tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.eHeur.Malware14",
"Win32.Malware!Drop",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"Trojan-Downloader.Win32.Upatre.gqes",
"Trojan.Win32.KillProc.expayv",
"TrojWare.Win32.GozNym.AA",
"Trojan.KillProc.54838",
"Downloader.Upatre.Win32.65195",
"Trojan.Win32.Tofsee",
"Trojan.Banker.GozNym.gs",
"TR/Crypt.Xpack.sqizh",
"Backdoor:Win32/Tofsee.T",
"Trojan-Downloader.Win32.Upatre.gqes",
"Win32.Malware!Drop",
"Backdoor.PasswordStealer",
"Trj/GdSda.A",
"Win32/Tofsee.BJ",
"W32/Kryptik.GCVH!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"attack",
"leveraged",
"malware",
"we",
"called",
"BlackLambert',",
"which",
"was",
"used",
"to",
"target",
"a",
"high",
"profile",
"organization",
"in",
"Europe."
] | [
16,
16,
16,
3,
16,
16,
3,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
2
] |
[
"Bluetooth",
"β",
"which",
"allows",
"the",
"interaction",
"with",
"the",
"Bluetooth",
"interface",
",",
"and",
"net/deacon",
"β",
"which",
"implements",
"a",
"beaconing",
"system",
"based",
"on",
"UDP",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BDS/Flood.IRC.2",
"MemScan:Trojan.Flooder.I",
"IRC.Flood",
"Trojan.Flood",
"BackDoor.Ircbot.BCV",
"IRC.Flood",
"IRC.Flood",
"Trojan.Backdoor.Flood.IRC.2"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Scar.28672.J",
"Win32.Trojan.Scar.aeru.4.Pack",
"Trojan/Scar.aeru",
"Trojan.Scar.AEY",
"W32/Tibs.DOHY",
"Trojan.Win32.Scar.aeru",
"TrojWare.Win32.Scar.BA",
"Win32/SillyAutorun.CVZ",
"Trojan/Scar.axz",
"Trojan/Win32.Scar",
"Trojan.Win32.Scar!IK",
"TrojanDownloader:Win32/Yibohbin.A",
"Trojan.Win32.Scar.28672.I",
"Win-Trojan/Scar.28672.AH",
"Trojan.Win32.Scar.aeru",
"Trojan.DL.Win32.Tiny.bug",
"Trojan.Win32.Scar",
"Trj/Scar.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"is",
"usually",
"done",
"in",
"order",
"to",
"validate",
"the",
"target",
"of",
"a",
"new",
"infection",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"fake",
"notification",
"tactic",
"is",
"used",
"to",
"redirect",
"the",
"user",
"'s",
"attention",
",",
"meanwhile",
"the",
"app",
"hides",
"itself",
",",
"making",
"the",
"user",
"believe",
"the",
"app",
"to",
"be",
"faulty",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"First",
",",
"it",
"will",
"get",
"the",
"β",
"nativenumber",
"β",
"variable",
"from",
"the",
"β",
"telmark",
"β",
"value",
"of",
"β",
"AndroidManifest.xml",
"β",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"Figure",
"4",
"β",
"Checking",
"for",
"installed",
"apps",
"Based",
"on",
"a",
"thorough",
"analysis",
"of",
"the",
"code",
",",
"the",
"most",
"interesting",
"technical",
"capabilities",
"include",
":",
"Capturing",
"screenshots",
"Enabling",
"or",
"changing",
"administration",
"settings",
"Opening",
"and",
"visiting",
"any",
"URL",
"Disabling",
"Play",
"Protect",
"Recording",
"audio",
"Making",
"phone",
"calls",
"Stealing",
"the",
"contact",
"list",
"Controlling",
"the",
"device",
"via",
"VNC",
"Sending",
",",
"receiving",
"and",
"deleting",
"SMS",
"Locking",
"the",
"device",
"Encrypting",
"files",
"on",
"the",
"device",
"and",
"external",
"drives",
"Searching",
"for",
"files",
"Retrieving",
"the",
"GPS",
"location",
"Capturing",
"remote",
"control",
"commands",
"from",
"Twitter",
"and",
"Telegram",
"Pushing",
"overlays",
"Reading",
"the",
"device",
"ID",
"The",
"malware",
"includes",
"a",
"keylogger",
"that",
"works",
"in",
"every",
"app",
"installed",
"on",
"the",
"Android",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Android.Trojan.WipeLocker.A",
"Android.Habey.A",
"Trojan.Wipelock..1",
"A.H.Fra.Elite",
"Android.Trojan.Wipelock.b",
"Android/Wipelock.A",
"HEUR:Trojan.AndroidOS.Soceng.f",
"Android.Trojan.WipeLocker.A",
"Trojan.Android.Elite.dmubjt",
"Troj.Androidos.Habey!c",
"Trojan-Spy:Android/SmsSpy.FW",
"Android.Elite.1.origin",
"ANDROID/Elite.A",
"Android/Wipelock.A!tr",
"Trojan/Android.Habey",
"Android.Trojan.WipeLocker.A",
"HEUR:Trojan.AndroidOS.Soceng.f",
"Android-Trojan/WipeLocker.8493",
"Trojan.Android.Locker.c",
"Trojan.AndroidOS.Wipelock",
"Android.Trojan.WipeLocker.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"One",
"of",
"the",
"samples",
"we",
"looked",
"at",
"SHA256:e154e62c1936f62aeaf55a41a386dbc293050acec8c4616d16f75395884c9090",
"contained",
"a",
"family",
"of",
"backdoor",
"that",
"hasn't",
"been",
"referenced",
"in",
"public",
"documents."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
3,
11,
3,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.KRBanker.615936",
"Trojan.Sehijak.A7",
"Adware.Kraddare",
"Adware.Kraddare.Win32.3892",
"Trojan.Zusy.D2CF65",
"W32/Banki.A",
"Backdoor.Win32.Servidor.ac",
"Trojan.Win32.RDN.eatfup",
"Win32.Backdoor.Servidor.Pboq",
"TrojWare.Win32.Sehijak.DA",
"Trojan.DownLoader21.32804",
"BehavesLike.Win32.MultiPlug.jc",
"W32/Banki.DFFU-6658",
"Backdoor.Servidor.b",
"Trojan:Win32/Sehijak.A",
"Backdoor.Win32.Servidor.ac",
"Trojan/Win32.Banki.R175311",
"Backdoor.Servidor",
"Win32/Adware.Kraddare.LP",
"PUA.Kraddare!",
"PUA.Kraddare",
"W32/Servidor.AC!tr.bdr",
"Win32/Backdoor.c5c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"CrowdStrike",
"has",
"released",
"two",
"blog",
"posts",
"detailing",
"Sakula",
"campaigns",
"and",
"continues",
"to",
"investigate",
"its",
"usage."
