tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "W32.OnGamesHEXW32AH.Trojan", "Trojan.Win32.Scar!O", "BackDoor.Boomie.A3", "Trojan.Scar.Win32.63773", "Trojan/Scar.fvka", "Win32.Trojan.Scar.d", "Win.Trojan.Scar-895", "Trojan.Win32.Scar.fvka", "Trojan.Win32.Scar.bbmdmf", "Troj.W32.Scar.fvka!c", "Trojan.Win32.Scar.ft", "Trojan.DownLoad2.52794", "Backdoor.Win32.Boomie", "Trojan/Scar.azbo", "Trojan/Win32.Scar", "Backdoor:Win32/Boomie.A", "Trojan.Win32.Scar.fvka", "Win-Trojan/Boomie.40960", "Trojan.Scar!AGwL0r/7hW4", "Win32/Trojan.Spy.81b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Shamoon.A", "Trojan/W32.Shamoon.192000", "Trojan.Depriz", "Trojan/DistTrack.d", "Trojan.Shamoon.A", "Win32.Trojan.WisdomEyes.16070401.9500.9987", "W32.Disttrack.B", "TROJ64_DISTTRACK.D", "Win.Malware.DistTrack-5743117-1", "Trojan.Shamoon.A", "Trojan.Shamoon.A", "Trojan.Win64.DistTrack.elcfal", "Trojan.Win32.Z.Disttrack.192000", "Trojan.Shamoon.A", "Trojan.Shamoon.A", "Trojan.DistTrack.Win32.9", "TROJ64_DISTTRACK.D", "W64/Trojan.BOAO-0112", "Trojan:Win64/Depriz.E!dha", "Trojan.DistTrack.A", "Trj/CI.A", "W64/DistTrack.D!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "FastPOS", "was", "true", "to", "its", "moniker—pilfer", "data", "as", "fast", "as", "possible,", "as", "much", "as", "it", "can,", "even", "at", "the", "expense", "of", "stealth." ]
[ 3, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Downloader.Win32.Banload!O", "Trojan/Downloader.Banload.qku", "Trojan.Graftor.D3222", "Win32.Trojan.WisdomEyes.16070401.9500.9991", "Trojan.DownLoad2.52025", "Downloader.Banload.Win32.37297", "Trojan.Win32.Spy", "TrojanDownloader:Win32/Spycos.B", "TrojanDownloader.Banload" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Within", "this", "time", "period", ",", "we", "identified", "close", "to", "300", "samples", "belonging", "to", "this", "family", "(", "all", "sample", "hashes", "are", "listed", "in", "the", "Appendix", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.KVM.B", "Backdoor/W32.KWM.70656", "PWS-Susanin.dr", "Backdoor.KVM.B", "Trojan.KWM.B2", "Infostealer.KMW.B", "KWM.B", "Win32/PSW.KWM.B", "BKDR_KWM.B", "Backdoor.Win32.KWM.b", "Trojan.Win32.KWM.baukx", "PE:Trojan.KWM.b!1073777723", "Backdoor.KVM.B", "TrojWare.Win32.PSW.Susanin.B", "Backdoor.KVM.B", "BackDoor.KWM", "Backdoor.KWM.Win32.11", "BKDR_KWM.B", "PWS-Susanin.dr", "W32/Risk.SBUI-3175", "Backdoor/KWM.b", "TR/WebMoney.2", "Trojan[Backdoor]/Win32.KWM", "Win32.Hack.KWM.b.kcloud", "PWS:Win32/Susanin.B", "Backdoor.Win32.KWM.70656[h]", "Win-Trojan/KWM.70656", "Backdoor.KVM.B", "Backdoor.KVM.B", "Dropper.PSW.Liz.17", "Trj/PSW.Susanin", "Win32/PSW.Susanin.B", "Backdoor.Win32.Kwm.B", "W32/Contract.B!tr.bdr", "PSW.Susanin", "Backdoor.Win32.KWM.aWbC" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Raxlogon.Trojan", "Worm.Win32.AutoRun!O", "Worm.Autorun.ZI8", "Worm.AutoRun.Win32.22949", "Win32.Worm.FakeFolder.b", "Win32/QQPass.NNE", "Worm.AutoRun", "Worm.Win32.AutoRun.hit", "Trojan.Win32.AutoRun.uaado", "Worm.Win32.Autorun.81108", "Worm.Win32.Pronny.BL", "Trojan.PWS.Qqpass.5627", "BackDoor-CCT.dll", "Worm/AutoRun.wxz", "Trojan:Win32/Hideproc.E", "Trojan[Monitor]/Win32.ActualSpy", "Win32.Troj.Undef.kcloud", "HEUR/Fakon.mwf", "Trojan.AVKill", "W32/Autorun.KBC", "Trojan.Win32.FakeFolder.pb", "Worm.AutoRun!PDL9JmhYC4g", "Backdoor.Win32.DarkMoon" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "New", "campaign", "involving", "PoSeidon/FindPOS", "point", "of", "sale", "malware" ]
[ 16, 3, 16, 1, 3, 11, 11, 11 ]
[ "This", "morning", "Mozilla", "released", "security", "updates", "that", "fix", "the", "vulnerability." ]
