tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Pakes",
"Trojan/Pakes.cxg",
"Trojan.Heur.EAB04F",
"Win32.Trojan.WisdomEyes.16070401.9500.9965",
"W32/Trojan2.BBCZ",
"Win.Trojan.Pakes-1891",
"Trojan.Win32.Pakes.cxg",
"Trojan.Win32.Pakes.buyldp",
"Troj.W32.Pakes.cxg!c",
"Trojan.DownLoader.61691",
"Trojan.Pakes.Win32.5440",
"BehavesLike.Win32.Dropper.lc",
"Trojan.Win32.Crypt",
"W32/Trojan.VJUA-2101",
"Trojan/Pakes.bvs",
"Trojan/Win32.Pakes",
"Win32.Troj.Unknown.kcloud",
"Trojan.Win32.Pakes.cxg",
"BScope.Trojan.MTA.01233",
"Trj/Pakes.EB",
"Win32.Trojan.Pakes.Dygy",
"Trojan.Pakes!elDwpuVaGqk"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"One",
"of",
"the",
"most",
"interesting",
"and",
"active",
"specimens",
"to",
"date",
"was",
"a",
"mobile",
"Trojan",
"from",
"the",
"Rotexy",
"family",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16
] |
[
"W32.Futurax",
"is",
"a",
"worm",
"that",
"spreads",
"via",
"removable",
"drives",
"and",
"network",
"shares."
] | [
1,
16,
16,
3,
16,
16,
16,
5,
13,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win.Trojan.Dapato-413",
"Trojan.Win32.Dapato.bewyzt",
"BackDoor.Cool.362",
"TR/Spy.289792.56",
"Win32.Troj.Undef.kcloud",
"Dropper/Win32.Dapato",
"Trojan-Downloader.win32.Delf.xoq",
"Trojan-Dropper.Dapato.bauk",
"Win32/Delf.OJW",
"Trojan-Dropper.Win32.Dapato",
"Delf.AJUR"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Trojan",
"works",
"by",
"creating",
"an",
"overlay",
"whenever",
"the",
"user",
"launches",
"the",
"banking",
"application",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.eHeur.Virus02",
"Virus.Win32.Sality!O",
"BehavesLike.Win32.BadFile.fc",
"Trojan-Spy.Win32.AutoHK",
"TR/Dldr.AutoHK.rguvg",
"TrojanDownloader:MSIL/AutoHK.B!bit",
"TrojanSpy.AutoHK",
"Win32/TrojanDownloader.AutoHK.BC"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"For",
"the",
"Trojan",
"to",
"install",
",",
"the",
"user",
"must",
"allow",
"installation",
"of",
"apps",
"from",
"unknown",
"sources",
"in",
"the",
"device",
"settings",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"(",
"Have",
"a",
"look",
"here",
"and",
"here",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Pony",
"will",
"infect",
"the",
"victim",
"computer",
"and",
"download",
"an",
"additional",
"malware."
] | [
3,
16,
16,
16,
16,
5,
16,
16,
16,
3,
11
] |
[
"This",
"and",
"following",
"versions",
"were",
"masquerading",
"as",
"fake",
"β",
"Adobe",
"Flash",
"Player",
"β",
"apps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16
] |
[
"Indeed",
",",
"the",
"Trojan",
"explicitly",
"targets",
"Russian-speaking",
"users",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"discuss",
"these",
"changes",
"and",
"its",
"effect",
"on",
"Android",
"and",
"Apple",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Chekafe.A",
"TROJ_DLOADR.SMOK",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win32/Donloz.AQU",
"TROJ_DLOADR.SMOK",
"Trojan.Win32.Downloader.14836",
"Trojan.DownLoad2.12418",
"BehavesLike.Win32.Backdoor.lm",
"Trojan-Downloader.Win32.Chekafe",
"Win32.TrojDownloader.tb.kcloud",
"TrojanDownloader:Win32/Chekafe.C",
"BScope.Trojan.SvcHorse.01643"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.4102",
"TrojWare.Win32.CoinMiner.IEGT",
"W32/Trojan.QGMZ-7351",
"Trojan.Heur.FU.EE0BC8"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Virus.Win32.Sality!O",
"W32/Trojan.HAUX-5531",
"Trojan.Win32.Fsysna.erxi",
"Variant.Symmi.mCm9",
"BehavesLike.Win32.Downloader.tc",
"Trojan/Blocker.idi",
"TR/IRCBot.hjsna",
"Trojan.Barys.DE0A3",
"Trojan.Win32.Z.Ircbot.1304576",
"Trojan.Win32.Fsysna.erxi",
"Trojan:Win32/Fenibot.A",
"Trojan/Win32.Inject.C860331",
"Win32/IRCBot.NIM",
"Trojan.Kazy",
"W32/IRCBot.NIM!tr",
"Trj/CI.A",
"Win32/Trojan.2d1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Giving",
"an",
"attacker",
"access",
"to",
"a",
"mobile",
"device",
"can",
"have",
"severe",
"business",
"consequences",
",",
"especially",
"if",
"the",
"end",
"user",
"is",
"using",
"their",
"mobile",
"device",
"to",
"discuss",
"sensitive",
"business",
"topics",
"or",
"access",
"enterprise",
"financial",
"information",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"CONTACTS",
"β",
"send",
"text",
"received",
"from",
"C",
"&",
"C",
"to",
"all",
"user",
"contacts",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanPWS.Fareit.FC.2719",
"Trojan.Zusy.D33BC8",
"Win32.Trojan.WisdomEyes.16070401.9500.9992",
"BehavesLike.Win32.Trojan.vc",
"Trojan/Win32.Inject.C1663733",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"The",
"malicious",
"apps",
"reached",
"an",
"astonishing",
"spread",
"between",
"4.5",
"million",
"and",
"18.5",
"million",
"downloads",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"By",
"pivoting",
"off",
"of",
"the",
"infrastructure",
"we",
"learned",
"that",
"it",
"is",
"related",
"to",
"Winnti,",
"a",
"Chinese",
"threat",
"actor",
"that",
"is",
"mostly",
"targeting",
"the",
"gaming",
"industry."
