tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.7E63", "Trojan.Win32.Patched!O", "Trojan.Patched.LI", "Win32.Trojan.WisdomEyes.16070401.9500.9933", "Troj.W32.Patched.lm1y", "Virus.Win32.Loader.q", "Trojan.Patched.Win32.43121", "Possible_HackToolPatched.UNP", "BehavesLike.Win32.NGVCK.dh", "Win32/PatchFile.gc", "TR/Patched.LI.1", "HackTool:Win32/Patched.Y", "Win-Trojan/Patched.4095", "Trojan.Win32.Patched", "W32/Patched.AW", "Win32/Trojan.bc4" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "link", "resolves", "to", "a", "URL", "designed", "to", "appear", "legitimate", ",", "with", "a", "canonical", "domain", "of", "sicher97140", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "It", "is", "under", "constant", "development,", "with", "several", "updated", "versions", "appearing", "since", "the", "original", "samples", "were", "observed", "in", "June", "2017." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 0, 8 ]
[ "FireEye", "has", "observed", "Office", "documents", "exploiting", "CVE-2017-0199", "that", "download", "and", "execute", "malware", "payloads", "from", "different", "well-known", "malware", "families." ]
[ 4, 16, 16, 16, 16, 7, 1, 16, 16, 16, 16, 3, 11, 16, 16, 16, 3, 11 ]
[ "Within", "each", "variant", ",", "the", "malicious", "code", "present", "in", "each", "sample", "may", "look", "nearly", "identical", "with", "only", "one", "evasion", "technique", "changed", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom_Foreign.R002C0DKO17", "W32/Trojan.ZJNJ-1589", "Ransom_Foreign.R002C0DKO17", "Trojan-Ransom.Win32.Foreign.nhnn", "Trojan.Win32.Kovter.ehmnac", "Trojan.ForeignCRTD.Win32.4896", "W32/Trojan3.XSL", "Trojan.Adware.a", "TR/Crypt.ZPACK.gnual", "Trojan[Ransom]/Win32.Foreign", "Trojan-Ransom.Win32.Foreign.nhnn", "Trojan/Win32.Foreign.C1610813", "BScope.Trojan-Banker.Buhtrap", "Trj/CI.A", "Trojan.Foreign", "Win32/TrojanDownloader.Small.ASE", "Win32.Trojan.Foreign.Lknk", "Trojan.Foreign!RxgoGgLK0WM", "PUA.Adstantinko", "W32/Small.ASE!tr", "Win32/Trojan.f8a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Nuker.216576", "Tool.WinNuke.Win32.3", "Trojan/WinNuke.a", "Exploit.Win32.Nuker-WinNuke.htmy", "W32/TrojanX.ACD", "Nuker.IE", "Exploit.Win32.Nuker.WinNuke.a", "Win32.Exploit.Nuker.bhro", "TrojWare.Win32.Nuker.WinNuke", "Nuke.WinNuke", "W32/Trojan.GJZE-2894", "Nuke/WinNuke.a", "TR/WinNuke.A", "Trojan[Exploit]/Win32.Nuker", "Win32.Hack.WinNuke.a.kcloud", "Trojan:Win16/WinNuke.A", "Win-Trojan/Winnuke.216576", "Nuker.WinNuke", "Win32/Nuker.WinNuke", "Nuker.Win32.WinNuke", "W32/WinNuke.A!tr", "Nuker.DL", "Win32/Trojan.750" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Small", "Trojan.Graftor.D1F62C", "BKDR_ZIYANG.A", "Backdoor.Trojan.B", "BKDR_ZIYANG.A", "Backdoor.Win32.Small.liq", "Trojan.Win32.Small.cusdaj", "Backdoor.W32.Small!c", "Trojan[Backdoor]/Win32.Small", "HackTool:Win32/Dlhs.B", "Backdoor.Win32.Small.liq", "Trj/Ziyang.A", "Backdoor.Win32.Small", "W32/BackDoor.A!tr", "Win32/Backdoor.d0c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Uztuby.5", "Script.Trojan.Malautoit.E", "Trojan.Uztuby.5", "Trojan.Uztuby.5", "Trojan.Uztuby.5", "W32/ObfusInjectBot.a", "Zum.Ciusky.3", "Trojan/Win32.Zbot.C311341", "Trojan.Uztuby.5", "W32/MalitRar.B!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Figure", "9", "shows", "the", "number", "of", "RuMMS", "infections", "recorded", "in", "the", "last", "four", "months", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader.Small.xpm", "TrojanDownloader:Win32/Sagnusnagta.A" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanAPT.Infostealer.H4", "Win32.Trojan.WisdomEyes.16070401.9500.9983", "Trojan.Win32.ke3chang.f", "TrojWare.Win32.PSW.Delf.~JHN", "Trojan.DownLoader9.45552", "BehavesLike.Win32.BadFile.gz", "Trojan.Win32.ke3chang.f", "Trojan/Win32.Infostealer.R91040" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32/AutoRun.dqkk", "TROJ_SPNR.35CC13", "Worm.Autorun-6695", "Worm.Win32.AutoRun.eemt", "Trojan.Win32.Cromptui.bbwocj", "Worm.Win32.A.AutoRun.32768.Y[h]", "PE:Worm.VBInjectEx!1.99E6[F1]", "Trojan.DownLoader4.54145", "TROJ_SPNR.35CC13", "BehavesLike.Win32.Dropper.nm", "W32/Trojan.MOJM-1187", "Worm/AutoRun.aboz", "TR/Spy.100048", "Trojan.Heur.EF62DD", "Trojan/Win32.HDC", "TrojanDownloader:Win32/Kimiki.A", "Worm.AutoRun", "Win32.Worm.Autorun.Edef", "Trojan-Downloader.Win32.Kimiki", "Worm.Win32.AutoRun.eemt" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "one", "case,", "the", "content", "of", "the", "email", "appeared", "to", "be", "a", "legitimate", "email", "conversation", "between", "several", "employees,", "even", "containing", "contact", "details", "of", "employees", "from", "several", "banks." ]
