tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"Again",
",",
"this",
"package",
"source",
"code",
"is",
"publicly",
"available",
"and",
"can",
"be",
"found",
"here",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BDS/Iroffer.1221.5",
"Backdoor.Iroffer.AM",
"W32/Iroffer.BC",
"Trojan.Ioffer",
"Backdoor.Win32.Iroffer.1221",
"Backdoor.Iroffer.1.2.2.1",
"W32/Iroffer.AM@bd",
"BackDoor.Iroffer.1221",
"Backdoor.Win32.Iroffer.1221",
"W32/Iroffer.AM@bd",
"Backdoor.Iroffer.1221.4098",
"Backdoor:Win32/Iroffer.1_221",
"Backdoor.Iroffer.1221",
"Win32/Iroffer.1222",
"Backdoor.Win32.Iroffer.1221",
"BackDoor.Iroffer.AD"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Downloader.LoadAdv.ABW",
"Trojan.Downloader.LoadAdv.ABW",
"Win32.Trojan.WisdomEyes.16070401.9500.9971",
"Trojan.Downloader.LoadAdv.ABW",
"Trojan.Downloader.LoadAdv.ABW",
"Trojan.Downloader.LoadAdv.ABW",
"Trojan.Packed.359",
"Trojan:Win32/Piptea.E",
"Email-Worm.Win32.Joleee"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Pay-per-infection",
"is",
"an",
"underground",
"business",
"model",
"where",
"criminals",
"are",
"paying",
"other",
"criminals",
"to",
"distribute",
"their",
"malware"
] | [
3,
16,
16,
6,
14,
16,
16,
6,
16,
16,
16,
6,
16,
16,
16,
3
] |
[
"A",
"number",
"of",
"tools",
"and",
"previously",
"unknown",
"exploits",
"were",
"discovered",
"in",
"the",
"trove",
"of",
"data",
"posted",
"online."
] | [
16,
16,
16,
3,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DesticosLTG.Trojan",
"Worm.Delf.Win32.2144",
"Worm.Win32.Delf.aai",
"Trojan.Win32.Delf.ejergb",
"Win32.Worm.Delf.Pkqt",
"Trojan.MulDrop6.34757",
"BehavesLike.Win32.Dropper.vc",
"W32/Trojan.ZKLJ-7196",
"Worm.Delf.ah",
"Trojan:Win32/Chamolyon.A",
"Trojan.Zusy.D2E11A",
"Worm.Win32.Delf.aai",
"Worm.Delf!YSxowO1fm1s",
"Trojan-Downloader.Win32.Banload",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Name",
"MD5",
"Purpose",
"msconf.exe",
"55fb01048b6287eadcbd9a0f86d21adf",
"Main",
"module",
",",
"reverse",
"shell",
"network.exe",
"f673bb1d519138ced7659484c0b66c5b",
"Sending",
"exfiltrated",
"data",
"system.exe",
"d3baa45ed342fbc5a56d974d36d5f73f",
"Surrounding",
"sound",
"recording",
"by",
"mic",
"update.exe",
"395f9f87df728134b5e3c1ca4d48e9fa",
"Keylogging",
"wow.exe",
"16311b16fd48c1c87c6476a455093e7a",
"Screenshot",
"capturing",
"skype_sync2.exe",
"6bcc3559d7405f25ea403317353d905f",
"Skype",
"call",
"recording",
"to",
"MP3",
"All",
"modules",
",",
"except",
"skype_sync2.exe",
",",
"are",
"written",
"in",
"Python",
"and",
"packed",
"to",
"binary",
"files",
"via",
"the",
"Py2exe",
"tool",
"."
] | [
16,
16,
16,
1,
1,
16,
16,
16,
16,
16,
1,
1,
16,
16,
16,
1,
1,
16,
16,
16,
16,
16,
1,
1,
16,
1,
1,
16,
16,
1,
1,
5,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"Inside",
"the",
"SDK",
"The",
"malware",
"resides",
"within",
"the",
"β",
"RXDrioder",
"β",
"Software",
"Development",
"Kit",
"(",
"SDK",
")",
",",
"which",
"is",
"provided",
"by",
"β",
"addroider",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"Upon",
"opening",
"the",
"file",
",",
"the",
"user",
"is",
"asked",
"to",
"enable",
"β",
"Google",
"Play",
"Protect",
"β",
"as",
"shown",
"in",
"Figure",
"2",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"loader",
"β",
"s",
"anti-debugger",
"code",
"is",
"based",
"on",
"the",
"following",
"three",
"methods",
":",
"The",
"first",
"call",
"aims",
"to",
"destroy",
"the",
"debugger",
"connection",
":",
"NOTE",
":",
"This",
"call",
"completely",
"stops",
"the",
"execution",
"of",
"WinDbg",
"and",
"other",
"debuggers",
"The",
"second",
"call",
"tries",
"to",
"detect",
"the",
"presence",
"of",
"a",
"debugger",
":",
"The",
"final",
"call",
"tries",
"to",
"destroy",
"the",
"possibility",
"of",
"adding",
"software",
"breakpoint",
":",
"Finally",
",",
"if",
"the",
"loader",
"is",
"happy",
"with",
"all",
"the",
"checks",
"done",
"so",
"far",
",",
"based",
"on",
"the",
"victim",
"operating",
"system",
"(",
"32",
"or",
"64-bit",
")",
"it",
"proceeds",
"to",
"decrypt",
"a",
"set",
"of",
"fake",
"bitmap",
"resources",
"(",
"stage",
"2",
")",
"embedded",
"in",
"the",
"executable",
"and",
"prepares",
"the",
"execution",
"of",
"a",
"new",
"layer",
"of",
"VM",
"decoding",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Commodity",
"Remote",
"Access",
"Trojans",
"RATs",
"--",
"which",
"are",
"designed,",
"productized",
"and",
"sold",
"to",
"the",
"casual",
"and",
"experienced",
"hacker",
"alike",
"--",
"put",
"powerful",
"remote",
"access",
"capabilities",
"into",
"the",
"hands",
"of",
"criminals."