[ 16, 0, 4, 16, 16, 16, 16, 16, 16, 7 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Notepices", "Win32.Trojan.WisdomEyes.16070401.9500.9871", "not-a-virus:AdWare.Win32.ICLoader.alpu", "Riskware.Win32.Hpdefender.ekfhpl", "Trojan.StartPage1.28867", "Trojan.Win32.Notepices", "Pua.Downloader", "GrayWare[AdWare]/Win32.Hpdefender", "not-a-virus:AdWare.Win32.ICLoader.alpu", "Adware.HPDefender", "Win32/Adware.HPDefender.JG" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Standard", "browser", "search", "history", "Standard", "browser", "bookmarks", "Device", "handset", "metadata", ";", "such", "as", "brand", ",", "display", ",", "hardware", ",", "manufacturer", ",", "product", ",", "serial", ",", "radio", "version", ",", "and", "SDK", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.RsLpTTc.Worm", "Ransom.Lyposit.S3755", "W32.Sality.lak4", "Trojan/Lyposit.a", "Trojan.Zusy.D382F1", "Ransom_Lyposit.R002C0CAT18", "Win32.Trojan.WisdomEyes.16070401.9500.9902", "Ransom_Lyposit.R002C0CAT18", "Win.Trojan.Updays-1", "Trojan.Win32.Clicker.efvwpu", "TrojWare.Win32.Lyposit.C", "Trojan.Click2.50933", "Trojan.Lyposit.Win32.25", "Trojan-Ransom.Lyposit", "Ransom:Win32/Lyposit.B", "Trojan/Win32.Lyposit.R188188", "W32/Lyposit.A70!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "malware", "used", "in", "email", "campaigns", "is", "often", "ransomware", "or", "banking", "malware." ]
[ 16, 3, 16, 16, 6, 14, 16, 16, 3, 16, 3, 11 ]
[ "It", "collects", "information", "about", "the", "smartphone", "(", "IMEI", ",", "country", ",", "service", "provider", ",", "operating", "system", "language", ")", "and", "sends", "it", "to", "the", "host", "via", "the", "HTTP", "POST", "request", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Injector.AutoIt", "Trojan.StartPage1.24074", "TrojanClicker:Win32/Rubalotalow.A", "Win32/Trojan.ab1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.eHeur.Virus02", "Virus.Win32.Sality!O", "Win32.Trojan.WisdomEyes.16070401.9500.9989", "Win.Trojan.Zusy-6041926-0", "Trojan.Win32.Scar.okvf", "Win32.Trojan.Scar.Wwek", "Trojan.DownLoader24.19336", "Trojan.Scar.kws", "Trojan/Win32.Cosmu", "PWS:Win32/Sapbexts.B", "Trojan.Win32.Scar.okvf", "Trojan/Win32.Cosmu.R214802", "Trojan.Vilsel", "Trojan.Cosmu!F9mC6Li+PNw", "Win32/Trojan.Scar.C" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "You", "may", "mistakenly", "download", "and", "run", "TrojanDropper:Win32/Gepys.A,", "thinking", "it", "is", "an", "update", "for", "Java." ]
[ 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 1, 9, 9, 9 ]
[ "Spaghetti", "and", "junk", "codes", "make", "common", "analyst", "tools", "ineffective", "In", "analyzing", "FinFisher", ",", "the", "first", "obfuscation", "problem", "that", "requires", "a", "solution", "is", "the", "removal", "of", "junk", "instructions", "and", "“", "spaghetti", "code", "”", ",", "which", "is", "a", "technique", "that", "aims", "to", "confuse", "disassembly", "programs", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "If", "the", "attack", "succeeds,", "the", "malware", "changes", "the", "addresses", "of", "the", "DNS", "servers", "in", "the", "router's", "settings,", "thereby", "rerouting", "all", "DNS", "queries", "from", "devices", "in", "the", "attacked", "Wi-Fi", "network", "to", "the", "servers", "of", "the", "cybercriminals", "such", "an", "attack", "is", "also", "known", "as", "DNS-hijacking." ]
[ 16, 16, 1, 16, 16, 3, 16, 16, 1, 16, 16, 5, 13, 16, 16, 5, 13, 16, 1, 16, 5, 13, 16, 5, 16, 16, 1, 5, 13, 16, 16, 5, 16, 16, 6, 16, 16, 1, 16, 16, 16, 16, 1 ]
[ "It", "means", "the", "phone", "can", "be", "unblocked", "in", "some", "cases", "when", "it", "has", "been", "blocked", "by", "one", "of", "the", "above", "HTML", "pages", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "AMP", "Threat", "Grid", "helps", "identify", "malicious", "binaries", "and", "build", "protection", "into", "all", "Cisco", "Security", "products", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16 ]
[ "Each", "time", "a", "rented", "malware", "reaches", "the", "end", "of", "its", "life", "it", "provides", "the", "opportunity", "for", "other", "actors", "a", "to", "take", "over", "the", "malware", "rental", "market-share", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Interestingly,", "the", "attackers", "camouflage", "one", "of", "their", "delivery", "domains", "by", "redirecting", "visitors", "to", "El", "Universal,", "a", "major", "Mexican", "newspaper." ]
[ 16, 16, 6, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 4, 12, 12, 12, 12, 12 ]
