tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"The",
"operation",
"is",
"very",
"quick",
"and",
"quiet."
] | [
16,
16,
16,
16,
16,
16,
16
] |
[
"EXECUTIVE",
"SUMMARY",
"Cisco",
"Talos",
"has",
"discovered",
"a",
"new",
"Android",
"malware",
"based",
"on",
"a",
"leak",
"of",
"the",
"DenDroid",
"malware",
"family",
"."
] | [
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16
] |
[
"Bedep",
"was",
"known",
"to",
"be",
"the",
"notorious",
"ad",
"fraud",
"malware",
"and",
"vawtrak",
"is",
"a",
"banking",
"trojan",
"following",
"the",
"success",
"of",
"Zeus."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
3,
16,
16,
3,
11,
16,
16,
16,
16,
3
] |
[
"So",
"far,",
"the",
"malware",
"primarily",
"affects",
"iOS",
"users",
"in",
"mainland",
"China",
"and",
"Taiwan."
] | [
16,
16,
16,
3,
16,
16,
4,
12,
16,
2,
10,
16,
2
] |
[
"A",
"Trojan",
"for",
"Linux",
"that",
"was",
"named",
"Linux.Mirai",
"has",
"several",
"predecessors."
] | [
16,
11,
16,
5,
16,
16,
16,
1,
16,
16,
16
] |
[
"This",
"spambot,",
"commonly",
"downloaded",
"by",
"the",
"Andromeda",
"malware,",
"has",
"been",
"observed",
"delivering",
"pharmaceutical",
"industry",
"spam",
"as",
"well",
"as",
"further",
"propagating",
"the",
"main",
"Andromeda",
"bot."
] | [
16,
3,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
4,
12,
1,
16,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win32.Delf!O",
"Backdoor.Delf.Win32.12791",
"W32/Backdoor.ZRKL-8278",
"Backdoor.Trojan",
"Trojan.Win32.Delf.iuqg",
"Win32.Backdoor.Delf.Sxnw",
"Trojan.PWS.Banker.26677",
"Trojan-Spy.Banker",
"W32/Backdoor2.CTBF",
"Backdoor/Delf.hfo",
"Trojan[Backdoor]/Win32.Delf",
"Trojan:Win32/Braba.D",
"Trojan.UserStartup.EB690C",
"Trojan/Win32.Delf.R104794",
"TScope.Trojan.Delf"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Application.Downloader.ALJ",
"Pua.Downloader",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Application.Downloader.ALJ",
"Application.Downloader.ALJ",
"Trojan.Win32.Z.Downloader.179560",
"Application.Downloader.ALJ",
"BehavesLike.Win32.Downloader.ch",
"Application.Downloader.ALJ",
"Application.Downloader.Alj!c",
"Trj/CI.A",
"Win32/Application.Downloader.dad"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Ransom.Win32.Foreign!O",
"Trojan.Foreign",
"Win32.Trojan.WisdomEyes.16070401.9500.9823",
"Win32/Ransom.ANJ",
"Ransom_Foreign.R039C0DKF17",
"Trojan-Ransom.Win32.Foreign.wy",
"Troj.Ransom.W32!c",
"Win32.Trojan.Foreign.Wqdm",
"Trojan.DownLoad2.55226",
"Trojan.Foreign.Win32.208",
"Ransom_Foreign.R039C0DKF17",
"BehavesLike.Win32.Dropper.cc",
"Trojan.Foreign.ays",
"Trojan[Ransom]/Win32.Foreign",
"Trojan.Graftor.D35EB",
"Trojan.Win32.A.Foreign.142848[UPX]",
"Trojan-Ransom.Win32.Foreign.wy",
"Trojan:Win32/Ransirac.A",
"Trojan/Win32.Foreign.R20679",
"Hoax.Foreign",
"Trojan.Foreign!cDyTfOA7GhM",
"Win32/Trojan.7b3"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win32.Trojan.Spy.Eawf",
"BehavesLike.Win32.Trojan.qm",
"W32/Trojan.NEXM-1236",
"Trojan.MSILKrypt.4",
"TrojanSpy:MSIL/Fitin.A",
"Trojan.MSIL.Spy",
"Trj/GdSda.A",
"Win32/Trojan.948"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Scarcruft",
"Group",
"aka",
"APT37,",
"a",
"North",
"Korean",
"APT",
"group,",
"is",
"believed",
"to",
"have",
"been",
"active",
"since",
"2016",
"and",
"continues",
"to",
"carry",
"out",
"attacks",
"against",
"institutions",
"and",
"political",
"organizations",
"around",
"the",
"world",
"until",
"2023."