] | [
4,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9978",
"Trojan.Win32.ExtenBro.evtqgw",
"Trojan.MSIL.ExtenBro",
"Trojan/MSIL.fqcj",
"TR/ExtenBro.vezgg",
"Trojan:MSIL/ExtenBro.A",
"Trj/GdSda.A",
"Win32/Trojan.444"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Escelar",
"originally",
"surfaced",
"in",
"January",
"of",
"this",
"year,",
"and",
"has",
"since",
"had",
"roughly",
"100,000",
"instances",
"of",
"attempted",
"infections."
] | [
3,
16,
16,
16,
0,
8,
8,
8,
16,
16,
16,
16,
16,
8,
16,
16,
16,
1
] |
[
"At",
"the",
"same",
"time,",
"the",
"group",
"has",
"been",
"improving",
"their",
"ability",
"to",
"operate",
"the",
"business",
"side",
"of",
"a",
"ransomware",
"organization."
] | [
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BehavesLike.Win32.BackdoorNJRat.qm",
"Trojan.Kazy.DEF49",
"Trojan/Win32.Llac.R18525"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.DLDrop.NSIS",
"Trojan.Injector.Win32.385163",
"Trojan/Injector.cuom",
"Trojan.Razy.D7CE0",
"W32/Injector.AKD",
"Trojan.Win32.CUOM.ebfhyw",
"W32/Injector.OIMQ-3591",
"TR/AD.Enestedel.ubzhk",
"Ransom:Win32/Enestedel.B!rsm",
"Trj/GdSda.A",
"Win32/Injector.CUOM",
"Trojan.Injector!1PtHxYGwvhY"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9829",
"Backdoor.Ehdoor"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.Dorifel!O",
"Trojan.FakeMS.ED",
"Trojan/Dropper.Dorifel.eav",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"W32/Trojan.GTVK-8195",
"W32.IRCBot.NG",
"Trojan.MSIL.Crypt.fqbo",
"Trojan.DownLoader6.25796",
"Dropper.Dorifel.Win32.1316",
"TrojanDropper.Dorifel.afo",
"Trojan[Dropper]/Win32.Dorifel",
"Win32.Troj.Dorifel.kcloud",
"Trojan.Zusy.D115D1",
"Trojan.MSIL.Crypt.fqbo",
"Trojan:MSIL/Belfusba.A",
"TrojanDropper.Dorifel",
"Trj/CI.A",
"MSIL/Selenium.A",
"Trojan.Kryptik!LBVVyRsvO34",
"MSIL/Selenium.A!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Virus.W32.Virus!c",
"Trojan/Spy.KeyLogger.au",
"Trojan.Raw.KeyLog.epwywq",
"BehavesLike.Win32.Cutwail.tc",
"Trojan.Shelma.bbh",
"Trojan/Win32.Shelma",
"Trojan:Win32/Ronohu.A",
"Trj/CI.A",
"Python/Spy.KeyLogger.V",
"Trojan.Python.Spy",
"Python/KeyLogger.V!tr.spy"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Usually,",
"these",
"are",
"done",
"via",
"HTTP",
"or",
"other",
"TCP/IP",
"connections."
] | [
16,
16,
16,
16,
16,
1,
16,
16,
1,
9
] |
[
"Infection",
"Chain",
"As",
"with",
"our",
"earlier",
"reports",
"in",
"late",
"March",
",",
"the",
"attack",
"chain",
"involves",
"diverting",
"internet",
"traffic",
"to",
"attacker-specified",
"domains",
"by",
"compromising",
"and",
"overwriting",
"the",
"router",
"β",
"s",
"DNS",
"settings",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Recently,",
"while",
"reading",
"a",
"blog",
"post",
"from",
"security",
"vendor",
"Akamai,",
"we",
"spotted",
"a",
"similar",
"situation."
] | [
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
16,
16,
16,
16
] |
[
"The",
"forum",
"provides",
"members",
"with",
"tools",
"to",
"patch",
"RDP",
"Remote",
"Desktop",
"Protocol",
"servers",
"to",
"support",
"multiple",
"user",
"logins,",
"as",
"well",
"as",
"other",
"hacking",
"tools,",
"such",
"as",
"proxy",
"installers",
"and",
"sysinfo",
"collectors."
