tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "Again", ",", "this", "package", "source", "code", "is", "publicly", "available", "and", "can", "be", "found", "here", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "BDS/Iroffer.1221.5", "Backdoor.Iroffer.AM", "W32/Iroffer.BC", "Trojan.Ioffer", "Backdoor.Win32.Iroffer.1221", "Backdoor.Iroffer.1.2.2.1", "W32/Iroffer.AM@bd", "BackDoor.Iroffer.1221", "Backdoor.Win32.Iroffer.1221", "W32/Iroffer.AM@bd", "Backdoor.Iroffer.1221.4098", "Backdoor:Win32/Iroffer.1_221", "Backdoor.Iroffer.1221", "Win32/Iroffer.1222", "Backdoor.Win32.Iroffer.1221", "BackDoor.Iroffer.AD" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Downloader.LoadAdv.ABW", "Trojan.Downloader.LoadAdv.ABW", "Win32.Trojan.WisdomEyes.16070401.9500.9971", "Trojan.Downloader.LoadAdv.ABW", "Trojan.Downloader.LoadAdv.ABW", "Trojan.Downloader.LoadAdv.ABW", "Trojan.Packed.359", "Trojan:Win32/Piptea.E", "Email-Worm.Win32.Joleee" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Pay-per-infection", "is", "an", "underground", "business", "model", "where", "criminals", "are", "paying", "other", "criminals", "to", "distribute", "their", "malware" ]
[ 3, 16, 16, 6, 14, 16, 16, 6, 16, 16, 16, 6, 16, 16, 16, 3 ]
[ "A", "number", "of", "tools", "and", "previously", "unknown", "exploits", "were", "discovered", "in", "the", "trove", "of", "data", "posted", "online." ]
[ 16, 16, 16, 3, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DesticosLTG.Trojan", "Worm.Delf.Win32.2144", "Worm.Win32.Delf.aai", "Trojan.Win32.Delf.ejergb", "Win32.Worm.Delf.Pkqt", "Trojan.MulDrop6.34757", "BehavesLike.Win32.Dropper.vc", "W32/Trojan.ZKLJ-7196", "Worm.Delf.ah", "Trojan:Win32/Chamolyon.A", "Trojan.Zusy.D2E11A", "Worm.Win32.Delf.aai", "Worm.Delf!YSxowO1fm1s", "Trojan-Downloader.Win32.Banload", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Name", "MD5", "Purpose", "msconf.exe", "55fb01048b6287eadcbd9a0f86d21adf", "Main", "module", ",", "reverse", "shell", "network.exe", "f673bb1d519138ced7659484c0b66c5b", "Sending", "exfiltrated", "data", "system.exe", "d3baa45ed342fbc5a56d974d36d5f73f", "Surrounding", "sound", "recording", "by", "mic", "update.exe", "395f9f87df728134b5e3c1ca4d48e9fa", "Keylogging", "wow.exe", "16311b16fd48c1c87c6476a455093e7a", "Screenshot", "capturing", "skype_sync2.exe", "6bcc3559d7405f25ea403317353d905f", "Skype", "call", "recording", "to", "MP3", "All", "modules", ",", "except", "skype_sync2.exe", ",", "are", "written", "in", "Python", "and", "packed", "to", "binary", "files", "via", "the", "Py2exe", "tool", "." ]
[ 16, 16, 16, 1, 1, 16, 16, 16, 16, 16, 1, 1, 16, 16, 16, 1, 1, 16, 16, 16, 16, 16, 1, 1, 16, 1, 1, 16, 16, 1, 1, 5, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "Inside", "the", "SDK", "The", "malware", "resides", "within", "the", "β€˜", "RXDrioder", "’", "Software", "Development", "Kit", "(", "SDK", ")", ",", "which", "is", "provided", "by", "β€˜", "addroider", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "Upon", "opening", "the", "file", ",", "the", "user", "is", "asked", "to", "enable", "β€œ", "Google", "Play", "Protect", "”", "as", "shown", "in", "Figure", "2", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "loader", "’", "s", "anti-debugger", "code", "is", "based", "on", "the", "following", "three", "methods", ":", "The", "first", "call", "aims", "to", "destroy", "the", "debugger", "connection", ":", "NOTE", ":", "This", "call", "completely", "stops", "the", "execution", "of", "WinDbg", "and", "other", "debuggers", "The", "second", "call", "tries", "to", "detect", "the", "presence", "of", "a", "debugger", ":", "The", "final", "call", "tries", "to", "destroy", "the", "possibility", "of", "adding", "software", "breakpoint", ":", "Finally", ",", "if", "the", "loader", "is", "happy", "with", "all", "the", "checks", "done", "so", "far", ",", "based", "on", "the", "victim", "operating", "system", "(", "32", "or", "64-bit", ")", "it", "proceeds", "to", "decrypt", "a", "set", "of", "fake", "bitmap", "resources", "(", "stage", "2", ")", "embedded", "in", "the", "executable", "and", "prepares", "the", "execution", "of", "a", "new", "layer", "of", "VM", "decoding", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Commodity", "Remote", "Access", "Trojans", "RATs", "--", "which", "are", "designed,", "productized", "and", "sold", "to", "the", "casual", "and", "experienced", "hacker", "alike", "--", "put", "powerful", "remote", "access", "capabilities", "into", "the", "hands", "of", "criminals." ]