] | [
6,
14,
14,
16,
6,
16,
6,
14,
14,
14,
16,
16,
16,
16,
16,
16,
16,
0,
16,
16,
16,
16,
16,
1,
16,
4,
16,
4,
12,
16,
16,
16,
16,
0
] |
[
"Further",
"details",
"in",
"it",
"reflect",
"characteristics",
"of",
"Exodus",
"(",
"such",
"as",
"the",
"bypass",
"of",
"power",
"managers",
"we",
"described",
"from",
"Exodus",
"One",
",",
"and",
"more",
")",
":",
"Indicators",
"of",
"Compromise",
"Exodus",
"One",
"011b6bcebd543d4eb227e840f04e188fb01f2335b0b81684b60e6b45388d3820",
"0f5f1409b1ebbee4aa837d20479732e11399d37f05b47b5359dc53a4001314e5",
"2055584625d24687bd027a63bc0b8faa7d1a854a535de74afba24840a52b1d2f",
"26fef238028ee4b5b8da631c77bfb44ada3d5db8129c45dea5df6a51c9ea5f55",
"33a9da16d096426c82f150e39fc4f9172677885cfeaedcff10c86414e88be802",
"34d000ee1e36efd10eb37e2b79d69249d5a85682a61390a89a1b9391c46bf2ba",
"4f6146956b50ae3a6e80a1c1f771dba848ba677064eb0e166df5804ac2766898",
"5db49122d866967295874ab2c1ce23a7cde50212ff044bbea1da9b49bb9bc149",
"70e2eea5609c6954c61f2e5e0a3aea832d0643df93d18d7d78b6f9444dcceef0",
"80810a8ec9624f317f832ac2e212dba033212258285344661e5da11b0d9f0b62",
"8453ce501fee1ca8a321f16b09969c517f92a24b058ac5b54549eabd58bf1884",
"a37f5d2418c5f2f64d06ba28fe62edee1293a56158ddfa9f04020e316054363f",
"db59407f72666526fca23d31e3b4c5df86f25eff178e17221219216c6975c63f",
"e0acbb0d7e55fb67e550a6bf5cf5c499a9960eaf5f037b785f9004585202593b",
"Exodus",
"One",
"Package",
"Names",
"com.phonecarrier.linecheck",
"rm.rf",
"operatore.italia",
"it.offertetelefonicheperte",
"it.servizipremium",
"assistenza.sim",
"assistenza.linea.riattiva",
"assistenza.linea",
"it.promofferte",
"Exodus",
"Two",
"64c11fdb317d6b7c9930e639f55863df592f23f3c7c861ddd97048891a90c64b",
"a42a05bf9b412cd84ea92b166d790e8e72f1d01764f93b05ace62237fbabe40e",
"Exodus",
"Two",
"ELF",
"Utilities",
"00c787c0c0bc26caf623e66373a5aaa1b913b9caee1f34580bdfdd21954b7cc4",
"11499ff2418f4523344de81a447f6786fdba4982057d4114f64db929990b4b59",
"13ec6cec511297ac3137cf7d6e4a7c4f5dd2b24478a06262a44f13a3d61070b6",
"3c9f08b3280851f54414dfa5a57f40d3b7be7b73736fa0ba21b078e75ce54d33",
"3ee3a973c62ba5bd9eab595a7c94b7a26827c5fa5b21964d511ab58903929ec5",
"47449a612697ad99a6fbd6e02a84e957557371151f2b034a411ebb10496648c8",
"48a7dd672931e408662d2b5e1abcd6ef00097b8ffe3814f0d2799dd6fd74bd88",
"824ad333320cbb7873dc49e61c14f749b0e0d88723635524463f2e6f56ea133a",
"b46f282f9a1bce3798faee3212e28924730a657eb93cda3824c449868b6ee2e7",
"c228a534535b22a316a97908595a2d793d0fecabadc32846c6d1bfb08ca9a658",
"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"e3f65f84dd6c2c3a5a653a3788d78920c0321526062a6b53daaf23fa57778a5f",
"Command",
"&",
"Controls",
"ad1.fbsba",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
3,
11,
16,
16,
1,
9,
1,
9,
1,
1,
1,
1,
1,
3,
11,
1,
1,
3,
11,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
16,
16,
16,
1,
9,
9
] |
[
"FakeSpy",
"is",
"under",
"active",
"development",
"and",
"is",
"evolving",
"rapidly",
";",
"new",
"versions",
"are",
"released",
"every",
"week",
"with",
"additional",
"evasion",
"techniques",
"and",
"capabilities",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"LOWBALL",
"abuses",
"the",
"Dropbox",
"cloud",
"storage",
"service",
"for",
"command",
"and",
"control",
"CnC."
] | [
3,
16,
16,
7,
15,
15,
15,
16,
1,
9,
9,
9
] |
[
"Malware",
"data",
"leak",
"When",
"we",
"analyzed",
"the",
"sample",
",",
"we",
"realized",
"that",
"the",
"malware",
"operators",
"left",
"the",
"remote",
"database",
"with",
"some",
"of",
"the",
"victims",
"β",
"data",
"freely",
"accessible",
",",
"without",
"any",
"authentication",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"initial",
"infection",
"vector",
"in",
"this",
"attack",
"is",
"not",
"clear,",
"but",
"it",
"results",
"in",
"installing",
"the",
"Downeks",
"downloader,",
"which",
"in",
"turn",
"infects",
"the",
"victim",
"computer",
"with",
"the",
"Quasar",
"RAT."