[ "These", "emails", "are", "mainly", "sent", "to", "Colombians", "who", "may", "work", "in", "the", "accounting", "or", "finance", "departments", "of", "various-sized", "organizations." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "Communication", "Channel", "via", "Stolen", "SMS", "In", "addition", ",", "TrickMo", "has", "an", "automatic", "mechanism", "to", "send", "SMS", "messages", "to", "its", "C", "&", "C", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Downloader", "Trojan/Downloader.Boaxxe.aa", "Win32.TRDldr.JeRips", "TR/Dldr.JeRips.A", "W32/Boaxxe.AB!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "Service", "Name", "Purpose", "AndroidAlarmManager", "Uploading", "last", "recorded", ".amr", "audio", "AndroidSystemService", "Audio", "recording", "AndroidSystemQueues", "Location", "tracking", "with", "movement", "detection", "ClearSystems", "GSM", "tracking", "(", "CID", ",", "LAC", ",", "PSC", ")", "ClipService", "Clipboard", "stealing", "AndroidFileManager", "Uploading", "all", "exfiltrated", "data", "AndroidPush", "XMPP", "С", "&", "C", "protocol", "(", "url.plus:5223", ")", "RegistrationService", "Registration", "on", "C", "&", "C", "via", "HTTP", "(", "url.plus/app/pro/", ")", "Interestingly", ",", "a", "self-protection", "feature", "was", "implemented", "in", "almost", "every", "service", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "Trojan.MulDrop5.40693", "TR/Downloader.A.7912", "Trojan[Ransom]/Win32.Blocker", "Trojan:MSIL/Dubfot.A", "Trojan.FakeMS", "Trojan.MSIL.IRCBot" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "Data", "was", "always", "sent", "to", "the", "C", "&", "C", "server", "via", "HTTP", "in", "the", "body", "of", "a", "POST", "request", "in", "encrypted", "form", "to", "the", "relative", "address", "/something/index.php", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16 ]
[ "The", "placement", "of", "the", "decoy", "functionality", "is", "likely", "designed", "to", "confuse", "the", "malware", "researchers", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "New", "ransomware", "using", "the", ".ipygh", "extension." ]
[ 16, 3, 16, 16, 1, 9 ]
[ "How", "do", "you", "know", "if", "your", "Google", "account", "is", "breached", "?", "You", "can", "check", "if", "your", "account", "is", "compromised", "by", "accessing", "the", "following", "web", "site", "that", "we", "created", ":", "https", ":", "//gooligan.checkpoint.com/", "." ]
[ 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16 ]
[ "BLOCKER_BANKING_START", "–", "display", "phishing", "HTML", "page", "for", "entry", "of", "bank", "card", "details", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "most", "recently", "discovered", "Microsoft", "SQL", "server", "being", "used", "as", "Escalar", "infrastructure", "contained", "records", "of", "1660", "infections", "that", "all", "connected", "in", "a", "two-day", "time", "frame." ]
[ 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 3, 5, 16, 16, 16, 8, 16, 15, 16, 16, 16, 16, 0, 8, 16 ]
[ "Later", "on,", "we", "found", "evidence", "of", "the", "same", "attack", "perpetrated", "on", "May", "3." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 0, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Worm.Lemoor.A", "Worm/W32.Lemoor.1981", "Trojan-Downloader.Win32.Small!O", "Win32.Worm.Lemoor.A", "Worm.Lemoor.Win32.2", "W32.W.Lemoor.a!c", "W32/Lemoor.a", "Win32.Worm.Lemoor.A", "WORM_LEMOOR.D", "Win32.Trojan.WisdomEyes.16070401.9500.9995", "W32/Lemoor.A", "W32.Lemoor.A", "WORM_LEMOOR.D", "Win.Worm.Lemoor-3", "Win32.Worm.Lemoor.A", "Worm.Win32.Lemoor.a", "Win32.Worm.Lemoor.A", "Win32.Worm.Lemoor.A", "Worm.Win32.Lemoor.B", "Win32.Worm.Lemoor.A", "Win32.Ephem.24", "W32/Lemoor.JDMS-3575", "I-Worm/Lemoor.a", "WORM/Lemoor.A", "Worm/Win32.Lemoor", "Worm.Win32.Lemoor.a", "Worm/Win32.Lemoor.R37765", "Worm.Lemoor", "W32/Lemoor.B.worm", "Win32/Lemoor.B", "Win32.Worm.Lemoor.Ahos", "Worm.Lemoor!V5CZ/YV1RTs", "Worm.Win32.Lemoor", "W32/Lemoor.A!worm", "Win32/Worm.857" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "User-agent:", "Go-http-client/1.1" ]
[ 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Skeeyah", "Trojan.KillDisk.Win32.208", "Trojan/KillDisk.nbh", "Win32.Trojan.WisdomEyes.16070401.9500.9834", "Trojan.Disakil", "Win.Trojan.KillDisk-3", "Trojan.Win32.KillDisk.fw", "Win32.Trojan.Killdisk.Pgmq", "Trojan:Win32/KillDisk.N!dha", "Trojan.KillDisk.1", "Trojan.Win32.KillDisk.fw", "Trojan/Win32.KillDisk.C1706046", "Trojan.KillDisk", "Win32/KillDisk.NBH", "Trojan.KillDisk!B1yc+Gvh2zs", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Most", "of", "the", "samples", "we", "found", "date", "from", "the", "last", "half", "of", "2017", ",", "fewer", "samples", "date", "from", "2016", ",", "and", "a", "handful", "date", "back", "to", "2015", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "normal", "lifecycle", "of", "an", "Office", "exploit", "starts", "with", "the", "initial", "use", "in", "targeted", "attacks." ]