[ 3, 11, 11, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 6 ]
[ "A", "couple", "of", "months", "later", ",", "in", "August", "2019", ",", "a", "new", "version", "was", "released", "with", "additional", "banking-specific", "features", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "phishing", "page", "is", "translated", "in", "Korean", ",", "Japanese", ",", "Chinese", ",", "and", "English", ",", "which", "are", "hardcoded", "in", "the", "payload", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "RuMMS", "samples", ",", "hosting", "sites", ",", "C2", "servers", "from", "Jan.", "2016", "to", "Mar", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "advance", "of", "any", "official", "release,", "cybercriminals", "have", "already", "released", "their", "own", "Mario-related", "apps." ]
[ 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 3, 11, 11 ]
[ "This", "implant", "was", "deployed", "in", "less", "than", "10", "machines", "only." ]
[ 16, 3, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "This", "campaign", "started", "on", "July", "9,", "a", "few", "days", "after", "the", "Hacking", "Team", "announced", "it", "was", "hacked." ]
[ 16, 6, 16, 16, 0, 8, 16, 0, 8, 16, 16, 4, 12, 16, 16, 16, 1 ]
[ "Most", "of", "the", "organizations", "attacked", "were", "vendors", "of", "industrial", "automation", "solutions", "and", "system", "support", "contractors." ]
[ 16, 16, 16, 4, 1, 16, 4, 16, 4, 12, 12, 16, 4, 12, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-PWS/W32.WebGame.18432.Y", "Trojan-PSW.Win32.Maran!O", "Trojan/PSW.Maran.ij", "W32/Pws.QZP", "Infostealer.Phax", "TSPY_MARAN.ANC", "Trojan-PSW.Win32.Maran.sv", "Trojan.Win32.Maran.jzdr", "Trojan.Win32.Z.Maran.18432.A", "Troj.GameThief.W32.OnLineGames.l9d5", "TrojWare.Win32.PSW.Maran.NAH", "Trojan.PWS.Maran.591", "Trojan.Win32.6BC1FBA9", "TSPY_MARAN.ANC", "BehavesLike.Win32.SpywareLyndra.lh", "Trojan/PSW.Maran.ej", "Trojan[PSW]/Win32.Maran", "Trojan.Graftor.D18418", "Trojan-PSW.Win32.Maran.sv", "PWS:Win32/Maran.M", "Trojan/Win32.Magania.C87823", "TrojanPSW.Maran", "Trj/Maran.BK", "Win32/PSW.Maran.NAH", "Trojan.PWS.Maran!SDdAAxRuS44", "Trojan-GameThief.Win32.OnLineGames", "W32/MARAN.SV!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "MainActivity", "registers", "BootComplete", "with", "a", "boot", "event", ",", "so", "that", "whenever", "the", "device", "is", "booted", ",", "BootComplete", "gets", "triggered", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win-Trojan/MSILKrypt02.Exp", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "Sakula", "is", "a", "well", "known", "malware", "variant", "linked", "to", "several", "significant", "targeted", "intrusion", "campaigns", "over", "the", "past", "2-3", "years." ]
[ 3, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 6, 14, 14, 16, 16, 0, 8, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9964", "BehavesLike.Win32.Trojan.mz", "Trojan/Win32.LockScreen.C1515946" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "Also,", "the", "samples", "analyzed", "have", "the", "ability", "detect", "the", "presence", "of", "a", "virtual", "machine", "to", "ensure", "it's", "not", "being", "analyzed", "in", "a", "network", "sandbox." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13 ]
[ "Cybereason", "classifies", "EventBot", "as", "a", "mobile", "banking", "trojan", "and", "infostealer", "based", "on", "the", "stealing", "features", "discussed", "in", "this", "research", "." ]
[ 4, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "While", "doing", "our", "investigation", "we", "were", "able", "to", "identify", "other", "malware", "packages", "with", "different", "names", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Below", "are", "some", "of", "the", "elements", "showing", "the", "relation", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "current", "version", "of", "the", "malware", "allows", "the", "operator", "to", "steal", "files,", "keystrokes,", "perform", "screenshots,", "and", "execute", "arbitrary", "code", "on", "the", "infected", "host." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 6, 16, 1, 9, 9, 9, 9, 16, 1, 9, 9, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Razy.D39D3F", "Trojan.Win32.KillProc.hd", "Trojan.BtcMine.2050", "Trojan/Win32.KillProc", "TrojanDownloader:MSIL/Taily.A!bit", "RiskWare.BitCoinMiner", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Trojan.AHSJ-4985", "Ransom_HC7.R002C0DAA18", "Trojan.Win32.RedCap.ewxmze", "Virus.Ransom.Pycl.A!c", "TR/RedCap.qcvri", "Trojan/Win32.Ransom.C2347549", "Trojan.Ransom.PyCL", "Ransom.FileLocker", "Trojan.DownLoader!", "Ransom.Win32", "Trojan-Ransom.Crypren", "Trj/CI.A", "Win32/Trojan.Ransom.97f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "reinforces", "the", "need", "for", "comprehensive", "defense", "powered", "by", "broad", "visibility", "into", "attack", "surfaces", "as", "well", "as", "domain", "experts", "who", "track", "the", "threat", "landscape", "and", "uncover", "notable", "threats", "that", "might", "be", "hiding", "amidst", "massive", "threat", "data", "and", "signals", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "it", "The", "rise", "of", "mobile", "banker", "Asacub", "28", "AUG", "2018", "We", "encountered", "the", "Trojan-Banker.AndroidOS.Asacub", "family", "for", "the", "first", "time", "in", "2015", ",", "when", "the", "first", "versions", "of", "the", "malware", "were", "detected", ",", "analyzed", ",", "and", "found", "to", "be", "more", "adept", "at", "spying", "than", "stealing", "funds", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Infostealer.Limitail", "Trojan.DownLoader26.6005", "BehavesLike.Win32.Trojan.cm", "Trojan.MSIL.Injector", "Trojan.MSIL.Bladabindi.1", "Trojan/Win32.RatTool.R208188", "Trj/GdSda.A", "MSIL/SpyPSW.AVQ!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Strictor.D1B6BC", "BKDR_HPKELIHOS.SM4", "Win32.Trojan.WisdomEyes.16070401.9500.9990", "BKDR_HPKELIHOS.SM4", "BehavesLike.Win32.Expiro.ch", "Trojan.WPCracker.u", "Trojan.Win32.Boaxxe", "W32/Injector.DDXZ!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "RIG", "Exploit", "Kit", "-", "May", "2015" ]
[ 3, 11, 11, 16, 0, 8 ]
[ "Compared", "to", "other", "adversary", "groups,", "C0d0so0", "has", "shown", "the", "use", "of", "more", "sophisticated", "tactics", "and", "tools", "and", "has", "been", "linked", "to", "leveraging", "zero-day", "exploits", "on", "numerous", "occasions", "in", "combination", "with", "watering", "hole", "and", "spear", "phishing", "attacks." ]
[ 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 7, 15, 16, 16, 16, 16, 16, 16, 1, 9, 16, 1, 9, 9 ]
[ "Although", "Unit", "42", "cannot", "provide", "a", "full", "picture", "of", "the", "details", "surrounding", "the", "delivery", "of", "these", "samples,", "we", "are", "confident", "this", "activity", "targets", "Korean", "language", "speakers", "who", "use", "Samsung", "devices." ]
[ 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Cosmu.aqmz", "Trojan.Win32.Cosmu.divg", "Trojan.Win32.Z.Cosmu.1849214", "W32.Dzan.l3Vn", "Trojan.DownLoader19.64657", "Trojan.Cosmu.Win32.7698", "Trojan-Dropper.Win32.Injector", "Trojan/Cosmu.mih", "Trojan[Downloader]/Win32.Wren", "Trojan.Win32.Cosmu.divg", "Trojan.Cosmu", "Trj/CI.A", "Win32.Trojan.Cosmu.Dypy", "W32/Malicious_Behavior.VEX", "Win32/Worm.15b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "attacks", "came", "to", "light", "when", "a", "bank", "in", "Poland", "discovered", "previously", "unknown", "malware", "running", "on", "a", "number", "of", "its", "computers." ]
[ 16, 1, 16, 16, 16, 16, 16, 4, 16, 2, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 5 ]
[ "On", "each", "system", "several", "tools", "were", "used", "to", "find,", "encrypt,", "and", "delete", "the", "original", "files", "as", "well", "as", "any", "backups." ]
[ 16, 16, 5, 16, 3, 16, 16, 16, 16, 1, 16, 1, 9, 9, 9, 16, 16, 16, 16, 16 ]
[ "The", "\"", "source", "process", "''", "refers", "to", "the", "Zen", "trojan", "running", "as", "root", ",", "while", "the", "\"", "target", "process", "''", "refers", "to", "the", "process", "to", "which", "the", "code", "is", "injected", "and", "[", "pid", "]", "refers", "to", "the", "target", "process", "pid", "value", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Unit", "42", "researchers", "have", "uncovered", "a", "malware", "distribution", "campaign", "that", "is", "delivering", "the", "LokiBot", "information", "stealer", "via", "business", "email", "compromise", "BEC", "phishing", "emails" ]
