tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dembr",
"Trojan.MBR.Killer",
"Trojan/KillDisk.nas",
"TROJ_KILLMBR.SM",
"Win32.Trojan.WisdomEyes.16070401.9500.9964",
"W32/Jokra.DWCJ-4354",
"Trojan.Jokra",
"Win32/Tnega.ASFM",
"TROJ_KILLMBR.SM",
"Trojan.Win32.EraseMBR.b",
"Trojan.Win32.EraseMBR.cqzdgw",
"Trojan.Win32.S.KillMBR.24576",
"Troj.W32.EraseMBR.b!c",
"Trojan.KillFiles.10563",
"Trojan.EraseMBR.Win32.4",
"W32/Jokra.A",
"Trojan/EraseMBR.h",
"TR/KillMBR.Y.2",
"Trojan/Win32.EraseMBR",
"Trojan.Win32.EraseMBR.b",
"Trojan:Win32/Dembr.A",
"Trojan.KillDisk.MBR",
"OScope.Trojan.KillMBR.2113",
"Trojan.KillDisk.NAS",
"Win32/KillDisk.NAS",
"Trojan.Win32.DataWiper.b",
"Trojan.EraseMBR!+80n0qBNT48",
"Trojan.Win32.EraseMBR",
"W32/Kast.A!tr",
"Win32/Trojan.c81"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"What",
"makes",
"the",
"Turla",
"group",
"special",
"is",
"not",
"just",
"the",
"complexity",
"of",
"its",
"tools,",
"which",
"include",
"the",
"Uroboros",
"rootkit,",
"aka",
"Snake",
"as",
"well",
"as",
"mechanisms",
"designed",
"to",
"bypass",
"air",
"gaps",
"through",
"multi-stage",
"proxy",
"networks",
"inside",
"LANs,",
"but",
"the",
"exquisite",
"satellite-based",
"C",
"C",
"mechanism",
"used",
"in",
"the",
"latter",
"stages",
"of",
"the",
"attack."
] | [
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
3,
11,
16,
3,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
16,
5,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.ExpiroPC.PE",
"Win32.Trojan.WisdomEyes.16070401.9500.9647",
"Heur.Corrupt.PE",
"Trojan.MulDrop3.4445",
"TrojanDownloader:Win32/Cordmix.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"All",
"the",
"malicious",
"Dvmap",
"apps",
"had",
"the",
"same",
"functionality",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16
] |
[
"CSIS",
"provided",
"a",
"(",
"sanitised",
")",
"version",
"of",
"a",
"typical",
"message",
"to",
"warn",
"users",
"what",
"to",
"look",
"out",
"for",
":",
"“",
"You",
"have",
"received",
"a",
"multimedia",
"message",
"from",
"+",
"[",
"country",
"code",
"]",
"[",
"sender",
"number",
"]",
"Follow",
"the",
"link",
"http",
":",
"//www.mmsforyou",
"[",
"."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"To",
"achieve",
"persistence,",
"the",
"malware",
"creates",
"a",
"Run",
"key",
"Registry",
"entry",
"on",
"the",
"system."
] | [
16,
16,
16,
16,
3,
16,
16,
1,
9,
9,
9,
16,
16,
5
] |
[
"Skygofree",
":",
"Following",
"in",
"the",
"footsteps",
"of",
"HackingTeam",
"16",
"JAN",
"2018",
"At",
"the",
"beginning",
"of",
"October",
"2017",
",",
"we",
"discovered",
"new",
"Android",
"spyware",
"with",
"several",
"features",
"previously",
"unseen",
"in",
"the",
"wild",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"industry",
"initiative",
"was",
"created",
"to",
"share",
"information",
"and",
"potentially",
"disrupt",
"the",
"infrastructure",
"and",
"tools",
"from",
"an",
"actor",
"named",
"the",
"Lazarus",
"Group."
] | [
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
3,
16,
16,
6,
16,
16,
6,
14
] |
[
"Initiating",
"the",
"MQTT",
"client",
"."
] | [
16,
16,
16,
16,
16
] |
[
"Primarily",
"targets",
"South",
"Korea."
] | [
16,
4,
2,
10
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Inject.79360.B",
"Trojan.Jinto",
"Trojan/Inject.nzs",
"Trojan.Heur.TP.EDF4BE",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Trojan2.IJVQ",
"TROJ_INJECT.AQT",
"Trojan.Win32.Inject.79360",
"Troj.W32.Inject.nzs!c",
"TrojWare.Win32.Inject.nzs",
"Win32.HLLW.Recycler.8",
"Trojan.Inject.Win32.2004",
"TROJ_INJECT.AQT",
"BehavesLike.Win32.PWSZbot.lh",
"W32/Trojan.PLGK-4123",
"Trojan/Inject.dyx",
"Win32.Troj.Inject.kcloud",
"Trojan:WinNT/Jinto.A",
"BScope.P2P-Worm.Palevo",
"Trojan.Win32.Tdss",
"Win32/Trojan.c68"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"net",
"svc",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader.NSIS.FraudLoad.hd",
"BackDoor.RMS.111",
"BehavesLike.Win32.Dropper.vc",
"W32/Trojan.KGYI-2902",
"TR/RedCap.ntnqc",
"Backdoor:Win32/Kitpolap.A",
"Trojan-Downloader.NSIS.FraudLoad.hd",
"Trojan/Win32.Downloader.C2123311",
"Trj/CI.A",
"NSIS/Radmin.B",
"Win32.Trojan.Ratenjay.Umsg",
"Riskware.RemoteAdmin!"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"domain",
"is",
"similar",
"to",
"the",
"one",
"the",
"malware",
"author",
"used",
"for",
"his",
"adware",
"C",
"&",
"C",
"communication",
",",
"minigameshouse",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"]",
"netupload404",
"[",
"."
