tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "The", "attack", "is", "part", "of", "a", "trend", "where", "threat", "groups", "hide", "malicious", "activity", "by", "communicating", "with", "legitimate", "web", "services", "such", "as", "social", "networking", "and", "cloud", "storage", "sites", "to", "foil", "detection", "efforts." ]
[ 16, 1, 16, 16, 16, 16, 4, 16, 6, 14, 16, 16, 16, 16, 1, 9, 9, 9, 9, 16, 16, 1, 9, 16, 1, 9, 9, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Program.Hadsruda", "Trojan.Razy.D2C7F5", "Win32.Trojan-Downloader.Adload.aa", "Win.Malware.Zusy-5689722-0", "Riskware.Win32.AdLoad.epwtbh", "Adware.Oxypumper.159236", "Application.Win32.OxyPumper.ADA", "Trojan.DownLoader26.15650", "Adware.OxyPumper.Win32.616", "BehavesLike.Win32.Trojan.cc", "W32/Trojan.TQZU-9354", "Adware.Adload.cqi", "ADWARE/OxyPumper.vgssx", "GrayWare[AdWare]/Win32.AdLoad", "Adware.OxyPumper/Variant", "Trojan.Downloader", "Trj/GdSda.A", "Win32.Trojan.Razy.Lmkk", "PUA.AdLoad!", "PUA.OxyPumper", "Win32/Trojan.4e9" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dynamer.A5", "Win32.Trojan.WisdomEyes.16070401.9500.9603", "not-a-virus:NetTool.Win64.RPCHook.a", "BehavesLike.Win32.Downloader.vc", "TrojanDownloader.Paph.ds", "Trojan[Downloader]/Win32.Betload", "Trojan.Jaike.DD8D", "Troj.W32.Inject.tnKf", "not-a-virus:NetTool.Win64.RPCHook.a", "Trojan-Downloader.Win32.Moure", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "previously", "reported", "on", "SamSam", "ransomware", "charging", "high", "ransoms", "for", "infected", "servers." ]
[ 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 5, 13 ]
[ "We", "believe", "that", "an", "industry-wide", "collaboration", "and", "information-sharing", "is", "important", "in", "defending", "customers", "against", "this", "complex", "piece", "of", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.S_Gamma.Trojan", "Trojan/W32.Obfuscated.770368", "Trojan.Win32.Obfuscated!O", "Trojan.VBCrypt.MF.137", "WORM_IRCBOT.BXN", "Win32.Worm.VB.rx", "W32/VB.Worm.A", "W32.Mibling", "Win32/Malinbot.A", "WORM_IRCBOT.BXN", "Trojan.Win32.Obfuscated.aiiz", "Trojan.Win32.Obfuscated.700736", "Troj.W32.Obfuscated.l2p6", "Trojan.Click.43851", "BehavesLike.Win32.Ramnit.bc", "W32/VB.Worm.A", "Worm:Win32/Lamin.A", "Worm:Win32/Lamin.A", "Trojan.Win32.Obfuscated.aiiz", "Trojan.Obfuscator", "Trj/Dropper.AJT", "Win32/VB.NRJ", "Trojan.Obfuscated.AHVV" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32/PSW.Katalog", "Trojan-PWS/W32.Katalog.61440", "Trojan/PSW.Katalog", "Trojan.PWS.Katalog!pK2Uo9nMTKQ", "TROJ_KATALOG.A", "Trojan-PSW.Win32.Katalog", "Trojan.Win32.Katalog-Psw.fjsg", "Trojan.Win32.A.PSW-Katalog.61440[h]", "TrojWare.Win32.PSW.Katalog", "TROJ_KATALOG.A", "W32/Trojan.XHBZ-0001", "Trojan/PSW.Katalog", "TR/Katalog.PSW", "W32/Katalog.A!tr.pws", "Trojan[PSW]/Win32.Katalog", "Win32.Troj.pswKatalog.kcloud", "Downloader/Win32.VB", "TrojanPSW.Katalog", "Trj/PSW.Katalog", "Trojan.Win32.InfoStealer.Ahg", "Win32/Trojan.PSW.b74" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Dark", "Power", "ransomware", "gang", "is", "new", "on", "the", "block,", "and", "is", "trying", "to", "make", "a", "name", "for", "itself." ]
[ 6, 14, 14, 14, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "description", "is", "based", "on", "analysis", "of", "the", "sample", "described", "in", "Table", "3", "below", ",", "which", "was", "of", "interest", "given", "its", "C2", "domain", "mefound", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9 ]
[ "The", "collection", "of", "basic", "device", "information", "." ]
[ 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "141", "2020-04-26", "In", "the", "course", "of", "the", "investigation", ",", "the", "team", "discovered", "a", "potential", "link", "to", "an", "additional", "Android", "infostealer", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16 ]
