tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Llac.302593",
"TrojanPWS.Bropaler",
"Trojan/Delf.opy",
"Win32.Trojan.WisdomEyes.16070401.9500.9990",
"Trojan.Win32.Llac.kruq",
"Trojan.Win32.Dwn.dzxxnb",
"Troj.W32.Llac!c",
"Trojan.DownLoader14.35508",
"Trojan.Llac.Win32.55406",
"BehavesLike.Win32.Worm.dc",
"Trojan.Win32.PSW",
"W32/Trojan.DQFT-9080",
"Trojan.Llac.bxm",
"Trojan/Win32.Llac",
"Trojan.Inject.2",
"Trojan.Win32.Llac.kruq",
"PWS:Win32/Bropaler.A!bit",
"Trojan.Llac",
"Trj/GdSda.A",
"Win32.Trojan.Llac.Sudw",
"Trojan.Llac!VJVBvKAFEGg"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Proofpoint",
"researchers",
"recently",
"detected",
"a",
"large-scale",
"malvertising",
"attack",
"by",
"the",
"so-called",
"KovCoreG",
"group,",
"best",
"known",
"for",
"distributing",
"Kovter",
"ad",
"fraud",
"malware",
"and",
"sitting",
"atop",
"the",
"affiliate",
"model",
"that",
"distributes",
"Kovter",
"more",
"widely."
] | [
4,
12,
16,
16,
16,
1,
9,
9,
16,
16,
16,
6,
14,
16,
16,
16,
16,
3,
11,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16
] |
[
"Cisco",
"Talos",
"discovered",
"a",
"new",
"malicious",
"campaign",
"from",
"the",
"well",
"known",
"actor",
"Group",
"74",
"aka",
"Tsar",
"Team,",
"Sofacy,",
"APT28,",
"Fancy",
"Bearβ¦."
] | [
4,
12,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16,
6,
14,
16,
14,
14,
14,
14,
14,
14
] |
[
"It",
"maintained",
"a",
"heavy",
"offensive",
"focus",
"on",
"Myanmar,",
"Vietnam,",
"Singapore,",
"the",
"Philippines,",
"Malaysia,",
"and",
"Laos."
] | [
16,
16,
16,
16,
16,
16,
16,
2,
10,
10,
10,
10,
10,
16,
2
] |
[
"A",
"Chinese",
"advanced",
"persistent",
"threat",
"APT",
"compromised",
"Forbes.com",
"to",
"set",
"up",
"a",
"watering",
"hole",
"style",
"web-based",
"drive-by",
"attack",
"against",
"US",
"Defense",
"and",
"Financial",
"Services",
"firms",
"in",
"late",
"November",
"2014."
] | [
16,
6,
14,
14,
14,
14,
16,
1,
16,
16,
16,
16,
7,
15,
15,
15,
15,
15,
16,
4,
12,
16,
4,
12,
12,
16,
0,
8,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor:Win64/Warood.A",
"BDoor.FCXN!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"This",
"precedent",
"setting",
"legal",
"case",
"would",
"be",
"followed",
"by",
"many",
"Southeast",
"Asian",
"nations,",
"as",
"well",
"as",
"others",
"around",
"the",
"globe."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
2,
10,
10,
16,
16,
16,
16,
16,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Uds.Dangerousobject.Multi!c",
"Trojan.Graftor.D3CA6C",
"Trojan.Meciv!",
"Win32/Meciv.G",
"W32/Trojan.PSSM-5626",
"TR/Meciv.15872",
"Trojan.Win32.Z.Meciv.15872[h]",
"Win32.Trojan.Strat.Ebgt",
"Trojan.Win32.Meciv",
"W32/Meciv.G!tr",
"Trojan.Win32.Meciv.G"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Other.Virus.[Trj]!c",
"Trojan.O97M.Phish"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.F820",
"Trojan.AVKiller.AW",
"Trojan/W32.Packer.24576.CE",
"Trojan.Pakes",
"Trojan.AVKiller.AW",
"Trojan.AVKiller.AW",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Trojan.AVKiller.AW",
"Trojan.Win32.Pakes.blv",
"Trojan.AVKiller.AW",
"Trojan.AVKiller.AW",
"TrojWare.Win32.TrojanSpy.SpyEyes.B",
"Trojan.MulDrop.8347",
"BehavesLike.Win32.RAHack.mc",
"Backdoor.Win32.Kbot.aq",
"Trojan.Pakes.bgg",
"Trojan/Win32.Pakes",
"Win32.Hack.RCryptor.a.10301",
"Trojan.Win32.Pakes.blv",
"SScope.Malware-Cryptor.Hlux",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"today",
"somtum",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"Cyber",
"criminals",
"continue",
"to",
"use",
"exploit",
"kits",
"to",
"infect",
"victims",
"with",
"ransomware",
"but",
"they",
"also",
"use",
"MALSPAM",
"emails",
"to",
"lure",
"possible",
"victims",
"β",
"a",
"key",
"vector",
"into",
"an",
"enterprise",
"environment",
"that",
"lacks",
"the",
"proper",
"security",
"controls,",
"and",
"one",
"with",
"insufficient",
"information",
"security",
"training",
"for",
"end",
"users."