[ 16, 16, 16, 16, 7, 15, 15, 16, 16, 16, 16, 16, 16, 16, 1 ]
[ "Emergency", "SMS", "commands", "." ]
[ 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-PSW.Win32.LdPinch!O", "TrojanPWS.Ldpinch", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "Win32/Tnega.YML", "TSPY_LDPINCH_DD3005CF.UVPA", "Trojan-PSW.Win32.LdPinch.guf", "Trojan.Win32.LdPinch.crgdkw", "Trojan.LdPinch.Win32.5281", "BehavesLike.Win32.Trojan.fz", "Trojan.Win32.Vilsel", "W32/Trojan.JQPI-8861", "Trojan/PSW.LdPinch.pxf", "Trojan[PSW]/Win32.LdPinch", "Trojan.Heur.E4E165", "Troj.Psw.W32.Ldpinch!c", "Trojan-PSW.Win32.LdPinch.guf", "PWS:Win32/Phorex.A", "Trojan/Win32.LdPinch.R68731", "Trojan.PWS.LdPinch!MPU8gCWOSOw", "W32/LdPinch.GUF!tr.pws", "TrojanPSW.Pinch", "Win32/Trojan.PSW.b93" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.PWS.QQRob.NBU", "Trojan-PSW.Win32.QQPass!O", "PSW.QQPass.13953", "Trojan.PWS.QQRob.NBU", "Trojan/PSW.QQPass.ban", "Win32.Worm.Autorun.ar", "Infostealer.QQRob.A", "WORM_AUTORUN.EDD", "Win.Trojan.QQPass-84", "Trojan.PWS.QQRob.NBU", "Trojan-PSW.Win32.QQPass.ban", "Trojan.PWS.QQRob.NBU", "Trojan.Win32.QQPass.btqyi", "Trojan.Win32.Z.Qqpass.73427", "Trojan.Tencent/Variant", "Trojan.PWS.QQRob.NBU", "TrojWare.Win32.PSW.QQPass.~GK", "Trojan.PWS.Qqpass.1364", "WORM_AUTORUN.EDD", "BehavesLike.Win32.PWSQQGame.lh", "W32/Pws.VYB", "Trojan/PSW.QQPass.bhp", "Win32.Troj.QQPswT.bs.116858", "Trojan.PWS.QQRob.NBU", "Troj.Psw.W32.Qqpass!c", "Trojan-PSW.Win32.QQPass.ban", "MalwareScope.Trojan-PSW.Game.7", "Trj/QQPass.AOI", "Win32.Trojan-qqpass.Qqrob.Pcsk", "Trojan-Dropper.Win32.Delf", "W32/Dropper.DLF!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.BHO.89848", "Trojan/BHO.gzx", "TSPY_BZUB.CN", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Trojan2.FNXB", "TSPY_BZUB.CN", "Win.Trojan.Bho-4826", "Trojan.Win32.BHO.gzx", "Trojan.Win32.BHO.cqlbw", "TrojWare.Win32.BHO.SR", "Trojan.MulDrop.20001", "Trojan.BHO.Win32.3053", "BehavesLike.Win32.Backdoor.mc", "W32/Trojan.RKCQ-8049", "Trojan/BHO.csn", "Win32.Troj.BHO.kcloud", "Trojan.Heur.RP.E89CDE", "Trojan.Win32.BHO.gzx", "PWS:Win32/Cimuz.J", "Trojan/Win32.Inject.C94649", "Trojan.BHO", "Win32/Spy.BZub.NFS", "Trojan.BHO!Tkmwppjy1xw" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Chrysaor", "is", "believed", "to", "be", "related", "to", "the", "Pegasus", "spyware", "that", "was", "first", "identified", "on", "iOS", "and", "analyzed", "by", "Citizen", "Lab", "and", "Lookout", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 4, 12, 16, 4, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Downloader.Win32.VB!O", "TrojanDownloader.VB", "Troj.Banker.W32.Bancos.lgUF", "Trojan/Downloader.VB.iro", "Win32.Trojan.WisdomEyes.16070401.9500.9935", "Win32/SillyDl.GEF", "Win.Trojan.Downloader-37507", "Trojan-Downloader.Win32.VB.iro", "Trojan.Win32.VB.vrga", "Trojan.Win32.Downloader.69122.B", "TrojWare.Win32.Banker.etk74", "Trojan.Show.34817", "Downloader.VB.Win32.114", "WORM_IRCBOT.SMOK", "BehavesLike.Win32.YahLover.ct", "TrojanDownloader.VB.gvh", "Trojan[Downloader]/Win32.VB", "Trojan-Downloader.Win32.VB.iro", "DoS:Win32/Pokanti.A", "Downloader/Win32.VB.R6537", "TScope.Trojan.VB", "Win32.Trojan-downloader.Vb.Pdmc", "Trojan.DL.VB!zHigarbFEUc", "Trojan-Downloader.Win32.VB", "Win32/Trojan.Downloader.b8b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W97M.Dropper.GO", "W97M/Downloader.aho", "W2KM_DLOADE.VHC", "Trojan.Script.MLW.dsmnja", "W2KM_DLOADE.VHC", "W97M/Downloader.aho", "HEUR.VBA.Trojan", "macro.ole.encodedownload.g" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Even", "though", "we", "could", "not", "find", "indications", "of", "being", "in", "use", ",", "two", "stand", "out", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Ransom.Win32.PornoBlocker!O", "Trojan/PornoBlocker.adki", "Win32.Virus.Krap.a", "HV_RANSOM_CA222F78.TOMC", "Win.Trojan.Kryptik-1359", "Trojan-Ransom.Win32.PornoBlocker.adki", "Trojan.Win32.Butirat.wyaex", "Trojan.Win32.A.PornoBlocker.197120.B", "ApplicUnwnt.Win32.Hoax.ArchSMS.SG", "BackDoor.Butirat.51", "BehavesLike.Win32.PUPXAG.ch", "Trojan/PornoBlocker.chv", "Trojan[Ransom]/Win32.PornoBlocker", "Trojan.Kazy.DCA1D", "Trojan-Ransom.Win32.PornoBlocker.adki", "Trojan:Win32/Waprox.A", "Trojan/Win32.PornoBlocker.C156437", "Hoax.PornoBlocker", "Trj/Pacrypt.D", "Trojan.PornoBlocker!0B81yxGeAIw", "Trojan.Win32.Waprox", "W32/Zbot.RO!