] | [
16,
6,
16,
6,
16,
3,
16,
16,
5,
13,
13,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
5,
15,
16,
5,
15
] |
[
"]",
"com",
",",
"points",
"to",
"the",
"IP",
"address",
"54.69.156.31",
"which",
"serves",
"a",
"self-signed",
"TLS",
"certificate",
"with",
"the",
"certificate",
"common",
"name",
"MyCert",
"and",
"fingerprint",
"11:41:45:2F",
":",
"A7:07:23:54",
":",
"AE:9A",
":",
"CE",
":",
"F4",
":",
"FE:56",
":",
"AE",
":",
"AC",
":",
"B1",
":",
"C2:15:9F:6A",
":",
"FC:1E",
":",
"CC:7D",
":",
"F8:61",
":",
"E3:25:26:73:6A",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
16,
1,
9,
9,
9,
9,
9,
9,
1,
9,
9,
9,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.KRSign.810456",
"Win32.Trojan.WisdomEyes.16070401.9500.9958",
"Spyware.BL",
"Trojan.ZxShellCRTD.Win32.10098",
"Backdoor:Win32/Zxshell.A!dha",
"Win32/Backdoor.c4c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Petya",
"is",
"a",
"form",
"of",
"ransomware",
"that",
"overwrites",
"the",
"master",
"boot",
"record",
"MBR",
"in",
"order",
"to",
"block",
"access",
"to",
"both",
"the",
"user's",
"files",
"and",
"operating",
"system."
] | [
3,
16,
16,
16,
16,
3,
16,
1,
16,
5,
13,
13,
13,
16,
16,
16,
1,
9,
16,
16,
16,
1,
9,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.7F39",
"Trojan.Podjot.A",
"Trojan.Kazy.D2D8D",
"TROJ_PODJOT.SM1",
"Win32.Trojan.WisdomEyes.16070401.9500.9924",
"TROJ_PODJOT.SM1",
"MalCrypt.Indus!",
"Trojan:Win32/Podjot.A",
"Trojan/Win32.Zapchast.R21212",
"Virus.Win32.Cryptor"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Figure",
"5",
"."
] | [
16,
16,
16
] |
[
"EventBot",
"VirusTotal",
"search",
"for",
"the",
"malicious",
"IP",
"address",
"VirusTotal",
"search",
"for",
"the",
"malicious",
"IP",
"address",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"threat",
"actor",
"behind",
"Duqu",
"appears",
"to",
"have",
"launched",
"attacks",
"at",
"the",
"venues",
"for",
"some",
"of",
"these",
"high",
"level",
"talks."
] | [
6,
14,
14,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"attackers",
"behind",
"this",
"campaign",
"went",
"to",
"some",
"lengths",
"to",
"disguise",
"their",
"activities,",
"including",
"using",
"domains",
"names",
"disguised",
"as",
"antivirus",
"AV",
"company",
"websites",
"for",
"their",
"command",
"and",
"control",
"C",
"C",
"servers."
] | [
16,
6,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
11,
16,
1,
9,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.Injector!O",
"Trojan.Zusy.D2081E",
"W32/MalwareS.BJCG",
"Backdoor.Vinself.B",
"Win32/Fuwu.A",
"BKDR_COMFOO.SME",
"Win.Trojan.Rootkit-9875",
"Trojan-Dropper.Win32.Injector.jndt",
"Trojan.Win32.DPD.dxvfcr",
"Trojan.PWS.DPD.5",
"BKDR_COMFOO.SME",
"BehavesLike.Win32.RansomWannaCry.ch",
"Trojan.Win32.Spy",
"W32/Risk.KUNB-3887",
"Trojan:Win32/Netnam.B",
"Trojan-Dropper.Win32.Injector.jndt",
"Trj/Zbot.M"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"one-time",
"cost",
"provides",
"a",
"malicious",
"customer",
"with",
"access",
"to",
"all",
"the",
"data",
"on",
"the",
"server",
"and",
"endless",
"other",
"possibilities,",
"such",
"as",
"using",
"the",
"access",
"to",
"launch",
"further",
"attacks."
] | [
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9
] |
[
"Instead,",
"they",
"first",
"attempt",
"to",
"gain",
"access",
"to",
"the",
"machine,",
"most",
"likely",
"through",
"a",
"more",
"targeted",
"attack",
"or",
"exploit,",
"before",
"manually",
"triggering",
"and",
"executing",
"the",
"malware."
] | [
16,
16,
16,
16,
16,
1,
9,
16,
16,
5,
16,
16,
16,
16,
16,
16,
1,
16,
3,
16,
16,
16,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HackTool.Stimilani.FC.1099",
"Trojan.Zusy.D2F64E",
"HackTool:MSIL/Stimilani.A",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"During",
"the",
"last",
"hours,",
"ESET",
"researchers",
"noticed",
"that",
"Eltima,",
"the",
"makers",
"of",
"the",
"Elmedia",
"Player",
"software,",
"have",
"been",
"distributing",
"a",
"version",
"of",
"their",
"application",
"trojanized",
"with",
"the",
"OSX/Proton",
"malware",
"on",
"their",
"official",
"website."