] | [
16,
16,
16,
16,
16,
5,
16,
16,
15,
16,
16,
16,
16,
6,
6,
14,
14,
14,
16,
16,
16,
16,
4,
12,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.MyDoomI.Kr",
"Win32/Mydoom.BT",
"W32.Dozer",
"Win32/Lyzapo.A",
"WORM_MYDOOM.EA",
"Win.Trojan.Dozer-1",
"Trojan.Dozer.1",
"WORM_MYDOOM.EA",
"BehavesLike.Win32.Mydoom.fc",
"W32/Backdoor.VQLJ-7986",
"Win32.Troj.Undef.kcloud",
"TrojanDropper:Win32/Lyzapo.A",
"Dropper/Win32.DDoS.N19798743",
"W32/Mydoom.cf",
"Trojan.DR.Lyzapo!rpJ9Iphh7tw",
"W32/Dozzer.A!tr",
"W32/MyDoom.HN.worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"Once",
"launched",
",",
"the",
"app",
"starts",
"to",
"communicate",
"with",
"its",
"C",
"&",
"C",
"server",
"(",
"whose",
"IP",
"address",
"is",
"base64-encoded",
"in",
"the",
"app",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Split",
"of",
"exfiltrated",
"data",
"Some",
"noteworthy",
"files",
"identified",
"in",
"content",
"taken",
"from",
"compromised",
"devices",
"include",
"passport",
"photos",
",",
"audio",
"recordings",
"of",
"calls",
",",
"other",
"images",
",",
"and",
"a",
"PDF",
"document",
"with",
"data",
"on",
"484",
"individuals",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Downloader",
"Trojan.DownLoader6.50414",
"BehavesLike.Win32.Trojan.tm",
"TR/Dldr.Megone.cwqt",
"Trj/CI.A",
"Win32/Trojan.9b4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-PWS/W32.WebGame.123904.BJ",
"Trojan-GameThief.Win32.Magania!O",
"Backdoor.Zegost.29476",
"Trojan/Magania.gxtv",
"Trojan.Zusy.Elzob.DD23",
"Win32.Trojan.Farfli.ai",
"HV_MAGANIA_CA22396F.TOMC",
"Win.Trojan.Magania-15913",
"Trojan.Win32.Magania.thvzy",
"Troj.GameThief.W32.Magania.l8gE",
"Trojan.KeyLogger.13111",
"Trojan.Magania.Win32.50884",
"BehavesLike.Win32.Dropper.ch",
"P2P-Worm.Win32.Palevo",
"Trojan[GameThief]/Win32.Magania",
"Win32.Troj.Transport.b.kcloud",
"Trojan:DOS/Killmbr.dr",
"Trojan.Win32.A.PSW-Magania.285696.A",
"Trojan/Win32.Magania.R41109",
"BScope.P2P-Worm.Palevo",
"Trojan.Farfli!+e4pBtKCbqs"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Their",
"targets",
"have",
"spanned",
"all",
"across",
"the",
"world,",
"with",
"a",
"focus",
"on",
"government,",
"defense",
"organizations",
"and",
"various",
"Eastern",
"European",
"governments."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
16,
4,
12,
12
] |
[
"FrozenCell",
"is",
"part",
"of",
"a",
"very",
"successful",
",",
"multi-platform",
"surveillance",
"campaign",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"JS/Nemucod",
"is",
"a",
"JavaScript",
"downloader",
"trojan",
"that",
"targets",
"users",
"through",
"malware",
"spam",
"campaigns."
] | [
1,
16,
16,
3,
11,
11,
16,
16,
16,
16,
1,
9,
9
] |
[
"This",
"same",
"attacker",
"is",
"also",
"reported",
"to",
"have",
"targeted",
"various",
"military",
"installations",
"in",
"Central",
"Asia",
"in",
"the",
"past"
] | [
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
2,
10,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.F222",
"Backdoor.Bedep.10384",
"BKDR_BEDEP.SMX",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"BKDR_BEDEP.SMX",
"Trojan.Win32.Yakes.dsmtzi",
"Trojan.Bedep.62",
"BehavesLike.Win32.Spyware.cc",
"Trojan.Win32.Crypt",
"Backdoor/Bedep.v",
"TR/Crypt.ZPACK.147808",
"Trojan[Backdoor]/Win32.Bedep",
"Trojan.Kazy.D9859B",
"Backdoor/Win32.Bedep.R154894",
"Backdoor.Bedep!",
"W32/Bedep.D!tr",
"Win32/Trojan.a60"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Lazarus",
"group",
"is",
"tied",
"to",
"the",
"2014",
"attack",
"on",
"Sony",
"Pictures",
"Entertainment",
"and",
"the",
"2013",
"DarkSeoul",
"attacks."