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.VBS.UAJ", "Trojan.VBS.UAJ", "Win32.Trojan.WisdomEyes.16070401.9500.9853", "Trojan.VBS.UAJ", "Vbs.Trojan.Vbs.Ljjs", "Trojan.VBS.UAJ", "Trojan.VBS.UAJ", "Trojan.DownLoader19.25627", "BehavesLike.Win32.Downloader.qh", "Trojan.Barys", "Trojan.MSIL.amcc", "Trojan.VBS.UAJ", "Trojan.VBS.UAJ", "Trojan.MSIL.Zapchast", "VBS/Shutdown.NAH" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "RTKT_SMALL.NLA", "RTKT_SMALL.NLA", "Trojan.Win32.Small.dplckv", "Adware.AdLoad.Win32.8710", "BehavesLike.Win32.PUPXAX.lc", "Trojan.Zusy.D2BE63", "Rootkit.Small!rTi0K4xzlKc" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "sample", "is", "clearly", "a", "mix", "between", "the", "two", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.VodyDmpA.Worm", "Trojan/W32.Small.9265", "RiskWare.Tool.CK", "Trojan/Pakes.c", "Win32.Trojan.WisdomEyes.151026.9950.9983", "W32/Trojan.WZX", "TROJ_PAKES.JV", "Virus.Win32.Xorer.a", "Trojan.Win32.Pakes.bovph", "Trojan.Win32.Pakes.9261[h]", "Trojan.Dropper/Packed", "Win32.Virus.Xorer.Pkqs", "TrojWare.Win32.Patched.KSU", "Trojan.Rox", "Virus.Xorer.Win32.101", "TROJ_PAKES.JV", "BehavesLike.Win32.Downloader.zc", "W32/Trojan.YUJV-5997", "W32/Pakes.C!tr", "W32.Xorer.a!c", "Win-Trojan/Pakes.9265", "Trojan.Pakes", "Virus.Win32.Xorer", "Clicker.BEHT" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "One", "representative", "sample", "Chrysaor", "app", "that", "we", "analyzed", "was", "tailored", "to", "devices", "running", "Jellybean", "(", "4.3", ")", "or", "earlier", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 13, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.GamesonTBDll1.Trojan", "Trojan.PWS.OnlineGames.ZLU", "Trojan-PWS/W32.WebGame.229376.BS", "Trojan.Tilcun.B7", "Trojan.PWS.OnlineGames.ZLU", "Trojan/OnLineGames.arus", "TSPY_ONLINEG.FGF", "Win32.Trojan-PSW.OLGames.cc", "Infostealer.Gampass", "TSPY_ONLINEG.FGF", "Win.Spyware.45047-2", "Trojan.PWS.OnlineGames.ZLU", "Trojan.PWS.OnlineGames.ZLU", "Trojan.Win32.OnLineGames.bemmm", "Trojan.Win32.PSWIGames.229376.Q", "Trojan.PWS.OnlineGames.ZLU", "TrojWare.Win32.PSW.OnLineGames.NOA", "Trojan.PWS.OnlineGames.ZLU", "Trojan.PWS.Gamania.11506", "BehavesLike.Win32.Downloader.dh", "Trojan.Win32.Tilcun", "TR/Tilcun.B", "Win32.Troj.OnlineGameT.na.218624", "Trojan.PWS.OnlineGames.ZLU", "Troj.GameThief.W32.OnLineGames.arus!c", "Trojan/Win32.OnlineGameHack.R2107", "PWS-OnlineGames.br", "BScope.Trojan-PSW.Gomex.22", "Win32/PSW.OnLineGames.NOA", "Win32.GamePsw.OnlineGame.bscx", "W32/OnLineGames.AKLO!tr.pws" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "it", "Brescia", "server1cs.exodus.connexxa", "[", "." ]
[ 9, 9, 16, 1, 9, 9 ]
[ "BlackMoon", "Trojan", "is", "a", "banking", "trojan", "that", "is", "designed", "to", "phish", "user", "credentials", "from", "various", "South", "Korean", "banking", "institutions." ]
[ 3, 11, 16, 16, 3, 11, 16, 16, 16, 16, 1, 9, 9, 16, 16, 2, 10, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Script.9271", "BAT.Trojan.KillFiles.h", "Win.Worm.530490-1", "BAT.Conwonk", "BehavesLike.Win64.Downloader.qh", "BAT/KillWin.NAR", "Trojan.BAT.KillWin", "BAT/KillWin.NAR!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Patched.Shopperz.1", "Trojan.DllPatcher.A6", "PTCH64_NOPLE.SM", "Trojan.Mentono!inf", "PTCH64_NOPLE.SM", "Trojan.Patched.Shopperz.1", "Trojan.Win64.Patched.qw", "Trojan.Patched.Shopperz.1", "Trojan.Patched.Shopperz.1", "Trojan.Hosts.37524", "Trojan.Patched.Shopperz", "Trojan/Win64.Patched.ap", "Trojan.Patched.Shopperz.1", "Trojan.Win64.Patched.qw", "W64/Patched.AP!tr", "Win32/Trojan.133" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "malicious", "Word", "document", "targeting", "Mac", "users." ]
