tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"RemoteAdmin.Win32.eSurveiller!O",
"Trojan.VB.Win32.68501",
"Trojan/VB.nqz",
"TSPY_ESURVEILLER_DC07000D.UVPA",
"Spyware.ESurveiller",
"TSPY_ESURVEILLER_DC07000D.UVPA",
"Win.Trojan.Infostealer-5",
"Backdoor.Win32.VB.ppb",
"Trojan.Win32.Dwn.ssuio",
"Trojan.Win32.VB.1452000",
"Troj.Infostealer.lDrj",
"Trojan.DownLoader1.64229",
"not-a-virus:RemoteAdmin.Win32.eSurveiller",
"Trojan.Strictor.D2473",
"Backdoor.Win32.VB.ppb",
"Unwanted/Win32.Radmin.R25253",
"Backdoor.VB",
"Trj/CI.A",
"Trojan.Infostealer",
"Win32.Backdoor.Vb.Lnns",
"Trojan.DownLoader!"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Infrastructure",
"FTP",
"server",
"The",
"attackers",
"used",
"ftp",
":",
"//213.174.157",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Delf.Inject.Z",
"Trojan-Dropper.Win32.Mudrop!O",
"Hacktool.Passview",
"Trojan.Delf.Inject.Z",
"Trojan/Dropper.Mudrop.ew",
"TROJ_DROPPER.HVW",
"Win32.Worm.AutoRun.ij",
"W32/Risk.BDUN-6545",
"TROJ_DROPPER.HVW",
"Win.Trojan.Delf-3744",
"Trojan.Delf.Inject.Z",
"Trojan-Dropper.Win32.Mudrop.ew",
"Trojan.Delf.Inject.Z",
"Trojan.Win32.Mudrop.crqisw",
"Trojan.Win32.MulDrop.1431634",
"Trojan.Delf.Inject.Z",
"TrojWare.Win32.TrojanDropper.Mudrop.~RA",
"Trojan.Delf.Inject.Z",
"Trojan.MulDrop.12722",
"Dropper.Mudrop.Win32.77",
"BehavesLike.Win32.PUP.tc",
"W32/Dropper.GWJ",
"TrojanDropper.Mudrop.fy",
"TR/Spy.Ftput.C",
"Trojan[PSW]/Win32.LdPinch",
"Trojan.Delf.Inject.Z",
"Trojan-Dropper.Win32.Mudrop.ew",
"PWS:Win32/Sounli.A",
"Dropper/Win32.Mudrop.C138252",
"TrojanPSW.Pinch",
"Trojan.PWS.LdPinch!Csxdj/6mZgk",
"Trojan-Dropper.Win32.Mudrop"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"RedLine",
"Stealer's",
"evasive",
"spear-phishing",
"campaign",
"targets",
"the",
"hospitality",
"industry."
] | [
6,
14,
16,
6,
14,
16,
4,
12,
12
] |
[
"Web",
"application",
"vulnerabilities",
"are",
"like",
"doorways:",
"you",
"never",
"know",
"who",
"or",
"what",
"will",
"walk",
"through."
] | [
7,
15,
15,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Threat",
"actors",
"with",
"strategic",
"interest",
"in",
"the",
"affairs",
"of",
"other",
"governments",
"and",
"civil",
"society",
"organizations",
"have",
"been",
"launching",
"targeted",
"exploitation",
"campaigns",
"for",
"years."
] | [
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
4,
12,
12,
16,
16,
16,
16,
6,
14,
16,
0
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9984",
"TR/AD.Corinrat.sejyy",
"Trojan.Application.MSILPerseus.D535",
"Ransom:MSIL/PentagonRat.A",
"Trj/GdSda.A",
"Win32/Application.478"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Runtastic",
"sample",
"permission",
"prompt",
"Runtastic",
"sample",
"permission",
"prompt",
"Checking",
"foreground",
"app",
"Marcher",
"is",
"one",
"of",
"the",
"few",
"Android",
"banking",
"Trojans",
"to",
"use",
"the",
"AndroidProcesses",
"library",
",",
"which",
"enables",
"the",
"application",
"to",
"obtain",
"the",
"name",
"of",
"the",
"Android",
"package",
"that",
"is",
"currently",
"running",
"in",
"the",
"foreground",
"."
] | [
5,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Heur.Win32.VBKrypt.3!O",
"Trojan.Vbot.S15507",
"Downloader.VB.Win32.107566",
"Trojan/AntiAV.out",
"Win32.Trojan.WisdomEyes.16070401.9500.9933",
"Trojan.Win32.AntiAV.cqff",
"Trojan.Win32.AntiAV.bbnaxd",
"Trojan.MulDrop3.35749",
"Trojan.AntiAV.abe",
"TR/Offend.7084277.1",
"Trojan:Win32/Vbot.T",
"Trojan.Win32.AntiAV.cqff",
"Downloader/Win32.VB.C136965",
"Trojan.AntiAV",
"Win32.Trojan.Antiav.Wmiq",
"Trojan.AntiAV!kRLKkhVQepY"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.RazyNHmA.Trojan",
"Trojan.Waldek",
"Trojan.Symmi.D100C4",
"WORM_HPKASIDET.SM0",
"Win32.Trojan.Kryptik.aio",
"WORM_HPKASIDET.SM0",
"Win.Trojan.Betabot-5",
"Trojan.Win32.NgrBot.evigbp",
"BackDoor.IRC.NgrBot.566",
"BehavesLike.Win32.MultiPlug.cm",
"W32/Trojan.HZWF-1490",
"TR/Crypt.Xpack.tsufk",
"Trojan:Win32/Radonskra.B",
"Trojan/Win32.Upbot.C1483736",
"Trj/GdSda.A",
"Trojan-Ransom.Raa",
"W32/Kryptik.FACF!tr",
"Win32/Trojan.a93"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Attackers",
"are",
"continually",
"trying",
"to",
"find",
"new",
"ways",
"to",
"target",
"users",
"with",
"malware",
"sent",
"via",
"email."