] | [
6,
14,
14,
16,
16,
16,
16,
0,
1,
16,
4,
12,
12,
16,
16,
0,
1,
9
] |
[
"It",
"is",
"unclear",
"how",
"long",
"the",
"malicious",
"code",
"existed",
"inside",
"the",
"apps",
",",
"hence",
"the",
"actual",
"spread",
"of",
"the",
"malware",
"remains",
"unknown",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"No",
"Chrysaor",
"apps",
"were",
"on",
"Google",
"Play",
"."
] | [
16,
3,
16,
16,
16,
5,
13,
16
] |
[
"The",
"Callisto",
"Group",
"is",
"an",
"advanced",
"threat",
"actor",
"whose",
"known",
"targets",
"include",
"military",
"personnel,",
"government",
"officials,",
"think",
"tanks,",
"and",
"journalists",
"in",
"Europe",
"and",
"the",
"South",
"Caucasus."
] | [
4,
12,
12,
16,
16,
6,
14,
14,
16,
16,
16,
16,
4,
12,
12,
12,
12,
12,
16,
4,
16,
2,
16,
2,
10,
10
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9901",
"TROJ_GRAFTOR_GG3102DA.UVPM",
"TrojWare.Win32.TrojanDownloader.Stantinko.CB",
"Trojan.Kbdmai.83",
"TROJ_GRAFTOR_GG3102DA.UVPM",
"TR/Downloader.amdkv",
"TrojanDownloader:Win32/Stantinko.A!bit",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"this",
"figure",
"we",
"have",
"11",
"RuMMS",
"samples",
",",
"all",
"of",
"which",
"were",
"hosted",
"on",
"the",
"website",
"as",
"shown",
"in",
"the",
"β",
"y",
"β",
"axis",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"However",
",",
"it",
"does",
"n't",
"request",
"permissions",
"like",
"BIND_ADMIN",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Virut.low6",
"Trojan.Graftor.D295ED",
"Win32.Trojan.WisdomEyes.16070401.9500.9753",
"Win.Adware.Downware-564",
"Trojan/Win32.Unknown",
"Trojan:Win32/Vercuser.A",
"Worm/Win32.VB.R47661",
"Backdoor.Bot",
"Trj/CI.A",
"I-Worm.Vercuser.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Over",
"the",
"course",
"of",
"2016",
"β",
"and",
"particularly",
"intensifying",
"towards",
"the",
"end",
"of",
"the",
"year",
"β",
"several",
"individuals",
"known",
"to",
"Amnesty",
"International",
"were",
"approached",
"via",
"email",
"and",
"through",
"social",
"media",
"by",
"Safeena",
"Malik",
"seemingly",
"an",
"enthusiastic",
"activist",
"with",
"a",
"strong",
"interest",
"in",
"human",
"rights."
] | [
16,
16,
16,
16,
0,
16,
16,
16,
16,
16,
0,
8,
8,
8,
8,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
1,
16,
16,
4,
12,
16,
4,
12,
16,
16,
4,
12,
16,
16,
16,
16,
16,
4,
12
] |
[
"The",
"New",
"York",
"Times",
"reported",
"on",
"Nov.",
"15",
"that",
"Kryptowire",
",",
"a",
"mobile",
"enterprise",
"security",
"company",
",",
"discovered",
"the",
"code",
"on",
"a",
"lower-end",
"smartphone",
"made",
"by",
"BLU",
"Products",
"of",
"Doral",
",",
"Fla",
"."
] | [
16,
4,
12,
12,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16
] |
[
"New",
"FakeSpy",
"campaign",
"applications",
"leveraging",
"fake",
"postal",
"services",
"apps",
"."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"These",
"intents",
"are",
"typically",
"defined",
"statically",
"in",
"the",
"app",
"β",
"s",
"AndroidManifest.xml",
"config",
"file",
";",
"some",
"HenBox",
"variants",
"register",
"further",
"intents",
"from",
"their",
"code",
"at",
"run-time",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"As",
"Talos",
"is",
"constantly",
"monitoring",
"changes",
"across",
"the",
"threat",
"landscape",
"to",
"ensure",
"that",
"our",
"customers",
"remain",
"protected",
"as",
"threats",
"continue",
"to",
"evolve,",
"we",
"took",
"a",
"deep",
"dive",
"into",
"this",
"malware",
"variant",
"to",
"determine",
"the",
"technical",
"capabilities",
"and",
"characteristics",
"of",
"Floki",
"Bot."
] | [
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Malware.1",
"Win32.HEURCrypted",
"Trojan.DownLoad.31887",
"TR/Spy.197632.C",
"Heuristic.BehavesLike.Win32.Packed.C",
"W32/Tibs.WA!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"According",
"to",
"the",
"public",
"information,",
"cfm.com.ua",
"domain",
"belongs",
"to",
"the",
"Β«Crystal",
"Finance",
"MillenniumΒ»",
"software",
"developer."
] | [
16,
16,
1,
9,
9,
9,
9,
16,
16,
4,
12,
12,
12,
12,
12
] |
[
"Although",
"early",
"versions",
"had",
"some",
"basic",
"code",
"and",
"string",
"obfuscation",
",",
"protection",
"of",
"the",
"third",
"version",
"of",
"the",
"malware",
"was",
"enhanced",
"with",
"the",
"use",
"of",
"payload",
"obfuscation",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Quick",
"Sunday",
"morning",
"blog",
"post,",
"analysis",
"of",
"an",
"unknown",
"rtf",
"file."
