tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAdware.B36E", "Application.Bundler.DomaIQ.Q", "PUP.Optional.BundleInstaller", "Adware.DomaIQ.Win32.132", "Adware.DomaIQ/Variant", "Application.Bundler.DomaIQ.Q", "Win32.Adware.DomnIQ.b", "Infostealer.Limitail", "Win32/DomainIQ.eOTUWS", "Win.Adware.Domaiq-1", "not-a-virus:AdWare.MSIL.DomaIQ.clek", "Application.Bundler.DomaIQ.Q", "Trojan.Win32.DomaIQ.ctadmg", "Adware.Win32.Lollipop.f", "Application.Bundler.DomaIQ.Q", "Application.Win32.DomaIQ.URT", "Trojan.DownLoader9.21779", "AdWare/MSIL.ps", "Pua.Tuguu", "GrayWare[AdWare]/MSIL.DomaIQ", "TrojanDownloader:Win32/Tugspay.A", "not-a-virus:AdWare.MSIL.DomaIQ.clek", "Win32.Application.DomalQ.G", "PUP/Win32.DomaIQ.R99208", "BScope.Downware.DomaIQ", "PUA.DomaIQ!", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "app", "also", "creates", "hooks", "to", "prevent", "the", "phone", "from", "rebooting", ",", "going", "to", "sleep", "or", "allowing", "the", "user", "from", "pressing", "hardware", "buttons", "during", "the", "account", "creation", "process", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "the", "analysis", "that", "follows", ",", "we", "describe", "in", "detail", "the", "capabilities", "of", "this", "new", "variant", "and", "a", "β€œ", "kill", "switch", "”", "that", "can", "remotely", "eliminate", "the", "malware", "from", "a", "mobile", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Between", "December", "2021", "and", "July", "2022,", "the", "Mandiant", "Managed", "Defense", "and", "Incident", "Response", "teams", "responded", "to", "three", "UNC961", "intrusions", "at", "different", "organizations", "that", "each", "started", "in", "similar", "fashion." ]
[ 16, 0, 8, 16, 0, 8, 4, 12, 12, 12, 12, 12, 12, 12, 16, 16, 16, 6, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16 ]
[ "Thanks", "to", "this", "data", "leak", ",", "we", "were", "able", "to", "confirm", "that", "the", "malware", "really", "worked", "as", "designed", ":", "the", "attacker", "had", "access", "to", "the", "victims", "’", "entered", "credentials", ",", "displayed", "or", "written", "emails", "and", "messages", ",", "etc", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Stealing", "SMS", "The", "Gxextsxms", "command", "is", "responsible", "for", "fetching", "all", "the", "SMS", "messages", "from", "the", "victim", "'s", "device", "and", "sending", "it", "over", "to", "the", "C", "&", "C", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "VM", "dispatcher", "loop", "routine", "ends", "with", "a", "JMP", "to", "another", "routine", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "When", "the", "user", "tries", "to", "open", "one", "of", "these", "legitimate", "apps,", "the", "malware", "replaces", "the", "genuine", "app", "window", "with", "a", "phishing", "window", "that", "asks", "for", "banking", "information." ]
[ 16, 16, 4, 16, 16, 16, 16, 16, 16, 5, 13, 16, 3, 1, 16, 1, 16, 1, 16, 16, 1, 1, 15, 1, 9, 9, 9 ]
[ "Infrastructure", "The", "infrastructure", "supporting", "this", "malware", "is", "rather", "complex", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "the", "past", ",", "we", "have", "seen", "other", "activity", "groups", "like", "LEAD", "employ", "a", "similar", "attacker", "technique", "named", "β€œ", "proxy-library", "”", "to", "achieve", "persistence", ",", "but", "not", "with", "this", "professionalism", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.TikoraxaDSB.Trojan", "Trojandownloader.Script", "W32/Snojan.OHXS-3777", "VBS/TrojanDownloader.Small.NGH", "Trojan.Win32.Mlw.evnleg", "Troj.Downloader.Script!c", "BehavesLike.Win32.Downloader.dh", "Trojan-Downloader.VBS.Small", "W32/Snojan.Q", "Trojan.Pincav.aer", "VBS/Dldr.Small.vxbdh", "Trojan.DL.Alien!", "Trojan.Snojan", "Trj/CI.A", "Script/Virus.72d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Lookout", "uncovered", "nine", "secondary", "payload", "applications", ":", "*", "These", "apps", "have", "not", "been", "previously", "reported", "and", "were", "discovered", "using", "data", "from", "the", "Lookout", "global", "sensor", "network", ",", "which", "collects", "app", "and", "device", "information", "from", "over", "100", "million", "sensors", "to", "provide", "researchers", "and", "customers", "with", "a", "holistic", "look", "at", "the", "mobile", "threat", "ecosystem", "today", "." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DownLoadRiniLTN.Trojan", "Trojan.Win32.Scar!O", "Trojan.Popureb.B4", "Trojan/Scar.ejkj", "Trojan.Zusy.D2E760", "TROJ_POPUREB.SM", "Win32.Trojan.Scar.i", "Win32/Scar.ZF", "TROJ_POPUREB.SM", "Win.Trojan.Scar-8452", "Trojan.Win32.Scar.bccuvv", "Trojan.Win32.A.Scar.86016.F", "Backdoor.Win32.Popwin.~IT", "Trojan.DownLoader11.5691", "Trojan.Scar.Win32.75436", "BehavesLike.Win32.Dropper.mm", "Backdoor.Win32.Poison", "TR/Popureb.B.20", "Trojan/Win32.Scar", "Win32.Troj.Poison.b.29696", "Trojan:Win32/Popureb.B", "Trojan/Win32.PbBot.R3997", "Trojan.Scar", "Trojan.Scar", "Trojan.Win32.Scar.tgh", "Trojan.Ghodow!qzMoVFGUIfc", "W32/Scar.ENA!tr", "Win32/Trojan.285" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "the", "past,", "we", "investigated", "TorLocker", "and", "its", "flawed", "encryption,", "which", "was", "created", "and", "negotiated", "worldwide", "by", "a", "Brazilian", "cybercriminal." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 7, 15, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14 ]
[ "The", "Trojan", "itself", "is", "well", "known", "and", "contained", "x32", "and", "x64", "rootkits." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 5, 16, 5, 3 ]
[ "The", "multiple", "downloads", "is", "probably", "a", "redundancy", "measure", "in", "case", "some", "sources", "are", "taken", "down." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "this", "case", "it", "capitalized", "on", "the", "recent", "terrorist", "attack", "in", "New", "York", "City." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 2, 10, 10 ]
[ "A", "backdoor", "also", "known", "as:", "BackDoor-CYK.srv", "Backdoor/VB.alk", "Backdoor.VB!XZJVRUVgqYg", "W32/Backdoor.LPS", "TROJ_MALKZR.A", "Backdoor.Win32.VB.alk", "Backdoor.Win32.VB.37168", "Backdoor.Win32.VB!IK", "Backdoor.Win32.Delf.~EC", "TROJ_MALKZR.A", "Heuristic.BehavesLike.Win32.Downloader.D", "Backdoor/VB.rj", "Backdoor:Win32/Norachs.A", "W32/Backdoor.LPS", "Win-Trojan/Xema.variant", "Trojan.Win32.VB.ALK", "Win32/VB.ALK", "Backdoor.Win32.VB", "W32/VB.ALK!tr", "BackDoor.VB.FLP" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Our", "analysis", "reveals", "connections", "between", "these", "attacks,", "recent", "strategic", "web", "compromises", "against", "Burmese", "government", "websites,", "and", "previous", "campaigns", "targeting", "groups", "in", "the", "Tibetan", "community." ]
[ 16, 16, 16, 16, 16, 16, 1, 16, 16, 1, 9, 16, 1, 9, 9, 16, 16, 6, 14, 14, 16, 16, 2, 10 ]
[ "In", "past", "revivals,", "the", "botnet", "has", "been", "distributed", "through", "malicious", "emails", "containing", "attachments", "or", "links", "to", "compromised", "websites", "hosting", "exploit", "kit", "content." ]
[ 16, 16, 16, 3, 11, 16, 16, 16, 16, 1, 9, 9, 9, 16, 1, 9, 9, 9, 16, 3, 11, 16 ]
[ "This", "was", "probably", "done", "for", "debugging", "purposes", ",", "indicating", "the", "malware", "may", "be", "an", "early", "prototype", "version", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "PWS-Xema.dr", "PWS-Xema.dr", "Trojan.Win32.Malware.4", "W32/Smalltroj.IUNZ", "Win32.TRCrypt.XPACK", "Trojan.Win32.Pincav.cay", "Trojan.MulDrop.29150", "Trojan:Win32/Cinject.B", "Win-Trojan/Ristix.8192", "Trojan.Win32.Pincav.cay", "Packer.Win32.UnkPacker.a", "Trj/Downloader.MDW" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "However,", "after", "reverse", "analysis,", "we", "found", "that", "it", "to", "be", "part", "of", "a", "brand", "new", "family,", "which", "we", "called", "Alice." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 3 ]
[ "]", "it", "server1fi.exodus.connexxa", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "]", "it", "(", "\"", "attiva", "''", "is", "the", "Italian", "for", "\"", "activate", "''", ")", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "App", "Swap", "Per", "Device", "Avg", "." ]
