tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"W97M/Downloader.cew",
"Trojan.Phisherly",
"TROJ_PHISHERLY.ZQEJ-A",
"TROJ_PHISHERLY.ZQEJ-A",
"W97M/Downloader.cew",
"ZIP/Trojan.YBQC-0"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DumtoxXAX.Trojan",
"Worm.Win32.VB!O",
"Trojan.Comisproc.AZ3",
"Trojan.VB.Win32.56251",
"Trojan/VB.peu",
"Trojan.Heur.EE2DE0",
"WORM_VOBFUS.NER",
"Win32.Trojan.VB.je",
"WORM_VOBFUS.NER",
"Worm.Win32.VB.fer",
"Trojan.Win32.VB.epyowu",
"BehavesLike.Win32.VBObfus.cz",
"Worm.Win32.VB",
"Worm/VB.pcc",
"Worm/Win32.VB.fer",
"Worm.Win32.A.VB.176128.AR",
"Worm.Win32.VB.fer",
"Worm/Win32.AutoRun.R49416",
"W32/Autorun.worm.aacy",
"TScope.Trojan.VB",
"Win32/VB.PEU"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Racvacs.AA2",
"Trojan.Cosmu.Win32.3454",
"Trojan/Scar.atyl",
"Win32.Trojan.IRCBot.b",
"Win32/IRCBot.JZK",
"TROJ_PAM_000001074B.T3",
"Trojan.Win32.MLW.stwkl",
"Troj.W32.Cosmu.ldLk",
"Worm.Win32.Autorun.lbe",
"Win32.HLLW.Autoruner1.11201",
"BehavesLike.Win32.Downloader.lm",
"Trojan/Scar.bqi",
"Worm:Win32/Ircbot.D",
"Trojan/Win32.Unknown",
"Win32.Troj.Undef.kcloud",
"Worm:Win32/IRCbot.D",
"Worm/Win32.AutoRun.R2912",
"W32/Autorun.worm.bbx",
"BScope.Trojan-Spy.Zbot",
"Trojan.Win32.Cosmu"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"All",
"of",
"its",
"capabilities",
"are",
"discussed",
"later",
"in",
"this",
"blog",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"If",
"the",
"targeted",
"device",
"is",
"not",
"vulnerable",
"to",
"these",
"exploits",
",",
"then",
"the",
"app",
"attempts",
"to",
"use",
"a",
"superuser",
"binary",
"pre-positioned",
"at",
"/system/csk",
"to",
"elevate",
"privileges",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16
] |
[
"One",
"of",
"the",
"uses",
"the",
"malware",
"gives",
"to",
"this",
"package",
"is",
"the",
"execution",
"of",
"the",
"command",
"\"",
"dumpsys",
"''",
"to",
"determine",
"if",
"certain",
"activities",
"are",
"running",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Of",
"course",
",",
"not",
"all",
"the",
"opcodes",
"are",
"can",
"be",
"easily",
"read",
"and",
"understood",
"due",
"to",
"additional",
"steps",
"that",
"the",
"authors",
"have",
"taken",
"to",
"make",
"analysis",
"extremely",
"complicated",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"owners",
"of",
"Trojans",
"such",
"as",
"Leech,",
"Ztorg,",
"Gorpo",
"as",
"well",
"as",
"the",
"new",
"malware",
"family",
"Trojan.AndroidOS.Iop",
"are",
"working",
"together."
] | [
6,
14,
16,
3,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16
] |
[
"However,",
"there",
"is",
"much",
"information",
"confused",
"together,",
"as",
"if",
"an",
"entirely",
"new",
"IoT",
"bot",
"is",
"spreading",
"to",
"and",
"from",
"Windows",
"devices."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Nadostarch",
"Trojan:Win32/Nadostarch.A",
"Trojan.Win32.Nadostarch"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"EventBot",
"mobile",
"banking",
"applications",
"targetedApplications",
"targeted",
"by",
"EventBot",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"The",
"β",
"onUserLeaveHint",
"(",
")",
"β",
"callback",
"method",
"of",
"the",
"Android",
"Activity",
"(",
"i.e.",
",",
"the",
"typical",
"GUI",
"screen",
"the",
"user",
"sees",
")",
"is",
"called",
"as",
"part",
"of",
"the",
"activity",
"lifecycle",
"when",
"the",
"activity",
"is",
"about",
"to",
"go",
"into",
"the",
"background",
"as",
"a",
"result",
"of",
"user",
"choice",
",",
"for",
"example",
",",
"when",
"the",
"user",
"presses",
"the",
"Home",
"key",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.HLLW.Autoruner.6669",
"Worm:Win32/Mofeir.P"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"It",
"sends",
"a",
"smishing",
"message",
"to",
"the",
"entire",
"contact",
"list",
"of",
"the",
"infected",
"device",
"along",
"with",
"the",
"malicious",
"link",
"to",
"the",
"FakeSpy",
"installation",
"page",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16
] |
[
"To",
"make",
"the",
"fake",
"report",
"appear",
"even",
"more",
"scary,",
"the",
"malware",
"displays",
"your",
"IP",
"address",
"and",
"a",
"picture",
"of",
"you."