] | [
16,
0,
8,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Heur.JP.E5BA68",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Backdoor.Trojan",
"Trojan.Win32.9728.ikjtj",
"Trojan.DownLoader3.22821",
"Trojan.Win32.Swisyn",
"TR/Dldr.Quillo.A",
"Trojan/Win32.Unknown",
"TrojanDownloader:Win32/Quillo.A",
"Trojan/Win32.HDC.C3028",
"Trojan.DL.Quillo!tw5+WNEhU5A",
"W32/Downloader_x.FYF!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Blouiroet",
"Trojan.Win32.Blouiroet.dx",
"Trojan.Win32.Strictor.ewsjhc",
"Troj.W32.Blouiroet!c",
"Trojan.Blouiroet.Win32.43",
"BehavesLike.Win32.DlHelper.tc",
"Trojan.Blouiroet.an",
"TR/Blouiroet.shppj",
"Trojan/Win32.Blouiroet",
"Trojan.Zusy.D3860E",
"Trojan.Win32.Z.Zusy.1282560",
"Trojan.Win32.Blouiroet.dx",
"Trojan.Win32.Delf",
"Trj/CI.A",
"Win32/Trojan.c62"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm/W32.Lebreat.18944",
"Worm.Lebreat.Win32.18",
"W32/Lebreat.l",
"Trojan.Win32.Lebreat.emyp",
"W32/Breatle.L@mm",
"W32.Spybot.Worm",
"Win32/Lebreat.R",
"Worm.Lebreat.D",
"Net-Worm.Win32.Lebreat.l",
"W32.W.Lebreat.l!c",
"Worm.Win32.Lebreat.R",
"Win32.HLLW.Breat",
"BehavesLike.Win32.Backdoor.lc",
"W32/Breatle.VJCM-5821",
"I-Worm/Lebreat.a",
"DcomRpc.G!exploit",
"Worm[Net]/Win32.Lebreat",
"Win32/Lebreat.worm.18944.B",
"Worm:Win32/Reatle.L@mm",
"Worm.Lebreat",
"Win32.Worm-net.Lebreat.Hugg",
"Worm.Win32.Lebreat.l"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"They",
"range",
"from",
"the",
"recreational",
"apps",
"like",
"games,",
"skins,",
"and",
"themes",
"to",
"phone",
"optimization",
"boosters."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"have",
"found",
"another",
"instance",
"of",
"malware",
"posing",
"as",
"the",
"Super",
"Mario",
"Run",
"Android",
"app",
",",
"and",
"this",
"time",
"it",
"has",
"taken",
"the",
"form",
"of",
"DroidJack",
"RAT",
"(",
"remote",
"access",
"trojan",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16
] |
[
"The",
"AlienVault",
"team",
"has",
"researched",
"and",
"added",
"more",
"IOC",
"s",
"found",
"in",
"the",
"OTX",
"portal."
] | [
4,
12,
12,
16,
16,
16,
16,
16,
1,
16,
16,
16,
5,
13,
13
] |
[
"The",
"Conversations",
"modified",
"samples",
"differ",
"from",
"the",
"original",
"one",
"in",
"the",
"getKnownHosts",
"method",
"that",
"was",
"modified",
"to",
"replace",
"the",
"main",
"XMPP",
"host",
"with",
"the",
"attackers",
"β",
"C2",
"server",
":",
"It",
"appears",
"that",
"the",
"attackers",
"were",
"using",
"a",
"specific",
"C2",
"for",
"the",
"use",
"of",
"that",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"EventBot",
"appears",
"to",
"be",
"a",
"completely",
"new",
"malware",
"in",
"the",
"early",
"stages",
"of",
"development",
",",
"giving",
"us",
"an",
"interesting",
"view",
"into",
"how",
"attackers",
"create",
"and",
"test",
"their",
"malware",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"During",
"this",
"period",
",",
"malware",
"samples",
"display",
"some",
"typical",
"adware",
"characteristics",
"such",
"as",
"unnecessary",
"permission",
"requirements",
"and",
"pop-up",
"windows",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Spy/W32.Teamspy.34816.C",
"TrojanSpy.Skeeyah",
"Win32.Trojan.WisdomEyes.16070401.9500.9565",
"Backdoor.Noknef",
"TSPY_KONNI.A",
"Trojan-Spy.Win32.Teamspy.jb",
"Trojan.Win32.Teamspy.eojkym",
"Troj.Spy.W32!c",
"Trojan.DownLoader25.6499",
"TSPY_KONNI.A",
"W32/Trojan.TMQM-1890",
"TrojanSpy.Teamspy.al",
"TR/Taranis.4651",
"Trojan[Spy]/Win32.TeamSpy",
"Trojan-Spy.Win32.Teamspy.jb",
"Backdoor:Win32/Konny.A",
"Spyware.Infostealer.86016",
"TrojanSpy.Teamspy",
"Trojan.PasswordStealer",
"Win32.Trojan-spy.Teamspy.Phgj",
"TrojanSpy.Teamspy!7hsJ3qOc7gU",
"Trojan.Taranis",
"Trj/GdSda.A",
"Win32/Trojan.6af"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"mid-2022,",
"Mandiant,",
"in",
"collaboration",
"with",
"Fortinet,",
"investigated",
"the",
"exploitation",
"and",
"deployment",
"of",
"malware",
"across",
"multiple",
"Fortinet",
"solutions",
"including",
"FortiGate",
"firewall,",
"FortiManager",
"centralized",
"management",
"solution,",
"and",
"FortiAnalyzer",
"log",
"management,",
"analytics,",
"and",
"reporting",
"platform."
