tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.OnGamesHEXW32AH.Trojan",
"Trojan.Win32.Scar!O",
"BackDoor.Boomie.A3",
"Trojan.Scar.Win32.63773",
"Trojan/Scar.fvka",
"Win32.Trojan.Scar.d",
"Win.Trojan.Scar-895",
"Trojan.Win32.Scar.fvka",
"Trojan.Win32.Scar.bbmdmf",
"Troj.W32.Scar.fvka!c",
"Trojan.Win32.Scar.ft",
"Trojan.DownLoad2.52794",
"Backdoor.Win32.Boomie",
"Trojan/Scar.azbo",
"Trojan/Win32.Scar",
"Backdoor:Win32/Boomie.A",
"Trojan.Win32.Scar.fvka",
"Win-Trojan/Boomie.40960",
"Trojan.Scar!AGwL0r/7hW4",
"Win32/Trojan.Spy.81b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Shamoon.A",
"Trojan/W32.Shamoon.192000",
"Trojan.Depriz",
"Trojan/DistTrack.d",
"Trojan.Shamoon.A",
"Win32.Trojan.WisdomEyes.16070401.9500.9987",
"W32.Disttrack.B",
"TROJ64_DISTTRACK.D",
"Win.Malware.DistTrack-5743117-1",
"Trojan.Shamoon.A",
"Trojan.Shamoon.A",
"Trojan.Win64.DistTrack.elcfal",
"Trojan.Win32.Z.Disttrack.192000",
"Trojan.Shamoon.A",
"Trojan.Shamoon.A",
"Trojan.DistTrack.Win32.9",
"TROJ64_DISTTRACK.D",
"W64/Trojan.BOAO-0112",
"Trojan:Win64/Depriz.E!dha",
"Trojan.DistTrack.A",
"Trj/CI.A",
"W64/DistTrack.D!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"FastPOS",
"was",
"true",
"to",
"its",
"moniker—pilfer",
"data",
"as",
"fast",
"as",
"possible,",
"as",
"much",
"as",
"it",
"can,",
"even",
"at",
"the",
"expense",
"of",
"stealth."
] | [
3,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader.Win32.Banload!O",
"Trojan/Downloader.Banload.qku",
"Trojan.Graftor.D3222",
"Win32.Trojan.WisdomEyes.16070401.9500.9991",
"Trojan.DownLoad2.52025",
"Downloader.Banload.Win32.37297",
"Trojan.Win32.Spy",
"TrojanDownloader:Win32/Spycos.B",
"TrojanDownloader.Banload"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Within",
"this",
"time",
"period",
",",
"we",
"identified",
"close",
"to",
"300",
"samples",
"belonging",
"to",
"this",
"family",
"(",
"all",
"sample",
"hashes",
"are",
"listed",
"in",
"the",
"Appendix",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.KVM.B",
"Backdoor/W32.KWM.70656",
"PWS-Susanin.dr",
"Backdoor.KVM.B",
"Trojan.KWM.B2",
"Infostealer.KMW.B",
"KWM.B",
"Win32/PSW.KWM.B",
"BKDR_KWM.B",
"Backdoor.Win32.KWM.b",
"Trojan.Win32.KWM.baukx",
"PE:Trojan.KWM.b!1073777723",
"Backdoor.KVM.B",
"TrojWare.Win32.PSW.Susanin.B",
"Backdoor.KVM.B",
"BackDoor.KWM",
"Backdoor.KWM.Win32.11",
"BKDR_KWM.B",
"PWS-Susanin.dr",
"W32/Risk.SBUI-3175",
"Backdoor/KWM.b",
"TR/WebMoney.2",
"Trojan[Backdoor]/Win32.KWM",
"Win32.Hack.KWM.b.kcloud",
"PWS:Win32/Susanin.B",
"Backdoor.Win32.KWM.70656[h]",
"Win-Trojan/KWM.70656",
"Backdoor.KVM.B",
"Backdoor.KVM.B",
"Dropper.PSW.Liz.17",
"Trj/PSW.Susanin",
"Win32/PSW.Susanin.B",
"Backdoor.Win32.Kwm.B",
"W32/Contract.B!tr.bdr",
"PSW.Susanin",
"Backdoor.Win32.KWM.aWbC"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Raxlogon.Trojan",
"Worm.Win32.AutoRun!O",
"Worm.Autorun.ZI8",
"Worm.AutoRun.Win32.22949",
"Win32.Worm.FakeFolder.b",
"Win32/QQPass.NNE",
"Worm.AutoRun",
"Worm.Win32.AutoRun.hit",
"Trojan.Win32.AutoRun.uaado",
"Worm.Win32.Autorun.81108",
"Worm.Win32.Pronny.BL",
"Trojan.PWS.Qqpass.5627",
"BackDoor-CCT.dll",
"Worm/AutoRun.wxz",
"Trojan:Win32/Hideproc.E",
"Trojan[Monitor]/Win32.ActualSpy",
"Win32.Troj.Undef.kcloud",
"HEUR/Fakon.mwf",
"Trojan.AVKill",
"W32/Autorun.KBC",
"Trojan.Win32.FakeFolder.pb",
"Worm.AutoRun!PDL9JmhYC4g",
"Backdoor.Win32.DarkMoon"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"New",
"campaign",
"involving",
"PoSeidon/FindPOS",
"point",
"of",
"sale",
"malware"
] | [
16,
3,
16,
1,
3,
11,
11,
11
] |
[
"This",
"morning",
"Mozilla",
"released",
"security",
"updates",
"that",
"fix",
"the",
"vulnerability."