] | [
6,
14,
16,
16,
16,
3,
11,
16,
16,
16,
16,
3,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
7,
15,
16,
16,
4,
12,
16,
1,
9,
9,
9,
9,
16,
16,
16,
1,
9,
9,
9,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader.Win32.Axload!O",
"TrojanDownloader.Axload",
"Trojan/Downloader.Axload.o",
"TROJ_FRAUDLOA.TT",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"W32/Downldr2.DOEJ",
"TROJ_FRAUDLOA.TT",
"Win.Downloader.66976-1",
"Trojan-Downloader.Win32.Axload.az",
"Trojan.Win32.Axload.vqczl",
"Trojan.Win32.Downloader.134456",
"TrojWare.Win32.Trojan.DNSChanger.~CRSE",
"Trojan.DownLoader.59074",
"BehavesLike.Win32.Injector.ch",
"W32/Downloader.HFNI-1674",
"TrojanDownloader.AxLoad.r",
"SPR/Fake.C",
"Trojan[Downloader]/Win32.Axload",
"Troj.Downloader.W32.Axload.o!c",
"Trojan-Downloader.Win32.Axload.az",
"TrojanDownloader:Win32/Axload.A",
"Trojan.BHORA.012841",
"Win32.Trojan-downloader.Axload.Dun",
"Trojan.DL.Renos!Exa/gyOk4i0",
"Trojan-Downloader.Win32.Renos.AQ",
"Win32/Trojan.Downloader.9f3"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Cybereason",
"Nocturnus",
"team",
"is",
"monitoring",
"multiple",
"underground",
"platforms",
"in",
"an",
"attempt",
"to",
"identify",
"chatter",
"relating",
"to",
"EventBot",
"."
] | [
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Application.CoinMiner.S",
"Trojan-Downloader.Win32.SetupFactory!O",
"Trojan.Miner",
"Application.CoinMiner.S",
"Trojan.Win32.Z.Coinminer.938434",
"Troj.W32.Miner!c",
"Application.CoinMiner.S",
"Application.CoinMiner.S",
"Tool.BtcMine.1149",
"W32/Trojan.FXQE-8469",
"Trojan/Win32.Vehidis",
"Trojan:Win64/Stratumine.B",
"Trojan.Vehidis",
"Trj/CI.A",
"Win32.Trojan.Miner.Alsn",
"Win32/Trojan.Ransom.7fc"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Malicious",
"module",
"β",
"ip",
"β",
"This",
"file",
"will",
"be",
"executed",
"by",
"the",
"patched",
"system",
"library",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Ransom.Cerber.FA",
"Ransom/W32.Cerber.561843.B",
"Ransom.Cerber.S363870",
"Trojan.Ransom.Cerber.FA",
"Trojan.Ransom.Cerber.FA",
"Win32.Trojan.Kryptik.bin",
"Ransom_HPCERBER.SMALY5A",
"Win.Ransomware.Cerber-5970079-0",
"Trojan.Ransom.Cerber.FA",
"Trojan.Ransom.Cerber.FA",
"Trojan.Win32.Kryptik.eljryo",
"Trojan.Ransom.Cerber.FA",
"Trojan.Encoder.7453",
"Trojan.Kryptik.Win32.998775",
"Ransom_HPCERBER.SMALY5A",
"BehavesLike.Win32.Ransomware.hh",
"Trojan-Ransom.Cerber",
"Trojan.Zerber.amh",
"TR/Crypt.ZPACK.mblws",
"Trojan[Ransom]/Win32.Zerber",
"Trojan.Menti",
"Ransom.Cerber",
"Trojan.Zerber!",
"Win32/Trojan.e14"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9771",
"Win.Worm.VBMania-1",
"Win32.Trojan.Visal.A",
"Trojan.Win32.Swisyn.ajwe",
"TrojWare.Win32.VB.YNB",
"Trojan.MulDrop6.48042",
"Trojan/Swisyn.kkp",
"Worm:Win32/Visal.A",
"Trojan.Win32.Swisyn.ajwe",
"Virus.Win32.Vbinder"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Downloader.VB.Win32.85130",
"TrojanDownloader.VB",
"Trojan-Downloader.Win32.VB.bkxc",
"Trojan.DownLoader9.27791",
"TrojanDownloader.VB.dikm",
"TrojanDownloader:Win32/Gurip.A",
"Trojan.Heur.EE8DE0",
"Trojan-Downloader.Win32.VB.bkxc",
"Trojan.Downloader.VB",
"Trojan.DL.VB!q71Z8AF5llY"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"message",
"was",
"sent",
"from",
"an",
"account",
"created",
"under",
"her",
"name",
"on",
"lesser",
"known",
"email",
"provider",
"1",
"1's",
"Mail.com,",
"a",
"common",
"tactic",
"in",
"recent",
"months,",
"with",
"a",
"link",
"to",
"a",
"file",
"hosted",
"on",
"Dropbox",
"and",
"an",
"additional",
"credential",
"phishing",
"attempt."