[ 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.OnGameZLEU.Worm", "Trojan.Reval.28280", "TROJ_SPNR.05AD13", "TROJ_SPNR.05AD13", "Worm.MSIL.Autorun", "Trojan/MSIL.hcf", "TR/BAS.Samca.22510458", "Trojan/MSIL.Hor", "Trojan:MSIL/Reval.A", "Trojan.Zusy.D53EB" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "These", "analysts", "were", "linked", "by", "their", "coverage", "of", "the", "telecommunications", "industry,", "making", "this", "targeting", "very", "similar", "to,", "and", "likely", "a", "continuation", "of,", "activity", "described", "in", "our", "In", "Pursuit", "of", "Optical", "Fibers", "and", "Troop", "Intel", "blog." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Perhaps", "the", "most", "interesting", "aspect", "of", "the", "Snake", "Wine", "group", "is", "the", "number", "of", "techniques", "used", "to", "obscure", "attribution." ]
[ 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dumpy.A6", "Trojan.Zusy.DFB8F", "W32.Dompie", "WORM_DUMPY.SM23", "Trojan.Win32.Hesv.apqe", "Trojan.Win32.AVKill.dqemmh", "Troj.W32.Scar.tnl2", "TrojWare.Win32.Injector.XYNZ", "Trojan.AVKill.33151", "WORM_DUMPY.SM23", "WORM/Taranis.2225", "Trojan.Win32.Hesv.apqe", "HEUR/Fakon.mwf", "Trojan.Scar", "Worm.AutoRun", "Worm.Win32.Dumpy" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "SEND_SMS", "-", "Allows", "the", "application", "to", "send", "SMS", "messages", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "mainly", "targets", "Chinese", "users,", "but", "has", "also", "successfully", "affected", "people", "and", "organizations", "in", "the", "United", "States,", "United", "Kingdom,", "Thailand,", "Spain,", "and", "Ireland." ]
[ 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 4, 16, 4, 16, 2, 10, 10, 10, 10, 10, 10, 16, 2 ]
[ "If", "rooting", "is", "successful", ",", "the", "attacker", "has", "full", "control", "of", "the", "device", "and", "can", "execute", "privileged", "commands", "remotely", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Swisyn!O", "VirTool.VBInject.DZ", "Trojan.Swisyn.Win32.11562", "Troj.W32.Swisyn.lsGr", "Win32.Worm.IRCBot.ad", "W32/MalwareS.BHPN", "Win32/Swisyn.DJ", "TROJ_SWISYN.SMK", "Trojan.Win32.Swisyn.ahwe", "Trojan.Win32.Swisyn.btyha", "Trojan.Win32.A.Swisyn.327680", "Trojan.VbCrypt.68", "TROJ_SWISYN.SMK", "BehavesLike.Win32.VBObfus.fm", "Trojan.Win32.Swisyn", "Trojan/Swisyn.lxc", "Trojan.Symmi.D2474", "Trojan.Win32.Swisyn.ahwe", "Trojan/Win32.Swisyn.R2925", "Trojan.VBRA.03646", "W32/Swisyn.F.worm", "Win32/AutoRun.IRCBot.FL", "Virus.Win32.Virut.ue", "Win32/RootKit.Rootkit.7e5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "our", "9002", "blog", "we", "noted", "some", "additional", "infrastructure", "used", "either", "as", "C2s", "for", "related", "Poison", "Ivy", "samples", ",", "or", "domain", "registrant", "overlap", "with", "those", "C2", "domains", "." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ ")", "You", "should", "also", "avoid", "the", "temptation", "to", "play", "games", "from", "sources", "other", "than", "legitimate", "app", "stores", ";", "such", "games", "are", "not", "safe", "and", "may", "bring", "harm", "to", "your", "reputation", "and", "your", "bank", "account", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", "has", "functionality", "to", "steal", "user", "credentials,", "provide", "shell", "access,", "and", "persist", "through", "firmware", "upgrades." ]
[ 3, 11, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 1, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Zum.Razy.1", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Zum.Razy.1", "Zum.Razy.1", "BehavesLike.Win32.Trojan.dh", "Zum.Razy.1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "Agent", "Smith", ":", "A", "New", "Species", "of", "Mobile", "Malware", "July", "10", ",", "2019", "Check", "Point", "Researchers", "recently", "discovered", "a", "new", "variant", "of", "mobile", "malware", "that", "quietly", "infected", "around", "25", "million", "devices", ",", "while", "the", "user", "remains", "completely", "unaware", "." ]
[ 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "However", ",", "thanks", "to", "the", "infrastructure", "sharing", "and", "forgotten", "panel", "names", ",", "we", "assess", "with", "high", "confidence", "that", "this", "actor", "is", "still", "active", ",", "it", "is", "still", "developing", "malware", "and", "has", "been", "using", "it", "from", "mid-June", "to", "today", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "These", "malware", "pose", "as", "legitimate", "Facebook", "or", "Chrome", "applications", "." ]