[ "During", "patching", ",", "the", "Trojan", "will", "overwrite", "the", "existing", "code", "with", "malicious", "code", "so", "that", "all", "it", "can", "do", "is", "execute", "/system/bin/ip", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Dropper.Grizl.kp", "W32/Dropper.ANGS", "Infostealer.Gampass", "TSPY_ONLINEG.SMA", "Trojan-GameThief.Win32.Lmir!IK", "TrojWare.Win32.PSW.OnLineGames.NYT0", "Trojan.PWS.Gamania.22629", "TSPY_ONLINEG.SMA", "TrojanDropper:Win32/Lolyda.F", "W32/Dropper.ANGS", "Trojan/Win32.Lmir", "TrojanPSW.Lmir.jfz", "Win32/PSW.OnLineGames.NYT", "Trojan.PSW.Win32.GameOnline.gcv", "Trojan-GameThief.Win32.Lmir", "W32/Grizl.GA!tr.dldr", "PSW.OnlineGames3.WPS", "Trj/Krap.Y" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "com", "also", "resolved", "to", "the", "same", "IP", "address", ",", "suggesting", "that", "these", "two", "domains", "are", "associated", "with", "the", "same", "threat", "actors", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Ransom.BHE", "Ransom.Petya.S19638", "Trojan.Ransom.BHE", "W32/GoldenEye.SONR-5498", "Ransom.Goldeneye", "Ransom_PETYA.SM1", "Trojan.Ransom.BHE", "Trojan.Win32.MBRlock.epgnaf", "Trojan.Ransom.BHE", "Trojan.MBRlock.265", "Trojan-Ransom.GoldenEye", "W32/GoldenEye.D", "Trojan.DiskWriter.bp", "W32/Petya.D!tr.ransom", "Trojan.Ransom.BHE", "Trojan/Win32.Petr.C1697437", "Trojan.Ransom.BHE", "Ransom.Petya", "Trojan.Petya", "Hoax.Petr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.AB21", "Trojan-Downloader.Win32.Firu!O", "Troj.Downloader.W32!c", "Trojan/Downloader.Firu.bp", "Win32.Trojan.WisdomEyes.16070401.9500.9958", "Trojan-Downloader.Win32.Firu.bp", "Trojan.Packed.418", "BehavesLike.Win32.Dropper.mc", "Trojan-Downloader.Win32.Firu.bp", "W32/Trojan.BNRM-7642", "TrojanDownloader.Firu.t", "Trojan:Win32/Bohmini.A", "Trojan-Downloader.Win32.Firu.bp", "Trojan/Win32.Xema.C57004", "TrojanDownloader.Firu", "Trj/Downloader.VMH", "Win32.Trojan-downloader.Firu.Tcmb", "Win32/Trojan.Downloader.d1e" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Recently,", "we", "spotted", "a", "new", "attack", "where", "PowerShell", "was", "abused", "to", "deliver", "a", "FAREIT", "variant." ]
[ 16, 16, 16, 16, 16, 1, 16, 5, 16, 7, 16, 16, 16, 3, 11 ]
[ "]", "it", "Catania", "server1fermo.exodus.connexxa", "[", "." ]
[ 9, 9, 16, 1, 9, 9 ]
[ "The", "newly", "discovered", "samples", "show", "new", "capabilities", "not", "previously", "documented." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "is", "not", "common", "to", "use", "this", "program", "to", "distribute", "malware", ",", "although", "there", "have", "been", "past", "cases", "where", "malware", "authors", "have", "done", "so", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "As", "the", "code", "snippet", "shows", ",", "the", "malware", "creates", "a", "notification", "builder", "and", "then", "does", "the", "following", ":", "setCategory", "(", "β€œ", "call", "”", ")", "–", "This", "means", "that", "the", "notification", "is", "built", "as", "a", "very", "important", "notification", "that", "needs", "special", "privilege", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "What", "is", "most", "interesting", "about", "this", "group's", "more", "recent", "activity", "however,", "is", "their", "focus", "on", "users", "of", "encryption", "tools,", "peaking", "this", "summer." ]
[ 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16 ]
[ "Using", "intel", "from", "this", "research", ",", "we", "have", "made", "Office", "365", "ATP", "more", "resistant", "to", "FinFisher", "’", "s", "anti-sandbox", "checks", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 3, 16, 16, 16, 16, 16 ]
[ "Once", "the", "malware", "is", "installed", "on", "the", "victim's", "device,", "it", "opens", "a", "back", "door,", "collects", "a", "list", "of", "system-specific", "information,", "and", "sends", "it", "to", "the", "command", "and", "control", "C&C", "server", "to", "register", "the", "device", "and", "then", "get", "a", "unique", "identifier", "for", "the", "infected", "device." ]
[ 16, 16, 3, 16, 16, 16, 16, 5, 13, 16, 16, 16, 3, 11, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 16, 16, 5, 13, 16, 16, 16, 16, 1, 9, 16, 5, 13, 13 ]
[ "We", "believe", "the", "use", "of", "the", "Retadup", "malware", "family", "is", "limited", "to", "a", "very", "small", "set", "of", "threat", "actors." ]
