tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.7E63",
"Trojan.Win32.Patched!O",
"Trojan.Patched.LI",
"Win32.Trojan.WisdomEyes.16070401.9500.9933",
"Troj.W32.Patched.lm1y",
"Virus.Win32.Loader.q",
"Trojan.Patched.Win32.43121",
"Possible_HackToolPatched.UNP",
"BehavesLike.Win32.NGVCK.dh",
"Win32/PatchFile.gc",
"TR/Patched.LI.1",
"HackTool:Win32/Patched.Y",
"Win-Trojan/Patched.4095",
"Trojan.Win32.Patched",
"W32/Patched.AW",
"Win32/Trojan.bc4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"link",
"resolves",
"to",
"a",
"URL",
"designed",
"to",
"appear",
"legitimate",
",",
"with",
"a",
"canonical",
"domain",
"of",
"sicher97140",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"It",
"is",
"under",
"constant",
"development,",
"with",
"several",
"updated",
"versions",
"appearing",
"since",
"the",
"original",
"samples",
"were",
"observed",
"in",
"June",
"2017."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
0,
8
] |
[
"FireEye",
"has",
"observed",
"Office",
"documents",
"exploiting",
"CVE-2017-0199",
"that",
"download",
"and",
"execute",
"malware",
"payloads",
"from",
"different",
"well-known",
"malware",
"families."
] | [
4,
16,
16,
16,
16,
7,
1,
16,
16,
16,
16,
3,
11,
16,
16,
16,
3,
11
] |
[
"Within",
"each",
"variant",
",",
"the",
"malicious",
"code",
"present",
"in",
"each",
"sample",
"may",
"look",
"nearly",
"identical",
"with",
"only",
"one",
"evasion",
"technique",
"changed",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom_Foreign.R002C0DKO17",
"W32/Trojan.ZJNJ-1589",
"Ransom_Foreign.R002C0DKO17",
"Trojan-Ransom.Win32.Foreign.nhnn",
"Trojan.Win32.Kovter.ehmnac",
"Trojan.ForeignCRTD.Win32.4896",
"W32/Trojan3.XSL",
"Trojan.Adware.a",
"TR/Crypt.ZPACK.gnual",
"Trojan[Ransom]/Win32.Foreign",
"Trojan-Ransom.Win32.Foreign.nhnn",
"Trojan/Win32.Foreign.C1610813",
"BScope.Trojan-Banker.Buhtrap",
"Trj/CI.A",
"Trojan.Foreign",
"Win32/TrojanDownloader.Small.ASE",
"Win32.Trojan.Foreign.Lknk",
"Trojan.Foreign!RxgoGgLK0WM",
"PUA.Adstantinko",
"W32/Small.ASE!tr",
"Win32/Trojan.f8a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Nuker.216576",
"Tool.WinNuke.Win32.3",
"Trojan/WinNuke.a",
"Exploit.Win32.Nuker-WinNuke.htmy",
"W32/TrojanX.ACD",
"Nuker.IE",
"Exploit.Win32.Nuker.WinNuke.a",
"Win32.Exploit.Nuker.bhro",
"TrojWare.Win32.Nuker.WinNuke",
"Nuke.WinNuke",
"W32/Trojan.GJZE-2894",
"Nuke/WinNuke.a",
"TR/WinNuke.A",
"Trojan[Exploit]/Win32.Nuker",
"Win32.Hack.WinNuke.a.kcloud",
"Trojan:Win16/WinNuke.A",
"Win-Trojan/Winnuke.216576",
"Nuker.WinNuke",
"Win32/Nuker.WinNuke",
"Nuker.Win32.WinNuke",
"W32/WinNuke.A!tr",
"Nuker.DL",
"Win32/Trojan.750"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Small",
"Trojan.Graftor.D1F62C",
"BKDR_ZIYANG.A",
"Backdoor.Trojan.B",
"BKDR_ZIYANG.A",
"Backdoor.Win32.Small.liq",
"Trojan.Win32.Small.cusdaj",
"Backdoor.W32.Small!c",
"Trojan[Backdoor]/Win32.Small",
"HackTool:Win32/Dlhs.B",
"Backdoor.Win32.Small.liq",
"Trj/Ziyang.A",
"Backdoor.Win32.Small",
"W32/BackDoor.A!tr",
"Win32/Backdoor.d0c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Uztuby.5",
"Script.Trojan.Malautoit.E",
"Trojan.Uztuby.5",
"Trojan.Uztuby.5",
"Trojan.Uztuby.5",
"W32/ObfusInjectBot.a",
"Zum.Ciusky.3",
"Trojan/Win32.Zbot.C311341",
"Trojan.Uztuby.5",
"W32/MalitRar.B!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Figure",
"9",
"shows",
"the",
"number",
"of",
"RuMMS",
"infections",
"recorded",
"in",
"the",
"last",
"four",
"months",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader.Small.xpm",
"TrojanDownloader:Win32/Sagnusnagta.A"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanAPT.Infostealer.H4",
"Win32.Trojan.WisdomEyes.16070401.9500.9983",
"Trojan.Win32.ke3chang.f",
"TrojWare.Win32.PSW.Delf.~JHN",
"Trojan.DownLoader9.45552",