] | [
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
3,
1,
9,
9
] |
[
"Security",
"experts",
"have",
"long",
"warned",
"of",
"the",
"ability",
"of",
"advanced",
"adversaries",
"to",
"subvert",
"hardware",
"and",
"software",
"supply",
"chains",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Multi",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Zum.Rastarby.4",
"Trojan.Win32.Miner.tfkd",
"Zum.Rastarby.4",
"Riskware.Win64.BtcMine.dugwfh",
"Uds.Dangerousobject.Multi!c",
"Win32.Trojan.Miner.Dux",
"BehavesLike.Win32.AdwareLinkury.tc",
"Zum.Rastarby.4",
"Trojan.Win32.Miner.tfkd",
"Trojan:Win64/HelaMiner.A",
"Trojan.Miner",
"BAT/CoinMiner.YJ",
"Trj/CI.A",
"Win32/Trojan.769"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Janus",
"vulnerability",
",",
"which",
"allows",
"the",
"actor",
"to",
"replace",
"any",
"application",
"with",
"an",
"infected",
"version",
"."
] | [
16,
7,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.ZXShell",
"BKDR_ZXSHELL.D",
"Backdoor.Win32.ZXShell.v",
"Backdoor.W32.Zxshell!c",
"BKDR_ZXSHELL.D",
"BDS/ZXShell.999712",
"W32/ZxShell.D!tr",
"Trojan.Kazy.DB0C8D",
"Backdoor:Win32/Zxshell.A!dha",
"Backdoor/Win32.ZXShell.N1663696022",
"Win32.Backdoor.Zxshell.Pfjm",
"Trojan.Win32.Zxshell",
"Win32/Backdoor.6e4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"the",
"worm",
"was",
"back,",
"and",
"it",
"was",
"both",
"more",
"and",
"less",
"effective."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.BitCoinMiner",
"Riskware.Win32.BtcMine.exrhsn",
"Trojan.Win32.Z.Strictor.1934848",
"Win32.Trojan.Strictor.Akpc",
"Tool.BtcMine.982",
"BehavesLike.Win32.BadFile.tc",
"Trojan.Win32.CoinMiner",
"TR/CoinMiner.vctqx",
"Trojan.Strictor.D2613C",
"Trojan.Win64.BitCoinMiner",
"W32/CoinMiner.AZU!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"use",
"of",
"DDE",
"with",
"PowerShell",
"allows",
"an",
"attacker",
"to",
"execute",
"arbitrary",
"code",
"on",
"a",
"victim's",
"system",
"regardless",
"whether",
"macros",
"are",
"enabled."
] | [
16,
16,
16,
5,
16,
5,
16,
16,
6,
16,
1,
9,
9,
16,
5,
13,
13,
16,
16,
3,
16,
16
] |
[
"]",
"org",
"Ties",
"to",
"previous",
"activity",
"The",
"registrant",
"of",
"cdncool",
"[",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"In",
"addition",
"to",
"Chipotle,",
"the",
"hackers",
"appears",
"to",
"be",
"targeting",
"national",
"restaurant",
"franchises",
"Baja",
"Fresh",
"and",
"Ruby",
"Tuesday,",
"according",
"to",
"malware",
"samples",
"and",
"other",
"evidence",
"CyberScoop",
"obtained."
] | [
16,
16,
16,
4,
16,
6,
16,
16,
16,
16,
4,
12,
12,
12,
12,
12,
12,
12,
16,
16,
3,
16,
16,
16,
16,
4,
16
] |
[
"ThreatLabz",
"has",
"determined",
"that",
"Nevada",
"shares",
"significant",
"code",
"with",
"the",
"Rust-based",
"variant",
"of",
"Nokoyawa."
] | [
4,
16,
16,
16,
3,
16,
16,
16,
16,
3,
11,
11,
11,
11
] |
[
"This",
"past",
"week,",
"our",
"team",
"has",
"identified",
"a",
"group",
"of",
"malware",
"samples",
"that",
"matched",
"behavioral",
"heuristics",
"for",
"multiple",
"known",
"malware",
"families."
