tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"The",
"attack",
"is",
"part",
"of",
"a",
"trend",
"where",
"threat",
"groups",
"hide",
"malicious",
"activity",
"by",
"communicating",
"with",
"legitimate",
"web",
"services",
"such",
"as",
"social",
"networking",
"and",
"cloud",
"storage",
"sites",
"to",
"foil",
"detection",
"efforts."
] | [
16,
1,
16,
16,
16,
16,
4,
16,
6,
14,
16,
16,
16,
16,
1,
9,
9,
9,
9,
16,
16,
1,
9,
16,
1,
9,
9,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Program.Hadsruda",
"Trojan.Razy.D2C7F5",
"Win32.Trojan-Downloader.Adload.aa",
"Win.Malware.Zusy-5689722-0",
"Riskware.Win32.AdLoad.epwtbh",
"Adware.Oxypumper.159236",
"Application.Win32.OxyPumper.ADA",
"Trojan.DownLoader26.15650",
"Adware.OxyPumper.Win32.616",
"BehavesLike.Win32.Trojan.cc",
"W32/Trojan.TQZU-9354",
"Adware.Adload.cqi",
"ADWARE/OxyPumper.vgssx",
"GrayWare[AdWare]/Win32.AdLoad",
"Adware.OxyPumper/Variant",
"Trojan.Downloader",
"Trj/GdSda.A",
"Win32.Trojan.Razy.Lmkk",
"PUA.AdLoad!",
"PUA.OxyPumper",
"Win32/Trojan.4e9"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dynamer.A5",
"Win32.Trojan.WisdomEyes.16070401.9500.9603",
"not-a-virus:NetTool.Win64.RPCHook.a",
"BehavesLike.Win32.Downloader.vc",
"TrojanDownloader.Paph.ds",
"Trojan[Downloader]/Win32.Betload",
"Trojan.Jaike.DD8D",
"Troj.W32.Inject.tnKf",
"not-a-virus:NetTool.Win64.RPCHook.a",
"Trojan-Downloader.Win32.Moure",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"previously",
"reported",
"on",
"SamSam",
"ransomware",
"charging",
"high",
"ransoms",
"for",
"infected",
"servers."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
5,
13
] |
[
"We",
"believe",
"that",
"an",
"industry-wide",
"collaboration",
"and",
"information-sharing",
"is",
"important",
"in",
"defending",
"customers",
"against",
"this",
"complex",
"piece",
"of",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.S_Gamma.Trojan",
"Trojan/W32.Obfuscated.770368",
"Trojan.Win32.Obfuscated!O",
"Trojan.VBCrypt.MF.137",
"WORM_IRCBOT.BXN",
"Win32.Worm.VB.rx",
"W32/VB.Worm.A",
"W32.Mibling",
"Win32/Malinbot.A",
"WORM_IRCBOT.BXN",
"Trojan.Win32.Obfuscated.aiiz",
"Trojan.Win32.Obfuscated.700736",
"Troj.W32.Obfuscated.l2p6",
"Trojan.Click.43851",
"BehavesLike.Win32.Ramnit.bc",
"W32/VB.Worm.A",
"Worm:Win32/Lamin.A",
"Worm:Win32/Lamin.A",
"Trojan.Win32.Obfuscated.aiiz",
"Trojan.Obfuscator",
"Trj/Dropper.AJT",
"Win32/VB.NRJ",
"Trojan.Obfuscated.AHVV"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32/PSW.Katalog",
"Trojan-PWS/W32.Katalog.61440",
"Trojan/PSW.Katalog",
"Trojan.PWS.Katalog!pK2Uo9nMTKQ",
"TROJ_KATALOG.A",
"Trojan-PSW.Win32.Katalog",
"Trojan.Win32.Katalog-Psw.fjsg",
"Trojan.Win32.A.PSW-Katalog.61440[h]",
"TrojWare.Win32.PSW.Katalog",
"TROJ_KATALOG.A",
"W32/Trojan.XHBZ-0001",
"Trojan/PSW.Katalog",
"TR/Katalog.PSW",
"W32/Katalog.A!tr.pws",
"Trojan[PSW]/Win32.Katalog",
"Win32.Troj.pswKatalog.kcloud",
"Downloader/Win32.VB",
"TrojanPSW.Katalog",
"Trj/PSW.Katalog",
"Trojan.Win32.InfoStealer.Ahg",
"Win32/Trojan.PSW.b74"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Dark",
"Power",
"ransomware",
"gang",
"is",
"new",
"on",
"the",
"block,",
"and",
"is",
"trying",
"to",
"make",
"a",
"name",
"for",
"itself."
] | [
6,
14,
14,
14,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"description",
"is",
"based",
"on",
"analysis",
"of",
"the",
"sample",
"described",
"in",
"Table",
"3",
"below",
",",
"which",
"was",
"of",
"interest",
"given",
"its",
"C2",
"domain",
"mefound",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9
] |
[
"The",
"collection",
"of",
"basic",
"device",
"information",
"."