"BehavesLike.Win32.BadFile.gz",
"Trojan.Win32.ke3chang.f",
"Trojan/Win32.Infostealer.R91040"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/AutoRun.dqkk",
"TROJ_SPNR.35CC13",
"Worm.Autorun-6695",
"Worm.Win32.AutoRun.eemt",
"Trojan.Win32.Cromptui.bbwocj",
"Worm.Win32.A.AutoRun.32768.Y[h]",
"PE:Worm.VBInjectEx!1.99E6[F1]",
"Trojan.DownLoader4.54145",
"TROJ_SPNR.35CC13",
"BehavesLike.Win32.Dropper.nm",
"W32/Trojan.MOJM-1187",
"Worm/AutoRun.aboz",
"TR/Spy.100048",
"Trojan.Heur.EF62DD",
"Trojan/Win32.HDC",
"TrojanDownloader:Win32/Kimiki.A",
"Worm.AutoRun",
"Win32.Worm.Autorun.Edef",
"Trojan-Downloader.Win32.Kimiki",
"Worm.Win32.AutoRun.eemt"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"one",
"case,",
"the",
"content",
"of",
"the",
"email",
"appeared",
"to",
"be",
"a",
"legitimate",
"email",
"conversation",
"between",
"several",
"employees,",
"even",
"containing",
"contact",
"details",
"of",
"employees",
"from",
"several",
"banks."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9
] |
[
"It",
"is",
"also",
"possible",
"that",
"this",
"functionality",
"is",
"under",
"development",
",",
"making",
"this",
"placeholder",
"code",
"incomplete",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.QueryexXM.Worm",
"HackTool.Wpakill",
"HackTool.WpaKill",
"W32/Risk.JBSX-2163",
"Trojan.ADH.2",
"Win.Trojan.Swrort-5988",
"Crack-WindowsWGA.a",
"HackTool.Win32.Wpakill",
"W32/MalwareF.XIWY",
"Trojan/Win32.Buzus",
"HackTool:MSIL/Wpakill.A",
"Crack-WindowsWGA.a",
"HackTool.Wpakill!EXR6p6S0Jr0"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"EventBot",
"Dropped",
"XML",
"configuration",
"files",
"Dropped",
"XML",
"configuration",
"files",
"on",
"the",
"device",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Xavier's",
"impact",
"has",
"been",
"widespread."
] | [
16,
16,
16,
16,
16
] |
[
"The",
"below",
"code",
"snippet",
"is",
"currently",
"isolated",
"and",
"dormant",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"the",
"wild",
",",
"these",
"are",
"only",
"distributed",
"as",
"a",
"direct",
"download",
"from",
"unofficial",
"Web",
"pages",
"(",
"“",
"third-party",
"”",
"app",
")",
"and",
"not",
"through",
"legitimate",
"app",
"stores",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"But",
"I",
"know",
"your",
"email",
"for",
"sure",
"it's",
"not",
"that",
"one."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm/W32.Raleka.14880.C",
"Worm.Raleka.e.n3",
"W32/Raleka.worm",
"Worm.Raleka.Win32.17",
"W32/Raleka.worm",
"Worm.Raleka!sd8qYJWRVVk",
"W32/Raleka.E",
"W32.HLLW.Raleka",
"Raleka.E",
"Win32/Raleka.D",
"Net-Worm.Win32.Raleka.e",
"Trojan.Win32.Raleka.enog",
"Worm.Win32.Raleka.H",
"BehavesLike.Win32.Downloader.lc",
"W32/Raleka.RXXM-3755",
"Worm/Raleka.k",
"Worm/Raleka.E.2",
"Worm[Net]/Win32.Raleka",
"Worm.Raleka.e.kcloud",
"Worm:Win32/Raleka.G",
"Trojan/Win32.Downloader",
"Worm.Raleka",
"W32/Kelar.B",
"Win32/Raleka.H",
"Win32.Worm-net.Raleka.Egog",
"Net-Worm.Win32.Raleka.e",
"W32/Raleka.B!worm",
"Worm/Raleka.D",
"Worm.Win32.Raleka.aTW"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Hoax.Win32.ArchSMS!O",
"Trojan/ArchSMS.hqni",
"TROJ_FAKEALERT_CD1031EC.RDXN",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win32/Tnega.BTJDDdC",
"TROJ_FAKEALERT_CD1031EC.RDXN",
"Trojan.Win32.SMSSend.bddqwl",
"Trojan.SMSSend.517",
"Tool.ArchSMS.Win32.277",
"Hoax.Win32.ArchSMS",
"Hoax.ArchSMS.mn",
"HackTool[Hoax]/Win32.ArchSMS",
"Win32.Troj.Hoax.kcloud",
"Trojan:Win32/Ninunarch.A",
"Trojan/Win32.ArchSMS.R68018",
"Hoax.ArchSMS.hq",
"Win32/Hoax.ArchSMS.JS",
"Trojan.ArchSMS!V0Eag+i949w"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Spora",
"got",
"some",
"hype",
"of",
"being",
"a",
"ransomware",
"that",
"can",
"encrypt",
"files",
"offline."