] | [
9,
9,
1,
9
] |
[
"For",
"now",
",",
"users",
"can",
"make",
"the",
"best",
"of",
"the",
"knowledge",
"they",
"have",
"now",
"to",
"significantly",
"reduce",
"the",
"effectivity",
"of",
"such",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Two",
"chunks",
"are",
"filled",
"with",
"an",
"asynchronous",
"procedure",
"call",
"(",
"APC",
")",
"routine",
"code",
"and",
"a",
"stub",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.eHeur.Malware00",
"Backdoor.Sharat",
"TROJ_TROXEN.CHU",
"Win32.Trojan.WisdomEyes.16070401.9500.9995",
"TROJ_TROXEN.CHU",
"Win.Trojan.Downbot-3",
"Trojan.DownLoader5.18587",
"Trojan.Heur.RP.EA89AF",
"Downloader/Win32.Small.R1708",
"Win32/Sharat.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"C2",
"servers",
"are",
"shared",
"by",
"multiple",
"samples",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Talos",
"has",
"found",
"a",
"new",
"SPAM",
"campaign",
"that",
"is",
"using",
"multiple",
"layers",
"of",
"obfuscation",
"to",
"attempt",
"to",
"evade",
"detection."
] | [
4,
16,
16,
16,
16,
6,
14,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
16,
16
] |
[
"Package",
"Name",
"App",
"Name",
"com.whatsapp",
"WhatsApp",
"Messenger",
"com.pugna.magiccall",
"n/a",
"org.telegram.messenger",
"Telegram",
"com.facebook.katana",
"Facebook",
"com.twitter.android",
"Twitter",
"jp.naver.line.android",
"LINE",
":",
"Free",
"Calls",
"&",
"Messages",
"com.instanza.cocovoice",
"Coco",
"com.beetalk",
"BeeTalk",
"com.gtomato.talkbox",
"TalkBox",
"Voice",
"Messenger",
"-",
"PTT",
"com.viber.voip",
"Viber",
"Messenger",
"com.immomo.momo",
"MOMO陌陌",
"com.facebook.orca",
"Messenger",
"–",
"Text",
"and",
"Video",
"Chat",
"for",
"Free",
"com.skype.rover",
"Skype",
";",
"3rd",
"party",
"stores",
"only",
"Most",
"of",
"these",
"apps",
"are",
"well",
"established",
"and",
"available",
"on",
"Google",
"Play",
",",
"however",
",",
"com.skype.rover",
"appears",
"to",
"be",
"available",
"only",
"on",
"third-party",
"app",
"stores",
"."
] | [
16,
16,
16,
16,
1,
5,
5,
1,
16,
1,
5,
1,
5,
1,
5,
1,
5,
16,
16,
16,
16,
16,
1,
16,
1,
5,
1,
5,
16,
5,
16,
16,
1,
5,
5,
1,
5,
1,
5,
16,
16,
16,
16,
16,
16,
16,
1,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"spear-phishing",
"campaigns",
"we",
"detected",
"use",
"links",
"to",
"RAR-compressed",
"executables",
"and",
"Microsoft",
"Word",
"attachments",
"that",
"exploit",
"the",
"CVE-2012-0158",
"vulnerability."
] | [
16,
6,
14,
16,
16,
16,
1,
16,
1,
9,
16,
1,
9,
9,
16,
3,
16,
1,
7
] |
[
"Our",
"research",
"team",
"has",
"found",
"infected",
"apps",
"on",
"third-party",
"app",
"stores",
",",
"but",
"they",
"could",
"also",
"be",
"downloaded",
"by",
"Android",
"users",
"directly",
"by",
"tapping",
"malicious",
"links",
"in",
"phishing",
"attack",
"messages",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"FireEye",
"Labs",
"recently",
"identified",
"a",
"previously",
"unobserved",
"version",
"of",
"Ploutus,",
"dubbed",
"Ploutus-D,",
"that",
"interacts",
"with",
"KAL's",
"Kalignite",
"multivendor",
"ATM",
"platform."
] | [
4,
12,
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
15,
16,
16,
4,
5,
13,
13,
13
] |
[
"This",
"feature",
"was",
"enabled",
"only",
"in",
"newer",
"versions",
"of",
"TrickMo",
"that",
"were",
"tailored",
"specifically",
"for",
"German",
"banks",
"and",
"use",
"a",
"special",
"application",
"for",
"implementing",
"TAN-based",
"2FA",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAdware.6E79",
"Application.Bundler.InstallBrain.A",
"Application.Bundler.InstallBrain.A",
"Win32.Adware.InstallBrain.d",
"Win.Adware.Installbrain-35",
"Win32.Application.InstallBrain.B",
"not-a-virus:AdWare.Win32.BrainInst.u",
"Application.Bundler.InstallBrain.A",
"Trojan.Win32.Adw.crasga",
"Application.Bundler.InstallBrain.A",
"Application.Win32.InstallBrain.BL",
"Trojan:W32/InstallBrain.A",
"Adware.Downware.1295",
"Adware.BrainInst.Win32.32",
"AdWare.Win32.InstallBrain",
"AdWare/BrainInst.dz",
"W32.Adware.Installbrain",
"GrayWare[AdWare:not-a-virus]/Win32.BrainInst.u",
"TrojanDownloader:Win32/Brantall.B",
"PUP.InstallBrain/Variant",
"not-a-virus:AdWare.Win32.BrainInst.u",
"AdWare.BrainInst",
"PUP.Optional.InstallBrain",
"Win32.Adware.Braininst.Wvas",
"Adware.BrainInst!"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"an",
"e-mail",
",",
"a",
"Lookout",
"representative",
"stood",
"by",
"its",
"analysis",
"and",
"said",
"company",
"researchers",
"planned",
"to",
"publish",
"an",
"in-depth",
"response",
"in",
"the",
"coming",
"days",
"."