] | [
3,
11,
11,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
6
] |
[
"A",
"couple",
"of",
"months",
"later",
",",
"in",
"August",
"2019",
",",
"a",
"new",
"version",
"was",
"released",
"with",
"additional",
"banking-specific",
"features",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"phishing",
"page",
"is",
"translated",
"in",
"Korean",
",",
"Japanese",
",",
"Chinese",
",",
"and",
"English",
",",
"which",
"are",
"hardcoded",
"in",
"the",
"payload",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"RuMMS",
"samples",
",",
"hosting",
"sites",
",",
"C2",
"servers",
"from",
"Jan.",
"2016",
"to",
"Mar",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"advance",
"of",
"any",
"official",
"release,",
"cybercriminals",
"have",
"already",
"released",
"their",
"own",
"Mario-related",
"apps."
] | [
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
3,
11,
11
] |
[
"This",
"implant",
"was",
"deployed",
"in",
"less",
"than",
"10",
"machines",
"only."
] | [
16,
3,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"This",
"campaign",
"started",
"on",
"July",
"9,",
"a",
"few",
"days",
"after",
"the",
"Hacking",
"Team",
"announced",
"it",
"was",
"hacked."
] | [
16,
6,
16,
16,
0,
8,
16,
0,
8,
16,
16,
4,
12,
16,
16,
16,
1
] |
[
"Most",
"of",
"the",
"organizations",
"attacked",
"were",
"vendors",
"of",
"industrial",
"automation",
"solutions",
"and",
"system",
"support",
"contractors."
] | [
16,
16,
16,
4,
1,
16,
4,
16,
4,
12,
12,
16,
4,
12,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-PWS/W32.WebGame.18432.Y",
"Trojan-PSW.Win32.Maran!O",
"Trojan/PSW.Maran.ij",
"W32/Pws.QZP",
"Infostealer.Phax",
"TSPY_MARAN.ANC",
"Trojan-PSW.Win32.Maran.sv",
"Trojan.Win32.Maran.jzdr",
"Trojan.Win32.Z.Maran.18432.A",
"Troj.GameThief.W32.OnLineGames.l9d5",
"TrojWare.Win32.PSW.Maran.NAH",
"Trojan.PWS.Maran.591",
"Trojan.Win32.6BC1FBA9",
"TSPY_MARAN.ANC",
"BehavesLike.Win32.SpywareLyndra.lh",
"Trojan/PSW.Maran.ej",
"Trojan[PSW]/Win32.Maran",
"Trojan.Graftor.D18418",
"Trojan-PSW.Win32.Maran.sv",
"PWS:Win32/Maran.M",
"Trojan/Win32.Magania.C87823",
"TrojanPSW.Maran",
"Trj/Maran.BK",
"Win32/PSW.Maran.NAH",
"Trojan.PWS.Maran!SDdAAxRuS44",
"Trojan-GameThief.Win32.OnLineGames",
"W32/MARAN.SV!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"MainActivity",
"registers",
"BootComplete",
"with",
"a",
"boot",
"event",
",",
"so",
"that",
"whenever",
"the",
"device",
"is",
"booted",
",",
"BootComplete",
"gets",
"triggered",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win-Trojan/MSILKrypt02.Exp",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"Sakula",
"is",
"a",
"well",
"known",
"malware",
"variant",
"linked",
"to",
"several",
"significant",
"targeted",
"intrusion",
"campaigns",
"over",
"the",
"past",
"2-3",
"years."
] | [
3,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
6,
14,
14,
16,
16,
0,
8,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9964",
"BehavesLike.Win32.Trojan.mz",
"Trojan/Win32.LockScreen.C1515946"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"Also,",
"the",
"samples",
"analyzed",
"have",
"the",
"ability",
"detect",
"the",
"presence",
"of",
"a",
"virtual",
"machine",
"to",
"ensure",
"it's",
"not",
"being",
"analyzed",
"in",
"a",
"network",
"sandbox."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13
] |
[
"Cybereason",
"classifies",
"EventBot",
"as",
"a",
"mobile",
"banking",
"trojan",
"and",
"infostealer",
"based",
"on",
"the",
"stealing",
"features",
"discussed",
"in",
"this",
"research",
"."