] | [
16,
13,
4,
16,
16,
16,
4,
16,
16,
3,
16,
16,
16,
3,
16,
16,
4,
16,
16,
5,
13,
13,
13,
13,
13,
16,
5,
13,
13,
13,
13,
13,
13
] |
[
"This",
"malware",
"can",
"intercept",
"the",
"user's",
"personal",
"data,",
"such",
"as",
"SMS",
"messages,",
"MMS",
"messages,",
"and",
"USSD",
"requests."
] | [
16,
3,
16,
16,
16,
4,
12,
12,
16,
16,
1,
16,
1,
16,
16,
1,
9
] |
[
"HummingWhale",
",",
"by",
"contrast",
",",
"managed",
"to",
"sneak",
"its",
"way",
"into",
"about",
"20",
"Google",
"Play",
"apps",
"that",
"were",
"downloaded",
"from",
"2",
"million",
"to",
"12",
"million",
"times",
",",
"according",
"to",
"researchers",
"from",
"Check",
"Point",
",",
"the",
"security",
"company",
"that",
"has",
"been",
"closely",
"following",
"the",
"malware",
"family",
"for",
"almost",
"a",
"year",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Supermm.1.0.B",
"Backdoor/W32.SuperMM.251764",
"Backdoor.Win32.SuperMM.10!O",
"BackDoor-ACL.dll",
"Backdoor/SuperMM.10.b",
"W32/Backdoor.MRCA-2263",
"Backdoor.Trojan",
"Backdoor.Supermm.1.0.B",
"Backdoor.Win32.SuperMM.10.b",
"Backdoor.Supermm.1.0.B",
"Trojan.Win32.SuperMM-10.gtre",
"Backdoor.Win32.Z.Supermm.251764",
"Backdoor.W32.Supermm!c",
"Backdoor.Supermm.1.0.B",
"Backdoor.Win32.SuperMM.10.B",
"Backdoor.Supermm.1.0.B",
"BackDoor.SuperMM.10",
"Backdoor.SuperMM.Win32.7",
"BackDoor-ACL.dll",
"Trojan/PSW.Oicqmm98.Dll",
"Trojan[Backdoor]/Win32.SuperMM",
"Backdoor.Supermm.1.0.B",
"Backdoor.Win32.SuperMM.10.b",
"Backdoor:Win32/SuperMM.B",
"Backdoor.Supermm.1.0.B",
"Backdoor.SuperMM",
"Win32/SuperMM.10.B",
"Win32.Backdoor.Supermm.Tayo",
"Trojan.Win32.Supermm",
"BDoor.ACL!tr.bdr",
"Win32/Backdoor.831"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Truvasys",
"TSPY_LIMITAIL.XXUDN",
"Trojan.Win32.StrongPity.ekmtaw",
"Troj.W32.Strongpity!c",
"TSPY_LIMITAIL.XXUDN",
"Trojan.StrongPity.j",
"TR/StrongPity.vtcv",
"Trojan/Win32.StrongPity",
"Backdoor:Win32/Truvasys.A!dha",
"PUP/Win32.DealPly.C2030575",
"Trojan.StrongPity!",
"Trojan.StrongPity",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"adware",
"Trojan",
"in",
"fact",
"potentially",
"allows",
"full",
"remote",
"access",
"to",
"the",
"infected",
"device."
] | [
3,
11,
11,
16,
16,
16,
16,
1,
9,
9,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Bublik!O",
"Trojan.Bublik.Win32.6109",
"W32.W.AutoRun.l0qv",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win32.VB.xswue",
"BehavesLike.Win32.Emotet.dh",
"Trojan/Bublik.ccj",
"Trojan/Win32.Bublik",
"Trojan.Barys.D7D1",
"Trojan:Win32/Klovbot.B",
"Trojan/Win32.VBNA.R146461",
"Trj/CI.A",
"Trojan.Bublik!ZPZ98Vxhajk",
"W32/VBKrypt.CFFF!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9995",
"Backdoor.Win32.Androm.oyzg",
"Trojan.Win32.Androm.exrcqp",
"Trojan.DownLoader26.14208",
"BehavesLike.Win32.Trojan.cc",
"Trojan.MSIL.Crypt",
"TR/Dropper.MSIL.ruzhp",
"Backdoor.Win32.Androm.oyzg",
"Trj/GdSda.A",
"Win32.Backdoor.Androm.Ajls",
"MSIL/Kryptik.BLU!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"But",
"the",
"apps",
",",
"with",
"their",
"many",
"millions",
"of",
"users",
",",
"have",
"captured",
"the",
"attention",
"of",
"the",
"bad",
"actors",
",",
"too",
",",
"who",
"are",
"exploiting",
"the",
"popularity",
"of",
"Netflix",
"to",
"spread",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojanspy.Enkalogs",
"TSPY_KEYLOG.AUSJOZ",
"Win32.Trojan.WisdomEyes.16070401.9500.9994",
"TSPY_KEYLOG.AUSJOZ",
"Trojan.Win32.Keylogger.evqveo",
"Trojan.Win32.Z.Kazy.30722",
"W32/Application.BPVK-3177",
"Trojan.Kazy.D8E58F",
"TrojanSpy:MSIL/Enkalogs.A",
"Trj/GdSda.A",
"MSIL/Keylogger.II!tr.spy",
"Win32/Trojan.40d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"CyberX",
"has",
"discovered",
"a",
"new,",
"large-scale",
"cyber-reconnaissance",
"operation",
"targeting",
"a",
"broad",
"range",
"of",
"targets",
"in",
"the",
"Ukraine."
