tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "W32.eHeur.Malware14", "Win32.Malware!Drop", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "Trojan-Downloader.Win32.Upatre.gqes", "Trojan.Win32.KillProc.expayv", "TrojWare.Win32.GozNym.AA", "Trojan.KillProc.54838", "Downloader.Upatre.Win32.65195", "Trojan.Win32.Tofsee", "Trojan.Banker.GozNym.gs", "TR/Crypt.Xpack.sqizh", "Backdoor:Win32/Tofsee.T", "Trojan-Downloader.Win32.Upatre.gqes", "Win32.Malware!Drop", "Backdoor.PasswordStealer", "Trj/GdSda.A", "Win32/Tofsee.BJ", "W32/Kryptik.GCVH!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "attack", "leveraged", "malware", "we", "called", "BlackLambert',", "which", "was", "used", "to", "target", "a", "high", "profile", "organization", "in", "Europe." ]
[ 16, 16, 16, 3, 16, 16, 3, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 2 ]
[ "Bluetooth", "β€”", "which", "allows", "the", "interaction", "with", "the", "Bluetooth", "interface", ",", "and", "net/deacon", "β€”", "which", "implements", "a", "beaconing", "system", "based", "on", "UDP", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "BDS/Flood.IRC.2", "MemScan:Trojan.Flooder.I", "IRC.Flood", "Trojan.Flood", "BackDoor.Ircbot.BCV", "IRC.Flood", "IRC.Flood", "Trojan.Backdoor.Flood.IRC.2" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Scar.28672.J", "Win32.Trojan.Scar.aeru.4.Pack", "Trojan/Scar.aeru", "Trojan.Scar.AEY", "W32/Tibs.DOHY", "Trojan.Win32.Scar.aeru", "TrojWare.Win32.Scar.BA", "Win32/SillyAutorun.CVZ", "Trojan/Scar.axz", "Trojan/Win32.Scar", "Trojan.Win32.Scar!IK", "TrojanDownloader:Win32/Yibohbin.A", "Trojan.Win32.Scar.28672.I", "Win-Trojan/Scar.28672.AH", "Trojan.Win32.Scar.aeru", "Trojan.DL.Win32.Tiny.bug", "Trojan.Win32.Scar", "Trj/Scar.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "is", "usually", "done", "in", "order", "to", "validate", "the", "target", "of", "a", "new", "infection", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "fake", "notification", "tactic", "is", "used", "to", "redirect", "the", "user", "'s", "attention", ",", "meanwhile", "the", "app", "hides", "itself", ",", "making", "the", "user", "believe", "the", "app", "to", "be", "faulty", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "First", ",", "it", "will", "get", "the", "β€œ", "nativenumber", "”", "variable", "from", "the", "β€œ", "telmark", "”", "value", "of", "β€œ", "AndroidManifest.xml", "”", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "Figure", "4", "–", "Checking", "for", "installed", "apps", "Based", "on", "a", "thorough", "analysis", "of", "the", "code", ",", "the", "most", "interesting", "technical", "capabilities", "include", ":", "Capturing", "screenshots", "Enabling", "or", "changing", "administration", "settings", "Opening", "and", "visiting", "any", "URL", "Disabling", "Play", "Protect", "Recording", "audio", "Making", "phone", "calls", "Stealing", "the", "contact", "list", "Controlling", "the", "device", "via", "VNC", "Sending", ",", "receiving", "and", "deleting", "SMS", "Locking", "the", "device", "Encrypting", "files", "on", "the", "device", "and", "external", "drives", "Searching", "for", "files", "Retrieving", "the", "GPS", "location", "Capturing", "remote", "control", "commands", "from", "Twitter", "and", "Telegram", "Pushing", "overlays", "Reading", "the", "device", "ID", "The", "malware", "includes", "a", "keylogger", "that", "works", "in", "every", "app", "installed", "on", "the", "Android", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Android.Trojan.WipeLocker.A", "Android.Habey.A", "Trojan.Wipelock..1", "A.H.Fra.Elite", "Android.Trojan.Wipelock.b", "Android/Wipelock.A", "HEUR:Trojan.AndroidOS.Soceng.f", "Android.Trojan.WipeLocker.A", "Trojan.Android.Elite.dmubjt", "Troj.Androidos.Habey!c", "Trojan-Spy:Android/SmsSpy.FW", "Android.Elite.1.origin", "ANDROID/Elite.A", "Android/Wipelock.A!tr", "Trojan/Android.Habey", "Android.Trojan.WipeLocker.A", "HEUR:Trojan.AndroidOS.Soceng.f", "Android-Trojan/WipeLocker.8493", "Trojan.Android.Locker.c", "Trojan.AndroidOS.Wipelock", "Android.Trojan.WipeLocker.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "One", "of", "the", "samples", "we", "looked", "at", "SHA256:e154e62c1936f62aeaf55a41a386dbc293050acec8c4616d16f75395884c9090", "contained", "a", "family", "of", "backdoor", "that", "hasn't", "been", "referenced", "in", "public", "documents." ]
[ 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 3, 11, 3, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.KRBanker.615936", "Trojan.Sehijak.A7", "Adware.Kraddare", "Adware.Kraddare.Win32.3892", "Trojan.Zusy.D2CF65", "W32/Banki.A", "Backdoor.Win32.Servidor.ac", "Trojan.Win32.RDN.eatfup", "Win32.Backdoor.Servidor.Pboq", "TrojWare.Win32.Sehijak.DA", "Trojan.DownLoader21.32804", "BehavesLike.Win32.MultiPlug.jc", "W32/Banki.DFFU-6658", "Backdoor.Servidor.b", "Trojan:Win32/Sehijak.A", "Backdoor.Win32.Servidor.ac", "Trojan/Win32.Banki.R175311", "Backdoor.Servidor", "Win32/Adware.Kraddare.LP", "PUA.Kraddare!", "PUA.Kraddare", "W32/Servidor.AC!tr.bdr", "Win32/Backdoor.c5c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "CrowdStrike", "has", "released", "two", "blog", "posts", "detailing", "Sakula", "campaigns", "and", "continues", "to", "investigate", "its", "usage." ]
[ 4, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9978", "Trojan.Win32.ExtenBro.evtqgw", "Trojan.MSIL.ExtenBro", "Trojan/MSIL.fqcj", "TR/ExtenBro.vezgg", "Trojan:MSIL/ExtenBro.A", "Trj/GdSda.A", "Win32/Trojan.444" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Escelar", "originally", "surfaced", "in", "January", "of", "this", "year,", "and", "has", "since", "had", "roughly", "100,000", "instances", "of", "attempted", "infections." ]
[ 3, 16, 16, 16, 0, 8, 8, 8, 16, 16, 16, 16, 16, 8, 16, 16, 16, 1 ]
[ "At", "the", "same", "time,", "the", "group", "has", "been", "improving", "their", "ability", "to", "operate", "the", "business", "side", "of", "a", "ransomware", "organization." ]
[ 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14 ]
[ "A", "backdoor", "also", "known", "as:", "BehavesLike.Win32.BackdoorNJRat.qm", "Trojan.Kazy.DEF49", "Trojan/Win32.Llac.R18525" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.DLDrop.NSIS", "Trojan.Injector.Win32.385163", "Trojan/Injector.cuom", "Trojan.Razy.D7CE0", "W32/Injector.AKD", "Trojan.Win32.CUOM.ebfhyw", "W32/Injector.OIMQ-3591", "TR/AD.Enestedel.ubzhk", "Ransom:Win32/Enestedel.B!rsm", "Trj/GdSda.A", "Win32/Injector.CUOM", "Trojan.Injector!1PtHxYGwvhY" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9829", "Backdoor.Ehdoor" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper.Win32.Dorifel!O", "Trojan.FakeMS.ED", "Trojan/Dropper.Dorifel.eav", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "W32/Trojan.GTVK-8195", "W32.IRCBot.NG", "Trojan.MSIL.Crypt.fqbo", "Trojan.DownLoader6.25796", "Dropper.Dorifel.Win32.1316", "TrojanDropper.Dorifel.afo", "Trojan[Dropper]/Win32.Dorifel", "Win32.Troj.Dorifel.kcloud", "Trojan.Zusy.D115D1", "Trojan.MSIL.Crypt.fqbo", "Trojan:MSIL/Belfusba.A", "TrojanDropper.Dorifel", "Trj/CI.A", "MSIL/Selenium.A", "Trojan.Kryptik!LBVVyRsvO34", "MSIL/Selenium.A!