] | [
4,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"While",
"doing",
"our",
"investigation",
"we",
"were",
"able",
"to",
"identify",
"other",
"malware",
"packages",
"with",
"different",
"names",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Below",
"are",
"some",
"of",
"the",
"elements",
"showing",
"the",
"relation",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"current",
"version",
"of",
"the",
"malware",
"allows",
"the",
"operator",
"to",
"steal",
"files,",
"keystrokes,",
"perform",
"screenshots,",
"and",
"execute",
"arbitrary",
"code",
"on",
"the",
"infected",
"host."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
6,
16,
1,
9,
9,
9,
9,
16,
1,
9,
9,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Razy.D39D3F",
"Trojan.Win32.KillProc.hd",
"Trojan.BtcMine.2050",
"Trojan/Win32.KillProc",
"TrojanDownloader:MSIL/Taily.A!bit",
"RiskWare.BitCoinMiner",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Trojan.AHSJ-4985",
"Ransom_HC7.R002C0DAA18",
"Trojan.Win32.RedCap.ewxmze",
"Virus.Ransom.Pycl.A!c",
"TR/RedCap.qcvri",
"Trojan/Win32.Ransom.C2347549",
"Trojan.Ransom.PyCL",
"Ransom.FileLocker",
"Trojan.DownLoader!",
"Ransom.Win32",
"Trojan-Ransom.Crypren",
"Trj/CI.A",
"Win32/Trojan.Ransom.97f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"reinforces",
"the",
"need",
"for",
"comprehensive",
"defense",
"powered",
"by",
"broad",
"visibility",
"into",
"attack",
"surfaces",
"as",
"well",
"as",
"domain",
"experts",
"who",
"track",
"the",
"threat",
"landscape",
"and",
"uncover",
"notable",
"threats",
"that",
"might",
"be",
"hiding",
"amidst",
"massive",
"threat",
"data",
"and",
"signals",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"it",
"The",
"rise",
"of",
"mobile",
"banker",
"Asacub",
"28",
"AUG",
"2018",
"We",
"encountered",
"the",
"Trojan-Banker.AndroidOS.Asacub",
"family",
"for",
"the",
"first",
"time",
"in",
"2015",
",",
"when",
"the",
"first",
"versions",
"of",
"the",
"malware",
"were",
"detected",
",",
"analyzed",
",",
"and",
"found",
"to",
"be",
"more",
"adept",
"at",
"spying",
"than",
"stealing",
"funds",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Infostealer.Limitail",
"Trojan.DownLoader26.6005",
"BehavesLike.Win32.Trojan.cm",
"Trojan.MSIL.Injector",
"Trojan.MSIL.Bladabindi.1",
"Trojan/Win32.RatTool.R208188",
"Trj/GdSda.A",
"MSIL/SpyPSW.AVQ!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Strictor.D1B6BC",
"BKDR_HPKELIHOS.SM4",
"Win32.Trojan.WisdomEyes.16070401.9500.9990",
"BKDR_HPKELIHOS.SM4",
"BehavesLike.Win32.Expiro.ch",
"Trojan.WPCracker.u",
"Trojan.Win32.Boaxxe",
"W32/Injector.DDXZ!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"RIG",
"Exploit",
"Kit",
"-",
"May",
"2015"
] | [
3,
11,
11,
16,
0,
8
] |
[
"Compared",
"to",
"other",
"adversary",
"groups,",
"C0d0so0",
"has",
"shown",
"the",
"use",
"of",
"more",
"sophisticated",
"tactics",
"and",
"tools",
"and",
"has",
"been",
"linked",
"to",
"leveraging",
"zero-day",
"exploits",
"on",
"numerous",
"occasions",
"in",
"combination",
"with",
"watering",
"hole",
"and",
"spear",
"phishing",
"attacks."
] | [
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
7,
15,
16,
16,
16,
16,
16,
16,
1,
9,
16,
1,
9,
9
] |
[
"Although",
"Unit",
"42",
"cannot",
"provide",
"a",
"full",
"picture",
"of",
"the",
"details",
"surrounding",
"the",
"delivery",
"of",
"these",
"samples,",
"we",
"are",
"confident",
"this",
"activity",
"targets",
"Korean",
"language",
"speakers",
"who",
"use",
"Samsung",
"devices."
] | [
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Cosmu.aqmz",
"Trojan.Win32.Cosmu.divg",
"Trojan.Win32.Z.Cosmu.1849214",
"W32.Dzan.l3Vn",
"Trojan.DownLoader19.64657",
"Trojan.Cosmu.Win32.7698",
"Trojan-Dropper.Win32.Injector",
"Trojan/Cosmu.mih",
"Trojan[Downloader]/Win32.Wren",
"Trojan.Win32.Cosmu.divg",
"Trojan.Cosmu",
"Trj/CI.A",
"Win32.Trojan.Cosmu.Dypy",
"W32/Malicious_Behavior.VEX",
"Win32/Worm.15b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"attacks",
"came",
"to",
"light",
"when",
"a",
"bank",
"in",
"Poland",
"discovered",
"previously",
"unknown",
"malware",
"running",
"on",
"a",
"number",
"of",
"its",
"computers."
] | [
16,
1,
16,
16,
16,
16,
16,
4,
16,
2,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
5
] |
[
"On",
"each",
"system",
"several",
"tools",
"were",
"used",
"to",
"find,",
"encrypt,",
"and",
"delete",
"the",
"original",
"files",
"as",
"well",
"as",
"any",
"backups."
