tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "This", "new", "version", "comes", "as", "an", "email", "attachment", "which", "is", "a", "zip", "inside", "a", "zip", "before", "extracting", "to", "a", ".js", "file", "in", "a", "fake", "Delivery", "Status", "Notification,", "failed", "to", "deliver", "email", "bounce", "message." ]
[ 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 1, 16, 16, 1, 16, 16, 16, 16, 1, 9, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 9 ]
[ "Attacks", "using", "BigBoss", "appear", "likely", "to", "have", "occurred", "since", "mid-2015,", "whereas", "SillyGoose", "appears", "to", "have", "been", "distributed", "since", "September", "2016." ]
[ 1, 16, 3, 16, 16, 16, 16, 16, 16, 0, 16, 3, 16, 16, 16, 16, 16, 16, 0, 8 ]
[ "The", "first", "method,", "dubbed", "proxy-changing", "is", "commonly", "used", "for", "HTTP", "packets", "inspections." ]
[ 16, 16, 16, 1, 9, 16, 16, 16, 11, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.LovGate.W@mm", "W32.LovGate.W", "Win32.LovGate.W@mm", "Spyware.PasswordStealer", "W32/Lovgate.W@M", "Win32.LovGate.E8C19A", "WORM_LOVGATE.BJ", "Win32.Trojan.WisdomEyes.16070401.9500.9982", "W32/Lovgate.W@mm", "W32.HLLW.Lovgate.I@mm", "Win32/Lovgate.AX", "WORM_LOVGATE.BJ", "Win.Worm.Lovgate-35", "Win32.LovGate.W@mm", "Trojan.Win32.MultiPacked.dgpeeo", "Win32.Worm-email.Lovgate.Dwsv", "Win32.HLLM.Lovgate.based", "Worm.LovGate.Win32.79", "BehavesLike.Win32.PWSZbot.cc", "W32/Lovgate.W@mm", "I-Worm/Supkp.a", "WORM/Lovgate.BK", "Worm[Email]/Win32.LovGate", "Worm:Win32/Lovgate.W@mm", "W32.W.LovGate.kYPD", "Win32.LovGate.W@mm", "Win32/LovGate.worm.179200", "W32/Lovgate.w@M", "Worm.Lovgate", "I-Worm.Lovgate.AP", "Win32/Lovgate.AP", "I-Worm.Lovgate.BI", "Worm.Win32.Lovgate", "Win32.LovGate.W@mm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "During", "installation", ",", "Riltok", "asks", "the", "user", "for", "permission", "to", "use", "special", "features", "in", "AccessibilityService", "by", "displaying", "a", "fake", "warning", ":", "If", "the", "user", "ignores", "or", "declines", "the", "request", ",", "the", "window", "keeps", "opening", "ad", "infinitum", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "According", "to", "public", "records", "it", "appears", "that", "eSurv", "began", "to", "also", "develop", "intrusion", "software", "in", "2016", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "20", ":", "dropper", "app", "category", "distribution", "Among", "the", "vast", "number", "of", "variants", ",", "the", "top", "5", "most", "infectious", "droppers", "alone", "have", "been", "downloaded", "more", "than", "7.8", "million", "times", "of", "the", "infection", "operations", "against", "innocent", "applications", ":", "Figure", "21", ":", "Top", "5", "most", "infectious", "droppers", "The", "β€œ", "Agent", "Smith", "”", "campaign", "is", "primarily", "targeted", "at", "Indian", "users", ",", "who", "represent", "59", "%", "of", "the", "impacted", "population", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Definition", "of", "populateConfigMap", ",", "which", "loads", "the", "map", "with", "values", "Correlating", "the", "last", "two", "steps", ",", "one", "can", "observe", "that", "the", "malware", "payload", "receives", "the", "configuration", "for", "the", "following", "properties", ":", "number", "–", "The", "default", "number", "to", "be", "send", "to", "the", "server", "(", "in", "case", "the", "number", "is", "not", "available", "from", "the", "device", ")", "api", "–", "The", "API", "key", "url", "–", "The", "URL", "to", "be", "used", "in", "WebView", "to", "display", "on", "the", "ransom", "note", "The", "malware", "saves", "this", "configuration", "to", "the", "shared", "preferences", "of", "the", "app", "data", "and", "then", "it", "sets", "up", "all", "the", "Broadcast", "Receivers", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "Trojan", "may", "download", "and", "execute", "the", "following", "potentially", "malicious", "file:", "%Temp%\\[RANDOM", "CHARACTERS].dll" ]
[ 16, 3, 16, 1, 9, 9, 16, 16, 16, 1, 9, 9, 9 ]