] | [
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
3,
16,
16,
1,
9,
16,
16,
1,
9,
9
] |
[
"You",
"can",
"also",
"try",
"to",
"re-flash",
"your",
"device",
"with",
"its",
"original",
"ROM",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Email-Worm.Zhelatin.pk",
"W32/Zhelatin.pk",
"Trojan.Win32.Zhelatin.mqtc",
"Trojan.Peacomm",
"Tibs.BFZS",
"Win32/Sintun.AV",
"TROJ_NUWAR.UP",
"Trojan.Zhelatin",
"Email-Worm.Win32.Zhelatin.pk",
"I-Worm.Win32.Zhelatin.142336",
"EmailWorm.Win32.Zhelatin.pk0",
"Trojan.Spambot.2386",
"TROJ_NUWAR.UP",
"Worm.Zhelatin.pk.kcloud",
"Backdoor:Win32/Nuwar.A",
"Worm/Win32.Zhelatin",
"BScope.Zhelatin.con",
"Trojan.Peacomm!rem",
"Virus.Win32.Zhelatin",
"W32/Tibs.G@mm",
"I-Worm/Nuwar.N",
"Trj/Spammer.AFG"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Allows",
"applications",
"to",
"change",
"Wi-Fi",
"connectivity",
"state",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"β",
"Agent",
"Smith",
"β",
"needs",
"to",
"be",
"updated/installed",
"without",
"the",
"user",
"β",
"s",
"consent",
"."
] | [
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Further",
"assets",
"are",
"decrypted",
"and",
"deployed",
",",
"including",
"another",
"Dalvik",
"DEX",
"code",
"file",
",",
"which",
"has",
"various",
"capabilities",
"including",
"registering",
"itself",
"as",
"the",
"incoming",
"SMS",
"handler",
"for",
"the",
"device",
"to",
"intercept",
"SMS",
"messages",
",",
"loading",
"another",
"ELF",
"library",
"that",
"includes",
"a",
"version",
"of",
"BusyBox",
"-",
"a",
"package",
"containing",
"various",
"stripped-down",
"Unix",
"tools",
"useful",
"for",
"administering",
"such",
"systems",
"β",
"and",
",",
"interestingly",
",",
"is",
"capable",
"of",
"turning",
"off",
"the",
"sound",
"played",
"when",
"the",
"device",
"β",
"s",
"cameras",
"take",
"pictures",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Given",
"the",
"DroidVPN",
"look",
"and",
"feel",
"being",
"used",
"by",
"this",
"variant",
"of",
"HenBox",
",",
"it",
"β",
"s",
"highly",
"likely",
"the",
"uyghurapps",
"[",
"."
] | [
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"Just",
"don",
"β",
"t",
"forget",
"that",
"the",
"scan",
"does",
"not",
"run",
"automatically",
"in",
"the",
"free",
"version",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Cerber",
"has",
"previously",
"been",
"seen",
"distributed",
"via",
"exploit",
"kits",
"and",
"over",
"e-mail",
"using",
"DOC",
"files",
"with",
"macros."
] | [
3,
16,
16,
16,
16,
16,
16,
3,
11,
16,
1,
9,
9,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.4252",
"Backdoor.Hupigon.148473",
"Backdoor.Hupigon.148473",
"Backdoor.Hupigon.D243F9",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Backdoor.Hupigon.148473",
"Backdoor.Hupigon.148473",
"Backdoor.Hupigon.148473",
"BackDoor.Pigeon1.3852",
"Win32.Hack.Huigezi.n.kcloud",
"Backdoor:Win32/Tenpeq.C",
"Backdoor.Hupigon.148473",
"MalwareScope.Trojan-PSW.Game.16",
"Trojan.Hupigon!iPBnzuR7b40",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Since",
"then,",
"several",
"examples",
"of",
"malware",
"created",
"by",
"Animal",
"Farm",
"have",
"been",
"found",
"and",
"publicly",
"documented,",
"in",
"particular:"
] | [
16,
16,
16,
16,
16,
3,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"top/",
"Oct",
"17",
",",
"2017",
"hxxp",
":",
"//online.bankaustria.at.id58712",
"[",
"."