] | [
16,
16,
5,
16,
3,
16,
16,
16,
16,
1,
16,
1,
9,
9,
9,
16,
16,
16,
16,
16
] |
[
"The",
"\"",
"source",
"process",
"''",
"refers",
"to",
"the",
"Zen",
"trojan",
"running",
"as",
"root",
",",
"while",
"the",
"\"",
"target",
"process",
"''",
"refers",
"to",
"the",
"process",
"to",
"which",
"the",
"code",
"is",
"injected",
"and",
"[",
"pid",
"]",
"refers",
"to",
"the",
"target",
"process",
"pid",
"value",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Unit",
"42",
"researchers",
"have",
"uncovered",
"a",
"malware",
"distribution",
"campaign",
"that",
"is",
"delivering",
"the",
"LokiBot",
"information",
"stealer",
"via",
"business",
"email",
"compromise",
"BEC",
"phishing",
"emails"
] | [
4,
12,
12,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
3,
11,
11,
16,
1,
9,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Qhost.724992",
"Trojan.Win32.Qhost!O",
"Trojan.BeeVry",
"Trojan.Qhost",
"Worm.AutoRun.Win32.64118",
"Win32.Worm.Autorun.ah",
"W32/Trojan2.OFIZ",
"W32.SillyFDC",
"WORM_YAHLOVER.SM",
"Trojan.Win32.Qhost.afes",
"Trojan.Win32.Qhost.boicaq",
"Trojan.Win32.A.Qhost.724992",
"Trojan.MulDrop3.42831",
"WORM_YAHLOVER.SM",
"BehavesLike.Win32.Autorun.bt",
"W32/Trojan.RWER-6321",
"Trojan/Qhost.gez",
"Trojan/Win32.Qhost",
"Troj.W32.Qhost.tn9x",
"Trojan.Win32.Qhost.afes",
"HEUR/Fakon.mwf",
"W32/Autorun.worm.aadm",
"Trojan.Qhost",
"Trojan.Qhost",
"Win32/AutoRun.VB.AVY",
"Trojan.Qhost!hFnYX0CfRwA",
"Worm.Win32.VB"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"numbering",
"seems",
"to",
"have",
"started",
"anew",
"after",
"the",
"version",
"9",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DownloadDAB.Trojan",
"Worm.MSIL.Arcdoor!O",
"Worm.Arcdoor.ae3",
"Worm.Arcdoor.Win32.1086",
"Trojan/Arcdoor.ae",
"MSIL.Worm.Arcdoor.b",
"W32/Trojan2.NFSU",
"Backdoor.Trojan",
"Win32/Pontoeb.A",
"BKDR_PONTOEB.SMHA",
"Win.Trojan.Worm-74",
"Worm.MSIL.Arcdoor.ae",
"Trojan.Win32.Arcdoor.ctsdhw",
"Msil.Worm.Arcdoor.Lknq",
"BKDR_PONTOEB.SMHA",
"Worm.MSIL",
"W32/Trojan.LEEP-1569",
"Worm.MSIL.fi",
"WORM/MSIL.Arcdo.aea",
"Worm/MSIL.Arcdoor",
"Backdoor:MSIL/Pontoeb.G",
"Trojan.Win32.Z.Arcdoor.26624",
"Worm.MSIL.Arcdoor.ae",
"Worm/Win32.Arcdoor.R11889",
"MSIL/Arcdoor.AE",
"MSIL/AntiVM.V!tr",
"Win32/Worm.bed"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"overlays",
"are",
"activated",
"by",
"the",
"malicious",
"operator",
"using",
"the",
"command",
"changeActivity",
",",
"as",
"seen",
"on",
"step",
"5",
"of",
"the",
"activation",
"cycle",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.LoadMoney.eprnxa",
"PUP.LoadMoney/Variant",
"Trojan.LoadMoney.2303",
"PUA.SearchGo",
"ADWARE/SearchGo.avskt",
"PUP/Win32.Searchgo.R201982",
"Adware.SearchGo"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"widespread",
"use",
"of",
"telnet,",
"along",
"with",
"a",
"list",
"of",
"factory",
"default",
"usernames",
"and",
"passwords,",
"result",
"in",
"botnets",
"with",
"sizes",
"that",
"is",
"beyond",
"imagination."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
7,
15,
15,
15,
15,
16,
16,
3,
16,
16,
16,
16,
16,
16
] |
[
"are",
"designed",
"to",
"resemble",
"tracking",
"e-mails",
"from",
"different",
"post",
"offices",
"around",
"the",
"world."
] | [
16,
16,
16,
16,
1,
9,
16,
16,
4,
12,
16,
16,
2
] |
[
"The",
"beaconing",
"will",
"only",
"start",
"after",
"the",
"application",
"is",
"removed",
"from",
"the",
"background",
",",
"ultimately",
"stopping",
"it",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"first",
"section",
"aims",
"to",
"analyze",
"the",
"malware's",
"capabilities",
"e.g.:",
"c2",
"connectivity,",
"encoding",
"mechanisms",
"and",
"overall",
"system",
"activity."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"RAT",
"looks",
"new",
"to",
"us;",
"hence",
"we",
"suspected",
"that",
"it",
"may",
"either",
"be",
"a",
"new",
"RAT",
"family",
"or",
"a",
"custom",
"RAT",
"that",
"was",
"developed",
"for",
"a",
"specific",
"attacker",
"hacker"
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
3,
11,
16,
16,
16,
11,
6,
14,
14,
14
] |
[
"Related",
"Github",
"account",
"contains",
"forked",
"Conversations",
"repository",
"Summarizing",
"all",
"the",
"found",
"clues",
",",
"we",
"have",
"the",
"following",
"attribution",
"flow",
":",
"Conclusion",
"The",
"operation",
"of",
"ViceLeaker",
"is",
"still",
"ongoing",
",",
"as",
"is",
"our",
"research",
"."
] | [
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clod3a9.Trojan.e28b",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Backdoor.Trojan",
"trojan.win32.skeeyah.a!rfn",
"W32/Trojan.FVPV-5651",
"TR/Crypt.ZPACK.mwex",
"TrojanDropper:Win32/Barlaiy.A!dha",
"Trojan-Downloader.Win32.FraudLoad",
"Trj/CI.A",
"Win32/Trojan.0e6"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"cyber-espionage",
"group",
"was",
"dubbed",
"Rocket",
"Kitten,'",
"and",
"remains",
"active",
"as",
"of",
"this",
"writing,",
"with",
"reported",
"attacks",
"as",
"recent",
"as",
"October",
"2015."
] | [
16,
6,
14,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
0,
8
] |
[
"Late",
"last",
"week",
"Talos",
"researchers",
"noticed",
"a",
"drastic",
"uptick",
"in",
"Angler",
"Exploit",
"Kit",
"activity."
] | [
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
3,
11,
11,
16
] |
[
"This",
"blog",
"presents",
"our",
"analysis",
"of",
"one",
"of",
"the",
"latest",
"malware",
"variants",
"targeting",
"individuals",
"in",
"Taiwan,",
"which",
"exhibits",
"some",
"interesting",
"characteristics",
"that",
"can",
"be",
"useful",
"for",
"detecting",
"and",
"defending",
"against",
"the",
"threat",
"β",
"including",
"the",
"creation",
"of",
"an",
"obese",
"file,",
"weighing",
"in",
"at",
"500MB,",
"as",
"part",
"of",
"its",
"execution."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
2,
16,
16,
16,
16,
16,
16,
16,
16,
16,
11,
1,
16,
1,
16,
16,
3,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9
] |
[
"RECEIVE_BOOT_COMPLETED",
"-",
"Allows",
"the",
"application",
"to",
"receive",
"a",
"broadcast",
"after",
"the",
"system",
"finishes",
"booting",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Regardless",
"of",
"the",
"parameters",
",",
"it",
"returns",
"a",
"json",
"containing",
"a",
"link",
"for",
"APK",
"file",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"CitizenLab",
"connect",
"the",
"infrastructure",
"used",
"in",
"the",
"campaign",
"to",
"previous",
"malware",
"operations",
"targeting",
"a",
"Tibetan",
"radio",
"station",
"and",
"the",
"Thai",
"government."