[ "When", "a", "victim", "tries", "to", "access", "the", "URL", "in", "the", "SMS", "body", ",", "the", "C2", "will", "check", "if", "the", "mobile", "device", "meets", "the", "criteria", "to", "receive", "the", "malware", "(", "see", "infrastructure", "section", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "means", "that", ",", "unless", "victims", "lock", "their", "devices", "via", "the", "hardware", "button", ",", "the", "timer", "provides", "plenty", "of", "time", "for", "the", "malware", "to", "remotely", "perform", "malicious", ",", "in-app", "operations", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Code", "to", "check", "the", "existence", "of", "SafetyNet", "Google", "API", "It", "also", "checks", "if", "the", "Android", "SafetyNet", "is", "active", "and", "reporting", "back", "to", "the", "C2", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "determined", "that", "this", "chunk", "of", "data", "contains", "an", "array", "of", "opcode", "instructions", "ready", "to", "be", "interpreted", "by", "a", "custom", "virtual", "machine", "program", "(", "from", "this", "point", "on", "referenced", "generically", "as", "β€œ", "VM", "”", ")", "implemented", "by", "FinFisher", "authors", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16 ]
[ "Given", "the", "many", "artifacts", "we", "discovered", "in", "the", "malware", "code", ",", "as", "well", "as", "infrastructure", "analysis", ",", "we", "are", "pretty", "confident", "that", "the", "developer", "of", "the", "Skygofree", "implants", "is", "an", "Italian", "IT", "company", "that", "works", "on", "surveillance", "solutions", ",", "just", "like", "HackingTeam", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9711", "Spyware.Keylogger", "BehavesLike.Win32.Fake.lc", "Trojan-Proxy.Win32.Glukelira", "Trojan/Win32.Glukelira.R10186" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "MALWARE", "TECHNICAL", "DETAILS", "During", "our", "investigation", ",", "researchers", "uncovered", "a", "malware", "known", "as", "\"", "Gustuff.", "''", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAdware.909D", "Downloader.AdloadCRT.Win32.596", "Win.Trojan.Downloader-65968", "not-a-virus:Downloader.Win32.AdLoad.rbbv", "Trojan.Win32.AdLoad.dvwwyc", "Adware.Downloadadmin.85624", "Trojan.Vittalia.12437", "not-a-virus:Downloader.DownloAdmin", "Pua.Downloadmanager", "RiskWare[Downloader]/Win32.AdLoad.rbbv", "Trojan.Application.Bundler.DownloadAdmin.3", "PUP.DownloadAdmin/Variant", "not-a-virus:Downloader.Win32.AdLoad.rbbv", "PUP/Win32.DownloadAdmin.R162593", "Downloader.DownloAdmin", "Trj/Downloader.WOL", "Win32/Application.d3c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Inject", "Trojan.Bublik.Win32.19217", "W32/Trojan.NHBC-1750", "BKDR_BMDOOR.SMZAEK-A", "Trojan.Win32.Inject.wavu", "Trojan.Win32.Androm.dlcdpz", "Win32.Trojan.Inject.Duwc", "BKDR_BMDOOR.SMZAEK-A", "Trojan.Inject.gwc", "Trojan/Win32.Inject", "Trojan.Win32.Inject.wavu", "Trojan.Inject", "Trojan.Inject!zWOSv6fC2j0", "Win32/Trojan.ae0" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Virus.Win32.Virut.1!O", "Hacktool.Virledi", "Win32.Worm.AutoRun.bz", "W32/Virut.AI", "PE_VIRUX.A-1", "Worm.Win32.WBNA.roc", "Virus.Win32.Virut.hpeg", "Virus.Win32.Virut.CE", "Win32.HLLW.Autoruner2.15607", "PE_VIRUX.A-1", "W32/Virut.AI", "Win32/Virut.bt", "Virus/Win32.Virut.ce", "Worm:Win32/Virledi.A", "Worm.Win32.WBNA.roc", "Trojan/Win32.Zbot.C401270", "Virus.Virut.06", "Worm.AutoRun.FLD", "Win32.Virut.E", "Trojan-Downloader.Win32.VB", "Trj/Dtcontx.M" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.ProxyChanger.144352", "Trojan.ProxyChanger", "Trojan/ProxyChanger.to", "Win32.Trojan.WisdomEyes.16070401.9500.9857", "Trojan.Win32.ProxyChanger.mx", "Trojan.Win32.Z.Proxychanger.144352", "Trojan.Proxy.27390", "Trojan.ProxyChanger.Win32.985", "Trojan.Win32.ProxyChanger", "W32/Trojan.WVYD-3840", "TrojanDownloader.Cabby.ug", "TR/Crypt.ZPACK.137306", "Trojan/Win32.ProxyChanger", "Trojan.Win32.ProxyChanger.mx", "Trojan:Win32/Tepoyx.K", "Trojan/Win32.Cryptolocker.R145008", "Trojan.ProxyChanger", "Win32/ProxyChanger.TO", "Trojan.ProxyChanger!ZhCr5dI6SeY", "W32/Kryptik.DEQP!tr", "Win32/Trojan.0f5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "company", "develops", "mobile