] | [
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"141",
"2020-04-26",
"In",
"the",
"course",
"of",
"the",
"investigation",
",",
"the",
"team",
"discovered",
"a",
"potential",
"link",
"to",
"an",
"additional",
"Android",
"infostealer",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16
] |
[
"During",
"patching",
",",
"the",
"Trojan",
"will",
"overwrite",
"the",
"existing",
"code",
"with",
"malicious",
"code",
"so",
"that",
"all",
"it",
"can",
"do",
"is",
"execute",
"/system/bin/ip",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Dropper.Grizl.kp",
"W32/Dropper.ANGS",
"Infostealer.Gampass",
"TSPY_ONLINEG.SMA",
"Trojan-GameThief.Win32.Lmir!IK",
"TrojWare.Win32.PSW.OnLineGames.NYT0",
"Trojan.PWS.Gamania.22629",
"TSPY_ONLINEG.SMA",
"TrojanDropper:Win32/Lolyda.F",
"W32/Dropper.ANGS",
"Trojan/Win32.Lmir",
"TrojanPSW.Lmir.jfz",
"Win32/PSW.OnLineGames.NYT",
"Trojan.PSW.Win32.GameOnline.gcv",
"Trojan-GameThief.Win32.Lmir",
"W32/Grizl.GA!tr.dldr",
"PSW.OnlineGames3.WPS",
"Trj/Krap.Y"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"com",
"also",
"resolved",
"to",
"the",
"same",
"IP",
"address",
",",
"suggesting",
"that",
"these",
"two",
"domains",
"are",
"associated",
"with",
"the",
"same",
"threat",
"actors",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Ransom.BHE",
"Ransom.Petya.S19638",
"Trojan.Ransom.BHE",
"W32/GoldenEye.SONR-5498",
"Ransom.Goldeneye",
"Ransom_PETYA.SM1",
"Trojan.Ransom.BHE",
"Trojan.Win32.MBRlock.epgnaf",
"Trojan.Ransom.BHE",
"Trojan.MBRlock.265",
"Trojan-Ransom.GoldenEye",
"W32/GoldenEye.D",
"Trojan.DiskWriter.bp",
"W32/Petya.D!tr.ransom",
"Trojan.Ransom.BHE",
"Trojan/Win32.Petr.C1697437",
"Trojan.Ransom.BHE",
"Ransom.Petya",
"Trojan.Petya",
"Hoax.Petr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.AB21",
"Trojan-Downloader.Win32.Firu!O",
"Troj.Downloader.W32!c",
"Trojan/Downloader.Firu.bp",
"Win32.Trojan.WisdomEyes.16070401.9500.9958",
"Trojan-Downloader.Win32.Firu.bp",
"Trojan.Packed.418",
"BehavesLike.Win32.Dropper.mc",
"Trojan-Downloader.Win32.Firu.bp",
"W32/Trojan.BNRM-7642",
"TrojanDownloader.Firu.t",
"Trojan:Win32/Bohmini.A",
"Trojan-Downloader.Win32.Firu.bp",
"Trojan/Win32.Xema.C57004",
"TrojanDownloader.Firu",
"Trj/Downloader.VMH",
"Win32.Trojan-downloader.Firu.Tcmb",
"Win32/Trojan.Downloader.d1e"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Recently,",
"we",
"spotted",
"a",
"new",
"attack",
"where",
"PowerShell",
"was",
"abused",
"to",
"deliver",
"a",
"FAREIT",
"variant."
] | [
16,
16,
16,
16,
16,
1,
16,
5,
16,
7,
16,
16,
16,
3,
11
] |
[
"]",
"it",
"Catania",
"server1fermo.exodus.connexxa",
"[",
"."
] | [
9,
9,
16,
1,
9,
9
] |
[
"The",
"newly",
"discovered",
"samples",
"show",
"new",
"capabilities",
"not",
"previously",
"documented."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"is",
"not",
"common",
"to",
"use",
"this",
"program",
"to",
"distribute",
"malware",
",",
"although",
"there",
"have",
"been",
"past",
"cases",
"where",
"malware",
"authors",
"have",
"done",
"so",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"As",
"the",
"code",
"snippet",
"shows",
",",
"the",
"malware",
"creates",
"a",
"notification",
"builder",
"and",
"then",
"does",
"the",
"following",
":",
"setCategory",
"(",
"β",
"call",
"β",
")",
"β",
"This",
"means",
"that",
"the",
"notification",
"is",
"built",
"as",
"a",
"very",
"important",
"notification",
"that",
"needs",
"special",
"privilege",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"What",
"is",
"most",
"interesting",
"about",
"this",
"group's",
"more",
"recent",
"activity",
"however,",
"is",
"their",
"focus",
"on",
"users",
"of",
"encryption",
"tools,",
"peaking",
"this",
"summer."
] | [
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16
] |
[
"Using",
"intel",
"from",
"this",
"research",
",",
"we",
"have",
"made",
"Office",
"365",
"ATP",
"more",
"resistant",
"to",
"FinFisher",
"β",
"s",
"anti-sandbox",
"checks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
3,
16,
16,
16,
16,
16
] |
[
"Once",
"the",
"malware",
"is",
"installed",
"on",
"the",
"victim's",
"device,",
"it",
"opens",
"a",
"back",
"door,",
"collects",
"a",
"list",
"of",
"system-specific",
"information,",
"and",
"sends",
"it",
"to",
"the",
"command",
"and",
"control",
"C&C",
"server",
"to",
"register",
"the",
"device",
"and",
"then",
"get",
"a",
"unique",
"identifier",
"for",
"the",
"infected",
"device."
] | [
16,
16,
3,
16,
16,
16,
16,
5,
13,
16,
16,
16,
3,
11,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
16,
16,
5,
13,
16,
16,
16,
16,
1,
9,
16,
5,
13,
13
] |
[
"We",
"believe",
"the",
"use",
"of",
"the",
"Retadup",
"malware",
"family",
"is",
"limited",
"to",
"a",
"very",
"small",
"set",
"of",
"threat",
"actors."