] | [
16,
16,
16,
16,
4,
12,
16,
16,
4,
16,
16,
16,
5,
13,
13,
13,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
3,
11,
16,
16,
1,
9
] |
[
"It",
"appears",
"that",
"these",
"threat",
"actors",
"have",
"begun",
"using",
"Palo",
"Alto",
"Networks",
"upcoming",
"Cyber",
"Security",
"Summit",
"hosted",
"on",
"November",
"3,",
"2016",
"in",
"Jakarta,",
"Indonesia",
"as",
"a",
"lure",
"to",
"compromise",
"targeted",
"individuals."
] | [
16,
16,
16,
16,
6,
14,
16,
16,
16,
4,
12,
12,
16,
4,
12,
12,
16,
16,
0,
8,
8,
16,
2,
10,
16,
16,
16,
16,
16,
16,
16
] |
[
"After",
"rendering",
"the",
"ad",
"on",
"the",
"screen",
",",
"the",
"app",
"tries",
"to",
"identify",
"the",
"part",
"of",
"the",
"advertisement",
"website",
"to",
"click",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Afterward",
",",
"it",
"will",
"start",
"several",
"timers",
"to",
"execute",
"different",
"tasks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.DoS.26816",
"DDOS_DEPCHARG.11",
"Win32.Trojan.WisdomEyes.16070401.9500.9967",
"W32/Trojan.ROMV-7068",
"DDOS_DEPCHARG.11",
"Win.Trojan.Chubby-2",
"Trojan-DDoS.Win32.DepthCharge.c",
"Trojan.Win32.DepthCharge.dfzl",
"Trojan.Win32.Chubby.26816",
"Troj.W32.Chubby.11!c",
"Trojan.Chubby.11",
"Trojan.Chubby.Win32.2",
"BehavesLike.Win32.Fake.mc",
"Backdoor/VB.dc",
"TR/Chubby.11",
"Trojan[DDoS]/Win32.DepthCharge",
"Trojan.Heur.VB.bmLfcmhTrPni",
"Trojan-DDoS.Win32.DepthCharge.c",
"TrojanDDoS.DepthCharge",
"Win32/Chubby.11",
"Win32.Trojan-ddos.Depthcharge.Lpbl",
"Trojan.DDoS.DepthCharge!wR+hD336kwM",
"Trojan-DDoS.Win32.DepthCharge",
"W32/Chubby.11!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"addition",
",",
"the",
"use",
"of",
"shared-hosting",
"providers",
"adds",
"flexibility",
"to",
"the",
"threat",
"actor",
"β",
"s",
"campaign",
"and",
"makes",
"it",
"harder",
"for",
"defending",
"parties",
"to",
"track",
"these",
"moving",
"targets",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.Small!O",
"Trojan.Vbcrypt",
"Spyware.Zbot",
"Dropper.Small.Win32.2729",
"Trojan/Dropper.Small.dil",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win32/Droplet.GN",
"Win.Trojan.VB-9953",
"Trojan-Dropper.Win32.Small.dil",
"Trojan.Win32.Small.wfby",
"TrojWare.Win32.TrojanDropper.Small.dil0",
"Trojan.MulDrop.30852",
"BehavesLike.Win32.Downloader.mc",
"Trojan-Dropper.Win32.Delf",
"Trojan[Spy]/Win32.Zbot",
"Trojan.Heur.E2A3DF",
"Dropper.Small.86866",
"Trojan-Dropper.Win32.Small.dil",
"Trojan/Win32.Batat.R4771",
"W32/Dropper.DIL!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Package",
"Name",
"SHA256",
"digest",
"SHA1",
"certificate",
"com.network.android",
"ade8bef0ac29fa363fc9afd958af0074478aef650adeb0318517b48bd996d5d5",
"44f6d1caa257799e57f0ecaf4e2e216178f4cb3d",
"com.network.android",
"3474625e63d0893fc8f83034e835472d95195254e1e4bdf99153b7c74eb44d86",
"516f8f516cc0fd8db53785a48c0a86554f75c3ba",
"Additional",
"digests",
"with",
"links",
"to",
"Chrysaor",
"As",
"a",
"result",
"of",
"our",
"investigation",
"we",
"have",
"identified",
"these",
"additional",
"Chrysaor-related",
"apps",
"."
] | [
16,
16,
16,
16,
16,
16,
1,
1,
1,
1,
1,
1,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16
] |
[
"The",
"commands",
"are",
"self-explanatory",
"and",
"show",
"the",
"features",
"included",
"in",
"the",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"attacking",
"IP",
"addresses",
"originated",
"from",
"very",
"distinctive",
"network",
"ranges",
"mostly",
"associated",
"with",
"Chinese",
"Internet",
"service",
"providers."