] | [
4,
16,
16,
5,
16,
16,
16,
6,
16,
16,
3,
11,
16,
16,
4,
12,
12,
16,
4,
12,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Zlob.60259",
"Trojan.NSIS.StartPage.Q",
"Trojan.Zlob.60259",
"Win32/SillyDl.YHD",
"Win.Trojan.NSIS-38",
"Trojan-Downloader.Win32.NSIS.io",
"Trojan.Zlob.60259",
"Riskware.Nsis.Adw.cxexqq",
"Troj.Downloader.W32.Lipler.lkqh",
"Trojan.Zlob.60259",
"Trojan.Fakealert.26734",
"BehavesLike.Win32.AdwareSearchProtect.kc",
"TrojanDownloader:Win32/Gabeerf.A",
"Trojan.Zlob.DEB63",
"Trojan.Win32.Banker.140384",
"Trojan.Zlob.60259",
"Trojan/Win32.StartPage.R26935",
"Trojan.NSIS"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.AutoRunLUL.Worm",
"Trojan.Downloader.Bredolab.AA",
"Packed.Win32.Tadym!O",
"Trojan.Tadym",
"Downloader-BTR.a",
"Trojan.Downloader.Bredolab.AA",
"TROJ_BREDLAB.SMB",
"Win32.Trojan.WisdomEyes.16070401.9500.9994",
"TROJ_BREDLAB.SMB",
"Win.Trojan.Bredolab-4616",
"Packed.Win32.Tadym.b",
"Trojan.Downloader.Bredolab.AA",
"Trojan.Win32.Tadym.deqzho",
"Win32.Packed.Tadym.Pdmb",
"Trojan.Downloader.Bredolab.AA",
"TrojWare.Win32.TrojanDropper.HDrop.B",
"Trojan.Downloader.Bredolab.AA",
"Win32.HLLW.Autoruner.6644",
"Backdoor.CPEX.Win32.27835",
"BehavesLike.Win32.RAHack.mc",
"Worm/AutoRun.nlq",
"Trojan[Packed]/Win32.Tadym",
"TrojanDropper:Win32/Emold.C",
"Troj.W32.Vaklik.l3JH",
"Packed.Win32.Tadym.b",
"Trojan.Downloader.Bredolab.AA",
"Trojan.Downloader.Bredolab.AA",
"BScope.Trojan.Ballast",
"Worm.AutoRun!kxuXEtVXF84",
"Trojan.Win32.Bredolab"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"InPage",
"is",
"a",
"word",
"processor",
"program",
"that",
"supports",
"languages",
"such",
"as",
"Urdu,",
"Persian,",
"Pashto,",
"and",
"Arabic."
] | [
5,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"operation",
"is",
"another",
"example",
"of",
"a",
"threat",
"actor",
"using",
"just",
"enough",
"technical",
"sophistication",
"to",
"exploit",
"a",
"target."
] | [
6,
14,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
7,
16,
16
] |
[
"update.exe",
"module",
"and",
"Keylogger",
"by",
"β",
"El3ct71k",
"β",
"code",
"comparison",
"Xenotix",
"Python",
"Keylogger",
"including",
"specified",
"mutex",
"β",
"mutex_var_xboz",
"β",
"."
] | [
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16
] |
[
"However",
",",
"no",
"command",
"is",
"received",
"from",
"the",
"C2",
"until",
"the",
"inactiveTime",
"field",
"(",
"see",
"beaconing",
"information",
"image",
"above",
")",
"has",
"at",
"least",
"the",
"value",
"of",
"2000000",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.ExpiroPC.PE",
"Trojan.Kazy.D765A4",
"Heur.Corrupt.PE",
"BehavesLike.Win32.PWSGamania.dc",
"HackTool.Win32.QQExplorer",
"HackTool/Win32.QQExplorer",
"HackTool:Win32/QQExplorer.1_26.dam#2",
"HackTool/Win32.QQExplorer.C1530039",
"Trj/CI.A",
"Win32/Trojan.dd5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"Bootkit",
"is",
"a",
"rootkit",
"malware",
"variant",
"which",
"infects",
"the",
"device",
"at",
"start-up",
"and",
"may",
"encrypt",
"disk",
"or",
"steal",
"data",
",",
"remove",
"the",
"application",
",",
"open",
"connection",
"for",
"Command",
"and",
"controller",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom.Locky.D6",
"Trojan.Barys.DD3B9",
"W32.Pilleuz",
"Win32.Trojan-Downloader.Kryptik.ER",
"Trojan.Win32.Inject.ebobum",
"Trojan.Win32.Z.Injector.119812",
"BackDoor.Andromeda.1478",
"Dropper.Injector.Win32.77187",
"BehavesLike.Win32.PWSZbot.ch",
"W32/Trojan.LSBE-5509",
"TrojanDropper.Injector.bhwe",
"Backdoor:Win32/Wondufi.A",
"TrojanDropper.Injector",
"Trj/GdSda.A",
"Trojan.DR.Injector!1yj9x8ODPcQ",
"W32/Kryptik.FIKL!tr",
"Win32/Trojan.02c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Some",
"of",
"the",
"more",
"interesting",
"commands",
"include",
":",
"SMS",
"Control",
"Update",
"the",
"address",
"of",
"the",
"C",
"&",
"C",
"server",
"β",
"SMS",
"starting",
"with",
"β",
"http",
":",
"//",
"β",
"Send",
"AES-encrypted",
"SMS",
"message",
"back",
"to",
"sender",
"β",
"SMS",
"starting",
"with",
"β",