[ 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14 ]
[ "On", "May", "30th", "our", "honeypots", "captured", "the", "first", "attack", "to", "make", "use", "of", "this", "particular", "vulnerability,", "but", "the", "payload", "in", "this", "exploit", "had", "nothing", "in", "common", "with", "the", "Trojan-Crypt", "that", "was", "EternalBlue", "and", "WannaCry." ]
[ 16, 0, 8, 16, 5, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 7, 16, 16, 3, 16, 16, 3, 16, 16, 16, 16, 16, 16, 3, 16, 16, 3, 16, 3 ]
[ "Generally", ",", "after", "an", "application", "gets", "banned", "from", "an", "official", "app", "store", ",", "such", "as", "Google", "Play", ",", "users", "try", "to", "find", "alternative", "ways", "to", "download", "the", "app", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Conclusion", "Although", "not", "yet", "mature", "enough", "to", "provide", "the", "equivalent", "of", "a", "full-blown", "set", "of", "Android", "banking", "malware", "features", "(", "such", "as", "RAT", ",", "RAT", "with", "ATS", "(", "Automated", "Transaction", "Script", ")", ",", "back-connect", "proxy", ",", "media", "streaming", ")", ",", "or", "providing", "an", "exhaustive", "target", "list", ",", "Cerberus", "should", "not", "be", "taken", "lightly", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.Rogue.bjbo", "W32/Trojan.AMVM-7843", "TR/Rogue.7932483", "Trojan.Graftor.DBF88", "Backdoor/Win32.Etso.R61020", "Trojan.Win32.Webprefix", "Win32/Trojan.Multi.daf" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Carbanak", "team", "does", "not", "just", "blindly", "compromise", "large", "numbers", "of", "computers", "and", "try", "to", "milk", "the", "cow'", "as", "other", "actors", "do,", "instead", "they", "act", "like", "a", "mature", "APT-group." ]
[ 6, 14, 14, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 6 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9831", "Bloodhound.Gampass.E", "Trojan.Win32.Patched.ox", "Trojan.Win32.PatchedDll.C", "BehavesLike.Win32.BadFile.cm", "Virus.Win32.Crypted", "Trojan/PSW.OnLineGames.ckdm", "Trojan/Win32.Patched.ox", "PWS:Win32/Cuepilini.A", "Trojan.Win32.Patched.ox", "Trojan.Win32.Patched.b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Based", "on", "VirusTotal", "uploads,", "malicious", "documents", "content,", "and", "known", "victims", "–", "other", "targeted", "organizations", "are", "located", "in", "Turkey,", "Qatar,", "Kuwait,", "United", "Arab", "Emirates,", "Saudi", "Arabia,", "and", "Lebanon." ]
[ 16, 16, 4, 16, 1, 9, 9, 16, 16, 4, 16, 16, 16, 4, 16, 16, 16, 16, 10, 10, 10, 10, 10, 10, 10, 16, 2 ]
[ "It", "includes", "information", "about", "the", "smartphone", "model", ",", "the", "OS", "version", ",", "the", "mobile", "operator", ",", "and", "the", "Trojan", "version", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Jorik.Crix!O", "Win32.Trojan.WisdomEyes.16070401.9500.9992", "Trojan.Win32.Dwn.sbard", "Trojan.Win32.A.Inject.129544", "Trojan.DownLoader5.50729", "Win32.Malware", "Trojan/Lebag.auv", "TrojanDownloader:Win32/Beshades.A", "Trojan/Win32.Inject.R29920", "BScope.Malware-Cryptor.4112", "Trj/CI.A", "Trojan.DL.Injecter!F6PQPalmepA", "W32/Injecter.AA!tr.dldr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "xDedic", "is", "a", "trading", "platform", "where", "cybercriminals", "can", "purchase", "any", "of", "over", "70,000", "hacked", "servers", "from", "all", "around", "the", "internet." ]
[ 6, 16, 16, 6, 14, 16, 6, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9889", "Trojan.Sniff", "BehavesLike.Win32.BadFile.mc", "PWS:Win32/Finsgra.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "Unit", "42", "does", "not", "have", "detailed", "targeting", "information", "for", "all", "known", "Bookworm", "samples,", "but", "we", "are", "aware", "of", "attempted", "attacks", "on", "at", "least", "two", "branches", "of", "government", "in", "Thailand." ]
[ 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 4, 16, 2 ]