[ 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9 ]
[ "It", "is", "also", "possible", "that", "this", "functionality", "is", "under", "development", ",", "making", "this", "placeholder", "code", "incomplete", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.QueryexXM.Worm", "HackTool.Wpakill", "HackTool.WpaKill", "W32/Risk.JBSX-2163", "Trojan.ADH.2", "Win.Trojan.Swrort-5988", "Crack-WindowsWGA.a", "HackTool.Win32.Wpakill", "W32/MalwareF.XIWY", "Trojan/Win32.Buzus", "HackTool:MSIL/Wpakill.A", "Crack-WindowsWGA.a", "HackTool.Wpakill!EXR6p6S0Jr0" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "EventBot", "Dropped", "XML", "configuration", "files", "Dropped", "XML", "configuration", "files", "on", "the", "device", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Xavier's", "impact", "has", "been", "widespread." ]
[ 16, 16, 16, 16, 16 ]
[ "The", "below", "code", "snippet", "is", "currently", "isolated", "and", "dormant", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "the", "wild", ",", "these", "are", "only", "distributed", "as", "a", "direct", "download", "from", "unofficial", "Web", "pages", "(", "“", "third-party", "”", "app", ")", "and", "not", "through", "legitimate", "app", "stores", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "But", "I", "know", "your", "email", "for", "sure", "it's", "not", "that", "one." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Worm/W32.Raleka.14880.C", "Worm.Raleka.e.n3", "W32/Raleka.worm", "Worm.Raleka.Win32.17", "W32/Raleka.worm", "Worm.Raleka!sd8qYJWRVVk", "W32/Raleka.E", "W32.HLLW.Raleka", "Raleka.E", "Win32/Raleka.D", "Net-Worm.Win32.Raleka.e", "Trojan.Win32.Raleka.enog", "Worm.Win32.Raleka.H", "BehavesLike.Win32.Downloader.lc", "W32/Raleka.RXXM-3755", "Worm/Raleka.k", "Worm/Raleka.E.2", "Worm[Net]/Win32.Raleka", "Worm.Raleka.e.kcloud", "Worm:Win32/Raleka.G", "Trojan/Win32.Downloader", "Worm.Raleka", "W32/Kelar.B", "Win32/Raleka.H", "Win32.Worm-net.Raleka.Egog", "Net-Worm.Win32.Raleka.e", "W32/Raleka.B!worm", "Worm/Raleka.D", "Worm.Win32.Raleka.aTW" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Hoax.Win32.ArchSMS!O", "Trojan/ArchSMS.hqni", "TROJ_FAKEALERT_CD1031EC.RDXN", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win32/Tnega.BTJDDdC", "TROJ_FAKEALERT_CD1031EC.RDXN", "Trojan.Win32.SMSSend.bddqwl", "Trojan.SMSSend.517", "Tool.ArchSMS.Win32.277", "Hoax.Win32.ArchSMS", "Hoax.ArchSMS.mn", "HackTool[Hoax]/Win32.ArchSMS", "Win32.Troj.Hoax.kcloud", "Trojan:Win32/Ninunarch.A", "Trojan/Win32.ArchSMS.R68018", "Hoax.ArchSMS.hq", "Win32/Hoax.ArchSMS.JS", "Trojan.ArchSMS!V0Eag+i949w" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Spora", "got", "some", "hype", "of", "being", "a", "ransomware", "that", "can", "encrypt", "files", "offline." ]
[ 3, 16, 16, 16, 16, 16, 3, 11, 16, 16, 1, 9, 9 ]
[ "]", "com", "glancelove", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "We", "believe", "that", "this", "method", "is", "engineered", "to", "avoid", "trivial", "detection", "of", "process", "injection", "using", "the", "well-detected", "CreateRemoteThread", "or", "ZwQueueApcThread", "API", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 1, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan-Downloader.Win32.Sysdrop.lm", "Trojan.Win32.Sysdrop.esnrws", "Downloader.Sysdrop.Win32.33", "TR/Zusy.ugkcf", "Trojan.Zusy.D3C19C", "Trojan-Downloader.Win32.Sysdrop.lm", "Downloader/Win32.Sysdrop.C2035975", "TrojanDownloader.Sysdrop", "Trj/GdSda.A", "Trojan.DL.Sysdrop!", "Trojan-Downloader.Win32.Sysdrop" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Herein", "we", "release", "our", "analysis", "of", "a", "previously", "undocumented", "backdoor", "that", "has", "been", "targetedagainst", "embassies", "and", "consulates", "around", "the", "world", "leads", "us", "to", "attribute", "it,", "with", "high", "confidence,to", "the", "Turla", "group." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 4, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Tiny.S40745", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Trojan.Win32.Tiny.elmbme", "MalCrypt.Indus!", "BehavesLike.Win32.Backdoor.zz", "TR/Tiny.lsfum", "Trojan.Zusy.D32039", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Turla", "is", "a", "notorious", "group", "that", "has", "been", "targeting", "governments,", "government", "officials", "and", "diplomats", "for", "years." ]
[ 6, 16, 16, 16, 6, 15, 16, 16, 16, 4, 12, 12, 16, 4, 16, 0 ]
[ "TrendMicro", "first", "discovered", "MalumPoS,", "a", "new", "attack", "tool", "that", "threat", "actors", "can", "reconfigure", "to", "breach", "any", "PoS", "system", "they", "wish", "to", "target." ]
[ 4, 16, 16, 3, 16, 16, 3, 11, 16, 16, 16, 1, 9, 9, 9, 16, 5, 13, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Ransom.Win32.Seftad!O", "Trojan.Seftad", "Trojan.MBRlock.Win32.1", "Trojan/Seftad.a", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "W32/Risk.HXYU-7341", "Trojan.Bootlock", "Win32/RansomSeftad.A", "Trojan-Ransom.Win32.Seftad.a", "Trojan.Win32.Seftad.bsiwp", "Troj.Ransom.W32.Seftad.tn9Q", "Trojan.MBRlock.1", "Trojan-Ransom.Win32.Seftad", "W32/MalwareF.RQPA", "Trojan/Seftad.a", "BOO/Seftad.A", "Trojan[Ransom]/Win32.Seftad", "Trojan:Win32/Seftad.A", "Trojan-Ransom.Win32.Seftad.a", "Trojan/Win32.Seftad.R111206", "Trojan-Ransom.Seftad", "Win32/MBRlock.A", "Trojan.Seftad!+WmSfnLYKGo", "W32/Seftad.A!tr", "Trj/SeftadMBR.A.Crypt" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Unknown", "threats", "may", "evade", "signature-based", "detection,", "but", "can", "be", "blocked", "by", "other", "detection", "tools", "which", "identify", "malicious", "behavior." ]
[ 3, 11, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 3, 11 ]
[ "Regin", "is", "a", "multi-purpose", "data", "collection", "tool", "which", "dates", "back", "several", "years." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clod4c3.Trojan.53a7", "Win32.P2P.Mua.E@mm", "Win32.P2P.Mua.E@mm", "Worm.Mua.Win32.3", "W32/Mua.e", "Worm.P2P.Mua!6PD7raLqpvw", "W32.HLLW.Mua", "Win32/Mua.B", "BKDR_BRABOT.B", "P2P-Worm.Win32.Mua.e", "Win32.P2P.Mua.E@mm", "Trojan.Win32.Mua.hfob", "Worm.Win32.A.P2P-Mua.15147", "Win32.P2P.Mua.E@mm", "Win32.P2P.Mua.E@mm", "BKDR_BRABOT.B", "BehavesLike.Win32.Sality.lh", "W32/Risk.FPWU-1321", "Worm[P2P]/Win32.Mua", "Worm.Mua.e.kcloud", "Worm:Win32/Mua.C", "Win32.P2P.Mua.E@mm", "Win32/Mua.worm.15152.C", "Worm.Mua", "Worm.Win32.Mua.AhDz", "Win32/Mua.E", "Win32.Worm-P2P.Mua.dopm", "P2P-Worm.Win32.Mua.c", "W32/Shower.L", "Worm/Mua.E", "Win32/Trojan.bfd" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "I", "had", "found", "very", "few", "examples", "of", "non-targeted", "malspam", "using", "this", "RAT." ]
[ 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 3 ]
[ "\"", "BLU", "said", "they", "had", "no", "security", "department", "when", "I", "emailed", "them", "." ]
[ 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "recently", "spotted", "Neutrino", "being", "used", "to", "deliver", "a", "zero-detection", "Zeus", "variant", "and", "are", "sharing", "some", "brief", "indicators", "here." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 1, 16 ]
[ "Reaver", "is", "also", "somewhat", "unique", "in", "the", "fact", "that", "its", "final", "payload", "is", "in", "the", "form", "of", "a", "Control", "panel", "item,", "or", "CPL", "file." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 1, 9 ]
[ "The", "Turla", "group", "is", "known", "to", "target", "government,", "military,", "technology,", "energy", "and", "commercial", "organisations." ]
[ 6, 14, 14, 16, 16, 16, 16, 4, 12, 12, 12, 16, 4, 12 ]