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Virus.W32.Virus!c", "Trojan/Spy.KeyLogger.au", "Trojan.Raw.KeyLog.epwywq", "BehavesLike.Win32.Cutwail.tc", "Trojan.Shelma.bbh", "Trojan/Win32.Shelma", "Trojan:Win32/Ronohu.A", "Trj/CI.A", "Python/Spy.KeyLogger.V", "Trojan.Python.Spy", "Python/KeyLogger.V!tr.spy" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Usually,", "these", "are", "done", "via", "HTTP", "or", "other", "TCP/IP", "connections." ]
[ 16, 16, 16, 16, 16, 1, 16, 16, 1, 9 ]
[ "Infection", "Chain", "As", "with", "our", "earlier", "reports", "in", "late", "March", ",", "the", "attack", "chain", "involves", "diverting", "internet", "traffic", "to", "attacker-specified", "domains", "by", "compromising", "and", "overwriting", "the", "router", "’", "s", "DNS", "settings", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Recently,", "while", "reading", "a", "blog", "post", "from", "security", "vendor", "Akamai,", "we", "spotted", "a", "similar", "situation." ]
[ 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 16, 16, 16, 16 ]
[ "The", "forum", "provides", "members", "with", "tools", "to", "patch", "RDP", "Remote", "Desktop", "Protocol", "servers", "to", "support", "multiple", "user", "logins,", "as", "well", "as", "other", "hacking", "tools,", "such", "as", "proxy", "installers", "and", "sysinfo", "collectors." ]
[ 16, 6, 16, 6, 16, 3, 16, 16, 5, 13, 13, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 5, 15, 16, 5, 15 ]
[ "]", "com", ",", "points", "to", "the", "IP", "address", "54.69.156.31", "which", "serves", "a", "self-signed", "TLS", "certificate", "with", "the", "certificate", "common", "name", "MyCert", "and", "fingerprint", "11:41:45:2F", ":", "A7:07:23:54", ":", "AE:9A", ":", "CE", ":", "F4", ":", "FE:56", ":", "AE", ":", "AC", ":", "B1", ":", "C2:15:9F:6A", ":", "FC:1E", ":", "CC:7D", ":", "F8:61", ":", "E3:25:26:73:6A", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 16, 1, 9, 9, 9, 9, 9, 9, 1, 9, 9, 9, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.KRSign.810456", "Win32.Trojan.WisdomEyes.16070401.9500.9958", "Spyware.BL", "Trojan.ZxShellCRTD.Win32.10098", "Backdoor:Win32/Zxshell.A!dha", "Win32/Backdoor.c4c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "Petya", "is", "a", "form", "of", "ransomware", "that", "overwrites", "the", "master", "boot", "record", "MBR", "in", "order", "to", "block", "access", "to", "both", "the", "user's", "files", "and", "operating", "system." ]
[ 3, 16, 16, 16, 16, 3, 16, 1, 16, 5, 13, 13, 13, 16, 16, 16, 1, 9, 16, 16, 16, 1, 9, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.7F39", "Trojan.Podjot.A", "Trojan.Kazy.D2D8D", "TROJ_PODJOT.SM1", "Win32.Trojan.WisdomEyes.16070401.9500.9924", "TROJ_PODJOT.SM1", "MalCrypt.Indus!", "Trojan:Win32/Podjot.A", "Trojan/Win32.Zapchast.R21212", "Virus.Win32.Cryptor" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Figure", "5", "." ]
[ 16, 16, 16 ]