] | [
9,
9,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"He",
"most",
"probably",
"did",
"so",
"to",
"restore",
"his",
"reputation",
"on",
"a",
"number",
"of",
"hacker",
"forums:",
"earlier,",
"he",
"had",
"been",
"promoting",
"his",
"development",
"so",
"aggressively",
"and",
"behaving",
"so",
"erratically",
"that",
"he",
"was",
"eventually",
"suspected",
"of",
"being",
"a",
"scammer."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6
] |
[
"Comparison",
"of",
"code",
"of",
"Asset",
"file",
"before",
"and",
"after",
"decryption",
"Figure",
"11",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Loading",
"the",
"decrypted",
".dex",
"file",
"into",
"memory",
"and",
"triggering",
"the",
"main",
"payload",
"Main",
"payload",
"When",
"the",
"main",
"payload",
"is",
"loaded",
"into",
"memory",
",",
"the",
"initial",
"detonator",
"hands",
"over",
"the",
"control",
"to",
"the",
"main",
"payload",
"by",
"invoking",
"the",
"method",
"XoqF",
"(",
"which",
"we",
"renamed",
"to",
"triggerInfection",
"during",
"analysis",
")",
"from",
"the",
"gvmthHtyN",
"class",
"(",
"renamed",
"to",
"PayloadEntry",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"If",
"/sdcard/MemosForNotes",
"was",
"present",
"on",
"the",
"device",
",",
"the",
"Chrysaor",
"app",
"removes",
"itself",
"from",
"the",
"device",
"."
] | [
16,
1,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Win32.Ngrbot!O",
"Worm.Ngrbot",
"Trojan.Zbot.Win32.51206",
"Trojan/Spy.Zbot.dcar",
"Win32.Trojan.WisdomEyes.16070401.9500.9985",
"W32/Trojan.IPQV-8835",
"Win.Trojan.Zbot-52317",
"Worm.Win32.Ngrbot.kie",
"Troj.W32.Qhost.lkwM",
"BehavesLike.Win32.ZBot.dc",
"Trojan-Dropper.Win32.VB",
"Worm/Win32.Ngrbot",
"Worm.Win32.Ngrbot.kie",
"Worm/Win32.Ngrbot.R62747",
"Worm.Ngrbot",
"Trojan.Zbot",
"TrojanSpy.Zbot!FbLT0Cb2klI",
"W32/VBInjector.W!tr",
"Win32/Trojan.BO.255"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"While",
"the",
"malware",
"is",
"capable",
"of",
"facilitating",
"various",
"cyber-criminal",
"goals",
",",
"our",
"team",
"confirmed",
"it",
"β",
"s",
"currently",
"installing",
"additional",
"apps",
"on",
"infected",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"10",
"million",
"Android",
"phones",
"infected",
"by",
"all-powerful",
"auto-rooting",
"apps",
"First",
"detected",
"in",
"November",
",",
"Shedun/HummingBad",
"infections",
"are",
"surging",
"."
] | [
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16
] |
[
"]",
"commydriveweb",
"[",
"."
] | [
9,
9,
1,
9
] |
[
"During",
"one",
"session",
",",
"the",
"C2",
"server",
"commanded",
"our",
"emulated",
"device",
"to",
"send",
"four",
"different",
"SMS",
"messages",
"to",
"four",
"different",
"phone",
"numbers",
",",
"all",
"of",
"which",
"were",
"associated",
"with",
"Russian",
"financial",
"institutions",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Downloader.Adload.tml",
"Trojan.Buzy.D8FA",
"TSPY_DOWNLOADER_CD1002E2.RDXN",
"Win32.Trojan.WisdomEyes.16070401.9500.9973",
"TROJ_PAM_0000010534.T3",
"Win.Trojan.Adload-3700",
"Trojan.Win32.Snojan.ccxx",
"Trojan.Win32.Adload.cpqwy",
"TrojWare.Win32.TrojanDownloader.Adload.tmm",
"Trojan.DownLoader1.22512",
"BehavesLike.Win32.Backdoor.rc",
"Trojan-Downloader.Win32.Adload",
"TrojanDownloader.Adload.naf",
"TrojanDownloader:Win32/Neup.A",
"Trojan.Win32.Snojan.ccxx",
"Downloader/Win32.Adload.R11798",
"PUP.Optional.Funshion",
"Win32.Trojan.Adclicker.Sxoq",
"Trojan.DL.Adload.MGR",
"Win32/Trojan.56c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Coralco",
"Tech",
"'s",
"services",
"description",
"."
] | [
16,
16,
16,
16,
16,
16
] |
[
"Several",
"months",
"ago,",
"we",
"discovered",
"and",
"exposed",
"RETADUP",
"malware",
"in",
"Israeli",
"hospitals."
] | [
0,
8,
8,
16,
16,
16,
16,
3,
11,
16,
4,
12
] |
[
"EVENTBOT",
"THREAT",
"ACTORS",
"As",
"a",
"part",
"of",
"this",
"investigation",
",",
"the",
"Cybereason",
"Nocturnus",
"team",
"has",
"attempted",
"to",
"identify",
"the",
"threat",
"actors",
"behind",
"the",
"development",
"of",
"EventBot",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"This",
"malicious",
"program",
"attacks",
"only",
"Raspberry",
"Pi",
"minicomputers."