"sms",
":",
"//",
"β",
"Update",
"service",
"wake-up",
"interval",
"β",
"β",
"2",
"β",
"Kill",
"switch",
"β",
"β",
"4",
"β",
"C",
"&",
"C",
"Control",
"Update",
"the",
"address",
"of",
"the",
"C",
"&",
"C",
"server",
"β",
"β",
"1",
"β",
"Update",
"service",
"wake-up",
"interval",
"β",
"β",
"2",
"β",
"Lock",
"the",
"screen",
"β",
"β",
"5",
"β",
"Display",
"a",
"picture",
"in",
"a",
"WebView",
"from",
"an",
"arbitrary",
"URL",
"β",
"β",
"11",
"β",
"Send",
"an",
"arbitrary",
"SMS",
"message",
"β",
"β",
"8",
"β",
"Steal",
"images",
"saved",
"on",
"the",
"device",
"β",
"β",
"12",
"β",
"and",
"β",
"13",
"β",
"Use",
"the",
"accessibility",
"service",
"to",
"become",
"the",
"default",
"SMS",
"app",
"β",
"β",
"6",
"β",
"Enable",
"recording",
"of",
"other",
"apps",
"β",
"β",
"15",
"β",
"Kill",
"switch",
"β",
"β",
"4",
"β",
"The",
"Lockdown",
"Screen",
"Most",
"thieves",
"don",
"β",
"t",
"want",
"to",
"be",
"caught",
"red-handed",
"as",
"they",
"steal",
"β",
"they",
"want",
"to",
"buy",
"some",
"time",
"to",
"get",
"away",
"with",
"the",
"loot",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Many",
"of",
"these",
"samples",
"have",
"not",
"been",
"discussed",
"publicly",
"and",
"several",
"have",
"very",
"little",
"or",
"no",
"anti-virus",
"coverage."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Lithium.38400",
"Backdoor.Lithium.F",
"Win32/Lithium.102",
"Backdoor.Trojan",
"W32/LithBack.1_02",
"BKDR_LITH.102.A",
"Win32.Lithium.102.a",
"Backdoor.Win32.Lithium.102",
"Backdoor.Lithium.1.0.2",
"Backdoor.Win32.Lithium.102!IK",
"Backdoor.Win32.Lithium.102",
"Backdoor.Lithium.1.0.2",
"BackDoor.Lithium.102",
"BDS/Lithium.102.Srv",
"BKDR_LITH.102.A",
"Win32/Lithium.D",
"Backdoor/Lithium.102",
"Backdoor:Win32/Lithium.1_02",
"Backdoor.Win32.Lithium_102.38400",
"Backdoor.Lithium.1.0.2",
"Win-Trojan/Lithium.38400",
"Backdoor.Lithium.102",
"Backdoor.Trojan",
"Backdoor.Lithium.102.b",
"Backdoor.Win32.Lithium.102",
"W32/Lithium!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"saves",
"the",
"messages",
"β",
"metadata",
"and",
"content",
",",
"filters",
"the",
"information",
"by",
"fields",
",",
"and",
"sends",
"them",
"to",
"the",
"C2",
"server",
"using",
"the",
"URL",
"/servlet/SendMassage2",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16
] |
[
"For",
"Google",
",",
"Android",
"security",
"issues",
"-",
"even",
"if",
"not",
"in",
"the",
"core",
"operating",
"code",
"-",
"are",
"a",
"reputation",
"threat",
",",
"and",
"for",
"Amazon",
",",
"a",
"product",
"quality",
"issue",
"."
] | [
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader.Admedia",
"Multi.Threats.InArchive",
"Trojan.Dropper",
"Win32/Donnic.D",
"Win.Downloader.Small-3527",
"Trojan-Downloader.Win32.QQHelper.va",
"Trojan.Win32.QQHelper.ybwad",
"Troj.Downloader.W32!c",
"Trojan.DownLoader.14343",
"Backdoor.CPEX.Win32.15449",
"BehavesLike.Win32.Backdoor.tc",
"Trojan-Downloader.Win32.QQHelper",
"TrojanDownloader.VB.lr",
"TR/Dldr.Harnig.5",
"Trojan[Downloader]/Win32.QQHelper",
"Trojan:Win32/Zaptusk.A",
"Trojan-Downloader.Win32.QQHelper.va",
"Worm.WhiteIce",
"Trj/Multidropper.BQE",
"Win32.Trojan-downloader.Qqhelper.Dzaq",
"Win32/Trojan.Downloader.c98"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"After",
"spending",
"more",
"time",
"analyzing",
"the",
"proxy,",
"we",
"realized",
"that",
"the",
"requests",
"we",
"were",
"receiving",
"were",
"not",
"related",
"to",
"ad-fraud",
"activity",
"as",
"we",
"initially",
"suspected",
"but",
"instead",
"appeared",
"to",
"be",
"for",
"some",
"sort",
"of",
"VPN",
"service."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"AutoIt.Trojan.Injector.bq",
"Trojan.Autoit",
"W32/Injector.COJ!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"Thanks",
"to",
"Allwinner",
",",
"a",
"Chinese",
"ARM",
"system-on-a-chip",
"maker",
",",
"which",
"has",
"recently",
"been",
"caught",
"shipping",
"a",
"version",
"of",
"Linux",
"Kernel",
"with",
"an",
"incredibly",
"simple",
"and",
"easy-to-use",
"built-in",
"backdoor",
"."
