tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"This",
"new",
"version",
"comes",
"as",
"an",
"email",
"attachment",
"which",
"is",
"a",
"zip",
"inside",
"a",
"zip",
"before",
"extracting",
"to",
"a",
".js",
"file",
"in",
"a",
"fake",
"Delivery",
"Status",
"Notification,",
"failed",
"to",
"deliver",
"email",
"bounce",
"message."
] | [
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
1,
16,
16,
1,
16,
16,
16,
16,
1,
9,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9,
9
] |
[
"Attacks",
"using",
"BigBoss",
"appear",
"likely",
"to",
"have",
"occurred",
"since",
"mid-2015,",
"whereas",
"SillyGoose",
"appears",
"to",
"have",
"been",
"distributed",
"since",
"September",
"2016."
] | [
1,
16,
3,
16,
16,
16,
16,
16,
16,
0,
16,
3,
16,
16,
16,
16,
16,
16,
0,
8
] |
[
"The",
"first",
"method,",
"dubbed",
"proxy-changing",
"is",
"commonly",
"used",
"for",
"HTTP",
"packets",
"inspections."
] | [
16,
16,
16,
1,
9,
16,
16,
16,
11,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.LovGate.W@mm",
"W32.LovGate.W",
"Win32.LovGate.W@mm",
"Spyware.PasswordStealer",
"W32/Lovgate.W@M",
"Win32.LovGate.E8C19A",
"WORM_LOVGATE.BJ",
"Win32.Trojan.WisdomEyes.16070401.9500.9982",
"W32/Lovgate.W@mm",
"W32.HLLW.Lovgate.I@mm",
"Win32/Lovgate.AX",
"WORM_LOVGATE.BJ",
"Win.Worm.Lovgate-35",
"Win32.LovGate.W@mm",
"Trojan.Win32.MultiPacked.dgpeeo",
"Win32.Worm-email.Lovgate.Dwsv",
"Win32.HLLM.Lovgate.based",
"Worm.LovGate.Win32.79",
"BehavesLike.Win32.PWSZbot.cc",
"W32/Lovgate.W@mm",
"I-Worm/Supkp.a",
"WORM/Lovgate.BK",
"Worm[Email]/Win32.LovGate",
"Worm:Win32/Lovgate.W@mm",
"W32.W.LovGate.kYPD",
"Win32.LovGate.W@mm",
"Win32/LovGate.worm.179200",
"W32/Lovgate.w@M",
"Worm.Lovgate",
"I-Worm.Lovgate.AP",
"Win32/Lovgate.AP",
"I-Worm.Lovgate.BI",
"Worm.Win32.Lovgate",
"Win32.LovGate.W@mm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"During",
"installation",
",",
"Riltok",
"asks",
"the",
"user",
"for",
"permission",
"to",
"use",
"special",
"features",
"in",
"AccessibilityService",
"by",
"displaying",
"a",
"fake",
"warning",
":",
"If",
"the",
"user",
"ignores",
"or",
"declines",
"the",
"request",
",",
"the",
"window",
"keeps",
"opening",
"ad",
"infinitum",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"According",
"to",
"public",
"records",
"it",
"appears",
"that",
"eSurv",
"began",
"to",
"also",
"develop",
"intrusion",
"software",
"in",
"2016",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"20",
":",
"dropper",
"app",
"category",
"distribution",
"Among",
"the",
"vast",
"number",
"of",
"variants",
",",
"the",
"top",
"5",
"most",
"infectious",
"droppers",
"alone",
"have",
"been",
"downloaded",
"more",
"than",
"7.8",
"million",
"times",
"of",
"the",
"infection",
"operations",
"against",
"innocent",
"applications",
":",
"Figure",
"21",
":",
"Top",
"5",
"most",
"infectious",
"droppers",
"The",
"β",
"Agent",
"Smith",
"β",
"campaign",
"is",
"primarily",
"targeted",
"at",
"Indian",
"users",
",",
"who",
"represent",
"59",
"%",
"of",
"the",
"impacted",
"population",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Definition",
"of",
"populateConfigMap",
",",
"which",
"loads",
"the",
"map",
"with",
"values",
"Correlating",
"the",
"last",
"two",
"steps",
",",
"one",
"can",
"observe",
"that",
"the",
"malware",
"payload",
"receives",
"the",
"configuration",
"for",
"the",
"following",
"properties",
":",
"number",
"β",
"The",
"default",
"number",
"to",
"be",
"send",
"to",
"the",
"server",
"(",
"in",
"case",
"the",
"number",
"is",
"not",
"available",
"from",
"the",
"device",
")",
"api",
"β",
"The",
"API",
"key",
"url",
"β",
"The",
"URL",
"to",
"be",
"used",
"in",
"WebView",
"to",
"display",
"on",
"the",
"ransom",
"note",
"The",
"malware",
"saves",
"this",
"configuration",
"to",
"the",
"shared",
"preferences",
"of",
"the",
"app",
"data",
"and",
"then",
"it",
"sets",
"up",
"all",
"the",
"Broadcast",
"Receivers",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Trojan",
"may",
"download",
"and",
"execute",
"the",
"following",
"potentially",
"malicious",
"file:",
"%Temp%\\[RANDOM",
"CHARACTERS].dll"
] | [
16,
3,
16,
1,
9,
9,
16,
16,
16,
1,
9,
9,
9
] |
[
"When",
"a",
"victim",
"tries",
"to",
"access",
"the",
"URL",
"in",
"the",
"SMS",
"body",
",",
"the",
"C2",
"will",
"check",
"if",
"the",
"mobile",
"device",
"meets",
"the",
"criteria",
"to",
"receive",
"the",
"malware",
"(",
"see",
"infrastructure",
"section",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"means",
"that",
",",
"unless",
"victims",
"lock",
"their",
"devices",
"via",
"the",
"hardware",
"button",
",",
"the",
"timer",
"provides",
"plenty",
"of",
"time",
"for",
"the",
"malware",
"to",
"remotely",
"perform",
"malicious",
",",
"in-app",
"operations",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Code",
"to",
"check",
"the",
"existence",
"of",
"SafetyNet",
"Google",