[ "EventBot", "VirusTotal", "search", "for", "the", "malicious", "IP", "address", "VirusTotal", "search", "for", "the", "malicious", "IP", "address", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "threat", "actor", "behind", "Duqu", "appears", "to", "have", "launched", "attacks", "at", "the", "venues", "for", "some", "of", "these", "high", "level", "talks." ]
[ 6, 14, 14, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "attackers", "behind", "this", "campaign", "went", "to", "some", "lengths", "to", "disguise", "their", "activities,", "including", "using", "domains", "names", "disguised", "as", "antivirus", "AV", "company", "websites", "for", "their", "command", "and", "control", "C", "C", "servers." ]
[ 16, 6, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 11, 16, 1, 9, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper.Win32.Injector!O", "Trojan.Zusy.D2081E", "W32/MalwareS.BJCG", "Backdoor.Vinself.B", "Win32/Fuwu.A", "BKDR_COMFOO.SME", "Win.Trojan.Rootkit-9875", "Trojan-Dropper.Win32.Injector.jndt", "Trojan.Win32.DPD.dxvfcr", "Trojan.PWS.DPD.5", "BKDR_COMFOO.SME", "BehavesLike.Win32.RansomWannaCry.ch", "Trojan.Win32.Spy", "W32/Risk.KUNB-3887", "Trojan:Win32/Netnam.B", "Trojan-Dropper.Win32.Injector.jndt", "Trj/Zbot.M" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "one-time", "cost", "provides", "a", "malicious", "customer", "with", "access", "to", "all", "the", "data", "on", "the", "server", "and", "endless", "other", "possibilities,", "such", "as", "using", "the", "access", "to", "launch", "further", "attacks." ]
[ 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9 ]
[ "Instead,", "they", "first", "attempt", "to", "gain", "access", "to", "the", "machine,", "most", "likely", "through", "a", "more", "targeted", "attack", "or", "exploit,", "before", "manually", "triggering", "and", "executing", "the", "malware." ]
[ 16, 16, 16, 16, 16, 1, 9, 16, 16, 5, 16, 16, 16, 16, 16, 16, 1, 16, 3, 16, 16, 16, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "HackTool.Stimilani.FC.1099", "Trojan.Zusy.D2F64E", "HackTool:MSIL/Stimilani.A", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "During", "the", "last", "hours,", "ESET", "researchers", "noticed", "that", "Eltima,", "the", "makers", "of", "the", "Elmedia", "Player", "software,", "have", "been", "distributing", "a", "version", "of", "their", "application", "trojanized", "with", "the", "OSX/Proton", "malware", "on", "their", "official", "website." ]
[ 16, 16, 16, 16, 4, 12, 16, 16, 4, 16, 16, 16, 5, 13, 13, 13, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 3, 11, 16, 16, 1, 9 ]
[ "It", "appears", "that", "these", "threat", "actors", "have", "begun", "using", "Palo", "Alto", "Networks", "upcoming", "Cyber", "Security", "Summit", "hosted", "on", "November", "3,", "2016", "in", "Jakarta,", "Indonesia", "as", "a", "lure", "to", "compromise", "targeted", "individuals." ]
[ 16, 16, 16, 16, 6, 14, 16, 16, 16, 4, 12, 12, 16, 4, 12, 12, 16, 16, 0, 8, 8, 16, 2, 10, 16, 16, 16, 16, 16, 16, 16 ]