] | [
16,
16,
4,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Obfuscated.KU",
"Trojan.Win32.Inject!O",
"Trojan.Inject.Win32.41934",
"Trojan/Inject.bsb",
"Win32.Trojan.WisdomEyes.16070401.9500.9746",
"Win.Trojan.Inject-12484",
"Trojan.Obfuscated.KU",
"Trojan.Obfuscated.KU",
"Trojan.Win32.Inject.cwlvrx",
"AdWare.W32.Cinmus.kYTY",
"Trojan.Obfuscated.KU",
"Trojan.DownLoader1.2110",
"Trojan.Win32.Malware.a",
"Trojan.Rootkit",
"Trojan/Win32.Inject",
"Win32.Adware.CinmusT.lm.230980",
"Trojan.Obfuscated.KU",
"Trojan:Win32/Cinmus.K",
"Trojan/Win32.Inject.C140611",
"Trojan.Obfuscated.KU",
"Trojan.Win32.Malware.a",
"SScope.Trojan.Cinmus.39",
"Win32.Trojan.Inject.bidk",
"Trojan.Inject!Lqw/iuX+8xA",
"W32/Malware_fam.NB"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Multi",
"Trojan.Foreign.Win32.57563",
"Trojan.Johnnie.D12DD3",
"Trojan-Ransom.Win32.Foreign.nxyh",
"Trojan.Win32.Panda.exmste",
"Trojan.Win32.Z.Johnnie.582144",
"Trojan.PWS.Panda.12917",
"BehavesLike.Win32.Backdoor.hc",
"Trojan.Win32.Crypt",
"W32/Trojan.MEZF-9098",
"TR/AD.PepaBot.pabel",
"TrojanDropper:Win32/Ropest.A",
"Trojan-Ransom.Win32.Foreign.nxyh",
"TrojanPSW.Panda",
"Trj/GdSda.A",
"W32/Kryptik.FQTY!tr",
"Win32/Trojan.acd"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Dozens",
"of",
"targets",
"may",
"receive",
"the",
"exact",
"same",
"message."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Dialer.10624",
"Trojan.Dialer.AY",
"Trojan/Dialer.ay",
"Trojan.Dialer.AU1",
"W32/Qdialer.J",
"Dialer.DialPlatform",
"Win32/SilentCaller.D",
"TROJ_MALQES.A",
"Trojan.Win32.Dialer.ay",
"Trojan.Dialer.AY",
"Trojan.Win32.Dialer.ay!IK",
"TrojWare.Win32.Dialer.NAD",
"Dialer.Silent",
"TR/Drop.Delf.DJ.3",
"TROJ_MALQES.A",
"Trojan/Dialer.ay",
"Trojan:Win32/Adialer.AX",
"Trojan.Win32.Dialer.10656",
"Win-AppCare/Dialer.10624",
"Trojan.Dialer.AY",
"W32/Qdialer.J",
"OScope.Dialer.VL",
"Win32/Dialer.NAD",
"Trojan.Win32.Dialer.ay",
"Dialer.8.AP"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Inject.68935",
"Packed.Win32.TDSS!O",
"Trojan/Inject.oc",
"Win32.Trojan.WisdomEyes.16070401.9500.9868",
"Backdoor.Trojan",
"Trojan.Win32.Inject.oc",
"Trojan.Win32.Inject.wpzg",
"Troj.W32.Inject.oc!c",
"BackDoor.Exte",
"BehavesLike.Win32.Backdoor.kc",
"Net-Worm.Win32.Mofeir",
"Trojan/Inject.amwy",
"Trojan/Win32.Inject",
"Trojan:Win32/Oexsi.A",
"Trojan.Win32.Inject.oc",
"Trojan/Win32.Inject.C27812",
"Trojan.Inject",
"Trojan.Downloader",
"W32/BanLoader.AAAC!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TROJ_KREP.D",
"Trojan.DownLoad3.10695",
"Trojan.Swisyn.Win32.8140",
"TROJ_KREP.D",
"Trojan/Swisyn.jnt",
"Trojan:Win32/Trixpi.A",
"Trojan-Downloader.win32.Delf.xoq",
"W32/Mdrop.CQO!tr",
"Trojan.Win32.Trixpi.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.SdBot.25088.Q",
"Backdoor/Afbot.a",
"BKDR_POEBOT.DK",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Backdoor.Trojan",
"BKDR_POEBOT.DK",
"Backdoor.Win32.Afbot.a",
"Trojan.Win32.Afbot.daze",
"Backdoor.Win32.S.Afbot.25088",
"Backdoor.W32.Afbot.a!c",
"Backdoor.Win32.Afbot.~A",
"BackDoor.IRC.Afbot",
"Backdoor.Afbot.Win32.1",
"Backdoor/Afbot.a",
"Trojan[Backdoor]/Win32.Afbot",
"Backdoor:Win32/Afbot.A",
"Backdoor.Win32.Afbot.a",
"Backdoor.Afbot",
"Bck/Iroffer.BG",
"Win32.Backdoor.Afbot.Szbp",
"Backdoor.Afbot!ktevPrMqQWw",
"W32/Afbot.A!tr.bdr",
"Win32/Backdoor.BO.3c4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"were",
"also",
"able",
"to",
"confirm",
"that",
"the",
"phone",
"number",
"he",
"provided",
"to",
"the",
"domain",
"registrar",
"was",
"genuine",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"When",
"installed",
"on",
"a",
"device",
",",
"apps",
"containing",
"adware",
"may",
",",
"among",
"other",
"things",
":",
"Annoy",
"users",
"with",
"intrusive",
"advertisements",
",",
"including",
"scam",
"ads",
"Waste",
"the",
"device",
"β",
"s",
"battery",
"resources",
"Generate",
"increased",
"network",
"traffic",
"Gather",
"users",
"β",
"personal",
"information",
"Hide",
"their",
"presence",
"on",
"the",
"affected",
"device",
"to",
"achieve",
"persistence",
"Generate",
"revenue",
"for",
"their",
"operator",
"without",
"any",
"user",
"interaction",
"Conclusion",
"Based",
"solely",
"on",
"open",
"source",
"intelligence",
",",
"we",
"were",
"able",
"to",
"trace",
"the",
"developer",
"of",
"the",
"Ashas",
"adware",
"and",
"establish",
"his",
"identity",
"and",
"discover",
"additional",
"related",
"adware-infected",
"apps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"These",
"SQL",
"servers",
"are",
"also",
"used",
"for",
"command",
"and",
"control",
"C2",
"functionality."