] | [
16,
1,
16,
16,
16,
16,
1,
16,
16,
16,
1,
16,
16,
16,
5,
13,
1,
9,
9,
16,
16,
16,
16,
0,
8,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
6,
14,
14,
16
] |
[
"Update",
"Jul",
"11",
"2016",
"8:32",
":",
"On",
"Monday",
",",
"a",
"Checkpoint",
"representative",
"disputed",
"Lookout",
"'s",
"contention",
"and",
"pointed",
"to",
"this",
"blog",
"post",
"from",
"security",
"firm",
"Eleven",
"Paths",
"as",
"support",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.TaskmanMispD.Trojan",
"Worm/W32.Vobfus.217088",
"Worm.Win32.Vobfus!O",
"Worm.Raideloz.A3",
"W32/Autorun.worm.aaeh",
"W32/Vobfus.ahox",
"WORM_VOBFUS.SMJA",
"Win32.Worm.Pronny.dn",
"WORM_VOBFUS.SMJA",
"Win.Worm.Vobfus-12049",
"Worm.Win32.WBNA.ipa",
"Trojan.Win32.Vobfus.cinarv",
"Worm.Win32.A.Vobfus.155648.F",
"WIN.Troj.Vobfus.lEaX",
"Worm.Win32.Vobfus.AJR",
"Win32.HLLW.Autoruner1.29632",
"BehavesLike.Win32.VBObfus.dm",
"Worm/Vobfus.mos",
"Worm:Win32/Raideloz.A",
"Trojan.Barys.DA54",
"Worm.Win32.WBNA.ipa",
"Worm/Win32.Vobfus.R43029",
"Worm.Vobfus",
"Worm.Win32.Raideloz",
"W32/VBObfus.C!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Figure",
"8",
"."
] | [
16,
16,
16
] |
[
"This",
"report",
"expands",
"the",
"Mexican",
"investigation",
"and",
"shows",
"how",
"10",
"Mexican",
"journalists",
"and",
"human",
"rights",
"defenders,",
"one",
"minor",
"child,",
"and",
"one",
"United",
"States",
"citizen,",
"were",
"targeted",
"with",
"NSO's",
"Exploit",
"Framework."
] | [
16,
16,
16,
4,
12,
12,
16,
16,
16,
16,
4,
12,
16,
4,
12,
12,
12,
12,
12,
16,
4,
12,
12,
12,
16,
16,
16,
3,
11,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.KillAV",
"Worm.Win32.Delf.ag",
"Packed.Win32.Klone.~KE",
"Trojan.DownLoader.origin",
"Trojan-Downloader.Win32.Delf!IK",
"Trojan-Downloader.Win32.Delf",
"W32/PEMask.B!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Joke/W32.BadJoke.20500",
"Hoax.Vb",
"Hoax.Win32.BadJoke.VB.d",
"Riskware.Win32.Anywork.hrys",
"Joke.Miracle",
"Tool.BadJoke.Win32.176",
"BehavesLike.Win32.PUP.mz",
"Hoax.Win32.BadJoke.VB",
"Hoax.BadJoke.djv",
"HackTool[Hoax]/Win32.VB",
"Win32.Joke.WorkJoke.a.kcloud",
"Hoax.Win32.BadJoke.VB.d",
"Joke:Win32/Small.NAO",
"Unwanted/Win32.Badjoke.R100207",
"BadJoke.Win32.VB.d",
"Trojan.VBRA.02296",
"Win32.Trojan-psw.Badjoke.Plui"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Fake",
"tax",
"spam",
"leads",
"to",
"malware:"
] | [
1,
9,
9,
16,
16,
3
] |
[
"The",
"short",
"URL",
"redirects",
"to",
"the",
"application",
"page",
"at",
"Google",
"Play",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"Written",
"by",
"Jagadeesh",
"Chandraiah",
"JULY",
"23",
",",
"2018",
"SophosLabs",
"has",
"uncovered",
"a",
"mobile",
"malware",
"distribution",
"campaign",
"that",
"uses",
"advertising",
"placement",
"to",
"distribute",
"the",
"Red",
"Alert",
"Trojan",
",",
"linking",
"counterfeit",
"branding",
"of",
"well-known",
"apps",
"to",
"Web",
"pages",
"that",
"deliver",
"an",
"updated",
",",
"2.0",
"version",
"of",
"this",
"bank",
"credential",
"thief",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"On",
"April",
"7th",
"2017",
"Haifei",
"Li",
"published",
"on",
"the",
"McAfee",
"blog1",
"about",
"a",
"Critical",
"Office",
"Zero-Day",
"in",
"the",
"wild."
] | [
16,
0,
8,
8,
4,
12,
16,
16,
16,
4,
16,
16,
16,
7,
15,
15,
16,
16,
16
] |
[
"Notice",
"notice",
"the",
"use",
"of",
"the",
"mistaken",
"β",
"Word",
"β",
"instead",
"of",
"β",
"World",
"β",
":",
"β",
"On",
"behalf",
"of",
"all",
"at",
"the",
"Word",
"Uyghur",
"Congress",
"(",
"WUC",
")",
",",
"the",
"Unrepresented",
"Nations",
"and",
"Peoples",
"Organization",
"(",
"UNPO",
")",
"and",
"the",
"Society",
"for",
"Threatened",
"Peoples",
"(",
"STP",
")",
",",
"Human",
"Rights",
"in",
"China",
":",
"Implications",
"for",
"East",
"Turkestan",
",",
"Tibet",
"and",
"Southern",
"Mongolia",
"In",
"what",
"was",
"an",
"unprecedented",
"coming-together",
"of",
"leading",
"Uyghur",
",",
"Mongolian",
",",
"Tibetan",
"and",
"Chinese",
"activists",
",",
"as",
"well",
"as",
"other",
"leading",
"international",
"experts",
",",
"we",
"were",
"greatly",
"humbled",
"by",
"the",
"great",
"enthusiasm",
",",
"contribution",
"and",
"desire",
"from",
"all",
"in",
"attendance",
"to",
"make",
"this",
"occasion",
"something",
"meaningful",
",",
"the",
"outcome",
"of",
"which",
"produced",
"some",
"concrete",
",",
"action-orientated",
"solutions",
"to",
"our",
"shared",
"grievances",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
12,
12,
16,
16,
4,
12,
12,
12,
12,
12,
12,
12,
16,
16,
4,
12,
12,
12,
12,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"February",
"2017,",
"we",
"found",
"a",
"new",
"Ebury",
"sample,",
"that",
"introduces",
"a",
"significant",
"number",
"of",
"new",
"features."