[ 4, 12, 12, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 3, 11, 11, 16, 1, 9, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Qhost.724992", "Trojan.Win32.Qhost!O", "Trojan.BeeVry", "Trojan.Qhost", "Worm.AutoRun.Win32.64118", "Win32.Worm.Autorun.ah", "W32/Trojan2.OFIZ", "W32.SillyFDC", "WORM_YAHLOVER.SM", "Trojan.Win32.Qhost.afes", "Trojan.Win32.Qhost.boicaq", "Trojan.Win32.A.Qhost.724992", "Trojan.MulDrop3.42831", "WORM_YAHLOVER.SM", "BehavesLike.Win32.Autorun.bt", "W32/Trojan.RWER-6321", "Trojan/Qhost.gez", "Trojan/Win32.Qhost", "Troj.W32.Qhost.tn9x", "Trojan.Win32.Qhost.afes", "HEUR/Fakon.mwf", "W32/Autorun.worm.aadm", "Trojan.Qhost", "Trojan.Qhost", "Win32/AutoRun.VB.AVY", "Trojan.Qhost!hFnYX0CfRwA", "Worm.Win32.VB" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "numbering", "seems", "to", "have", "started", "anew", "after", "the", "version", "9", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DownloadDAB.Trojan", "Worm.MSIL.Arcdoor!O", "Worm.Arcdoor.ae3", "Worm.Arcdoor.Win32.1086", "Trojan/Arcdoor.ae", "MSIL.Worm.Arcdoor.b", "W32/Trojan2.NFSU", "Backdoor.Trojan", "Win32/Pontoeb.A", "BKDR_PONTOEB.SMHA", "Win.Trojan.Worm-74", "Worm.MSIL.Arcdoor.ae", "Trojan.Win32.Arcdoor.ctsdhw", "Msil.Worm.Arcdoor.Lknq", "BKDR_PONTOEB.SMHA", "Worm.MSIL", "W32/Trojan.LEEP-1569", "Worm.MSIL.fi", "WORM/MSIL.Arcdo.aea", "Worm/MSIL.Arcdoor", "Backdoor:MSIL/Pontoeb.G", "Trojan.Win32.Z.Arcdoor.26624", "Worm.MSIL.Arcdoor.ae", "Worm/Win32.Arcdoor.R11889", "MSIL/Arcdoor.AE", "MSIL/AntiVM.V!tr", "Win32/Worm.bed" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "overlays", "are", "activated", "by", "the", "malicious", "operator", "using", "the", "command", "changeActivity", ",", "as", "seen", "on", "step", "5", "of", "the", "activation", "cycle", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.LoadMoney.eprnxa", "PUP.LoadMoney/Variant", "Trojan.LoadMoney.2303", "PUA.SearchGo", "ADWARE/SearchGo.avskt", "PUP/Win32.Searchgo.R201982", "Adware.SearchGo" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "widespread", "use", "of", "telnet,", "along", "with", "a", "list", "of", "factory", "default", "usernames", "and", "passwords,", "result", "in", "botnets", "with", "sizes", "that", "is", "beyond", "imagination." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 7, 15, 15, 15, 15, 16, 16, 3, 16, 16, 16, 16, 16, 16 ]
[ "are", "designed", "to", "resemble", "tracking", "e-mails", "from", "different", "post", "offices", "around", "the", "world." ]
[ 16, 16, 16, 16, 1, 9, 16, 16, 4, 12, 16, 16, 2 ]
[ "The", "beaconing", "will", "only", "start", "after", "the", "application", "is", "removed", "from", "the", "background", ",", "ultimately", "stopping", "it", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "first", "section", "aims", "to", "analyze", "the", "malware's", "capabilities", "e.g.:", "c2", "connectivity,", "encoding", "mechanisms", "and", "overall", "system", "activity." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "RAT", "looks", "new", "to", "us;", "hence", "we", "suspected", "that", "it", "may", "either", "be", "a", "new", "RAT", "family", "or", "a", "custom", "RAT", "that", "was", "developed", "for", "a", "specific", "attacker", "hacker" ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 3, 11, 16, 16, 16, 11, 6, 14, 14, 14 ]
[ "Related", "Github", "account", "contains", "forked", "Conversations", "repository", "Summarizing", "all", "the", "found", "clues", ",", "we", "have", "the", "following", "attribution", "flow", ":", "Conclusion", "The", "operation", "of", "ViceLeaker", "is", "still", "ongoing", ",", "as", "is", "our", "research", "." ]
[ 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clod3a9.Trojan.e28b", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Backdoor.Trojan", "trojan.win32.skeeyah.a!rfn", "W32/Trojan.FVPV-5651", "TR/Crypt.ZPACK.mwex", "TrojanDropper:Win32/Barlaiy.A!dha", "Trojan-Downloader.Win32.FraudLoad", "Trj/CI.A", "Win32/Trojan.0e6" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "cyber-espionage", "group", "was", "dubbed", "Rocket", "Kitten,'", "and", "remains", "active", "as", "of", "this", "writing,", "with", "reported", "attacks", "as", "recent", "as", "October", "2015." ]
[ 16, 6, 14, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 0, 8 ]
[ "Late", "last", "week", "Talos", "researchers", "noticed", "a", "drastic", "uptick", "in", "Angler", "Exploit", "Kit", "activity." ]