] | [
4,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16,
4,
16,
16,
2
] |
[
"At",
"this",
"stage",
",",
"the",
"analysis",
"can",
"only",
"continue",
"by",
"manually",
"investigating",
"the",
"individual",
"code",
"blocks",
"and",
"opcode",
"handlers",
",",
"which",
"are",
"highly",
"obfuscated",
"(",
"also",
"using",
"spaghetti",
"code",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Infection",
"The",
"user",
"receives",
"an",
"SMS",
"with",
"a",
"malicious",
"link",
"pointing",
"to",
"a",
"fake",
"website",
"simulating",
"a",
"popular",
"free",
"ad",
"service",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"8",
"β",
"Android",
"requirements",
"Android",
"malware",
"has",
"been",
"around",
"for",
"many",
"years",
"and",
"will",
"be",
"with",
"us",
"for",
"the",
"foreseeable",
"future",
"."
] | [
16,
16,
16,
5,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Since",
"the",
"plugin",
"development",
"pattern",
"is",
"generic",
"and",
"the",
"plugin",
"SDK",
"can",
"be",
"easily",
"embedded,",
"the",
"plugin",
"architecture",
"could",
"be",
"a",
"trend",
"among",
"Android",
"malware",
"in",
"the",
"future."
] | [
16,
16,
1,
9,
9,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16
] |
[
"A",
"commercially",
"available",
"RAT."
] | [
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Downloader.JPIS",
"Trojan.Downloader.JPIS",
"Trojan.Downloader.JPIS",
"TROJ_DALBOT.SMRR",
"Win32.Trojan.WisdomEyes.16070401.9500.9750",
"TROJ_DALBOT.SMRR",
"Win.Trojan.Leepload-1",
"Trojan.Downloader.JPIS",
"Trojan.Downloader.JPIS",
"Trojan.Win32.DloadrDOI.sxvve",
"Trojan.Win32.A.Downloader.73728.ABY",
"Trojan.Downloader.JPIS",
"Trojan.DownLoader6.34186",
"W32/Trojan.USUV-7153",
"Trojan/Win32.Unknown",
"TrojanDownloader:Win32/Dalbot.A",
"Win-Trojan/Dalbot.73728",
"Win32/Trojan.b77"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"have",
"reported",
"the",
"bug",
"to",
"Adobe",
"who",
"assigned",
"it",
"CVE-2017-11292",
"and",
"released",
"a",
"patch",
"earlier",
"today"
] | [
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
1,
16,
16,
16,
16,
0,
8
] |
[
"Figure",
"3",
":",
"Step",
"two",
"of",
"the",
"credential",
"phish",
"asking",
"for",
"the",
"victim",
"β",
"s",
"email",
"address",
"and",
"phone",
"number",
"Having",
"stolen",
"the",
"victim",
"β",
"s",
"account",
"and",
"personal",
"information",
",",
"the",
"scammer",
"introduces",
"a",
"social",
"engineering",
"scheme",
",",
"informing",
"users",
"that",
"they",
"currently",
"do",
"not",
"have",
"the",
"β",
"Bank",
"Austria",
"Security",
"App",
"β",
"installed",
"on",
"their",
"smartphone",
"and",
"must",
"download",
"it",
"to",
"proceed",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"particular",
"application",
"is",
"signed",
"with",
"a",
"fake",
"certificate",
":",
"Owner",
":",
"CN=Unknown",
",",
"OU=Unknown",
",",
"O=Unknown",
",",
"L=Unknown",
",",
"ST=Unknown",
",",
"C=Unknown",
"Issuer",
"CN=Unknown",
",",
"OU=Unknown",
",",
"O=Unknown",
",",
"L=Unknown",
",",
"ST=Unknown",
",",
"C=Unknown",
"Serial",
":",
"1c9157d7",
"Validity",
":",
"11/02/2017",
"00:16:46",
"03/20/2045",
"00:16:46",
"MD5",
"Hash",
":",
"A8:55:46:32:15",
":",
"A9",
":",
"D5:95",
":",
"A9:91",
":",
"C2:91:77:5D:30",
":",
"F6",
"SHA1",
"Hash",
":",
"32:17",
":",
"E9:7E:06",
":",
"FE:5D:84",
":",
"BE:7C:14:0C",
":",
"C6:2B:12:85",
":",
"E7:03:9A:5F",
"The",
"app",
"requests",
"extensive",
"permissions",
"during",
"installation",
"that",
"enable",
"a",
"range",
"of",
"activities",
"supported",
"by",
"the",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Worm.Autorun.VX",
"Trojan/W32.Cosmu.214528.B",
"Trojan.Win32.Cosmu!O",
"Worm.Nenebra.AP8",
"Win32.Worm.Delf.ca",
"W32/Cosmu.C",
"W32.SillyFDC",
"Win32/Cosmu.AO",
"Win.Trojan.Cosmu-268",
"Win32.Worm.Autorun.VX",
"Trojan-Ransom.Win32.Blocker.iwkz",
"Win32.Worm.Autorun.VX",
"Trojan.Win32.Cosmu.vifkp",
"Trojan.Win32.A.Cosmu.212480[UPX]",
"Win32.Trojan.Blocker.Wnme",