[ 16, 16, 16, 16, 16, 5, 16, 5, 16, 16 ]
[ "This", "creates", "a", "chain", "of", "events", "that", "triggers", "the", "automatic", "pop-up", "of", "the", "ransomware", "screen", "without", "doing", "infinite", "redraw", "or", "posing", "as", "system", "window", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "According", "to", "our", "telemetry", ",", "that", "was", "the", "year", "the", "distribution", "campaign", "was", "at", "its", "most", "active", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.NSIS.NeksMiner.A", "WORM_CO.331300D2", "Win32.Trojan.WisdomEyes.16070401.9500.9766", "W32/Adware.DEZV-3749", "Trojan.Coinbitminer", "WORM_CO.331300D2", "Win.Trojan.Virtob-1633", "Worm.NSIS.BitMin.d", "Trojan.Win32.BitCoinMiner.ddjqfi", "Trojan.BtcMine.1665", "BehavesLike.Win32.TrojanCoinMiner.vc", "Trojan-PSW.Win32.Tepfer", "W32/Adware.ALRW", "RiskTool.BitCoinMiner.bf", "Trojan[PSW]/Win32.Tepfer", "Worm:Win32/NeksMiner.A", "Trojan.Strictor.D1B5F4", "Worm.NSIS.BitMin.d", "Trojan/Win32.BitCoinMiner.C931392", "TScope.Malware-Cryptor.SB", "RiskWare.BitCoinMiner", "NSIS/CoinMiner.T", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "addition", "to", "official", "banking", "applications", ",", "the", "target", "list", "includes", "111", "other", "global", "financial", "applications", "for", "banking", "and", "credit", "card", "management", ",", "money", "transfers", ",", "and", "cryptocurrency", "wallets", "and", "exchanges", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Like", "all", "of", "Microsoft", "’", "s", "security", "solutions", ",", "these", "new", "capabilities", "are", "likewise", "backed", "by", "a", "global", "network", "of", "threat", "researchers", "and", "security", "experts", "whose", "deep", "understanding", "of", "the", "threat", "landscape", "guide", "the", "continuous", "innovation", "of", "security", "features", "and", "ensure", "that", "customers", "are", "protected", "from", "ever-evolving", "threats", "." ]
[ 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Recently", "observed", "initial", "threat", "activities", "targeting", "the", "telecommunication", "sector." ]
[ 16, 16, 16, 3, 11, 16, 4, 12, 12 ]
[ "We", "decided", "to", "check", "the", "original", "plugin", "package", "and,", "to", "our", "surprise,", "found", "the", "file", "in", "the", "source!", "We", "also", "discovered", "that", "we", "were", "not", "the", "only", "ones", "that", "found", "this", "file", "although", "people", "on", "the", "forum", "seemed", "to", "believe", "that", "the", "file", "was", "just", "vulnerable", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Late", "last", "year", ",", "after", "receiving", "a", "list", "of", "suspicious", "package", "names", "from", "Lookout", ",", "we", "discovered", "that", "a", "few", "dozen", "Android", "devices", "may", "have", "installed", "an", "application", "related", "to", "Pegasus", ",", "which", "we", "named", "Chrysaor", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 3, 16 ]
[ "It", "is", "interesting", "to", "see", "that", "the", "group", "has", "expanded", "their", "operation", "to", "other", "regions", ",", "such", "as", "the", "United", "States", "and", "Europe", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "way,", "the", "HTA", "effectively", "serves", "as", "a", "wrapper", "to", "try", "and", "slip", "passed", "traditional", "file", "type-based", "scanning", "in", "the", "network", "as", "well", "as", "anti-spam", "services." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 5, 16, 16, 5, 13, 13 ]
[ "In", "addition", "to", "the", "look", "and", "feel", "of", "DroidVPN", ",", "this", "HenBox", "variant", "also", "contained", "a", "legitimate", "DroidVPN", "app", "within", "its", "APK", "package", "as", "an", "asset", ",", "which", "could", "be", "compared", "to", "a", "resource", "item", "within", "a", "Windows", "Portable", "Executable", "(", "PE", ")", "file", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 3, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16 ]
[ "ESET", "researchers", "discovered", "a", "campaign", "that", "we", "attribute", "with", "high", "confidence", "to", "the", "APT", "group", "Tick." ]