", "apps", "for", "both", "Android", "and", "iOS", "platforms", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Heur.GZ.E0D821", "Ransom_Blocker.R004C0DK917", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Ransom_Blocker.R004C0DK917", "Trojan-Ransom.Win32.Blocker.kklp", "Backdoor.Win32.Zelug.ER", "BehavesLike.Win32.BadFile.mt", "TR/Barys.796", "Trojan[Downloader]/Win32.Dapato", "Backdoor:Win32/Zelug.B", "Trojan-Ransom.Win32.Blocker.kklp", "TScope.Malware-Cryptor.SB", "W32/Dapato.A!tr.dldr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "For", "now", ",", "we", "observe", "only", "one", "payload", "version", "for", "following", "the", "ARM", "CPUs", ":", "arm64-v8a", ",", "armeabi", ",", "armeabi-v7a", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 5, 16, 5, 16, 5, 16 ]
[ "The", "backdoor", "has", "been", "analyzed", "previously", "and", "is", "a", "robust", "tool", "associated", "with", "this", "group,", "likely", "being", "used", "as", "an", "early", "stage", "reconnaissance", "tool." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "It", "has", "frequently", "been", "used", "to", "spread", "cryptocurrency", "mining", "malware,", "perhaps", "indicating", "an", "evolution", "towards", "direct", "monetization." ]
[ 16, 16, 16, 16, 16, 16, 1, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16 ]
[ "Based", "on", "emails", "leaked", "in", "the", "dump", ",", "a", "number", "of", "Czech", "firms", "appear", "to", "be", "in", "business", "with", "the", "Hacking", "team", ",", "including", "a", "major", "IT", "partner", "in", "the", "Olympic", "Games", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "seems", ",", "β€œ", "Agent", "Smith", "”", "prey", "list", "does", "not", "only", "have", "popular", "yet", "Janus", "vulnerable", "apps", "to", "ensure", "high", "proliferation", ",", "but", "also", "contain", "competitor", "apps", "of", "actor", "’", "s", "legitimate", "business", "arm", "to", "suppress", "competition", "." ]
[ 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 7, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "basic", "idea", "is", "to", "hook", "the", "voice", "call", "process", "in", "mediaserver", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Due", "to", "these", "two", "layers,", "we", "use", "the", "name", "TwoFace", "to", "track", "this", "webshell." ]
[ 16, 16, 16, 1, 9, 16, 16, 16, 16, 3, 16, 16, 16, 3 ]
[ "Because", "of", "the", "active", "investigation,", "I", "cannot", "reveal", "C&C", "domains", "used", "in", "the", "samples." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16 ]
[ "The", "discovered", "Javascript", "code", "runs", "hidden", "in", "the", "browser", "and", "activates", "when", "text", "is", "entered", "on", "a", "payment", "page." ]
[ 16, 16, 1, 9, 16, 14, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "These", "included", "Fabrizio", "Saccomanni,", "the", "former", "deputy", "governor", "of", "the", "Bank", "of", "Italy,", "Piero", "Fassino,", "the", "former", "mayor", "of", "Turin,", "several", "members", "of", "a", "Masonic", "lodge,", "Matteo", "Renzi,", "former", "prime", "minister", "of", "Italy", "and", "Mario", "Draghi,", "another", "former", "prime", "minister", "of", "Italy", "and", "now", "president", "of", "the", "European", "Central", "Bank." ]
[ 16, 16, 4, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12 ]
[ "This", "particular", "family", "of", "information", "stealers", "has", "been", "around", "since", "2011" ]
[ 16, 16, 6, 14, 14, 14, 16, 16, 16, 16, 0 ]
[ "For", "contacting", "C", "&", "C", ",", "the", "spyware", "was", "found", "to", "be", "using", "free", "DNS", "services", ",", "as", "shown", "in", "the", "screenshot", "below", ":", "SpyNote", "RAT", "uses", "an", "unusual", "trick", "to", "make", "sure", "that", "it", "remains", "up", "and", "running", "and", "that", "the", "spying", "does", "not", "stop", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "net", ":", "Nam", "Phrik", "Num", "Somtum", "[", "." ]