] | [
16,
0,
8,
16,
4,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.ShellKillUnixOSPtv.Worm",
"Trojan.Script.BXM",
"Trojan.VBS.Kofornix.A",
"Trojan.KillDisk.MBR",
"Troj.W32.EraseMBR.d!c",
"Trojan.Jokra",
"Win32/DarkSeoul.AA",
"UNIX_KILLMBR.A",
"Trojan.Win32.EraseMBR.d",
"Trojan.Script.BXM",
"Trojan.Script.EraseMBR.bxxrlr",
"Trojan.Script.BXM",
"Trojan.Script.BXM",
"Trojan.KillMBR.168",
"BASH/Kast.A!tr",
"Trojan.Script.BXM",
"Trojan.Win32.EraseMBR.d",
"Trojan:SH/Kofornix.A",
"Trojan.SH.KilMBR",
"Win32.Trojan.Erasembr.Wtnk",
"Trojan.Win32.EraseMBR",
"Trojan.Script.BXM",
"Win32/Trojan.6f6"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"27",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"It",
"encodes",
"strings",
"into",
"binary",
"arrays",
",",
"making",
"it",
"hard",
"to",
"inspect",
"them",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Like",
"many",
"original",
"equipment",
"manufacturers",
",",
"it",
"uses",
"software",
"components",
"from",
"other",
"developers",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"I-Worm.Plesa.r3",
"Trojan/Plesa.a",
"IRC-Worm.Plesa!VraGnsrR3Es",
"W32/Plesa.A@p2p",
"W32.SillyP2P",
"IRC/Plesa.A",
"WORM_PLESA.B",
"Worm.IRC.Plesa.A",
"IRC-Worm.Win32.Plesa.a",
"Trojan.Win32.Plesa.fuyf",
"Worm.Win32.A.IRC-Plesa.34304[h]",
"Worm.IRC.Plesa.A",
"Win32.HLLW.Plesa",
"Worm.Plesa.Win32.1",
"WORM_PLESA.B",
"BehavesLike.Win32.Sality.nc",
"W32/Plesa.BXPQ-5568",
"I-Worm/Plesa.a",
"WORM/Irc.Plesa.A.2",
"W32/Plesa.A!worm.irc",
"Worm[IRC]/Win32.Plesa",
"W32.W.Plesa.a!c",
"Win32/Plesa.worm.34304",
"Worm:Win32/Plesa.A",
"Win32.Worm-irc.Plesa.Svqx",
"IRC-Worm/Plesa.A",
"Worm.Win32.Plesa.a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Spybot.Worm",
"W32/Packed_Packman.A",
"Virus.Win32.Heur.c",
"Backdoor.Rbot!IK",
"Win32.HLLW.MyBot.based",
"Backdoor.Rbot",
"BackDoor.RBot.IA"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"Allows",
"an",
"application",
"to",
"read",
"or",
"write",
"the",
"system",
"settings",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"mid-July,",
"Palo",
"Alto",
"Networks",
"Unit",
"42",
"identified",
"a",
"small",
"targeted",
"phishing",
"campaign",
"aimed",
"at",
"a",
"government",
"organization."
] | [
16,
0,
4,
12,
12,
12,
12,
16,
16,
3,
16,
6,
14,
16,
16,
4,
12,
12
] |
[
"Many",
"top",
"providers",
"in",
"Russia",
"offer",
"cheap",
"prices",
"for",
"their",
"shared",
"hosting",
"services",
",",
"and",
"some",
"even",
"provide",
"free",
"30-day",
"trial",
"periods",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"205",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"]",
"it",
"Firenze",
"server1gioiat.exodus.connexxa",
"[",
"."
] | [
9,
9,
16,
1,
9,
9
] |
[
"What",
"lied",
"beneath",
"this",
"facade",
"was",
"a",
"well-engineered",
"campaign",
"of",
"phishing",
"attacks",
"designed",
"to",
"steal",
"credentials",
"and",
"spy",
"on",
"the",
"activity",
"of",
"dozens",
"of",
"journalists,",
"human",
"rights",
"defenders,",
"trade",
"unions",
"and",
"labour",
"rights",
"activists,",
"many",
"of",
"whom",
"are",
"seemingly",
"involved",
"in",
"the",
"issue",
"of",
"migrants'",
"rights",
"in",
"Qatar",
"and",
"Nepal."
] | [
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
1,
9,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
12,
12,
16,
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
2,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.PWS.Coced.2.4.6",
"Trojan.PWS.Coced.2.4.6",
"Trojan.PWS.Coced.2.4.6",
"Trojan.Win32.Coced.bhwfkh",
"Hacktool.PWSteal",
"Naebi.246",
"Trojan-PSW.Win32.Coced.246",
"Trojan.PWS.Coced!FBVVvUBVA1M",
"Trojan.PWS.Coced.2.4.6",
"TrojWare.Win32.PSW.Coced.246",
"Trojan.PWS.Coced.2.4.6",
"Trojan.PWS.Coced.246",
"Trojan.Coced.Win32.158",
"W32/Risk.HJYL-5906",
"Trojan/PSW.Coced.246",
"TR/PSW.Coced.246",
"Trojan[PSW]/Win32.Coced",
"Win32.PSWTroj.Coced.kcloud",
"PWS:Win32/Coced.2_46",
"Win-Trojan/Coced.19456",
"Trojan.PWS.Coced.2.4.6",
"Trojan.PWS.Coced.2.4.6",
"TrojanPSW.Coced",
"Win32/PSW.Coced.246",
"Win32.Init.QQRob.dkwv",
"W32/Coced.246!tr.pws",
"PSW.Coced",
"Trojan.Win32.InfoStealer.AYJO"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"’",
"s",
"worth",
"noting",
"however",
",",
"about",
"one-third",
"of",
"the",
"HenBox",
"apps",
"contained",
"embedded",
"APK",
"objects",
"that",
"did",
"not",
"refer",
"to",
"legitimate",
"apps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Some",
"of",
"the",
"new",
"2014-2015",
"Duqu",
"infections",
"are",
"linked",
"to",
"the",
"P5+1",
"events",
"and",
"venues",
"related",
"to",
"the",
"negotiations",
"with",
"Iran",
"about",
"a",
"nuclear",
"deal."