[ 4, 12, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 14 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Small.eivvce", "Trojan.Inject2.21676", "BehavesLike.Win64.BadFile.wc", "PUA.Zzinfor", "TrojanDropper.Dinwod.aml", "Dropper/Win32.Dinwod.C1833968", "Trojan.Mikey.D1229E", "Rootkit.Small!LMZdSa8k9cE", "Win32/Trojan.45a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "injected", "DLL", "then", "downloads", "the", "fileless", "Gootkit", "and", "saves", "it", "in", "the", "registry", "as", "binary", "data,", "then", "loading", "it", "in", "memory", "only." ]
[ 1, 9, 9, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 1, 16, 1, 9, 16, 16, 16, 16, 1, 16 ]
[ "On", "April", "3", ",", "2016", ",", "we", "still", "observed", "new", "RuMMS", "samples", "emerging", "in", "the", "wild", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16 ]
[ "This", "article", "mainly", "analyzes", "the", "controlling", "end,", "the", "generator", "and", "Windows", "and", "Linux", "variants", "in", "controlled", "end", "of", "this", "tool", "and", "makes", "a", "display", "of", "the", "homologous", "analysis", "and", "network", "infection", "of", "these", "samples." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16 ]
[ "By", "monitoring", "the", "package", "installation", "broadcast", "event", ",", "XLoader", "can", "start", "their", "packages", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16 ]
[ "Distribution", "of", "victims", "." ]
[ 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Zlob", "Adware.NetAdware.BD" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "If", "brother.apk", "application", "is", "removed", ",", "mcpef.apk", "reinstalls", "brother.apk", "from", "assets", "." ]
[ 16, 5, 16, 16, 16, 16, 5, 16, 5, 16, 16, 16 ]
[ "Command", "to", "change", "the", "beaconing", "changeArchive", ":", "The", "final", "command", "of", "the", "activation", "cycle", "is", "the", "download", "of", "an", "archive", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "figure", "below", "shows", "a", "fragment", "of", "encrypted", "JAR", "stored", "in", ".rodata", "section", "of", "a", "shared", "object", "shipped", "with", "the", "APK", "as", "well", "as", "the", "XOR", "key", "used", "for", "decryption", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FakeSvchostXKRB.Trojan", "Trojan-Downloader.Win32.Geral!O", "Downloader.Dogrobot.20415", "Win32/SillyDl.QAC", "Trojan-Dropper.Win32.Injector.paib", "Trojan.Win32.Vilsel.iini", "Troj.Downloader.W32.Geral.kYTA", "Trojan.Win32.Downloader.wzh", "BackDoor.Guan.14", "Downloader.Geral.Win32.1376", "BehavesLike.Win32.StartPage.lm", "W32.Malware.Downloader", "Trojan[Dropper]/Win32.Injector", "Trojan.Win32.Downloader.16384.BHH", "Trojan-Dropper.Win32.Injector.paib", "TrojanDownloader:Win32/Dogrobot.D", "Trojan.Win32.Qhost" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "/proc", "filesystem", "is", "now", "mounted", "with", "a", "hidepid=2", "parameter", ",", "which", "means", "that", "the", "process", "can", "not", "access", "other", "process", "/proc/", "[", "pid", "]", "directory", "." ]
[ 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Dialer!O", "Trojan.Zenshirsh.SL7", "Trojan.Dialer", "Win32.Trojan.WisdomEyes.16070401.9500.9746", "Win32/Startpage.RT", "TROJ_CJ.A", "Win.Trojan.Dialer-61", "Trojan.Win32.Dialer.cj", "Trojan.Win32.MLW.wvye", "Troj.W32.Diamin.l3NB", "TrojWare.Win32.Dialer.A", "Dialer.Virgilio", "TROJ_CJ.A", "Trojan/Dialer.cio", "Trojan/Win32.Dialer", "Trojan.Win32.Dialer.cj", "Trojan/Win32.Dialer.R2306", "MalwareScope.Dialer.Small.1", "Dialer.LBU", "Win32.Trojan.Dialer.Pgxd", "Trojan.Win32.Dialer.cj" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Thanks", "to", "Bulwarkz", "for", "additional", "Forensic", "Analysis:", "-", "Clears", "the", "windows", "event", "log", "-", "Clears", "the", "journal", "log", "-", "Drops", "executables", "to", "the", "windows", "directory", "and", "starts", "them", "-", "Shows", "the", "ability", "to", "spread", "by", "using", "its", "contained", "functionality", "to", "enumerate", "network", "shares", "of", "other", "attached", "devices", "-", "Uses", "shutdown.exe", "to", "shutdown", "or", "reboot", "the", "system", "-", "Contains", "functionality", "to", "register", "a", "low", "level", "keyboard", "hook", "-", "Contains", "functionality", "to", "infect", "the", "boot", "sector." ]