] | [
16,
0,
4,
16,
16,
16,
16,
16,
16,
7
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Notepices",
"Win32.Trojan.WisdomEyes.16070401.9500.9871",
"not-a-virus:AdWare.Win32.ICLoader.alpu",
"Riskware.Win32.Hpdefender.ekfhpl",
"Trojan.StartPage1.28867",
"Trojan.Win32.Notepices",
"Pua.Downloader",
"GrayWare[AdWare]/Win32.Hpdefender",
"not-a-virus:AdWare.Win32.ICLoader.alpu",
"Adware.HPDefender",
"Win32/Adware.HPDefender.JG"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Standard",
"browser",
"search",
"history",
"Standard",
"browser",
"bookmarks",
"Device",
"handset",
"metadata",
";",
"such",
"as",
"brand",
",",
"display",
",",
"hardware",
",",
"manufacturer",
",",
"product",
",",
"serial",
",",
"radio",
"version",
",",
"and",
"SDK",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.RsLpTTc.Worm",
"Ransom.Lyposit.S3755",
"W32.Sality.lak4",
"Trojan/Lyposit.a",
"Trojan.Zusy.D382F1",
"Ransom_Lyposit.R002C0CAT18",
"Win32.Trojan.WisdomEyes.16070401.9500.9902",
"Ransom_Lyposit.R002C0CAT18",
"Win.Trojan.Updays-1",
"Trojan.Win32.Clicker.efvwpu",
"TrojWare.Win32.Lyposit.C",
"Trojan.Click2.50933",
"Trojan.Lyposit.Win32.25",
"Trojan-Ransom.Lyposit",
"Ransom:Win32/Lyposit.B",
"Trojan/Win32.Lyposit.R188188",
"W32/Lyposit.A70!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"malware",
"used",
"in",
"email",
"campaigns",
"is",
"often",
"ransomware",
"or",
"banking",
"malware."
] | [
16,
3,
16,
16,
6,
14,
16,
16,
3,
16,
3,
11
] |
[
"It",
"collects",
"information",
"about",
"the",
"smartphone",
"(",
"IMEI",
",",
"country",
",",
"service",
"provider",
",",
"operating",
"system",
"language",
")",
"and",
"sends",
"it",
"to",
"the",
"host",
"via",
"the",
"HTTP",
"POST",
"request",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Injector.AutoIt",
"Trojan.StartPage1.24074",
"TrojanClicker:Win32/Rubalotalow.A",
"Win32/Trojan.ab1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.eHeur.Virus02",
"Virus.Win32.Sality!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9989",
"Win.Trojan.Zusy-6041926-0",
"Trojan.Win32.Scar.okvf",
"Win32.Trojan.Scar.Wwek",
"Trojan.DownLoader24.19336",
"Trojan.Scar.kws",
"Trojan/Win32.Cosmu",
"PWS:Win32/Sapbexts.B",
"Trojan.Win32.Scar.okvf",
"Trojan/Win32.Cosmu.R214802",
"Trojan.Vilsel",
"Trojan.Cosmu!F9mC6Li+PNw",
"Win32/Trojan.Scar.C"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"You",
"may",
"mistakenly",
"download",
"and",
"run",
"TrojanDropper:Win32/Gepys.A,",
"thinking",
"it",
"is",
"an",
"update",
"for",
"Java."
] | [
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
1,
9,
9,
9
] |
[
"Spaghetti",
"and",
"junk",
"codes",
"make",
"common",
"analyst",
"tools",
"ineffective",
"In",
"analyzing",
"FinFisher",
",",
"the",
"first",
"obfuscation",
"problem",
"that",
"requires",
"a",
"solution",
"is",
"the",
"removal",
"of",
"junk",
"instructions",
"and",
"“",
"spaghetti",
"code",
"”",
",",
"which",
"is",
"a",
"technique",
"that",
"aims",
"to",
"confuse",
"disassembly",
"programs",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"If",
"the",
"attack",
"succeeds,",
"the",
"malware",
"changes",
"the",
"addresses",
"of",
"the",
"DNS",
"servers",
"in",
"the",
"router's",
"settings,",
"thereby",
"rerouting",
"all",
"DNS",
"queries",
"from",
"devices",
"in",
"the",
"attacked",
"Wi-Fi",
"network",
"to",
"the",
"servers",
"of",
"the",
"cybercriminals",
"such",
"an",
"attack",
"is",
"also",
"known",
"as",
"DNS-hijacking."
] | [
16,
16,
1,
16,
16,
3,
16,
16,
1,
16,
16,
5,
13,
16,
16,
5,
13,
16,
1,
16,
5,
13,
16,
5,
16,
16,
1,
5,
13,
16,
16,
5,
16,
16,
6,
16,
16,
1,
16,
16,
16,
16,
1
] |
[
"It",
"means",
"the",
"phone",
"can",
"be",
"unblocked",
"in",
"some",
"cases",
"when",
"it",
"has",
"been",
"blocked",
"by",
"one",
"of",
"the",
"above",
"HTML",
"pages",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"AMP",
"Threat",
"Grid",
"helps",
"identify",
"malicious",
"binaries",
"and",
"build",
"protection",
"into",
"all",
"Cisco",
"Security",
"products",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16
] |
[
"Each",
"time",
"a",
"rented",
"malware",
"reaches",
"the",
"end",
"of",
"its",
"life",
"it",
"provides",
"the",
"opportunity",
"for",
"other",
"actors",
"a",
"to",
"take",
"over",
"the",
"malware",
"rental",
"market-share",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Interestingly,",
"the",
"attackers",
"camouflage",
"one",
"of",
"their",
"delivery",
"domains",
"by",
"redirecting",
"visitors",
"to",
"El",
"Universal,",
"a",
"major",
"Mexican",
"newspaper."