] | [
16,
16,
16,
16,
0,
3,
11,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
2,
16,
16,
16,
16
] |
[
"This",
"local",
"port",
"is",
"used",
"by",
"Exodus",
"Two",
"to",
"execute",
"various",
"commands",
"on",
"the",
"Android",
"device",
",",
"such",
"as",
"enabling",
"or",
"disabling",
"certain",
"services",
",",
"or",
"parsing",
"app",
"databases",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"latest",
"attack",
"potentially",
"materially",
"impacts",
"one",
"of",
"the",
"primary",
"countermeasures",
"employed",
"against",
"wiper",
"attacks:",
"Virtual",
"Desktop",
"Interface",
"snapshots."
] | [
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
1,
5,
13,
13,
13
] |
[
"One",
"is",
"CVE-2012-1856,",
"reinvigorated",
"with",
"a",
"novel",
"ROP",
"chain",
"to",
"bypass",
"ASLR",
"and",
"deliver",
"the",
"uWarrior",
"payload."
] | [
16,
16,
1,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Packer.YodaBased.B",
"Packer.YodaBased.B",
"Packer.YodaBased.B",
"Win32.Trojan.WisdomEyes.16070401.9500.9994",
"Packer.YodaBased.B",
"Trojan.Win32.AutoRun.omxo",
"Packer.YodaBased.B",
"Packed.Win32.Klone.~KE",
"Packer.YodaBased.B",
"BackDoor.Attacker",
"BehavesLike.Win32.Downloader.pc",
"Backdoor.Win32.Hupigon",
"Trojan/PSW.GamePass.msl",
"TrojanDownloader:Win32/Murka.A",
"Worm.Win32.Autorun.45568.I",
"Packer.YodaBased.B",
"TScope.Malware-Cryptor.SB",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Downloader-72360",
"Adware.BDSearch.1",
"Trojan.DownLoad.40686",
"Win32/Jhee.H",
"Adware.Rugo",
"Trojan:Win32/Jhee.G",
"Adware.BDSearch.1",
"Adware.WSearch.O",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"As",
"we",
"know",
"from",
"the",
"FTP",
"dump",
"analysis",
",",
"there",
"was",
"a",
"firmware",
"component",
"from",
"ASUS",
"firmware",
",",
"indicating",
"the",
"attacker",
"’",
"s",
"interest",
"in",
"ASUS",
"devices",
",",
"which",
"explains",
"the",
"victim",
"file",
"name",
"that",
"mentions",
"“",
"ASUS",
"”",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clodfa8.Trojan.1d71",
"Trojan.Keylogger.NAD",
"Trojan.Tuma.r4",
"Trojan.Keylogger.NAD",
"Trojan/Spy.oop",
"Trojan.Keylogger.NAD",
"backdoor.win32.hupigon.fn",
"W32/Trojan3.KYS",
"Trojan.Win32.Tuma.deaiow",
"Trojan.Win32.Z.Keylogger.20480.K[h]",
"Troj.Keylogger.Nad!c",
"Trojan.Keylogger.NAD",
"Trojan.Keylogger.NAD",
"Trojan.Keylogger.Win32.35586",
"W32/Trojan.GLTF-2077",
"TR/Tuma.A",
"W32/Keylog.A!tr.spy",
"Trojan.Keylogger.NAD",
"Trojan:Win32/Tuma.A",
"TrojanSpy.KeyLogger!6zo304KOTCM",
"Trojan.Win32.Spy",
"Trojan.Keylogger.NAD",
"PSW.KeyLogger.CUC",
"Win32/Trojan.Keylog.761"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"the",
"last",
"month",
"Trustwave",
"was",
"engaged",
"by",
"two",
"separate",
"hospitality",
"clients,",
"and",
"one",
"restaurant",
"chain",
"for",
"investigations",
"by",
"an",
"unknown",
"attacker",
"or",
"attackers."
] | [
16,
16,
0,
8,
4,
16,
16,
16,
16,
16,
4,
12,
16,
16,
4,
12,
11,
16,
16,
6,
14,
14,
16,
6
] |
[
"Malware",
"writers",
"have",
"always",
"sought",
"to",
"develop",
"feature-rich,",
"easy",
"to",
"use",
"tools",
"that",
"are",
"also",
"somewhat",
"hard",
"to",
"detect",
"via",
"both",
"host-",
"and",
"network-based",
"detection",
"systems."
] | [
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
15,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
13,
13
] |
[
"Unit",
"42",
"researchers",
"recently",
"observed",
"an",
"unusually",
"clever",
"spambot's",
"attempts",
"to",
"increase",
"delivery",
"efficacy",
"by",
"abusing",
"reputation",
"blacklist",
"service",
"APIs.",
"Rather",
"than",
"sending",
"spam",
"as",
"soon",
"as",
"the",
"host",
"is",
"infected,",
"the",
"bot",
"checks",
"common",
"blacklists",
"to",
"confirm",
"its",
"e-mails",
"will",
"actually",
"be",
"delivered,",
"and",
"if",
"not,",
"shuts",
"itself",
"down."