[ 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 3, 11, 11, 16 ]
[ "This", "blog", "presents", "our", "analysis", "of", "one", "of", "the", "latest", "malware", "variants", "targeting", "individuals", "in", "Taiwan,", "which", "exhibits", "some", "interesting", "characteristics", "that", "can", "be", "useful", "for", "detecting", "and", "defending", "against", "the", "threat", "–", "including", "the", "creation", "of", "an", "obese", "file,", "weighing", "in", "at", "500MB,", "as", "part", "of", "its", "execution." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 2, 16, 16, 16, 16, 16, 16, 16, 16, 16, 11, 1, 16, 1, 16, 16, 3, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9 ]
[ "RECEIVE_BOOT_COMPLETED", "-", "Allows", "the", "application", "to", "receive", "a", "broadcast", "after", "the", "system", "finishes", "booting", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Regardless", "of", "the", "parameters", ",", "it", "returns", "a", "json", "containing", "a", "link", "for", "APK", "file", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "CitizenLab", "connect", "the", "infrastructure", "used", "in", "the", "campaign", "to", "previous", "malware", "operations", "targeting", "a", "Tibetan", "radio", "station", "and", "the", "Thai", "government." ]
[ 4, 16, 16, 5, 16, 16, 16, 6, 16, 16, 3, 11, 16, 16, 4, 12, 12, 16, 4, 12, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Zlob.60259", "Trojan.NSIS.StartPage.Q", "Trojan.Zlob.60259", "Win32/SillyDl.YHD", "Win.Trojan.NSIS-38", "Trojan-Downloader.Win32.NSIS.io", "Trojan.Zlob.60259", "Riskware.Nsis.Adw.cxexqq", "Troj.Downloader.W32.Lipler.lkqh", "Trojan.Zlob.60259", "Trojan.Fakealert.26734", "BehavesLike.Win32.AdwareSearchProtect.kc", "TrojanDownloader:Win32/Gabeerf.A", "Trojan.Zlob.DEB63", "Trojan.Win32.Banker.140384", "Trojan.Zlob.60259", "Trojan/Win32.StartPage.R26935", "Trojan.NSIS" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.AutoRunLUL.Worm", "Trojan.Downloader.Bredolab.AA", "Packed.Win32.Tadym!O", "Trojan.Tadym", "Downloader-BTR.a", "Trojan.Downloader.Bredolab.AA", "TROJ_BREDLAB.SMB", "Win32.Trojan.WisdomEyes.16070401.9500.9994", "TROJ_BREDLAB.SMB", "Win.Trojan.Bredolab-4616", "Packed.Win32.Tadym.b", "Trojan.Downloader.Bredolab.AA", "Trojan.Win32.Tadym.deqzho", "Win32.Packed.Tadym.Pdmb", "Trojan.Downloader.Bredolab.AA", "TrojWare.Win32.TrojanDropper.HDrop.B", "Trojan.Downloader.Bredolab.AA", "Win32.HLLW.Autoruner.6644", "Backdoor.CPEX.Win32.27835", "BehavesLike.Win32.RAHack.mc", "Worm/AutoRun.nlq", "Trojan[Packed]/Win32.Tadym", "TrojanDropper:Win32/Emold.C", "Troj.W32.Vaklik.l3JH", "Packed.Win32.Tadym.b", "Trojan.Downloader.Bredolab.AA", "Trojan.Downloader.Bredolab.AA", "BScope.Trojan.Ballast", "Worm.AutoRun!kxuXEtVXF84", "Trojan.Win32.Bredolab" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "InPage", "is", "a", "word", "processor", "program", "that", "supports", "languages", "such", "as", "Urdu,", "Persian,", "Pashto,", "and", "Arabic." ]
[ 5, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "operation", "is", "another", "example", "of", "a", "threat", "actor", "using", "just", "enough", "technical", "sophistication", "to", "exploit", "a", "target." ]
[ 6, 14, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 7, 16, 16 ]
[ "update.exe", "module", "and", "Keylogger", "by", "β€˜", "El3ct71k", "’", "code", "comparison", "Xenotix", "Python", "Keylogger", "including", "specified", "mutex", "β€˜", "mutex_var_xboz", "’", "." ]
[ 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16 ]
[ "However", ",", "no", "command", "is", "received", "from", "the", "C2", "until", "the", "inactiveTime", "field", "(", "see", "beaconing", "information", "image", "above", ")", "has", "at", "least", "the", "value", "of", "2000000", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.ExpiroPC.PE", "Trojan.Kazy.D765A4", "Heur.Corrupt.PE", "BehavesLike.Win32.PWSGamania.dc", "HackTool.Win32.QQExplorer", "HackTool/Win32.QQExplorer", "HackTool:Win32/QQExplorer.1_26.dam#2", "HackTool/Win32.QQExplorer.C1530039", "Trj/CI.A", "Win32/Trojan.dd5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "Bootkit", "is", "a", "rootkit", "malware", "variant", "which", "infects", "the", "device", "at", "start-up", "and", "may", "encrypt", "disk", "or", "steal", "data", ",", "remove", "the", "application", ",", "open", "connection", "for", "Command", "