] | [
3,
16,
16,
16,
16,
16,
3,
11,
16,
16,
1,
9,
9
] |
[
"]",
"com",
"glancelove",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"We",
"believe",
"that",
"this",
"method",
"is",
"engineered",
"to",
"avoid",
"trivial",
"detection",
"of",
"process",
"injection",
"using",
"the",
"well-detected",
"CreateRemoteThread",
"or",
"ZwQueueApcThread",
"API",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
1,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan-Downloader.Win32.Sysdrop.lm",
"Trojan.Win32.Sysdrop.esnrws",
"Downloader.Sysdrop.Win32.33",
"TR/Zusy.ugkcf",
"Trojan.Zusy.D3C19C",
"Trojan-Downloader.Win32.Sysdrop.lm",
"Downloader/Win32.Sysdrop.C2035975",
"TrojanDownloader.Sysdrop",
"Trj/GdSda.A",
"Trojan.DL.Sysdrop!",
"Trojan-Downloader.Win32.Sysdrop"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Herein",
"we",
"release",
"our",
"analysis",
"of",
"a",
"previously",
"undocumented",
"backdoor",
"that",
"has",
"been",
"targetedagainst",
"embassies",
"and",
"consulates",
"around",
"the",
"world",
"leads",
"us",
"to",
"attribute",
"it,",
"with",
"high",
"confidence,to",
"the",
"Turla",
"group."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
4,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Tiny.S40745",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Trojan.Win32.Tiny.elmbme",
"MalCrypt.Indus!",
"BehavesLike.Win32.Backdoor.zz",
"TR/Tiny.lsfum",
"Trojan.Zusy.D32039",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Turla",
"is",
"a",
"notorious",
"group",
"that",
"has",
"been",
"targeting",
"governments,",
"government",
"officials",
"and",
"diplomats",
"for",
"years."
] | [
6,
16,
16,
16,
6,
15,
16,
16,
16,
4,
12,
12,
16,
4,
16,
0
] |
[
"TrendMicro",
"first",
"discovered",
"MalumPoS,",
"a",
"new",
"attack",
"tool",
"that",
"threat",
"actors",
"can",
"reconfigure",
"to",
"breach",
"any",
"PoS",
"system",
"they",
"wish",
"to",
"target."
] | [
4,
16,
16,
3,
16,
16,
3,
11,
16,
16,
16,
1,
9,
9,
9,
16,
5,
13,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Ransom.Win32.Seftad!O",
"Trojan.Seftad",
"Trojan.MBRlock.Win32.1",
"Trojan/Seftad.a",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"W32/Risk.HXYU-7341",
"Trojan.Bootlock",
"Win32/RansomSeftad.A",
"Trojan-Ransom.Win32.Seftad.a",
"Trojan.Win32.Seftad.bsiwp",
"Troj.Ransom.W32.Seftad.tn9Q",
"Trojan.MBRlock.1",
"Trojan-Ransom.Win32.Seftad",
"W32/MalwareF.RQPA",
"Trojan/Seftad.a",
"BOO/Seftad.A",
"Trojan[Ransom]/Win32.Seftad",
"Trojan:Win32/Seftad.A",
"Trojan-Ransom.Win32.Seftad.a",
"Trojan/Win32.Seftad.R111206",
"Trojan-Ransom.Seftad",
"Win32/MBRlock.A",
"Trojan.Seftad!+WmSfnLYKGo",
"W32/Seftad.A!tr",
"Trj/SeftadMBR.A.Crypt"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Unknown",
"threats",
"may",
"evade",
"signature-based",
"detection,",
"but",
"can",
"be",
"blocked",
"by",
"other",
"detection",
"tools",
"which",
"identify",
"malicious",
"behavior."
] | [
3,
11,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
3,
11
] |
[
"Regin",
"is",
"a",
"multi-purpose",
"data",
"collection",
"tool",
"which",
"dates",
"back",
"several",
"years."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clod4c3.Trojan.53a7",
"Win32.P2P.Mua.E@mm",
"Win32.P2P.Mua.E@mm",
"Worm.Mua.Win32.3",
"W32/Mua.e",
"Worm.P2P.Mua!6PD7raLqpvw",
"W32.HLLW.Mua",
"Win32/Mua.B",
"BKDR_BRABOT.B",
"P2P-Worm.Win32.Mua.e",
"Win32.P2P.Mua.E@mm",
"Trojan.Win32.Mua.hfob",
"Worm.Win32.A.P2P-Mua.15147",
"Win32.P2P.Mua.E@mm",
"Win32.P2P.Mua.E@mm",
"BKDR_BRABOT.B",
"BehavesLike.Win32.Sality.lh",
"W32/Risk.FPWU-1321",
"Worm[P2P]/Win32.Mua",
"Worm.Mua.e.kcloud",
"Worm:Win32/Mua.C",
"Win32.P2P.Mua.E@mm",
"Win32/Mua.worm.15152.C",
"Worm.Mua",
"Worm.Win32.Mua.AhDz",
"Win32/Mua.E",
"Win32.Worm-P2P.Mua.dopm",
"P2P-Worm.Win32.Mua.c",
"W32/Shower.L",
"Worm/Mua.E",
"Win32/Trojan.bfd"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"I",
"had",
"found",
"very",
"few",
"examples",
"of",
"non-targeted",
"malspam",
"using",
"this",
"RAT."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
3
] |
[
"\"",
"BLU",
"said",
"they",
"had",
"no",
"security",
"department",
"when",
"I",
"emailed",
"them",
"."
] | [
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"recently",
"spotted",
"Neutrino",
"being",
"used",
"to",
"deliver",
"a",
"zero-detection",
"Zeus",
"variant",
"and",
"are",
"sharing",
"some",
"brief",
"indicators",
"here."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
1,
16
] |
[
"Reaver",
"is",
"also",
"somewhat",
"unique",
"in",
"the",
"fact",
"that",
"its",
"final",
"payload",
"is",
"in",
"the",
"form",
"of",
"a",
"Control",
"panel",
"item,",
"or",
"CPL",
"file."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
1,
9
] |
[
"The",
"Turla",
"group",
"is",
"known",
"to",
"target",
"government,",
"military,",
"technology,",
"energy",
"and",
"commercial",
"organisations."