] | [
16,
3,
16,
1,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Clicker.Win32.VB!O",
"Win32/Adclicker.DSU",
"Trojan-Clicker.Win32.VB.isz",
"Trojan.Win32.VB.bcvse",
"Trojan.Click1.25507",
"BehavesLike.Win32.Dropper.qt",
"Trojan.Crypt",
"TrojanClicker.VB.kho",
"Trojan.Heur.ZGY.5",
"W32.W.Hawawi.lmFq",
"Trojan-Clicker.Win32.VB.isz",
"TrojanClicker:Win32/Refpron.A",
"Trojan/Win32.Xema.R155513"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"would",
"be",
"a",
"very",
"unusual",
"coincidence",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"some",
"samples",
"analyzed",
"by",
"CTU",
"researchers,",
"the",
"attachment",
"was",
"an",
"obfuscated",
"VBScript",
".vbs",
"file",
"that",
"downloads",
"and",
"installs",
"AdWind,",
"or",
"the",
"email",
"message",
"just",
"included",
"a",
"link",
"to",
"download",
"and",
"install",
"the",
"malware."
] | [
16,
16,
16,
16,
16,
4,
12,
16,
1,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9
] |
[
"It's",
"these",
"same",
"teens",
"that",
"are",
"causing",
"a",
"surge",
"in",
"mobile",
"ransomware",
"in",
"the",
"Chinese",
"underground",
"market."
] | [
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
5,
3,
16,
16,
6,
14,
14
] |
[
"\"",
"I",
"tried",
"reaching",
"out",
"to",
"Adups",
"and",
"never",
"heard",
"back",
",",
"''",
"Strazzere",
"tells",
"Information",
"Security",
"Media",
"Group",
"."
] | [
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
16
] |
[
"The",
"response",
"contains",
"some",
"basic",
"HTML",
"and",
"JavaScript",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"more",
"complex",
"the",
"obfuscation",
",",
"the",
"longer",
"it",
"will",
"take",
"an",
"antivirus",
"solution",
"to",
"neutralize",
"the",
"malicious",
"code",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"2017",
"and",
"2018,",
"ITG03",
"actors",
"stole",
"over",
"$534",
"million",
"from",
"cryptocurrency",
"exchange",
"attacks,",
"according",
"to",
"security",
"firm",
"Group",
"IB."
] | [
16,
0,
16,
0,
6,
14,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
4,
12,
12,
12
] |
[
"Users",
"can",
"not",
"rely",
"on",
"the",
"official",
"app",
"stores",
"for",
"their",
"safety",
",",
"and",
"should",
"implement",
"advanced",
"security",
"protections",
"capable",
"of",
"detecting",
"and",
"blocking",
"zero-day",
"mobile",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"blunder",
"made",
"by",
"the",
"company",
"has",
"been",
"frustrating",
"to",
"many",
"developers",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Hacktool.Bendor.C",
"Trojan/W32.HackTool.20480.O",
"Hacktool.Bendor",
"Trojan.Hacktool.Bendor.C",
"Tool.Bendor.Win32.1",
"Trojan/Hacktool.Bendor",
"Trojan.Hacktool.Bendor.C",
"BKDR_BANDOR.A",
"Win32.Trojan.WisdomEyes.16070401.9500.9602",
"W32/Trojan.VSQ",
"BKDR_BANDOR.A",
"Trojan.Hacktool.Bendor.C",
"HackTool.Win32.Bendor",
"Trojan.Hacktool.Bendor.C",
"Riskware.Win32.Bendor.hrie",
"HackTool.Bendor.20480",
"HackTool.W32.Bendor!c",
"Trojan.Hacktool.Bendor.C",
"TrojWare.Win32.HackTool.Bendor.A",
"Trojan.Hacktool.Bendor.C",
"W32/Trojan.ULWX-3793",
"HackTool/Bendor.a",
"W32.Hack.Tool",
"HackTool/Win32.Bendor",
"HackTool.Win32.Bendor",
"Trj/Legmir.AJQ",
"Win32/HackTool.Bendor.A",
"Win32.Hacktool.Bendor.Lkdj",
"HackTool.Bendor!+3jB7Bxnt10",
"Malware_fam.gw",
"Win32/Trojan.Hacktool.5e9"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Graftor.eruomq",
"Trojan.Proxy2.754",
"Trojan.Proxy.1",
"Trj/GdSda.A",
"Win32/Trojan.2c0"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"Split",
"Strings",
"Encrypted",
"strings",
"can",
"be",
"a",
"signal",
"that",
"the",
"code",
"is",
"trying",
"to",
"hide",
"something",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9723",
"Trojan.MSIL.Krypt.2",
"Trojan:MSIL/Remdobe.C",
"TrojanDropper.FrauDrop",
"Trj/CI.A",
"Trojan.Win32.Jorik",
"Win32/Trojan.7c5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.eHeur.Virus02",
"Virus.Win32.Sality!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9876",
"Trojan.DownLoader.22765",
"BehavesLike.Win32.PWSZbot.mc",
"Backdoor.Win32.Rbot",
"TrojanDownloader:Win32/Wudoo.A",
"Win32/Adware.Toolbar.Baidu"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"2013",
"in",
"figures",
"A",
"total",
"of",
"143,211",
"new",
"modifications",
"of",
"malicious",
"programs",
"targeting",
"mobile",
"devices",
"were",
"detected",
"in",
"all",
"of",
"2013",
"(",
"as",
"of",
"January",
"1",
",",
"2014",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"and",
"were",
"signed",
"using",
"the",
"name",
"of",
"an",
"engineer",
"who",
"appears",
"to",
"hold",
"equity",
"in",
"Connexxa",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16
] |
[
"The",
"response",
"can",
"either",
"be",
"a",
"simple",
"\"",
"OK",
",",
"''",
"or",
"can",
"be",
"a",
"request",
"to",
"perform",
"some",
"action",
"on",
"the",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"remote",
"access",
"toolkit",
"has",
"been",
"publicly",
"examined",
"multiple",
"times",
"by",
"the",
"threat",
"intelligence",
"community."