] | [
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14
] |
[
"On",
"May",
"30th",
"our",
"honeypots",
"captured",
"the",
"first",
"attack",
"to",
"make",
"use",
"of",
"this",
"particular",
"vulnerability,",
"but",
"the",
"payload",
"in",
"this",
"exploit",
"had",
"nothing",
"in",
"common",
"with",
"the",
"Trojan-Crypt",
"that",
"was",
"EternalBlue",
"and",
"WannaCry."
] | [
16,
0,
8,
16,
5,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
7,
16,
16,
3,
16,
16,
3,
16,
16,
16,
16,
16,
16,
3,
16,
16,
3,
16,
3
] |
[
"Generally",
",",
"after",
"an",
"application",
"gets",
"banned",
"from",
"an",
"official",
"app",
"store",
",",
"such",
"as",
"Google",
"Play",
",",
"users",
"try",
"to",
"find",
"alternative",
"ways",
"to",
"download",
"the",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Conclusion",
"Although",
"not",
"yet",
"mature",
"enough",
"to",
"provide",
"the",
"equivalent",
"of",
"a",
"full-blown",
"set",
"of",
"Android",
"banking",
"malware",
"features",
"(",
"such",
"as",
"RAT",
",",
"RAT",
"with",
"ATS",
"(",
"Automated",
"Transaction",
"Script",
")",
",",
"back-connect",
"proxy",
",",
"media",
"streaming",
")",
",",
"or",
"providing",
"an",
"exhaustive",
"target",
"list",
",",
"Cerberus",
"should",
"not",
"be",
"taken",
"lightly",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.Rogue.bjbo",
"W32/Trojan.AMVM-7843",
"TR/Rogue.7932483",
"Trojan.Graftor.DBF88",
"Backdoor/Win32.Etso.R61020",
"Trojan.Win32.Webprefix",
"Win32/Trojan.Multi.daf"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Carbanak",
"team",
"does",
"not",
"just",
"blindly",
"compromise",
"large",
"numbers",
"of",
"computers",
"and",
"try",
"to",
"milk",
"the",
"cow'",
"as",
"other",
"actors",
"do,",
"instead",
"they",
"act",
"like",
"a",
"mature",
"APT-group."
] | [
6,
14,
14,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
6
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9831",
"Bloodhound.Gampass.E",
"Trojan.Win32.Patched.ox",
"Trojan.Win32.PatchedDll.C",
"BehavesLike.Win32.BadFile.cm",
"Virus.Win32.Crypted",
"Trojan/PSW.OnLineGames.ckdm",
"Trojan/Win32.Patched.ox",
"PWS:Win32/Cuepilini.A",
"Trojan.Win32.Patched.ox",
"Trojan.Win32.Patched.b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Based",
"on",
"VirusTotal",
"uploads,",
"malicious",
"documents",
"content,",
"and",
"known",
"victims",
"β",
"other",
"targeted",
"organizations",
"are",
"located",
"in",
"Turkey,",
"Qatar,",
"Kuwait,",
"United",
"Arab",
"Emirates,",
"Saudi",
"Arabia,",
"and",
"Lebanon."
] | [
16,
16,
4,
16,
1,
9,
9,
16,
16,
4,
16,
16,
16,
4,
16,
16,
16,
16,
10,
10,
10,
10,
10,
10,
10,
16,
2
] |
[
"It",
"includes",
"information",
"about",
"the",
"smartphone",
"model",
",",
"the",
"OS",
"version",
",",
"the",
"mobile",
"operator",
",",
"and",
"the",
"Trojan",
"version",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Jorik.Crix!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9992",
"Trojan.Win32.Dwn.sbard",
"Trojan.Win32.A.Inject.129544",
"Trojan.DownLoader5.50729",
"Win32.Malware",
"Trojan/Lebag.auv",
"TrojanDownloader:Win32/Beshades.A",
"Trojan/Win32.Inject.R29920",
"BScope.Malware-Cryptor.4112",
"Trj/CI.A",
"Trojan.DL.Injecter!F6PQPalmepA",
"W32/Injecter.AA!tr.dldr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"xDedic",
"is",
"a",
"trading",
"platform",
"where",
"cybercriminals",
"can",
"purchase",
"any",
"of",
"over",
"70,000",
"hacked",
"servers",
"from",
"all",
"around",
"the",
"internet."
] | [
6,
16,
16,
6,
14,
16,
6,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9889",
"Trojan.Sniff",
"BehavesLike.Win32.BadFile.mc",
"PWS:Win32/Finsgra.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"Unit",
"42",
"does",
"not",
"have",
"detailed",
"targeting",
"information",
"for",
"all",
"known",
"Bookworm",
"samples,",
"but",
"we",
"are",
"aware",
"of",
"attempted",
"attacks",
"on",
"at",
"least",
"two",
"branches",
"of",
"government",
"in",
"Thailand."