"Win32.Worm.Autorun.VX",
"Win32.Worm.Autorun.VX",
"Win32.HLLW.Autoruner.57682",
"Trojan.Cosmu.Win32.9114",
"W32/Cosmu.KVSE-8775",
"Trojan/Cosmu.gje",
"WORM/Nenebra.A",
"Trojan/Win32.Cosmu",
"Win32.Worm.Autorun.VX",
"Troj.Ransom.W32.Blocker!c",
"Worm:Win32/Nenebra.A",
"Win32.Worm.Autorun.VX",
"TScope.Trojan.Delf",
"Worm.AutoRun",
"Trojan.Cosmu",
"Win32/AutoRun.Delf.HF",
"Trojan.Cosmu!gKBhUwtv5Oc",
"Trojan-Downloader.Win32.Banload",
"W32/Cosmu.XXS!tr",
"W32/Autorun.JYX",
"Win32/Worm.00b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Razy.D2ECF0",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.DownLoader26.14415",
"BehavesLike.Win32.Trojan.cc",
"W32/Trojan.UDBU-2080",
"TR/Crypt.Xpack.dmslo",
"Backdoor/Win32.Androm.C2026756",
"Trj/GdSda.A",
"Trojan.Win32.Injector",
"Win32/Trojan.bd4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Runner.T",
"Trojan/W32.Runner.2560.C",
"Trojan.Win32.Runner!O",
"Trojan.Runner.T",
"W32/Runner.A",
"Trojan.Runner.T",
"Trojan.Win32.Runner.s",
"Trojan.Runner.T",
"Trojan.Runner.T",
"Trojan.Win32.Runner",
"W32/Runner.A",
"Trojan/PSW.Almat.xs",
"Trojan:Win32/Runner.D",
"Troj.Dropper.W32.Small.kZ2V",
"Trojan.Win32.Runner.s",
"Trojan/Win32.Runner.C82211",
"Trojan.Runner.T",
"HEUR/QVM39.1.CC7B.Trojan.Win32.Runner"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.MSIL.FC.6901",
"Trojan.Zusy.D1C473",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win64.Miner.re",
"Trojan.Win32.Diztakun.dbjduc",
"Trojan.Win32.Z.Zusy.37376.CM",
"BehavesLike.Win32.PWSZbot.nm",
"Trojan.Win32.Diztakun",
"Trojan/Win64.Miner",
"TrojanSpy:MSIL/Logstel.A",
"Trojan.Win64.Miner.re",
"Trj/GdSda.A",
"Win64.Trojan.Miner.Dxwy",
"Win32/Trojan.Spy.8ab"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Hamaetot.A3",
"Trojan.Razy.D176F",
"BKDR_HAMAETOT.SM",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"BKDR_HAMAETOT.SM",
"Win.Trojan.Stainz-1",
"Trojan.DownLoader9.62446",
"BehavesLike.Win32.Trojan.mm",
"Backdoor/MSIL.vh",
"Trojan/Win32.MSILBot",
"Backdoor:MSIL/Hamaetot.A",
"Win32.Outbreak"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Small.eftzxb",
"TrojWare.MSIL.Tiny.HA",
"Trojan.PWS.Stealer.18264",
"Trojan.MSIL.Small",
"PWS:MSIL/OnLineGames.NW!bit"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"]",
"31",
"162.243.172",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"]",
"today",
"shop",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.90AF",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Packed.Win32.Katusha.o",
"Trojan.Win32.Waledac",
"Trojan.Heur.TDss.EF7F42",
"Packed.Win32.Katusha.o",
"BScope.Trojan.MTA.0795"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.VBKrypt!O",
"VBObfus.m",
"Trojan/VBKrypt.cyuv",
"Trojan.VBKrypt.55",
"Win32.Worm.Autorun.l",
"W32.Changeup",
"WORM_VOBFUS.SMHF",
"Win.Trojan.Changeup-6169544-0",
"Worm.Win32.WBNA.ipa",
"Trojan.Win32.WBNA.dxinid",
"Troj.PSW32.W.VB.lPYN",
"Win32.HLLW.Autoruner.49334",
"WORM_VOBFUS.SMHF",
"BehavesLike.Win32.VBObfus.dm",
"TR/VBKrypt.cyuv.30",
"Worm:Win32/Vbnoet.A",
"Trojan.Win32.A.VBKrypt.258048",
"Worm.Win32.WBNA.ipa",
"Trojan/Win32.VBKrypt.R5059",
"Trojan-Dropper.Krumkach.11521"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader.MSIL",
"Trojan.Win32.Z.Razy.20992.AYN",
"Troj.Downloader.Msil!c",
"Trojan.DownLoader25.50379",
"W32/Trojan.SKRD-4085",
"TrojanDownloader.MSIL.pxb",
"Trojan.Razy.D361CA",
"Backdoor:MSIL/Quasarat.A!bit",
"Trj/GdSda.A",
"Trojan.FOIG!tr",
"Win32/Trojan.116"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.MSIL",
"Ransom.FileCryptor",
"Troj.Ransom.Msil!c",
"Win32.Trojan.WisdomEyes.16070401.9500.9811",
"W32/Ransom.TAAZ-2840",
"Trojan.Win32.Ransom.ewmfpk",
"Trojan.Encoder.5035",
"BehavesLike.Win32.Trojan.pc",
"Trojan-Ransom.FileCoder",
"Trojan.MSIL.hyys",
"TR/Ransom.cgaxa",
"Trj/GdSda.A",
"Win32.Trojan.Raas.Auto",
"MSIL/Filecoder.AC!tr",
"Win32/Trojan.Ransom.568"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Moroever,",
"the",
"vawtrak",
