
"interest",
"in",
"Eastern",
"Europe,",
"where",
"it",
"regularly",
"targets",
"individuals",
"and",
"organizations",
"involved",
"in",
"geopolitics"
] | [
16,
16,
6,
14,
16,
16,
16,
16,
16,
2,
10,
16,
16,
16,
16,
4,
16,
4,
16,
16,
16
] |
[
"This",
"virus",
"ransomware",
"arrives",
"via",
"email",
"in",
"a",
"malicious",
"attachment",
"or",
"by",
"usurping",
"an",
"Adobe",
"Flash",
"Player",
"installation."
] | [
16,
3,
11,
16,
16,
1,
16,
16,
1,
9,
16,
16,
1,
16,
1,
9,
9,
9
] |
[
"Within",
"a",
"few",
"minutes",
"of",
"installing",
"one",
"of",
"these",
"Trojans,",
"all",
"other",
"active",
"malware",
"on",
"the",
"network",
"is",
"enabled",
"on",
"the",
"victim's",
"device."
] | [
16,
16,
0,
8,
16,
16,
16,
16,
16,
3,
16,
16,
16,
3,
16,
16,
12,
16,
16,
16,
16,
5,
13
] |
[
"This",
"particular",
"application/game",
"from",
"Google",
"Play",
"Store",
"is",
"certainly",
"not",
"a",
"system",
"application,",
"as",
"the",
"name",
"seems",
"intended",
"to",
"suggest."
] | [
16,
16,
5,
16,
5,
13,
13,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"bank",
"then",
"shared",
"indicators",
"of",
"compromise",
"IOCs",
"with",
"other",
"institutions",
"and",
"a",
"number",
"of",
"other",
"institutions",
"confirmed",
"that",
"they",
"too",
"had",
"been",
"compromised."
] | [
4,
12,
16,
16,
1,
9,
9,
9,
16,
16,
4,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
1
] |
[
"Windows",
"Defender",
"ATP",
"timeline",
"can",
"pinpoint",
"the",
"service",
"DLL",
"side-loading",
"trick",
"(",
"in",
"this",
"example",
",",
"using",
"fltlib.dll",
")",
"."
] | [
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16
] |
[
"A",
"few",
"of",
"these",
"organizations",
"have",
"specifically",
"been",
"targeted",
"by",
"OceanLotus",
"since",
"early",
"2015."
] | [
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
4,
16,
0,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.MurLoDll1.Trojan",
"Trojan-Downloader.Win32.Murlo!O",
"Downloader.Murlo.Win32.5244",
"Trojan/Downloader.Murlo.nn",
"TROJ_MURLO.BA",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"W32/Downloader.EKMU-1740",
"Win32/TrojanDownloader.Murlo.NN",
"TROJ_MURLO.BA",
"Win.Trojan.Murlo-7",
"Trojan-Downloader.Win32.Murlo.nn",
"Trojan.Win32.Murlo.cpwkr",
"Trojan.Win32.Downloader.5632.AY",
"Trojan.DownLoader.62110",
"Trojan-Downloader.Win32.Murlo",
"W32/Downldr2.CIAF",
"TrojanDownloader.Murlo.hb",
"Trojan[Downloader]/Win32.Murlo",
"TrojanDownloader:Win32/Almanahe.A",
"Trojan-Downloader.Win32.Murlo.nn",
"Win32/SillyDl.EPI",
"TrojanDownloader.Murlo",
"W32/Murlo.NN!tr.dldr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Attackers",
"are",
"growing",
"smarter",
",",
"targeting",
"individuals",
"through",
"the",
"devices",
"and",
"the",
"services",
"they",
"use",