[ "This", "report", "aims", "to", "uncover", "at", "least", "some", "undertakings", "of", "that", "group", "and", "to", "connect", "different", "attacks", "across", "the", "globe." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 15, 6, 16, 16, 16, 16, 1, 16, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Mauvaise.SL1", "Adware.RuKomaCRTD.Win32.4797", "PUP.LoadMoney/Variant", "Trojan.Adware.Rukometa.Mikey.8", "HT_RUKOMA_GA2700D5.UVPM", "HT_RUKOMA_GA2700D5.UVPM", "Trojan.Win32.Dwn.ehjpxo", "Trojan.DownLoader22.51269", "Trojan.Scar.hqw", "Adware/Win32.Updater.C1575400", "Adware.Zusy", "PUA.RuKoma!", "PUA.RuKoma" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "February", "2016,", "Check", "Point", "researchers", "first", "discovered", "HummingBad,", "a", "malware", "that", "establishes", "a", "persistent", "rootkit", "on", "Android", "devices,", "generates", "fraudulent", "ad", "revenue,", "and", "installs", "additional", "fraudulent", "apps." ]
[ 16, 0, 8, 4, 12, 12, 16, 16, 3, 16, 3, 16, 16, 16, 16, 3, 16, 5, 13, 16, 16, 16, 16, 16, 1, 9, 9, 9 ]
[ "Unusual", "domains", ",", "the", "use", "of", "URL", "shorteners", ",", "and", "solicitations", "that", "do", "not", "come", "from", "verifiable", "sources", "are", "also", "red", "flags", "for", "potential", "phishing", "and", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Winsecsrv", "Trojan.Winsecsrv.Win64.325", "Trojan.Win64.Winsecsrv", "TR/Winsecsrv.imeno", "Trojan:Win64/Winsecsrv.B!bit", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "The", "C2", "address", ",", "as", "stored", "in", "samples", "we", "’", "ve", "seen", ",", "comprise", "both", "an", "IP", "address", "and", "port", "number", ";", "So", "far", ",", "all", "the", "samples", "we", "’", "ve", "tested", "attempted", "to", "contact", "an", "IP", "address", "on", "port", "7878/tcp", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16 ]
[ "Fighting", "organized", "crime", "in", "your", "phone", "One", "of", "the", "main", "problems", "with", "Triada", "is", "that", "it", "can", "potentially", "hurt", "a", "LOT", "of", "people", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Yakes.303104", "Trojan.Win32.Yakes!O", "Ransom.Tobfy.S5080", "Trojan.Yakes.Win32.7333", "Trojan/Yakes.bitd", "Trojan.Symmi.D1319B", "Win32.Trojan.VB.kf", "Trojan.Ransomlock.K", "Ransom_TOBFY.SM", "Win.Trojan.Yakes-628", "Trojan.Win32.Yakes.bitd", "Trojan.Win32.Yakes.cojazo", "TrojWare.Win32.Injector.XFR", "Ransom_TOBFY.SM", "BehavesLike.Win32.PWSZbot.dt", "Trojan/Yakes.kjh", "Trojan/Win32.Yakes", "Trojan.Win32.A.Yakes.303104.D", "Trojan.Win32.Yakes.bitd", "Trojan/Win32.VBKrypt.R40134", "Trojan.Yakes", "Trojan.Injector", "Win32/VB.QMS", "Trojan.Win32.Tobfy", "W32/Injector.YWH!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "hosting", "locations", "seen", "for", "some", "HenBox", "samples", ",", "together", "with", "the", "nature", "of", "some", "embedded", "apps", "including", ":", "those", "targeted", "at", "extremist", "groups", ",", "those", "who", "use", "VPN", "or", "other", "privacy-enabling", "apps", ",", "and", "those", "who", "speak", "the", "Uyghur", "language", ",", "highlights", "the", "victim", "profile", "the", "threat", "actors", "were", "seeking", "to", "attack", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malicious", "attachment,", "which", "offered", "salacious", "spoilers", "and", "video", "clips,", "attempted", "to", "install", "a", "9002", "remote", "access", "Trojan", "RAT", "historically", "used", "by", "state-sponsored", "actors." ]
[ 1, 9, 9, 16, 16, 16, 1, 16, 1, 9, 16, 16, 16, 3, 11, 11, 11, 11, 11, 16, 16, 16, 6, 14 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Barys.DD949", "Win32.Trojan.WisdomEyes.16070401.9500.9860", "Trojan:Win32/Grenam.B!inf", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Malware.1", "Trojan.Rootkit.GGA", "Backdoor:W32/PcClient.ALE", "BACKDOOR.Trojan", "Backdoor:Win32/Xinia.C", "Trojan.Rootkit.GGA", "RootKit.Win32.Undef.ru", "W32/Rootkit.A", "SHeur.CPFS" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Hancitor", "also", "known", "as", "Tordal", "and", "Chanitor", "and", "Ruckguv", "have", "reappeared", "in", "campaigns", "distributing", "Pony", "and", "Vawtrak", "with", "significant", "updates", "and", "increased", "functionality." ]