and", "controller", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom.Locky.D6", "Trojan.Barys.DD3B9", "W32.Pilleuz", "Win32.Trojan-Downloader.Kryptik.ER", "Trojan.Win32.Inject.ebobum", "Trojan.Win32.Z.Injector.119812", "BackDoor.Andromeda.1478", "Dropper.Injector.Win32.77187", "BehavesLike.Win32.PWSZbot.ch", "W32/Trojan.LSBE-5509", "TrojanDropper.Injector.bhwe", "Backdoor:Win32/Wondufi.A", "TrojanDropper.Injector", "Trj/GdSda.A", "Trojan.DR.Injector!1yj9x8ODPcQ", "W32/Kryptik.FIKL!tr", "Win32/Trojan.02c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Some", "of", "the", "more", "interesting", "commands", "include", ":", "SMS", "Control", "Update", "the", "address", "of", "the", "C", "&", "C", "server", "β€”", "SMS", "starting", "with", "β€œ", "http", ":", "//", "”", "Send", "AES-encrypted", "SMS", "message", "back", "to", "sender", "β€”", "SMS", "starting", "with", "β€œ", "sms", ":", "//", "”", "Update", "service", "wake-up", "interval", "β€”", "β€œ", "2", "”", "Kill", "switch", "β€”", "β€œ", "4", "”", "C", "&", "C", "Control", "Update", "the", "address", "of", "the", "C", "&", "C", "server", "β€”", "β€œ", "1", "”", "Update", "service", "wake-up", "interval", "β€”", "β€œ", "2", "”", "Lock", "the", "screen", "β€”", "β€œ", "5", "”", "Display", "a", "picture", "in", "a", "WebView", "from", "an", "arbitrary", "URL", "β€”", "β€œ", "11", "”", "Send", "an", "arbitrary", "SMS", "message", "β€”", "β€œ", "8", "”", "Steal", "images", "saved", "on", "the", "device", "β€”", "β€œ", "12", "”", "and", "β€œ", "13", "”", "Use", "the", "accessibility", "service", "to", "become", "the", "default", "SMS", "app", "β€”", "β€œ", "6", "”", "Enable", "recording", "of", "other", "apps", "β€”", "β€œ", "15", "”", "Kill", "switch", "β€”", "β€œ", "4", "”", "The", "Lockdown", "Screen", "Most", "thieves", "don", "’", "t", "want", "to", "be", "caught", "red-handed", "as", "they", "steal", "β€”", "they", "want", "to", "buy", "some", "time", "to", "get", "away", "with", "the", "loot", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Many", "of", "these", "samples", "have", "not", "been", "discussed", "publicly", "and", "several", "have", "very", "little", "or", "no", "anti-virus", "coverage." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.Lithium.38400", "Backdoor.Lithium.F", "Win32/Lithium.102", "Backdoor.Trojan", "W32/LithBack.1_02", "BKDR_LITH.102.A", "Win32.Lithium.102.a", "Backdoor.Win32.Lithium.102", "Backdoor.Lithium.1.0.2", "Backdoor.Win32.Lithium.102!IK", "Backdoor.Win32.Lithium.102", "Backdoor.Lithium.1.0.2", "BackDoor.Lithium.102", "BDS/Lithium.102.Srv", "BKDR_LITH.102.A", "Win32/Lithium.D", "Backdoor/Lithium.102", "Backdoor:Win32/Lithium.1_02", "Backdoor.Win32.Lithium_102.38400", "Backdoor.Lithium.1.0.2", "Win-Trojan/Lithium.38400", "Backdoor.Lithium.102", "Backdoor.Trojan", "Backdoor.Lithium.102.b", "Backdoor.Win32.Lithium.102", "W32/Lithium!tr.bdr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "saves", "the", "messages", "’", "metadata", "and", "content", ",", "filters", "the", "information", "by", "fields", ",", "and", "sends", "them", "to", "the", "C2", "server", "using", "the", "URL", "/servlet/SendMassage2", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16 ]
[ "For", "Google", ",", "Android", "security", "issues", "-", "even", "if", "not", "in", "the", "core", "operating", "code", "-", "are", "a", "reputation", "threat", ",", "and", "for", "Amazon", ",", "a", "product", "quality", "issue", "." ]
[ 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader.Admedia", "Multi.Threats.InArchive", "Trojan.Dropper", "Win32/Donnic.D", "Win.Downloader.Small-3527", "Trojan-Downloader.Win32.QQHelper.va", "Trojan.Win32.QQHelper.ybwad", "Troj.Downloader.W32!c", "Trojan.DownLoader.14343", "Backdoor.CPEX.Win32.15449", "BehavesLike.Win32.Backdoor.tc", "Trojan-Downloader.Win32.QQHelper", "TrojanDownloader.VB.lr", "TR/Dldr.Harnig.5", "Trojan[Downloader]/Win32.QQHelper", "Trojan:Win32/Zaptusk.A", "Trojan-Downloader.Win32.QQHelper.va", "Worm.WhiteIce", "Trj/Multidropper.BQE", "Win32.Trojan-downloader.Qqhelper.Dzaq", "Win32/Trojan.Downloader.c98" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "After", "spending", "more", "time", "analyzing", "the", "proxy,", "we", "realized", "that", "the", "requests", "we", "were", "receiving", "were", "not", "related", "to", "ad-fraud", "activity", "as", "we", "initially", "suspected", "but", "instead", "appeared", "to", "be", "for", "some", "sort", "of", "VPN", "service." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "AutoIt.Trojan.Injector.bq", "Trojan.Autoit", "W32/Injector.COJ!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "Thanks", "to", "Allwinner", ",", "a", "Chinese", "ARM", "system-on-a-chip", "maker", ",", "which", "has", "recently", "been", "caught", "shipping", "a", "version", "of", "Linux", "Kernel", "with", "an", "incredibly", "simple", "and", "easy-to-use", "built-in", "backdoor", "." ]