[ 16, 1, 9, 9, 16, 5, 13 ]
[ "It", "also", "targets", "Ahnlab", "by", "killing", "processes", "and", "deleting", "files", "specific", "to", "the", "software." ]
[ 16, 16, 16, 4, 16, 1, 9, 16, 1, 9, 16, 16, 16, 5 ]
[ "BlackTech", "is", "a", "cyber", "espionage", "group", "operating", "against", "targets", "in", "East", "Asia,", "particularly", "Taiwan,", "and", "occasionally,", "Japan", "and", "Hong", "Kong." ]
[ 6, 16, 16, 6, 14, 14, 16, 16, 16, 16, 2, 10, 16, 2, 16, 16, 2, 16, 2, 10 ]
[ "Even", "threats", "like", "DNS", "cache", "poisoning", "employ", "social", "engineering", ",", "so", "users", "should", "also", "be", "more", "prudent", "against", "suspicious", "or", "unknown", "messages", "that", "have", "telltale", "signs", "of", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Affpach.A4", "Trojan.Graftor.D6130", "Win32.Trojan.StartPage.a", "W32/Trojan2.NTSB", "TROJ_SPNR.30BF13", "Trojan.Win32.AVKill.bfnuts", "Trojan.Win32.Inject.tja", "Trojan.AVKill.27746", "TROJ_SPNR.30BF13", "W32/Trojan.ZXAC-7369", "Variant.Graftor.xm", "Win32/StartPage.OKV", "Trojan.StartPage!m0gBcMRinXU", "Trojan.Hijacker", "W32/StartPage.OKV!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Threat", "Actors", "TAs", "employ", "sophisticated", "techniques", "to", "create", "phishing", "websites", "that", "are", "designed", "to", "appear", "legitimate", "and", "attractive", "to", "users." ]
[ 6, 14, 14, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 9 ]
[ "BianLian", "continues", "to", "exhibit", "a", "high", "level", "of", "operational", "security", "and", "skill", "in", "network", "penetration,", "seeming", "to", "have", "also", "found", "their", "stride", "in", "the", "pace", "of", "their", "operations." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "VEX8687.Webshell", "Backdoor.PHP.RST.H", "HTML.BackDoor.A", "Backdoor.Php.Rst!c", "PHP.Backdoor.WebShell.al", "PHP/Rst.H", "PHP.RSTBackdoor", "PHP/Small.NAL", "PHP_R57SHELL.SM", "Win.Trojan.R57-2", "Script.Trojan.PHPShellRST.A", "Backdoor.PHP.RST.H", "Trojan.Html.Rst.bgzarv", "PHP.S.Rst.87741", "Backdoor.PHP.RST.H", "Backdoor.PHP.Rst.~BBA", "Backdoor.PHP.RST.H", "PHP.R57Shell.12", "PHP_R57SHELL.SM", "PHP/Rst.H", "PHP/Rst.H.95982", "Backdoor.PHP.RST.H", "PHP/Rst.A", "Backdoor.PHP.r57Shell.A", "BPX.Shell", "Backdoor.PHP.Rst.ai", "Php.Backdoor.Rst.Ssgx", "PHP.RST.G", "Trojan.PHP.Rst", "PHP/Rst.AI!tr", "php.script.c99shell.6" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Symantec", "first", "reported", "on", "this", "group", "back", "in", "January", "2017,", "detailing", "their", "operations", "and", "using", "a", "custom", "information", "stealing", "Trojan", "called", "ISMDoor." ]
[ 4, 16, 16, 16, 16, 6, 16, 16, 0, 8, 16, 16, 16, 16, 16, 16, 1, 9, 9, 3, 16, 3 ]
[ "Design", "In", "the", "manifest", ",", "the", "malware", "requests", "a", "large", "number", "of", "permissions", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Some", "apps", "have", "started", "with", "clean", "versions", ",", "in", "an", "attempt", "to", "grow", "user", "bases", "and", "build", "the", "developer", "accounts", "’", "reputations", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Adware.AMRL", "Trojan.DownLoader22.55869", "BehavesLike.Win32.Worm.th", "W32/Adware.OAXQ-2836", "Worm:Win32/Imafly.AC", "Trojan.Strictor.D19956", "Trojan/Win32.Cosmu.R158790", "Win32/Autoit.LH", "Worm.Win32.AutoIt", "W32/Autoit.EQP!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FakeW7Folder.Fam.Trojan", "Worm.Goldrv.A7", "Trojan-Ransom.Win32.Blocker.jaic", "Trojan.Win32.Dapato.dbzcxx", "W32.Virut.lMey", "Trojan.Win32.Dapato.a", "TrojWare.Win32.Dapato.DFS", "Trojan.DownLoader11.18798", "Trojan-Dropper.Win32.Dapato", "TrojanDropper.Dapato.peb", "Trojan[Dropper]/Win32.Dapato", "Worm:Win32/Goldrv.A", "Trojan-Ransom.Win32.Blocker.jaic", "HEUR/Fakon.mwf", "Trojan-Ransom.Blocker", "Backdoor.Bot", "W32/Dapato.EDU!tr", "Win32/Trojan.df8" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "malware", "used", "in", "this", "campaign", "has", "similar", "features", "to", "that", "distributed", "earlier", "in", "2017", "with", "the", "following", "changes:", "A", "new", "decoy", "document", "copy/pasted", "from", "an", "article", "published", "on", "the", "3rd", "of", "July", "by", "Yonhap", "News", "Agency", "in", "Korea;" ]