] | [
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Beyond",
"the",
"Android",
"app",
"itself",
",",
"other",
"components",
"such",
"as",
"the",
"aforementioned",
"ELF",
"libraries",
"have",
"additional",
"data-stealing",
"capabilities",
"."
] | [
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"makes",
"Dvmap",
"the",
"first",
"Android",
"malware",
"that",
"injects",
"malicious",
"code",
"into",
"the",
"system",
"libraries",
"in",
"runtime",
",",
"and",
"it",
"has",
"been",
"downloaded",
"from",
"the",
"Google",
"Play",
"Store",
"more",
"than",
"50,000",
"times",
"."
] | [
16,
16,
3,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16
] |
[
"The",
"C",
"&",
"C",
"address",
"and",
"the",
"encryption",
"key",
"(",
"one",
"for",
"different",
"modifications",
"in",
"versions",
"4.x",
"and",
"5.x",
",",
"and",
"distinct",
"for",
"different",
"C",
"&",
"Cs",
"in",
"later",
"versions",
")",
"are",
"stitched",
"into",
"the",
"body",
"of",
"the",
"Trojan",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Interestingly,",
"as",
"part",
"of",
"the",
"delivery",
"mechanism,",
"the",
"malware",
"is",
"disguised",
"as",
"a",
"base64",
"digital",
"certificate",
"and",
"decoded",
"via",
"certutil.exe."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
1,
9,
9,
9,
16,
1,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Backdoor.Zegost.B.5",
"Trojan/Redosdru.aw",
"Backdoor.Bapkri",
"TrojWare.Win32.GameThief.Magania.~NWABI",
"Dialer.Bjlog",
"Backdoor.Win32.Zegost!IK",
"Backdoor/Win32.Bapkri",
"Backdoor.Win32.Drwolf.fep",
"Backdoor.Win32.Zegost",
"W32/Bjlog.SMC!tr",
"PSW.OnlineGames3.WQF"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader.Win32.Banload.bppx",
"Trojan.Win32.A.Downloader.279193",
"Trojan.Qhost.3874",
"Downloader.Banload.Win32.43263",
"Trojan[Downloader]/Win32.Banload",
"Trojan-Downloader.Win32.Banload.bppx",
"TrojanDownloader:Win32/Servi.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"''",
"We",
"determined",
"that",
"the",
"\"",
"eCommon",
"''",
"file",
"contains",
"support",
"code",
"and",
"structures",
"that",
"are",
"platform",
"independent",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.Kryptik.qb",
"Trojan:Win32/Sopinar.D",
"SScope.Malware-Cryptor.Drixed"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.FakeGom.13314",
"Backdoor.Miancha.r5",
"Backdoor.Miancha!",
"W32/Backdoor2.HTKG",
"Backdoor.Miancha",
"TROJ_DROPPR.YZ",
"Backdoor.Win32.Miancha.b",
"Trojan.Win32.Miancha.dxrsks",
"Backdoor.W32.Miancha.b!c",
"Win32.Backdoor.Miancha.Jcq",
"Backdoor:W32/Miancha.A",
"BackDoor.Miancha.1",
"Backdoor.Miancha.Win32.4",
"TROJ_DROPPR.YZ",
"W32/Backdoor.IZWZ-3837",
"Backdoor/Miancha.a",
"TR/Miancha.A.1",
"Trojan:Win32/Miancha.A",
"Backdoor.Miancha",
"Backdoor.Win32.Miancha",
"Backdoor.Win32.Miancha.b",
"Win32/Backdoor.3e8"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"To",
"evade",
"detection,",
"this",
"app",
"was",
"concealed",
"as",
"a",
"legitimate",
"app."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"recent",
"months,",
"Unit",
"42",
"has",
"observed",
"a",
"number",
"of",
"attacks",
"that",
"we",
"attribute",
"to",
"this",
"group."