] | [
16,
3,
11,
11,
16,
16,
16,
16,
16,
12,
16,
16,
4,
12,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.MulDrop5.13033",
"HackTool.MSIL.ccp",
"W32.Hack.Tool",
"HackTool.Win32.AutoKMS",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"Icons",
"of",
"the",
"apps",
"that",
"Bouncing",
"Golf",
"β",
"s",
"operators",
"repackaged",
"(",
"top",
")",
"and",
"a",
"comparison",
"of",
"packages",
"between",
"the",
"original",
"legitimate",
"app",
"(",
"bottom",
"left",
")",
"and",
"GolfSpy",
"(",
"bottom",
"right",
")",
"Figure",
"3",
"."
] | [
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.BaragoneE.Trojan",
"Trojan.Win32.Cosmu!O",
"Trojan.Cosmu.Win32.14181",
"TROJ_COSMU.SMJ0",
"Win32/Cosmu.OP",
"TROJ_COSMU.SMJ0",
"Win.Trojan.Mybot-8550",
"Trojan.Win32.Bot.ercyne",
"TrojWare.Win32.Phishbank.DA",
"Trojan.Click1.57939",
"BehavesLike.Win32.Downloader.ch",
"Trojan/Win32.Cosmu.awlb",
"Trojan:Win32/Phishbank.A",
"W32.W.Mydoom.kZJ8",
"TScope.Malware-Cryptor.SB",
"Trojan.Win32.Sisron",
"Trojan.Win32.Phishbank.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.eHeur.Malware03",
"AdWare.W32.Gamevance.m6Qo",
"Trojan/Downloader.Stantinko.n",
"Win32.Trojan.Xpack.a",
"Win32.Trojan-Downloader.Stantinko.A",
"TrojWare.Win32.TrojanDownloader.Stantinko.D",
"BehavesLike.Win32.Downloader.ch",
"Trojan.Graftor",
"Trojan:Win32/Fiya.E",
"Win32/TrojanDownloader.Stantinko.N",
"W32/Stantinko.S!tr.dldr",
"Win32/Trojan.Stantinko.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"only",
"difference",
"is",
"the",
"malware",
"payload",
"being",
"dropped,",
"which",
"is",
"current",
"and",
"had",
"very",
"low",
"detection",
"on",
"VirusTotal."
] | [
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4
] |
[
"Once",
"we",
"looked",
"into",
"the",
"file",
",",
"we",
"quickly",
"found",
"out",
"that",
"the",
"inner-workings",
"of",
"the",
"APK",
"included",
"a",
"malicious",
"payload",
",",
"embedded",
"in",
"the",
"original",
"code",
"of",
"the",
"application",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.VBMailSpam.B",
"Trojan/W32.Flooder.577024.B",
"Trojan/Delf.a",
"TROJ_SPAMMER.A",
"W32/Worm.FSFK-2238",
"Hacktool.Spammer",
"Win32/Spadelf.C",
"TROJ_SPAMMER.A",
"Trojan.VBMailSpam.B",
"Email-Flooder.Win32.Delf.a",
"Trojan.VBMailSpam.B",
"Trojan.Win32.Delf.ifpg",
"Spyware.Email-Flooder.Delf.577024",
"Email-Flooder.W32.Delf.a!c",
"Trojan.VBMailSpam.B",
"TrojWare.Win32.Flooder.MailSpam.A",
"Trojan.VBMailSpam.B",
"Flooder.Mailbomb.6",
"Tool.Delf.Win32.442",
"W32/Worm.FVM",
"Flooder.MailSpam.Delvs",
"TR/VBMailSpam.B.1",
"HackTool[Flooder]/Win32.Delf",
"Win32.Hack.Delf.a.kcloud",
"Trojan.VBMailSpam.B",
"Email-Flooder.Win32.Delf.a",
"Spammer:Win32/Delf.A",
"Trojan.VBMailSpam.B",
"EmailFlooder.Delf",
"Win32/Flooder.MailSpam.Delf.A",
"Flooder.Delf!YEHm2HeU39s",
"Trojan.Win32.Flooder",
"Malware_fam.gw",
"Win32/Trojan.fd6"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"includes",
"detailed",
"technical",
"analysis",
"of",
"the",
"Prikormka",
"malware",
"family",
"and",
"its",
"spreading",
"mechanisms,",
"and",
"a",
"description",
"of",
"the",
"most",
"noteworthy",
"attack",
"campaigns."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
6,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HackTool.Win32!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9867",
"Win.Tool.Hotfreezer-2",
"Trojan.Win32.Refroso.csjta",
"TrojWare.Win32.HackTool.Homac",
"Tool.Homac",
"BehavesLike.Win32.Mydoom.pz",
"Trojan/Refroso.ulh",
"Trojan[Backdoor]/Win32.Shark",
"HackTool:Win32/Homac.A",
"HackTool.Homac",
"Win32/HackTool.Homac",
"Hacktool.Homac.A",
"HackTool.Win32.Homac"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Just",
"like",
"the",
"previous",
"modules",
",",
"it",
"contains",
"multiple",
"strings",
"in",
"Italian",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Hancitor",
"is",
"a",
"popular",
"dropper",
"used",
"in",
"phishing",
"campaigns."