[ 9, 9, 16, 16, 16, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Worm.Sohanad.NGW", "Ransom/W32.Blocker.3009335", "Trojan.Musta", "Win32.Worm.Sohanad.NGW", "TROJ_ZAPCHAST.BN", "Win32/Tnega.SdcSccB", "TROJ_ZAPCHAST.BN", "Trojan-Ransom.Win32.Blocker.kock", "Win32.Worm.Sohanad.NGW", "Trojan.Win32.Blocker.ewkvvx", "Troj.Ransom.W32.Blocker!c", "Win32.Trojan.Blocker.Ahon", "Win32.Worm.Sohanad.NGW", "W32/Trojan.VZLV-7504", "TR/Autoit.ezxix", "Trojan:Win32/Musta.A", "Win32.Worm.Sohanad.NGW", "Trojan-Ransom.Win32.Blocker.kock", "Win32.Worm.Sohanad.NGW", "Trojan/Win32.Zapchast.R109977", "Trojan-Ransom.Blocker", "Win32/Autoit.KE", "Worm.Win32.AutoIt", "Trj/CI.A", "Win32/Worm.f95" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "+86.01078456689", "The", "command-and-control", "server", "is", "hosting", "an", "index", "page", "which", "also", "serves", "an", "APK", "file", ":", "The", "referenced", "β€œ", "Document.apk", "”", "is", "333583", "bytes", "in", "size", ",", "MD5", ":", "c4c4077e9449147d754afd972e247efc", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16 ]
[ "BankBot", "is", "particularly", "risky", "because", "it", "disguises", "itself", "as", "legitimate", "banking", "apps,", "typically", "using", "fake", "overlay", "screens", "to", "mimic", "existing", "banking", "apps", "and", "steal", "user", "credentials." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 5, 13, 13 ]
[ "The", "dropper", "includes", "a", "64", "bit", "version", "of", "KONNI;" ]
[ 16, 3, 16, 16, 5, 13, 13, 16, 3 ]
[ "The", "C2", "infrastructure", "contains", "a", "lack", "of", "sophistication", "such", "as", "open", "panels", ",", "reuse", "of", "old", "servers", "publicly", "tagged", "as", "malicious…", "So", "what", "?", "After", "being", "publicly", "denounced", "by", "CSIS", "Group", "β€”", "a", "threat", "intelligence", "company", "in", "Denmark", "β€”", "Wolf", "Research", "was", "closed", "and", "a", "new", "organization", "named", "LokD", "was", "created", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16 ]
[ "Interestingly", ",", "one", "unused", "feature", "of", "the", "app", "is", "its", "ability", "to", "manipulate", "data", "in", "the", "Android", "package", "manager", "to", "add", "and", "remove", "permissions", "and", "components", "as", "well", "as", "hide", "the", "app", "icon", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "is", "due", "to", "the", "fact", "that", "the", "implant", "needs", "to", "escalate", "privileges", "before", "performing", "social", "payload", "actions", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "VB:Trojan.Valyria.186", "W97M/Downloader.c", "Trojan.OBLD-0", "O97M_BOGAVERT.A", "VB:Trojan.Valyria.186", "VB:Trojan.Valyria.186", "VB:Trojan.Valyria.186", "VB:Trojan.Valyria.186", "W97M.DownLoader.110", "O97M_BOGAVERT.A", "W97M/Downloader.c", "W97M/Dldr.Bogavert.xehvk", "TrojanDownloader:O97M/Bogavert.A", "HEUR.VBA.Trojan.e", "VB:Trojan.Valyria.186", "Trojan-Downloader.O97M.Bogavert", "heur.macro.drop.fa" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "How", "did", "Gooligan", "emerge", "?", "Our", "researchers", "first", "encountered", "Gooligan", "’", "s", "code", "in", "the", "malicious", "SnapPea", "app", "last", "year", "." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16 ]
[ "What", "makes", "this", "malware", "extremely", "powerful", "is", "the", "capability", "to", "adapt", "after", "it", "'s", "deployed", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Recent", "variants", "drop", "distinctively", "named", "malware", "such", "as", "KingKong.dll." ]
[ 16, 3, 16, 16, 16, 3, 16, 16, 1 ]
[ "Proofpoint", "researchers", "are", "tracking", "an", "espionage", "actor", "targeting", "organizations", "and", "high-value", "targets", "in", "defense", "and", "government." ]
[ 4, 12, 16, 16, 6, 14, 14, 16, 4, 16, 4, 12, 16, 4, 16, 4 ]