] | [
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
4,
16,
2
] |
[
"Sending",
"information",
"about",
"the",
"affected",
"device",
"The",
"app",
"receives",
"configuration",
"data",
"from",
"the",
"C",
"&",
"C",
"server",
",",
"needed",
"for",
"displaying",
"ads",
",",
"and",
"for",
"stealth",
"and",
"resilience",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Elitespyz.A",
"Backdoor/W32.EliteSpyz.1687552",
"Backdoor.Elitespyz",
"Backdoor.Elitespyz.A",
"Backdoor.Elitespyz.A",
"W32/Risk.FRAF-2715",
"Backdoor.Trojan",
"BKDR_ELITESPYZ.A",
"Backdoor.Elitespyz.A",
"Backdoor.Win32.EliteSpyz.4",
"Backdoor.Elitespyz.A",
"Trojan.Win32.EliteSpyz.dgpj",
"Backdoor.Win32.EliteSpyz.1687552",
"Backdoor.W32.EliteSpyz.4!c",
"Backdoor.Elitespyz.A",
"Backdoor.Win32.EliteSpyz.04",
"Backdoor.Elitespyz.A",
"BackDoor.EliteSpyz.4",
"Backdoor.EliteSpyz.Win32.1",
"BKDR_ELITESPYZ.A",
"Trojan.Win32.Elitespyz",
"Backdoor/EliteSpyz.4",
"W32.Hack.Tool",
"BDS/EliteSpyz.4",
"Trojan[Backdoor]/Win32.EliteSpyz",
"Backdoor.Win32.EliteSpyz.4",
"Backdoor.EliteSpyz",
"Win32/EliteSpyz.04",
"Win32.Backdoor.Elitespyz.Wrgi",
"Backdoor.EliteSpyz!8lwaYNdDuBo",
"W32/EliteSpy.A!tr.bdr",
"Win32/Backdoor.Spy.754"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Uncrre",
"TR/RedCap.wfhca",
"Trojan.Win32.Z.Uncrre.3584",
"Trojan:Win32/Uncrre.A",
"Trojan.Win32.Uncrre",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Ruskill.143360",
"Backdoor.Win32.Ruskill!O",
"Worm.Ainslot.A",
"Backdoor.Ruskill.Win32.42",
"Backdoor.W32.Ruskill.fi!c",
"Backdoor/Ruskill.fi",
"TROJ_DROPR.SMIO",
"Worm.Win32.Ngrbot.dfk",
"Trojan.Win32.StartPage.cjvsv",
"Trojan.Win32.Menti.98304",
"TrojWare.Win32.Injector.GWW",
"BackDoor.IRC.Bot.892",
"TROJ_DROPR.SMIO",
"Trojan.Win32.Buzus",
"Backdoor/Ruskill.da",
"W32/Injector.HCR!tr",
"Worm/Win32.Ngrbot",
"Worm.Win32.Ngrbot.dfk",
"Worm/Win32.AutoRun.R6237",
"Worm.Ngrbot",
"Win32.Trojan.Inject.Auto",
"Backdoor.Ruskill!/ah4op3yVOE"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Since",
"approximately",
"September",
"2022,",
"cyber",
"criminals",
"have",
"compromised",
"U.S.",
"and",
"international",
"organizations",
"with",
"a",
"Royal",
"ransomware",
"variant."
] | [
16,
16,
0,
8,
6,
14,
16,
1,
4,
16,
4,
12,
16,
16,
3,
11,
16
] |
[
"The",
"new",
"payload",
"is",
"decrypted",
",",
"remapped",
",",
"and",
"executed",
"in",
"memory",
",",
"and",
"represents",
"the",
"installation",
"and",
"persistence",
"stage",
"of",
"the",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W97M.Dropper.H",
"W97M.Dropper.CB",
"W97M/Dropper.m",
"Troj.Downloader.Msword!c",
"W97M/Dropexe.A",
"W97M.Dropper.H",
"W97M.Dropper.H",
"W97M.Dropper.H",
"W97M.Dropper.H",
"W97M/Dropper.m",
"W97M/Dropexe.A",
"HEUR/Macro.Dropper",
"HEUR.VBA.Trojan.d",
"W97M.Dropper.H",
"macro.ole.encodedownload.f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"all",
"cases",
",",
"the",
"ads",
"are",
"used",
"to",
"convince",
"users",
"to",
"install",
"other",
"apps",
"from",
"different",
"developer",
"accounts",
",",
"but",
"written",
"by",
"the",
"same",
"group",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"has",
"outlived",
"several",
"competitors",
"including",
"Zeus,",
"and",
"SpyEye."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
3
] |
[
"Dyre",
"employed",
"the",
"spambot",
"Gophe",
"to",
"send",
"thousands",
"of",
"randomized",
"documents",
"hashes",
"and",
"file",
"names",
"per",
"spam",
"campaign"
] | [
3,
16,
16,
3,
11,
16,
1,
9,
9,
9,
9,
16,
16,
16,
16,
16,
6,
14
] |
[
"Throughout",
"2015",
"and",
"2016,",
"Android",
"banking",
"Trojans",
"were",
"primarily",
"distributed",
"outside",
"the",
"Google",
"Play",
"Store",
"by",
"using",
"SMSishing,",
"phishing",
"e-mails",
"and",
"rogue",
"websites,",
"often",
"dropping",
"APKs",
"related",
"to",
"Adobe",
"Flash",
"Player."
] | [
16,
0,
16,
0,
3,
11,
11,
16,
16,
16,
16,
5,
13,
13,
13,
16,
16,
1,
9,
9,
16,
1,
9,
16,
16,
5,
16,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9935",
"TrojanDownloader:Win32/Leodon.D"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"On",
"June",
"14th,",
"2017,",
"a",
"new",
"variant",
"of",
"ZXShell",
"appears",
"to",
"have",
"been",
"uploaded",
"from",
"the",
"Marmara",
"region",
"of",
"Turkey."