"API",
"It",
"also",
"checks",
"if",
"the",
"Android",
"SafetyNet",
"is",
"active",
"and",
"reporting",
"back",
"to",
"the",
"C2",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"determined",
"that",
"this",
"chunk",
"of",
"data",
"contains",
"an",
"array",
"of",
"opcode",
"instructions",
"ready",
"to",
"be",
"interpreted",
"by",
"a",
"custom",
"virtual",
"machine",
"program",
"(",
"from",
"this",
"point",
"on",
"referenced",
"generically",
"as",
"β",
"VM",
"β",
")",
"implemented",
"by",
"FinFisher",
"authors",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16
] |
[
"Given",
"the",
"many",
"artifacts",
"we",
"discovered",
"in",
"the",
"malware",
"code",
",",
"as",
"well",
"as",
"infrastructure",
"analysis",
",",
"we",
"are",
"pretty",
"confident",
"that",
"the",
"developer",
"of",
"the",
"Skygofree",
"implants",
"is",
"an",
"Italian",
"IT",
"company",
"that",
"works",
"on",
"surveillance",
"solutions",
",",
"just",
"like",
"HackingTeam",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9711",
"Spyware.Keylogger",
"BehavesLike.Win32.Fake.lc",
"Trojan-Proxy.Win32.Glukelira",
"Trojan/Win32.Glukelira.R10186"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"MALWARE",
"TECHNICAL",
"DETAILS",
"During",
"our",
"investigation",
",",
"researchers",
"uncovered",
"a",
"malware",
"known",
"as",
"\"",
"Gustuff.",
"''",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAdware.909D",
"Downloader.AdloadCRT.Win32.596",
"Win.Trojan.Downloader-65968",
"not-a-virus:Downloader.Win32.AdLoad.rbbv",
"Trojan.Win32.AdLoad.dvwwyc",
"Adware.Downloadadmin.85624",
"Trojan.Vittalia.12437",
"not-a-virus:Downloader.DownloAdmin",
"Pua.Downloadmanager",
"RiskWare[Downloader]/Win32.AdLoad.rbbv",
"Trojan.Application.Bundler.DownloadAdmin.3",
"PUP.DownloadAdmin/Variant",
"not-a-virus:Downloader.Win32.AdLoad.rbbv",
"PUP/Win32.DownloadAdmin.R162593",
"Downloader.DownloAdmin",
"Trj/Downloader.WOL",
"Win32/Application.d3c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Inject",
"Trojan.Bublik.Win32.19217",
"W32/Trojan.NHBC-1750",
"BKDR_BMDOOR.SMZAEK-A",
"Trojan.Win32.Inject.wavu",
"Trojan.Win32.Androm.dlcdpz",
"Win32.Trojan.Inject.Duwc",
"BKDR_BMDOOR.SMZAEK-A",
"Trojan.Inject.gwc",
"Trojan/Win32.Inject",
"Trojan.Win32.Inject.wavu",
"Trojan.Inject",
"Trojan.Inject!zWOSv6fC2j0",
"Win32/Trojan.ae0"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Virus.Win32.Virut.1!O",
"Hacktool.Virledi",
"Win32.Worm.AutoRun.bz",
"W32/Virut.AI",
"PE_VIRUX.A-1",
"Worm.Win32.WBNA.roc",
"Virus.Win32.Virut.hpeg",
"Virus.Win32.Virut.CE",
"Win32.HLLW.Autoruner2.15607",
"PE_VIRUX.A-1",
"W32/Virut.AI",
"Win32/Virut.bt",
"Virus/Win32.Virut.ce",
"Worm:Win32/Virledi.A",
"Worm.Win32.WBNA.roc",
"Trojan/Win32.Zbot.C401270",
"Virus.Virut.06",
"Worm.AutoRun.FLD",
"Win32.Virut.E",
"Trojan-Downloader.Win32.VB",
"Trj/Dtcontx.M"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.ProxyChanger.144352",
"Trojan.ProxyChanger",
"Trojan/ProxyChanger.to",
"Win32.Trojan.WisdomEyes.16070401.9500.9857",
"Trojan.Win32.ProxyChanger.mx",
"Trojan.Win32.Z.Proxychanger.144352",
"Trojan.Proxy.27390",
"Trojan.ProxyChanger.Win32.985",
"Trojan.Win32.ProxyChanger",
"W32/Trojan.WVYD-3840",
"TrojanDownloader.Cabby.ug",
"TR/Crypt.ZPACK.137306",
"Trojan/Win32.ProxyChanger",
"Trojan.Win32.ProxyChanger.mx",
"Trojan:Win32/Tepoyx.K",
"Trojan/Win32.Cryptolocker.R145008",
"Trojan.ProxyChanger",
"Win32/ProxyChanger.TO",
"Trojan.ProxyChanger!ZhCr5dI6SeY",
"W32/Kryptik.DEQP!tr",
"Win32/Trojan.0f5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"company",
"develops",
"mobile",
"apps",
"for",
"both",
"Android",
"and",
"iOS",
"platforms",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Heur.GZ.E0D821",
"Ransom_Blocker.R004C0DK917",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Ransom_Blocker.R004C0DK917",
"Trojan-Ransom.Win32.Blocker.kklp",
"Backdoor.Win32.Zelug.ER",
"BehavesLike.Win32.BadFile.mt",
"TR/Barys.796",
"Trojan[Downloader]/Win32.Dapato",
"Backdoor:Win32/Zelug.B",
"Trojan-Ransom.Win32.Blocker.kklp",
"TScope.Malware-Cryptor.SB",
"W32/Dapato.A!tr.dldr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"For",
"now",
",",
"we",
"observe",
"only",
"one",
"payload",
"version",
"for",
"following",
"the",
"ARM",
"CPUs",
":",
"arm64-v8a",
",",
"armeabi",
",",
"armeabi-v7a",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
5,
16,
5,
16,
5,
16
] |
[
"The",
"backdoor",
"has",
"been",
"analyzed",
"previously",
"and",
"is",
"a",
"robust",
"tool",
"associated",
"with",
"this",
"group,",
"likely",
"being",
"used",
"as",
"an",
"early",
"stage",
"reconnaissance",
"tool."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"It",
"has",
"frequently",
"been",
"used",
"to",
"spread",
"cryptocurrency",
"mining",
"malware,",
"perhaps",
"indicating",
"an",
"evolution",
"towards",
"direct",
"monetization."