[ "However", ",", "his", "study", "results", "are", "out", "of", "the", "scope", "of", "our", "research", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dropper.Wolfst.A", "Trojan-Dropper.Win32!O", "TrojanDropper.Wolfst", "Trojan/Dropper.Wolfst", "TROJ_WOLFST.DRP", "Win32.Trojan.WisdomEyes.16070401.9500.9858", "Trojan.Dropper", "TROJ_WOLFST.DRP", "Trojan.Dropper.Wolfst.A", "Trojan-Dropper.Win32.Wolfst", "Trojan.Dropper.Wolfst.A", "Trojan.Win32.Wolfst.ejqa", "Dropper.Wolfst.26146", "Trojan.Dropper.Wolfst.A", "Trojan.Dropper.Wolfst.A", "Trojan.MulDrop.385", "Dropper.Wolfst.Win32.8", "BehavesLike.Win32.Dropper.tc", "W32/Trojan.DTTZ-6513", "TrojanDropper.PeStaple.t", "RiskWare[RemoteAdmin]/Win32.RMS", "Trojan.Dropper.Wolfst.A", "W32.W.Bybz.lwoN", "Trojan-Dropper.Win32.Wolfst", "Dropper/Win32.Wolfst.R141816", "Trojan.Dropper.Wolfst.A", "TScope.Trojan.Delf", "Trojan.DR.Wolfst!967kQq5cZ1Q", "Trojan-Dropper.Win32.Wolfst" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Also", ",", "when", "an", "SMS", "arrives", ",", "the", "Trojan", "puts", "the", "phone", "into", "silent", "mode", "and", "switches", "off", "the", "screen", "so", "the", "user", "doesn", "’", "t", "notice", "that", "a", "new", "SMS", "has", "arrived", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "For", "more", "information,", "see", "information", "on", "the", "EITest", "campaign", "in", "the", "Unit", "42", "blog", "titled:", "Decline", "in", "Rig", "Exploit", "Kit." ]
[ 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 4, 12, 12, 16, 16, 16, 16, 3, 11, 11 ]
[ "While", "some", "of", "the", "legitimate", "apps", "HenBox", "use", "as", "decoys", "can", "be", "found", "on", "Google", "Play", ",", "HenBox", "apps", "themselves", "have", "only", "been", "found", "on", "third-party", "(", "non-Google", "Play", ")", "app", "stores", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.IlamMak.Trojan", "Trojan.Win32.Delf!O", "Trojan.Delf", "Trojan.Delf.Win32.9224", "Win32.Trojan.Delf.ii", "W32/Trojan.HGGE-3556", "Infostealer.Yahmali", "Win32/Yahmali.C", "TSPY_YAHMALI.B", "Trojan.Win32.Delf.aam", "Trojan.Win32.Delf.dxmnga", "TSPY_YAHMALI.B", "Trojan-GameThief.Win32.Nilage", "W32/Trojan2.OXXZ", "Trojan/Delf.ia", "TR/Delf.aam.35", "Trojan/Win32.Delf", "Win32.Virut.ce.57344", "PWS:Win32/Yahmali.A", "Trojan.Win32.A.Delf.104448", "Trojan.Win32.Delf.aam", "Trojan/Win32.Yahmali.R25760", "Trojan.Autorun.Havijak.1", "Trojan.PasswordStealer", "W32/FolderToEXE.A.worm", "Win32/Delf.AAM", "Trojan.Delf!QRjoRop97so" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Elf.BillGates", "version", "targets", "Linux", "operating", "system." ]
[ 16, 1, 16, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9995" ]
[ 16, 3, 16, 16, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9933", "Trojan.Win32.Pincav.dxbist", "Trojan.Win32.Z.Zusy.618496.BJ", "Trojan.DownLoader22.56304", "BehavesLike.Win32.AdwareConvertAd.jh", "TR/AD.Corebot.mgjun", "Trojan.Zusy.D27BC8", "Trojan:Win32/Corebot.A", "Trojan.Downloader", "Win32/Trojan.BO.918" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Since", "then,", "it", "has", "evolved", "fairly", "rapidly", "and", "has", "added", "new", "capabilities,", "as", "reported." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Then", ",", "using", "POST", "requests", "to", "the", "relative", "address", "report.php", ",", "it", "sends", "data", "about", "the", "device", "(", "IMEI", ",", "phone", "number", ",", "country", ",", "mobile", "operator", ",", "phone", "model", ",", "availability", "of", "root", "rights", ",", "OS", "version", ")", ",", "list", "of", "contacts", ",", "list", "of", "installed", "apps", ",", "incoming", "SMS", ",", "and", "other", "information", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "leak", "of", "its", "code", "provides", "cybercriminals", "with", "a", "new", "weaponized", "resource", "for", "enhancing", "their", "surveillance", "operations", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Lookout", "notified", "Google", "of", "the", "potential", "threat", "shortly", "after", "it", "was", "discovered", "." ]
[ 4, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Mauvaise.SL1", "Trojan.Inject.Win32.237373", "Troj.W32.Inject!c", "W32/Trojan.JMPH-3101", "Trojan.Win32.Inject.aeryd", "Trojan.Win32.Banbra.elzzqd", "Trojan.MulDrop7.31178", "BehavesLike.Win32.PUPXBY.dh", "Trojan.Inject.vwf", "TR/Sfuzuan.jhmvt", "Trojan.Ursu.D4870", "Trojan.Win32.Inject.aeryd", "Trojan:Win32/Sfuzuan.B!bit", "Trj/GdSda.A", "Win32.Trojan.Inject.Wklz", "Trojan.PWS.Banbra!c5Sww8Szjr0", "Trojan.Win32.Sfuzuan" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Users", "may", "be", "required", "the", "help", "of", "their", "device", "manufacturer", "to", "get", "support", "for", "firmware", "flashing", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Within", "the", "time", "between", "the", "discovery", "of", "the", "vulnerability", "and", "the", "release", "of", "the", "fix,", "a", "bad", "actor", "might", "try", "to", "get", "the", "most", "out", "of", "his", "previously", "valuable", "attack", "assets." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 7, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16 ]