] | [
16,
0,
8,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"first",
"discussed",
"them",
"in",
"April",
"2015",
"when",
"we",
"witnessed",
"them",
"targeting",
"a",
"number",
"of",
"organizations",
"in",
"Japan."
] | [
16,
16,
16,
16,
16,
0,
8,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
2
] |
[
"It",
"is",
"important",
"to",
"note",
"that",
"Adobe",
"has",
"released",
"the",
"bulletin",
"APSB15-27",
"to",
"address",
"this",
"vulnerability;",
"the",
"latest",
"version",
"of",
"Flash",
"19.0.0.226",
"is",
"no",
"longer",
"vulnerable."
] | [
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
1,
16,
16,
16,
7,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16
] |
[
"The",
"overlap",
"between",
"the",
"HenBox",
"and",
"9002",
"malware",
"families",
"Unit",
"42",
"has",
"seen",
"involves",
"three",
"shared",
"C2s",
"between",
"several",
"samples",
";",
"the",
"first",
"IP",
"below",
"is",
"used",
"for",
"more",
"than",
"half",
"of",
"the",
"HenBox",
"samples",
"we",
"have",
"seen",
"to",
"date",
":",
"47.90.81",
"[",
"."
] | [
16,
16,
16,
16,
3,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"Kaspersky",
"Lab",
"reported",
"the",
"Trojan",
"to",
"Google",
",",
"and",
"it",
"has",
"now",
"been",
"removed",
"from",
"the",
"store",
"."
] | [
4,
12,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"September",
"08",
",",
"2020",
"TikTok",
"Spyware",
"A",
"detailed",
"analysis",
"of",
"spyware",
"masquerading",
"as",
"TikTok",
"A",
"recent",
"threat",
"to",
"ban",
"TikTok",
"in",
"the",
"United",
"States",
"has",
"taken",
"the",
"internet",
"by",
"storm",
"and",
"received",
"mixed",
"reactions",
"from",
"social",
"media",
"and",
"internet",
"users",
"."
] | [
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Interestingly",
",",
"we",
"found",
"other",
"DNS",
"records",
"mostly",
"from",
"2017",
"that",
"follow",
"a",
"similar",
"pattern",
"and",
"appear",
"to",
"contain",
"two-letters",
"codes",
"for",
"districts",
"in",
"Italy",
":",
"Server",
"City",
"server1bo.exodus.connexxa",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Turla.aj",
"BKDR_TAVDIG.ZGEJ-A",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Trojan.Wipbot",
"BKDR_TAVDIG.ZGEJ-A",
"Troj.W32.Epiccosplay!c",
"Win32.Backdoor.Wipbot.Ehhy",
"BackDoor.Turla.52",
"Trojan.Turla.Win32.35",
"BehavesLike.Win32.Ramnit.cc",
"Trojan.Win32.Turla",
"BDS/WipBot.B.1",
"Trojan.Kazy.D6CC04",
"Backdoor:Win32/WipBot.B",
"Trojan/Win32.Tavdig.C561133",
"Trojan.Turla!36kTMhU81bU"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"However",
",",
"given",
"the",
"way",
"the",
"trojan",
"is",
"built",
",",
"it",
"is",
"highly",
"customizable",
",",
"meaning",
"that",
"adapting",
"it",
"to",
"a",
"different",
"language",
"would",
"be",
"extremely",
"easy",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"variation",
"of",
"the",
"Trojan",
"was",
"also",
"mentioned",
"in",
"the",
"2013",
"FireEye",
"blogs",
"about",
"the",
"Sunshop",
"campaign",
"3",
"and",
"operation",
"ephemeral",
"hydra",
"4."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
0,
4,
16,
16,
16,
6,
14,
16,
16,
6,
14,
14,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Downloader.JSLP",
"Trojan.Downloader.JSLP",
"Adware.AdPeak",
"Trojan/Downloader.Rottentu.a",
"Trojan.Downloader.JSLP",
"Win32.Trojan.WisdomEyes.151026.9950.9980",
"Adware.Crossid",
"Win32/Tnega.LUdScAC",
"not-a-virus:AdWare.Win32.AdPeak.dn",
"Adware.W32.Adpeak!c",
"Trojan.Downloader.JSLP",
"Trojan.Downloader.JSLP",
"Trojan.DownLoader16.16196",
"backdoor.win32.prorat.ah",
"BehavesLike.Win32.Downloader.tc",
"AdWare/AdPeak.ab",
"GrayWare[AdWare:not-a-virus]/Win32.AdPeak",
"Trojan.Downloader.JSLP",
"TrojanDownloader:Win32/Tordow.A",
"Adware/Win32.AdPeak.N1435735988",
"AdWare.AdPeak",
"Trojan.Downloader.JSLP"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"There",
"are",
"several",
"different",
"Locky",
"campaigns",
"going",
"on",
"at",
"the",
"same",
"time,",
"the",
"largest",
"being",
"the",
"one",
"from",
"affiliate",
"ID",
"3",
"which",
"comes",
"with",
"malicious",
"ZIP",
"containing",
".VBS",
"or",
".JS",
"attachments."