] | [
16,
16,
16,
16,
16,
16,
1,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16
] |
[
"Based",
"on",
"emails",
"leaked",
"in",
"the",
"dump",
",",
"a",
"number",
"of",
"Czech",
"firms",
"appear",
"to",
"be",
"in",
"business",
"with",
"the",
"Hacking",
"team",
",",
"including",
"a",
"major",
"IT",
"partner",
"in",
"the",
"Olympic",
"Games",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"seems",
",",
"β",
"Agent",
"Smith",
"β",
"prey",
"list",
"does",
"not",
"only",
"have",
"popular",
"yet",
"Janus",
"vulnerable",
"apps",
"to",
"ensure",
"high",
"proliferation",
",",
"but",
"also",
"contain",
"competitor",
"apps",
"of",
"actor",
"β",
"s",
"legitimate",
"business",
"arm",
"to",
"suppress",
"competition",
"."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
7,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"basic",
"idea",
"is",
"to",
"hook",
"the",
"voice",
"call",
"process",
"in",
"mediaserver",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Due",
"to",
"these",
"two",
"layers,",
"we",
"use",
"the",
"name",
"TwoFace",
"to",
"track",
"this",
"webshell."
] | [
16,
16,
16,
1,
9,
16,
16,
16,
16,
3,
16,
16,
16,
3
] |
[
"Because",
"of",
"the",
"active",
"investigation,",
"I",
"cannot",
"reveal",
"C&C",
"domains",
"used",
"in",
"the",
"samples."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16
] |
[
"The",
"discovered",
"Javascript",
"code",
"runs",
"hidden",
"in",
"the",
"browser",
"and",
"activates",
"when",
"text",
"is",
"entered",
"on",
"a",
"payment",
"page."
] | [
16,
16,
1,
9,
16,
14,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"These",
"included",
"Fabrizio",
"Saccomanni,",
"the",
"former",
"deputy",
"governor",
"of",
"the",
"Bank",
"of",
"Italy,",
"Piero",
"Fassino,",
"the",
"former",
"mayor",
"of",
"Turin,",
"several",
"members",
"of",
"a",
"Masonic",
"lodge,",
"Matteo",
"Renzi,",
"former",
"prime",
"minister",
"of",
"Italy",
"and",
"Mario",
"Draghi,",
"another",
"former",
"prime",
"minister",
"of",
"Italy",
"and",
"now",
"president",
"of",
"the",
"European",
"Central",
"Bank."
] | [
16,
16,
4,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12
] |
[
"This",
"particular",
"family",
"of",
"information",
"stealers",
"has",
"been",
"around",
"since",
"2011"
] | [
16,
16,
6,
14,
14,
14,
16,
16,
16,
16,
0
] |
[
"For",
"contacting",
"C",
"&",
"C",
",",
"the",
"spyware",
"was",
"found",
"to",
"be",
"using",
"free",
"DNS",
"services",
",",
"as",
"shown",
"in",
"the",
"screenshot",
"below",
":",
"SpyNote",
"RAT",
"uses",
"an",
"unusual",
"trick",
"to",
"make",
"sure",
"that",
"it",
"remains",
"up",
"and",
"running",
"and",
"that",
"the",
"spying",
"does",
"not",
"stop",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"net",
":",
"Nam",
"Phrik",
"Num",
"Somtum",
"[",
"."