[ 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 1, 9, 9, 9, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 16, 1, 9, 9, 9, 9, 9, 9, 9, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 1, 9, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9894", "Trojan.Win32.CsDown.bdcfvq", "Trojan.CsDown.25", "TrojanDropper:Win32/Waltrodock.B", "Trojan.Graftor.D4ACD", "Trojan.CsNowDown!qDe+BhsdQ1Y", "W32/WDockDrp.A!tr", "Trj/CI.A", "Win32/Trojan.8ea" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "decoy", "documents", "and", "filenames", "used", "in", "the", "attacks", "suggest", "the", "intended", "targets", "include", "organisations", "with", "political", "interests", "or", "influence", "in", "Israel", "and", "Palestine." ]
[ 16, 1, 9, 9, 9, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 2, 16, 2 ]
[ "A", "lot", "of", "additional", "anti-sandbox", "checks", "are", "performed", "in", "this", "exact", "order", ":", "Check", "that", "the", "malware", "is", "not", "executed", "under", "the", "root", "folder", "of", "a", "drive", "Check", "that", "the", "malware", "file", "is", "readable", "from", "an", "external", "source", "Check", "that", "the", "hash", "of", "base", "path", "is", "not", "3D6D62AF1A7C8053DBC8E110A530C679", "Check", "that", "the", "full", "malware", "path", "contains", "only", "human", "readable", "characters", "(", "β€œ", "a-z", "”", ",", "β€œ", "A-Z", "”", ",", "and", "β€œ", "0-9", "”", ")", "Check", "that", "no", "node", "in", "the", "full", "path", "contains", "the", "MD5", "string", "of", "the", "malware", "file", "Fingerprint", "the", "system", "and", "check", "the", "following", "registry", "values", ":", "HKLM\\SOFTWARE\\Microsoft\\Cryptography\\MachineGuid", "should", "not", "be", "β€œ", "6ba1d002-21ed-4dbe-afb5-08cf8b81ca32", "”", "HKLM\\SOFTWARE\\Microsoft\\Windows", "NT\\CurrentVersion\\DigitalProductId", "should", "not", "be", "β€œ", "55274-649-6478953-23109", "”", ",", "β€œ", "A22-00001", "”", ",", "or", "β€œ", "47220", "”", "HARDWARE\\Description\\System\\SystemBiosDate", "should", "not", "contain", "β€œ", "01/02/03", "”", "Check", "that", "the", "mutex", "WininetStartupMutex0", "does", "not", "already", "exist", "Check", "that", "no", "DLL", "whose", "base", "name", "has", "hash", "value", "of", "0xC9CEF3E4", "is", "mapped", "into", "the", "malware", "address", "space", "The", "hashes", "in", "these", "checks", "are", "most", "likely", "correspond", "to", "sandbox", "or", "security", "products", "that", "the", "FinFisher", "authors", "want", "to", "avoid", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 1, 16, 1, 9, 16, 16, 16, 16, 1, 16, 16, 16, 1, 16, 16, 16, 16, 1, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16 ]
[ "Halloween", "is", "still", "a", "month", "from", "now", "and", "yet", "Android", "users", "are", "already", "being", "haunted", "by", "the", "previously", "reported", "Ghost", "Push", "malware,", "which", "roots", "devices", "and", "makes", "them", "download", "unwanted", "ads", "and", "apps." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 5, 13, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "Last", "March,", "we", "reported", "on", "Operation", "C-Major,", "an", "active", "information", "theft", "campaign", "that", "was", "able", "to", "steal", "sensitive", "information", "from", "high", "profile", "targets", "in", "India." ]
[ 16, 0, 16, 16, 16, 6, 14, 16, 16, 16, 6, 14, 16, 16, 16, 16, 1, 9, 9, 16, 4, 12, 12, 16, 2 ]
[ "Custom", "Content", "Type", "Manager", "CCTM", "is", "a", "relatively", "popular", "plugin", "with", "three", "years", "of", "development,", "10,000+", "active", "installs,", "and", "a", "satisfaction", "rating", "of", "4.8.", "It", "helps", "create", "custom", "post", "types." ]
[ 4, 12, 12, 12, 12, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "extent", "of", "information", "that", "these", "kinds", "of", "threats", "can", "steal", "is", "also", "significant", ",", "as", "it", "lets", "attackers", "virtually", "take", "over", "a", "compromised", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Heur.AutoIT.13", "Win32/Fynloski.STBTHUD", "Trojan.Win32.DarkKomet.dokuem", "Trojan.DownLoader12.11337", "Trojan.Script.abcv", "Trojan:Win32/Manger.A", "Trojan.Autoit.Wirus", "Win32/TrojanDropper.Autoit.IC", "Win32/Trojan.Script.ed4" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Moreover,", "the", "Sednit", "group", "has", "a", "special", "interest", "in", "Eastern", "Europe,", "where", "it", "regularly", "targets", "individuals", "and", "organizations", "involved", "in", "geopolitics" ]