"most",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Recently",
",",
"we",
"have",
"come",
"across",
"another",
"variant",
"of",
"this",
"app",
"portraying",
"itself",
"as",
"TikTok",
"Pro",
",",
"but",
"this",
"is",
"a",
"full-fledged",
"spyware",
"with",
"premium",
"features",
"to",
"spy",
"on",
"victim",
"with",
"ease",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Wabbin",
"Win32.Trojan.WisdomEyes.16070401.9500.9773",
"W32.Wabbin",
"Win.Worm.Wabbin-1",
"Email-Worm.Win32.Wabbin",
"Trojan.Win32.Wabbin.eoih",
"Email.Worm.W32!c",
"IM-Worm.Win32.VB",
"W32/Trojan.TLKW-6882",
"Worm[Email]/Win32.Wabbin",
"Trojan.Heur.VP.E513A3",
"Email-Worm.Win32.Wabbin",
"Worm:Win32/Wabbin.A@mm",
"Worm.Wabbin",
"Trj/CI.A",
"Win32.Worm-email.Wabbin.Dxnb",
"Worm.Wabbin!",
"W32/Wabbin.A@mm",
"Win32/Trojan.97a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"I-Worm.Music.C",
"W32/Music.40960.B",
"Music.H",
"WORM_MUSIC.B",
"Email-Worm.Win32.Music.B",
"Worm.Win32.Email-Worm.Music.B",
"BACKDOOR.Trojan",
"WORM_MUSIC.B",
"W32/Music.40960.B",
"I-Worm/Music.b",
"WORM/Music.B",
"Worm:Win32/Music.C@mm",
"I-Worm.Win32.Music.B[h]",
"W32/Music.B",
"Win32/Music.B",
"Email-Worm.Win32.Music.A",
"W32/Music.B@mm",
"Worm.Win32.Music.Abh"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Hijack.356352.M",
"VirTool.DelfInject",
"Trojan.DelfInject",
"Dropper.Injector.Win32.25443",
"Trojan/Dropper.Injector.dyha",
"Win32.Trojan.Delf.k",
"TROJ_NEOJIT.SMAR",
"Trojan.Win32.Buzus.rfedr",
"Trojan.DownLoader6.1239",
"TROJ_NEOJIT.SMAR",
"BehavesLike.Win32.Worm.fh",
"TrojanDropper.Injector.taw",
"Trojan/Win32.Buzus",
"TrojanDownloader:Win32/Neojit.A",
"Trojan/Win32.Injector.R23295",
"BScope.Trojan-Dropper.Injector",
"Win32/Delf.OEN",
"Trojan-Downloader.Win32.Neojit",
"Win32/Trojan.dee"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.MTX.B@mm",
"W95.MTX",
"Win32.MTX.B@mm",
"W32/[email protected]",
"WORM_MTX.D",
"W32/MTX.9244.B",
"WORM_MTX.D",
"Win.Trojan.MTX-5",
"Win32.MTX.B@mm",
"Email-Worm.Win32.MTX.D",
"Win32.MTX.B@mm",
"Virus.Win32.MTX.hfxi",
"Win32.MTX",
"Win32.MTX.B@mm",
"Win32.MTX.B@mm",
"Win95.Matrix.9307",
"W95/MTX.dll@M",
"W32/MTX.9244.B",
"I-Worm/MTX.d",
"W95/Mtx.B",
"Win32.MTX.E2C45E",
"Email-Worm.Win32.MTX.D",
"Worm:Win32/MTX.B.dll",
"W95/MTX.dll@M",
"W32/MTX.D!worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"fake",
"alert",
"will",
"notify",
"and",
"urge",
"the",
"user",
"to",
"access",
"the",
"malicious",
"domain",
"and",
"download",
"XLoader",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Small.9728.KQ",
"Win32.Trojan.WisdomEyes.16070401.9500.9990",
"Backdoor.Teambot",
"Win.Trojan.Zapchast-130",
"Trojan.Win32.TeamBot.ctspsr",
"BackDoor.TeamBot.60",
"Trojan/Zapchast.exm",
"W32/Sheldor.NAB!tr",
"Win32.Troj.Undef.kcloud",
"Trojan.Graftor.Elzob.950",
"Troj.W32.Zapchast.lhAn",