] | [
16,
16,
1,
9,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
5,
16,
3,
11,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dropper.NSIS",
"Trojan.Zbot.Win32.160494",
"Win32.Trojan.WisdomEyes.16070401.9500.9957",
"TROJ_SPNR.15AE15",
"Trojan-Spy.Win32.Zbot.sbfu",
"Trojan.Win32.Zbot.dtpiom",
"TrojWare.Win32.CnzzBot.DAQ",
"Trojan.Fakealert.47485",
"TROJ_SPNR.15AE15",
"Trojan[Spy]/Win32.Zbot.sbfu",
"Trojan-Spy.Win32.Zbot.sbfu",
"TrojanSpy.Zbot",
"W32/CnzzBot.A!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.OnGameXEA.Trojan",
"Trojan.Dropper.TJD",
"Trojan.Dropper.TJD",
"Trojan.Dropper.TJD",
"Win32.Trojan.WisdomEyes.16070401.9500.9991",
"W32/Dropper.AYXX",
"Trojan.Dropper.TJD",
"Worm.Win32.AutoRun.gpog",
"Trojan.Dropper.TJD",
"Trojan.Dropper.TJD",
"Trojan.Win32.Wimpixo",
"Trojan:Win32/Wimpixo.B",
"Trojan:Win32/Wimpixo.B",
"Worm.Win32.AutoRun.gpog",
"BScope.Trojan-Spy.Zbot"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-GameThief.Win32.OnLineGames!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9995",
"Win.Trojan.Mono-15",
"Trojan.Win32.OnLineGames.fcdid",
"TrojWare.Win32.TrojanSpy.Pophot.d",
"Trojan.PWS.Gamania.5803",
"BehavesLike.Win32.Ransom.lc",
"Trojan/PSW.OnLineGames.kdn",
"Win32.Hack.UpackT.a.15981",
"Trojan.Graftor.Elzob.D185D",
"Troj.Heur.bmLerbcan7diu.moF3",
"Trj/Pupack.A",
"Trojan.Win32.PSW",
"Win32/Trojan.d9e"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"CONNECTION",
"TO",
"CHINA",
"Chinese",
"server",
"infrastructure",
":",
"FakeSpy",
"applications",
"send",
"stolen",
"information",
"to",
"C2",
"domains",
"with",
".club",
"TLDs",
"and",
"URLs",
"ending",
"with",
"/servlet/",
"[",
"C2",
"Command",
"]",
"(",
"mentioned",
"above",
"in",
"the",
"β",
"Stealing",
"Sensitive",
"Information",
"β",
"section",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
1,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Elzob!O",
"Trojan.Crastic.B",
"Trojan.Heur.BmGfrb243Kiib",
"W32.Imaut",
"Trojan.Win32.Popuper.bfzygk",
"Trojan.Popuper.42424",
"W32.Infostealer.Zeus",
"HEUR/Fakon.mwf"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Trojan.NFEP-4133",
"Trojan.DownLoader9.29630",
"DDoS:MSIL/Webxahr.A",
"DDoS.MSIL.Webxahr",
"W32/DoSAttack.C!tr",
"Win32/RootKit.Rootkit.7e5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Clicking",
"the",
"SMS",
"link",
"brings",
"the",
"user",
"to",
"a",
"fake",
"website",
"that",
"prompts",
"them",
"to",
"download",
"and",
"install",
"the",
"FakeSpy",
"APK",
",",
"which",
"is",
"masquerading",
"as",
"a",
"local",
"postal",
"service",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Dridex",
"has",
"evolved,",
"and",
"now",
"Dridex",
"V4",
"uses",
"Atom",
"Bombing",
"to",
"perform",
"process",
"injection."
] | [
3,
16,
16,
16,
16,
3,
11,
16,
1,
9,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Exploit.Vb.R",
"Exploit.Vb",
"Exploit.VB.Win32.18",
"Trojan.Exploit.Vb.R",
"Win32/Exploit.VB.R",
"TROJ_VB.JUC",
"Trojan.Exploit.Vb.R",
"Exploit.Win32.VB.r",
"Trojan.Exploit.Vb.R",
"Exploit.W32.VB.r!c",
"Trojan.Exploit.Vb.R",
"Trojan.Exploit.Vb.R",
"Trojan.Win32.Exploit",
"Hacktool.SQL.54NB.a",
"TR/Expl.VB.R",
"Trojan[Exploit]/Win32.VB",
"HackTool:Win32/Echoload.A",
"Exploit.Win32.VB.r",
"Trojan.Exploit.Vb.R",
"Exploit.VB",
"Win32.Exploit.Vb.Wsjr",
"Exploit.VB!P1jmyBXhN28",
"W32/VB.R!exploit",
"Win32/Trojan.2ff"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"second",
"parameter",
"is",
"a",
"constant",
"string",
"β",
"POST",
"β",
",",
"and",
"the",
"third",
"parameter",
"is",
"a",
"series",
"of",
"key-value",
"pairs",
"to",
"be",
"sent",
",",
"assembled",
"at",
"runtime",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"To",
"get",
"around",
"this",
"challenge",
",",
"TrickMo",
"β",
"s",
"developers",
"added",
"some",
"new",
"features",
"to",
"steal",
"TANs",
"using",
"screen",
"video",
"recording",
"and",
"screen",
"data",
"scraping",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Winter",
"Vivern",
"Advanced",
"Persistent",
"Threat",
"APT",
"is",
"a",
"pro-Russian",
"cyber-espionage",
"group",
"that",
"targets",
"government",
"and",
"private",
"businesses,",
"including",
"those",
"involved",
"in",
"the",
"ongoing",
"war",
"in",
"Ukraine."
] | [
6,
14,
14,
14,
14,
14,
14,
16,
6,
14,
14,
14,
15,
16,
4,
16,
4,
12,
16,
16,
16,
16,
16,
16,
4,
16,
2
] |
[
"One",
"of",
"the",
"command",
"and",
"control",
"C2",
"servers",
"that",
"had",
"been",
"dormant",
"for",
"quite",
"some",
"time",
"had",
"suddenly",
"woken",
"up",
"and",
"started",
"distributing",
"what",
"looks",
"to",
"be",
"a",
"new",
"PoS",
"malware",
"family",
"we're",
"calling",
"LockPoS."