] | [
4,
12,
12,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
7,
15,
15,
15,
15,
16,
16,
16,
1,
16,
16,
16,
16,
5,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Beginning",
"in",
"November",
"2016,",
"Kaspersky",
"Lab",
"observed",
"a",
"new",
"wave",
"of",
"wiper",
"attacks",
"directed",
"at",
"multiple",
"targets",
"in",
"the",
"Middle",
"East."
] | [
16,
16,
0,
8,
4,
12,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
2,
10,
10
] |
[
"Lookout",
"has",
"shared",
"information",
"about",
"this",
"family",
"with",
"Apple",
",",
"and",
"they",
"have",
"revoked",
"the",
"affected",
"certificates",
"."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"No",
"traces",
"were",
"left",
"on",
"affected",
"systems",
"apart",
"from",
"files",
"from",
"the",
"exploit",
"process",
"if",
"the",
"target",
"machine",
"wasn't",
"interesting",
"to",
"the",
"Lurk",
"operators."
] | [
1,
9,
16,
16,
16,
5,
13,
16,
16,
1,
16,
7,
15,
15,
16,
16,
16,
5,
16,
16,
16,
6,
14,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.MSIL.Disfa.hfpj.FC.4367",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Exploit.Win32.Strictor.etpuwg",
"Win32.Trojan.Fakedoc.Auto",
"Trojan.Injector.Win32.565843",
"W32/Trojan.BKGU-8860",
"Trojan.Strictor.D1A871",
"Ransom.HiddenTear",
"Trojan.Injector!WLrriQRdMeM",
"Trj/GdSda.A",
"Win32/Trojan.97a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.JS.Downloader.IDO",
"Trojan.Downloader.JS.3612",
"Trojan.JS.Downloader.IDO",
"Trojan.Malscript!html",
"JS_BADRABBIT.A",
"Trojan.JS.Downloader.IDO",
"Js.Trojan.Js.Wrgf",
"Trojan.JS.Downloader.IDO",
"JS_BADRABBIT.A",
"Trojan.FLCY-1",
"TrojanDownloader:JS/Tibbar.A",
"Trojan.JS.Downloader.IDO",
"Trojan.JS.Downloader.IDO"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"FireEye",
"has",
"moderate",
"confidence",
"that",
"a",
"campaign",
"targeting",
"the",
"hospitality",
"sector",
"is",
"attributed",
"to",
"Russian",
"actor",
"APT28."
] | [
4,
16,
16,
16,
16,
16,
6,
16,
16,
4,
12,
16,
16,
16,
6,
14,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32/Adware.Virtumonde",
"Win32/Adware.Virtumonde",
"Trojan:Win32/Iceroe.C"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TROJ_JORIK_0000023.TOMA",
"Trojan.Win32.Snojan.gi",
"Trojan.Win32.Autoruner1.wcikr",
"MULDROP.Trojan",
"BehavesLike.Win32.Downloader.mz",
"Trojan/Win32.FirstInj",
"TrojanDownloader:Win32/Bleyr.A",
"Trojan.Zusy.D8B2B",
"Win-Trojan/Patched.25600.B",
"BScope.Trojan.SvcHorse.01643",
"Win32/AntiAV.NIA",
"Trojan.FirstInj!zbN/akDwH70",
"Trojan.Win32.Jorik",
"W32/FirstInj.KAP!tr.bdr",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"MSIL.Trojan.Kryptik.k",
"W32/Trojan.IINR-0738",
"BehavesLike.Win32.Trojan.vc",
"Trojan:Win32/Gielclas.A!gfc",
"Trj/CI.A",
"Trojan.Injector!QI3sWN009L0",
"Trojan.MSIL.Injector"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Multi",
"Trojan.Win32.BQHK0411.dfyyqz",
"Uds.Dangerousobject.Multi!c",
"Win32.Trojan.Strictor.Wvar",
"Trojan.Strictor.DCD3E",
"SpamTool.Skype!",
"MSIL/SpamTool_Skype.L!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Email-Worm.Win32!O",
"Happy99.Worm",
"W32/Ska.exe.worm",
"Win32.Trojan.WisdomEyes.16070401.9500.9919",
"Happy99.Worm",
"Win32/Happy99.10000!Dropper",
"Win.Trojan.Happy99-2",
"Email-Worm.Win32.Happy",
"Win95.Spanska.10000",
"TR/Happy.69",
"Trojan.Heur.E705EC",
"Email-Worm.Win32.Happy",
"Worm:Win32/Ska.A@m",
"Win32.Worm-email.Happy.Wrqu",
"Win32.Ska.A",
"Email-Worm.Win32.Happy"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"However",
",",
"the",
"keylogger",
"needs",
"to",
"be",
"specifically",
"enabled",
"by",
"a",
"command",
"sent",
"from",
"the",
"C2",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"An",
"interesting",
"feature",
"of",
"this",
"family",
"of",
"banking",
"Trojans",
"is",
"the",
"simultaneous",
"use",
"of",
"three",
"command",
"sources",
":",
"Google",
"Cloud",
"Messaging",
"(",
"GCM",
")",
"service",
"–",
"used",
"to",
"send",
"small",
"messages",
"in",
"JSON",
"format",
"to",
"a",
"mobile",
"device",
"via",
"Google",
"servers",
";",
"malicious",
"C",
"&",
"C",
"server",
";",
"incoming",
"SMS",
"messages",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"app",