] | [
1,
9,
9,
9,
16,
16,
16,
16,
12,
16,
16,
16,
16,
4,
12,
12,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Multi",
"Trojan.Win32.Inject.exdppy",
"Trojan.Win32.Z.Kryptik.258107",
"Troj.W32.Virtumonde.mCBt",
"Trojan.Inject.60399",
"Trojan.Kryptik.Win32.1344676",
"BehavesLike.Win32.Worm.dc",
"Trojan:Win32/Kexject.A",
"Spyware/Win32.Zbot.C145539",
"Trj/CI.A",
"Win32.Trojan.Inject.Auto"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Hekdor.88576",
"Backdoor/Hekdor.a",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Risk.EEXH-5977",
"Win32/Hekdor.A",
"BKDR_HEKDOR.A",
"Win.Trojan.HackersDoor-6351576-1",
"Backdoor.Win32.Hackdoor.12",
"Trojan.Win32.Hekdor.gtcj",
"Backdoor.Win32.Hackdoor.88576",
"Backdoor.W32.Hackdoor.f!c",
"Backdoor.Win32.Hackdoor.~dy001",
"BackDoor.Hackdoor.22",
"Backdoor.Hekdor.Win32.1",
"BehavesLike.Win32.Virut.mh",
"Trojan.Win32.Hekdor",
"Trojan[Backdoor]/Win32.Hackdoor",
"Win32.Hack.Hekdor.a.kcloud",
"Trojan.Graftor.Elzob.D2551",
"Backdoor.Win32.Hackdoor.12",
"Backdoor/Win32.Hackdoor.R101239",
"Bck/Iroffer.BG",
"Win32.Backdoor.Hackdoor.Pegb",
"Backdoor.Hekdor.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"They",
"find",
"and",
"share",
"readily",
"available",
"code",
"and",
"use",
"those",
"to",
"make",
"their",
"own",
"malware."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm/Win32.AutoRun"
] | [
16,
3,
16,
16,
16,
1
] |
[
"This",
"payload",
"is",
"also",
"used",
"by",
"the",
"earlier",
"versions",
"of",
"the",
"implant",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Lookout",
"customers",
"are",
"also",
"protected",
"from",
"this",
"threat",
"on",
"both",
"Android",
"and",
"iOS",
"."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Clicker.cysqcu",
"Trojan.Click2.41012",
"TR/Storup.D.158",
"Trojan:Win32/Storup.D",
"Trojan.Graftor.DA5F2",
"TrojanSpy.Gaxfid!V9zv1PzO78E",
"Trojan.Win32.Spy",
"Trj/CI.A",
"Win32/Trojan.b34"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Packer.W32.Katusha!c",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"TROJ_TRACUR.SMVB",
"Packed.Win32.Katusha.ac",
"Trojan.Win32.Tracur.csqtnd",
"Trojan.Win32.Z.Tracur.476672",
"TrojWare.Win32.Kryptik.BJLP",
"TROJ_TRACUR.SMVB",
"TR/Tracur.ujeuv",
"Trojan/Win32.Diple",
"Trojan.Mikey.D823E",
"Packed.Win32.Katusha.ac",
"Trojan/Win32.Tracur.R87716",
"Trojan.Tracur",
"Win32/Boaxxe.BB",
"Win32.Packed.Katusha.Aljh",
"Trojan.Win32.Boaxxe",
"Win32/Trojan.2ed"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DownloaderLTB.Trojan",
"Trojan.Win32.Scar!O",
"Trojan.Scar.20261",
"Trojan/Scar.gfdd",
"Trojan.Graftor.Elzob.D3707",
"TROJ_DLOADE.SMEP",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Dropper",
"Win32/SillyDl.HER",
"TROJ_DLOADE.SMEP",
"Win.Trojan.Scar-864",
"Virus.Win32.Lamer.vpqnl",
"Trojan.DownLoader22.5119",
"TR/Taranis.2688",
"Trojan/Win32.Scar",
"Trojan.Win32.A.Scar.100616",
"Trojan/Win32.Scar.R4127",
"Trojan.Scar",
"Trojan.Win32.Sisproc"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Cadlotcorg",
"Trojan.DistTrack.stdr",
"BKDR_DISTTRACK.E",
"Win.Malware.StoneDrill-6012379-0",
"Trojan.Win32.Inject.wmyt",
"Trojan.Win32.Inject.ekcbzj",
"Trojan.Win32.Z.Inject.195072",
"Troj.W32.Inject!c",
"Trojan.Stoned.5",
"Trojan.StoneDrill.Win32.2",
"BKDR_DISTTRACK.E",
"W32/Trojan.CWLD-3265",
"Trojan.Inject.uoh",
"TR/Injector.sgcfh",
"Trojan/Win32.Inject",
"Trojan.Razy.D1AF37",
"Trojan.Win32.Inject.wmyt",
"Trojan:Win32/Cadlotcorg.A!dha",
"Trojan/Win32.Injector.C1695778",
"Trojan.DiskWriter",
"Trj/CI.A",
"Win32/StoneDrill.A",
"Win32.Trojan.Inject.Eddh",
"Trojan.Inject!MGtoNAyL21Q",
"Trojan.Win32.Cadlotcorg"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"HummingBad",
"also",
"has",
"the",
"ability",
"to",
"inject",
"code",
"into",
"Google",
"Play",
"to",
"tamper",
"with",
"its",
"ratings",
"and",
"statistics",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"functionality",
"can",
"be",
"seen",
"in",
"Figure",
"1",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BehavesLike.Win32.VirRansom.pc"
] | [
16,
3,
16,
16,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Iframer.77312",
"Trojan.Iframer.aa",
"Trojan.Win32.Iframer.aa",
"Trojan/Iframer.aa",
"Trojan.Iframer.X",
"W32/DLoader.OAFQ",
"Trojan.Win32.Iframer.aa",
"TrojWare.Win32.Iframer.aa",
"Trojan.Win32.Iframer.aa",
"Trojan/Iframer.b",
"Trojan.Win32.Iframer!IK",
"Trojan:Win32/Ifrasif.A",
"Trojan.Win32.Iframer.aa",
"Trojan.Win32.Iframer"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Highlights",
"Samples",
"of",
"the",
"malicious",
"code",
"found",
"in",