[ 3, 16, 16, 16, 3, 16, 3, 16, 3, 16, 16, 16, 6, 16, 3, 16, 3, 16, 16, 16, 16, 16, 16 ]
[ "This", "time", "resets", "every", "time", "the", "user", "performs", "some", "activity", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Flooder.MSN.Chiller.A", "Trojan/W32.Flooder.135168.E", "Trojan.Flooder.MSN.Chiller.A", "Tool.Chiller.Win32.1", "Trojan.Flooder.MSN.Chiller.A", "Flooder.Chiller!cPnYwu6r4qI", "Win32/Flooder.MSN.Chiller.10", "TROJ_MSN.CHILLER", "IM-Flooder.Win32.Chiller", "Trojan.Win32.Chiller.ddka", "IM-Flooder.W32.Chiller!c", "Trojan.Flooder.MSN.Chiller.A", "TrojWare.Win32.Flooder.MSN.10", "Trojan.Flooder.MSN.Chiller.A", "FDOS.Children", "TROJ_MSN.CHILLER", "W32/Risk.BSWW-2789", "Flooder.MSN.Chiller", "HackTool[Flooder]/Win32.Chiller", "Trojan.Flooder.MSN.Chiller.A", "IMFlooder.Chiller", "Flooder.MSN.Chiller", "IM-Flooder.Win32.Chiller", "Trojan.Flooder.MSN.Chiller.A", "Flooder.AZF", "Trojan.Win32.IMFlooder.aa", "Win32/Trojan.Flooder.cc8" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "VB:Trojan.VBA.Downloader.R", "VB:Trojan.VBA.Downloader.R", "VBA.Trojan.Obfuscated.at", "VBA/Obfuscated.P", "Doc.Macro.Obfuscation-6360615-0", "VB:Trojan.VBA.Downloader.R", "VB:Trojan.VBA.Downloader.R", "Trojan.Script.MLW.ehjqnz", "VB:Trojan.VBA.Downloader.R", "VB:Trojan.VBA.Downloader.R", "W97M/Downloader.bkw", "HEUR.VBA.Trojan.e", "TrojanDownloader:O97M/Shelmock.A!dha", "W97M/Downloader.bkw", "Trojan.VBA.Obfuscated", "heur.macro.powershell.x" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "relatively", "new", "technique", "makes", "it", "difficult", "to", "detect", "the", "malware—especially", "on", "behavior-based", "malware", "detection", "systems." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Mehm.B", "Trojan/W32.CGIScan.333312", "Aplicacion/CGIScan.40", "Trojan.Mehm.B", "Trojan.Cgiscan!ODpuR5Z5bgo", "W32/HackTool.CNH", "Hacktool.Flooder", "Win.Trojan.Cgiscan", "not-a-virus:NetTool.Win32.CGIScan.40", "Riskware.Win32.CGIScan.byaea", "NetTool.CGIScan.333312[h]", "Trojan.Mehm.B", "Trojan.Mehm.B", "Trojan.DownLoader.9414", "Tool.CGIScan.Win32.1", "W32/Tool.MGCU-4799", "TR/Mehm.B", "W32/Cgiscan.A!tr", "Trojan.Mehm.B", "Win-Trojan/Mehm.333312", "Trojan:Win32/Cgiscan.A", "Trojan.Mehm.B", "Hacktool.Win32.CGIScan.40", "Win32.Trojan.Spnr.Wqmq", "not-a-virus:NetTool.Win32.CGIScan", "Trojan.Mehm.B", "HackTool/CgiScan.A", "Win32/Virus.NetTool.902" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "will", "refer", "to", "the", "gang", "behind", "the", "malware", "as", "TeleBots." ]
[ 16, 16, 16, 16, 16, 6, 16, 16, 3, 16, 6 ]
[ "They", "then", "distribute", "the", "trojanized", "application", "using", "their", "own,", "Russian-language-targeted", "Android", "Application", "sites." ]
[ 16, 16, 16, 16, 3, 11, 16, 16, 16, 1, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojanpws.Qqpass.20916", "Trojan.Adware.Graftor.D9426", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Infostealer.Onlinegame", "TSPY_ONLINEG.JW", "Win.Spyware.28080-1", "Trojan-GameThief.Win32.OnLineGames.akyyi", "Trojan.Win32.Nilage.bstxe", "Trojan.PWS.Gamania.8978", "TSPY_ONLINEG.JW", "BehavesLike.Win32.RAHack.dc", "Trojan/PSW.OnLineGames.xyc", "Trojan[GameThief]/Win32.WOW.gic", "Trojan:Win32/Ordpea.A", "Trojan-GameThief.Win32.OnLineGames.akyyi", "MalwareScope.Trojan-PSW.Game.7", "Trj/Lineage.HKT", "Trojan.Win32.OnlineGames.pjf", "Trojan.PWS.OnlineGames.GFA", "Trojan-GameThief.Win32.OnLineGames" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "observed", "several", "high-volume", "FormBook", "malware", "distribution", "campaigns", "primarily", "taking", "aim", "at", "Aerospace,", "Defense", "Contractor,", "and", "Manufacturing", "sectors", "within", "the", "U.S.", "and", "South", "Korea", "during", "the", "past", "few", "months." ]
[ 16, 16, 16, 16, 3, 11, 6, 14, 16, 16, 16, 16, 4, 12, 12, 16, 4, 12, 16, 2, 10, 16, 2, 10, 16, 0, 8, 8, 8 ]