] | [
9,
9,
16,
16,
16,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Worm.Sohanad.NGW",
"Ransom/W32.Blocker.3009335",
"Trojan.Musta",
"Win32.Worm.Sohanad.NGW",
"TROJ_ZAPCHAST.BN",
"Win32/Tnega.SdcSccB",
"TROJ_ZAPCHAST.BN",
"Trojan-Ransom.Win32.Blocker.kock",
"Win32.Worm.Sohanad.NGW",
"Trojan.Win32.Blocker.ewkvvx",
"Troj.Ransom.W32.Blocker!c",
"Win32.Trojan.Blocker.Ahon",
"Win32.Worm.Sohanad.NGW",
"W32/Trojan.VZLV-7504",
"TR/Autoit.ezxix",
"Trojan:Win32/Musta.A",
"Win32.Worm.Sohanad.NGW",
"Trojan-Ransom.Win32.Blocker.kock",
"Win32.Worm.Sohanad.NGW",
"Trojan/Win32.Zapchast.R109977",
"Trojan-Ransom.Blocker",
"Win32/Autoit.KE",
"Worm.Win32.AutoIt",
"Trj/CI.A",
"Win32/Worm.f95"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"+86.01078456689",
"The",
"command-and-control",
"server",
"is",
"hosting",
"an",
"index",
"page",
"which",
"also",
"serves",
"an",
"APK",
"file",
":",
"The",
"referenced",
"β",
"Document.apk",
"β",
"is",
"333583",
"bytes",
"in",
"size",
",",
"MD5",
":",
"c4c4077e9449147d754afd972e247efc",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16
] |
[
"BankBot",
"is",
"particularly",
"risky",
"because",
"it",
"disguises",
"itself",
"as",
"legitimate",
"banking",
"apps,",
"typically",
"using",
"fake",
"overlay",
"screens",
"to",
"mimic",
"existing",
"banking",
"apps",
"and",
"steal",
"user",
"credentials."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
5,
13,
13
] |
[
"The",
"dropper",
"includes",
"a",
"64",
"bit",
"version",
"of",
"KONNI;"
] | [
16,
3,
16,
16,
5,
13,
13,
16,
3
] |
[
"The",
"C2",
"infrastructure",
"contains",
"a",
"lack",
"of",
"sophistication",
"such",
"as",
"open",
"panels",
",",
"reuse",
"of",
"old",
"servers",
"publicly",
"tagged",
"as",
"maliciousβ¦",
"So",
"what",
"?",
"After",
"being",
"publicly",
"denounced",
"by",
"CSIS",
"Group",
"β",
"a",
"threat",
"intelligence",
"company",
"in",
"Denmark",
"β",
"Wolf",
"Research",
"was",
"closed",
"and",
"a",
"new",
"organization",
"named",
"LokD",
"was",
"created",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16
] |
[
"Interestingly",
",",
"one",
"unused",
"feature",
"of",
"the",
"app",
"is",
"its",
"ability",
"to",
"manipulate",
"data",
"in",
"the",
"Android",
"package",
"manager",
"to",
"add",
"and",
"remove",
"permissions",
"and",
"components",
"as",
"well",
"as",
"hide",
"the",
"app",
"icon",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"is",
"due",
"to",
"the",
"fact",
"that",
"the",
"implant",
"needs",
"to",
"escalate",
"privileges",
"before",
"performing",
"social",
"payload",
"actions",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"VB:Trojan.Valyria.186",
"W97M/Downloader.c",
"Trojan.OBLD-0",
"O97M_BOGAVERT.A",
"VB:Trojan.Valyria.186",
"VB:Trojan.Valyria.186",
"VB:Trojan.Valyria.186",
"VB:Trojan.Valyria.186",
"W97M.DownLoader.110",
"O97M_BOGAVERT.A",
"W97M/Downloader.c",
"W97M/Dldr.Bogavert.xehvk",
"TrojanDownloader:O97M/Bogavert.A",
"HEUR.VBA.Trojan.e",
"VB:Trojan.Valyria.186",
"Trojan-Downloader.O97M.Bogavert",
"heur.macro.drop.fa"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"How",
"did",
"Gooligan",
"emerge",
"?",
"Our",
"researchers",
"first",
"encountered",
"Gooligan",
"β",
"s",
"code",
"in",
"the",
"malicious",
"SnapPea",
"app",
"last",
"year",
"."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16
] |
[
"What",
"makes",
"this",
"malware",
"extremely",
"powerful",
"is",
"the",
"capability",
"to",
"adapt",
"after",
"it",
"'s",
"deployed",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Recent",
"variants",
"drop",
"distinctively",
"named",
"malware",
"such",
"as",
"KingKong.dll."
] | [
16,
3,
16,
16,
16,
3,
16,
16,
1
] |
[
"Proofpoint",
"researchers",
"are",
"tracking",
"an",
"espionage",
"actor",
"targeting",
"organizations",
"and",
"high-value",
"targets",
"in",
"defense",
"and",
"government."