"BrainTest",
"have",
"been",
"found",
"on",
"Google",
"Play",
",",
"and",
"its",
"creator",
"has",
"used",
"multiple",
"methods",
"to",
"evade",
"detection",
"by",
"Google",
"including",
"Bypassing",
"Google",
"Bouncer",
"by",
"detecting",
"if",
"the",
"malware",
"is",
"being",
"run",
"from",
"an",
"IP",
"or",
"domain",
"mapped",
"to",
"Google",
"Bouncer",
"and",
",",
"if",
"so",
",",
"it",
"will",
"not",
"perform",
"its",
"intended",
"malicious",
"activities",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Kazy.D1DA5C",
"Win32.Trojan.WisdomEyes.16070401.9500.9993",
"Trojan.Win32.Steam.cwybnb",
"TrojWare.Win32.PSW.Steathie.B2",
"Trojan.PWS.Steam.292",
"TR/PSW.Steathie.B",
"PWS:MSIL/Pasdael.A",
"W32/Sc!tr.pws"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"When",
"analyzing",
"the",
"Ginp",
"β",
"s",
"recent",
"samples",
",",
"ThreatFabric",
"analysts",
"found",
"some",
"similarities",
"with",
"the",
"famous",
"Android",
"banking",
"Trojan",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.PSW.Vorbeld.B",
"Trojan/W32.Ikmet.307200",
"Trojan.PSW.Vorbeld.B",
"Troj.IM.W32.Ikmet.e!c",
"Trojan/Ikmet.e",
"Trojan.PSW.Vorbeld.B",
"TROJ_VORBELD.B",
"TROJ_VORBELD.B",
"Trojan.PSW.Vorbeld.B",
"Trojan-IM.Win32.Ikmet.e",
"Trojan.PSW.Vorbeld.B",
"Trojan.Win32.Ikmet.diag",
"Win32.Trojan-im.Ikmet.Lfzq",
"Trojan.PSW.Vorbeld.B",
"TrojWare.Win32.PSW.Vorbeld.B",
"Trojan.PSW.Vorbeld.B",
"Trojan.PWS.Special.11",
"Trojan.Ikmet.Win32.2",
"BehavesLike.Win32.Fareit.fz",
"W32/Risk.ZFPE-4855",
"Trojan/PSW.Vorbeld.b",
"TR/PSW.Vorbeld.b",
"Trojan[IM]/Win32.Ikmet",
"Win32.Troj.Vorbeld.b.kcloud",
"PWS:Win32/Vorbeld.B",
"Trojan-IM.Win32.Ikmet.e",
"TScope.Trojan.VB",
"Win32/PSW.Vorbeld.B",
"Trojan.Ikmet!CCqyhhL0iag",
"Backdoor.VB",
"W32/Vorbeld.E!tr",
"Win32/Trojan.IM.00b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"EventBot",
"Obfuscated",
"class",
"names",
"Obfuscated",
"class",
"names",
"using",
"letters",
"of",
"the",
"alphabet",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"particular",
",",
"these",
"apps",
"try",
"to",
"add",
"an",
"additional",
"method",
"called",
"statistics",
"(",
")",
"into",
"the",
"Activity",
"class",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.PWS.OnlineGames.AAGG",
"Trojan.Magania.19302",
"Trojan.PWS.OnlineGames.AAGG",
"TSPY_ONLINEG.IGO",
"Win32.Trojan.WisdomEyes.16070401.9500.9932",
"Infostealer.Onlinegame",
"Win32/Frethog.CIL",
"TSPY_ONLINEG.IGO",
"Win.Spyware.59235-2",
"Trojan-GameThief.Win32.OnLineGames.txbo",
"Trojan.PWS.OnlineGames.AAGG",
"Trojan.Win32.OnLineGames.lhee",
"Troj.PSW32.W.QQPass.lpXN",
"Trojan.PWS.OnlineGames.AAGG",
"TrojWare.Win32.Trojan.Inject.~II",
"Trojan.PWS.OnlineGames.AAGG",
"Trojan.MulDrop4.15206",
"PWS-OnlineGames.co",
"Trojan/PSW.OnLineGames.auru",
"Trojan[GameThief]/Win32.WOW.gic",
"Win32.Troj.OnlineGames.sd.kcloud",
"Trojan.PWS.OnlineGames.AAGG",
"Trojan.Win32.PSWIGames.11924.B",
"Trojan.PWS.OnlineGames.AAGG",
"Trojan/Win32.OnlineGameHack.C909",
"TrojanPSW.OnLineGames.nr",
"Trojan-Spy.OnLineGames"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Cyphort",
"has",
"been",
"monitoring",
"how",
"threat",
"actors",
"are",
"exploiting",
"computing",
"resources",
"from",
"compromised",
"victims",
"to",
"mine",
"various",
"crypto",
"currencies."
] | [
4,
16,
16,
16,
16,
6,
14,
16,
5,
13,
16,
16,
16,
16,
16,
1,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Ransom.Win32.Toxic.a",
"BehavesLike.Win32.BadFile.jc",
"Trojan.Win32.Ransom.a"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"β",
"These",
"communication",
"channels",
"are",
"hard",
"to",
"discover",
"and",
"even",
"harder",
"to",
"block",
"entirely",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanRansom.Blocker",
"Ransom_Blocker.R0C1C0DHU17",
"Win32.Trojan.WisdomEyes.16070401.9500.9605",
"Ransom_Blocker.R0C1C0DHU17",
"Trojan-Ransom.Win32.Blocker.kgrm",
"Troj.Ransom.W32.Blocker!c",
"BehavesLike.Win32.RansomCerber.gh",
"W32/Trojan.DOGS-7123",
"W32.Trojan.Backdoor",
"TR/Crypt.ZPACK.hmkaa",
"Trojan-Ransom.Win32.Blocker.kgrm",
"Trojan/Win32.Dapato.C1720332",
"Hoax.Blocker",
"Trojan.Dropper",
"Trj/CI.A",
"Win32.Trojan.Blocker.Akzg",
"Trojan.Blocker!U13z+V78Arg",
"Win32/Trojan.Ransom.acc"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Since",
"the",
"start",
"of",
"the",
"Russo-Ukrainian",
"conflict,",
"Kaspersky",
"researchers",
"and",
"the",
"international",
"community",
"at",
"large",
"have",
"identified",
"a",
"significant",
"number",
"of",
"cyberattacks",
"executed",
"in",
"a",
"political",
"and",
"geopolitical",
"context."