] | [
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
1,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Packed.Win32.TDSS!O",
"RiskWare.Tool.CK",
"Win32.Trojan.WisdomEyes.16070401.9500.9900",
"W32/PWStealerX.EGK",
"TSPY_RAVEN.A",
"Trojan-PSW.Win32.Raven.b",
"Trojan.Win32.Raven.ewlguc",
"TrojWare.Win32.Patched.KSU",
"BackDoor.Uragan",
"TSPY_RAVEN.A",
"BehavesLike.Win32.Ransomware.nc",
"W32/PWS.PQHC-6858",
"Trojan/PSW.Ravenpass.a",
"PWS:Win32/Raven.C",
"Trojan-PSW.Win32.Raven.b",
"TrojanPSW.Raven",
"Trojan.PWS.Raven!jl2h2OWvUG8",
"Trojan-Spy.Win32.Hsow"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Cendelf.A8",
"WS.Reputation.1",
"Delf.PVUB",
"Win32/Tnega.CTAcCXD",
"PE:Malware.Delf!6.F",
"BackDoor.Bulknet.1078",
"TR/Spy.Browse.14364",
"Trojan/Win32.Cendelf",
"Trojan-Dropper.Delf",
"W32/Delff.RJH!tr",
"Delf.ALTK"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Streamlining",
"development",
"makes",
"financial",
"sense",
"for",
"attackers,",
"so",
"the",
"findings",
"may",
"imply",
"a",
"bigger",
"trend",
"towards",
"industrialization",
"that",
"achieves",
"an",
"economy",
"of",
"scale."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"turned",
"out",
"that",
"they",
"are",
"also",
"atypical",
"by",
"many",
"means."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We've",
"identified",
"9,215",
"samples",
"tagged",
"Banload",
"in",
"AutoFocus",
"since",
"December",
"2013."
] | [
16,
16,
16,
3,
16,
3,
16,
5,
16,
0,
8
] |
[
"Talos",
"has",
"observed",
"a",
"small",
"email",
"campaign",
"leveraging",
"the",
"use",
"of",
"Microsoft",
"Publisher",
"files."
] | [
12,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
1,
9,
9
] |
[
"Chinese",
"APK",
"names",
":",
"Some",
"of",
"FakeSpy",
"β",
"s",
"APK",
"package",
"names",
"contain",
"anglicized",
"Chinese",
"(",
"Mandarin",
")",
"words",
"that",
"might",
"be",
"related",
"to",
"Chinese",
"songs",
"and",
"lyrics",
",",
"food",
",",
"provinces",
",",
"etc",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"While",
"it",
"can",
"be",
"used",
"anywhere",
"and",
"target",
"any",
"bank",
"or",
"region",
",",
"at",
"this",
"time",
",",
"we",
"are",
"seeing",
"it",
"deployed",
"specifically",
"in",
"Germany",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"the",
"latest",
"implant",
"versions",
"there",
"are",
"48",
"different",
"commands",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"IOC",
"contains",
"indicators",
"detailed",
"in",
"the",
"whitepaper",
"Hiding",
"in",
"Plain",
"Sight:",
"FireEye",
"and",
"Microsoft",
"Expose",
"Chinese",
"APT",
"Group's",
"Obfuscation",
"Tactic"
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
4,
16,
6,
14,
14,
16,
16
] |
[
"Stumbled",
"upon",
"another",
"one",
"of",
"the",
"FakeAV's,",
"its",
"called",
"Internet",
"Security"
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanPWS.Mauthy.g3",
"Win32.Trojan.WisdomEyes.151026.9950.9998",
"Heur.AdvML.C",
"Trojan.Win32.DownLoader1.dklsld",
"Trojan.Win32.Z.Kazy.1108582[h]",
"Trojan.DownLoader4.60407",
"BehavesLike.Win32.SoftPulse.tc",
"Trojan.Kazy.D103DE",
"PWS:MSIL/Mauthy.A",
"Trojan-PWS.MSIL",
"PSW.ILUSpy",
"Trj/CI.A",
"Win32/Trojan.7d3"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"com/",
")",
":",
"This",
"server",
"provides",
"APK",
"files",
"with",
"advertising",
"network",
"."
] | [
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"These",
".pub",
"files",
"are",
"normally",
"used",
"for",
"the",
"publishing",
"of",
"documents",
"such",
"as",
"newsletters,",
"allowing",
"users",
"to",
"create",
"such",
"documents",
"using",
"familiar",
"office",
"functions",
"such",
"as",
"mail",
"merging."
] | [
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9869",
"BackDoor.BlackEnergy.80",
"Worm:Win32/Phdet.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"By",
"utilizing",
"a",
"completely",
"fileless",
"infection",
"chain,",
"the",
"malware",
"will",
"be",
"more",
"difficult",
"to",
"analyze",
"using",
"a",
"sandbox,",
"making",
"it",
"more",
"difficult",
"for",
"anti-malware",
"engineers",
"to",
"examine."
] | [
16,
16,
16,
16,
3,
11,
11,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
4,
12,
16,
16
] |
[
"In",
"cooperation",
"with",
"WeipTech,",
"we",
"have",
"identified",
"92",
"samples",
"of",
"a",
"new",
"iOS",
"malware",
"family",
"in",
"the",
"wild."
] | [
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16
] |
[
"RetroTetris",
"can",
"be",
"installed",
"in",
"Android",
"versions",
"starting",
"from",
"2.3",
"Gingrebread",
"while",
"Brain",
"Test",
"can",
"be",
"installed",
"in",
"versions",
"starting",
"from",
"2.2",
"Froyo."