] | [
16,
16,
6,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
4,
12,
12,
12,
12,
12
] |
[
"These",
"emails",
"are",
"mainly",
"sent",
"to",
"Colombians",
"who",
"may",
"work",
"in",
"the",
"accounting",
"or",
"finance",
"departments",
"of",
"various-sized",
"organizations."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"Communication",
"Channel",
"via",
"Stolen",
"SMS",
"In",
"addition",
",",
"TrickMo",
"has",
"an",
"automatic",
"mechanism",
"to",
"send",
"SMS",
"messages",
"to",
"its",
"C",
"&",
"C",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Downloader",
"Trojan/Downloader.Boaxxe.aa",
"Win32.TRDldr.JeRips",
"TR/Dldr.JeRips.A",
"W32/Boaxxe.AB!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"Service",
"Name",
"Purpose",
"AndroidAlarmManager",
"Uploading",
"last",
"recorded",
".amr",
"audio",
"AndroidSystemService",
"Audio",
"recording",
"AndroidSystemQueues",
"Location",
"tracking",
"with",
"movement",
"detection",
"ClearSystems",
"GSM",
"tracking",
"(",
"CID",
",",
"LAC",
",",
"PSC",
")",
"ClipService",
"Clipboard",
"stealing",
"AndroidFileManager",
"Uploading",
"all",
"exfiltrated",
"data",
"AndroidPush",
"XMPP",
"С",
"&",
"C",
"protocol",
"(",
"url.plus:5223",
")",
"RegistrationService",
"Registration",
"on",
"C",
"&",
"C",
"via",
"HTTP",
"(",
"url.plus/app/pro/",
")",
"Interestingly",
",",
"a",
"self-protection",
"feature",
"was",
"implemented",
"in",
"almost",
"every",
"service",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"Trojan.MulDrop5.40693",
"TR/Downloader.A.7912",
"Trojan[Ransom]/Win32.Blocker",
"Trojan:MSIL/Dubfot.A",
"Trojan.FakeMS",
"Trojan.MSIL.IRCBot"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"Data",
"was",
"always",
"sent",
"to",
"the",
"C",
"&",
"C",
"server",
"via",
"HTTP",
"in",
"the",
"body",
"of",
"a",
"POST",
"request",
"in",
"encrypted",
"form",
"to",
"the",
"relative",
"address",
"/something/index.php",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16
] |
[
"The",
"placement",
"of",
"the",
"decoy",
"functionality",
"is",
"likely",
"designed",
"to",
"confuse",
"the",
"malware",
"researchers",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"New",
"ransomware",
"using",
"the",
".ipygh",
"extension."
] | [
16,
3,
16,
16,
1,
9
] |
[
"How",
"do",
"you",
"know",
"if",
"your",
"Google",
"account",
"is",
"breached",
"?",
"You",
"can",
"check",
"if",
"your",
"account",
"is",
"compromised",
"by",
"accessing",
"the",
"following",
"web",
"site",
"that",
"we",
"created",
":",
"https",
":",
"//gooligan.checkpoint.com/",
"."
] | [
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16
] |
[
"BLOCKER_BANKING_START",
"–",
"display",
"phishing",
"HTML",
"page",
"for",
"entry",
"of",
"bank",
"card",
"details",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"most",
"recently",
"discovered",
"Microsoft",
"SQL",
"server",
"being",
"used",
"as",
"Escalar",
"infrastructure",
"contained",
"records",
"of",
"1660",
"infections",
"that",
"all",
"connected",
"in",
"a",
"two-day",
"time",
"frame."
] | [
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
3,
5,
16,
16,
16,
8,
16,
15,
16,
16,
16,
16,
0,
8,
16
] |
[
"Later",
"on,",
"we",
"found",
"evidence",
"of",
"the",
"same",
"attack",
"perpetrated",
"on",
"May",
"3."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
0,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Worm.Lemoor.A",
"Worm/W32.Lemoor.1981",
"Trojan-Downloader.Win32.Small!O",
"Win32.Worm.Lemoor.A",
"Worm.Lemoor.Win32.2",
"W32.W.Lemoor.a!c",
"W32/Lemoor.a",
"Win32.Worm.Lemoor.A",
"WORM_LEMOOR.D",
"Win32.Trojan.WisdomEyes.16070401.9500.9995",
"W32/Lemoor.A",
"W32.Lemoor.A",
"WORM_LEMOOR.D",
"Win.Worm.Lemoor-3",
"Win32.Worm.Lemoor.A",
"Worm.Win32.Lemoor.a",
"Win32.Worm.Lemoor.A",
"Win32.Worm.Lemoor.A",
"Worm.Win32.Lemoor.B",
"Win32.Worm.Lemoor.A",
"Win32.Ephem.24",
"W32/Lemoor.JDMS-3575",
"I-Worm/Lemoor.a",
"WORM/Lemoor.A",
"Worm/Win32.Lemoor",
"Worm.Win32.Lemoor.a",
"Worm/Win32.Lemoor.R37765",
"Worm.Lemoor",
"W32/Lemoor.B.worm",
"Win32/Lemoor.B",
"Win32.Worm.Lemoor.Ahos",
"Worm.Lemoor!V5CZ/YV1RTs",
"Worm.Win32.Lemoor",
"W32/Lemoor.A!worm",
"Win32/Worm.857"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"User-agent:",
"Go-http-client/1.1"
] | [
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Skeeyah",
"Trojan.KillDisk.Win32.208",
"Trojan/KillDisk.nbh",
"Win32.Trojan.WisdomEyes.16070401.9500.9834",
"Trojan.Disakil",
"Win.Trojan.KillDisk-3",
"Trojan.Win32.KillDisk.fw",
"Win32.Trojan.Killdisk.Pgmq",
"Trojan:Win32/KillDisk.N!dha",
"Trojan.KillDisk.1",
"Trojan.Win32.KillDisk.fw",
"Trojan/Win32.KillDisk.C1706046",
"Trojan.KillDisk",
"Win32/KillDisk.NBH",
"Trojan.KillDisk!B1yc+Gvh2zs",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Most",
"of",
"the",
"samples",
"we",
"found",
"date",
"from",
"the",
"last",
"half",
"of",
"2017",
",",
"fewer",
"samples",
"date",
"from",
"2016",
",",
"and",
"a",
"handful",
"date",
"back",
"to",
"2015",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"normal",
"lifecycle",
"of",
"an",
"Office",
"exploit",
"starts",
"with",
"the",
"initial",
"use",
"in",
"targeted",
"attacks."