] | [
3,
16,
16,
16,
3,
16,
16,
6,
14
] |
[
"A",
"reputable,",
"high-profile",
"ad",
"network",
"provides",
"traffers",
"with",
"access",
"to",
"higher-quality",
"traffic,",
"and",
"the",
"more",
"reputable",
"an",
"ad",
"network",
"appears,",
"the",
"easier",
"it",
"is",
"for",
"traffers",
"to",
"reach",
"this",
"target",
"traffic."
] | [
16,
16,
4,
12,
12,
16,
1,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9
] |
[
"In",
"other",
"cases,",
"spear",
"phish",
"directs",
"users",
"to",
"websites",
"that",
"would",
"otherwise",
"be",
"trusted",
"but",
"actually",
"have",
"been",
"compromised",
"by",
"threat",
"actors",
"seeking",
"greater",
"access",
"to",
"fulfill",
"their",
"actions",
"and",
"objectives."
] | [
16,
16,
16,
1,
9,
16,
16,
16,
1,
15,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Cybercriminals",
"are",
"using",
"local",
"brand",
"names",
"such",
"as",
"local",
"ISP",
"providers",
"and",
"legitimate",
"looking",
"addresses",
"to",
"fool",
"users",
"into",
"downloading",
"malware",
"that",
"can",
"steal",
"information",
"by",
"monitoring",
"browsers,",
"file",
"transfer",
"protocol",
"FTP",
"clients,",
"and",
"mail",
"clients."
] | [
6,
16,
16,
7,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
1,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
16,
1,
9
] |
[
"Unit",
"42",
"has",
"been",
"tracking",
"a",
"new",
"Remote",
"Access",
"Trojan",
"RAT",
"being",
"sold",
"for",
"$40",
"USD",
"since",
"April",
"2016,",
"known",
"as",
"Orcus"
] | [
4,
12,
16,
16,
16,
16,
16,
3,
11,
11,
11,
16,
16,
16,
16,
16,
16,
0,
8,
16,
16,
3
] |
[
"During",
"our",
"tests",
"the",
"spyware",
"was",
"upgraded",
"to",
"the",
"second",
"stage",
"on",
"our",
"test",
"device",
"immediately",
"after",
"the",
"first",
"check-ins",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"230",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"As",
"a",
"result",
"of",
"the",
"long-term",
"development",
"process",
",",
"there",
"are",
"multiple",
",",
"exceptional",
"capabilities",
":",
"usage",
"of",
"multiple",
"exploits",
"for",
"gaining",
"root",
"privileges",
",",
"a",
"complex",
"payload",
"structure",
",",
"never-before-seen",
"surveillance",
"features",
"such",
"as",
"recording",
"surrounding",
"audio",
"in",
"specified",
"locations",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Scar.15360.P",
"Trojan.Win32.Scar!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9973",
"W32/Trojan.WBMR-2019",
"Win.Trojan.Merong-1",
"Trojan.Win32.Scar.dcrm",
"Trojan.Win32.Scar.chxtv",
"Trojan.Win32.A.Scar.15360",
"Troj.W32.Scar.dcrm!c",
"Trojan.DownLoader5.8015",
"Trojan.Scar.Win32.48783",
"Trojan.Win32.Scar",
"W32/Trojan3.YUH",
"W32.Trojan.Scar",
"Trojan/Win32.Scar",
"Trojan.Win32.Scar.dcrm",
"Trojan:Win32/Sluegot.A",
"Trojan/Win32.Scar.R81257",
"Trojan.Scar",
"Win32.Trojan.Scar.bove",
"Trojan.Scar!69cHD7mX3A8",
"W32/Scar.DCM!tr.dldr",
"Win32/Trojan.17a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"com",
"www",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"In",
"the",
"latest",
"version",
",",
"a",
"layer",
"of",
"obfuscation",
"was",
"added",
",",
"perhaps",
"taking",
"the",
"malware",
"one",
"step",
"closer",
"to",
"being",
"fully",