] | [
16,
0,
8,
8,
16,
16,
3,
16,
3,
16,
16,
16,
16,
16,
16,
2,
10,
10,
16,
2
] |
[
"BootComplete",
"starts",
"the",
"AutoStartup",
"service",
"and",
"the",
"AutoStartup",
"service",
"makes",
"sure",
"that",
"MainActivity",
"is",
"always",
"running",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Razy.D3E075",
"Trojan.MSIL.Crypt.gbqy",
"BehavesLike.Win32.Trojan.gc",
"Trojan.MSIL.Crypt",
"TR/Kryptik.psxte",
"Backdoor:Win32/Dodiw.A",
"Trojan.MSIL.Crypt.gbqy",
"Trj/GdSda.A",
"MSIL/Kryptik.MQQ!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Tick",
"also",
"uses",
"a",
"range",
"of",
"hacktools",
"to",
"map",
"the",
"victim's",
"network",
"and",
"attempt",
"to",
"escalate",
"privileges",
"further."
] | [
6,
16,
16,
16,
16,
16,
3,
16,
1,
9,
9,
9,
16,
16,
16,
1,
9,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9993",
"Trojan.Win32.KrServ.rq",
"Trojan.Win32.JackServn.exlgil",
"Trojan.Win32.Z.Jackservn.306688",
"Trojan.DownLoader26.11701",
"Trojan.Win64.Jackservn",
"TR/JackServn.sphdt",
"Trojan.Downloader.184",
"Trojan.Win32.KrServ.rq",
"Trj/CI.A",
"W32/JackServn.K!tr",
"Win32/Trojan.Downloader.369"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clodeb4.Trojan.8496",
"Trojan/W32.Scar.350208.E",
"W32/Autorun.worm.bcd",
"Worm.Autorun",
"Trojan/Scar.dyfr",
"W32/MalwareS.BDRB",
"W32.Huanot",
"Virut.A[gs]",
"Win32/Huanot.A",
"WORM_HUANOT.SMIA",
"Trojan.Scar-846",
"Trojan.Win32.Scar.bvisc",
"Trojan.Win32.A.Scar.350208",
"Trojan.Copyself.101",
"TR/Scar.ccwl",
"WORM_HUANOT.SMIA",
"W32/Autorun.worm.bcd",
"Trojan/Scar.pkp",
"Worm:Win32/Huanot.A",
"Trojan/Win32.Scar",
"W32/Risk.JTAZ-7050",
"Virus.Win32.Heur.l",
"W32/Autorun.JXD",
"PE:Malware.FakeFolder@CV!1.6AA9",
"Worm.Win32.Huanot"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"New",
"versions",
"of",
"FakeSpy",
"masquerade",
"as",
"government",
"post",
"office",
"apps",
"and",
"transportation",
"services",
"apps",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Virut.Cur1",
"W32/Manex.worm",
"Trojan.Zusy.D62E9",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Dropper.BBXI",
"Win.Trojan.Cosmu-1044",
"Trojan.Win32.Scar.ojal",
"Trojan.Win32.AutoRun.cgsnz",
"Worm.Win32.A.AutoRun.310273",
"W32.W.AutoRun.cikl!c",
"Win32.HLLW.Autoruner.27598",
"Trojan.Cosmu.Win32.3832",
"W32/Manex.worm",
"W32/Risk.SOOH-5229",
"Trojan/Cosmu.dxm",
"Trojan/Win32.Cosmu",
"Worm:Win32/Vestgo.A",
"Trojan.Win32.Scar.ojal",
"HEUR/Fakon.mwf",
"Worm.AutoRun",
"Win32.Trojan.Scar.Dxwy",
"Trojan.Scar!/4mh5woJZa8"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"comfeteh-asefa",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"Deutsche",
"Post",
"-",
"Deutsche",
"Post",
"DHL",
"Group",
",",
"a",
"German",
"multinational",
"package",
"delivery",
"and",
"supply",
"chain",
"management",
"company",
"headquartered",
"in",
"Bonn",
"."
] | [
4,
12,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.CDB.C8b2",
"TrojanBanker.Banker.awoc",
"Trojan.Win32.Banker.bdicvp",
"W32/MalwareF.FQTI",
"Infostealer.Bancos",
"Trojan-Banker.Win32.Banker.awoc",
"Trojan.PWS.Banker!/1rqiSjn+V4",
"TrojWare.Win32.Spy.Banker.awoc",
"Trojan-Banker.Win32.Banker",
"TR/Banker.Banker.awoc",
"Trojan/Banker.Banker.kbj",
"Trojan:Win32/Sawmabs.A",
"W32/Risk.BGBM-2797",
"Trojan-GameThief.Magania",
"Trj/Thed.E",
"Win32/Spy.Delf.NZK",
"Trojan-Banker.Win32.Banker",
"W32/Banker.AWOC!tr",
"PSW.Banker5.BFQR",
"Trojan.Win32.Delf.amo"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Infection",
"During",
"installation",
",",
"depending",
"on",
"the",
"version",
"of",
"the",
"Trojan",
",",
"Asacub",
"prompts",
"the",
"user",
"either",
"for",
"Device",
"Administrator",
"rights",
"or",
"for",
"permission",
"to",
"use",
"AccessibilityService",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"attack",
"against",
"Anthem",
"resulted",
"in",
"the",
"largest",
"known",
"healthcare",
"data",
"breach",
"to",
"date,",
"with",
"80",
"million",
"patient",
"records",
"exposed."