] | [
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
11,
16,
16,
3
] |
[
"These",
"stores",
"are",
"an",
"attractive",
"alternative",
"to",
"Google",
"Play",
"because",
"many",
"of",
"their",
"apps",
"are",
"free",
",",
"or",
"offer",
"free",
"versions",
"of",
"paid",
"apps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Check",
"if",
"chat",
"apps",
"are",
"running",
"In",
"the",
"above",
"example",
",",
"the",
"malware",
"is",
"searching",
"for",
"Line",
",",
"Facebook",
"Messenger",
"and",
"WhatsApp",
"activities",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
5,
16,
16
] |
[
"Geopolitical",
"analysts",
"have",
"suggested",
"that",
"the",
"United",
"States",
"may",
"have",
"its",
"own",
"interests",
"that",
"involve",
"thwarting",
"Chinese",
"ambitions",
"in",
"the",
"region."
] | [
4,
12,
16,
16,
16,
16,
2,
10,
16,
16,
16,
16,
16,
15,
16,
16,
4,
12,
16,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Kryptik.kqs",
"Win32.Trojan.WisdomEyes.16070401.9500.9996",
"Tool.PassView.1838",
"Trojan.Kryptik.Win32.1246441",
"Worm.MSIL.Autorun",
"Trojan.MSIL.Bladabindi.1",
"Trojan.MSIL.DOTHETUK",
"Trj/CI.A",
"Win32/Trojan.62b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.DarkKomet.Win32.23088",
"Trojan.Strictor.DF4F5",
"Win32.Trojan.WisdomEyes.16070401.9500.9970",
"Trojan.Win32.Zbot.deisvu",
"Trojan.Hottrend.435",
"TR/Dropper.xzclg",
"Trojan[Backdoor]/Win32.DarkKomet",
"Trojan:Win32/Rombertik.C",
"Backdoor.DarkKomet",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Ocna",
"Trojan.Win32.Ocna.k",
"Trojan.OcnaCRTD.Win32.4895",
"TR/RemoteAdmin.tkpmq",
"TrojanDropper:Win32/Jowbaki.A",
"Trojan.Win32.Ocna.k",
"Trojan.Ocna",
"Trj/CI.A",
"Win32/RA-based.AB",
"Win32.Trojan.Ocna.Pgmm",
"Win32/Trojan.388"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"dates",
"on",
"the",
"β",
"x",
"β",
"axis",
"show",
"the",
"dates",
"when",
"we",
"first",
"saw",
"these",
"apps",
"in",
"the",
"wild",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"I",
"started",
"by",
"trying",
"to",
"find",
"the",
"sample",
"that",
"the",
"blog",
"post",
"analyzed",
"and",
"I",
"was",
"able",
"to",
"find",
"it",
"submitted",
"to",
"the",
"great",
"sandboxing",
"site",
"of",
"Hybrid",
"Analysis",
"Big",
"Shutout",
"to",
"@PayloadSecurity",
"for",
"the",
"great",
"service."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
4,
12,
16,
16,
16,
4,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.ScriptKD.4274",
"Trojan.ScriptKD.4274",
"Trojan/Remtasu.f",
"Win32.Trojan.WisdomEyes.16070401.9500.9859",
"W32/Trojan.QQOQ-8191",
"Trojan.ScriptKD.4274",
"Trojan.ScriptKD.4274",
"BehavesLike.Win32.Trojan.wc",
"W64/Coinminer.N",
"Trojan/Win32.Swisyn",
"Trojan.ScriptKD.D10B2",
"Win32/CoinMiner.AFZ"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"malware",
"encrypts",
"files",
"and",
"the",
"boot",
"record",
"of",
"hard",
"disks,",
"leaving",
"behind",
"a",
"ransomware",
"note."
] | [
16,
3,
1,
9,
16,
16,
1,
9,
9,
9,
9,
16,
16,
16,
3,
1
] |
[
"This",
"is",
"done",
"by",
"opening",
"the",
"Google",
"account",
"creation",
"process",
"and",
"parsing",
"the",
"current",
"view",
"."
] | [
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.EquationDrug",
"Troj.W32.Equationdrug!c",
"Win32.Trojan.WisdomEyes.16070401.9500.9689",
"Trojan.Win32.EquationDrug.evztli",
"Trojan.Win32.Z.Equationdrug.102912",
"Trojan.EquationDrug.85",
"W32/Trojan.DLSV-8631",
"W32.Trojan.Equdrug",
"TR/Dropper.bkecf",
"Trojan/Win32.EquationDrug",
"Trojan.EquationDrug.4",
"Trj/GdSda.A",
"Win32.Trojan.Equationdrug.Pgmi",
"Trojan.EquationDrug!",
"Trojan.Win32.Equdrug",
"Win32/Trojan.6ba"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"February,",
"the",
"source",
"code",
"was",
"reportedly",
"leaked",
"online,",
"which",
"likely",
"spurred",
"some",
"of",
"the",
"recent",
"changes",
"we've",
"observed",
"in",
"the",
"kit."
] | [
16,
0,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9872",
"Bloodhound.Malautoit",
"TR/AD.DelfInject.twazy",
"Trojan:Win32/Regub.A",
"Zum.Locky.1",
"Zum.Locky.1",
"Zum.Locky.1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Cossta.icp",
"Trojan.Mikey.D12734",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win.Trojan.Banker-13888",
"Virus.Win32.Lamer.kh",
"Trojan.Win32.A.Cossta.65536.D",
"Win32.Trojan.Cossta.bwce",
"Trojan.DownLoader4.46980",
"BehavesLike.Win32.Downloader.ch",
"Trojan/Cossta.bii",
"Trojan/Win32.Cossta",
"Win32.RabbitTail.b.2098552",
"Virus.Win32.Lamer.kh",
"Trojan/Win32.Cossta.R23559",
"Trojan.Cossta",
"Trojan.Win32.Cossta",
"Win32/Trojan.ed9"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"allowed",
"NoMoreRansom",
"to",
"gain",
"access",
"to",
"many",
"of",
"the",
"decryption",
"keys",
"for",
"the",
"ransomware",
"s",
"victims."