] | [
16,
16,
16,
16,
7,
15,
15,
16,
16,
16,
16,
16,
16,
16,
1
] |
[
"Emergency",
"SMS",
"commands",
"."
] | [
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-PSW.Win32.LdPinch!O",
"TrojanPWS.Ldpinch",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"Win32/Tnega.YML",
"TSPY_LDPINCH_DD3005CF.UVPA",
"Trojan-PSW.Win32.LdPinch.guf",
"Trojan.Win32.LdPinch.crgdkw",
"Trojan.LdPinch.Win32.5281",
"BehavesLike.Win32.Trojan.fz",
"Trojan.Win32.Vilsel",
"W32/Trojan.JQPI-8861",
"Trojan/PSW.LdPinch.pxf",
"Trojan[PSW]/Win32.LdPinch",
"Trojan.Heur.E4E165",
"Troj.Psw.W32.Ldpinch!c",
"Trojan-PSW.Win32.LdPinch.guf",
"PWS:Win32/Phorex.A",
"Trojan/Win32.LdPinch.R68731",
"Trojan.PWS.LdPinch!MPU8gCWOSOw",
"W32/LdPinch.GUF!tr.pws",
"TrojanPSW.Pinch",
"Win32/Trojan.PSW.b93"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.PWS.QQRob.NBU",
"Trojan-PSW.Win32.QQPass!O",
"PSW.QQPass.13953",
"Trojan.PWS.QQRob.NBU",
"Trojan/PSW.QQPass.ban",
"Win32.Worm.Autorun.ar",
"Infostealer.QQRob.A",
"WORM_AUTORUN.EDD",
"Win.Trojan.QQPass-84",
"Trojan.PWS.QQRob.NBU",
"Trojan-PSW.Win32.QQPass.ban",
"Trojan.PWS.QQRob.NBU",
"Trojan.Win32.QQPass.btqyi",
"Trojan.Win32.Z.Qqpass.73427",
"Trojan.Tencent/Variant",
"Trojan.PWS.QQRob.NBU",
"TrojWare.Win32.PSW.QQPass.~GK",
"Trojan.PWS.Qqpass.1364",
"WORM_AUTORUN.EDD",
"BehavesLike.Win32.PWSQQGame.lh",
"W32/Pws.VYB",
"Trojan/PSW.QQPass.bhp",
"Win32.Troj.QQPswT.bs.116858",
"Trojan.PWS.QQRob.NBU",
"Troj.Psw.W32.Qqpass!c",
"Trojan-PSW.Win32.QQPass.ban",
"MalwareScope.Trojan-PSW.Game.7",
"Trj/QQPass.AOI",
"Win32.Trojan-qqpass.Qqrob.Pcsk",
"Trojan-Dropper.Win32.Delf",
"W32/Dropper.DLF!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.BHO.89848",
"Trojan/BHO.gzx",
"TSPY_BZUB.CN",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Trojan2.FNXB",
"TSPY_BZUB.CN",
"Win.Trojan.Bho-4826",
"Trojan.Win32.BHO.gzx",
"Trojan.Win32.BHO.cqlbw",
"TrojWare.Win32.BHO.SR",
"Trojan.MulDrop.20001",
"Trojan.BHO.Win32.3053",
"BehavesLike.Win32.Backdoor.mc",
"W32/Trojan.RKCQ-8049",
"Trojan/BHO.csn",
"Win32.Troj.BHO.kcloud",
"Trojan.Heur.RP.E89CDE",
"Trojan.Win32.BHO.gzx",
"PWS:Win32/Cimuz.J",
"Trojan/Win32.Inject.C94649",
"Trojan.BHO",
"Win32/Spy.BZub.NFS",
"Trojan.BHO!Tkmwppjy1xw"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Chrysaor",
"is",
"believed",
"to",
"be",
"related",
"to",
"the",
"Pegasus",
"spyware",
"that",
"was",
"first",
"identified",
"on",
"iOS",
"and",
"analyzed",
"by",
"Citizen",
"Lab",
"and",
"Lookout",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
4,
12,
16,
4,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader.Win32.VB!O",
"TrojanDownloader.VB",
"Troj.Banker.W32.Bancos.lgUF",
"Trojan/Downloader.VB.iro",
"Win32.Trojan.WisdomEyes.16070401.9500.9935",
"Win32/SillyDl.GEF",
"Win.Trojan.Downloader-37507",
"Trojan-Downloader.Win32.VB.iro",
"Trojan.Win32.VB.vrga",
"Trojan.Win32.Downloader.69122.B",
"TrojWare.Win32.Banker.etk74",
"Trojan.Show.34817",
"Downloader.VB.Win32.114",
"WORM_IRCBOT.SMOK",
"BehavesLike.Win32.YahLover.ct",
"TrojanDownloader.VB.gvh",
"Trojan[Downloader]/Win32.VB",
"Trojan-Downloader.Win32.VB.iro",
"DoS:Win32/Pokanti.A",
"Downloader/Win32.VB.R6537",
"TScope.Trojan.VB",
"Win32.Trojan-downloader.Vb.Pdmc",
"Trojan.DL.VB!zHigarbFEUc",
"Trojan-Downloader.Win32.VB",
"Win32/Trojan.Downloader.b8b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W97M.Dropper.GO",
"W97M/Downloader.aho",
"W2KM_DLOADE.VHC",
"Trojan.Script.MLW.dsmnja",
"W2KM_DLOADE.VHC",
"W97M/Downloader.aho",
"HEUR.VBA.Trojan",
"macro.ole.encodedownload.g"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Even",
"though",
"we",
"could",
"not",
"find",
"indications",