] | [
4,
12,
16,
16,
6,
14,
14,
16,
4,
16,
4,
12,
16,
4,
16,
4
] |
[
"However",
",",
"his",
"study",
"results",
"are",
"out",
"of",
"the",
"scope",
"of",
"our",
"research",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dropper.Wolfst.A",
"Trojan-Dropper.Win32!O",
"TrojanDropper.Wolfst",
"Trojan/Dropper.Wolfst",
"TROJ_WOLFST.DRP",
"Win32.Trojan.WisdomEyes.16070401.9500.9858",
"Trojan.Dropper",
"TROJ_WOLFST.DRP",
"Trojan.Dropper.Wolfst.A",
"Trojan-Dropper.Win32.Wolfst",
"Trojan.Dropper.Wolfst.A",
"Trojan.Win32.Wolfst.ejqa",
"Dropper.Wolfst.26146",
"Trojan.Dropper.Wolfst.A",
"Trojan.Dropper.Wolfst.A",
"Trojan.MulDrop.385",
"Dropper.Wolfst.Win32.8",
"BehavesLike.Win32.Dropper.tc",
"W32/Trojan.DTTZ-6513",
"TrojanDropper.PeStaple.t",
"RiskWare[RemoteAdmin]/Win32.RMS",
"Trojan.Dropper.Wolfst.A",
"W32.W.Bybz.lwoN",
"Trojan-Dropper.Win32.Wolfst",
"Dropper/Win32.Wolfst.R141816",
"Trojan.Dropper.Wolfst.A",
"TScope.Trojan.Delf",
"Trojan.DR.Wolfst!967kQq5cZ1Q",
"Trojan-Dropper.Win32.Wolfst"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Also",
",",
"when",
"an",
"SMS",
"arrives",
",",
"the",
"Trojan",
"puts",
"the",
"phone",
"into",
"silent",
"mode",
"and",
"switches",
"off",
"the",
"screen",
"so",
"the",
"user",
"doesn",
"β",
"t",
"notice",
"that",
"a",
"new",
"SMS",
"has",
"arrived",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"For",
"more",
"information,",
"see",
"information",
"on",
"the",
"EITest",
"campaign",
"in",
"the",
"Unit",
"42",
"blog",
"titled:",
"Decline",
"in",
"Rig",
"Exploit",
"Kit."
] | [
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
4,
12,
12,
16,
16,
16,
16,
3,
11,
11
] |
[
"While",
"some",
"of",
"the",
"legitimate",
"apps",
"HenBox",
"use",
"as",
"decoys",
"can",
"be",
"found",
"on",
"Google",
"Play",
",",
"HenBox",
"apps",
"themselves",
"have",
"only",
"been",
"found",
"on",
"third-party",
"(",
"non-Google",
"Play",
")",
"app",
"stores",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.IlamMak.Trojan",
"Trojan.Win32.Delf!O",
"Trojan.Delf",
"Trojan.Delf.Win32.9224",
"Win32.Trojan.Delf.ii",
"W32/Trojan.HGGE-3556",
"Infostealer.Yahmali",
"Win32/Yahmali.C",
"TSPY_YAHMALI.B",
"Trojan.Win32.Delf.aam",
"Trojan.Win32.Delf.dxmnga",
"TSPY_YAHMALI.B",
"Trojan-GameThief.Win32.Nilage",
"W32/Trojan2.OXXZ",
"Trojan/Delf.ia",
"TR/Delf.aam.35",
"Trojan/Win32.Delf",
"Win32.Virut.ce.57344",
"PWS:Win32/Yahmali.A",
"Trojan.Win32.A.Delf.104448",
"Trojan.Win32.Delf.aam",
"Trojan/Win32.Yahmali.R25760",
"Trojan.Autorun.Havijak.1",
"Trojan.PasswordStealer",
"W32/FolderToEXE.A.worm",
"Win32/Delf.AAM",
"Trojan.Delf!QRjoRop97so"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Elf.BillGates",
"version",
"targets",
"Linux",
"operating",
"system."
] | [
16,
1,
16,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9995"
] | [
16,
3,
16,
16,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9933",
"Trojan.Win32.Pincav.dxbist",
"Trojan.Win32.Z.Zusy.618496.BJ",
"Trojan.DownLoader22.56304",
"BehavesLike.Win32.AdwareConvertAd.jh",
"TR/AD.Corebot.mgjun",
"Trojan.Zusy.D27BC8",
"Trojan:Win32/Corebot.A",
"Trojan.Downloader",
"Win32/Trojan.BO.918"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Since",
"then,",
"it",
"has",
"evolved",
"fairly",
"rapidly",
"and",
"has",
"added",
"new",
"capabilities,",
"as",
"reported."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Then",
",",
"using",
"POST",
"requests",
"to",
"the",
"relative",
"address",
"report.php",
",",
"it",
"sends",
"data",
"about",
"the",
"device",
"(",
"IMEI",
",",
"phone",
"number",
",",
"country",
",",
"mobile",
"operator",
",",
"phone",
"model",
",",
"availability",
"of",
"root",
"rights",
",",
"OS",
"version",
")",
",",
"list",
"of",
"contacts",
",",
"list",
"of",
"installed",
"apps",
",",
"incoming",
"SMS",
",",
"and",
"other",
"information",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"leak",
"of",
"its",
"code",
"provides",
"cybercriminals",
"with",
"a",
"new",
"weaponized",
"resource",
"for",
"enhancing",
"their",
"surveillance",
"operations",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Lookout",
"notified",
"Google",
"of",
"the",
"potential",
"threat",
"shortly",
"after",
"it",
"was",
"discovered",
"."