] | [
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
3,
16,
4
] |
[
"To",
"date,",
"Sowbug",
"appears",
"to",
"be",
"focused",
"mainly",
"on",
"government",
"entities",
"in",
"South",
"America",
"and",
"Southeast",
"Asia",
"and",
"has",
"infiltrated",
"organizations",
"in",
"Argentina,",
"Brazil,",
"Ecuador,",
"Peru,",
"Brunei",
"and",
"Malaysia."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
4,
16,
16,
2,
10,
16,
2,
10,
16,
16,
16,
4,
16,
2,
10,
10,
10,
10,
16,
2
] |
[
"Recently,",
"Palo",
"Alto",
"Networks",
"researchers",
"discovered",
"an",
"advanced",
"Android",
"malware",
"we've",
"named",
"SpyDealer",
"which",
"exfiltrates",
"private",
"data",
"from",
"more",
"than",
"40",
"apps",
"and",
"steals",
"sensitive",
"messages",
"from",
"communication",
"apps",
"by",
"abusing",
"the",
"Android",
"accessibility",
"service",
"feature."
] | [
16,
4,
12,
12,
12,
16,
16,
3,
11,
11,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
5,
16,
7,
15,
15,
15,
15,
15
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Hoax.Win32.ArchSMS!O",
"Trojan.ArchSMS.Win32.178",
"Win32/FakeInstall.BH",
"Win.Trojan.Archsms-882",
"HEUR:Hoax.Win32.ArchSMS.HEUR",
"Riskware.Win32.ArchSMS.dqovc",
"ApplicUnwnt.Win32.Hoax.ArchSMS.E",
"Tool.SMSSend.117",
"Trojan-Banker.Win32.Banbra",
"TR/Zen.C",
"HackTool[Hoax]/Win32.ArchSMS",
"Win32.Troj.Hoax.kcloud",
"Trojan:Win32/Moxtrarch.A",
"HEUR:Hoax.Win32.ArchSMS.HEUR",
"Adware.VPets.121105",
"Hoax.ArchSMS!DSd5P3jaerI",
"W32/ArchSMS.EF!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Rilide",
"stealer",
"is",
"a",
"prime",
"example",
"of",
"the",
"increasing",
"sophistication",
"of",
"malicious",
"browser",
"extensions",
"and",
"the",
"dangers",
"they",
"pose."
] | [
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16
] |
[
"The",
"oldest",
"sample",
"we've",
"seen",
"up",
"to",
"now",
"is",
"from",
"November",
"2013."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
0,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Hacktool.Koobface",
"Win32/Koobface.AKJ",
"Trojan.Win32.Facebfr.cvvcfx",
"Tool.Facebfr",
"BehavesLike.Win32.Swisyn.kh",
"SPR/HackFacebo.A",
"Trojan.Kazy.DA8A0"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Winupnemsys.Trojan",
"Worm.Win32.Mefir!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"W32.SillyFDC",
"Win32/Mefir.A",
"Win.Worm.Autorun-316",
"Worm.Win32.Mefir.a",
"Trojan.Win32.MLW.uvszt",
"Worm.Win32.A.Mefir.143360",
"Win32.Virus.Mefir.Ectu",
"Worm.Win32.Mefir.B",
"Win32.HLLW.Autoruner.216",
"Worm.Mefir.Win32.3",
"Worm/Mefir.f",
"Worm:Win32/Mefir.A",
"Worm:Win32/Mefir.A",
"Worm.Win32.Mefir.a",
"W32/Mefir.A.worm",
"Worm.Mefir!BwUbuvfvViU",
"Worm.Win32.Mefir.a",
"Win32/Trojan.d06"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"the",
"recent",
"weeks,",
"various",
"anti-virus",
"vendors",
"and",
"security",
"researchers",
"published",
"blog",
"posts",
"on",
"this",
"threat,",
"presenting",
"their",
"analysis",
"and",
"findings."
] | [
16,
16,
16,
0,
16,
4,
12,
16,
4,
12,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Trojan",
"BKDR_MANGZAMEL.B",
"Trojan.Mangzamel.Win32.11",
"BKDR_MANGZAMEL.B",
"BDS/Vedratve.zgxnw",
"Backdoor:Win32/Vedratve.A!dha",
"Trj/CI.A",
"Win32/Backdoor.f40"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Based",
"on",
"our",
"culprit",
"β",
"s",
"email",
"address",
",",
"we",
"were",
"able",
"to",
"find",
"his",
"GitHub",
"repository",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Symmi.D13C10",
"Win32.Trojan.WisdomEyes.16070401.9500.9915",
"Trojan.Win32.Ekstak.ddqe",
"Trojan.Win32.Ekstak.exahds",
"Trojan.InstallCube.2631",
"PUA.ICLoader",
"Pua.Downloadmgr",
"Trojan:Win32/Spiltderp.A",
"Trojan.Win32.Ekstak.ddqe",
"Trojan/Win32.Ekstak.R217792",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Upload",
"data",
"was",
"queued",
"and",
"transmitted",
"via",
"HTTP",
"PUT",
"requests",
"to",
"an",
"endpoint",
"on",
"the",
"C2",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"19",
":",
"C",
"&",
"C",
"infrastructure",
"diagram",
"The",
"Infection",
"Landscape",
"β",
"Agent",
"Smith",
"β",
"droppers",
"show",
"a",
"very",
"greedy",
"infection",
"tactic",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Reusing",
"our",
"deobfuscation",
"tool",
"and",
"some",
"other",
"tricks",
",",
"we",
"have",
"been",
"able",
"to",
"reverse",
"and",
"analyze",
"these",
"opcodes",
"and",
"map",
"them",
"to",
"a",
"finite",
"list",
"that",
"can",
"be",
"used",
"later",
"to",
"automate",
"the",
"analysis",
"process",
"with",
"some",
"scripting",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"top/",
"Oct",
"23",
",",
"2017",
"hxxp",
":",
"//online.bankaustria.at.id8817465",
"[",
"."