] | [
16,
1,
16,
4,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"ITG08",
"also",
"has",
"gained",
"initial",
"access",
"by",
"targeting",
"specific",
"employees",
"with",
"LinkedIn",
"and",
"spear-phishing",
"emails",
"to",
"deliver",
"the",
"More_eggs",
"backdoor."
] | [
6,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
16,
1,
9,
16,
16,
3,
11,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Constructor.Xploitzomshc.A",
"Constructor/W32.XploitZomShc.253952",
"Hacktool.Zomshc",
"Trojan/Constructor.XploitZomShc.a",
"Trojan.Constructor.Xploitzomshc.A",
"W32/TrojanX.GSC",
"Construction.Kit",
"Trojan.Constructor.Xploitzomshc.A",
"Constructor.Win32.XploitZomShc.a",
"Trojan.Constructor.Xploitzomshc.A",
"Riskware.Win32.XploitZomShc.hrxx",
"Constructor.XploitZomShc.253952",
"Constructor.W32.XploitZomShc.a!c",
"Win32.Trojan.Xploitzomshc.Wqwm",
"Trojan.Constructor.Xploitzomshc.A",
"Trojan.Constructor.Xploitzomshc.A",
"VirusConstructor.Shc",
"Tool.XploitZomShc.Win32.1",
"BehavesLike.Win32.Dropper.dc",
"Trojan.Constructor.Xploitzomshc",
"W32/Trojan.KXHA-5736",
"Constructor.XploitZomShc.b",
"W32.Hack.Tool",
"KIT/XploitZomShc.A",
"HackTool[Constructor]/Win32.XploitZomShc",
"VTool.XploitZomShc.a.kcloud",
"Constructor.Win32.XploitZomShc.a",
"Trojan.Constructor.Xploitzomshc.A",
"Constructor.XploitZomShc",
"W32/XploitZomShc.A!tr",
"Win32/Constructor.96c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9986",
"Trojan-Downloader.Win32.Hover2.n",
"TrojWare.Win32.TrojanDownloader.Small.NZK",
"Trojan.DownLoader.45214",
"Trojan-Downloader.Win32.Hover2.n",
"Win32/TrojanDownloader.Small.NZK"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanSpy.MSIL.r3",
"Trojan.Dropper",
"Troj.PSW.MSIL.NetPass",
"Trojan/Clicker.nai",
"TrojanSpy.KeyLogger!3foOCbTDOkQ",
"Spyware.ADH",
"MSIL/TrojanClicker.NAI",
"Trojan.Msil-382",
"Trojan-Spy.MSIL.KeyLogger.bybj",
"Trojan.Win32.NetPass.dcndda",
"Msil.Trojan-spy.Keylogger.Lhxb",
"Trojan.MulDrop1.48625",
"Trojan/PSW.MSIL.oy",
"W32/Dx.SUK!tr",
"Trojan[PSW]/MSIL.NetPass",
"Trojan.MSIL.Krypt.1",
"Trojan/Win32.Infostealer",
"TrojanClicker:MSIL/Lnkhit.A",
"MSIL.TrojanClicker",
"Virus.MSIL",
"Trojan.MSIL.KeyLogger.bybj",
"Win32/Trojan.bee"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"If",
"the",
"malware",
"successfully",
"became",
"the",
"default",
"SMS",
"app",
",",
"it",
"sends",
"the",
"words",
"β",
"the",
"app",
"has",
"been",
"replaced",
"β",
"in",
"Russian",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Kill",
"switches",
"are",
"used",
"by",
"many",
"malware",
"authors",
"to",
"remove",
"traces",
"from",
"a",
"device",
"after",
"a",
"successful",
"operation",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win.Trojan.Shell-426",
"Backdoor:Win32/Sensode.G",
"Trj/GdSda.A",
"Win32/Trojan.75c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"The",
"domain",
"was",
"registered",
"on",
"March",
"8th",
",",
"2013",
":",
"Registration",
"Service",
"Provided",
"By",
":",
"SHANGHAI",
"MEICHENG",
"TECHNOLOGY",
"INFORMATION",
"DEVELOPMENT",
"CO.",
",",
"LTD.",
"Domain",
"Name",
":",
"DLMDOCUMENTSEXCHANGE.COM",
"Registration",
"Date",
":",
"08-Mar-2013",
"Expiration",
"Date",
":",
"08-Mar-2014",
"Status",
":",
"LOCKED",
"The",
"domain",
"registration",
"data",
"indicates",
"the",
"following",
"owner",
":",
"Registrant",
"Contact",
"Details",
":",
"peng",
"jia",
"peng",
"jia",
"(",
"bdoufwke123010",
"@",
"gmail.com",
")",
"beijingshiahiidienquc.d",
"beijingshi",
"beijing,100000",
"CN",
"Tel",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
12,
12,
12,
12,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
1,
16,
16,
16,
16,
16
] |
[
"The",
"desktop",
"components",
"of",
"this",
"attack",
",",
"previously",
"discovered",
"by",
"Palo",
"Alto",
"Network",
",",
"are",
"known",
"as",
"KasperAgent",
"and",
"Micropsia",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
16,
16,
16,
3,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Win32.Poison.C12016"
] | [
16,
3,
16,
16,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Payreen",
"Trojan.Ransom.TechSupportScam",
"Trojan.Win32.Payreen.evwzbn",
"W32/Trojan.JXJF-8565",
"TR/Payreen.exevx",
"SupportScam:MSIL/Payreen.A",
"Trojan.TechSupportScam",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Python/Agent.F",
"is",
"a",
"worm",
"that",
"spreads",
"via",
"removable",
"media."