"then",
"clicks",
"the",
"appropriate",
"buttons",
",",
"scrollbars",
",",
"and",
"other",
"UI",
"elements",
"to",
"go",
"through",
"account",
"sign-up",
"without",
"user",
"intervention",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"website",
"updatemobapp",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Nabony.AP3",
"Worm.AutoRun",
"Trojan.Heur.PT.EEF50D",
"Win32.Trojan.WisdomEyes.16070401.9500.9996",
"W32.SillyFDC",
"Win32/Xema.H",
"TSPY_AUTORUN_BJ022DBF.TOMC",
"Win.Worm.Autorun-8605",
"Trojan.Win32.MLW.rupxe",
"Win32.Worm.Autorun.Akyt",
"Worm.Win32.Nabony.A",
"TSPY_AUTORUN_BJ022DBF.TOMC",
"BehavesLike.Win32.Dropper.cz",
"WORM/Autorun.YD",
"Worm:Win32/Nabony.A",
"Trojan.Win32.A.Scar.1183299",
"Trojan/Win32.HDC.C12022",
"Hoax.Blocker",
"W32/AutoRun.YD!tr",
"Win32/Worm.0fe"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.MSIL",
"Win32.Trojan.WisdomEyes.16070401.9500.9988",
"MSIL/Filecoder.FF",
"Ransom_Vortex.R004C0DKT17",
"Trojan.Win32.Filecoder.evqvnb",
"Ransom_Vortex.R004C0DKT17",
"BehavesLike.Win32.Trojan.nc",
"W32/Trojan.METU-7441",
"TrojanSpy.MSIL.nar",
"TR/Dropper.MSIL.bpldq",
"MSIL/Filecoder.FF!tr",
"Ransom:MSIL/Vortex.A",
"Trojan/Win32.Ransomlock.C2275506",
"Trojan.Ransom.Vortex",
"Ransom.Vortex",
"Trojan-Ransom.FileCoder",
"Trj/GdSda.A",
"Win32/Trojan.Dropper.62b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"the",
"era",
"of",
"APT's,",
"it",
"feels",
"like",
"something",
"is",
"amiss",
"when",
"there",
"is",
"a",
"forum",
"of",
"governments",
"and",
"no",
"malware",
"arises."
] | [
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
3,
16
] |
[
"At",
"the",
"time",
"of",
"writing",
",",
"the",
"dropper",
"supports",
"aepic.dll",
",",
"sspisrv.dll",
",",
"ftllib.dll",
",",
"and",
"userenv.dll",
"to",
"host",
"the",
"malicious",
"FinFisher",
"payload",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
1,
16,
1,
16,
16,
1,
16,
16,
16,
16,
3,
16,
16
] |
[
"Ursnif",
"is",
"a",
"data",
"stealer",
"and",
"a",
"downloader",
"with",
"a",
"lot",
"of",
"abilities",
"to",
"steal",
"data",
"from",
"installed",
"browsers",
"and",
"other",
"applications",
"such",
"as",
"Microsoft",
"Outlook."
] | [
3,
16,
16,
3,
11,
16,
16,
3,
16,
16,
16,
16,
16,
16,
1,
9,
16,
7,
15,
16,
16,
16,
16,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojanpws.Trah",
"Trojan[PSW]/Win32.Trah",
"PWS:Win32/Trah.B",
"PUA.DealPly.Da"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Chepdu.R",
"Troj.W32.BHO.liE5",
"Win32.Trojan.WisdomEyes.16070401.9500.9828",
"TrojWare.Win32.BHO.SC",
"Win32.HLLW.Lime.2312",
"BehavesLike.Win32.BadFile.dm",
"Trojan-Downloader.Win32.Banload",
"TR/Chepdu.IA",
"Trojan.Graftor.D1A2F",
"Trojan:Win32/Comquab.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"was",
"only",
"a",
"matter",
"of",
"time,",
"however,",
"for",
"other",
"cybercriminals",
"to",
"follow",
"suit."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16
] |
[
"The",
"malware",
"also",
"sends",
"regular",
"telemetry",
"back",
"to",
"its",
"C2",
"server",
"about",
"the",
"infected",
"device",
"in",
"the",
"form",
"of",
"an",
"HTTP",
"POST",
"to",
"its",
"C2",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16
] |
[
"It",
"seems",
",",
"however",
",",
"if",
"the",
"same",
"victim",
"has",
"more",
"than",
"one",
"device",
"the",
"malware",
"can",
"be",
"reused",
"since",
"the",
"IMEI",
"is",
"sent",
"along",
"with",
"each",
"data",
"exfiltration",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"this",
"blog",
"post,",
"we",
"will",
"describe",
"the",
"way",
"this",
"threat",
"enters",
"the",
"system",
"and",
"maintains",
"its",
"presence",
"while",
"constantly",
"communicating",
"with",
"its",
"command",
"and",
"control",
"server."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
5,
16,
16,
16,
16,
16,
1,
9,
16,
16,
1,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.DoS.119296",
"DoS.Win32.Nenet",
"Trojan.Win32.Nenet.dinmxr",
"Backdoor.W32.Singu.lhbk",
"FDOS.Nenet.32768",
"Tool.Win32.69ACF863",
"Backdoor.Win32.Rbot",
"DDOS/Nenet.A",
"DoS.Win32.Nenet",
"DoS.Nenet",
"DoS/Nenet.B",
"Win32/Virus.DDoS.672"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"That",
"'s",