] | [
6,
14,
14,
16,
16,
16,
16,
4,
12,
12,
12,
16,
4,
12
] |
[
"This",
"report",
"aims",
"to",
"uncover",
"at",
"least",
"some",
"undertakings",
"of",
"that",
"group",
"and",
"to",
"connect",
"different",
"attacks",
"across",
"the",
"globe."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
15,
6,
16,
16,
16,
16,
1,
16,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Mauvaise.SL1",
"Adware.RuKomaCRTD.Win32.4797",
"PUP.LoadMoney/Variant",
"Trojan.Adware.Rukometa.Mikey.8",
"HT_RUKOMA_GA2700D5.UVPM",
"HT_RUKOMA_GA2700D5.UVPM",
"Trojan.Win32.Dwn.ehjpxo",
"Trojan.DownLoader22.51269",
"Trojan.Scar.hqw",
"Adware/Win32.Updater.C1575400",
"Adware.Zusy",
"PUA.RuKoma!",
"PUA.RuKoma"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"February",
"2016,",
"Check",
"Point",
"researchers",
"first",
"discovered",
"HummingBad,",
"a",
"malware",
"that",
"establishes",
"a",
"persistent",
"rootkit",
"on",
"Android",
"devices,",
"generates",
"fraudulent",
"ad",
"revenue,",
"and",
"installs",
"additional",
"fraudulent",
"apps."
] | [
16,
0,
8,
4,
12,
12,
16,
16,
3,
16,
3,
16,
16,
16,
16,
3,
16,
5,
13,
16,
16,
16,
16,
16,
1,
9,
9,
9
] |
[
"Unusual",
"domains",
",",
"the",
"use",
"of",
"URL",
"shorteners",
",",
"and",
"solicitations",
"that",
"do",
"not",
"come",
"from",
"verifiable",
"sources",
"are",
"also",
"red",
"flags",
"for",
"potential",
"phishing",
"and",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Winsecsrv",
"Trojan.Winsecsrv.Win64.325",
"Trojan.Win64.Winsecsrv",
"TR/Winsecsrv.imeno",
"Trojan:Win64/Winsecsrv.B!bit",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"The",
"C2",
"address",
",",
"as",
"stored",
"in",
"samples",
"we",
"’",
"ve",
"seen",
",",
"comprise",
"both",
"an",
"IP",
"address",
"and",
"port",
"number",
";",
"So",
"far",
",",
"all",
"the",
"samples",
"we",
"’",
"ve",
"tested",
"attempted",
"to",
"contact",
"an",
"IP",
"address",
"on",
"port",
"7878/tcp",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16
] |
[
"Fighting",
"organized",
"crime",
"in",
"your",
"phone",
"One",
"of",
"the",
"main",
"problems",
"with",
"Triada",
"is",
"that",
"it",
"can",
"potentially",
"hurt",
"a",
"LOT",
"of",
"people",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Yakes.303104",
"Trojan.Win32.Yakes!O",
"Ransom.Tobfy.S5080",
"Trojan.Yakes.Win32.7333",
"Trojan/Yakes.bitd",
"Trojan.Symmi.D1319B",
"Win32.Trojan.VB.kf",
"Trojan.Ransomlock.K",
"Ransom_TOBFY.SM",
"Win.Trojan.Yakes-628",
"Trojan.Win32.Yakes.bitd",
"Trojan.Win32.Yakes.cojazo",
"TrojWare.Win32.Injector.XFR",
"Ransom_TOBFY.SM",
"BehavesLike.Win32.PWSZbot.dt",
"Trojan/Yakes.kjh",
"Trojan/Win32.Yakes",
"Trojan.Win32.A.Yakes.303104.D",
"Trojan.Win32.Yakes.bitd",
"Trojan/Win32.VBKrypt.R40134",
"Trojan.Yakes",
"Trojan.Injector",
"Win32/VB.QMS",
"Trojan.Win32.Tobfy",
"W32/Injector.YWH!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"hosting",
"locations",
"seen",
"for",
"some",
"HenBox",
"samples",
",",
"together",
"with",
"the",
"nature",
"of",
"some",
"embedded",
"apps",
"including",
":",
"those",
"targeted",
"at",
"extremist",
"groups",
",",
"those",
"who",
"use",
"VPN",
"or",
"other",
"privacy-enabling",
"apps",
",",
"and",
"those",
"who",
"speak",
"the",
"Uyghur",
"language",
",",
"highlights",
"the",
"victim",
"profile",
"the",
"threat",
"actors",
"were",
"seeking",
"to",
"attack",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malicious",
"attachment,",
"which",
"offered",
"salacious",
"spoilers",
"and",
"video",
"clips,",
"attempted",
"to",
"install",
"a",
"9002",
"remote",
"access",
"Trojan",
"RAT",
"historically",
"used",
"by",
"state-sponsored",
"actors."
] | [
1,
9,
9,
16,
16,
16,
1,
16,
1,
9,
16,
16,
16,
3,
11,
11,
11,
11,
11,
16,
16,
16,
6,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Barys.DD949",
"Win32.Trojan.WisdomEyes.16070401.9500.9860",
"Trojan:Win32/Grenam.B!inf",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Malware.1",
"Trojan.Rootkit.GGA",
"Backdoor:W32/PcClient.ALE",
"BACKDOOR.Trojan",
"Backdoor:Win32/Xinia.C",
"Trojan.Rootkit.GGA",
"RootKit.Win32.Undef.ru",
"W32/Rootkit.A",
"SHeur.CPFS"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Hancitor",
"also",
"known",
"as",
"Tordal",
"and",
"Chanitor",
"and",
"Ruckguv",
"have",
"reappeared",
"in",
"campaigns",
"distributing",
"Pony",
"and",
"Vawtrak",
"with",
"significant",
"updates",
"and",
"increased",
"functionality."