[ "This", "special", "exception", "handler", "is", "needed", "to", "manage", "some", "memory", "buffers", "protection", "and", "special", "exceptions", "that", "are", "used", "to", "provide", "more", "stealthy", "execution", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "malware", "has", "been", "reported", "to", "have", "been", "used", "in", "high", "profile", "breaches", "like", "the", "ones", "at", "Wellpoint/Anthem,", "VAE", "Inc,", "USIS", "and", "Mitsubishi", "Heavy", "Industries." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 4, 12, 12, 12, 16, 4, 12, 12 ]
[ "A", "backdoor", "also", "known", "as:", "TROJ_DLDR.SMI", "Win32.Trojan.WisdomEyes.16070401.9500.9976", "Trojan.Adclicker", "TROJ_DLDR.SMI", "Trojan.Win32.CcKrizCry.dpsxlj", "Troj.Downloader.W32.Helminthos.kZDa", "Downloader.KrizCry.Win32.252", "BehavesLike.Win32.Backdoor.dm", "TR/Malushka.umxne", "Trojan[Downloader]/Win32.CcKrizCry", "TrojanDownloader:Win32/Malushka.T", "Trojan/Win32.Cckrizcry.R7632", "Win32.Trojan.Dldr.Lscd", "W32/KrizCry.M!tr.dldr", "Win32/Trojan.3f8" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Vetor.PE", "Virus.Win32.Virut.1!O", "W32.Virut.G", "PE_VIRUX.R", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Worm.GBYU-0953", "W32.Virut.CF", "Win32/Virut.17408", "PE_VIRUX.R", "Virus.Win32.Virut.ce", "Virus.Win32.Virut.hpeg", "Worm.Win32.Delf.579072", "Virus.Win32.Virut.CE", "Win32.Virut.56", "Virus.Virut.Win32.1938", "Virus.Win32.Ramnit", "W32/Worm.APDA", "Win32/Virut.bt", "Virus/Win32.Virut.ce", "W32.Virut.lJ4T", "Virus.Win32.Virut.ce", "HEUR/Fakon.mwf", "Virus.Virut.14", "W32/Sality.AO", "Virus.Win32.Virut.M" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "in-depth", "report", "provides", "an", "analysis", "of", "technology,", "impact,", "possible", "attribution", "–", "and", "a", "signature", "to", "detect", "the", "malware." ]
[ 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 1, 16, 1, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9995", "Trojan-Downloader.Win32.VB.aohd", "Trojan.Win32.VB.ecbrdj", "Trojan.DownLoad2.47277", "BehavesLike.Win32.BadFile.nm", "TrojanDownloader.VB.dkqk", "Trojan-Downloader.Win32.VB.aohd", "TrojanDownloader:Win32/Vbload.J" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Those", "targeted", "include", "Paypal", "Business", ",", "Revolut", ",", "Barclays", ",", "UniCredit", ",", "CapitalOne", "UK", ",", "HSBC", "UK", ",", "Santander", "UK", ",", "TransferWise", ",", "Coinbase", ",", "paysafecard", ",", "and", "many", "more", "." ]
[ 16, 16, 16, 5, 13, 16, 5, 16, 5, 16, 5, 16, 5, 13, 16, 5, 13, 16, 5, 13, 16, 5, 16, 5, 16, 5, 16, 16, 16, 16, 16 ]
[ "BadRabbit", "is", "distributed", "as", "a", "fake", "flash", "update,", "and", "reportedly", "using", "Mimikatz,", "the", "Eternal", "Romance", "exploit,", "and", "a", "list", "of", "passwords", "to", "spread", "via", "SMB", "in", "a", "worm-like", "fashion." ]
[ 3, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 3, 11, 11, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Bitsto", "BKDR_BISCUIT.A", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "W32/TrojanX.EGVY", "BKDR_BISCUIT.A", "Trojan.Win32.Click.dsvjap", "Trojan.Click.31006", "BehavesLike.Win32.RAHack.nc", "W32/Trojan.RGTL-7538", "Backdoor:Win32/Bitsto.A", "Adware/Win32.NaviPromo.R36681" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "VPN", "package", "is", "no", "longer", "present", ",", "further", "reinforcing", "our", "conclusion", "that", "it", "was", "not", "in", "use", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "RiskWare.Tool.CK", "Trojan.Tool!qSvNdOK1TCo", "Riskware.Win32.ASEye.cjxuqg", "Virus.Win32.Heur.c", "Tool.ASEye.2", "BehavesLike.Win32.ToolTPatch.lm", "Unwanted/Win32.Patch", "Hacktool.Win32.TPE.BA", "Trojan.Feutel.AV" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "had", "again", "cloned", "a", "different", "legitimate", "Japanese", "website", "to", "host", "its", "malicious", "app", ",", "similar", "to", "what", "FakeSpy", "had", "also", "done", "before", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16 ]