] | [
16,
0,
8,
6,
14,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
4
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.System3YM.Worm",
"Worm.Win32.AutoRun!O",
"Worm.Tupym.A5",
"W32/Tupym.worm",
"Worm.AutoRun.FLD",
"Worm.Autorun.Win32.63738",
"Trojan.Heur.AutoIT.2",
"Win32.Trojan.WisdomEyes.16070401.9500.9892",
"W32.Svich",
"Win32/Yahlover.PT",
"WORM_SOHAND.SM",
"Win.Worm.Autorun-313",
"Worm.Win32.AutoRun.fnc",
"Trojan.Script.Autorun.ddaffd",
"W32.W.AutoRun.llU2",
"TrojWare.Win32.Injector.XEM",
"Trojan.StartPage.31354",
"WORM_SOHAND.SM",
"BehavesLike.Win32.Tupym.tz",
"Worm.Win32.AutoRun",
"Worm:Win32/Tupym.A",
"Worm:Win32/Tupym.A",
"Worm.Win32.AutoRun.fnc",
"HEUR/Fakon.mwf",
"Worm.Win32.Autorun.fnc",
"Trojan.Autorun!VgV/xk+eV94",
"W32/AutoVt.AAAD!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Like",
"previously",
"added",
"functionality",
",",
"the",
"code",
"is",
"borrowed",
"from",
"the",
"leaked",
"Anubis",
"Trojan",
"source",
"code",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.G.Door.2.0",
"Backdoor/W32.Hupigon.495616.Q",
"Backdoor.G.Door.2.0",
"Backdoor/G_Door.20",
"Backdoor.G.Door.2.0",
"Trojan.Win32.GDoor.dhmh",
"W32/GDoor.HMGD-8120",
"Backdoor.Trojan",
"Win32/G_Door.A",
"BKDR_GLACIER.A",
"Trojan.G_Door.E",
"Backdoor.Win32.G_Door.83",
"Backdoor.G_Door!J6XAtZWeqBw",
"Backdoor.Win32.G-Door_20.Svr[h]",
"Backdoor.W32.G_Door.20!c",
"Backdoor.G.Door.2.0",
"Backdoor.Win32.G_Door.A",
"Backdoor.G.Door.2.0",
"BackDoor.GDoor.20",
"Backdoor.GDoor.Win32.23",
"BKDR_GLACIER.A",
"BackDoor-FR.svr",
"W32/GDoor.D",
"TR/GDoor.Srv",
"W32/Gdoor.F!tr.bdr",
"Trojan[Backdoor]/Win32.G_Door",
"Backdoor.G.Door.2.0",
"BackDoor-FR.svr",
"Backdoor.G_Door",
"Bck/G_Door.I",
"Win32.Backdoor.G_door.Szbj",
"Backdoor.Win32.G_Door",
"Backdoor.G.Door.2.0",
"Backdoor.Win32.G_Door.83",
"Win32/Trojan.a6d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Before",
"we",
"start",
"dishing",
"the",
"details,",
"there",
"is",
"going",
"to",
"be",
"one",
"main",
"takeaway",
"from",
"this",
"blog",
"post:",
"If",
"you",
"haven't",
"already,",
"update/patch",
"your",
"Adobe",
"Flash",
"now."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"Charger",
",",
"however",
",",
"uses",
"a",
"heavy",
"packing",
"approach",
"which",
"it",
"harder",
"for",
"the",
"malware",
"to",
"stay",
"hidden",
",",
"so",
"it",
"must",
"compensate",
"with",
"other",
"means",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Exploit/W97.CVE-2012-0158",
"Exp.OLE.CVE-2012-0158.E",
"Win32.Exploit.CVE-2012-0158.l",
"Doc.Exploit.CVE_2012_0158-17",
"Exploit.MSWord.CVE-2012-0158.de",
"Exploit.ComObj.CVE-2012-0158.hzuf",
"Exploit.WORD.CVE-2012-0158.A",
"EXPL_MSCOMCTL.A",
"Trojan.EKOP-3",
"EXP/CVE-2012-0158.hgyuv",
"Trojan[Exploit]/MSWord.CVE-2012-0158.de",
"Exploit.MSWord.CVE-2012-0158.de",
"Exploit.CVE-2012-0158",
"MSWord/Toolbar.A!exploit",
"virus.exp.20120158"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Banito.AQ",
"Backdoor.Banito.ae.n3",
"Backdoor/Banito.aq",
"Backdoor.Banito!msfCf/FWzGs",
"W32/Banito.AI",
"BKDR_BANITO.BE",
"Backdoor.Win32.Banito.bt",
"Backdoor.Banito.AQ",
"Backdoor.Win32.Banito",
"Backdoor.Banito.AQ",
"BackDoor.Faggoty",
"BKDR_BANITO.BE",
"Backdoor.Win32.Banito!IK",
"Backdoor/Banito.ao",
"Backdoor:Win32/Banito.D",
"Backdoor.Win32.Banito.54784.F[UPX]",
"Backdoor.Banito.AQ",
"Win-Trojan/Banito.54784.D",
"OScope.Backdoor.Banito.1",
"Backdoor.Win32.Banito",
"W32/Banito.AJ!tr.bdr",
"Bck/Banito.AT"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"W32/NionSpy",
"is",
"a",
"family",
"of",
"malware",
"that",
"steals",
"information",
"from",
"infected",
"machines",
"and",
"replicates",
"to",
"new",
"machines",
"over",
"networks",
"and",
"removable",
"thumb",
"drives."
] | [
1,
16,
16,
16,
16,
3,
16,
1,
9,
16,
16,
5,
16,
16,
16,
16,
5,
16,
16,
16,
5,
13,
13
] |
[
"Domain",
"names",
"registered",
"by",
"the",
"Fancy",
"Bear",
"actor"
] | [
1,
16,
16,
16,
6,
14,
14,
14
] |
[
"Early",
"in",
"March,",
"while",
"studying",
"the",
"ChinaZ",
"threat,",
"it",
"became",
"readily",
"apparent",
"that",
"default",
"passwords",
"were",
"being",
"used",
"for",
"more",
"than",
"just",
"a",
"supplementary",
"attack",
"vector."
] | [
0,
8,
8,
16,
16,
16,
6,
14,
16,
16,
16,
16,
15,
1,
9,
9,
9,
9,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"The",
"vulnerability",
"does",
"not",
"enable",
"the",
"execution",
"of",
"arbitrary",
"code",
"but",
"the",
"exploit",
"was",
"able",
"to",
"inject",
"a",
"JavaScript",
"payload",
"into",
"the",
"local",
"file",
"context."