[ 16, 16, 4, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Obfuscated.KU", "Trojan.Win32.Inject!O", "Trojan.Inject.Win32.41934", "Trojan/Inject.bsb", "Win32.Trojan.WisdomEyes.16070401.9500.9746", "Win.Trojan.Inject-12484", "Trojan.Obfuscated.KU", "Trojan.Obfuscated.KU", "Trojan.Win32.Inject.cwlvrx", "AdWare.W32.Cinmus.kYTY", "Trojan.Obfuscated.KU", "Trojan.DownLoader1.2110", "Trojan.Win32.Malware.a", "Trojan.Rootkit", "Trojan/Win32.Inject", "Win32.Adware.CinmusT.lm.230980", "Trojan.Obfuscated.KU", "Trojan:Win32/Cinmus.K", "Trojan/Win32.Inject.C140611", "Trojan.Obfuscated.KU", "Trojan.Win32.Malware.a", "SScope.Trojan.Cinmus.39", "Win32.Trojan.Inject.bidk", "Trojan.Inject!Lqw/iuX+8xA", "W32/Malware_fam.NB" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Multi", "Trojan.Foreign.Win32.57563", "Trojan.Johnnie.D12DD3", "Trojan-Ransom.Win32.Foreign.nxyh", "Trojan.Win32.Panda.exmste", "Trojan.Win32.Z.Johnnie.582144", "Trojan.PWS.Panda.12917", "BehavesLike.Win32.Backdoor.hc", "Trojan.Win32.Crypt", "W32/Trojan.MEZF-9098", "TR/AD.PepaBot.pabel", "TrojanDropper:Win32/Ropest.A", "Trojan-Ransom.Win32.Foreign.nxyh", "TrojanPSW.Panda", "Trj/GdSda.A", "W32/Kryptik.FQTY!tr", "Win32/Trojan.acd" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Dozens", "of", "targets", "may", "receive", "the", "exact", "same", "message." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Dialer.10624", "Trojan.Dialer.AY", "Trojan/Dialer.ay", "Trojan.Dialer.AU1", "W32/Qdialer.J", "Dialer.DialPlatform", "Win32/SilentCaller.D", "TROJ_MALQES.A", "Trojan.Win32.Dialer.ay", "Trojan.Dialer.AY", "Trojan.Win32.Dialer.ay!IK", "TrojWare.Win32.Dialer.NAD", "Dialer.Silent", "TR/Drop.Delf.DJ.3", "TROJ_MALQES.A", "Trojan/Dialer.ay", "Trojan:Win32/Adialer.AX", "Trojan.Win32.Dialer.10656", "Win-AppCare/Dialer.10624", "Trojan.Dialer.AY", "W32/Qdialer.J", "OScope.Dialer.VL", "Win32/Dialer.NAD", "Trojan.Win32.Dialer.ay", "Dialer.8.AP" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Inject.68935", "Packed.Win32.TDSS!O", "Trojan/Inject.oc", "Win32.Trojan.WisdomEyes.16070401.9500.9868", "Backdoor.Trojan", "Trojan.Win32.Inject.oc", "Trojan.Win32.Inject.wpzg", "Troj.W32.Inject.oc!c", "BackDoor.Exte", "BehavesLike.Win32.Backdoor.kc", "Net-Worm.Win32.Mofeir", "Trojan/Inject.amwy", "Trojan/Win32.Inject", "Trojan:Win32/Oexsi.A", "Trojan.Win32.Inject.oc", "Trojan/Win32.Inject.C27812", "Trojan.Inject", "Trojan.Downloader", "W32/BanLoader.AAAC!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TROJ_KREP.D", "Trojan.DownLoad3.10695", "Trojan.Swisyn.Win32.8140", "TROJ_KREP.D", "Trojan/Swisyn.jnt", "Trojan:Win32/Trixpi.A", "Trojan-Downloader.win32.Delf.xoq", "W32/Mdrop.CQO!tr", "Trojan.Win32.Trixpi.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.SdBot.25088.Q", "Backdoor/Afbot.a", "BKDR_POEBOT.DK", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Backdoor.Trojan", "BKDR_POEBOT.DK", "Backdoor.Win32.Afbot.a", "Trojan.Win32.Afbot.daze", "Backdoor.Win32.S.Afbot.25088", "Backdoor.W32.Afbot.a!c", "Backdoor.Win32.Afbot.~A", "BackDoor.IRC.Afbot", "Backdoor.Afbot.Win32.1", "Backdoor/Afbot.a", "Trojan[Backdoor]/Win32.Afbot", "Backdoor:Win32/Afbot.A", "Backdoor.Win32.Afbot.a", "Backdoor.Afbot", "Bck/Iroffer.BG", "Win32.Backdoor.Afbot.Szbp", "Backdoor.Afbot!ktevPrMqQWw", "W32/Afbot.A!tr.bdr", "Win32/Backdoor.BO.3c4" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "were", "also", "able", "to", "confirm", "that", "the", "phone", "number", "he", "provided", "to", "the", "domain", "registrar", "was", "genuine", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "When", "installed", "on", "a", "device", ",", "apps", "containing", "adware", "may", ",", "among", "other", "things", ":", "Annoy", "users", "with", "intrusive", "advertisements", ",", "including", "scam", "ads", "Waste", "the", "device