[ "We", "estimate", "that", "through", "the", "malware", "s", "malicious", "activities,", "the", "perpetrators", "behind", "it", "gained", "over", "$1.5", "million", "over", "the", "course", "of", "two", "months." ]
[ 16, 16, 16, 16, 16, 3, 16, 1, 9, 6, 14, 16, 16, 16, 16, 16, 16, 16, 0, 8, 8, 8, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.MSIL.FC.6901", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Win32.Diztakun.dbjduc", "Win32.Trojan.Spy.Sudw", "BehavesLike.Win32.Trojan.dh", "Trojan.Win32.Diztakun", "W32/Trojan.IYBN-7194", "Trojan.Kazy.D82509", "Trojan:MSIL/Diztakun.A!bit", "Trojan/Win32.Diztakun.C2318558", "Trj/GdSda.A", "Win32/Trojan.c81" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/StartPage.axk", "Trojan.Startpage", "Win.Trojan.Startpage-757", "Trojan.MSIL.StartPage.bo", "Trojan.Win32.StartPage.eaqxl", "Trojan.StartPage.22255", "Trojan/StartPage.ajy", "TR/StartPage.axk.2", "Trojan:MSIL/Startpage.A", "Trojan.MSIL.StartPage.bo", "Trojan/Win32.StartPage.C59843", "Trj/CI.A", "MSIL/StartPage.A", "Win32.Trojan.Startpage.cduj", "Trojan.StartPage!8fKymuz2/+o", "Trojan.Win32.StartPage", "W32/StartPage.PL!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Morto.dll.b", "Trojan/Morto.l", "WORM_MORTO.SM2", "Worm.Win32.Morto!IK", "Worm.Win32.Morto.~dln", "Worm/Morto.dlnam", "WORM_MORTO.SM2", "W32/Morto.dll.b", "Worm:Win32/Morto.D", "Worm/Win32.Morto", "Worm.Win32.Morto.h", "Worm.Win32.Morto", "W32/Morto.A!tr", "Worm/Morto.D" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Adversaries", "have", "been", "seen", "leveraging", "JexBoss,", "an", "open", "source", "tool", "for", "testing", "and", "exploiting", "JBoss", "application", "servers,", "to", "gain", "a", "foothold", "in", "the", "network." ]
[ 16, 16, 16, 16, 16, 3, 16, 1, 9, 9, 9, 9, 9, 9, 5, 13, 13, 16, 16, 16, 16, 16, 16, 1 ]
[ "However", ",", "it", "could", "easily", "be", "used", "for", "far", "more", "intrusive", "and", "harmful", "purposes", "such", "as", "banking", "credential", "theft", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "this", "case,", "Proofpoint", "researchers", "discovered", "an", "infected", "Android", "version", "of", "the", "newly", "released", "mobile", "game", "Pokemon", "GO" ]
[ 16, 16, 16, 4, 12, 16, 16, 16, 5, 13, 16, 16, 16, 16, 5, 13, 13, 13 ]
[ "Upon", "loading", "the", "rtf", "document,", "it", "will", "drop", "a", "base64", "encoded", "powershellscript", "in", "the", "following", "location:%TEMP%\\log.ps1" ]
[ 16, 16, 1, 9, 9, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Detrahere", "Trojan.Midie.DA596", "TROJ_KRYPTIK_HA22006D.UVPM", "Trojan.Win32.DownLoad3.exdqqe", "Trojan.DownLoad3.64586", "Trojan.Kryptik.Win32.1347406", "TROJ_KRYPTIK_HA22006D.UVPM", "Trojan.MSIL.ikyj", "TR/Crypt.ZPACK.hgndb", "Trojan:Win32/Detrahere.E", "Trojan/Win32.Tiggre.R216587", "Trojan.Crypt", "Win32/Trojan.daa" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Now", "more", "threat", "actors", "are", "leveraging", "the", "vulnerability", "in", "Microsoft", "Server", "Message", "Block", "SMB", "protocol", "–", "this", "time", "to", "distribute", "Backdoor.Nitol", "and", "Trojan", "Gh0st", "RAT." ]
[ 16, 16, 6, 14, 16, 16, 16, 7, 16, 5, 13, 13, 13, 13, 13, 16, 16, 16, 16, 16, 1, 16, 3, 11, 11 ]
[ "When", "a", "user", "enters", "an", "Internet", "banking", "site", "on", "a", "computer", "infected", "by", "banking", "malware", "(", "ZeuS", ",", "Citadel", ")", ",", "a", "request", "about", "the", "smartphone", "number", "and", "type", "of", "operating", "system", "is", "injected", "into", "the", "code", "of", "the", "authentication", "page", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Specifically,", "the", "format", "resembles", "custom", "virtual", "machine", "code,", "where", "numeric", "hexadecimal", "identifiers", "present", "in", "the", "configuration", "file", "make", "the", "stealer", "run", "desired", "functions." ]