"of",
"being",
"in",
"use",
",",
"two",
"stand",
"out",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Ransom.Win32.PornoBlocker!O",
"Trojan/PornoBlocker.adki",
"Win32.Virus.Krap.a",
"HV_RANSOM_CA222F78.TOMC",
"Win.Trojan.Kryptik-1359",
"Trojan-Ransom.Win32.PornoBlocker.adki",
"Trojan.Win32.Butirat.wyaex",
"Trojan.Win32.A.PornoBlocker.197120.B",
"ApplicUnwnt.Win32.Hoax.ArchSMS.SG",
"BackDoor.Butirat.51",
"BehavesLike.Win32.PUPXAG.ch",
"Trojan/PornoBlocker.chv",
"Trojan[Ransom]/Win32.PornoBlocker",
"Trojan.Kazy.DCA1D",
"Trojan-Ransom.Win32.PornoBlocker.adki",
"Trojan:Win32/Waprox.A",
"Trojan/Win32.PornoBlocker.C156437",
"Hoax.PornoBlocker",
"Trj/Pacrypt.D",
"Trojan.PornoBlocker!0B81yxGeAIw",
"Trojan.Win32.Waprox",
"W32/Zbot.RO!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.VBS.UAJ",
"Trojan.VBS.UAJ",
"Win32.Trojan.WisdomEyes.16070401.9500.9853",
"Trojan.VBS.UAJ",
"Vbs.Trojan.Vbs.Ljjs",
"Trojan.VBS.UAJ",
"Trojan.VBS.UAJ",
"Trojan.DownLoader19.25627",
"BehavesLike.Win32.Downloader.qh",
"Trojan.Barys",
"Trojan.MSIL.amcc",
"Trojan.VBS.UAJ",
"Trojan.VBS.UAJ",
"Trojan.MSIL.Zapchast",
"VBS/Shutdown.NAH"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"RTKT_SMALL.NLA",
"RTKT_SMALL.NLA",
"Trojan.Win32.Small.dplckv",
"Adware.AdLoad.Win32.8710",
"BehavesLike.Win32.PUPXAX.lc",
"Trojan.Zusy.D2BE63",
"Rootkit.Small!rTi0K4xzlKc"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"sample",
"is",
"clearly",
"a",
"mix",
"between",
"the",
"two",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.VodyDmpA.Worm",
"Trojan/W32.Small.9265",
"RiskWare.Tool.CK",
"Trojan/Pakes.c",
"Win32.Trojan.WisdomEyes.151026.9950.9983",
"W32/Trojan.WZX",
"TROJ_PAKES.JV",
"Virus.Win32.Xorer.a",
"Trojan.Win32.Pakes.bovph",
"Trojan.Win32.Pakes.9261[h]",
"Trojan.Dropper/Packed",
"Win32.Virus.Xorer.Pkqs",
"TrojWare.Win32.Patched.KSU",
"Trojan.Rox",
"Virus.Xorer.Win32.101",
"TROJ_PAKES.JV",
"BehavesLike.Win32.Downloader.zc",
"W32/Trojan.YUJV-5997",
"W32/Pakes.C!tr",
"W32.Xorer.a!c",
"Win-Trojan/Pakes.9265",
"Trojan.Pakes",
"Virus.Win32.Xorer",
"Clicker.BEHT"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"One",
"representative",
"sample",
"Chrysaor",
"app",
"that",
"we",
"analyzed",
"was",
"tailored",
"to",
"devices",
"running",
"Jellybean",
"(",
"4.3",
")",
"or",
"earlier",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
13,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.GamesonTBDll1.Trojan",
"Trojan.PWS.OnlineGames.ZLU",
"Trojan-PWS/W32.WebGame.229376.BS",
"Trojan.Tilcun.B7",
"Trojan.PWS.OnlineGames.ZLU",
"Trojan/OnLineGames.arus",
"TSPY_ONLINEG.FGF",
"Win32.Trojan-PSW.OLGames.cc",
"Infostealer.Gampass",
"TSPY_ONLINEG.FGF",
"Win.Spyware.45047-2",
"Trojan.PWS.OnlineGames.ZLU",
"Trojan.PWS.OnlineGames.ZLU",
"Trojan.Win32.OnLineGames.bemmm",
"Trojan.Win32.PSWIGames.229376.Q",
"Trojan.PWS.OnlineGames.ZLU",
"TrojWare.Win32.PSW.OnLineGames.NOA",
"Trojan.PWS.OnlineGames.ZLU",
"Trojan.PWS.Gamania.11506",
"BehavesLike.Win32.Downloader.dh",
"Trojan.Win32.Tilcun",
"TR/Tilcun.B",
"Win32.Troj.OnlineGameT.na.218624",
"Trojan.PWS.OnlineGames.ZLU",
"Troj.GameThief.W32.OnLineGames.arus!c",
"Trojan/Win32.OnlineGameHack.R2107",
"PWS-OnlineGames.br",
"BScope.Trojan-PSW.Gomex.22",
"Win32/PSW.OnLineGames.NOA",
"Win32.GamePsw.OnlineGame.bscx",
"W32/OnLineGames.AKLO!tr.pws"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"it",
"Brescia",
"server1cs.exodus.connexxa",
"[",
"."
] | [
9,
9,
16,
1,
9,
9
] |
[
"BlackMoon",
"Trojan",
"is",
"a",
"banking",
"trojan",
"that",
"is",
"designed",
"to",
"phish",
"user",
"credentials",
"from",
"various",
"South",
"Korean",
"banking",
"institutions."