] | [
16,
5,
13,
16,
16,
16,
16,
1,
9,
9,
9,
16
] |
[
"Figure",
"4",
"shows",
"MyReceiver",
"in",
"action",
"where",
"it",
"eventually",
"calls",
"the",
"MainService",
"service",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Cosmu!O",
"Worm.NadIote",
"Trojan.Cosmu.Win32.2079",
"Win32.Worm.VB.pf",
"W32/Risk.BXNI-0011",
"Win32/VB.AZL",
"Trojan.Win32.Cosmu.ist",
"Trojan.Win32.Cosmu.cojafm",
"Win32.Trojan.Cosmu.Eehn",
"Worm.Win32.Pronny.BL",
"Win32.HLLW.Autoruner.14654",
"BehavesLike.Win32.VBObfus.fm",
"W32/MalwareS.AKRW",
"Trojan/Cosmu.pri",
"Trojan/Win32.Cosmu",
"Trojan.Win32.Cosmu.315392.A",
"Trojan.Win32.Cosmu.ist",
"HEUR/Fakon.mwf",
"Trojan.VBO.05376",
"Trojan.Cosmu",
"Win32/AutoRun.Spy.VB.E",
"Trojan.Cosmu!52KOHqBZvHU"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Mauvaise.SL1",
"Win32.Trojan.WisdomEyes.16070401.9500.9950",
"Backdoor.Noknef",
"TSPY_KONNI.A",
"Trojan.Win32.Graftor.eoiwlz",
"Dropper.S.Konni.266752",
"Trojan.MulDrop7.31720",
"TSPY_KONNI.A",
"BehavesLike.Win32.Fake.dm",
"W32/Trojan.NPTT-8320",
"TR/Graftor.266752.17",
"Trojan:Win32/Konny.A",
"Backdoor.Noknef",
"Backdoor.Win32.Hupigon",
"Malicious_Behavior.SB"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Heur2.FU.E930ED",
"Backdoor.Trojan",
"Adware.Mutabaha.1206",
"Trojan:Win32/Winnti.V!dha",
"Trojan.Win32.Z.Svchorse.725184",
"BScope.Trojan.SvcHorse.01643",
"PossibleThreat.SB!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"Wild",
"Neutron",
"hit",
"the",
"spotlight",
"in",
"2013,",
"when",
"it",
"successfully",
"infected",
"companies",
"such",
"as",
"Apple,",
"Facebook,",
"Twitter",
"and",
"Microsoft."
] | [
3,
11,
16,
16,
16,
16,
0,
16,
16,
16,
16,
4,
16,
16,
4,
12,
12,
16,
4
] |
[
"Triggers",
"ET",
"rules",
"for:",
"RadminRMS,",
"XPCSpyPro,",
"RemoteAdmin.RemoteUtilities.C"
] | [
1,
16,
16,
16,
3,
3,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.Mudrop!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9756",
"Win.Trojan.VB-472",
"Trojan-Dropper.Win32.Mudrop.bq",
"Trojan.MulDrop.5694",
"Downloader.VB.Win32.99231",
"BehavesLike.Win32.RAHack.hh",
"TrojanDropper.Mudrop.dv",
"Trojan[Dropper]/Win32.Mudrop",
"TrojanDropper:Win32/Popuper.N",
"Trojan.Downloader-SysMon",
"Trojan-Dropper.Win32.Mudrop.bq",
"TScope.Malware-Cryptor.SB",
"Trojan-Dropper.Win32.Mudrop"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"These",
"include",
"domains,",
"file",
"names,",
"Java",
"package",
"names,",
"and",
"Facebook",
"activity."
] | [
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Inject.Win32.243804",
"Trojan.Win32.Delphi.ewuekh",
"Trojan[Backdoor]/MSIL.NanoBot",
"Trojan/Win32.Injector.R217510",
"Trojan.Symmi.D14210"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"After",
"flashing",
",",
"the",
"bootkit",
"will",
"be",
"removed",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Loselove.A",
"Backdoor.Loselove.A",
"Trojan.Win32.Loselove.makvn",
"Backdoor.Trojan",
"BKDR_LOSELOVE.A",
"Win32.Trojan",
"Backdoor.Win32.Loselove",
"Backdoor.Loselove.A",
"Backdoor.Loselove.B",
"Backdoor.Win32.Loselove.765952",
"Backdoor.Win32.Loselove.10",
"Backdoor.Loselove.A",
"BackDoor.Loselove",
"BDC/Loselove.1",
"BKDR_LOSELOVE.A",
"Backdoor/LostLove.Client",
"Win32.Hack.Loselove.kcloud",
"Win-Trojan/Loselove.765952",
"Backdoor.Loselove.A",
"Backdoor.Trojan",
"Win32/Loselove.10",
"Backdoor.Win32.Loselove",
"W32/Loselove.A!tr.bdr",
"BackDoor.Loselove.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Potential",
"infrastructure",
"used",
"to",
"launch",
"phishing",
"attacks",
"against",
"the",
"Macron",
"presidential",
"campaign."
] | [
16,
5,
16,
16,
16,
1,
9,
16,
4,
12,
12,
12
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.