] | [
4,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Mauvaise.SL1",
"Trojan.Inject.Win32.237373",
"Troj.W32.Inject!c",
"W32/Trojan.JMPH-3101",
"Trojan.Win32.Inject.aeryd",
"Trojan.Win32.Banbra.elzzqd",
"Trojan.MulDrop7.31178",
"BehavesLike.Win32.PUPXBY.dh",
"Trojan.Inject.vwf",
"TR/Sfuzuan.jhmvt",
"Trojan.Ursu.D4870",
"Trojan.Win32.Inject.aeryd",
"Trojan:Win32/Sfuzuan.B!bit",
"Trj/GdSda.A",
"Win32.Trojan.Inject.Wklz",
"Trojan.PWS.Banbra!c5Sww8Szjr0",
"Trojan.Win32.Sfuzuan"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Users",
"may",
"be",
"required",
"the",
"help",
"of",
"their",
"device",
"manufacturer",
"to",
"get",
"support",
"for",
"firmware",
"flashing",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Within",
"the",
"time",
"between",
"the",
"discovery",
"of",
"the",
"vulnerability",
"and",
"the",
"release",
"of",
"the",
"fix,",
"a",
"bad",
"actor",
"might",
"try",
"to",
"get",
"the",
"most",
"out",
"of",
"his",
"previously",
"valuable",
"attack",
"assets."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
7,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16
] |
[
"This",
"special",
"exception",
"handler",
"is",
"needed",
"to",
"manage",
"some",
"memory",
"buffers",
"protection",
"and",
"special",
"exceptions",
"that",
"are",
"used",
"to",
"provide",
"more",
"stealthy",
"execution",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"malware",
"has",
"been",
"reported",
"to",
"have",
"been",
"used",
"in",
"high",
"profile",
"breaches",
"like",
"the",
"ones",
"at",
"Wellpoint/Anthem,",
"VAE",
"Inc,",
"USIS",
"and",
"Mitsubishi",
"Heavy",
"Industries."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
4,
12,
12,
12,
16,
4,
12,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TROJ_DLDR.SMI",
"Win32.Trojan.WisdomEyes.16070401.9500.9976",
"Trojan.Adclicker",
"TROJ_DLDR.SMI",
"Trojan.Win32.CcKrizCry.dpsxlj",
"Troj.Downloader.W32.Helminthos.kZDa",
"Downloader.KrizCry.Win32.252",
"BehavesLike.Win32.Backdoor.dm",
"TR/Malushka.umxne",
"Trojan[Downloader]/Win32.CcKrizCry",
"TrojanDownloader:Win32/Malushka.T",
"Trojan/Win32.Cckrizcry.R7632",
"Win32.Trojan.Dldr.Lscd",
"W32/KrizCry.M!tr.dldr",
"Win32/Trojan.3f8"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Vetor.PE",
"Virus.Win32.Virut.1!O",
"W32.Virut.G",
"PE_VIRUX.R",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Worm.GBYU-0953",
"W32.Virut.CF",
"Win32/Virut.17408",
"PE_VIRUX.R",
"Virus.Win32.Virut.ce",
"Virus.Win32.Virut.hpeg",
"Worm.Win32.Delf.579072",
"Virus.Win32.Virut.CE",
"Win32.Virut.56",
"Virus.Virut.Win32.1938",
"Virus.Win32.Ramnit",
"W32/Worm.APDA",
"Win32/Virut.bt",
"Virus/Win32.Virut.ce",
"W32.Virut.lJ4T",
"Virus.Win32.Virut.ce",
"HEUR/Fakon.mwf",
"Virus.Virut.14",
"W32/Sality.AO",
"Virus.Win32.Virut.M"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"in-depth",
"report",
"provides",
"an",
"analysis",
"of",
"technology,",
"impact,",
"possible",
"attribution",
"β",
"and",
"a",
"signature",
"to",
"detect",
"the",
"malware."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
1,
16,
1,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9995",
"Trojan-Downloader.Win32.VB.aohd",
"Trojan.Win32.VB.ecbrdj",
"Trojan.DownLoad2.47277",
"BehavesLike.Win32.BadFile.nm",
"TrojanDownloader.VB.dkqk",
"Trojan-Downloader.Win32.VB.aohd",
"TrojanDownloader:Win32/Vbload.J"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Those",
"targeted",
"include",
"Paypal",
"Business",
",",
"Revolut",
",",
"Barclays",
",",
"UniCredit",
",",
"CapitalOne",
"UK",
",",
"HSBC",
"UK",
",",
"Santander",
"UK",
",",
"TransferWise",
",",
"Coinbase",
",",
"paysafecard",
",",
"and",
"many",
"more",
"."
] | [
16,
16,
16,
5,
13,
16,
5,
16,
5,
16,
5,
16,
5,
13,
16,
5,
13,
16,
5,
13,
16,
5,
16,
5,
16,
5,
16,
16,
16,
16,
16
] |
[
"BadRabbit",
"is",
"distributed",
"as",
"a",
"fake",
"flash",
"update,",
"and",
"reportedly",
"using",
"Mimikatz,",
"the",
"Eternal",
"Romance",
"exploit,",
"and",
"a",
"list",
"of",
"passwords",
"to",
"spread",
"via",
"SMB",
"in",
"a",
"worm-like",
"fashion."
] | [
3,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
3,
11,
11,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Bitsto",
"BKDR_BISCUIT.A",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"W32/TrojanX.EGVY",
"BKDR_BISCUIT.A",
"Trojan.Win32.Click.dsvjap",
"Trojan.Click.31006",
"BehavesLike.Win32.RAHack.nc",
"W32/Trojan.RGTL-7538",
"Backdoor:Win32/Bitsto.A",
"Adware/Win32.NaviPromo.R36681"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"VPN",
"package",
"is",
"no",
"longer",
"present",
",",
"further",
"reinforcing",
"our",
"conclusion",
"that",
"it",
"was",
"not",
"in",
"use",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"RiskWare.Tool.CK",
"Trojan.Tool!qSvNdOK1TCo",
"Riskware.Win32.ASEye.cjxuqg",
"Virus.Win32.Heur.c",
"Tool.ASEye.2",
"BehavesLike.Win32.ToolTPatch.lm",
"Unwanted/Win32.Patch",
"Hacktool.Win32.TPE.BA",
"Trojan.Feutel.AV"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"had",
"again",
"cloned",
"a",
"different",
"legitimate",
"Japanese",
"website",
"to",
"host",
"its",
"malicious",
"app",
",",
"similar",
"to",
"what",
"FakeSpy",
"had",
"also",
"done",
"before",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16
] |
[
"We",
"estimate",
"that",
"through",
"the",
"malware",
"s",
"malicious",
"activities,",
"the",
"perpetrators",
"behind",
"it",
"gained",
"over",
"$1.5",
"million",
"over",
"the",
"course",
"of",
"two",
"months."