] | [
3,
16,
16,
16,
16,
5,
13,
16,
16,
5,
13,
16,
3,
11,
16,
16,
16,
16,
15,
16,
16,
5,
13
] |
[
"A",
"motivated",
"attacker",
"can",
"use",
"this",
"trojan",
"to",
"harvest",
"usernames",
"and",
"passwords",
"and",
"then",
"reuse",
"them",
"to",
"login",
"into",
"the",
"organization",
"'s",
"system",
"where",
"the",
"victim",
"works",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"net/mms.apk",
"to",
"view",
"the",
"message",
"β",
"Once",
"the",
"APK",
"package",
"is",
"downloaded",
",",
"potential",
"victims",
"are",
"urged",
"to",
"grant",
"the",
"malicious",
"app",
"a",
"wide",
"range",
"of",
"permissions",
"on",
"their",
"Android",
"device",
":",
"App",
"permissions",
"SEND_SMS",
"RECEIVE_BOOT_COMPLETED",
"INTERNET",
"SYSTEM_ALERT_WINDOW",
"WRITE_SMS",
"ACCESS_NETWORK_STATE",
"WAKE_LOCK",
"GET_TASKS",
"CALL_PHONE",
"RECEIVE_SMS",
"READ_PHONE_STATE",
"READ_SMS",
"ERASE_PHONE",
"Once",
"installed",
",",
"MazarBOT",
"downloads",
"a",
"copy",
"of",
"Tor",
"onto",
"users",
"β",
"Android",
"smartphones",
"and",
"uses",
"it",
"to",
"connect",
"anonymously",
"to",
"the",
"net",
"before",
"sending",
"a",
"text",
"message",
"containing",
"the",
"victim",
"β",
"s",
"location",
"to",
"an",
"Iranian",
"mobile",
"phone",
"number",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
5,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"mostly",
"targets",
"European",
"users."
] | [
16,
3,
16,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9988",
"Trojan.Win32.Geratid.dklqgw",
"Trojan.Msil",
"Backdoor:MSIL/Geratid.A!dll"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"]",
"top/",
"Oct",
"17",
",",
"2017",
"hxxp",
":",
"//online.bankaustria.at.id87726",
"[",
"."
] | [
9,
9,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"CONCLUSION",
"In",
"this",
"research",
",",
"the",
"Nocturnus",
"team",
"has",
"dissected",
"a",
"rapidly",
"evolving",
"Android",
"malware",
"in",
"the",
"making",
"."
] | [
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16
] |
[
"Since",
"Ginp",
"is",
"already",
"using",
"some",
"code",
"from",
"the",
"Anubis",
"Trojan",
",",
"it",
"is",
"quite",
"likely",
"that",
"other",
",",
"more",
"advanced",
"features",
"from",
"Anubis",
"or",
"other",
"malware",
",",
"such",
"as",
"a",
"back-connect",
"proxy",
",",
"screen-streaming",
"and",
"RAT",
"will",
"also",
"be",
"added",
"in",
"the",
"future",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"was",
"discovered",
"in",
"early",
"2014",
"and",
"was",
"named",
"after",
"a",
"debug",
"string,",
"BlackMoon",
"that",
"was",
"present",
"in",
"its",
"code."
] | [
16,
16,
16,
16,
0,
8,
16,
16,
16,
16,
16,
16,
16,
3,
15,
16,
16,
16,
16,
1
] |
[
"Volexity",
"recently",
"identified",
"a",
"breach",
"to",
"the",
"website",
"of",
"a",
"well",
"regarded",
"media",
"outlet",
"in",
"the",
"country",
"of",
"Georgia."
] | [
4,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
2
] |
[
"From",
"the",
"latter",
"half",
"of",
"May",
"until",
"June",
"10,",
"there",
"was",
"a",
"relative",
"lull",
"in",
"TorrentLocker-related",
"emails."
] | [
16,
16,
16,
0,
8,
8,
16,
0,
8,
16,
16,
16,
16,
16,
16,
1,
10
] |
[
"This",
"was",
"an",
"original",
"spyware",
"program",
",",
"designed",
"to",
"exfiltrate",
"almost",
"all",
"accessible",
"information",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Lookout",
"said",
"in",
"its",
"own",
"blog",
"post",
"published",
"Wednesday",
"that",
"its",
"threat",
"detection",
"network",
"has",
"recently",
"observed",
"a",
"surge",
"of",
"Shedun",
"attacks",
",",
"indicating",
"the",
"scourge",
"wo",
"n't",
"be",
"going",
"away",
"any",
"time",
"soon",
"."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"When",
"enabled",
",",
"it",
"makes",
"a",
"screenshot",
"every",
"25",
"seconds",
"nggstart_key",
"nggstop_key",
"Enable/disable",
"keylogging",
"module",
"nggstart_rec",
"nggstop_rec",
"Enable/disable",
"surrounding",
"sounds",
"recording",
"module",
"ngg_status",
"Send",
"components",
"status",
"to",
"the",
"C",
"&",
"C",
"socket",
"*",
"any",
"other",
"*",
"Execute",
"received",
"command",
"via",
"Python",
"β",
"s",
"subprocess.Popen",
"(",
")",
",",
"output",
"result",
"will",
"be",
"sent",
"to",
"the",
"C",
"&",
"C",
"socket",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"technique",
"is",
"being",
"used",
"to",
"allow",
"the",
"attackers",
"to",
"conceal",
"their",
"secondary",
"payloads,",
"bypassing",
"different",
"AV",
"products."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
3,
16,
16,
5,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Nuclear",
"Win32.Trojan.WisdomEyes.16070401.9500.9871",
"Trojan.Win32.Nuclear.baxsh",
"Backdoor.Win32.Nuclear.182272",
"Backdoor.Win32.Nuclear.CU",
"BackDoor.Nuclearat.452",
"Backdoor.Nuclear.Win32.1045",
"Backdoor.Win32.Nuclear",
"Backdoor/Nuclear.yt",
"Trojan[Backdoor]/Win32.Nuclear",
"Backdoor.Nuclear",
"Trojan.Zusy.Elzob.493",
"Win32/Nuclear.CU",
"Backdoor.Nuclear!tPH0Q8Q37CQ"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Viking.GY",
"TrojWare.Win32.Magania.~AD",
"Trojan/Win32.Hupigon",
"Trojan-PWS.Win32.Hangame.cl"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"Most",
"recently,",
"we",
"observed",
"several",
"relatively",
"large",
"email",
"campaigns",
"distributing",
"the",
"Kronos",
"banking",
"Trojan."