] | [
3,
11,
16,
16,
3,
11,
16,
16,
16,
16,
1,
9,
9,
16,
16,
2,
10,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Script.9271",
"BAT.Trojan.KillFiles.h",
"Win.Worm.530490-1",
"BAT.Conwonk",
"BehavesLike.Win64.Downloader.qh",
"BAT/KillWin.NAR",
"Trojan.BAT.KillWin",
"BAT/KillWin.NAR!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Patched.Shopperz.1",
"Trojan.DllPatcher.A6",
"PTCH64_NOPLE.SM",
"Trojan.Mentono!inf",
"PTCH64_NOPLE.SM",
"Trojan.Patched.Shopperz.1",
"Trojan.Win64.Patched.qw",
"Trojan.Patched.Shopperz.1",
"Trojan.Patched.Shopperz.1",
"Trojan.Hosts.37524",
"Trojan.Patched.Shopperz",
"Trojan/Win64.Patched.ap",
"Trojan.Patched.Shopperz.1",
"Trojan.Win64.Patched.qw",
"W64/Patched.AP!tr",
"Win32/Trojan.133"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"malicious",
"Word",
"document",
"targeting",
"Mac",
"users."
] | [
16,
1,
9,
9,
16,
5,
13
] |
[
"It",
"also",
"targets",
"Ahnlab",
"by",
"killing",
"processes",
"and",
"deleting",
"files",
"specific",
"to",
"the",
"software."
] | [
16,
16,
16,
4,
16,
1,
9,
16,
1,
9,
16,
16,
16,
5
] |
[
"BlackTech",
"is",
"a",
"cyber",
"espionage",
"group",
"operating",
"against",
"targets",
"in",
"East",
"Asia,",
"particularly",
"Taiwan,",
"and",
"occasionally,",
"Japan",
"and",
"Hong",
"Kong."
] | [
6,
16,
16,
6,
14,
14,
16,
16,
16,
16,
2,
10,
16,
2,
16,
16,
2,
16,
2,
10
] |
[
"Even",
"threats",
"like",
"DNS",
"cache",
"poisoning",
"employ",
"social",
"engineering",
",",
"so",
"users",
"should",
"also",
"be",
"more",
"prudent",
"against",
"suspicious",
"or",
"unknown",
"messages",
"that",
"have",
"telltale",
"signs",
"of",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Affpach.A4",
"Trojan.Graftor.D6130",
"Win32.Trojan.StartPage.a",
"W32/Trojan2.NTSB",
"TROJ_SPNR.30BF13",
"Trojan.Win32.AVKill.bfnuts",
"Trojan.Win32.Inject.tja",
"Trojan.AVKill.27746",
"TROJ_SPNR.30BF13",
"W32/Trojan.ZXAC-7369",
"Variant.Graftor.xm",
"Win32/StartPage.OKV",
"Trojan.StartPage!m0gBcMRinXU",
"Trojan.Hijacker",
"W32/StartPage.OKV!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Threat",
"Actors",
"TAs",
"employ",
"sophisticated",
"techniques",
"to",
"create",
"phishing",
"websites",
"that",
"are",
"designed",
"to",
"appear",
"legitimate",
"and",
"attractive",
"to",
"users."
] | [
6,
14,
14,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
9
] |
[
"BianLian",
"continues",
"to",
"exhibit",
"a",
"high",
"level",
"of",
"operational",
"security",
"and",
"skill",
"in",
"network",
"penetration,",
"seeming",
"to",
"have",
"also",
"found",
"their",
"stride",
"in",
"the",
"pace",
"of",
"their",
"operations."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"VEX8687.Webshell",
"Backdoor.PHP.RST.H",
"HTML.BackDoor.A",
"Backdoor.Php.Rst!c",
"PHP.Backdoor.WebShell.al",
"PHP/Rst.H",
"PHP.RSTBackdoor",
"PHP/Small.NAL",
"PHP_R57SHELL.SM",
"Win.Trojan.R57-2",
"Script.Trojan.PHPShellRST.A",
"Backdoor.PHP.RST.H",
"Trojan.Html.Rst.bgzarv",
"PHP.S.Rst.87741",
"Backdoor.PHP.RST.H",
"Backdoor.PHP.Rst.~BBA",
"Backdoor.PHP.RST.H",
"PHP.R57Shell.12",
"PHP_R57SHELL.SM",
"PHP/Rst.H",
"PHP/Rst.H.95982",
"Backdoor.PHP.RST.H",
"PHP/Rst.A",
"Backdoor.PHP.r57Shell.A",
"BPX.Shell",
"Backdoor.PHP.Rst.ai",
"Php.Backdoor.Rst.Ssgx",
"PHP.RST.G",
"Trojan.PHP.Rst",
"PHP/Rst.AI!tr",
"php.script.c99shell.6"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Symantec",
"first",
"reported",
"on",
"this",
"group",
"back",
"in",
"January",
"2017,",
"detailing",
"their",
"operations",
"and",
"using",
"a",
"custom",
"information",
"stealing",
"Trojan",
"called",
"ISMDoor."