"operational",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Indicators",
"related",
"to",
"the",
"CryptFile2",
"ransomware"
] | [
1,
16,
16,
16,
3,
11
] |
[
"It",
"will",
"also",
"take",
"a",
"photo",
"using",
"the",
"device",
"β",
"s",
"front",
"camera",
"when",
"the",
"user",
"wakes",
"the",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"And",
"our",
"researchers",
"estimate",
"that",
"in",
"every",
"10",
"Android",
"users",
"1",
"was",
"attacked",
"by",
"either",
"one",
"or",
"several",
"of",
"those",
"Trojans",
"during",
"the",
"second",
"half",
"of",
"2015",
",",
"so",
"there",
"are",
"millions",
"of",
"devices",
"with",
"a",
"huge",
"possibility",
"of",
"being",
"infected",
"with",
"Triada",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Proxy/W32.Thunker.14848.B",
"Trojan/Proxy.Thunker.a",
"TROJ_THUNKER.A",
"Win32.Trojan.WisdomEyes.16070401.9500.9995",
"W32/Espy.OUZC-2697",
"Backdoor.Thunker",
"Win32/Knooth.C",
"TROJ_THUNKER.A",
"Trojan-Proxy.Win32.Thunker.a",
"Trojan.Win32.Thunker.gtlj",
"Trojan.Win32.Proxy.14848.F",
"Troj.Proxy.W32.Thunker.a!c",
"TrojWare.Win32.TrojanProxy.Thunker.B",
"Trojan.Thunker",
"Trojan.Thunker.Win32.5",
"Trojan-Proxy.Win32.Thunker",
"W32/Espy.A",
"TrojanProxy.Thunker.b",
"TR/Thunker.DLL",
"Trojan[Proxy]/Win32.Thunker",
"Win32.Troj.Thunker.a.kcloud",
"Trojan-Proxy.Win32.Thunker.a",
"Win32/TrojanProxy.Thunker.B",
"Win32.Trojan-proxy.Thunker.Ajlv",
"Trojan.Thunker.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Qianxin",
"dissects",
"a",
"new",
"malicious",
"campaign",
"by",
"the",
"SideCopy",
"APT",
"group."
] | [
4,
16,
16,
6,
14,
14,
16,
6,
14,
14,
14
] |
[
"The",
"abuse",
"of",
"the",
"WebSocket",
"protocol",
"provides",
"XLoader",
"with",
"a",
"persistent",
"connection",
"between",
"clients",
"and",
"servers",
"where",
"data",
"can",
"be",
"transported",
"any",
"time",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Suspect",
"You",
"β",
"re",
"Infected",
"?",
"The",
"following",
"SMS",
"message",
"can",
"be",
"used",
"to",
"kill",
"the",
"sample",
"analyzed",
"in",
"this",
"research",
"and",
"all",
"other",
"variants",
"that",
"use",
"the",
"same",
"private",
"key",
":",
"HrLbpr3x/htAVnAgYepBuH2xmFDb68TYTt7FwGn0ddGlQJv/hqsctL57ocFU0Oz3L+uhLcOGG7GVBAfHKL1TBQ==",
"Sending",
"this",
"SMS",
"will",
"trigger",
"TrickMo",
"β",
"s",
"kill",
"switch",
"by",
"sending",
"the",
"string",
"β",
"4",
"β",
"encrypted",
"with",
"the",
"generated",
"RSA",
"public",
"key",
"and",
"base64",
"encoded",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Timebombs",
",",
"Dynamic",
"Code",
"Loading",
"and",
"Reflection",
"If",
"Google",
"Bouncer",
"was",
"not",
"detected",
",",
"the",
"application",
"starts",
"a",
"time",
"bomb",
"which",
"initiates",
"the",
"malicious",
"flow",
"only",
"after",
"20",
"seconds",
"and",
"will",
"run",
"every",
"2",
"hours",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Corporations",
"can",
"protect",
"themselves",
"from",
"these",
"side-channel",
"attacks",
"by",
"deploying",
"client-based",
"two-factor",
"authentication",
",",
"such",
"as",
"Duo",
"Security",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"Email",
"is",
"one",
"of",
"the",
"favorite",
"methods",
"used",
"by",
"attackers",
"to",
"infect",
"systems."