] | [
3,
16,
16,
16,
3,
16,
3,
16,
3,
16,
16,
16,
6,
16,
3,
16,
3,
16,
16,
16,
16,
16,
16
] |
[
"This",
"time",
"resets",
"every",
"time",
"the",
"user",
"performs",
"some",
"activity",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Flooder.MSN.Chiller.A",
"Trojan/W32.Flooder.135168.E",
"Trojan.Flooder.MSN.Chiller.A",
"Tool.Chiller.Win32.1",
"Trojan.Flooder.MSN.Chiller.A",
"Flooder.Chiller!cPnYwu6r4qI",
"Win32/Flooder.MSN.Chiller.10",
"TROJ_MSN.CHILLER",
"IM-Flooder.Win32.Chiller",
"Trojan.Win32.Chiller.ddka",
"IM-Flooder.W32.Chiller!c",
"Trojan.Flooder.MSN.Chiller.A",
"TrojWare.Win32.Flooder.MSN.10",
"Trojan.Flooder.MSN.Chiller.A",
"FDOS.Children",
"TROJ_MSN.CHILLER",
"W32/Risk.BSWW-2789",
"Flooder.MSN.Chiller",
"HackTool[Flooder]/Win32.Chiller",
"Trojan.Flooder.MSN.Chiller.A",
"IMFlooder.Chiller",
"Flooder.MSN.Chiller",
"IM-Flooder.Win32.Chiller",
"Trojan.Flooder.MSN.Chiller.A",
"Flooder.AZF",
"Trojan.Win32.IMFlooder.aa",
"Win32/Trojan.Flooder.cc8"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"VB:Trojan.VBA.Downloader.R",
"VB:Trojan.VBA.Downloader.R",
"VBA.Trojan.Obfuscated.at",
"VBA/Obfuscated.P",
"Doc.Macro.Obfuscation-6360615-0",
"VB:Trojan.VBA.Downloader.R",
"VB:Trojan.VBA.Downloader.R",
"Trojan.Script.MLW.ehjqnz",
"VB:Trojan.VBA.Downloader.R",
"VB:Trojan.VBA.Downloader.R",
"W97M/Downloader.bkw",
"HEUR.VBA.Trojan.e",
"TrojanDownloader:O97M/Shelmock.A!dha",
"W97M/Downloader.bkw",
"Trojan.VBA.Obfuscated",
"heur.macro.powershell.x"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"relatively",
"new",
"technique",
"makes",
"it",
"difficult",
"to",
"detect",
"the",
"malware—especially",
"on",
"behavior-based",
"malware",
"detection",
"systems."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Mehm.B",
"Trojan/W32.CGIScan.333312",
"Aplicacion/CGIScan.40",
"Trojan.Mehm.B",
"Trojan.Cgiscan!ODpuR5Z5bgo",
"W32/HackTool.CNH",
"Hacktool.Flooder",
"Win.Trojan.Cgiscan",
"not-a-virus:NetTool.Win32.CGIScan.40",
"Riskware.Win32.CGIScan.byaea",
"NetTool.CGIScan.333312[h]",
"Trojan.Mehm.B",
"Trojan.Mehm.B",
"Trojan.DownLoader.9414",
"Tool.CGIScan.Win32.1",
"W32/Tool.MGCU-4799",
"TR/Mehm.B",
"W32/Cgiscan.A!tr",
"Trojan.Mehm.B",
"Win-Trojan/Mehm.333312",
"Trojan:Win32/Cgiscan.A",
"Trojan.Mehm.B",
"Hacktool.Win32.CGIScan.40",
"Win32.Trojan.Spnr.Wqmq",
"not-a-virus:NetTool.Win32.CGIScan",
"Trojan.Mehm.B",
"HackTool/CgiScan.A",
"Win32/Virus.NetTool.902"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"will",
"refer",
"to",
"the",
"gang",
"behind",
"the",
"malware",
"as",
"TeleBots."
] | [
16,
16,
16,
16,
16,
6,
16,
16,
3,
16,
6
] |
[
"They",
"then",
"distribute",
"the",
"trojanized",
"application",
"using",
"their",
"own,",
"Russian-language-targeted",
"Android",
"Application",
"sites."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
16,
1,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojanpws.Qqpass.20916",
"Trojan.Adware.Graftor.D9426",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Infostealer.Onlinegame",
"TSPY_ONLINEG.JW",
"Win.Spyware.28080-1",
"Trojan-GameThief.Win32.OnLineGames.akyyi",
"Trojan.Win32.Nilage.bstxe",
"Trojan.PWS.Gamania.8978",
"TSPY_ONLINEG.JW",
"BehavesLike.Win32.RAHack.dc",
"Trojan/PSW.OnLineGames.xyc",
"Trojan[GameThief]/Win32.WOW.gic",
"Trojan:Win32/Ordpea.A",
"Trojan-GameThief.Win32.OnLineGames.akyyi",
"MalwareScope.Trojan-PSW.Game.7",
"Trj/Lineage.HKT",
"Trojan.Win32.OnlineGames.pjf",
"Trojan.PWS.OnlineGames.GFA",
"Trojan-GameThief.Win32.OnLineGames"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"observed",
"several",
"high-volume",
"FormBook",
"malware",
"distribution",
"campaigns",
"primarily",
"taking",
"aim",
"at",
"Aerospace,",
"Defense",
"Contractor,",
"and",
"Manufacturing",
"sectors",
"within",
"the",
"U.S.",
"and",
"South",
"Korea",
"during",
"the",
"past",
"few",
"months."