] | [
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
3,
11,
11
] |
[
"This",
"domain",
"has",
"been",
"previously",
"reported",
"as",
"an",
"lSMAgent",
"C2."
] | [
16,
1,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"''",
"The",
"report",
"said",
"HummingBad",
"apps",
"are",
"developed",
"by",
"Yingmob",
",",
"a",
"Chinese",
"mobile",
"ad",
"server",
"company",
"that",
"other",
"researchers",
"claim",
"is",
"behind",
"the",
"Yinspector",
"iOS",
"malware",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
5,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.CommInet.70741",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Backdoor.Exdis",
"Trojan.Win32.Small.dqjffo",
"MalCrypt.Indus!",
"BackDoor.HangUp.44052",
"BehavesLike.Win32.Backdoor.kh",
"Trojan[Backdoor]/Win32.CommInet",
"Win32.Hack.Small.ak.kcloud",
"Backdoor:Win32/Easydor.D",
"Bck/CommInet.V",
"Win32.Backdoor.Comminet.dbwh",
"Backdoor.Win32.CommInet",
"Exdis.A!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"*",
"*",
"*",
"End",
"translation",
"*",
"*",
"*",
"The",
"phishing",
"template",
"then",
"presents",
"additional",
"instructions",
"for",
"installing",
"the",
"fake",
"security",
"application",
"(",
"Figure",
"5",
")",
":",
"Figure",
"5",
":",
"Additional",
"instructions",
"telling",
"the",
"victim",
"to",
"give",
"the",
"app",
"the",
"requested",
"permissions",
"(",
"English",
"translation",
"below",
")",
",",
"with",
"stolen",
"branding",
"and",
"fraudulent",
"copy",
"*",
"*",
"*",
"Translation",
"*",
"*",
"*",
"Step",
"2",
":",
"Allow",
"installation",
"Open",
"your",
"device",
"'s",
"settings",
",",
"select",
"Security",
"or",
"Applications",
"(",
"depending",
"on",
"the",
"device",
")",
",",
"and",
"check",
"Unknown",
"sources",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"If",
"a",
"user",
"visits",
"the",
"profile",
"host",
"website",
"and",
"allows",
"the",
"installer",
"to",
"download",
",",
"the",
"iOS",
"system",
"will",
"go",
"directly",
"to",
"the",
"β",
"Install",
"Profile",
"β",
"page",
"(",
"which",
"shows",
"a",
"verified",
"safety",
"certificate",
")",
",",
"and",
"then",
"request",
"the",
"users",
"β",
"passcode",
"for",
"the",
"last",
"step",
"of",
"installation",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.RevengeRat.2",
"TROJ_REVETRAT.SM",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Revetrat",
"TROJ_REVETRAT.SM",
"Win.Trojan.RevengeRat-6344273-0",
"BackDoor.RevetRat.2",
"BehavesLike.Win32.Trojan.lm",
"W32/Trojan.VQKC-8396",
"Backdoor:MSIL/Revetrat.A!bit",
"Backdoor.RevetRat",
"Trj/GdSda.A",
"Win32/Trojan.961"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"That",
"security",
"software",
"is",
"commonly",
"installed",
"on",
"computers",
"in",
"Brazil",
"as",
"several",
"banks",
"require",
"it",
"to",
"log",
"into",
"their",
"online",
"banking",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.StartPage.87040.B",
"Trojan.Searmapxp.FC.384",
"Trojan.StartPage.MSIL",
"Win32.Trojan.StartPage.ck",
"Win.Trojan.Startpage-6834",
"Trojan.Win32.Startpage.fsfn",
"Trojan.Win32.StartPage.dztahb",
"Trojan.Win32.Z.Startpage.87040.FS",
"Troj.W32.Startpage!c",
"Win32.Trojan.Startpage.Szvb",
"TrojWare.Win32.Startpage.KAX",
"Trojan.Click3.12428",
"Trojan/StartPage.qbi",
"Pua.Secure.Installer",
"ADWARE/IERedirector.87040",
"Trojan/Win32.Startpage",
"Trojan:Win32/Searmapxp.A!bit",
"Trojan.Win32.Startpage.fsfn",
"Adware/Win32.StartPage.R160955",
"Trojan.StartPage",
"Trj/CI.A",
"Trojan.Click!GCNxubkcTZg",
"AdWare.IERedirector",
"MSIL/StartPage.MI!tr",
"Win32/Virus.Adware.007"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Therefore",
",",
"β",
"Agent",
"Smith",
"β",
"decompiles",
"both",
"the",
"original",
"application",
"and",
"the",
"malicious",
"payload",
"and",
"fuses",
"them",
"together",
"."