[ 16, 16, 6, 14, 16, 16, 16, 16, 16, 2, 10, 16, 16, 16, 16, 4, 16, 4, 16, 16, 16 ]
[ "This", "virus", "ransomware", "arrives", "via", "email", "in", "a", "malicious", "attachment", "or", "by", "usurping", "an", "Adobe", "Flash", "Player", "installation." ]
[ 16, 3, 11, 16, 16, 1, 16, 16, 1, 9, 16, 16, 1, 16, 1, 9, 9, 9 ]
[ "Within", "a", "few", "minutes", "of", "installing", "one", "of", "these", "Trojans,", "all", "other", "active", "malware", "on", "the", "network", "is", "enabled", "on", "the", "victim's", "device." ]
[ 16, 16, 0, 8, 16, 16, 16, 16, 16, 3, 16, 16, 16, 3, 16, 16, 12, 16, 16, 16, 16, 5, 13 ]
[ "This", "particular", "application/game", "from", "Google", "Play", "Store", "is", "certainly", "not", "a", "system", "application,", "as", "the", "name", "seems", "intended", "to", "suggest." ]
[ 16, 16, 5, 16, 5, 13, 13, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "bank", "then", "shared", "indicators", "of", "compromise", "IOCs", "with", "other", "institutions", "and", "a", "number", "of", "other", "institutions", "confirmed", "that", "they", "too", "had", "been", "compromised." ]
[ 4, 12, 16, 16, 1, 9, 9, 9, 16, 16, 4, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 1 ]
[ "Windows", "Defender", "ATP", "timeline", "can", "pinpoint", "the", "service", "DLL", "side-loading", "trick", "(", "in", "this", "example", ",", "using", "fltlib.dll", ")", "." ]
[ 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16 ]
[ "A", "few", "of", "these", "organizations", "have", "specifically", "been", "targeted", "by", "OceanLotus", "since", "early", "2015." ]
[ 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 4, 16, 0, 8 ]
[ "A", "backdoor", "also", "known", "as:", "W32.MurLoDll1.Trojan", "Trojan-Downloader.Win32.Murlo!O", "Downloader.Murlo.Win32.5244", "Trojan/Downloader.Murlo.nn", "TROJ_MURLO.BA", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "W32/Downloader.EKMU-1740", "Win32/TrojanDownloader.Murlo.NN", "TROJ_MURLO.BA", "Win.Trojan.Murlo-7", "Trojan-Downloader.Win32.Murlo.nn", "Trojan.Win32.Murlo.cpwkr", "Trojan.Win32.Downloader.5632.AY", "Trojan.DownLoader.62110", "Trojan-Downloader.Win32.Murlo", "W32/Downldr2.CIAF", "TrojanDownloader.Murlo.hb", "Trojan[Downloader]/Win32.Murlo", "TrojanDownloader:Win32/Almanahe.A", "Trojan-Downloader.Win32.Murlo.nn", "Win32/SillyDl.EPI", "TrojanDownloader.Murlo", "W32/Murlo.NN!tr.dldr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Attackers", "are", "growing", "smarter", ",", "targeting", "individuals", "through", "the", "devices", "and", "the", "services", "they", "use", "most", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Recently", ",", "we", "have", "come", "across", "another", "variant", "of", "this", "app", "portraying", "itself", "as", "TikTok", "Pro", ",", "but", "this", "is", "a", "full-fledged", "spyware", "with", "premium", "features", "to", "spy", "on", "victim", "with", "ease", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Wabbin", "Win32.Trojan.WisdomEyes.16070401.9500.9773", "W32.Wabbin", "Win.Worm.Wabbin-1", "Email-Worm.Win32.Wabbin", "Trojan.Win32.Wabbin.eoih", "Email.Worm.W32!c", "IM-Worm.Win32.VB", "W32/Trojan.TLKW-6882", "Worm[Email]/Win32.Wabbin", "Trojan.Heur.VP.E513A3", "Email-Worm.Win32.Wabbin", "Worm:Win32/Wabbin.A@mm", "Worm.Wabbin", "Trj/CI.A", "Win32.Worm-email.Wabbin.Dxnb", "Worm.Wabbin!", "W32/Wabbin.A@mm", "Win32/Trojan.97a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "I-Worm.Music.C", "W32/Music.40960.B", "Music.H", "WORM_MUSIC.B", "Email-Worm.Win32.Music.B", "Worm.Win32.Email-Worm.Music.B", "BACKDOOR.Trojan", "WORM_MUSIC.B", "W32/Music.40960.B", "I-Worm/Music.b", "WORM/Music.B", "Worm:Win32/Music.C@mm", "I-Worm.Win32.Music.B[h]", "W32/Music.B", "Win32/Music.B", "Email-Worm.Win32.Music.A", "W32/Music.B@mm", "Worm.Win32.Music.Abh" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Hijack.356352.M", "VirTool.DelfInject", "Trojan.DelfInject", "Dropper.Injector.Win32.25443", "Trojan/Dropper.Injector.dyha", "Win32.Trojan.Delf.k", "TROJ_NEOJIT.SMAR", "Trojan.Win32.Buzus.rfedr", "Trojan.DownLoader6.1239", "TROJ_NEOJIT.SMAR", "BehavesLike.Win32.Worm.fh", "TrojanDropper.Injector.taw", "Trojan/Win32.Buzus", "TrojanDownloader:Win32/Neojit.A", "Trojan/Win32.Injector.R23295", "BScope.Trojan-Dropper.Injector", "Win32/Delf.OEN", "Trojan-Downloader.Win32.Neojit", "Win32/Trojan.dee" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.MTX.B@mm", "W95.MTX", "Win32.MTX.B@mm", "W32/[email