] | [
16,
16,
16,
16,
3,
11,
6,
14,
16,
16,
16,
16,
4,
12,
12,
16,
4,
12,
16,
2,
10,
16,
2,
10,
16,
0,
8,
8,
8
] |
[
"If",
"the",
"privileges",
"are",
"revoked",
"successfully",
",",
"the",
"Trojan",
"relaunches",
"the",
"cycle",
"of",
"requesting",
"administrator",
"privileges",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojanspy.Coinsteal",
"TROJ_GE.0352184D",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TROJ_GE.0352184D",
"Trojan.MSIL.PSW",
"TrojanSpy:MSIL/CoinSteal.B!bit",
"Spyware/Win32.Quasar.C2001029",
"Trojan.FakeMS",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"database",
"contained",
"the",
"last",
"activity",
"performed",
"on",
"around",
"60",
"compromised",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"post",
"opens",
"the",
"lock",
"up",
"and",
"takes",
"a",
"look",
"inside."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"With",
"email",
"subject",
"lines",
"such",
"as,",
"bank",
"account",
"record",
"annual",
"report",
"and",
"company",
"database",
"we",
"believe",
"that",
"attackers",
"are",
"possibly",
"targeting",
"companies."
] | [
16,
1,
9,
9,
9,
9,
9,
9,
9,
1,
9,
16,
1,
9,
16,
16,
16,
6,
16,
16,
16,
4
] |
[
"It",
"shows",
"a",
"web",
"phishing",
"page",
"whenever",
"the",
"affected",
"device",
"receives",
"a",
"broadcast",
"event",
"(",
"i.e.",
",",
"if",
"a",
"new",
"package",
"is",
"installed",
"or",
"if",
"the",
"device",
"’",
"s",
"screen",
"is",
"on",
")",
"to",
"steal",
"personal",
"data",
",",
"such",
"as",
"those",
"keyed",
"in",
"for",
"banking",
"apps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Gary",
"Warners's",
"blog",
"also",
"reported",
"on",
"this",
"and",
"similar",
"campaigns,",
"indicating",
"that",
"a",
"well-known",
"botnet,",
"Kelihos,",
"is",
"responsible",
"for",
"distributing",
"this",
"spam."
] | [
4,
12,
12,
16,
16,
16,
16,
16,
16,
6,
16,
15,
16,
16,
3,
11,
16,
16,
16,
16,
16,
1
] |
[
"However,",
"not",
"to",
"be",
"out",
"done,",
"APT",
"attackers",
"have",
"also",
"started",
"leveraging",
"the",
"exploit",
"in",
"targeted",
"spear",
"phishing",
"attacks",
"as",
"well."
] | [
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
3,
16,
16,
1,
9,
9,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.1490",
"Trojan.Heur.RP.E99DCA",
"WORM_FLYSTUDI.B",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"WORM_FLYSTUDI.B",
"Win.Worm.FlyStudio-34",
"Trojan.MulDrop6.9267",
"Trojan.Black.Win32.8293",
"BehavesLike.Win32.Autorun.vc",
"TrojanDropper.Flystud",
"Win32.Trojan.Ecode.Wwel",
"Trojan.Win32.FlyStudio"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"For",
"now",
",",
"the",
"best",
"protection",
"is",
"to",
"avoid",
"any",
"APK",
"attachments",
"that",
"arrive",
"on",
"mobile",
"phones",
"via",
"e-mail",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"n",
"the",
"past,",
"we",
"have",
"seen",
"such",
"occurrences",
"with",
"Magecart",
"threat",
"actors",
"for",
"example",
"in",
"the",
"breach",
"of",
"the",
"Umbro",
"website."
] | [
16,
16,
0,
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
1,
16,
1,
9,
9
] |
[
"]",
"132:28833",
"61",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Maesorn!O",
"Trojan/Maesorn.g",
"Backdoor.Graybird",
"Win.Trojan.OnlineGames-1999",
"Trojan.Win32.Maesorn.innuf",
"Trojan.Win32.A.Maesorn.563216[ASPack]",
"Trojan.PWS.Panda.980",
"BehavesLike.Win32.MultiPlug.hc",
"Trojan/Maesorn.a",
"TR/Maesorn.psa",
"Trojan/Win32.Unknown",
"Trojan.Maesorn.1",
"Trojan:Win32/Maesorn.A",
"Trojan/Win32.Maesorn.C288249",
"TScope.Malware-Cryptor.SB",
"Win32.Trojan.Maesorn.Lmax",
"Trojan.Maesorn!i+tWu8HStQI",
"Win32/Trojan.227"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"WE",
"WILL",
"UNLOCK",
"THE",
"MOBILE",
"DEVICE",
"AND",
"DELETE",
"ALL",
"YOUR",
"DATA",
"FROM",
"OUR",
"SERVER",
"!",
"TURNING",
"OFF",
"YOUR",
"PHONE",
"IS",
"MEANINGLESS",
",",
"ALL",
"YOUR",
"DATA",
"IS",
"ALREADY",
"STORED",
"ON",
"OUR",
"SERVERS",
"!",
"WE",
"STILL",
"CAN",
"SELLING",
"IT",
"FOR",
"SPAM",
",",
"FAKE",
",",
"BANK",
"CRIME",
"etc…",
"We",
"collect",
"and",
"download",
"all",
"of",
"your",
"personal",
"data",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"information",
"is",
"written",
"into",
"a",
"file",
"on",
"the",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Geography",
"of",
"Rotexy",
"attacks",
"According",
"to",
"our",
"data",
",",
"98",
"%",
"of",
"all",
"Rotexy",
"attacks",
"target",
"users",
"in",
"Russia",
"."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16
] |
[
"Unlike",
"most",
"ransomware,",
"SamSam",
"is",
"not",
"launched",
"via",
"user",
"focused",
"attack",
"vectors,",
"such",
"as",
"phishing",
"campaigns",
"and",
"exploit",
"kits."