] | [
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.VBOverlayD.PE",
"Trojan.Win32.Swisyn!O",
"Trojan.Mofksys.A",
"W32/Swisyn.ag",
"Trojan/Swisyn.bner",
"PE_MOFKSYS.A",
"W32.Gosys",
"Win32/VB.BOP",
"PE_MOFKSYS.A",
"Win.Virus.Sality:1-6335700-1",
"Troj.W32.Swisyn.tnEM",
"Trojan/Swisyn.rmj",
"Trojan/Win32.Swisyn.bner",
"Trojan.Win32.Swisyn.bner",
"Trojan/Win32.Swisyn.R1452",
"Trojan.Swisyn",
"Trojan.Win32.VB"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"targets",
"of",
"these",
"attacks",
"appear",
"to",
"primarily",
"be",
"companies",
"in",
"the",
"video",
"games",
"industry,",
"although",
"other",
"targets",
"may",
"exist",
"outside",
"of",
"our",
"telemetry."
] | [
16,
16,
16,
16,
1,
16,
16,
16,
16,
4,
16,
16,
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
4
] |
[
"Many",
"of",
"the",
"default",
"strings",
"in",
"this",
"application",
"are",
"in",
"Arabic",
",",
"including",
"the",
"name",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Unit",
"42",
"has",
"observed",
"a",
"new",
"version",
"of",
"Hworm",
"or",
"Houdini",
"being",
"used",
"within",
"multiple",
"attacks."
] | [
4,
12,
16,
16,
16,
16,
16,
16,
3,
16,
3,
16,
16,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HEUR:Trojan.AndroidOS.Piom.dzu",
"Trojan.Android.Piom.expmgs",
"a.privacy.dingwe",
"Android.Spy.422.origin",
"ANDROID/Piom.otvgv",
"Trojan/Android.Piom",
"HEUR:Trojan.AndroidOS.Piom.dzu",
"Trojan.AndroidOS.Spy.D",
"Trojan.AndroidOS.Dingwe",
"Android/Fyec.DZS!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Samples",
"and",
"command",
"and",
"control",
"hosts",
"associated",
"with",
"the",
"Imminent",
"Monitor",
"RAT"
] | [
16,
16,
1,
9,
9,
5,
16,
16,
16,
3,
11,
11
] |
[
"Finally",
",",
"a",
"new",
"Windows",
"service",
"is",
"created",
"with",
"the",
"service",
"path",
"pointing",
"to",
"the",
"candidate",
".exe",
"located",
"in",
"this",
"new",
"directory",
"together",
"with",
"the",
"freshly",
"created",
",",
"benign-looking",
"DLL",
"."
] | [
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"strange",
"behavior",
"consisted",
"of",
"a",
"large",
"amount",
"of",
"peculiar",
"files",
"being",
"written",
"into",
"sensitive",
"system",
"directories."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"It",
"uses",
"a",
"variety",
"of",
"new",
"techniques",
",",
"but",
"the",
"most",
"interesting",
"thing",
"is",
"that",
"it",
"injects",
"malicious",
"code",
"into",
"the",
"system",
"libraries",
"β",
"libdmv.so",
"or",
"libandroid_runtime.so",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
1,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.CoinMinerSimY.Worm",
"Trojan.Multi",
"Backdoor.Graybird",
"TROJ_COINMINE.THAOIO",
"Trojan.Win32.Miner.tidx",
"Trojan.Win32.Miner.exakqc",
"Trojan.Win32.S.CoinMiner.1312256",
"Uds.Dangerousobject.Multi!c",
"Trojan.BtcMine.2100",
"TROJ_COINMINE.THAOIO",
"BehavesLike.Win32.MultiPlug.tc",
"PUA.EnigmaProtector",
"Trojan.Miner.axs",
"W32.Miner.Smominru",
"TR/Crypt.Xpack.vknzu",
"Trojan.Win32.Miner.tidx",
"Trojan:Win32/Smominru.A",
"Unwanted/Win32.BitCoinMiner.C2352839",
"Misc.Riskware.MoneroMiner",
"Trojan.Miner",
"RiskWare.BitCoinMiner",
"Trj/CI.A",
"Win32/CoinMiner.ALB",
"Win32.Trojan.Miner.Dxct",
"W32/CoinMiner.ALB!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"26/html2/arc92/au483x.zip",
"hxxp",
":",
"//94.130.106",
"[",
"."
] | [
9,
9,
1,
9,
9,
9,
9
] |
[
"Windows",
"We",
"have",
"found",
"multiple",
"components",
"that",
"form",
"an",
"entire",
"spyware",
"system",
"for",
"the",
"Windows",
"platform",
"."
] | [
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanClicker.MSIL",
"Trojan.Win32.Clicker!BT",
"TrojWare.MSIL.TrojanClicker.Lasdoma.NRJ",
"Trojan.Click3.24925",
"Trojan.MSIL.TrojanClicker",
"TrojanClicker.MSIL.mr",
"TR/ATRAPS.hsvhb",
"Trojan.Johnnie.DE2DE",
"TrojanClicker:MSIL/Lasdoma.A!bit",
"Win-Trojan/ADM01.Exp",
"Trojan.Win32.Clicker!BT"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.