] | [
9,
9,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Exp.OLE.CVE-2009-3129.A",
"Exploit.MSExcel.CVE-2009-3129.ccxskf",
"Exploit.Excel.CVE-2009-3129",
"Downloader.OLE.HiddenEXE",
"MSExcel/CVE_2009_3129.A!exploit",
"Win32/Trojan.Exploit.19f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"second",
"version",
"2.1-LNK",
"with",
"the",
"network",
"tag",
"StrangeLove",
"was",
"discovered",
"shortly",
"after."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
3,
16,
16,
16,
16
] |
[
"Appendix",
"Samples",
"Some",
"of",
"the",
"latest",
"Ginp",
"samples",
"found",
"in",
"the",
"wild",
":",
"App",
"name",
"Package",
"name",
"SHA-256",
"hash",
"Google",
"Play",
"Verificator",
"sing.guide.false",
"0ee075219a2dfde018f17561467272633821d19420c08cba14322cc3b93bb5d5",
"Google",
"Play",
"Verificator",
"park.rather.dance",
"087a3beea46f3d45649b7506073ef51c784036629ca78601a4593759b253d1b7",
"Adobe",
"Flash",
"Player",
"ethics.unknown.during",
"5ac6901b232c629bc246227b783867a0122f62f9e087ceb86d83d991e92dba2f",
"Adobe",
"Flash",
"Player",
"solution.rail.forward",
"7eb239cc86e80e6e1866e2b3a132b5af94a13d0d24f92068a6d2e66cfe5c2cea",
"Adobe",
"Flash",
"Player",
"com.pubhny.hekzhgjty",
"14a1b1dce69b742f7e258805594f07e0c5148b6963c12a8429d6e15ace3a503c",
"Adobe",
"Flash",
"Player",
"sentence.fancy.humble",
"78557094dbabecdc17fb0edb4e3a94bae184e97b1b92801e4f8eb0f0626d6212",
"Target",
"list",
"The",
"current",
"list",
"of",
"apps",
"observed",
"to",
"be",
"targeted",
"by",
"Ginp",
"contains",
"a",
"total",
"of",
"24",
"unique",
"applications",
"as",
"seen",
"below",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
1,
1,
5,
13,
13,
5,
1,
5,
13,
13,
1,
1,
5,
13,
13,
1,
1,
5,
13,
13,
1,
1,
5,
13,
13,
1,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"typically",
"see",
"techniques",
"at",
"this",
"level",
"by",
"well-resourced,",
"well-funded,",
"motivated",
"adversaries."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Additionally,",
"in",
"all",
"cases,",
"the",
"theft",
"took",
"place",
"using",
"normal",
"cash",
"withdrawals",
"from",
"various",
"ATM",
"terminal",
"locations",
"outside",
"the",
"bank's",
"originating",
"country."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"β",
"s",
"interesting",
"that",
"Triout",
",",
"which",
"is",
"detected",
"by",
"Bitdefender",
"β",
"s",
"machine",
"learning",
"algorithms",
",",
"was",
"first",
"submitted",
"from",
"Russia",
",",
"and",
"most",
"scans/reports",
"came",
"from",
"Israel",
"."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"These",
"improvements",
"render",
"FakeSpy",
"one",
"of",
"the",
"most",
"powerful",
"information",
"stealers",
"on",
"the",
"market",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"2013",
",",
"Kaspersky",
"Lab",
"mobile",
"products",
"prevented",
"2,500",
"infections",
"by",
"banking",
"Trojans",
"."
] | [
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Exploit-MSExcel.p",
"Trojan.Mdropper.AA",
"TROJ_MDROP.AH",
"Exploit.MSExcel.CVE-2008-0081.ccxsez",
"Exploit.Excel.1",
"TROJ_MDROP.AH",
"Exploit-MSExcel.p",
"EXP/Excel.CVE-2008-0081",
"MSExcel/UDDesc.A!exploit.M20080081",
"Win32/Trojan.Exploit.903"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"dropper",
"is",
"a",
"repacked",
"legitimate",
"application",
"which",
"contains",
"an",
"additional",
"piece",
"of",
"code",
"β",
"β",
"loader",
"β",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Heuristic.LooksLike.Trojan.Dropper.I",
"TrojanDropper:Win32/Datunif.A"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Emotet",
"TSPY_EMOTET.SMZD172",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TSPY_EMOTET.SMZD172",
"Trojan.Packed2.40646",
"Trojan.Dovs.Win32.2068",
"BehavesLike.Win32.Backdoor.ch",
"W32.Trojan.Emotet",
"Trojan:Win32/Emotet.R!bit",
"Trojan.Razy.D36CE4",
"Trojan/Win32.Emotet.R215266",
"Trojan.Win32.Emotet"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Additional",
"targets",
"have",
"included",
"journalists,",
"political",
"advisors,",
"and",
"organizations",
"associated",
"with",
"political",
"activism",
"in",
"central",
"Asia."