[ "Sending", "information", "about", "the", "affected", "device", "The", "app", "receives", "configuration", "data", "from", "the", "C", "&", "C", "server", ",", "needed", "for", "displaying", "ads", ",", "and", "for", "stealth", "and", "resilience", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Elitespyz.A", "Backdoor/W32.EliteSpyz.1687552", "Backdoor.Elitespyz", "Backdoor.Elitespyz.A", "Backdoor.Elitespyz.A", "W32/Risk.FRAF-2715", "Backdoor.Trojan", "BKDR_ELITESPYZ.A", "Backdoor.Elitespyz.A", "Backdoor.Win32.EliteSpyz.4", "Backdoor.Elitespyz.A", "Trojan.Win32.EliteSpyz.dgpj", "Backdoor.Win32.EliteSpyz.1687552", "Backdoor.W32.EliteSpyz.4!c", "Backdoor.Elitespyz.A", "Backdoor.Win32.EliteSpyz.04", "Backdoor.Elitespyz.A", "BackDoor.EliteSpyz.4", "Backdoor.EliteSpyz.Win32.1", "BKDR_ELITESPYZ.A", "Trojan.Win32.Elitespyz", "Backdoor/EliteSpyz.4", "W32.Hack.Tool", "BDS/EliteSpyz.4", "Trojan[Backdoor]/Win32.EliteSpyz", "Backdoor.Win32.EliteSpyz.4", "Backdoor.EliteSpyz", "Win32/EliteSpyz.04", "Win32.Backdoor.Elitespyz.Wrgi", "Backdoor.EliteSpyz!8lwaYNdDuBo", "W32/EliteSpy.A!tr.bdr", "Win32/Backdoor.Spy.754" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Uncrre", "TR/RedCap.wfhca", "Trojan.Win32.Z.Uncrre.3584", "Trojan:Win32/Uncrre.A", "Trojan.Win32.Uncrre", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.Ruskill.143360", "Backdoor.Win32.Ruskill!O", "Worm.Ainslot.A", "Backdoor.Ruskill.Win32.42", "Backdoor.W32.Ruskill.fi!c", "Backdoor/Ruskill.fi", "TROJ_DROPR.SMIO", "Worm.Win32.Ngrbot.dfk", "Trojan.Win32.StartPage.cjvsv", "Trojan.Win32.Menti.98304", "TrojWare.Win32.Injector.GWW", "BackDoor.IRC.Bot.892", "TROJ_DROPR.SMIO", "Trojan.Win32.Buzus", "Backdoor/Ruskill.da", "W32/Injector.HCR!tr", "Worm/Win32.Ngrbot", "Worm.Win32.Ngrbot.dfk", "Worm/Win32.AutoRun.R6237", "Worm.Ngrbot", "Win32.Trojan.Inject.Auto", "Backdoor.Ruskill!/ah4op3yVOE" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Since", "approximately", "September", "2022,", "cyber", "criminals", "have", "compromised", "U.S.", "and", "international", "organizations", "with", "a", "Royal", "ransomware", "variant." ]
[ 16, 16, 0, 8, 6, 14, 16, 1, 4, 16, 4, 12, 16, 16, 3, 11, 16 ]
[ "The", "new", "payload", "is", "decrypted", ",", "remapped", ",", "and", "executed", "in", "memory", ",", "and", "represents", "the", "installation", "and", "persistence", "stage", "of", "the", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W97M.Dropper.H", "W97M.Dropper.CB", "W97M/Dropper.m", "Troj.Downloader.Msword!c", "W97M/Dropexe.A", "W97M.Dropper.H", "W97M.Dropper.H", "W97M.Dropper.H", "W97M.Dropper.H", "W97M/Dropper.m", "W97M/Dropexe.A", "HEUR/Macro.Dropper", "HEUR.VBA.Trojan.d", "W97M.Dropper.H", "macro.ole.encodedownload.f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "all", "cases", ",", "the", "ads", "are", "used", "to", "convince", "users", "to", "install", "other", "apps", "from", "different", "developer", "accounts", ",", "but", "written", "by", "the", "same", "group", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "has", "outlived", "several", "competitors", "including", "Zeus,", "and", "SpyEye." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 3 ]
[ "Dyre", "employed", "the", "spambot", "Gophe", "to", "send", "thousands", "of", "randomized", "documents", "hashes", "and", "file", "names", "per", "spam", "campaign" ]
[ 3, 16, 16, 3, 11, 16, 1, 9, 9, 9, 9, 16, 16, 16, 16, 16, 6, 14 ]
[ "Throughout", "2015", "and", "2016,", "Android", "banking", "Trojans", "were", "primarily", "distributed", "outside", "the", "Google", "Play", "Store", "by", "using", "SMSishing,", "phishing", "e-mails", "and", "rogue", "websites,", "often", "dropping", "APKs", "related", "to", "Adobe", "Flash", "Player." ]
[ 16, 0, 16, 0, 3, 11, 11, 16, 16, 16, 16, 5, 13, 13, 13, 16, 16, 1, 9, 9, 16, 1, 9, 16, 16, 5, 16, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9935", "TrojanDownloader:Win32/Leodon.D" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "On", "June", "14th,", "2017,", "a", "new", "variant", "of", "ZXShell", "appears", "to", "have", "been", "uploaded", "from", "the", "Marmara", "region", "of", "Turkey." ]
[ 16, 0, 8, 8, 16, 16, 3, 16, 3, 16, 16, 16, 16, 16, 16, 2, 10, 10, 16, 2 ]