"because",
"the",
"malware",
"roots",
"most",
"of",
"the",
"phones",
"it",
"infects",
",",
"a",
"process",
"that",
"subverts",
"key",
"security",
"mechanisms",
"built",
"into",
"Android",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Icbot.FC.848",
"Troj.Spy.Msil.Keylogger!c",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Trojan-Spy.MSIL.Keylogger.cfle",
"Trojan.Win32.IRCBot.efyfpt",
"TrojWare.MSIL.IRCBOT.B",
"Trojan.MSIL.IRCBot",
"TrojanSpy.MSIL.usk",
"MSIL/IRCBot.BK!tr",
"Trojan[Spy]/MSIL.IrcGhost",
"Trojan.Razy.DFC68",
"Trojan.Win32.Z.Ircbot.77312.A",
"Trojan-Spy.MSIL.Keylogger.cfle",
"Trojan:MSIL/Icbot.A!bit",
"Msil.Trojan-spy.Keylogger.Hssn",
"TrojanSpy.Keylogger!yn+qYVv4uIw",
"Trj/GdSda.A",
"Win32/Trojan.Spy.00e"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Despite",
"global",
"efforts",
"to",
"detect",
"and",
"disrupt",
"the",
"distribution",
"of",
"CryptoWall,",
"adversaries",
"have",
"continued",
"to",
"innovate",
"and",
"evolve",
"their",
"craft,",
"leading",
"to",
"the",
"release",
"of",
"CryptoWall",
"4."
] | [
16,
2,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"In",
"its",
"most",
"recent",
"campaign,",
"Tick",
"employed",
"spear-phishing",
"emails",
"and",
"compromised",
"a",
"number",
"of",
"Japanese",
"websites",
"in",
"order",
"to",
"infect",
"a",
"new",
"wave",
"of",
"victims."
] | [
16,
16,
16,
16,
6,
6,
16,
6,
14,
16,
1,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"overlay",
"window",
"is",
"often",
"indistinguishable",
"from",
"the",
"expected",
"screen",
"(",
"such",
"as",
"a",
"login",
"screen",
"for",
"a",
"banking",
"app",
")",
"and",
"is",
"used",
"to",
"steal",
"the",
"victim",
"’",
"s",
"banking",
"credentials",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"com",
"hxxp",
":",
"//www",
"[",
"."
] | [
9,
9,
1,
9,
9,
9,
9
] |
[
"We",
"named",
"the",
"attack",
"BITTER",
"based",
"on",
"the",
"network",
"communication",
"header",
"used",
"by",
"the",
"latest",
"variant",
"of",
"remote",
"access",
"tool",
"RAT",
"used."
] | [
16,
16,
16,
1,
9,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
3,
16,
3,
11,
11,
11,
16
] |
[
"''",
"This",
"is",
"a",
"trojan",
"with",
"many",
"built-in",
"capabilities",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Analysis",
"of",
"compromised",
"systems",
"seen",
"communicating",
"with",
"Bookworm",
"C2",
"servers",
"also",
"confirms",
"our",
"speculation",
"on",
"targeting",
"with",
"a",
"majority",
"of",
"systems",
"existing",
"within",
"Thailand."
] | [
16,
16,
5,
13,
16,
16,
16,
3,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
2
] |
[
"The",
"life",
"span",
"of",
"Android",
"banking",
"malware",
"is",
"limited",
"to",
"either",
"the",
"will",
"of",
"its",
"author",
"(",
"s",
")",
"to",
"support",
"it",
"or",
"the",
"arrest",
"of",
"those",
"actors",
"."
] | [
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojanpws.Mimikatz",
"Win32.Trojan.WisdomEyes.16070401.9500.9886",
"Trojan.Win32.Mimikatz.eoptjl",
"Troj.Psw.W32.Mimikatz!c",
"BehavesLike.Win32.PUPXAB.jh",
"W32/Application.SMPV-5402",
"Trojan.PSW.Mimikatz.sw",
"Trojan[PSW]/Win32.Mimikatz",
"Application.Mimikatz.2",
"HackTool:Win32/WDigest.A",
"Trj/GdSda.A",
"Win32.Trojan-qqpass.Qqrob.Eaxn",
"hacktool.mimikatz",
"Win32/Application.IM.f6f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"newer",
"version",
"of",
"FakeSpy",
"uses",
"new",
"URL",
"addresses",
"for",
"malicious",
"communication",
"with",
"FakeSpy",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"Dynamic",
"code",
"loading",
"makes",
"it",
"impossible",
"to",
"state",
"what",
"kind",
"of",
"PHA",
"it",
"was",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Banker.Win32.BestaFera.annq",
"Trojan.Win32.Demp.bozwca",
"BehavesLike.Win32.Injector.th",
"TR/Avgesi.B.1",
"Trojan:Win32/Avgesi.B",
"Trojan-Banker.Win32.BestaFera.annq",
"Win32.Trojan-dropper.Demp.Lnxz",
"Trojan-Downloader.Win32.Pher",
"W32/Demp.PJN!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"While",
"the",
"malware",
"attack",
"has",
"not",
"been",
"exclusively",
"targeting",
"the",
"region,",
"it",
"has",
"been",
"focusing",
"on",
"the",
"South",
"Korean",
"manufacturing",
"industry."