] | [
4,
16,
16,
16,
16,
6,
16,
16,
0,
8,
16,
16,
16,
16,
16,
16,
1,
9,
9,
3,
16,
3
] |
[
"Design",
"In",
"the",
"manifest",
",",
"the",
"malware",
"requests",
"a",
"large",
"number",
"of",
"permissions",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Some",
"apps",
"have",
"started",
"with",
"clean",
"versions",
",",
"in",
"an",
"attempt",
"to",
"grow",
"user",
"bases",
"and",
"build",
"the",
"developer",
"accounts",
"’",
"reputations",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Adware.AMRL",
"Trojan.DownLoader22.55869",
"BehavesLike.Win32.Worm.th",
"W32/Adware.OAXQ-2836",
"Worm:Win32/Imafly.AC",
"Trojan.Strictor.D19956",
"Trojan/Win32.Cosmu.R158790",
"Win32/Autoit.LH",
"Worm.Win32.AutoIt",
"W32/Autoit.EQP!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FakeW7Folder.Fam.Trojan",
"Worm.Goldrv.A7",
"Trojan-Ransom.Win32.Blocker.jaic",
"Trojan.Win32.Dapato.dbzcxx",
"W32.Virut.lMey",
"Trojan.Win32.Dapato.a",
"TrojWare.Win32.Dapato.DFS",
"Trojan.DownLoader11.18798",
"Trojan-Dropper.Win32.Dapato",
"TrojanDropper.Dapato.peb",
"Trojan[Dropper]/Win32.Dapato",
"Worm:Win32/Goldrv.A",
"Trojan-Ransom.Win32.Blocker.jaic",
"HEUR/Fakon.mwf",
"Trojan-Ransom.Blocker",
"Backdoor.Bot",
"W32/Dapato.EDU!tr",
"Win32/Trojan.df8"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"malware",
"used",
"in",
"this",
"campaign",
"has",
"similar",
"features",
"to",
"that",
"distributed",
"earlier",
"in",
"2017",
"with",
"the",
"following",
"changes:",
"A",
"new",
"decoy",
"document",
"copy/pasted",
"from",
"an",
"article",
"published",
"on",
"the",
"3rd",
"of",
"July",
"by",
"Yonhap",
"News",
"Agency",
"in",
"Korea;"
] | [
16,
3,
16,
16,
16,
6,
16,
16,
16,
16,
15,
16,
16,
16,
0,
16,
16,
16,
16,
1,
9,
9,
9,
9,
16,
16,
16,
16,
16,
0,
8,
8,
8,
16,
4,
12,
12,
16,
2
] |
[
"The",
"malicious",
"application",
"sends",
"a",
"request",
"to",
"choose",
"a",
"network",
"account",
",",
"a",
"specific",
"account",
"that",
"can",
"only",
"be",
"processed",
"by",
"authentication",
"services",
"exported",
"by",
"the",
"malicious",
"application",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"leverages",
"webinjects",
"and",
"SMS",
"reading",
"capabilities",
"to",
"bypass",
"two-factor",
"authentication",
",",
"and",
"is",
"clearly",
"targeting",
"financial",
"applications",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Computer",
"Incident",
"Response",
"Center",
"Luxembourg",
"CIRCL",
"has",
"recently",
"uncovered",
"malicious",
"files",
"attached",
"to",
"an",
"email",
"through",
"the",
"use",
"of",
"Pandora",
"Document",
"and",
"File",
"Analysis."
] | [
4,
12,
12,
12,
12,
12,
12,
16,
16,
16,
1,
9,
16,
16,
16,
1,
16,
16,
16,
16,
1,
9,
16,
1,
9
] |
[
"New",
"variant",
"of",
"the",
"Android",
"rootnik",
"malware",
"that",
"disguises",
"itself",
"as",
"a",
"legal",
"app."
] | [
16,
3,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
5,
13
] |
[
"Using",
"google",
"translate,",
"I",
"found",
"that",
"the",
"language",
"is",
"Armenian",
"and",
"translates",
"to",
"The",
"Law",
"on",
"Banks",
"and",
"Banking",
"27.07.2015.doc",
"VirusTotal",
"intelligence",
"spotted",
"the",
"decoy",
"in",
"the",
"wild",
"as",
"an",
"email",
"attachment",
"with",
"the",
"subject",
"name",
"Law",
"changes",
"which",
"gave",
"me",
"a",
"suspicion",
"that",
"the",
"attempt",
"was",
"made",
"to",
"specifically",
"target",
"the",
"employees",
"of",
"Central",
"bank",
"of",
"Armenia."
] | [
16,
5,
13,
16,
16,
15,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
4,
12,
16,
16,
1,
16,
16,
16,
16,
16,
1,
9,
16,
16,
1,
16,
1,
9,
16,
16,
16,
16,
16,
15,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
4,
12,
12,
12
] |
[
"It",
"appears",
"that",
"the",
"attackers",
"are",
"somewhat",
"familiar",
"with",
"the",
"language",
"and",
"mountain-trekking",
"culture",
"of",
"the",
"targets",
"–",
"the",
"meaning",
"of",
"“",
"chuli",
"”",
"is",
"“",
"summit",
"”",
":",
"The",
"command-and-control",
"server",
"and",
"parameters",
"can",
"be",
"easily",
"seen",
"in",
"the",
"decompiled",
"source",
"code",
":",
"Command",
"and",
"control",
"server",
"interaction",
"code",
"Throughout",
"the",
"code",
",",
"the",
"attackers",
"log",
"all",
"important",
"actions",
",",
"which",
"include",
"various",
"messages",
"in",
"Chinese",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Everything",
"started",
"from",
"a",
"well",
"edited",
"Italian",
"language",
"email",
"given",
"to",
"me",
"from",
"a",
"colleague",
"of",
"mine,",
"thank",
"you",
"Luca!",
"reaching",
"out",
"many",
"Italian",
"companies."
] | [
16,
16,
16,
16,
1,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12
] |
[
"BEBLOH",
"is",
"a",
"banking",
"Trojan",
"that",
"has",
"been",
"around",
"since",
"as",
"early",
"as",
"2009."
] | [
3,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
0,
8,
8
] |
[
"The",
"actor",
"utilizes",
"spear",
"phishing",
"campaigns",
"to",
"deliver",
"NetTraveler,",
"also",
"known",
"as",
"TravNet."