[ "BootComplete", "starts", "the", "AutoStartup", "service", "and", "the", "AutoStartup", "service", "makes", "sure", "that", "MainActivity", "is", "always", "running", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Razy.D3E075", "Trojan.MSIL.Crypt.gbqy", "BehavesLike.Win32.Trojan.gc", "Trojan.MSIL.Crypt", "TR/Kryptik.psxte", "Backdoor:Win32/Dodiw.A", "Trojan.MSIL.Crypt.gbqy", "Trj/GdSda.A", "MSIL/Kryptik.MQQ!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Tick", "also", "uses", "a", "range", "of", "hacktools", "to", "map", "the", "victim's", "network", "and", "attempt", "to", "escalate", "privileges", "further." ]
[ 6, 16, 16, 16, 16, 16, 3, 16, 1, 9, 9, 9, 16, 16, 16, 1, 9, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9993", "Trojan.Win32.KrServ.rq", "Trojan.Win32.JackServn.exlgil", "Trojan.Win32.Z.Jackservn.306688", "Trojan.DownLoader26.11701", "Trojan.Win64.Jackservn", "TR/JackServn.sphdt", "Trojan.Downloader.184", "Trojan.Win32.KrServ.rq", "Trj/CI.A", "W32/JackServn.K!tr", "Win32/Trojan.Downloader.369" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clodeb4.Trojan.8496", "Trojan/W32.Scar.350208.E", "W32/Autorun.worm.bcd", "Worm.Autorun", "Trojan/Scar.dyfr", "W32/MalwareS.BDRB", "W32.Huanot", "Virut.A[gs]", "Win32/Huanot.A", "WORM_HUANOT.SMIA", "Trojan.Scar-846", "Trojan.Win32.Scar.bvisc", "Trojan.Win32.A.Scar.350208", "Trojan.Copyself.101", "TR/Scar.ccwl", "WORM_HUANOT.SMIA", "W32/Autorun.worm.bcd", "Trojan/Scar.pkp", "Worm:Win32/Huanot.A", "Trojan/Win32.Scar", "W32/Risk.JTAZ-7050", "Virus.Win32.Heur.l", "W32/Autorun.JXD", "PE:Malware.FakeFolder@CV!1.6AA9", "Worm.Win32.Huanot" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "New", "versions", "of", "FakeSpy", "masquerade", "as", "government", "post", "office", "apps", "and", "transportation", "services", "apps", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Virut.Cur1", "W32/Manex.worm", "Trojan.Zusy.D62E9", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Dropper.BBXI", "Win.Trojan.Cosmu-1044", "Trojan.Win32.Scar.ojal", "Trojan.Win32.AutoRun.cgsnz", "Worm.Win32.A.AutoRun.310273", "W32.W.AutoRun.cikl!c", "Win32.HLLW.Autoruner.27598", "Trojan.Cosmu.Win32.3832", "W32/Manex.worm", "W32/Risk.SOOH-5229", "Trojan/Cosmu.dxm", "Trojan/Win32.Cosmu", "Worm:Win32/Vestgo.A", "Trojan.Win32.Scar.ojal", "HEUR/Fakon.mwf", "Worm.AutoRun", "Win32.Trojan.Scar.Dxwy", "Trojan.Scar!/4mh5woJZa8" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "comfeteh-asefa", "[", "." ]
[ 9, 9, 9, 9 ]
[ "Deutsche", "Post", "-", "Deutsche", "Post", "DHL", "Group", ",", "a", "German", "multinational", "package", "delivery", "and", "supply", "chain", "management", "company", "headquartered", "in", "Bonn", "." ]
[ 4, 12, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.CDB.C8b2", "TrojanBanker.Banker.awoc", "Trojan.Win32.Banker.bdicvp", "W32/MalwareF.FQTI", "Infostealer.Bancos", "Trojan-Banker.Win32.Banker.awoc", "Trojan.PWS.Banker!/1rqiSjn+V4", "TrojWare.Win32.Spy.Banker.awoc", "Trojan-Banker.Win32.Banker", "TR/Banker.Banker.awoc", "Trojan/Banker.Banker.kbj", "Trojan:Win32/Sawmabs.A", "W32/Risk.BGBM-2797", "Trojan-GameThief.Magania", "Trj/Thed.E", "Win32/Spy.Delf.NZK", "Trojan-Banker.Win32.Banker", "W32/Banker.AWOC!tr", "PSW.Banker5.BFQR", "Trojan.Win32.Delf.amo" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Infection", "During", "installation", ",", "depending", "on", "the", "version", "of", "the", "Trojan", ",", "Asacub", "prompts", "the", "user", "either", "for", "Device", "Administrator", "rights", "or", "for", "permission", "to", "use", "AccessibilityService", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "attack", "against", "Anthem", "resulted", "in", "the", "largest", "known", "healthcare", "data", "breach", "to", "date,", "with", "80", "million", "patient", "records", "exposed." ]
[ 16, 1, 16, 4, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "ITG08", "also", "has", "gained", "initial", "access", "by", "targeting", "specific", "employees", "with", "LinkedIn", "and", "spear-phishing", "emails", "to", "deliver", "the", "More_eggs", "backdoor." ]