[ 16, 3, 16, 16, 16, 6, 16, 16, 16, 16, 15, 16, 16, 16, 0, 16, 16, 16, 16, 1, 9, 9, 9, 9, 16, 16, 16, 16, 16, 0, 8, 8, 8, 16, 4, 12, 12, 16, 2 ]
[ "The", "malicious", "application", "sends", "a", "request", "to", "choose", "a", "network", "account", ",", "a", "specific", "account", "that", "can", "only", "be", "processed", "by", "authentication", "services", "exported", "by", "the", "malicious", "application", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "leverages", "webinjects", "and", "SMS", "reading", "capabilities", "to", "bypass", "two-factor", "authentication", ",", "and", "is", "clearly", "targeting", "financial", "applications", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "Computer", "Incident", "Response", "Center", "Luxembourg", "CIRCL", "has", "recently", "uncovered", "malicious", "files", "attached", "to", "an", "email", "through", "the", "use", "of", "Pandora", "Document", "and", "File", "Analysis." ]
[ 4, 12, 12, 12, 12, 12, 12, 16, 16, 16, 1, 9, 16, 16, 16, 1, 16, 16, 16, 16, 1, 9, 16, 1, 9 ]
[ "New", "variant", "of", "the", "Android", "rootnik", "malware", "that", "disguises", "itself", "as", "a", "legal", "app." ]
[ 16, 3, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 5, 13 ]
[ "Using", "google", "translate,", "I", "found", "that", "the", "language", "is", "Armenian", "and", "translates", "to", "The", "Law", "on", "Banks", "and", "Banking", "27.07.2015.doc", "VirusTotal", "intelligence", "spotted", "the", "decoy", "in", "the", "wild", "as", "an", "email", "attachment", "with", "the", "subject", "name", "Law", "changes", "which", "gave", "me", "a", "suspicion", "that", "the", "attempt", "was", "made", "to", "specifically", "target", "the", "employees", "of", "Central", "bank", "of", "Armenia." ]
[ 16, 5, 13, 16, 16, 15, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 4, 12, 16, 16, 1, 16, 16, 16, 16, 16, 1, 9, 16, 16, 1, 16, 1, 9, 16, 16, 16, 16, 16, 15, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 4, 12, 12, 12 ]
[ "It", "appears", "that", "the", "attackers", "are", "somewhat", "familiar", "with", "the", "language", "and", "mountain-trekking", "culture", "of", "the", "targets", "–", "the", "meaning", "of", "“", "chuli", "”", "is", "“", "summit", "”", ":", "The", "command-and-control", "server", "and", "parameters", "can", "be", "easily", "seen", "in", "the", "decompiled", "source", "code", ":", "Command", "and", "control", "server", "interaction", "code", "Throughout", "the", "code", ",", "the", "attackers", "log", "all", "important", "actions", ",", "which", "include", "various", "messages", "in", "Chinese", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Everything", "started", "from", "a", "well", "edited", "Italian", "language", "email", "given", "to", "me", "from", "a", "colleague", "of", "mine,", "thank", "you", "Luca!", "reaching", "out", "many", "Italian", "companies." ]
[ 16, 16, 16, 16, 1, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12 ]
[ "BEBLOH", "is", "a", "banking", "Trojan", "that", "has", "been", "around", "since", "as", "early", "as", "2009." ]
[ 3, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 0, 8, 8 ]
[ "The", "actor", "utilizes", "spear", "phishing", "campaigns", "to", "deliver", "NetTraveler,", "also", "known", "as", "TravNet." ]
[ 16, 6, 16, 6, 14, 14, 16, 16, 3, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.PcClient.409260", "Trojan.Pincav.9356", "Backdoor.PcClient.Win32.5", "Backdoor/PcClient.alqk", "Trojan.Buzy.D10B5", "W32/Backdoor.MMJP-0040", "Backdoor.Trojan", "Trojan.Win32.PcClient.ihgd", "Trojan.MulDrop3.45818", "Backdoor.Win32.PcClient", "W32/Backdoor2.FUIH", "Trojan:Win32/Wisp.A", "BDS/Pcclient.alqk", "Trojan[Backdoor]/Win32.PcClient", "Backdoor.Win32.A.PcClient.386732", "Trojan/Win32.PcClient.R55121", "Backdoor.PcClient", "Backdoor.PcClient!4LPCxDv4AHg", "Win32/Backdoor.851" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Gustuff", "advertising", "screenshot", "The", "companies", "advertised", "in", "the", "image", "above", "were", "from", "Australia", ",", "which", "matches", "up", "with", "the", "campaign", "we", "researched", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Mauvaise.SL1", "BehavesLike.Win64.MysticCompressor.ch", "Trojan:Win64/Jifcapi.A", "Win32/Trojan.03e" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.PWS.Steam.12700", "BehavesLike.Win32.Trojan.bc", "TR/Dropper.MSIL.dhgqe", "Spyware.AzorUlt", "Trj/GdSda.A", "Trojan.MSIL.Krypt", "MSIL/Kryptik.MPY!