] | [
1,
16,
16,
16,
16,
16,
1,
16,
16,
6,
16,
5,
13
] |
[
"Another",
"tie",
"between",
"the",
"activity",
"is",
"the",
"C2",
"jackhex.md5c",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Strictor.D22A4D",
"W32/Trojan.ZZSK-0144",
"Win.Exploit.Fnstenv_mov-1",
"BehavesLike.Win32.Multiplug.wc",
"Backdoor/Win32.Wingbird.R209335",
"W32/Injector.DNRG!tr",
"Trj/GdSda.A",
"Win32/Trojan.Spy.c28"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.ForShare.WmiBit",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Backdoor.Trojan",
"Trojan.DownLoader24.53357",
"Trojan/Win32.PcClient.R191990",
"Win32/RootKit.Rootkit.7e5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Win32.VB!O",
"Worm.VB",
"Worm.VB.Win32.2956",
"W32/VB.bhj",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"BKDR_PSVR_0000001.TOMA",
"Win.Worm.VB-71919",
"Worm.Win32.VB.bhj",
"Trojan.Win32.VB.dxohtw",
"BackDoor.Poison.686",
"BKDR_PSVR_0000001.TOMA",
"Trojan-Dropper.Vb",
"Trojan.Razy.D3A7C4",
"Worm.Win32.A.VB.168516",
"Worm.Win32.VB.bhj",
"Worm/Win32.VB.C142786",
"W32/VBKrypt.C!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"domain",
"was",
"registered",
"on",
"August",
"4,",
"2015,",
"under",
"a",
"presumably",
"false",
"name,",
"and",
"we",
"suspect",
"that",
"the",
"attack",
"started",
"on",
"the",
"same",
"day."
] | [
16,
1,
16,
16,
16,
0,
8,
8,
16,
16,
16,
16,
16,
16,
16,
16,
15,
16,
1,
16,
16,
16,
0,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.TrosdanpomLTAA.Trojan",
"Backdoor.Laserv.B",
"Backdoor.Win32.Laserv!O",
"Backdoor.Laserv.A4",
"Backdoor/Laserv.b",
"W32/Backdoor.NWE",
"Backdoor.Lassrv.B",
"Win32/Lassrv.B",
"BKDR_LASSRV.B",
"Win.Trojan.Laserv-1",
"Backdoor.Laserv.B",
"Backdoor.Win32.Laserv.b",
"Backdoor.Laserv.B",
"Trojan.Win32.Laserv.csyvps",
"Trojan.Win32.Equation.132608",
"Backdoor.Laserv.B",
"Backdoor.Laserv.B",
"Backdoor.Laserv.Win32.8",
"BKDR_LASSRV.B",
"BehavesLike.Win32.Downloader.ch",
"W32/Backdoor.ZYMS-3992",
"BDS/Laserv.B.2",
"Trojan[Backdoor]/Win32.Laserv",
"Backdoor.Laserv.B",
"Backdoor.W32.Laserv!c",
"Backdoor.Win32.Laserv.b",
"Backdoor:Win32/Salsnit.A",
"Win-Trojan/Equation.132623",
"Backdoor.Laserv.B",
"Trojan.EquationLaser",
"Win32.Backdoor.Laserv.Dvzs",
"Backdoor.Laserv!QkthHIoGFGU",
"Backdoor.Win32.Laserv",
"W32/Laserv.C!tr",
"Win32/Backdoor.21d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"group",
"has",
"evolved",
"a",
"lot",
"in",
"sophistication",
"and",
"evasion",
"techniques",
"to",
"defeat",
"detection",
"by",
"security",
"products."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"choice",
"of",
"a",
"lesser",
"known",
"currency",
"with",
"a",
"good",
"exchange",
"rate",
"allows",
"the",
"attackers",
"to",
"rapidly",
"gain",
"money",
"while",
"the",
"sophisticated",
"use",
"of",
"safeguards",
"makes",
"it",
"resilient",
"to",
"most",
"disruption",
"attempts,",
"potentially",
"leaving",
"victims",
"infected",
"for",
"years."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"For",
"example",
",",
"one",
"commercial",
"obfuscator",
",",
"which",
"cost",
"β¬350",
",",
"was",
"used",
"for",
"Trojans",
"and",
"Opfak.bo",
"Obad.a",
"Android",
"vulnerabilities",
"are",
"used",
"by",
"criminals",
"for",
"three",
"reasons",
":",
"to",
"bypass",
"the",
"code",
"integrity",
"check",
"when",
"installing",
"an",
"application",
"(",
"vulnerability",
"Master",
"Key",
")",
";",
"to",
"enhance",
"the",
"rights",
"of",
"malicious",
"applications",
",",
"considerably",
"extending",
"their",
"capabilities",
";",
"and",
"to",
"make",
"it",
"more",
"difficult",
"to",
"remove",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"From",
"early",
"April",
",",
"hackers",
"started",
"to",
"build",
"a",
"new",
"major",
"update",
"to",
"the",
"β",
"Agent",
"Smith",
"β",
"campaign",
"under",
"the",
"name",
"β",
"leechsdk",
"β",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.