", "’", "s", "battery", "resources", "Generate", "increased", "network", "traffic", "Gather", "users", "’", "personal", "information", "Hide", "their", "presence", "on", "the", "affected", "device", "to", "achieve", "persistence", "Generate", "revenue", "for", "their", "operator", "without", "any", "user", "interaction", "Conclusion", "Based", "solely", "on", "open", "source", "intelligence", ",", "we", "were", "able", "to", "trace", "the", "developer", "of", "the", "Ashas", "adware", "and", "establish", "his", "identity", "and", "discover", "additional", "related", "adware-infected", "apps", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "These", "SQL", "servers", "are", "also", "used", "for", "command", "and", "control", "C2", "functionality." ]
[ 16, 5, 13, 16, 16, 16, 16, 1, 9, 9, 9, 16 ]
[ "Figure", "4", "shows", "MyReceiver", "in", "action", "where", "it", "eventually", "calls", "the", "MainService", "service", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Cosmu!O", "Worm.NadIote", "Trojan.Cosmu.Win32.2079", "Win32.Worm.VB.pf", "W32/Risk.BXNI-0011", "Win32/VB.AZL", "Trojan.Win32.Cosmu.ist", "Trojan.Win32.Cosmu.cojafm", "Win32.Trojan.Cosmu.Eehn", "Worm.Win32.Pronny.BL", "Win32.HLLW.Autoruner.14654", "BehavesLike.Win32.VBObfus.fm", "W32/MalwareS.AKRW", "Trojan/Cosmu.pri", "Trojan/Win32.Cosmu", "Trojan.Win32.Cosmu.315392.A", "Trojan.Win32.Cosmu.ist", "HEUR/Fakon.mwf", "Trojan.VBO.05376", "Trojan.Cosmu", "Win32/AutoRun.Spy.VB.E", "Trojan.Cosmu!52KOHqBZvHU" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Mauvaise.SL1", "Win32.Trojan.WisdomEyes.16070401.9500.9950", "Backdoor.Noknef", "TSPY_KONNI.A", "Trojan.Win32.Graftor.eoiwlz", "Dropper.S.Konni.266752", "Trojan.MulDrop7.31720", "TSPY_KONNI.A", "BehavesLike.Win32.Fake.dm", "W32/Trojan.NPTT-8320", "TR/Graftor.266752.17", "Trojan:Win32/Konny.A", "Backdoor.Noknef", "Backdoor.Win32.Hupigon", "Malicious_Behavior.SB" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Heur2.FU.E930ED", "Backdoor.Trojan", "Adware.Mutabaha.1206", "Trojan:Win32/Winnti.V!dha", "Trojan.Win32.Z.Svchorse.725184", "BScope.Trojan.SvcHorse.01643", "PossibleThreat.SB!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "Wild", "Neutron", "hit", "the", "spotlight", "in", "2013,", "when", "it", "successfully", "infected", "companies", "such", "as", "Apple,", "Facebook,", "Twitter", "and", "Microsoft." ]
[ 3, 11, 16, 16, 16, 16, 0, 16, 16, 16, 16, 4, 16, 16, 4, 12, 12, 16, 4 ]
[ "Triggers", "ET", "rules", "for:", "RadminRMS,", "XPCSpyPro,", "RemoteAdmin.RemoteUtilities.C" ]
[ 1, 16, 16, 16, 3, 3, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper.Win32.Mudrop!O", "Win32.Trojan.WisdomEyes.16070401.9500.9756", "Win.Trojan.VB-472", "Trojan-Dropper.Win32.Mudrop.bq", "Trojan.MulDrop.5694", "Downloader.VB.Win32.99231", "BehavesLike.Win32.RAHack.hh", "TrojanDropper.Mudrop.dv", "Trojan[Dropper]/Win32.Mudrop", "TrojanDropper:Win32/Popuper.N", "Trojan.Downloader-SysMon", "Trojan-Dropper.Win32.Mudrop.bq", "TScope.Malware-Cryptor.SB", "Trojan-Dropper.Win32.Mudrop" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "These", "include", "domains,", "file", "names,", "Java", "package", "names,", "and", "Facebook", "activity." ]
[ 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Inject.Win32.243804", "Trojan.Win32.Delphi.ewuekh", "Trojan[Backdoor]/MSIL.NanoBot", "Trojan/Win32.Injector.R217510", "Trojan.Symmi.D14210" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "After", "flashing", ",", "the", "bootkit", "will", "be", "removed", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Loselove.A", "Backdoor.Loselove.A", "Trojan.Win32.Loselove.makvn", "Backdoor.Trojan", "BKDR_LOSELOVE.A", "Win32.Trojan", "Backdoor.Win32.Loselove", "Backdoor.Loselove.A", "Backdoor.Loselove.B", "Backdoor.Win32.Loselove.765952", "Backdoor.Win32.Loselove.10", "Backdoor.Loselove.A", "BackDoor.Loselove", "BDC/Loselove.1", "BKDR_LOSELOVE.A", "Backdoor/LostLove.Client", "Win32.Hack.Loselove.kcloud", "Win-Trojan/Loselove.765952", "Backdoor.Loselove.A", "Backdoor.Trojan", "Win32/Loselove.10", "Backdoor.Win32.Loselove", "W32/Loselove.A!tr.bdr", "BackDoor.Loselove.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Potential", "infrastructure", "used", "to", "launch", "phishing", "attacks", "against", "the", "Macron", "presidential", "campaign." ]
[ 16, 5, 16, 16, 16, 1, 9, 16, 4, 12, 12, 12 ]