] | [
16,
16,
16,
16,
4,
12,
12,
16,
4,
16,
16,
4,
12,
16,
2,
10
] |
[
"However,",
"initial",
"static",
"analysis",
"revealed",
"that",
"all",
"of",
"these",
"samples",
"appear",
"to",
"be",
"identical",
"on",
"the",
"surface,",
"leading",
"us",
"to",
"believe",
"that",
"we",
"had",
"discovered",
"a",
"new",
"loader."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"has",
"been",
"active",
"for",
"around",
"one",
"month",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Some",
"of",
"the",
"apps",
"we",
"discovered",
"resided",
"on",
"Google",
"Play",
"for",
"several",
"years",
",",
"but",
"all",
"were",
"recently",
"updated",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Dvmap",
":",
"the",
"first",
"Android",
"malware",
"with",
"code",
"injection",
"08",
"JUN",
"2017",
"In",
"April",
"2017",
"we",
"started",
"observing",
"new",
"rooting",
"malware",
"being",
"distributed",
"through",
"the",
"Google",
"Play",
"Store",
"."
] | [
3,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Rimecud.1!O",
"Trojan.Rimecud.U",
"TROJ_RIMECUD.SMX",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TROJ_RIMECUD.SMX",
"Trojan.Win32.Fsysna.eqph",
"TrojWare.Win32.Kryptik.AMMN",
"BehavesLike.Win32.PWSZbot.ch",
"Virus.Win32.Cryptor",
"Ransom:Win32/Grymegat.A",
"Trojan.Kazy.D16E7F",
"Trojan.Win32.Fsysna.eqph",
"Trojan/Win32.Jorik.R40701",
"Trj/Rimecud.f",
"W32/Rimecud.GRC!tr",
"Win32/Trojan.801"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Exploit/W32.Nuker.203264",
"Exploit.Nuker",
"Tool.Vai.Win32.1",
"Exploit.W32.Nuker!c",
"W32/Trojan2.EKA",
"Win.Tool.W32-65",
"Exploit.Win32.Nuker.Vai.c",
"Exploit.Win32.Nuker-Vai.htmm",
"TrojWare.Win32.Nuker.Vai.C",
"FDOS.VTG.201",
"W32/Trojan.LISQ-8951",
"Nuke/Win32.Vai.c",
"Trojan:Win32/VAI.C",
"SPR/DDoS.ICMP.Vait10",
"Trojan[Exploit]/Win32.Nuker",
"Trojan:Win32/VAI.C",
"Exploit.Win32.Nuker.Vai.c",
"Nuker.Vai",
"Win32/Nuker.Vai.C",
"Win32.Exploit.Nuker.Efbk",
"W32/Nuker_Vai.C!tr",
"Win32/Trojan.Exploit.237"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"60",
"%",
"of",
"devices",
"containing",
"or",
"accessing",
"enterprise",
"data",
"are",
"mobile",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"These",
"malicious",
"Office",
"documents",
"are",
"being",
"spread",
"as",
"an",
"attachment",
"using",
"spear",
"phishing",
"emails",
"as",
"described",
"here."
] | [
16,
1,
9,
9,
16,
16,
16,
16,
16,
1,
16,
1,
9,
9,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.AutoIt.Pistolar.A",
"Worm.AutoIt.Win32.16752",
"Trojan.Heur.rmLfrvwRR2pib",
"TROJ_SPNR.03BL13",
"Win32.Trojan.AutoIt.a",
"TROJ_SPNR.03BL13",
"Trojan.KillFiles.61768",
"BehavesLike.Win32.VirRansom.dc",
"Troj.W32.Autoit.lWNh",
"HEUR/Fakon.mwf",
"Win32/Autoit.MB"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Infostealer.Limitail",
"Trojan.Win32.Sourtoff.dshygu",
"Trojan.Yakes.Win32.34007",
"BehavesLike.Win32.Backdoor.fc",
"Trojan/Injector.cbpj",
"Trojan.Win32.Boaxxe",
"TrojanDropper.Injector.awup",
"TR/Crypt.Xpack.8996",
"Trojan/Win32.Sourtoff",
"Trojan.Zboter.5",
"Trojan/Win32.Ransomcrypt.R151582",
"Trojan.Yakes",
"Trojan.Yakes!LiL7XolSsr0",
"Win32/Trojan.34b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"With",
"the",
"four",
"β",
"sms_send",
"β",
"commands",
",",
"the",
"messages",
"as",
"specified",
"in",
"the",
"key",
"β",
"text",
"β",
"will",
"be",
"sent",
"immediately",
"to",
"the",
"specified",
"short",
"numbers",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.AutoIt",
"Worm.AutoIt.Win32.13406",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Worm.Win32.AutoIt.qaw",
"Trojan.Win32.AutoIt.ewujea",
"W32.W.WBNA.lJwt",
"Trojan.MulDrop5.8834",
"BehavesLike.Win32.Trojan.cz",
"Worm.Win32.AutoRun",
"W32/Trojan.WOLP-1815",
"Worm/Win32.AutoIt",
"Worm:Win32/Selfita.A",
"Worm.Win32.AutoIt.qaw",
"Worm.AutoIt",
"Win32/AutoRun.VB.BEZ",
"Win32.Worm.Autoit.Pgmr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clodd7a.Trojan.d028",
"Trojan-Downloader/W32.Lemmy.65536.B",
"Downloader.Lemmy.Win32.31",
"Troj.Downloader.W32.Lemmy.u!c",
"Trojan/Downloader.Lemmy.q",
"W32/Lemmy.AO",
"Adware.Roimoi",
"Win32/TrojanDownloader.Lemmy.AA",
"TROJ_LEMMY.L",
"Win.Downloader.71376-1",
"Trojan-Downloader.Win32.Lemmy.u",
"Trojan.Win32.Lemmy.gugs",
"Trojan.Win32.Downloader.65536.IK[h]",
"TrojWare.Win32.TrojanDownloader.Lemmy.u0",
"Adware.MediaMotor.130",
"TROJ_LEMMY.L",
"BehavesLike.Win32.Trojan.kt",
"W32/Lemmy.RFEY-5815",
"TrojanDownloader.Lemmy.f",
"TR/Dldr.Lemmy.Q.2",
"W32/Dloader.X!tr",
"Trojan[Downloader]/Win32.Lemmy",
"Win32.Troj.Lemmy.o.kcloud",
"Trojan/Win32.HDC.C89215",
"TrojanDownloader:Win32/Lemmy.U",
"TScope.Trojan.VB",
"Win32.Trojan-downloader.Lemmy.Egoh",
"Trojan.DL.Lemmy!fetCOQguJic",
"Trojan-Downloader.Win32.Lemmy.q"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"WS.Reputation.1",
"PWS:Win32/Yaludle.D",
"Trojan-PWS.Win32.Yaludle"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"Manufacturers",
"should",
"be",
"keeping",
"close",
"tabs",
"on",
"what",
"software",
"ends",
"up",
"on",
"their",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"But",
"I",
"never",
"received",
"such",
"files",
"from",
"their",
"command",
"and",
"control",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Today,",
"we",
"noticed",
"CVE-2015-5119",
"the",
"identifier",
"for",
"this",
"vulnerability",
"being",
"used",
"in",
"a",
"rather",
"unusual",
"attack",
"pattern."