] | [
16,
7,
16,
16,
16,
16,
16,
16,
7,
15,
16,
16,
3,
16,
16,
16,
16,
16,
7,
3,
16,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Virus.Multi.Moridin!O",
"W32.Moridin.B",
"PE_MORIDIN.A",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32.Morodi.A",
"PE_MORIDIN.A",
"Win.Trojan.Morid-5",
"Virus.Multi.Moridin.b",
"Win32.Moridin.A",
"Virus.Multi.Moridin!c",
"Heur.Packed.Unknown",
"Win32.Moridin",
"Virus.Moridin.Win32.2",
"BehavesLike.Win32.Ipamor.cm",
"W32/Trojan.BIOB-8512",
"TR/Moridin.B.2",
"Win32.Multi.b.106496",
"Trojan.Heur.FU.EB24AD",
"Virus.Multi.Moridin.b",
"Virus.Multi.Moridin",
"W32/Moridin.72192",
"Win32.Virus.Moridin.Dzkb",
"IRC.Moridin.B",
"Trojan-Dropper.Win32.Loring",
"W32/Moridin.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Multiple",
"versions",
"of",
"Regin",
"were",
"found",
"in",
"the",
"wild,",
"targeting",
"several",
"corporations,",
"institutions,",
"academics,",
"and",
"individuals."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
4
] |
[
"System",
"application",
"installed",
"by",
"mcpef.apk",
"."
] | [
16,
16,
16,
16,
1,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clod90c.Trojan.0a13",
"Trojan.BHO.ODS",
"Trojan-Clicker/W32.BHO.20480.L",
"TrojanDropper.Nonaco",
"Trojan.BHO",
"Riskware.Win32.E404.fyxw",
"W32/Downldr2.HQQK",
"Win32/Puper.RK",
"Trojan.BHO.ODS",
"Adware.BHO!Ut7EPOdXbSM",
"Adware.E404.20480.B",
"Trojan.BHO.ODS",
"Trojan.BHO.ODS",
"Trojan.Popuper.43732",
"Spyware[AdWare:not-a-virus]/Win32.BHO",
"TrojanDropper:Win32/Nonaco.C",
"Trojan.BHO.ODS",
"W32/Downloader.GJMR-1771",
"Trojan.Win32.Dbg",
"AdWare.Win32.BHO.aNN",
"Win32/BHO.NHP",
"not-a-virus:AdWare.Win32.E404"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.RazyNHmA.Trojan",
"Win32.Trojan.Kryptik.ayq",
"TSPY_HPZBOT.SM1",
"TrojWare.Win32.DorkBot.LB",
"TSPY_HPZBOT.SM1",
"BehavesLike.Win32.RansomTescrypt.ch",
"Trojan.Win32.Crypt",
"TR/Crypt.Xpack.itdny",
"Trojan.Symmi.D1129F",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Based",
"on",
"our",
"research",
"that",
"we",
"will",
"further",
"outline",
"below,",
"attackers",
"behind",
"the",
"outages",
"in",
"two",
"power",
"facilities",
"in",
"Ukraine",
"in",
"December",
"likely",
"attempted",
"similar",
"attacks",
"against",
"a",
"mining",
"company",
"and",
"a",
"large",
"railway",
"operator",
"in",
"Ukraine."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
4,
12,
16,
2,
16,
0,
16,
16,
16,
1,
16,
16,
4,
12,
16,
16,
16,
4,
12,
16,
2
] |
[
"The",
"group",
"behind",
"these",
"attacks",
"is",
"known",
"as",
"Dragonfly."
] | [
6,
14,
16,
16,
1,
16,
16,
16,
6
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Application.iStartSurf.1",
"Application.iStartSurf.1",
"Win32.Trojan.WisdomEyes.16070401.9500.9915",
"NSIS/TrojanDownloader.Adload.AQ",
"not-a-virus:HEUR:AdWare.Win32.AdLoad.heur",
"Application.iStartSurf.1",
"Riskware.Nsis.Adload.dtchzc",
"Adware.W32.Adload!c",
"Trojan.Vittalia.1482",
"BehavesLike.Win32.AdwareAdload.tc",
"TR/Dldr.Adload.1839597.7",
"TrojanDownloader:Win32/Quireap.A",
"not-a-virus:HEUR:AdWare.Win32.AdLoad.heur",
"PUP/Win32.Adload.R155445",
"Trj/CI.A",
"NSIS.Adware.Adload.V"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"have",
"seen",
"multiple",
"Elirks",
"variants",
"using",
"Japanese",
"blog",
"services",
"for",
"the",
"last",
"couple",
"of",
"years."
] | [
16,
16,
16,
16,
3,
11,
16,
1,
9,
9,
11,
16,
0,
8,
8,
8
] |
[
"Its",
"data-stealing",
"capabilities",
"include",
"collecting",
"SMSs",
"after",
"receiving",
"an",
"SMS-related",
"broadcast",
"event",
"and",
"covertly",
"recording",
"phone",
"calls",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"C",
"&",
"C",
"communications",
"The",
"default",
"C",
"&",
"C",
"address",
"is",
"hardwired",
"in",
"the",
"Rotexy",
"code",
":",
"The",
"relative",
"address",
"to",
"which",
"the",
"Trojan",
"will",
"send",
"information",
"from",
"the",
"device",
"is",
"generated",
"in",
"a",
"pseudo-random",
"manner",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Symantec",
"telemetry",
"revealed",
"an",
"exploit",
"hosted",
"on",
"the",
"compromised",
"site,",
"which",
"was",
"used",
"to",
"infect",
"visitors",
"with",
"the",
"Korplug",
"back",
"door",
"detected",
"by",
"Symantec",
"as",
"Backdoor.Korplug."