] | [
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16
] |
[
"network.exe",
"submitting",
"to",
"the",
"server",
"code",
"snippet",
"Code",
"similarities",
"We",
"found",
"some",
"code",
"similarities",
"between",
"the",
"implant",
"for",
"Windows",
"and",
"other",
"public",
"accessible",
"projects",
"."
] | [
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16
] |
[
"In",
"the",
"image",
"below",
",",
"we",
"see",
"a",
"log",
"TrickMo",
"sent",
"to",
"the",
"attacker",
"upon",
"becoming",
"the",
"default",
"SMS",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win.Trojan.Dadobra-446",
"Trojan-Downloader.Win32.Banload.bnlx",
"Trojan.Win32.Downloader.337408.M",
"TrojWare.Win32.TrojanDownloader.Dadobra.~JK",
"Trojan.DownLoader5.10443",
"Trojan-Downloader.Win32.Banload",
"TrojanDownloader.Banload.bhs",
"Trojan[Downloader]/Win32.Banload",
"Trojan-Downloader.Win32.Banload.bnlx",
"Trojan:Win32/Banload.A",
"Downloader/Win32.Banload.C108589",
"Win32/Spy.Banker.WNS",
"Win32.Trojan-downloader.Banload.Ebhk"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Dropper",
"variants",
"are",
"usually",
"barely",
"functioning",
"photo",
"utility",
",",
"games",
",",
"or",
"sex",
"related",
"apps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"SMS",
"messages",
"."
] | [
16,
16,
16
] |
[
"Let's",
"examine",
"a",
"couple",
"of",
"interesting",
"delivery",
"techniques",
"from",
"an",
"APT",
"active",
"for",
"the",
"past",
"several",
"years,",
"the",
"Spring",
"Dragon",
"APT."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
11,
16,
0,
8,
8,
16,
6,
14,
14
] |
[
"]",
"16",
"lala513.gicp",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"SunOrcal",
"activity",
"has",
"been",
"documented",
"to",
"at",
"least",
"2013,",
"and",
"based",
"on",
"metadata",
"surrounding",
"some",
"of",
"the",
"C2s,",
"may",
"have",
"been",
"active",
"as",
"early",
"as",
"2010."
] | [
3,
16,
16,
16,
16,
16,
0,
8,
8,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
0,
8,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TSPY_MALUMPOS.SM",
"TSPY_MALUMPOS.SM",
"Win.Trojan.MalumPOS-1",
"TR/AD.Siaacsia.ielmw",
"Trojan:Win32/Malumpos.A",
"Trojan/Win32.Malumpos.C1727078",
"Trojan-Spy.MalumPOS",
"Win32/Trojan.Spy.958"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"net",
"app",
"store",
"was",
"replaced",
"with",
"the",
"malicious",
"HenBox",
"app",
";",
"however",
",",
"some",
"indicators",
"point",
"to",
"the",
"server",
"running",
"an",
"outdated",
"version",
"of",
"Apache",
"Web",
"Server",
"on",
"a",
"Windows",
"32-Bit",
"operating",
"system",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16
] |
[
"An",
"aside:",
"the",
"rootkit",
"does",
"appear",
"to",
"be",
"named",
"after",
"the",
"PokΓ©mon",
"of",
"the",
"same",
"name."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Application.Hacktool.EH",
"Trojan/W32.HackTool.215552",
"Trojan.Mauvaise.SL1",
"Win.Tool.Wincred-6333920-0",
"Application.Hacktool.EH",
"HackTool.Win64.WinCred.c",
"Application.Hacktool.EH",
"Application.Hacktool.EH",
"Tool.WinCred.1",
"BehavesLike.Win64.BrowseFox.dh",
"W64/Application.WFWG-6345",
"Application.Hacktool.EH",
"HackTool.Win64.WinCred.c",
"Application.Hacktool.EH",
"HackTool.Win64",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Similarly",
",",
"there",
"are",
"many",
"crucial",
"commands",
"that",
"further",
"allow",
"this",
"spyware",
"to",
"perform",
"additional",
"functionality",
",",
"such",
"as",
"executing",
"commands",
"sent",
"by",
"the",
"C",
"&",
"C",
",",
"clicking",
"photos",
",",
"capturing",
"screenshots",
",",
"stealing",
"location",
"information",
",",
"and",
"more",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper/W32.Dapato.26112",
"Trojan-Dropper.Win32.Dapato!O",
"BackdoorAPT.Hikiti.G4",
"Win32.Trojan.WisdomEyes.16070401.9500.9983",
"Backdoor.Trojan",
"BKDR_FEXEL.MM",
"Backdoor.Win32.Fexel.b",
"Trojan.Win32.Dapato.ceuzkz",
"Trojan.DownLoader10.12491",
"BehavesLike.Win32.Downloader.mc",
"Trojan.Win32.Farfli",
"W32/Backdoor.QCOF-8324",
"Trojan[Dropper]/Win32.Dapato",
"Trojan.Heur.E97E22",
"Troj.Dropper.W32.Dapato.dawi!c",
"Backdoor.Win32.Fexel.b",
"Backdoor:Win32/Hikiti.G!dha",
"Dropper/Win32.Dapato.C199271",
"Win32.Backdoor.Fexel.Wvkt",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"legitimate",
"version",
"of",
"this",
"app",
"is",
"also",
"available",
"on",
"Google",
"Play",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"It",
"is",
"assumed",
"that",
"actors",
"using",
"the",
"malware",
"are",
"targeting",
"small-",
"to",
"medium-sized",
"businesses",
"given",
"the",
"malware's",
"focus",
"on",
"VNC",
"applications."