] | [
16,
16,
16,
16,
16,
3,
16,
1,
9,
6,
14,
16,
16,
16,
16,
16,
16,
16,
0,
8,
8,
8,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.MSIL.FC.6901",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win32.Diztakun.dbjduc",
"Win32.Trojan.Spy.Sudw",
"BehavesLike.Win32.Trojan.dh",
"Trojan.Win32.Diztakun",
"W32/Trojan.IYBN-7194",
"Trojan.Kazy.D82509",
"Trojan:MSIL/Diztakun.A!bit",
"Trojan/Win32.Diztakun.C2318558",
"Trj/GdSda.A",
"Win32/Trojan.c81"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/StartPage.axk",
"Trojan.Startpage",
"Win.Trojan.Startpage-757",
"Trojan.MSIL.StartPage.bo",
"Trojan.Win32.StartPage.eaqxl",
"Trojan.StartPage.22255",
"Trojan/StartPage.ajy",
"TR/StartPage.axk.2",
"Trojan:MSIL/Startpage.A",
"Trojan.MSIL.StartPage.bo",
"Trojan/Win32.StartPage.C59843",
"Trj/CI.A",
"MSIL/StartPage.A",
"Win32.Trojan.Startpage.cduj",
"Trojan.StartPage!8fKymuz2/+o",
"Trojan.Win32.StartPage",
"W32/StartPage.PL!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Morto.dll.b",
"Trojan/Morto.l",
"WORM_MORTO.SM2",
"Worm.Win32.Morto!IK",
"Worm.Win32.Morto.~dln",
"Worm/Morto.dlnam",
"WORM_MORTO.SM2",
"W32/Morto.dll.b",
"Worm:Win32/Morto.D",
"Worm/Win32.Morto",
"Worm.Win32.Morto.h",
"Worm.Win32.Morto",
"W32/Morto.A!tr",
"Worm/Morto.D"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Adversaries",
"have",
"been",
"seen",
"leveraging",
"JexBoss,",
"an",
"open",
"source",
"tool",
"for",
"testing",
"and",
"exploiting",
"JBoss",
"application",
"servers,",
"to",
"gain",
"a",
"foothold",
"in",
"the",
"network."
] | [
16,
16,
16,
16,
16,
3,
16,
1,
9,
9,
9,
9,
9,
9,
5,
13,
13,
16,
16,
16,
16,
16,
16,
1
] |
[
"However",
",",
"it",
"could",
"easily",
"be",
"used",
"for",
"far",
"more",
"intrusive",
"and",
"harmful",
"purposes",
"such",
"as",
"banking",
"credential",
"theft",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"this",
"case,",
"Proofpoint",
"researchers",
"discovered",
"an",
"infected",
"Android",
"version",
"of",
"the",
"newly",
"released",
"mobile",
"game",
"Pokemon",
"GO"
] | [
16,
16,
16,
4,
12,
16,
16,
16,
5,
13,
16,
16,
16,
16,
5,
13,
13,
13
] |
[
"Upon",
"loading",
"the",
"rtf",
"document,",
"it",
"will",
"drop",
"a",
"base64",
"encoded",
"powershellscript",
"in",
"the",
"following",
"location:%TEMP%\\log.ps1"
] | [
16,
16,
1,
9,
9,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Detrahere",
"Trojan.Midie.DA596",
"TROJ_KRYPTIK_HA22006D.UVPM",
"Trojan.Win32.DownLoad3.exdqqe",
"Trojan.DownLoad3.64586",
"Trojan.Kryptik.Win32.1347406",
"TROJ_KRYPTIK_HA22006D.UVPM",
"Trojan.MSIL.ikyj",
"TR/Crypt.ZPACK.hgndb",
"Trojan:Win32/Detrahere.E",
"Trojan/Win32.Tiggre.R216587",
"Trojan.Crypt",
"Win32/Trojan.daa"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Now",
"more",
"threat",
"actors",
"are",
"leveraging",
"the",
"vulnerability",
"in",
"Microsoft",
"Server",
"Message",
"Block",
"SMB",
"protocol",
"β",
"this",
"time",
"to",
"distribute",
"Backdoor.Nitol",
"and",
"Trojan",
"Gh0st",
"RAT."
] | [
16,
16,
6,
14,
16,
16,
16,
7,
16,
5,
13,
13,
13,
13,
13,
16,
16,
16,
16,
16,
1,
16,
3,
11,
11
] |
[
"When",
"a",
"user",
"enters",
"an",
"Internet",
"banking",
"site",
"on",
"a",
"computer",
"infected",
"by",
"banking",
"malware",
"(",
"ZeuS",
",",
"Citadel",
")",
",",
"a",
"request",
"about",
"the",
"smartphone",
"number",
"and",
"type",
"of",
"operating",
"system",
"is",
"injected",
"into",
"the",
"code",
"of",
"the",
"authentication",
"page",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Specifically,",
"the",
"format",
"resembles",
"custom",
"virtual",
"machine",
"code,",
"where",
"numeric",
"hexadecimal",
"identifiers",
"present",
"in",
"the",
"configuration",
"file",
"make",
"the",
"stealer",
"run",
"desired",
"functions."