[ 16, 16, 16, 16, 16, 5, 13, 16, 16, 1, 9, 16, 16, 16, 16, 1, 9, 16, 16, 3, 11, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Stration.DDA@mm", "Win32.Stration.DDA@mm", "I-Worm.Warezov.r3", "Win32.Stration.DDA@mm", "Trojan.Win32.Warezov.ehypz", "W32/Worm.ARBW", "W32.Stration@mm", "Win32.Stration.DDA@mm", "I-Worm.Opnis!V3KJQVovhbU", "I-Worm.Win32.Warezov.20480.AW[h]", "Win32.Worm-email.Warezov.Lpvc", "Win32.Stration.DDA@mm", "Worm.Win32.Warezov.~AD", "Win32.Stration.DDA@mm", "Win32.HLLM.Limar.3939", "Worm.Warezov.Win32.123", "W32/Worm.IQCC-3677", "I-Worm.Warezov.bu", "WORM/Warezov.2048.1", "W32/Stration.KG!tr", "Worm[Email]/Win32.Warezov", "Win32.Stration.E878FD", "Worm:Win32/Stration.ST", "Win32/Stration.AHP", "Worm.Win32.Warezov.aK", "Worm.Win32.Warezov", "Win32.Stration.DDA@mm", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Figure", "1", ":", "β€˜", "Agent", "Smith", "’", "s", "modular", "structure", "Technical", "Analysis", "–", "Loader", "Module", "The", "β€œ", "loader", "”", "module", ",", "as", "stated", "above", ",", "extracts", "and", "runs", "the", "β€œ", "core", "”", "module", "." ]
[ 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Table", "4", "below", "lists", "the", "intents", "that", "are", "statically", "registered", "in", "this", "HenBox", "variant", "’", "s", "AndroidManifest.xml", "config", "file", ",", "together", "with", "a", "description", "of", "what", "that", "intent", "does", ",", "and", "when", "it", "would", "be", "used", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Heur.E38E91", "Win32.Trojan.WisdomEyes.16070401.9500.9982", "WORM_AMBLER.SMZ", "Trojan-Spy.Win32.Amber.zdc", "Trojan.Win32.Amber.etbxtl", "Win32.Trojan-spy.Amber.Wskc", "Trojan-Spy.Win32.Ambler", "WORM_AMBLER.SMZ", "BehavesLike.Win32.Virut.qc", "Trojan-Dropper.Win32.Ambler", "W32/Trojan.MMWY-8251", "TrojanSpy:Win32/Ambler.D", "Trojan-Spy.Win32.Ambler", "Win32/AutoRun.Spy.Ambler.NAW" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "green", ",", "we", "can", "see", "the", "references", "to", "the", "SMS", "API", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Keylogger.Win32.19936", "Trojan/Spy.nut", "Win32.Trojan.WisdomEyes.16070401.9500.9996", "Trojan.DownLoader6.20458", "Trojan/Win32.Graftor.R31665", "TrojanSpy.KeyLogger!VshB9boiuX0", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "Chunghwa", "Post", "-", "The", "government-owned", "corporation", "Chunghwa", "is", "the", "official", "postal", "service", "of", "Taiwan", "." ]
[ 4, 12, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "With", "that", "inclusion,", "companies", "running", "on", "those", "systems", "will", "also", "be", "at", "risk." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "main", "infection", "vector", "is", "a", "phishing", "attack", "using", "SMS/MMS", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "RemoteAdmin.Win32.RAT!O", "Backdoor.Daromec", "Backdoor.Breut", "not-a-virus:RemoteAdmin.Win32.RAT.a", "Trojan.Win32.MLW.dbyfty", "BackDoor.Comet.21", "Trojan[RemoteAdmin]/Win32.RAT", "not-a-virus:RemoteAdmin.Win32.RAT.a", "Backdoor:Win32/Daromec.A", "RiskWare.RemoteAdmin", "Trojan.MiniUPnP!L9xsRhGGfN0" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "More", "data", "is", "appearing", "daily", ",", "leading", "us", "to", "believe", "the", "actors", "are", "still", "highly", "active", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "That", "domain", "still", "hosts", "the", "malicious", "Flash", "file", "CVE-2015-7645", "that", "it", "previously", "used", "in", "standalone", "attacks." ]
[ 1, 9, 16, 16, 16, 3, 5, 1, 9, 15, 16, 16, 16, 16, 1, 9 ]
[ "On", "August", "4,", "2016,", "the", "Gmail", "account", "of", "an", "unknown", "individual", "was", "compromised", "in", "order", "to", "conduct", "spearphishing", "campaigns", "against", "a", "diverse", "set", "of", "targets", "related", "to", "Iran." ]
[ 16, 0, 8, 8, 16, 5, 13, 16, 16, 4, 12, 16, 1, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 2 ]