[ "If", "the", "privileges", "are", "revoked", "successfully", ",", "the", "Trojan", "relaunches", "the", "cycle", "of", "requesting", "administrator", "privileges", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojanspy.Coinsteal", "TROJ_GE.0352184D", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "TROJ_GE.0352184D", "Trojan.MSIL.PSW", "TrojanSpy:MSIL/CoinSteal.B!bit", "Spyware/Win32.Quasar.C2001029", "Trojan.FakeMS", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "database", "contained", "the", "last", "activity", "performed", "on", "around", "60", "compromised", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "post", "opens", "the", "lock", "up", "and", "takes", "a", "look", "inside." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "With", "email", "subject", "lines", "such", "as,", "bank", "account", "record", "annual", "report", "and", "company", "database", "we", "believe", "that", "attackers", "are", "possibly", "targeting", "companies." ]
[ 16, 1, 9, 9, 9, 9, 9, 9, 9, 1, 9, 16, 1, 9, 16, 16, 16, 6, 16, 16, 16, 4 ]
[ "It", "shows", "a", "web", "phishing", "page", "whenever", "the", "affected", "device", "receives", "a", "broadcast", "event", "(", "i.e.", ",", "if", "a", "new", "package", "is", "installed", "or", "if", "the", "device", "’", "s", "screen", "is", "on", ")", "to", "steal", "personal", "data", ",", "such", "as", "those", "keyed", "in", "for", "banking", "apps", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Gary", "Warners's", "blog", "also", "reported", "on", "this", "and", "similar", "campaigns,", "indicating", "that", "a", "well-known", "botnet,", "Kelihos,", "is", "responsible", "for", "distributing", "this", "spam." ]
[ 4, 12, 12, 16, 16, 16, 16, 16, 16, 6, 16, 15, 16, 16, 3, 11, 16, 16, 16, 16, 16, 1 ]
[ "However,", "not", "to", "be", "out", "done,", "APT", "attackers", "have", "also", "started", "leveraging", "the", "exploit", "in", "targeted", "spear", "phishing", "attacks", "as", "well." ]
[ 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 3, 16, 16, 1, 9, 9, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.1490", "Trojan.Heur.RP.E99DCA", "WORM_FLYSTUDI.B", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "WORM_FLYSTUDI.B", "Win.Worm.FlyStudio-34", "Trojan.MulDrop6.9267", "Trojan.Black.Win32.8293", "BehavesLike.Win32.Autorun.vc", "TrojanDropper.Flystud", "Win32.Trojan.Ecode.Wwel", "Trojan.Win32.FlyStudio" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "For", "now", ",", "the", "best", "protection", "is", "to", "avoid", "any", "APK", "attachments", "that", "arrive", "on", "mobile", "phones", "via", "e-mail", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "n", "the", "past,", "we", "have", "seen", "such", "occurrences", "with", "Magecart", "threat", "actors", "for", "example", "in", "the", "breach", "of", "the", "Umbro", "website." ]
[ 16, 16, 0, 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 1, 16, 1, 9, 9 ]
[ "]", "132:28833", "61", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Maesorn!O", "Trojan/Maesorn.g", "Backdoor.Graybird", "Win.Trojan.OnlineGames-1999", "Trojan.Win32.Maesorn.innuf", "Trojan.Win32.A.Maesorn.563216[ASPack]", "Trojan.PWS.Panda.980", "BehavesLike.Win32.MultiPlug.hc", "Trojan/Maesorn.a", "TR/Maesorn.psa", "Trojan/Win32.Unknown", "Trojan.Maesorn.1", "Trojan:Win32/Maesorn.A", "Trojan/Win32.Maesorn.C288249", "TScope.Malware-Cryptor.SB", "Win32.Trojan.Maesorn.Lmax", "Trojan.Maesorn!i+tWu8HStQI", "Win32/Trojan.227" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "WE", "WILL", "UNLOCK", "THE", "MOBILE", "DEVICE", "AND", "DELETE", "ALL", "YOUR", "DATA", "FROM", "OUR", "SERVER", "!", "TURNING", "OFF", "YOUR", "PHONE", "IS", "MEANINGLESS", ",", "ALL", "YOUR", "DATA", "IS", "ALREADY", "STORED", "ON", "OUR", "SERVERS", "!", "WE", "STILL", "CAN", "SELLING", "IT", "FOR", "SPAM", ",", "FAKE", ",", "BANK", "CRIME", "etc…", "We", "collect", "and", "download", "all", "of", "your", "personal", "data", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "information", "is", "written", "into", "a", "file", "on", "the", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Geography", "of", "Rotexy", "attacks", "According", "to", "our", "data", ",", "98", "%", "of", "all", "Rotexy", "attacks", "target", "users", "in", "Russia", "." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16 ]