] | [
16,
16,
16,
16,
16,
5,
13,
16,
16,
1,
9,
16,
16,
16,
16,
1,
9,
16,
16,
3,
11,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Stration.DDA@mm",
"Win32.Stration.DDA@mm",
"I-Worm.Warezov.r3",
"Win32.Stration.DDA@mm",
"Trojan.Win32.Warezov.ehypz",
"W32/Worm.ARBW",
"W32.Stration@mm",
"Win32.Stration.DDA@mm",
"I-Worm.Opnis!V3KJQVovhbU",
"I-Worm.Win32.Warezov.20480.AW[h]",
"Win32.Worm-email.Warezov.Lpvc",
"Win32.Stration.DDA@mm",
"Worm.Win32.Warezov.~AD",
"Win32.Stration.DDA@mm",
"Win32.HLLM.Limar.3939",
"Worm.Warezov.Win32.123",
"W32/Worm.IQCC-3677",
"I-Worm.Warezov.bu",
"WORM/Warezov.2048.1",
"W32/Stration.KG!tr",
"Worm[Email]/Win32.Warezov",
"Win32.Stration.E878FD",
"Worm:Win32/Stration.ST",
"Win32/Stration.AHP",
"Worm.Win32.Warezov.aK",
"Worm.Win32.Warezov",
"Win32.Stration.DDA@mm",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Figure",
"1",
":",
"β",
"Agent",
"Smith",
"β",
"s",
"modular",
"structure",
"Technical",
"Analysis",
"β",
"Loader",
"Module",
"The",
"β",
"loader",
"β",
"module",
",",
"as",
"stated",
"above",
",",
"extracts",
"and",
"runs",
"the",
"β",
"core",
"β",
"module",
"."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Table",
"4",
"below",
"lists",
"the",
"intents",
"that",
"are",
"statically",
"registered",
"in",
"this",
"HenBox",
"variant",
"β",
"s",
"AndroidManifest.xml",
"config",
"file",
",",
"together",
"with",
"a",
"description",
"of",
"what",
"that",
"intent",
"does",
",",
"and",
"when",
"it",
"would",
"be",
"used",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Heur.E38E91",
"Win32.Trojan.WisdomEyes.16070401.9500.9982",
"WORM_AMBLER.SMZ",
"Trojan-Spy.Win32.Amber.zdc",
"Trojan.Win32.Amber.etbxtl",
"Win32.Trojan-spy.Amber.Wskc",
"Trojan-Spy.Win32.Ambler",
"WORM_AMBLER.SMZ",
"BehavesLike.Win32.Virut.qc",
"Trojan-Dropper.Win32.Ambler",
"W32/Trojan.MMWY-8251",
"TrojanSpy:Win32/Ambler.D",
"Trojan-Spy.Win32.Ambler",
"Win32/AutoRun.Spy.Ambler.NAW"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"green",
",",
"we",
"can",
"see",
"the",
"references",
"to",
"the",
"SMS",
"API",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Keylogger.Win32.19936",
"Trojan/Spy.nut",
"Win32.Trojan.WisdomEyes.16070401.9500.9996",
"Trojan.DownLoader6.20458",
"Trojan/Win32.Graftor.R31665",
"TrojanSpy.KeyLogger!VshB9boiuX0",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"Chunghwa",
"Post",
"-",
"The",
"government-owned",
"corporation",
"Chunghwa",
"is",
"the",
"official",
"postal",
"service",
"of",
"Taiwan",
"."
] | [
4,
12,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"With",
"that",
"inclusion,",
"companies",
"running",
"on",
"those",
"systems",
"will",
"also",
"be",
"at",
"risk."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"main",
"infection",
"vector",
"is",
"a",
"phishing",
"attack",
"using",
"SMS/MMS",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"RemoteAdmin.Win32.RAT!O",
"Backdoor.Daromec",
"Backdoor.Breut",
"not-a-virus:RemoteAdmin.Win32.RAT.a",
"Trojan.Win32.MLW.dbyfty",
"BackDoor.Comet.21",
"Trojan[RemoteAdmin]/Win32.RAT",
"not-a-virus:RemoteAdmin.Win32.RAT.a",
"Backdoor:Win32/Daromec.A",
"RiskWare.RemoteAdmin",
"Trojan.MiniUPnP!L9xsRhGGfN0"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"More",
"data",
"is",
"appearing",
"daily",
",",
"leading",
"us",
"to",
"believe",
"the",
"actors",
"are",
"still",
"highly",
"active",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"That",
"domain",
"still",
"hosts",
"the",
"malicious",
"Flash",
"file",
"CVE-2015-7645",
"that",
"it",
"previously",
"used",
"in",
"standalone",
"attacks."
] | [
1,
9,
16,
16,
16,
3,
5,
1,
9,
15,
16,
16,
16,
16,
1,
9
] |
[
"On",
"August",
"4,",
"2016,",
"the",
"Gmail",
"account",
"of",
"an",
"unknown",
"individual",
"was",
"compromised",
"in",
"order",
"to",
"conduct",
"spearphishing",
"campaigns",
"against",
"a",
"diverse",
"set",
"of",
"targets",
"related",
"to",
"Iran."
] | [
16,
0,
8,
8,
16,
5,
13,
16,
16,
4,
12,
16,
1,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
2
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.