protected]", "WORM_MTX.D", "W32/MTX.9244.B", "WORM_MTX.D", "Win.Trojan.MTX-5", "Win32.MTX.B@mm", "Email-Worm.Win32.MTX.D", "Win32.MTX.B@mm", "Virus.Win32.MTX.hfxi", "Win32.MTX", "Win32.MTX.B@mm", "Win32.MTX.B@mm", "Win95.Matrix.9307", "W95/MTX.dll@M", "W32/MTX.9244.B", "I-Worm/MTX.d", "W95/Mtx.B", "Win32.MTX.E2C45E", "Email-Worm.Win32.MTX.D", "Worm:Win32/MTX.B.dll", "W95/MTX.dll@M", "W32/MTX.D!worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "fake", "alert", "will", "notify", "and", "urge", "the", "user", "to", "access", "the", "malicious", "domain", "and", "download", "XLoader", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Small.9728.KQ", "Win32.Trojan.WisdomEyes.16070401.9500.9990", "Backdoor.Teambot", "Win.Trojan.Zapchast-130", "Trojan.Win32.TeamBot.ctspsr", "BackDoor.TeamBot.60", "Trojan/Zapchast.exm", "W32/Sheldor.NAB!tr", "Win32.Troj.Undef.kcloud", "Trojan.Graftor.Elzob.950", "Troj.W32.Zapchast.lhAn", "Trojan:Win32/Availmetre.B", "Trojan/Win32.Zapchast.R17936", "SScope.Backdoor.Mudak", "Trojan.Win32.Availmetre" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Sending", "text", "β€œ", "confirm", "1", "”", "will", "include", "proof", "of", "payment", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win32!O", "Backdoor.Small.MUE.A11", "RiskWare.SpySoft", "Trojan.Udr.Win32.1", "W32/BackdoorX.GMX", "Backdoor.Trojan", "Win32/BackMan.A", "BKDR_NEWHEUR.IZ", "Win.Trojan.Udr-1", "Backdoor.Win32.Udr.a", "Trojan.Win32.Udr.csnpza", "Backdoor.Win32.Udr.aa", "BackDoor.Udr.1", "BKDR_NEWHEUR.IZ", "BehavesLike.Win32.Backdoor.fc", "W32/Backdoor.COLY-8496", "Backdoor/Udr.d", "BDS/Udr.A", "Trojan[Backdoor]/Win32.Udr", "Win32.Hack.Udr.B5.kcloud", "Backdoor.Win32.Udr.692018", "Backdoor.Win32.Udr.a", "Trojan/Win32.Udr.R577", "OScope.Backdoor.Udr", "Backdoor.JYfi", "Backdoor.Udr!EwW5NHJTxmo", "Backdoor.Win32.Udr", "W32/Udr.A!tr.bdr", "Dialer.CKP" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "also", "has", "a", "general", "purpose-proxy", "and", "a", "module", "for", "sending", "spam", "messages." ]
[ 16, 16, 16, 16, 4, 15, 16, 16, 1, 9, 9, 9, 9 ]
[ "The", "attackers", "attempted", "to", "steal", "$951m,", "of", "which", "$81m", "is", "still", "unaccounted", "for." ]
[ 16, 6, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9828", "Win32.Trojan.Kriskynote.Ozic", "Trojan.Win32.Kriskynote", "Backdoor:Win32/Kriskynote.A", "BScope.Trojan.SvcHorse.01643", "W32/Dropper.TMP!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "]", "net", "www", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "Before", "that", "patch", "was", "released,", "the", "groups", "launched", "phishing", "campaigns", "against", "multiple", "companies", "in", "the", "aerospace", "and", "defense,", "construction", "and", "engineering,", "education,", "energy,", "health", "and", "biotechnology,", "high", "tech,", "non-profit,", "telecommunications,", "and", "transportation", "industries." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 4, 12, 16, 16, 4, 16, 4, 16, 16, 4, 12, 12, 12, 16, 4, 12, 12, 12, 12, 16, 4, 12 ]
[ "Figure", "3", ":", "Loading", "core", "malicious", "code", "into", "the", "benign", "application", "Once", "the", "β€œ", "core", "”", "module", "is", "extracted", "and", "loaded", ",", "the", "β€œ", "loader", "”", "uses", "the", "reflection", "technique", "to", "initialize", "and", "start", "the", "β€œ", "core", "”", "module", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Ollexos", "Win32.Trojan.Heur.Lhdl", "Trojan.Heur.Win32.9371", "BehavesLike.Win32.Spyware.jc", "TR/RedCap.xrytt", "Trojan.Heur.OmNfrrOwGgmOh", "Trojan.Win32.Z.Redcap.655360", "Trojan:Win32/Ollexos.A", "Win32/Trojan.7b0" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]