[ "Unlike", "most", "ransomware,", "SamSam", "is", "not", "launched", "via", "user", "focused", "attack", "vectors,", "such", "as", "phishing", "campaigns", "and", "exploit", "kits." ]
[ 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 7, 15, 16, 16, 6, 14, 16, 3, 11 ]
[ "In", "the", "injected", "payload", ",", "the", "module", "implements", "the", "method", "‘", "callActivityOnCreate", "’", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "April", "2017,", "in", "collaboration", "with", "Clearsky,", "Palo", "Alto", "Networks", "Unit", "42", "published", "an", "article", "about", "our", "research", "into", "targeted", "attacks", "in", "the", "Middle", "East." ]
[ 16, 0, 8, 16, 16, 16, 4, 4, 12, 12, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 2, 10, 10 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.85E5", "Downloader.Small.Win32.16916", "Trojan/Downloader.Small.eqn", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Win32/Matcash.AQ", "TROJ_DLOADER.KGM", "Win.Downloader.12076-1", "Trojan-Downloader.Win32.Small.eqn", "Trojan.Win32.Small.pnkq", "Trojan.Win32.Downloader.9806", "TrojWare.Win32.TrojanDownloader.Small.AP", "Trojan.DownLoader.26881", "TROJ_DLOADER.KGM", "BehavesLike.Win32.Backdoor.zh", "TrojanDownloader.Small.cgx", "Trojan[Downloader]/Win32.Small", "TrojanDownloader:Win32/Matcash.A", "Trojan/Win32.Downloader.R162197", "Trj/Downloader.PNC", "Win32.Trojan-downloader.Small.Agut", "Trojan.DL.Small!SbF3EFAX1gY", "Trojan-Downloader.Win32.Small" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "com", "hxxp", ":", "//www", "[", "." ]
[ 9, 9, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.3D2A", "Trojan.Razy.DF5C4", "Win32.Trojan.WisdomEyes.16070401.9500.9773", "not-a-virus:RiskTool.Win32.Gamehack.zae", "Trojan.PWS.Banker1.20175", "Trojan.Win32.PSW", "W32/Trojan.WGYB-0329", "RiskTool.Gamehack.iw", "TR/Taranis.2867", "not-a-virus:RiskTool.Win32.Gamehack.zae", "MalwareScope.Trojan-PSW.Game.16", "Riskware.Gamehack!", "Win32/Trojan.fe9" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "However,", "minimal", "code", "change", "to", "Ploutus-D", "would", "greatly", "expand", "its", "ATM", "vendor", "targets", "since", "Kalignite", "Platform", "runs", "on", "40", "different", "ATM", "vendors", "in", "80", "countries." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 4, 12, 16, 16, 5, 13, 16, 16, 16, 16, 5, 13, 16, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "Troj.Dropper.Msil!c", "Trojan.Zusy.D3F4E2", "Win32.Trojan.WisdomEyes.16070401.9500.9901", "Trojan.Coinbitminer", "TROJ_COINMINER_HA220058.UVPM", "Trojan.DownLoader25.65376", "Trojan.CoinMiner.Win32.6726", "TROJ_COINMINER_HA220058.UVPM", "Trojan:MSIL/CoinMiner.KA!bit", "Trojan/Win32.Tiggre.R218036", "Misc.Riskware.BitCoinMiner", "Trj/GdSda.A", "Trojan.MinerBot", "Win32/Trojan.Dropper.bc3" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader.Jiwerks.A8", "Trojan/Downloader.Delf.quc", "Trojan.Graftor.D451A", "Trojan.Win32.Dwn.wpldc", "Win32.Worm.Qqshare.crbf", "TrojWare.Win32.TrojanDownloader.Delf.QUC", "Trojan.DownLoader6.2772", "Trojan-Ransom.Win32.Foreign", "Trojan/Win32.Unknown", "TrojanDownloader:Win32/Jiwerks.C", "Trojan/Win32.Banload.R28382", "Trojan.DL.Delf!amQyVfM1aVU" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "action", "registers", "code", "components", "to", "get", "notified", "when", "certain", "system", "events", "happen", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "During", "this", "time", "it", "has", "managed", "to", "avoid", "scrutiny", "by", "the", "security", "community." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12 ]
[ "In", "separate", "isolated", "incidents,we", "also", "noticed", "the", "deployment", "of", "MajikPOS", "via", "PsExec,", "a", "command-line", "tool", "that", "can", "be", "used", "to", "remotely", "execute", "processes", "on", "other", "systems." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 3, 16, 3, 11, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 5 ]