] | [
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom_Necne.R002C0DAU18",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Ransom_Necne.R002C0DAU18",
"Trojan.Win32.Filecoder.eximhz",
"Trojan.Win32.Z.Kelios.56320",
"Trojan.Encoder.24408",
"Trojan.Filecoder.Win32.7015",
"BehavesLike.Win32.Backdoor.qh",
"Trojan-Ransom.FileCoder",
"W32/Trojan.TPMK-1866",
"TR/AD.Petya.muyif",
"Ransom.Filecoder/Variant",
"Trojan.Encoder",
"Ransom.FileCryptor",
"Trj/GdSda.A",
"W32/Filecoder.FV!tr",
"Win32/Trojan.4af"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Everyday",
"users",
"can",
"do",
"the",
"same",
"by",
"checking",
"the",
"router",
"β",
"s",
"DNS",
"settings",
"if",
"they",
"β",
"ve",
"been",
"modified",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"the",
"attached",
"paper",
"we",
"will",
"focus",
"on",
"two",
"exploits",
"which",
"at",
"the",
"time",
"of",
"discovery",
"in",
"the",
"Hacking",
"Team",
"archives",
"were",
"unpatched."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
7
] |
[
"Apps",
"of",
"the",
"Android/AdDisplay.Ashas",
"family",
"reported",
"to",
"Google",
"by",
"ESET",
"Figure",
"2",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
4,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Mikey.DDFDA",
"Ransom_PETYA.SM2",
"Win32.Trojan.WisdomEyes.16070401.9500.9986",
"Ransom_PETYA.SM2",
"Trojan.Win32.AD.epiohw",
"BehavesLike.Win32.Ransom.cc",
"Ransom.Petya",
"Win32/Diskcoder.Petya.E",
"Trojan.Diskcoder!",
"Trojan-Ransom.GoldenEye",
"W32/Petya.E!tr.ransom"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Trojan-Downloader.MSIL.Small.vii",
"Trojan.Win32.Clicker.dckckw",
"Trojan[Downloader]/MSIL.Small",
"Win32.TrojDownloader.MSIL.kcloud",
"Trojan.Kazy.D17F7F",
"Trojan-Downloader.MSIL.Small.vii",
"Trojan:MSIL/Keywsec.B",
"Trojan.Clicker",
"Trojan.Keywsec!MUZFw6FSjt8",
"Win32/Trojan.419"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"205",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"During",
"the",
"last",
"weeks",
"there",
"have",
"been",
"several",
"cases",
"of",
"international",
"brand",
"names",
"being",
"used",
"by",
"malware",
"authors",
"to",
"propagate",
"malware",
"through",
"phishing",
"emails."
] | [
16,
16,
0,
8,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
6,
14,
16,
16,
3,
16,
1,
9
] |
[
"A",
"backdoor",
"targetting",
"Linux",
"also",
"known",
"as:",
"Exploit.Linux.Vmsplice.A",
"Exploit.Lotoor.Linux.131",
"HEUR:Exploit.Linux.Lotoor.bh",
"Exploit.Unix.Lotoor.exdfpk",
"Exploit.Linux.Lotoor!c",
"Linux.Exploit.Local.147",
"Exploit.Linux.auf",
"LINUX/Lotoor.qcvrg",
"Trojan[Exploit]/Linux.Lotoor.bh",
"HEUR:Exploit.Linux.Lotoor.bh",
"Linux.Exploit.Lotoor.Htmf",
"Trojan.Linux.Exploit",
"Linux/Vmsplice.K!tr"
] | [
16,
3,
16,
11,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"attackers",
"used",
"different",
"command",
"and",
"control",
"servers",
"C2s",
"for",
"each",
"malware",
"family,",
"a",
"tactic",
"we",
"believe",
"was",
"meant",
"to",
"thwart",
"attempts",
"to",
"tie",
"the",
"attacks",
"together",
"using",
"infrastructure",
"alone."
] | [
16,
6,
16,
16,
1,
9,
9,
9,
9,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
5,
16
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.