"sample",
"we",
"got",
"downloads",
"a",
"new",
"memory",
"scraping",
"malware",
"that",
"scans",
"for",
"credit",
"card",
"data",
"in",
"memory."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
1,
9,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojanpws.Cosratu",
"TrojWare.MSIL.Cosratu.QOA",
"Trojan.PWS.Stealer.20141",
"TR/Downloader.aymho",
"PWS:MSIL/Cosratu.A!bit",
"Trj/GdSda.A",
"Trojan.Razy.D36F19",
"Trojan.MSIL.PSW",
"Win32/Trojan.480"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojannotifier.Phinot",
"Trojan/Phinot.120",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Backdoor.HHE",
"Backdoor.Trojan",
"Win32/Small.BX",
"TROJ_PHINOT.A",
"Trojan-Notifier.Win32.Phinot.120",
"Trojan.Win32.Phinot.hkgh",
"Trojan.Popon",
"Trojan.Phinot.Win32.1",
"Trojan.Win32.DNSChanger",
"W32/Backdoor.HEXL-8738",
"Trojan/Delf.Phinot.a",
"Trojan[Notifier]/Win32.Phinot",
"Win32.Troj.Phinot.12.kcloud",
"Trojan.Heur.GZ.E38D33",
"Troj.Notifier.W32.Phinot.120!c",
"Trojan-Notifier.Win32.Phinot.120",
"Win32.Trojan.Phinot.Wstw",
"Trojan.Phinot!Cq2wyKHab1w",
"W32/Phinot.120!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Evidence",
"suggests",
"that",
"the",
"tool",
"is",
"being",
"used",
"as",
"part",
"of",
"a",
"very",
"targeted",
"campaign,",
"focused",
"on",
"Chinese",
"nationals",
"in",
"commercial",
"organizations."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
4,
12,
16,
4,
12
] |
[
"Reports",
"emerged",
"just",
"over",
"a",
"week",
"ago",
"of",
"a",
"new",
"cyber-enabled",
"bank",
"heist",
"in",
"Asia."
] | [
16,
16,
16,
16,
0,
8,
8,
16,
16,
1,
9,
9,
9,
16,
2
] |
[
"These",
"attacks",
"are",
"highly",
"targeted,",
"appear",
"to",
"re-purpose",
"legitimate",
"content",
"in",
"decoy",
"documents,",
"and",
"had",
"very",
"low",
"antivirus",
"AV",
"detection",
"rates",
"at",
"the",
"time",
"they",
"were",
"deployed."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"As",
"for",
"the",
"Ashas",
"family",
",",
"one",
"of",
"the",
"associated",
"promotional",
"videos",
",",
"β",
"Head",
"Soccer",
"World",
"Champion",
"2018",
"β",
"Android",
",",
"ios",
"β",
"was",
"viewed",
"almost",
"three",
"million",
"times",
"and",
"two",
"others",
"reached",
"hundreds",
"of",
"thousands",
"of",
"views",
",",
"as",
"seen",
"in",
"Figure",
"11",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Hupigon.516096.L",
"Downloader.Small.11945",
"Win32.Trojan.WisdomEyes.16070401.9500.9812",
"Win32/Citeary.B",
"HV_DOWN.98AC8B50",
"Win.Trojan.Small-20870",
"Trojan-Dropper.Win32.Small.hms",
"Trojan.Win32.Small.dlprwb",
"Trojan.DownLoader3.7934",
"TrojanDropper.Small.fam",
"Trojan[Downloader]/Win32.Small",
"Trojan-Dropper.Win32.Small.hms",
"Win32/TrojanDownloader.Small.PJP",
"Win32.Trojan-dropper.Small.Taow",
"Trojan.DR.Small!DUb+rE11TVI",
"W32/Small.HMS!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"have",
"named",
"this",
"Ransomware",
"KeRanger.",
"The",
"only",
"previous",
"ransomware",
"for",
"OS",
"X",
"we",
"are",
"aware",
"of",
"is",
"FileCoder,",
"discovered",
"by",
"Kaspersky",
"Lab",
"in",
"2014."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
16,
3,
16,
5,
13,
16,
16,
16,
16,
16,
3,
16,
16,
4,
12,
16,
0
] |
[
"Each",
"instance",
"had",
"between",
"100,000",
"and",
"500,000",
"downloads",
"according",
"to",
"Google",
"Play",
"statistics",
",",
"reaching",
"an",
"aggregated",
"infection",
"rate",
"of",
"between",
"200,000",
"and",
"1",
"million",
"users",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.BhoSearcher.B",
"Trojan.BhoSearcher.B",
"Trojan.BhoSearcher.B",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TROJ_DURSG.A",
"Trojan.BhoSearcher.B",
"Trojan.BhoSearcher.B",
"Trojan.BhoSearcher.B",
"Trojan.BhoSearcher.10",
"TROJ_DURSG.A",
"BehavesLike.Win32.Injector.nt",
"Trojan-Downloader.Win32.ConHook",
"Trojan:Win32/Dursg.A",
"Trojan/Win32.ConHook.C286311",
"Trojan.Dursg!2KwSbji4syo"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.