[ "The", "attacks", "point", "to", "extensive", "knowledge", "of", "the", "targets'", "activities,", "and", "share", "infrastructure", "and", "tactics", "with", "campaigns", "previously", "linked", "to", "Iranian", "threat", "actors." ]
[ 16, 1, 16, 16, 16, 16, 16, 16, 4, 12, 16, 5, 13, 16, 16, 16, 6, 16, 16, 16, 6, 14, 14 ]
[ "A", "big", "chunk", "of", "data", "is", "extracted", "from", "the", "portable", "executable", "(", "PE", ")", "file", "itself", "and", "decrypted", "two", "times", "using", "a", "custom", "XOR", "algorithm", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "have", "observed", "this", "team", "utilizing", ".cim", "and", ".bcl", "files", "as", "attack", "vectors,", "both", "of", "which", "file", "types", "are", "used", "by", "the", "CIMPLICITY", "software." ]
[ 16, 16, 16, 16, 6, 16, 1, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dynamer.FC.1842", "W32/Msil.AOXS-4373", "TSPY_HPCUBESTLR.SM", "Win.Packed.Confuser-6042561-0", "not-a-virus:PSWTool.Win32.MessengerPass.n", "Trojan.Win32.Stealer.emdjaa", "Troj.W32.Jorik.Shakblades.lBRs", "Packed:MSIL/SmartIL.A", "Trojan.PWS.Stealer.13008", "TSPY_HPCUBESTLR.SM", "BehavesLike.Win32.CryptDoma.fc", "HackTool.Win32.BrowserPassview", "W32/Msil.O", "TrojanSpy.MSIL.ewm", "Win32.Troj.Undef.kcloud", "Trj/CI.A", "Win32/Trojan.cb4" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.G.Door.C", "Backdoor/W32.GDoor.334848", "Backdoor.G.Door.C", "BKDR_DOOR.LG", "W32/Backdoor2.DZPI", "Backdoor.Trojan", "BKDR_DOOR.LG", "Win.Trojan.GGDoor-4", "Backdoor.G.Door.C", "Backdoor.Win32.G_Door.c", "Backdoor.G.Door.C", "Trojan.Win32.GDoor.beknpm", "Backdoor.Win32.G_Door.334848", "Backdoor.W32.G_Door.c!c", "Backdoor.G.Door.C", "Backdoor.G.Door.C", "Trojan.MulDrop.141", "BehavesLike.Win32.Trojan.fc", "Backdoor/G_Door.c", "Backdoor.Win32.G_Door.C", "W32/Backdoor.VMMA-7325", "Backdoor/G_Door.c", "BDS/G_door.C.17", "Trojan[Backdoor]/Win32.G_Door", "Backdoor:Win32/G_Door.C", "Backdoor.Win32.G_Door.c", "Backdoor.G.Door.C", "Backdoor.G_Door", "Bck/Ggdoor.I", "Win32/G_Door.C", "Win32.Backdoor.G_door.Svhk", "Backdoor.G_Door!JC6xcbYSKHg", "Win32/Backdoor.b76" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "original", "version", "of", "Nokoyawa", "ransomware", "was", "introduced", "in", "February", "2022", "and", "written", "in", "the", "C", "programming", "language." ]
[ 16, 16, 16, 16, 3, 11, 16, 16, 16, 0, 8, 16, 16, 16, 5, 13, 13, 13 ]
[ "It", "also", "disables", "Play", "Protect", "(", "Google", "’", "s", "preinstalled", "antivirus", "solution", ")", "to", "prevent", "its", "discovery", "and", "deletion", "in", "the", "future", "." ]
[ 16, 16, 16, 5, 13, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Heur.FU.EF8E10", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "W32/Risk.CCTW-9250", "Trojan.Win32.Jascript.cvmxnk", "Dropper.Jascript.Win32.59", "Trojan-Ransom.Win32.Gimemo", "W32/MalwareF.OGBH", "TrojanDropper.Jascript.ao", "TR/Drop.Jascript.bbo", "Trojan:Win32/Thetatic.A", "Dropper/Win32.Xema.C95872", "Win32.Trojan-dropper.Jascript.Syrq", "Trojan.DR.Jascript!LiiZWXoHPPQ", "W32/Jascript.BBO!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.DebrisB.Worm", "Trojan/W32.Csyr.3584.C", "Worm.Win32.Debris!O", "W32/Csyr.A!Eldorado", "Win32/Tnega.FeZbcZD", "WORM_GAMARUE.SMB", "Win.Adware.Downware-239", "Worm.Win32.Debris.p", "Trojan.Win32.Drop.brprwz", "Worm.Win32.Bundpil.T", "Trojan.MulDrop4.25343", "WORM_GAMARUE.SMB", "BehavesLike.Win32.Worm.zz", "W32/Csyr.A!Eldorado", "Trojan/Csyr.a", "TR/Zusy.358421", "Trojan/Win32.Csyr", "Trojan.Zusy.DA717", "Worm.Gamarue", "Worm.Win32.Debris.p", "Trojan:Win32/Topini.A", "Worm/Win32.Bundpil.R63957", "Worm.Gamarue", "Trj/Zbot.M", "Trojan.Win32.Csyr.A", "W32/Bundpil.T!worm", "Worm.Win32.Gamarue.E" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Payload", "deployment", "Once", "the", "static", "block", "execution", "is", "complete", ",", "the", "Android", "Lifecycle", "callback", "transfers", "the", "control", "to", "the", "OnCreate", "method", "of", "the", "main", "class", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]