] | [
16,
6,
16,
6,
14,
14,
16,
16,
3,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.PcClient.409260",
"Trojan.Pincav.9356",
"Backdoor.PcClient.Win32.5",
"Backdoor/PcClient.alqk",
"Trojan.Buzy.D10B5",
"W32/Backdoor.MMJP-0040",
"Backdoor.Trojan",
"Trojan.Win32.PcClient.ihgd",
"Trojan.MulDrop3.45818",
"Backdoor.Win32.PcClient",
"W32/Backdoor2.FUIH",
"Trojan:Win32/Wisp.A",
"BDS/Pcclient.alqk",
"Trojan[Backdoor]/Win32.PcClient",
"Backdoor.Win32.A.PcClient.386732",
"Trojan/Win32.PcClient.R55121",
"Backdoor.PcClient",
"Backdoor.PcClient!4LPCxDv4AHg",
"Win32/Backdoor.851"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Gustuff",
"advertising",
"screenshot",
"The",
"companies",
"advertised",
"in",
"the",
"image",
"above",
"were",
"from",
"Australia",
",",
"which",
"matches",
"up",
"with",
"the",
"campaign",
"we",
"researched",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Mauvaise.SL1",
"BehavesLike.Win64.MysticCompressor.ch",
"Trojan:Win64/Jifcapi.A",
"Win32/Trojan.03e"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.PWS.Steam.12700",
"BehavesLike.Win32.Trojan.bc",
"TR/Dropper.MSIL.dhgqe",
"Spyware.AzorUlt",
"Trj/GdSda.A",
"Trojan.MSIL.Krypt",
"MSIL/Kryptik.MPY!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Those",
"are",
"not",
"the",
"only",
"system",
"functions",
"Triada",
"modifies",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.AlustinH.Trojan",
"Trojan.Diacam.KL3",
"Trojan.VB.Win32.96905",
"Trojan/VB.qms",
"TROJ_DIACAM_BK0846C6.TOMC",
"Win32.Trojan.WisdomEyes.16070401.9500.9992",
"TROJ_DIACAM_BK0846C6.TOMC",
"Win.Trojan.Mokes-11",
"Trojan.Win32.Dwn.coomze",
"TrojWare.Win32.VB.QMS",
"Trojan.DownLoader6.45576",
"Trojan/Jorik.glae",
"Trojan/Win32.Mokes",
"Trojan:Win32/Diacam.A",
"Trojan.Symmi.D23C3",
"Win32.Trojan.VB.BE",
"Trojan/Win32.VBKrypt.C161437",
"Trojan.Mokes",
"Win32/VB.QMS",
"Win32.VBCrypt",
"W32/VBKrypt.MBSX!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Packed.16",
"Win32/Pigeon.AZTT",
"Win.Trojan.Packed-77",
"Backdoor.Win32.Hupigon.oqk",
"Trojan.Win32.Crypt.mkur",
"Backdoor.Win32.Hupigon.412672.K",
"Win32.Backdoor.Hupigon.cuda",
"Packed.Win32.Klone.~KMF",
"BackDoor.Pigeon.20533",
"Backdoor.Hupigon.Win32.100099",
"BehavesLike.Win32.Fujacks.fc",
"Backdoor/Hupigon.af",
"Win32.Troj.Klone.ab.389660",
"Trojan/Win32.Malpacked5.R134022",
"Trojan-Dropper.Kaos",
"Trojan.Win32.Pincav"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"some",
"cases,",
"it",
"appeared",
"to",
"be",
"a",
"single",
"use",
"domain",
"shadowing",
"which",
"is",
"incredibly",
"difficult",
"to",
"stop",
"by",
"using",
"blacklisting."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Heur.VP.ED105D0",
"Win32.Trojan.WisdomEyes.16070401.9500.9911",
"Trojan.MulDrop4.19536",
"BehavesLike.Win32.VBObfus.nt",
"TR/Spy.36864.1691",
"Win32/VB.OIX"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Since",
"our",
"first",
"published",
"analysis",
"of",
"the",
"OilRig",
"campaign",
"in",
"May",
"2016",
"Unit42",
"has",
"continued",
"to",
"monitor",
"this",
"group",
"for",
"new",
"activity."
] | [
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
0,
8,
4,
16,
16,
16,
16,
16,
6,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.Dapato!O",
"Trojan.Symmi.D6404",
"Win32.Trojan.WisdomEyes.16070401.9500.9991",
"Trojan-Dropper.Win32.Dapato.buqu",
"Trojan.Win32.Dapato.bcmajb",
"Trojan.DownLoader7.19485",
"BehavesLike.Win32.BadFile.mm",
"W32/Trojan.IAVK-8796",
"TrojanDropper.Dapato.mbp",
"TR/Dapato.AG",
"Win32.Troj.Dapato.bu.kcloud",
"Trojan:Win32/Omdork.A",
"Trojan-Dropper.Win32.Dapato.buqu",
"Trojan/Win32.Inject.R46970",
"Trojan.Win32.Swisyn",
"W32/Dapato.B!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"More",
"and",
"more",
"we've",
"been",
"seeing",
"references",
"to",
"a",
"malware",
"family",
"known",
"as",
"FormBook."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
3
] |
[
"]",
"net",
",",
"negg1.ddns",
"[",
"."
] | [
9,
9,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAdware.6632",
"PUP.Optional.Nosibay",
"TROJ_GE.FF4D51A5",
"Adware.Downware.11318",
"virus.win32.sality.at",
"PUA/BubbleDock.A",
"PUP.Nosibay/Variant",
"NSIS.Application.SilentInstaller.A",
"Win32.Trojan.Bubbledock.Huzb"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"As",
"soon",
"as",
"the",
"user",
"picks",
"up",
"the",
"device",
",",
"the",
"implant",
"will",
"detect",
"a",
"motion",
"event",
"and",
"execute",
"the",
"“",
"tk1",
"”",
"and",
"“",
"input",
"keyevent",
"3",
"”",
"commands",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Anti-emulator",
"code",
"."
] | [
16,
16,
16
] |
[
"Several",
"days",
"ago",
",",
"the",
"e-mail",
"account",
"of",
"a",
"high-profile",
"Tibetan",
"activist",
"was",
"hacked",
"and",
"used",
"to",
"send",
"targeted",
"attacks",
"to",
"other",
"activists",
"and",
"human",
"rights",
"advocates",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"These",
"apps",
"are",
"not",
"hosted",
"inside",
"the",
"Google",
"Play",
"store,",
"but",
"are",
"distributed",
"via",
"third",
"party",
"distribution",
"mechanisms",
"in",
"China."
] | [
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
2
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.