] | [
1,
16,
16,
3,
16,
16,
16,
5,
13
] |
[
"This",
"post",
"intends",
"to",
"share",
"the",
"findings",
"of",
"the",
"FortiGuard",
"Lion",
"Team",
"on",
"BlackMoon's",
"prevalence",
"and",
"its",
"latest",
"code",
"updates."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
3,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Trojan",
"may",
"download",
"files",
"from",
"the",
"following",
"remote",
"location:",
"[http://]bit.ly/2k4[REMOVED]"
] | [
16,
3,
16,
16,
1,
16,
16,
16,
1,
9,
9
] |
[
"The",
"server",
"then",
"sends",
"a",
"reply",
"that",
"contains",
"instructions",
"on",
"further",
"actions",
"to",
"be",
"taken",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Exploit/W32.CVE-2014-4114.I",
"JS.Swabfex.QZ",
"Exploit.CVE-2014-4114.A",
"Troj.W32.Autoit!c",
"Trojan.PPDropper",
"TROJ_CVE20144114.G",
"Trojan.Win32.Autoit.ezc",
"Trojan.Win32.Autoit.efjbnz",
"PPT.S.Exploit.1116160",
"TROJ_CVE20144114.G",
"Trojan[Exploit]/OLE.CVE-2014-6352",
"Win32.Trojan.Autoit.Dwsw",
"Trojan.Win32.BitcoinMiner",
"virus.exp.20144114"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"As",
"root",
",",
"the",
"application",
"copies",
"su",
"binary",
"to",
"/system/bin",
"directory",
"and",
"silently",
"downloads",
"apk",
"file",
"from",
"the",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"first",
"are",
"games",
"of",
"very",
"low",
"quality",
"that",
"mimic",
"the",
"experience",
"of",
"popular",
"mobile",
"games",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"is",
"a",
"bit",
"more",
"complicated",
"since",
"the",
"SMS",
"commands",
"are",
"encrypted",
"and",
"encoded",
"with",
"base64",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Several",
"of",
"the",
"main",
"components",
"of",
"RuMMS",
"are",
"shown",
"in",
"Figure",
"2",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16
] |
[
"Android",
"malware",
"has",
"drastically",
"lower",
"rates",
"of",
"success",
"when",
"app",
"installations",
"outside",
"of",
"Google",
"Play",
"are",
"barred",
"."
] | [
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16
] |
[
"Zygote",
"is",
"a",
"daemon",
"whose",
"goal",
"is",
"to",
"launch",
"apps",
"on",
"Android,",
"and",
"injecting",
"code",
"into",
"it",
"allows",
"the",
"malware",
"to",
"intervene",
"in",
"any",
"activity",
"on",
"the",
"device."
] | [
3,
16,
16,
5,
16,
16,
16,
16,
1,
9,
9,
5,
16,
1,
9,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
5
] |
[
"Having",
"analyzed",
"a",
"few",
"variants",
"of",
"the",
"malware",
",",
"we",
"noticed",
"that",
"the",
"private",
"key",
"was",
"exposed",
"in",
"the",
"code",
"and",
"did",
"not",
"change",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"came",
"on",
"Friday",
"12th",
"May",
"when",
"it",
"was",
"bundled",
"with",
"ransomware",
"called",
"WanaCrypt0r",
"and",
"let",
"loose."
] | [
16,
16,
16,
0,
8,
8,
16,
16,
16,
16,
16,
3,
16,
3,
16,
16,
16
] |
[
"In",
"the",
"quadrant",
",",
"the",
"smaller",
"boxes",
"in",
"blue-gray",
"represent",
"particular",
"apps",
"in",
"the",
"RuMMS",
"family",
",",
"while",
"the",
"bigger",
"boxes",
"in",
"deep-blue",
"represent",
"C2",
"servers",
"used",
"by",
"some",
"RuMMS",
"apps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16
] |
[
"If",
"the",
"command",
"and",
"control",
"(",
"C2",
")",
"server",
"is",
"taken",
"down",
",",
"the",
"malicious",
"operator",
"can",
"still",
"recover",
"the",
"malware",
"control",
"by",
"sending",
"SMS",
"messages",
"directly",
"to",
"the",
"infected",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Proofpoint",
"researchers",
"conducted",
"a",
"historical",
"analysis",
"of",
"samples",
"related",
"to",
"this",
"research",
"and",
"uncovered",
"new",
"malware",
"variants",
"and",
"likely",
"origins",
"and",
"methods",
"of",
"infection."