] | [
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
7,
15,
16,
16,
6,
14,
16,
3,
11
] |
[
"In",
"the",
"injected",
"payload",
",",
"the",
"module",
"implements",
"the",
"method",
"‘",
"callActivityOnCreate",
"’",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"April",
"2017,",
"in",
"collaboration",
"with",
"Clearsky,",
"Palo",
"Alto",
"Networks",
"Unit",
"42",
"published",
"an",
"article",
"about",
"our",
"research",
"into",
"targeted",
"attacks",
"in",
"the",
"Middle",
"East."
] | [
16,
0,
8,
16,
16,
16,
4,
4,
12,
12,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
2,
10,
10
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.85E5",
"Downloader.Small.Win32.16916",
"Trojan/Downloader.Small.eqn",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Win32/Matcash.AQ",
"TROJ_DLOADER.KGM",
"Win.Downloader.12076-1",
"Trojan-Downloader.Win32.Small.eqn",
"Trojan.Win32.Small.pnkq",
"Trojan.Win32.Downloader.9806",
"TrojWare.Win32.TrojanDownloader.Small.AP",
"Trojan.DownLoader.26881",
"TROJ_DLOADER.KGM",
"BehavesLike.Win32.Backdoor.zh",
"TrojanDownloader.Small.cgx",
"Trojan[Downloader]/Win32.Small",
"TrojanDownloader:Win32/Matcash.A",
"Trojan/Win32.Downloader.R162197",
"Trj/Downloader.PNC",
"Win32.Trojan-downloader.Small.Agut",
"Trojan.DL.Small!SbF3EFAX1gY",
"Trojan-Downloader.Win32.Small"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"com",
"hxxp",
":",
"//www",
"[",
"."
] | [
9,
9,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.3D2A",
"Trojan.Razy.DF5C4",
"Win32.Trojan.WisdomEyes.16070401.9500.9773",
"not-a-virus:RiskTool.Win32.Gamehack.zae",
"Trojan.PWS.Banker1.20175",
"Trojan.Win32.PSW",
"W32/Trojan.WGYB-0329",
"RiskTool.Gamehack.iw",
"TR/Taranis.2867",
"not-a-virus:RiskTool.Win32.Gamehack.zae",
"MalwareScope.Trojan-PSW.Game.16",
"Riskware.Gamehack!",
"Win32/Trojan.fe9"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"However,",
"minimal",
"code",
"change",
"to",
"Ploutus-D",
"would",
"greatly",
"expand",
"its",
"ATM",
"vendor",
"targets",
"since",
"Kalignite",
"Platform",
"runs",
"on",
"40",
"different",
"ATM",
"vendors",
"in",
"80",
"countries."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
4,
12,
16,
16,
5,
13,
16,
16,
16,
16,
5,
13,
16,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Troj.Dropper.Msil!c",
"Trojan.Zusy.D3F4E2",
"Win32.Trojan.WisdomEyes.16070401.9500.9901",
"Trojan.Coinbitminer",
"TROJ_COINMINER_HA220058.UVPM",
"Trojan.DownLoader25.65376",
"Trojan.CoinMiner.Win32.6726",
"TROJ_COINMINER_HA220058.UVPM",
"Trojan:MSIL/CoinMiner.KA!bit",
"Trojan/Win32.Tiggre.R218036",
"Misc.Riskware.BitCoinMiner",
"Trj/GdSda.A",
"Trojan.MinerBot",
"Win32/Trojan.Dropper.bc3"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader.Jiwerks.A8",
"Trojan/Downloader.Delf.quc",
"Trojan.Graftor.D451A",
"Trojan.Win32.Dwn.wpldc",
"Win32.Worm.Qqshare.crbf",
"TrojWare.Win32.TrojanDownloader.Delf.QUC",
"Trojan.DownLoader6.2772",
"Trojan-Ransom.Win32.Foreign",
"Trojan/Win32.Unknown",
"TrojanDownloader:Win32/Jiwerks.C",
"Trojan/Win32.Banload.R28382",
"Trojan.DL.Delf!amQyVfM1aVU"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"action",
"registers",
"code",
"components",
"to",
"get",
"notified",
"when",
"certain",
"system",
"events",
"happen",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"During",
"this",
"time",
"it",
"has",
"managed",
"to",
"avoid",
"scrutiny",
"by",
"the",
"security",
"community."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12
] |
[
"In",
"separate",
"isolated",
"incidents,we",
"also",
"noticed",
"the",
"deployment",
"of",
"MajikPOS",
"via",
"PsExec,",
"a",
"command-line",
"tool",
"that",
"can",
"be",
"used",
"to",
"remotely",
"execute",
"processes",
"on",
"other",
"systems."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
16,
3,
11,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
5
] |
[
"The",
"attacks",
"point",
"to",
"extensive",
"knowledge",
"of",
"the",
"targets'",
"activities,",
"and",
"share",
"infrastructure",
"and",
"tactics",
"with",
"campaigns",
"previously",
"linked",
"to",
"Iranian",
"threat",
"actors."