[ 6, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 16, 1, 9, 16, 16, 3, 11, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Constructor.Xploitzomshc.A", "Constructor/W32.XploitZomShc.253952", "Hacktool.Zomshc", "Trojan/Constructor.XploitZomShc.a", "Trojan.Constructor.Xploitzomshc.A", "W32/TrojanX.GSC", "Construction.Kit", "Trojan.Constructor.Xploitzomshc.A", "Constructor.Win32.XploitZomShc.a", "Trojan.Constructor.Xploitzomshc.A", "Riskware.Win32.XploitZomShc.hrxx", "Constructor.XploitZomShc.253952", "Constructor.W32.XploitZomShc.a!c", "Win32.Trojan.Xploitzomshc.Wqwm", "Trojan.Constructor.Xploitzomshc.A", "Trojan.Constructor.Xploitzomshc.A", "VirusConstructor.Shc", "Tool.XploitZomShc.Win32.1", "BehavesLike.Win32.Dropper.dc", "Trojan.Constructor.Xploitzomshc", "W32/Trojan.KXHA-5736", "Constructor.XploitZomShc.b", "W32.Hack.Tool", "KIT/XploitZomShc.A", "HackTool[Constructor]/Win32.XploitZomShc", "VTool.XploitZomShc.a.kcloud", "Constructor.Win32.XploitZomShc.a", "Trojan.Constructor.Xploitzomshc.A", "Constructor.XploitZomShc", "W32/XploitZomShc.A!tr", "Win32/Constructor.96c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9986", "Trojan-Downloader.Win32.Hover2.n", "TrojWare.Win32.TrojanDownloader.Small.NZK", "Trojan.DownLoader.45214", "Trojan-Downloader.Win32.Hover2.n", "Win32/TrojanDownloader.Small.NZK" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanSpy.MSIL.r3", "Trojan.Dropper", "Troj.PSW.MSIL.NetPass", "Trojan/Clicker.nai", "TrojanSpy.KeyLogger!3foOCbTDOkQ", "Spyware.ADH", "MSIL/TrojanClicker.NAI", "Trojan.Msil-382", "Trojan-Spy.MSIL.KeyLogger.bybj", "Trojan.Win32.NetPass.dcndda", "Msil.Trojan-spy.Keylogger.Lhxb", "Trojan.MulDrop1.48625", "Trojan/PSW.MSIL.oy", "W32/Dx.SUK!tr", "Trojan[PSW]/MSIL.NetPass", "Trojan.MSIL.Krypt.1", "Trojan/Win32.Infostealer", "TrojanClicker:MSIL/Lnkhit.A", "MSIL.TrojanClicker", "Virus.MSIL", "Trojan.MSIL.KeyLogger.bybj", "Win32/Trojan.bee" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "If", "the", "malware", "successfully", "became", "the", "default", "SMS", "app", ",", "it", "sends", "the", "words", "β€œ", "the", "app", "has", "been", "replaced", "”", "in", "Russian", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Kill", "switches", "are", "used", "by", "many", "malware", "authors", "to", "remove", "traces", "from", "a", "device", "after", "a", "successful", "operation", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win.Trojan.Shell-426", "Backdoor:Win32/Sensode.G", "Trj/GdSda.A", "Win32/Trojan.75c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "The", "domain", "was", "registered", "on", "March", "8th", ",", "2013", ":", "Registration", "Service", "Provided", "By", ":", "SHANGHAI", "MEICHENG", "TECHNOLOGY", "INFORMATION", "DEVELOPMENT", "CO.", ",", "LTD.", "Domain", "Name", ":", "DLMDOCUMENTSEXCHANGE.COM", "Registration", "Date", ":", "08-Mar-2013", "Expiration", "Date", ":", "08-Mar-2014", "Status", ":", "LOCKED", "The", "domain", "registration", "data", "indicates", "the", "following", "owner", ":", "Registrant", "Contact", "Details", ":", "peng", "jia", "peng", "jia", "(", "bdoufwke123010", "@", "gmail.com", ")", "beijingshiahiidienquc.d", "beijingshi", "beijing,100000", "CN", "Tel", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 12, 12, 12, 12, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 1, 16, 16, 16, 16, 16 ]
[ "The", "desktop", "components", "of", "this", "attack", ",", "previously", "discovered", "by", "Palo", "Alto", "Network", ",", "are", "known", "as", "KasperAgent", "and", "Micropsia", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 16, 16, 16, 3, 16, 3, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Win32.Poison.C12016" ]
[ 16, 3, 16, 16, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Payreen", "Trojan.Ransom.TechSupportScam", "Trojan.Win32.Payreen.evwzbn", "W32/Trojan.JXJF-8565", "TR/Payreen.exevx", "SupportScam:MSIL/Payreen.A", "Trojan.TechSupportScam", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Python/Agent.F", "is", "a", "worm", "that", "spreads", "via", "removable", "media." ]
[ 1, 16, 16, 3, 16, 16, 16, 5, 13 ]