"Trojan:Win32/Availmetre.B",
"Trojan/Win32.Zapchast.R17936",
"SScope.Backdoor.Mudak",
"Trojan.Win32.Availmetre"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Sending",
"text",
"β",
"confirm",
"1",
"β",
"will",
"include",
"proof",
"of",
"payment",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win32!O",
"Backdoor.Small.MUE.A11",
"RiskWare.SpySoft",
"Trojan.Udr.Win32.1",
"W32/BackdoorX.GMX",
"Backdoor.Trojan",
"Win32/BackMan.A",
"BKDR_NEWHEUR.IZ",
"Win.Trojan.Udr-1",
"Backdoor.Win32.Udr.a",
"Trojan.Win32.Udr.csnpza",
"Backdoor.Win32.Udr.aa",
"BackDoor.Udr.1",
"BKDR_NEWHEUR.IZ",
"BehavesLike.Win32.Backdoor.fc",
"W32/Backdoor.COLY-8496",
"Backdoor/Udr.d",
"BDS/Udr.A",
"Trojan[Backdoor]/Win32.Udr",
"Win32.Hack.Udr.B5.kcloud",
"Backdoor.Win32.Udr.692018",
"Backdoor.Win32.Udr.a",
"Trojan/Win32.Udr.R577",
"OScope.Backdoor.Udr",
"Backdoor.JYfi",
"Backdoor.Udr!EwW5NHJTxmo",
"Backdoor.Win32.Udr",
"W32/Udr.A!tr.bdr",
"Dialer.CKP"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"also",
"has",
"a",
"general",
"purpose-proxy",
"and",
"a",
"module",
"for",
"sending",
"spam",
"messages."
] | [
16,
16,
16,
16,
4,
15,
16,
16,
1,
9,
9,
9,
9
] |
[
"The",
"attackers",
"attempted",
"to",
"steal",
"$951m,",
"of",
"which",
"$81m",
"is",
"still",
"unaccounted",
"for."
] | [
16,
6,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9828",
"Win32.Trojan.Kriskynote.Ozic",
"Trojan.Win32.Kriskynote",
"Backdoor:Win32/Kriskynote.A",
"BScope.Trojan.SvcHorse.01643",
"W32/Dropper.TMP!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"]",
"net",
"www",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"Before",
"that",
"patch",
"was",
"released,",
"the",
"groups",
"launched",
"phishing",
"campaigns",
"against",
"multiple",
"companies",
"in",
"the",
"aerospace",
"and",
"defense,",
"construction",
"and",
"engineering,",
"education,",
"energy,",
"health",
"and",
"biotechnology,",
"high",
"tech,",
"non-profit,",
"telecommunications,",
"and",
"transportation",
"industries."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
4,
12,
16,
16,
4,
16,
4,
16,
16,
4,
12,
12,
12,
16,
4,
12,
12,
12,
12,
16,
4,
12
] |
[
"Figure",
"3",
":",
"Loading",
"core",
"malicious",
"code",
"into",
"the",
"benign",
"application",
"Once",
"the",
"β",
"core",
"β",
"module",
"is",
"extracted",
"and",
"loaded",
",",
"the",
"β",
"loader",
"β",
"uses",
"the",
"reflection",
"technique",
"to",
"initialize",
"and",
"start",
"the",
"β",
"core",
"β",
"module",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Ollexos",
"Win32.Trojan.Heur.Lhdl",
"Trojan.Heur.Win32.9371",
"BehavesLike.Win32.Spyware.jc",
"TR/RedCap.xrytt",
"Trojan.Heur.OmNfrrOwGgmOh",
"Trojan.Win32.Z.Redcap.655360",
"Trojan:Win32/Ollexos.A",
"Win32/Trojan.7b0"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.