[ "After", "rendering", "the", "ad", "on", "the", "screen", ",", "the", "app", "tries", "to", "identify", "the", "part", "of", "the", "advertisement", "website", "to", "click", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Afterward", ",", "it", "will", "start", "several", "timers", "to", "execute", "different", "tasks", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.DoS.26816", "DDOS_DEPCHARG.11", "Win32.Trojan.WisdomEyes.16070401.9500.9967", "W32/Trojan.ROMV-7068", "DDOS_DEPCHARG.11", "Win.Trojan.Chubby-2", "Trojan-DDoS.Win32.DepthCharge.c", "Trojan.Win32.DepthCharge.dfzl", "Trojan.Win32.Chubby.26816", "Troj.W32.Chubby.11!c", "Trojan.Chubby.11", "Trojan.Chubby.Win32.2", "BehavesLike.Win32.Fake.mc", "Backdoor/VB.dc", "TR/Chubby.11", "Trojan[DDoS]/Win32.DepthCharge", "Trojan.Heur.VB.bmLfcmhTrPni", "Trojan-DDoS.Win32.DepthCharge.c", "TrojanDDoS.DepthCharge", "Win32/Chubby.11", "Win32.Trojan-ddos.Depthcharge.Lpbl", "Trojan.DDoS.DepthCharge!wR+hD336kwM", "Trojan-DDoS.Win32.DepthCharge", "W32/Chubby.11!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "addition", ",", "the", "use", "of", "shared-hosting", "providers", "adds", "flexibility", "to", "the", "threat", "actor", "’", "s", "campaign", "and", "makes", "it", "harder", "for", "defending", "parties", "to", "track", "these", "moving", "targets", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper.Win32.Small!O", "Trojan.Vbcrypt", "Spyware.Zbot", "Dropper.Small.Win32.2729", "Trojan/Dropper.Small.dil", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win32/Droplet.GN", "Win.Trojan.VB-9953", "Trojan-Dropper.Win32.Small.dil", "Trojan.Win32.Small.wfby", "TrojWare.Win32.TrojanDropper.Small.dil0", "Trojan.MulDrop.30852", "BehavesLike.Win32.Downloader.mc", "Trojan-Dropper.Win32.Delf", "Trojan[Spy]/Win32.Zbot", "Trojan.Heur.E2A3DF", "Dropper.Small.86866", "Trojan-Dropper.Win32.Small.dil", "Trojan/Win32.Batat.R4771", "W32/Dropper.DIL!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Package", "Name", "SHA256", "digest", "SHA1", "certificate", "com.network.android", "ade8bef0ac29fa363fc9afd958af0074478aef650adeb0318517b48bd996d5d5", "44f6d1caa257799e57f0ecaf4e2e216178f4cb3d", "com.network.android", "3474625e63d0893fc8f83034e835472d95195254e1e4bdf99153b7c74eb44d86", "516f8f516cc0fd8db53785a48c0a86554f75c3ba", "Additional", "digests", "with", "links", "to", "Chrysaor", "As", "a", "result", "of", "our", "investigation", "we", "have", "identified", "these", "additional", "Chrysaor-related", "apps", "." ]
[ 16, 16, 16, 16, 16, 16, 1, 1, 1, 1, 1, 1, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16 ]
[ "The", "commands", "are", "self-explanatory", "and", "show", "the", "features", "included", "in", "the", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "attacking", "IP", "addresses", "originated", "from", "very", "distinctive", "network", "ranges", "mostly", "associated", "with", "Chinese", "Internet", "service", "providers." ]
[ 1, 9, 9, 9, 16, 16, 16, 16, 12, 16, 16, 16, 16, 4, 12, 12, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Multi", "Trojan.Win32.Inject.exdppy", "Trojan.Win32.Z.Kryptik.258107", "Troj.W32.Virtumonde.mCBt", "Trojan.Inject.60399", "Trojan.Kryptik.Win32.1344676", "BehavesLike.Win32.Worm.dc", "Trojan:Win32/Kexject.A", "Spyware/Win32.Zbot.C145539", "Trj/CI.A", "Win32.Trojan.Inject.Auto" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.Hekdor.88576", "Backdoor/Hekdor.a", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Risk.EEXH-5977", "Win32/Hekdor.A", "BKDR_HEKDOR.A", "Win.Trojan.HackersDoor-6351576-1", "Backdoor.Win32.Hackdoor.12", "Trojan.Win32.Hekdor.gtcj", "Backdoor.Win32.Hackdoor.88576", "Backdoor.W32.Hackdoor.f!c", "Backdoor.Win32.Hackdoor.~dy001", "BackDoor.Hackdoor.22", "Backdoor.Hekdor.Win32.1", "BehavesLike.Win32.Virut.mh", "Trojan.Win32.Hekdor", "Trojan[Backdoor]/Win32.Hackdoor", "Win32.Hack.Hekdor.a.kcloud", "Trojan.Graftor.Elzob.D2551", "Backdoor.Win32.Hackdoor.12", "Backdoor/Win32.Hackdoor.R101239", "Bck/Iroffer.BG", "Win32.Backdoor.Hackdoor.Pegb", "Backdoor.Hekdor.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "They", "find", "and", "share", "readily", "available", "code", "and", "use", "those", "to", "make", "their", "own", "malware." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Worm/Win32.AutoRun" ]