] | [
4,
5,
16,
16,
3,
16,
16,
16,
7,
1,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
11,
16,
16,
4,
16,
1
] |
[
"This",
"campaign",
"uses",
"obfuscated",
"variants",
"of",
"the",
"HTTPBrowser",
"tool",
"that",
"use",
"DNS",
"as",
"a",
"control",
"channel."
] | [
16,
6,
16,
16,
16,
16,
16,
3,
11,
16,
16,
1,
16,
16,
1,
9
] |
[
"Apart",
"from",
"injecting",
"code",
"to",
"read",
"the",
"CAPTCHA",
",",
"the",
"app",
"also",
"injects",
"its",
"own",
"code",
"into",
"the",
"system_server",
"process",
",",
"which",
"requires",
"root",
"privileges",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"STRONTIUM",
"has",
"been",
"active",
"since",
"at",
"least",
"2007."
] | [
6,
16,
16,
16,
16,
16,
16,
0
] |
[
"Figure",
"12",
":",
"Fake",
"Bank",
"Austria",
"Security",
"application",
"icon",
"In",
"addition",
"to",
"operating",
"as",
"a",
"banking",
"Trojan",
",",
"overlaying",
"a",
"legitimate",
"banking",
"app",
"with",
"an",
"indistinguishable",
"credential",
"theft",
"page",
",",
"the",
"malware",
"also",
"asks",
"for",
"credit",
"card",
"information",
"from",
"the",
"user",
"when",
"they",
"open",
"applications",
"such",
"as",
"the",
"Google",
"Play",
"store",
"."
] | [
16,
16,
16,
5,
13,
13,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16
] |
[
"Check",
"Point",
"informed",
"the",
"Google",
"Security",
"team",
"about",
"the",
"apps,",
"which",
"were",
"then",
"removed",
"from",
"Google",
"Play."
] | [
4,
12,
16,
16,
4,
12,
12,
16,
16,
5,
16,
16,
16,
16,
16,
4,
12
] |
[
"Finally,",
"this",
"variant",
"also",
"contains",
"an",
"interesting",
"piece",
"of",
"comment",
"by",
"the",
"malware",
"author",
"written",
"in",
"the",
"macro",
"code,",
"which",
"made",
"us",
"feel",
"obliged",
"to",
"take",
"a",
"closer",
"look",
"in",
"the",
"first",
"place."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"JavaScript",
"code",
"locates",
"the",
"targeted",
"ads",
"by",
"searching",
"for",
"iframes",
"which",
"contain",
"ads",
"from",
"Google",
"ads",
"infrastructure",
",",
"as",
"shown",
"in",
"the",
"image",
"below",
":",
"The",
"fraudulent",
"clicks",
"generate",
"a",
"large",
"revenue",
"for",
"the",
"perpetrators",
",",
"especially",
"since",
"the",
"malware",
"reached",
"a",
"presumably",
"wide",
"spread",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"APT",
"groups",
"from",
"multiple",
"countries",
"-",
"including",
"China",
"-",
"have",
"been",
"known",
"to",
"target",
"organizations",
"of",
"strategic",
"interest",
"with",
"aggressive",
"malware-based",
"espionage",
"campaigns."
] | [
6,
14,
16,
16,
2,
16,
16,
2,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
6,
14,
14
] |
[
"Back",
"then,",
"MELANI",
"already",
"took",
"appropriate",
"action",
"together",
"with",
"the",
"affected",
"financial",
"institutions",
"and",
"ISPs",
"in",
"Switzerland",
"to",
"mitigate",
"the",
"threat."
] | [
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
4,
16,
2,
16,
16,
16,
16
] |
[
"The",
"credentials",
"were",
"immediately",
"available",
"in",
"the",
"leaky",
"database",
"–",
"see",
"Figure",
"6",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Arsenal",
"is",
"currently",
"developing",
"a",
"detailed",
"case",
"study",
"related",
"to",
"our",
"analysis",
"of",
"computers",
"essential",
"to",
"the",
"Odatv",
"case",
"in",
"Turkey."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
2
] |
[
"Another",
"day,",
"another",
"ransomware",
"gang."
] | [
0,
8,
16,
6,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9780",
"BehavesLike.Win32.StartPage.th",
"Trojan-Dropper.Win32.Autoit",
"Trojan.AutoIT.7",
"TrojanDropper.Autit",
"Autoit.Trojan.Heur.Sxyf"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"This",
"is",
"the",
"exact",
"scenario",
"we",
"witnessed",
"this",
"week",
"during",
"an",
"incident",
"response",
"procedure",
"and",
"that",
"is",
"detailed",
"in",
"this",
"diary."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"How",
"it",
"works",
"When",
"the",
"malware",
"is",
"first",
"started",
"on",
"the",
"device",
"it",
"will",
"begin",
"by",
"removing",
"its",
"icon",
"from",
"the",
"app",
"drawer",
",",
"hiding",
"from",
"the",
"end",
"user",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Buckeye",
"also",
"known",
"as",
"APT3,",
"Gothic",
"Panda,",
"UPS",
"Team,",
"and",
"TG-0110",
"is",
"a",
"cyberespionage",
"group",
"that",
"is",
"believed",
"to",
"have",
"been",
"operating",
"for",
"well",
"over",
"half",
"a",
"decade."