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Those", "are", "not", "the", "only", "system", "functions", "Triada", "modifies", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.AlustinH.Trojan", "Trojan.Diacam.KL3", "Trojan.VB.Win32.96905", "Trojan/VB.qms", "TROJ_DIACAM_BK0846C6.TOMC", "Win32.Trojan.WisdomEyes.16070401.9500.9992", "TROJ_DIACAM_BK0846C6.TOMC", "Win.Trojan.Mokes-11", "Trojan.Win32.Dwn.coomze", "TrojWare.Win32.VB.QMS", "Trojan.DownLoader6.45576", "Trojan/Jorik.glae", "Trojan/Win32.Mokes", "Trojan:Win32/Diacam.A", "Trojan.Symmi.D23C3", "Win32.Trojan.VB.BE", "Trojan/Win32.VBKrypt.C161437", "Trojan.Mokes", "Win32/VB.QMS", "Win32.VBCrypt", "W32/VBKrypt.MBSX!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Packed.16", "Win32/Pigeon.AZTT", "Win.Trojan.Packed-77", "Backdoor.Win32.Hupigon.oqk", "Trojan.Win32.Crypt.mkur", "Backdoor.Win32.Hupigon.412672.K", "Win32.Backdoor.Hupigon.cuda", "Packed.Win32.Klone.~KMF", "BackDoor.Pigeon.20533", "Backdoor.Hupigon.Win32.100099", "BehavesLike.Win32.Fujacks.fc", "Backdoor/Hupigon.af", "Win32.Troj.Klone.ab.389660", "Trojan/Win32.Malpacked5.R134022", "Trojan-Dropper.Kaos", "Trojan.Win32.Pincav" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "some", "cases,", "it", "appeared", "to", "be", "a", "single", "use", "domain", "shadowing", "which", "is", "incredibly", "difficult", "to", "stop", "by", "using", "blacklisting." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Heur.VP.ED105D0", "Win32.Trojan.WisdomEyes.16070401.9500.9911", "Trojan.MulDrop4.19536", "BehavesLike.Win32.VBObfus.nt", "TR/Spy.36864.1691", "Win32/VB.OIX" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "Since", "our", "first", "published", "analysis", "of", "the", "OilRig", "campaign", "in", "May", "2016", "Unit42", "has", "continued", "to", "monitor", "this", "group", "for", "new", "activity." ]
[ 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 0, 8, 4, 16, 16, 16, 16, 16, 6, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper.Win32.Dapato!O", "Trojan.Symmi.D6404", "Win32.Trojan.WisdomEyes.16070401.9500.9991", "Trojan-Dropper.Win32.Dapato.buqu", "Trojan.Win32.Dapato.bcmajb", "Trojan.DownLoader7.19485", "BehavesLike.Win32.BadFile.mm", "W32/Trojan.IAVK-8796", "TrojanDropper.Dapato.mbp", "TR/Dapato.AG", "Win32.Troj.Dapato.bu.kcloud", "Trojan:Win32/Omdork.A", "Trojan-Dropper.Win32.Dapato.buqu", "Trojan/Win32.Inject.R46970", "Trojan.Win32.Swisyn", "W32/Dapato.B!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "More", "and", "more", "we've", "been", "seeing", "references", "to", "a", "malware", "family", "known", "as", "FormBook." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 3 ]
[ "]", "net", ",", "negg1.ddns", "[", "." ]
[ 9, 9, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAdware.6632", "PUP.Optional.Nosibay", "TROJ_GE.FF4D51A5", "Adware.Downware.11318", "virus.win32.sality.at", "PUA/BubbleDock.A", "PUP.Nosibay/Variant", "NSIS.Application.SilentInstaller.A", "Win32.Trojan.Bubbledock.Huzb" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "As", "soon", "as", "the", "user", "picks", "up", "the", "device", ",", "the", "implant", "will", "detect", "a", "motion", "event", "and", "execute", "the", "“", "tk1", "”", "and", "“", "input", "keyevent", "3", "”", "commands", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Anti-emulator", "code", "." ]
[ 16, 16, 16 ]
[ "Several", "days", "ago", ",", "the", "e-mail", "account", "of", "a", "high-profile", "Tibetan", "activist", "was", "hacked", "and", "used", "to", "send", "targeted", "attacks", "to", "other", "activists", "and", "human", "rights", "advocates", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "These", "apps", "are", "not", "hosted", "inside", "the", "Google", "Play", "store,", "but", "are", "distributed", "via", "third", "party", "distribution", "mechanisms", "in", "China." ]
[ 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 2 ]