] | [
16,
1,
16,
16,
16,
16,
16,
16,
4,
12,
16,
5,
13,
16,
16,
16,
6,
16,
16,
16,
6,
14,
14
] |
[
"A",
"big",
"chunk",
"of",
"data",
"is",
"extracted",
"from",
"the",
"portable",
"executable",
"(",
"PE",
")",
"file",
"itself",
"and",
"decrypted",
"two",
"times",
"using",
"a",
"custom",
"XOR",
"algorithm",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"have",
"observed",
"this",
"team",
"utilizing",
".cim",
"and",
".bcl",
"files",
"as",
"attack",
"vectors,",
"both",
"of",
"which",
"file",
"types",
"are",
"used",
"by",
"the",
"CIMPLICITY",
"software."
] | [
16,
16,
16,
16,
6,
16,
1,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dynamer.FC.1842",
"W32/Msil.AOXS-4373",
"TSPY_HPCUBESTLR.SM",
"Win.Packed.Confuser-6042561-0",
"not-a-virus:PSWTool.Win32.MessengerPass.n",
"Trojan.Win32.Stealer.emdjaa",
"Troj.W32.Jorik.Shakblades.lBRs",
"Packed:MSIL/SmartIL.A",
"Trojan.PWS.Stealer.13008",
"TSPY_HPCUBESTLR.SM",
"BehavesLike.Win32.CryptDoma.fc",
"HackTool.Win32.BrowserPassview",
"W32/Msil.O",
"TrojanSpy.MSIL.ewm",
"Win32.Troj.Undef.kcloud",
"Trj/CI.A",
"Win32/Trojan.cb4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.G.Door.C",
"Backdoor/W32.GDoor.334848",
"Backdoor.G.Door.C",
"BKDR_DOOR.LG",
"W32/Backdoor2.DZPI",
"Backdoor.Trojan",
"BKDR_DOOR.LG",
"Win.Trojan.GGDoor-4",
"Backdoor.G.Door.C",
"Backdoor.Win32.G_Door.c",
"Backdoor.G.Door.C",
"Trojan.Win32.GDoor.beknpm",
"Backdoor.Win32.G_Door.334848",
"Backdoor.W32.G_Door.c!c",
"Backdoor.G.Door.C",
"Backdoor.G.Door.C",
"Trojan.MulDrop.141",
"BehavesLike.Win32.Trojan.fc",
"Backdoor/G_Door.c",
"Backdoor.Win32.G_Door.C",
"W32/Backdoor.VMMA-7325",
"Backdoor/G_Door.c",
"BDS/G_door.C.17",
"Trojan[Backdoor]/Win32.G_Door",
"Backdoor:Win32/G_Door.C",
"Backdoor.Win32.G_Door.c",
"Backdoor.G.Door.C",
"Backdoor.G_Door",
"Bck/Ggdoor.I",
"Win32/G_Door.C",
"Win32.Backdoor.G_door.Svhk",
"Backdoor.G_Door!JC6xcbYSKHg",
"Win32/Backdoor.b76"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"original",
"version",
"of",
"Nokoyawa",
"ransomware",
"was",
"introduced",
"in",
"February",
"2022",
"and",
"written",
"in",
"the",
"C",
"programming",
"language."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
16,
0,
8,
16,
16,
16,
5,
13,
13,
13
] |
[
"It",
"also",
"disables",
"Play",
"Protect",
"(",
"Google",
"’",
"s",
"preinstalled",
"antivirus",
"solution",
")",
"to",
"prevent",
"its",
"discovery",
"and",
"deletion",
"in",
"the",
"future",
"."
] | [
16,
16,
16,
5,
13,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Heur.FU.EF8E10",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"W32/Risk.CCTW-9250",
"Trojan.Win32.Jascript.cvmxnk",
"Dropper.Jascript.Win32.59",
"Trojan-Ransom.Win32.Gimemo",
"W32/MalwareF.OGBH",
"TrojanDropper.Jascript.ao",
"TR/Drop.Jascript.bbo",
"Trojan:Win32/Thetatic.A",
"Dropper/Win32.Xema.C95872",
"Win32.Trojan-dropper.Jascript.Syrq",
"Trojan.DR.Jascript!LiiZWXoHPPQ",
"W32/Jascript.BBO!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.DebrisB.Worm",
"Trojan/W32.Csyr.3584.C",
"Worm.Win32.Debris!O",
"W32/Csyr.A!Eldorado",
"Win32/Tnega.FeZbcZD",
"WORM_GAMARUE.SMB",
"Win.Adware.Downware-239",
"Worm.Win32.Debris.p",
"Trojan.Win32.Drop.brprwz",
"Worm.Win32.Bundpil.T",
"Trojan.MulDrop4.25343",
"WORM_GAMARUE.SMB",
"BehavesLike.Win32.Worm.zz",
"W32/Csyr.A!Eldorado",
"Trojan/Csyr.a",
"TR/Zusy.358421",
"Trojan/Win32.Csyr",
"Trojan.Zusy.DA717",
"Worm.Gamarue",
"Worm.Win32.Debris.p",
"Trojan:Win32/Topini.A",
"Worm/Win32.Bundpil.R63957",
"Worm.Gamarue",
"Trj/Zbot.M",
"Trojan.Win32.Csyr.A",
"W32/Bundpil.T!worm",
"Worm.Win32.Gamarue.E"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Payload",
"deployment",
"Once",
"the",
"static",
"block",
"execution",
"is",
"complete",
",",
"the",
"Android",
"Lifecycle",
"callback",
"transfers",
"the",
"control",
"to",
"the",
"OnCreate",
"method",
"of",
"the",
"main",
"class",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.