] | [
6,
16,
16,
16,
6,
14,
14,
14,
14,
16,
6,
16,
16,
6,
14,
15,
16,
16,
16,
16,
16,
16,
16,
16,
16,
0,
8,
8
] |
[
"Looking",
"at",
"the",
"characteristics",
"of",
"the",
"tool,",
"we",
"suspect",
"that",
"it",
"has",
"been",
"prepared",
"for",
"the",
"purpose",
"of",
"corporate",
"espionage."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoA.29F2",
"Backdoor.Win32.Poison!O",
"TrojanDropper.VB",
"BKDR_POISON.IRE",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Backdoor.Trojan",
"Win32/IRCBot.ACS",
"BKDR_POISON.IRE",
"Trojan-Dropper.Win32.VB.cwek",
"Trojan.Win32.Poison.cqxwv",
"Backdoor.Win32.Poison.146621",
"Backdoor.W32.Poison.bfjd!c",
"Backdoor.Win32.Poison.fh",
"Trojan.VbCrypt.68",
"Backdoor.Poison.Win32.31435",
"BehavesLike.Win32.Autorun.ch",
"Backdoor/Poison.goa",
"Trojan[Backdoor]/Win32.Poison",
"Trojan-Dropper.Win32.VB.cwek",
"Worm:Win32/Neubreku.C",
"SIM.Trojan.VBO.02298",
"Bck/Poison.AK",
"Win32.Trojan-dropper.Vb.Aenv",
"Backdoor.Win32.Bifrose",
"W32/VBInjector.W!tr",
"Win32/Trojan.Dropper.b73"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"RATs,",
"such",
"as",
"H-W0rm,",
"njRAT,",
"KilerRAT,",
"DarkComet,",
"Netwire,",
"XtremeRAT,",
"JSocket/AlienSpy/Adwind",
"and",
"others,",
"hold",
"special",
"interest",
"for",
"the",
"Threat",
"Research",
"Team",
"at",
"Fidelis",
"Cybersecurity."
] | [
3,
16,
16,
3,
11,
11,
11,
11,
11,
11,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Android.Trojan.RootSmart.A",
"Android.GGSmart.A",
"Android.Malware.Trojan",
"A.H.Rog.RootSmart.B",
"Android.Trojan.GGSmart.d",
"AndroidOS/GGSmart.A",
"AndroidOS_RootSmart.D",
"Android.Trojan.RootSmart.A",
"HEUR:Backdoor.AndroidOS.RootSmart.a",
"Android.Trojan.RootSmart.A",
"Trojan.Android.RootSmart.bdbwsm",
"Riskware.Android.FakeInstall.jab",
"Trojan-Downloader:Android/RootSmart.A",
"Android.Smart.4.origin",
"AndroidOS_RootSmart.D",
"AndroidOS/GGSmart.A",
"Backdoor/AndroidOS.erl",
"ANDROID/GGSmart.D.4",
"Trojan[Backdoor]/Android.RootSmart",
"Android.Troj.GacBlocker.a.kcloud",
"Android.Trojan.RootSmart.A",
"HEUR:Backdoor.AndroidOS.RootSmart.a",
"Android-Backdoor/RootSmart.1bb6",
"Android/GGSmart.D",
"Trojan.AndroidOS.GGSmart",
"Android/GGSmart.D!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Exp.XML.CVE-2017-8570",
"W97M.Downloader",
"Win32/Exploit.CVE-2017-8570.A",
"TROJ_CVE20170199.JEJOPP",
"Exploit.Xml.CVE-2017-0199.equmby",
"PPT.S.Exploit.1356909",
"TROJ_CVE20170199.JEJOPP",
"ZIP/Trojan.CGYR-2",
"XML/Dloader.S2",
"Exploit.CVE-2017-8570",
"MSOffice/Dloader!exploit.CVE20170199"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"No",
"instances",
"of",
"these",
"apps",
"were",
"found",
"in",
"Google",
"Play",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.PasswordStealer",
"Trojan.Win32.Ric.exqwlt",
"Trojan.Win32.Z.Evrial.35328.F",
"Trojan.MulDrop7.60168",
"Trojan.MSIL.PSW",
"TrojanSpy:MSIL/Evrial.A!bit",
"TScope.Trojan.MSIL",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Some",
"emulators",
"build",
"their",
"phone",
"number",
"out",
"of",
"the",
"default",
"number",
"created",
"in",
"the",
"emulator",
"software",
"and",
"the",
"port",
"number",
":",
"5554.",
"getMachine",
"function",
"using",
"anti-emulator",
"technique",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Abuse-Worry/W32.NetPass.466944",
"Trojanspy.Vlogger.A3",
"Trojan/Spy.VB.nwb",
"Trojan.Heur.RX.EB6D33",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"Win32/VBInject.Stub",
"Trojan.Win32.Diss.susqi",
"Tool.NetPass.Win32.2684",
"Trojan[PSWTool]/Win32.NetPass",
"PWS:Win32/Sifre.A",
"Trojan.Win32.Diss.susqi",
"Trojan/Win32.Sifre.R148157",
"Win32.Trojan.Diss.Lplb",
"Riskware.PSWTool!",
"Trojan.Win32.VB"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Exploit-CVE2012-0158.u",
"Trojan.Mdropper",
"TROJ_CVE20120158.MESD",
"Exploit.Win32.CVE-2012-0158.aw",
"Exploit.ComObj.CVE-2012-0158.hzuf",
"Exploit.W32.Cve!c",
"Exploit.Mht.1",
"TROJ_CVE20120158.MESD",
"Trojan:Win32/Knonyme.CS!dha",
"Exploit.WORD.CVE-2012-0158",
"Exploit.MSWord.CVE-2012-0158",
"Win32/Trojan.Exploit.a11"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"As",
"2016",
"comes",
"to",
"a",
"close,",
"we",
"observe",
"the",
"same",
"thing",
"happening",
"to",
"another",
"of",
"Nintendo's",
"game",
"properties:",
"Super",
"Mario."