[ "This", "post", "intends", "to", "share", "the", "findings", "of", "the", "FortiGuard", "Lion", "Team", "on", "BlackMoon's", "prevalence", "and", "its", "latest", "code", "updates." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 3, 16, 16, 16, 16, 16, 16 ]
[ "The", "Trojan", "may", "download", "files", "from", "the", "following", "remote", "location:", "[http://]bit.ly/2k4[REMOVED]" ]
[ 16, 3, 16, 16, 1, 16, 16, 16, 1, 9, 9 ]
[ "The", "server", "then", "sends", "a", "reply", "that", "contains", "instructions", "on", "further", "actions", "to", "be", "taken", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Exploit/W32.CVE-2014-4114.I", "JS.Swabfex.QZ", "Exploit.CVE-2014-4114.A", "Troj.W32.Autoit!c", "Trojan.PPDropper", "TROJ_CVE20144114.G", "Trojan.Win32.Autoit.ezc", "Trojan.Win32.Autoit.efjbnz", "PPT.S.Exploit.1116160", "TROJ_CVE20144114.G", "Trojan[Exploit]/OLE.CVE-2014-6352", "Win32.Trojan.Autoit.Dwsw", "Trojan.Win32.BitcoinMiner", "virus.exp.20144114" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "As", "root", ",", "the", "application", "copies", "su", "binary", "to", "/system/bin", "directory", "and", "silently", "downloads", "apk", "file", "from", "the", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "first", "are", "games", "of", "very", "low", "quality", "that", "mimic", "the", "experience", "of", "popular", "mobile", "games", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "is", "a", "bit", "more", "complicated", "since", "the", "SMS", "commands", "are", "encrypted", "and", "encoded", "with", "base64", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Several", "of", "the", "main", "components", "of", "RuMMS", "are", "shown", "in", "Figure", "2", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16 ]
[ "Android", "malware", "has", "drastically", "lower", "rates", "of", "success", "when", "app", "installations", "outside", "of", "Google", "Play", "are", "barred", "." ]
[ 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16 ]
[ "Zygote", "is", "a", "daemon", "whose", "goal", "is", "to", "launch", "apps", "on", "Android,", "and", "injecting", "code", "into", "it", "allows", "the", "malware", "to", "intervene", "in", "any", "activity", "on", "the", "device." ]
[ 3, 16, 16, 5, 16, 16, 16, 16, 1, 9, 9, 5, 16, 1, 9, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 5 ]
[ "Having", "analyzed", "a", "few", "variants", "of", "the", "malware", ",", "we", "noticed", "that", "the", "private", "key", "was", "exposed", "in", "the", "code", "and", "did", "not", "change", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "came", "on", "Friday", "12th", "May", "when", "it", "was", "bundled", "with", "ransomware", "called", "WanaCrypt0r", "and", "let", "loose." ]
[ 16, 16, 16, 0, 8, 8, 16, 16, 16, 16, 16, 3, 16, 3, 16, 16, 16 ]
[ "In", "the", "quadrant", ",", "the", "smaller", "boxes", "in", "blue-gray", "represent", "particular", "apps", "in", "the", "RuMMS", "family", ",", "while", "the", "bigger", "boxes", "in", "deep-blue", "represent", "C2", "servers", "used", "by", "some", "RuMMS", "apps", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16 ]
[ "If", "the", "command", "and", "control", "(", "C2", ")", "server", "is", "taken", "down", ",", "the", "malicious", "operator", "can", "still", "recover", "the", "malware", "control", "by", "sending", "SMS", "messages", "directly", "to", "the", "infected", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Proofpoint", "researchers", "conducted", "a", "historical", "analysis", "of", "samples", "related", "to", "this", "research", "and", "uncovered", "new", "malware", "variants", "and", "likely", "origins", "and", "methods", "of", "infection." ]