] | [
16,
16,
16,
16,
6,
16,
16,
3,
16,
16,
4,
12,
12,
12,
16,
16,
3,
16,
16,
5,
13
] |
[
"In",
"spite",
"of",
"these",
"commonalities,",
"we",
"have",
"not",
"identified",
"any",
"firm",
"links",
"between",
"the",
"two",
"groups."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"source",
"process",
"changes",
"the",
"registers",
"in",
"the",
"target",
"process",
"so",
"that",
"PC",
"register",
"points",
"directly",
"to",
"the",
"shellcode",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"new",
"wave",
"of",
"attacks",
"has",
"also",
"used",
"some",
"infrastructure",
"that",
"has",
"previously",
"been",
"used",
"in",
"Carbanak",
"campaigns."
] | [
16,
16,
16,
16,
1,
16,
16,
16,
16,
5,
15,
16,
16,
16,
16,
16,
6,
14
] |
[
"This",
"is",
"done",
"using",
"the",
"ptrace",
"syscall",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"β",
"The",
"takeaway",
"?",
"Internet",
"users",
"should",
"keep",
"on",
"securing",
"their",
"activities",
"with",
"good",
"security",
"solutions",
"for",
"both",
"computers",
"and",
"mobile",
"devices.",
"β",
"Hashes",
":",
"E5212D4416486AF42E7ED1F58A526AEF77BE89BE",
"A9891222232145581FE8D0D483EDB4B18836BCFC",
"AFF9F39A6CA5D68C599B30012D79DA29E2672C6E",
"Insidious",
"Android",
"malware",
"gives",
"up",
"all",
"malicious",
"features",
"but",
"one",
"to",
"gain",
"stealth",
"ESET",
"researchers",
"detect",
"a",
"new",
"way",
"of",
"misusing",
"Accessibility",
"Service",
",",
"the",
"Achilles",
"β",
"heel",
"of",
"Android",
"security",
"22",
"May",
"2020",
"-",
"03:00PM",
"ESET",
"researchers",
"have",
"analyzed",
"an",
"extremely",
"dangerous",
"Android",
"app",
"that",
"can",
"perform",
"a",
"host",
"of",
"nefarious",
"actions",
",",
"notably",
"wiping",
"out",
"the",
"victim",
"β",
"s",
"bank",
"account",
"or",
"cryptocurrency",
"wallet",
"and",
"taking",
"over",
"their",
"email",
"or",
"social",
"media",
"accounts",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
1,
1,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.ArchSMS!Tf0HkXJW05g",
"Hoax.Win32.ArchSMS.hqqg",
"Hoax.ArchSMS.hqqg",
"SecurityRisk.PremiumSMSScam",
"Hoax.Win32.ArchSMS",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"The",
"new",
"family",
"appears",
"to",
"have",
"been",
"in",
"the",
"wild",
"since",
"late",
"2016",
"and",
"to",
"date",
"we",
"have",
"only",
"identified",
"10",
"unique",
"samples,",
"indicating",
"it",
"may",
"be",
"sparingly",
"used."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
0,
8,
8,
8,
8,
8,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"BLOCKER_STOP",
"β",
"block",
"display",
"of",
"all",
"HTML",
"pages",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win32.Koutodoor!IK",
"Backdoor:Win32/Koutodoor.B",
"Backdoor.Win32.Koutodoor.da",
"SHeur2.AIKX"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"It",
"specifically",
"targets",
"financial",
"banking",
"applications",
"across",
"the",
"United",
"States",
"and",
"Europe",
",",
"including",
"Italy",
",",
"the",
"UK",
",",
"Spain",
",",
"Switzerland",
",",
"France",
",",
"and",
"Germany",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"StreamEx",
"family",
"has",
"the",
"ability",
"to",
"access",
"and",
"modify",
"the",
"user's",
"file",
"system,",
"modify",
"the",
"registry,",
"create",
"system",
"services,",
"enumerate",
"process",
"and",
"system",
"information,",
"enumerate",
"network",
"resources",
"and",
"drive",
"types,",
"scan",
"for",
"security",
"tools",
"such",
"as",
"firewall",
"products",
"and",
"antivirus",
"products,",
"change",
"browser",
"security",
"settings,",
"and",
"remotely",
"execute",
"commands."
] | [
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
5,
16,
16,
16,
16,
5,
16,
16,
5,
16,
16,
16,
16,
16,
11,
12,
16,
16,
16,
5,
13,
16,
5,
13,
16,
16,
1,
9,
16,
1,
9,
9
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.