] | [
16,
0,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
5,
13,
13,
13
] |
[
"According",
"to",
"SimilarWeb,",
"these",
"sites",
"have",
"a",
"combined",
"total",
"of",
"at",
"least",
"50",
"million",
"visitors",
"per",
"month."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"These",
"emails",
"contain",
"misleading",
"links",
"that",
"download",
"malicious",
"Zip",
"files,",
"which,",
"in",
"turn,",
"contain",
"a",
"JavaScript",
"file",
"that",
"downloads",
"the",
"TorrentLocker",
"ransomware."
] | [
16,
1,
16,
16,
1,
16,
1,
9,
9,
9,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
3,
11
] |
[
"At",
"this",
"time",
",",
"the",
"Trojan",
"also",
"began",
"actively",
"using",
"different",
"methods",
"of",
"obfuscation",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Unit",
"42",
"has",
"discovered",
"a",
"new",
"cluster",
"of",
"malware",
"samples,",
"which",
"targets",
"Samsung",
"devices",
"and",
"Korean",
"language",
"speakers,",
"with",
"relationships",
"to",
"the",
"malware",
"used",
"in",
"Operation",
"Blockbuster."
] | [
4,
12,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
5,
13,
16,
4,
12,
12,
16,
16,
16,
3,
11,
16,
16,
6,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win.Trojan.Secrar-3",
"W32.W.Otwycal.l4av",
"PUA.RiskWare.PEMalform",
"Trojan:Win32/Secrar.A",
"Win32/RiskWare.PEMalform.E"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Scache.A",
"Trojan.Scache.A",
"Trojan.Scache.A",
"Trojan.Scache.A",
"Trojan.Dos.Scache.fnss",
"TROJ_SCACHE.A",
"Trojan.DOS.Scache",
"Troj.DOS.Scache!c",
"Trojan.Scache.A",
"TrojWare.DOS.Scache",
"Trojan.Scache.A",
"Trojan.Cashe",
"Trojan.Scache.DOS.2",
"TROJ_SCACHE.A",
"TR/Scache.A",
"W32/Scache.A!tr",
"Trojan/DOS.Scache",
"Trojan.Scache.A",
"Dos.Trojan.Scache.Aguy",
"Trojan.Scache.A",
"Trojan.DOS.Scache.aa"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"One",
"of",
"the",
"unique",
"features",
"of",
"the",
"malware",
"is",
"that",
"it",
"retrieves",
"its",
"C2",
"address",
"by",
"accessing",
"a",
"pre-determined",
"microblog",
"service",
"or",
"SNS."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
15,
16,
16,
16,
1,
9,
16,
16,
16,
16,
1,
9,
16,
5
] |
[
"This",
"makes",
"it",
"a",
"powerful",
"tool",
"for",
"attackers."
] | [
16,
16,
16,
16,
16,
16,
16,
6
] |
[
"Call",
"an",
"attacker-specified",
"number",
"Uninstall",
"apps",
"Check",
"if",
"a",
"device",
"is",
"rooted",
"Hide",
"its",
"icon",
"Retrieve",
"list",
"of",
"files",
"on",
"external",
"storage",
"If",
"running",
"on",
"a",
"Huawei",
"device",
"it",
"will",
"attempt",
"to",
"add",
"itself",
"to",
"the",
"protected",
"list",
"of",
"apps",
"able",
"to",
"run",
"with",
"the",
"screen",
"off",
"Encrypts",
"some",
"exfiltrated",
"data",
"Desert",
"Scorpion",
"'s",
"second",
"stage",
"masquerades",
"as",
"a",
"generic",
"\"",
"settings",
"''",
"application",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"calls",
"are",
"almost",
"certainly",
"a",
"pro-Russia",
"propaganda",
"effort",
"designed",
"to",
"create",
"negative",
"political",
"content",
"about",
"those",
"who",
"have",
"spoken",
"out",
"against",
"Russian",
"President",
"Vladimir",
"Putin",
"and,",
"in",
"the",
"last",
"year,",
"opposed",
"Russia's",
"invasion",
"of",
"Ukraine."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
16,
16,
0,
8,
8,
16,
16,
16,
16,
2
] |
[
"While",
"these",
"attacks",
"were",
"covered",
"extensively",
"in",
"the",
"media,",
"how",
"the",
"attackers",
"stole",
"these",
"credentials",
"and",
"introduced",
"W32.Disttrack",
"on",
"targeted",
"organizations'",
"networks",
"remains",
"a",
"mystery."
] | [
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
6,
1,
16,
1,
16,
16,
1,
16,
16,
4,
12,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9990",
"W32.Sand.12300",
"Virus.Win32.HLLP.Alcaul.c",
"Virus.Win32.HLLP.Alcaul.D",
"Win32.HLLP.Alcopaul.12296",
"Win32.NGVCK.TTD",
"Win32/HLLP.Alcaul.c",
"W32/Alcaul.D",
"Virus.Win32.HLLP.Alcaul.c",
"Worm:Win32/Lopy.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.