[ 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "Manifest", "activity", "declaration", "Class", "list", "inside", "the", "dex", "file", "The", "main", "malware", "classes", "are", "packed", ",", "to", "a", "point", "where", "the", "class", "defined", "in", "the", "manifest", "has", "a", "handler", "for", "the", "MAIN", "category", "that", "does", "not", "exist", "in", "the", "DEX", "file", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Mitigations", "Stay", "protected", "from", "mobile", "malware", "by", "taking", "these", "precautions", ":", "Do", "not", "download", "apps", "from", "unfamiliar", "sites", "Only", "install", "apps", "from", "trusted", "sources", "Pay", "close", "attention", "to", "the", "permissions", "requested", "by", "apps", "Install", "a", "suitable", "mobile", "security", "app", ",", "such", "as", "SEP", "Mobile", "or", "Norton", ",", "to", "protect", "your", "device", "and", "data", "Keep", "your", "operating", "system", "up", "to", "date", "Make", "frequent", "backups", "of", "important", "data", "Indicators", "of", "Compromise", "(", "IoCs", ")", "Package", "names", ":", "anew.football.cup.world.com.worldcup", "com.coder.glancelove", "com.winkchat", "APK", "SHA2", ":", "166f3a863bb2b66bda9c76dccf9529d5237f6394721f46635b053870eb2fcc5a", "b45defca452a640b303288131eb64c485f442aae0682a3c56489d24d59439b47", "d9601735d674a9e55546fde0bffde235bc5f2546504b31799d874e8c31d5b6e9", "2ce54d93510126fca83031f9521e40cd8460ae564d3d927e17bd63fb4cb20edc", "67b1a1e7b505ac510322b9d4f4fc1e8a569d6d644582b588faccfeeaa4922cb7", "1664cb343ee830fa94725fed143b119f7e2351307ed0ce04724b23469b9002f2", "Loaded", "DEX", "SHA2", ":", "afaf446a337bf93301b1d72855ccdd76112595f6e4369d977bea6f9721edf37e", "Domain/IP", ":", "goldncup", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 1, 9, 16, 16, 16, 1, 1, 1, 1, 1, 1, 16, 16, 16, 16, 1, 16, 16, 1, 9, 9 ]
[ "]", "com", "hxxp", ":", "//nttdocomo-qat", "[", "." ]
[ 9, 9, 1, 9, 9, 9, 9 ]
[ "Within", "the", "past", "couple", "years", "there", "were", "several", "major", "incidents", "that", "cited", "the", "use", "of", "Windows", "backdoors", "being", "ported", "to", "Linux." ]
[ 16, 16, 0, 8, 8, 16, 16, 16, 16, 16, 15, 16, 16, 16, 16, 5, 3, 16, 16, 16, 5 ]
[ "Malware", "authors", "can", "sometimes", "be", "creative", "in", "order", "to", "manipulate", "their", "human", "targets", "on", "the", "one", "hand", "and", "to", "circumvent", "security", "products,", "too." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "comakashipro", "[", "." ]
[ 9, 9, 9, 9 ]
[ "In", "regard", "to", "the", "attack", "lifecycle,", "development", "of", "tools", "occurs", "in", "the", "weaponization/staging", "phase", "that", "precedes", "the", "delivery", "phase,", "of", "which", "is", "typically", "the", "first", "opportunity", "we", "see", "the", "actors'", "activities", "as", "they", "interact", "directly", "with", "their", "target." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "ThreatTrack", "Security", "Labs", "researchers", "have", "confirmed", "the", "credential-stealing", "Trojan", "Dyre", "is", "using", "a", "new", "dropper", "β€”", "and", "a", "valid", "digital", "certificate", "β€”", "to", "carry", "out", "its", "dirty", "work", "over", "HTTPS", "connections." ]
[ 4, 12, 12, 16, 16, 16, 16, 1, 3, 11, 16, 16, 16, 16, 3, 16, 16, 16, 16, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Adclicker.HB", "Trojan-Dropper/W32.Dapato.114688.C", "Trojan-Dropper.Win32.Dapato!O", "Trojan.Adclicker.HB", "Dropper.Dapato.Win32.9811", "Trojan/Dropper.Dapato.axil", "Trojan.Adclicker.HB", "TROJ_WEVARM.SM", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "TROJ_WEVARM.SM", "Win.Trojan.Dapato-938", "TrojanDropper.Dapato", "Trojan.Win32.Dapato.ctxtcy", "Trojan.DownLoader6.77", "Trojan-Clicker.AXPC", "TrojanDropper.Dapato.fxa", "Win32.Troj.Dapato.kcloud", "TrojanDownloader:Win32/Obvod.K", "Trojan.Adclicker.HB", "Trojan.Adclicker.HB", "Dropper/Win32.Dapato.R27056", "Trojan.Adclicker.HB" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Damatak", "Trojan.Heur.JP.EEC131", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Win32.Poison.eqxekp", "Trojan.Chanitor.26", "BehavesLike.Win32.Injector.km", "Backdoor:Win32/Damatak.A", "Backdoor.W32.Hupigon.kYZB", "Heur.Trojan.Hlux", "Trj/CI.A", "Win32.Trojan.Dlder.Tayr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "email", "was", "supposedly", "sent", "by", "the", "head", "of", "a", "US-based", "terrorist", "monitoring", "group." ]
[ 16, 1, 16, 16, 16, 16, 16, 4, 16, 16, 4, 12, 12, 12 ]