] | [
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
2,
16,
16,
16,
16,
16,
16,
2,
10,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.C0FB",
"Trojan.Dovs",
"TSPY_EMOTET.AUSYYON",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Emotet",
"TSPY_EMOTET.AUSYYON",
"Win.Trojan.Emotet-6410462-0",
"Win32.Trojan-Spy.Emotet.IT",
"Trojan.Win32.Dovs.esh",
"Trojan.Win32.Dovs.ewnrtt",
"Troj.W32.Dovs!c",
"BehavesLike.Win32.PWSZbot.cc",
"W32.Trojan.Emotet",
"TR/Crypt.ZPACK.sbdbq",
"Trojan/Win32.Dovs",
"Trojan.Win32.Dovs.esh",
"Trojan/Win32.Emotet.R216875",
"Trojan.Emotet",
"Trj/RnkBend.A",
"Win32.Trojan.Dovs.Szuw",
"Trojan.Win32.Crypt"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"87:28855",
"61",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"Today,",
"we",
"are",
"looking",
"at",
"an",
"exploit",
"kit",
"that",
"we",
"have",
"not",
"seen",
"before."
] | [
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16
] |
[
"This",
"vulnerability",
"is",
"mostly",
"known",
"as",
"SambaCry",
"after",
"the",
"famous",
"WannaCry",
"attack",
"targeting",
"Windows",
"systems",
"vulnerable",
"to",
"EternalBlue",
"SMB",
"exploit."
] | [
16,
7,
16,
16,
16,
16,
3,
16,
16,
16,
3,
16,
16,
5,
13,
7,
16,
3,
11,
11
] |
[
"Families",
"like",
"Poweliks,",
"which",
"abuse",
"Microsoft's",
"PowerShell,",
"have",
"emerged",
"in",
"recent",
"years",
"and",
"have",
"garnered",
"extensive",
"attention",
"due",
"to",
"their",
"ability",
"to",
"compromise",
"a",
"system",
"while",
"leaving",
"little",
"or",
"no",
"trace",
"of",
"their",
"presence",
"to",
"traditional",
"forensic",
"techniques."
] | [
3,
16,
3,
16,
7,
15,
15,
16,
16,
16,
0,
8,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
7,
16,
5,
16,
16,
1,
9,
9,
9,
9,
9,
9,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.VBS.Shutdown",
"TrojanDownloader:Win32/Tembatch.A",
"Trojan.Jacard.D636D"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"The",
"malicious",
"activity",
"includes",
"beaconing",
"to",
"actor-controlled",
"infrastructure,",
"deployment",
"of",
"second-stage",
"payloads,",
"and,",
"in",
"a",
"small",
"number",
"of",
"cases,",
"hands-on-keyboard",
"activity."
] | [
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"top/",
"Oct",
"17",
",",
"2017",
"hxxp",
":",
"//online.bankaustria.at.id58729",
"[",
"."
] | [
9,
9,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"The",
"\"",
"porn",
"kr",
"sex",
"''",
"APK",
"connects",
"to",
"a",
"malicious",
"website",
"that",
"runs",
"XLoader",
"in",
"the",
"background",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.ExpiroPC.PE",
"Trojan.Proxy.Small.E",
"Trojan-Proxy/W32.Small.4096.C",
"TrojanProxy.Small",
"Trojan/Proxy.Small.e",
"Win32.Trojan.WisdomEyes.16070401.9500.9933",
"Win32/Slarp.B",
"BKDR_SALAR.A",
"Win.Trojan.Proxy-3663",
"Trojan.Proxy.Small.E",
"Trojan-Proxy.Win32.Small.e",
"Trojan.Proxy.Small.E",
"Trojan.Win32.Small.dosc",
"Troj.Proxy.W32.Small.e!c",
"Win32.Trojan-proxy.Small.Ozsg",
"Trojan.Proxy.Small.E",
"Trojan.Proxy.Small.E",
"Trojan.Proxy.1698",
"Trojan.Small.Win32.2849",
"BKDR_SALAR.A",
"W32/Risk.RVLO-8598",
"TrojanProxy.Small.aeu",
"Win32.Troj.Small.e.kcloud",
"Trojan.Proxy.Small.E",
"Trojan-Proxy.Win32.Small.e",
"TrojanProxy:Win32/Small.E",
"Trojan.Proxy.Small.E",
"BScope.Trojan.Jackz.a",
"Win32/TrojanProxy.Small.NEQ",
"Trojan.PR.Small!jIc3Mh2dhO0",
"W32/Bdoor.A!tr.bdr",
"Bck/Salar.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"longer",
"a",
"Trojan",
"“",
"lives",
"”",
"on",
"a",
"smartphone",
",",
"the",
"more",
"money",
"it",
"will",
"make",
"for",
"the",
"owner",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.