] | [
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"Manifest",
"activity",
"declaration",
"Class",
"list",
"inside",
"the",
"dex",
"file",
"The",
"main",
"malware",
"classes",
"are",
"packed",
",",
"to",
"a",
"point",
"where",
"the",
"class",
"defined",
"in",
"the",
"manifest",
"has",
"a",
"handler",
"for",
"the",
"MAIN",
"category",
"that",
"does",
"not",
"exist",
"in",
"the",
"DEX",
"file",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Mitigations",
"Stay",
"protected",
"from",
"mobile",
"malware",
"by",
"taking",
"these",
"precautions",
":",
"Do",
"not",
"download",
"apps",
"from",
"unfamiliar",
"sites",
"Only",
"install",
"apps",
"from",
"trusted",
"sources",
"Pay",
"close",
"attention",
"to",
"the",
"permissions",
"requested",
"by",
"apps",
"Install",
"a",
"suitable",
"mobile",
"security",
"app",
",",
"such",
"as",
"SEP",
"Mobile",
"or",
"Norton",
",",
"to",
"protect",
"your",
"device",
"and",
"data",
"Keep",
"your",
"operating",
"system",
"up",
"to",
"date",
"Make",
"frequent",
"backups",
"of",
"important",
"data",
"Indicators",
"of",
"Compromise",
"(",
"IoCs",
")",
"Package",
"names",
":",
"anew.football.cup.world.com.worldcup",
"com.coder.glancelove",
"com.winkchat",
"APK",
"SHA2",
":",
"166f3a863bb2b66bda9c76dccf9529d5237f6394721f46635b053870eb2fcc5a",
"b45defca452a640b303288131eb64c485f442aae0682a3c56489d24d59439b47",
"d9601735d674a9e55546fde0bffde235bc5f2546504b31799d874e8c31d5b6e9",
"2ce54d93510126fca83031f9521e40cd8460ae564d3d927e17bd63fb4cb20edc",
"67b1a1e7b505ac510322b9d4f4fc1e8a569d6d644582b588faccfeeaa4922cb7",
"1664cb343ee830fa94725fed143b119f7e2351307ed0ce04724b23469b9002f2",
"Loaded",
"DEX",
"SHA2",
":",
"afaf446a337bf93301b1d72855ccdd76112595f6e4369d977bea6f9721edf37e",
"Domain/IP",
":",
"goldncup",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
1,
9,
16,
16,
16,
1,
1,
1,
1,
1,
1,
16,
16,
16,
16,
1,
16,
16,
1,
9,
9
] |
[
"]",
"com",
"hxxp",
":",
"//nttdocomo-qat",
"[",
"."
] | [
9,
9,
1,
9,
9,
9,
9
] |
[
"Within",
"the",
"past",
"couple",
"years",
"there",
"were",
"several",
"major",
"incidents",
"that",
"cited",
"the",
"use",
"of",
"Windows",
"backdoors",
"being",
"ported",
"to",
"Linux."
] | [
16,
16,
0,
8,
8,
16,
16,
16,
16,
16,
15,
16,
16,
16,
16,
5,
3,
16,
16,
16,
5
] |
[
"Malware",
"authors",
"can",
"sometimes",
"be",
"creative",
"in",
"order",
"to",
"manipulate",
"their",
"human",
"targets",
"on",
"the",
"one",
"hand",
"and",
"to",
"circumvent",
"security",
"products,",
"too."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"comakashipro",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"In",
"regard",
"to",
"the",
"attack",
"lifecycle,",
"development",
"of",
"tools",
"occurs",
"in",
"the",
"weaponization/staging",
"phase",
"that",
"precedes",
"the",
"delivery",
"phase,",
"of",
"which",
"is",
"typically",
"the",
"first",
"opportunity",
"we",
"see",
"the",
"actors'",
"activities",
"as",
"they",
"interact",
"directly",
"with",
"their",
"target."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"ThreatTrack",
"Security",
"Labs",
"researchers",
"have",
"confirmed",
"the",
"credential-stealing",
"Trojan",
"Dyre",
"is",
"using",
"a",
"new",
"dropper",
"β",
"and",
"a",
"valid",
"digital",
"certificate",
"β",
"to",
"carry",
"out",
"its",
"dirty",
"work",
"over",
"HTTPS",
"connections."
] | [
4,
12,
12,
16,
16,
16,
16,
1,
3,
11,
16,
16,
16,
16,
3,
16,
16,
16,
16,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Adclicker.HB",
"Trojan-Dropper/W32.Dapato.114688.C",
"Trojan-Dropper.Win32.Dapato!O",
"Trojan.Adclicker.HB",
"Dropper.Dapato.Win32.9811",
"Trojan/Dropper.Dapato.axil",
"Trojan.Adclicker.HB",
"TROJ_WEVARM.SM",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TROJ_WEVARM.SM",
"Win.Trojan.Dapato-938",
"TrojanDropper.Dapato",
"Trojan.Win32.Dapato.ctxtcy",
"Trojan.DownLoader6.77",
"Trojan-Clicker.AXPC",
"TrojanDropper.Dapato.fxa",
"Win32.Troj.Dapato.kcloud",
"TrojanDownloader:Win32/Obvod.K",
"Trojan.Adclicker.HB",
"Trojan.Adclicker.HB",
"Dropper/Win32.Dapato.R27056",
"Trojan.Adclicker.HB"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Damatak",
"Trojan.Heur.JP.EEC131",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win32.Poison.eqxekp",
"Trojan.Chanitor.26",
"BehavesLike.Win32.Injector.km",
"Backdoor:Win32/Damatak.A",
"Backdoor.W32.Hupigon.kYZB",
"Heur.Trojan.Hlux",
"Trj/CI.A",
"Win32.Trojan.Dlder.Tayr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"email",
"was",
"supposedly",
"sent",
"by",
"the",
"head",
"of",
"a",
"US-based",
"terrorist",
"monitoring",
"group."
] | [
16,
1,
16,
16,
16,
16,
16,
4,
16,
16,
4,
12,
12,
12
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.