[ 16, 3, 16, 16, 16, 1 ]
[ "This", "payload", "is", "also", "used", "by", "the", "earlier", "versions", "of", "the", "implant", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Lookout", "customers", "are", "also", "protected", "from", "this", "threat", "on", "both", "Android", "and", "iOS", "." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Clicker.cysqcu", "Trojan.Click2.41012", "TR/Storup.D.158", "Trojan:Win32/Storup.D", "Trojan.Graftor.DA5F2", "TrojanSpy.Gaxfid!V9zv1PzO78E", "Trojan.Win32.Spy", "Trj/CI.A", "Win32/Trojan.b34" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Packer.W32.Katusha!c", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "TROJ_TRACUR.SMVB", "Packed.Win32.Katusha.ac", "Trojan.Win32.Tracur.csqtnd", "Trojan.Win32.Z.Tracur.476672", "TrojWare.Win32.Kryptik.BJLP", "TROJ_TRACUR.SMVB", "TR/Tracur.ujeuv", "Trojan/Win32.Diple", "Trojan.Mikey.D823E", "Packed.Win32.Katusha.ac", "Trojan/Win32.Tracur.R87716", "Trojan.Tracur", "Win32/Boaxxe.BB", "Win32.Packed.Katusha.Aljh", "Trojan.Win32.Boaxxe", "Win32/Trojan.2ed" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DownloaderLTB.Trojan", "Trojan.Win32.Scar!O", "Trojan.Scar.20261", "Trojan/Scar.gfdd", "Trojan.Graftor.Elzob.D3707", "TROJ_DLOADE.SMEP", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Dropper", "Win32/SillyDl.HER", "TROJ_DLOADE.SMEP", "Win.Trojan.Scar-864", "Virus.Win32.Lamer.vpqnl", "Trojan.DownLoader22.5119", "TR/Taranis.2688", "Trojan/Win32.Scar", "Trojan.Win32.A.Scar.100616", "Trojan/Win32.Scar.R4127", "Trojan.Scar", "Trojan.Win32.Sisproc" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Cadlotcorg", "Trojan.DistTrack.stdr", "BKDR_DISTTRACK.E", "Win.Malware.StoneDrill-6012379-0", "Trojan.Win32.Inject.wmyt", "Trojan.Win32.Inject.ekcbzj", "Trojan.Win32.Z.Inject.195072", "Troj.W32.Inject!c", "Trojan.Stoned.5", "Trojan.StoneDrill.Win32.2", "BKDR_DISTTRACK.E", "W32/Trojan.CWLD-3265", "Trojan.Inject.uoh", "TR/Injector.sgcfh", "Trojan/Win32.Inject", "Trojan.Razy.D1AF37", "Trojan.Win32.Inject.wmyt", "Trojan:Win32/Cadlotcorg.A!dha", "Trojan/Win32.Injector.C1695778", "Trojan.DiskWriter", "Trj/CI.A", "Win32/StoneDrill.A", "Win32.Trojan.Inject.Eddh", "Trojan.Inject!MGtoNAyL21Q", "Trojan.Win32.Cadlotcorg" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "HummingBad", "also", "has", "the", "ability", "to", "inject", "code", "into", "Google", "Play", "to", "tamper", "with", "its", "ratings", "and", "statistics", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "functionality", "can", "be", "seen", "in", "Figure", "1", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "BehavesLike.Win32.VirRansom.pc" ]
[ 16, 3, 16, 16, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Iframer.77312", "Trojan.Iframer.aa", "Trojan.Win32.Iframer.aa", "Trojan/Iframer.aa", "Trojan.Iframer.X", "W32/DLoader.OAFQ", "Trojan.Win32.Iframer.aa", "TrojWare.Win32.Iframer.aa", "Trojan.Win32.Iframer.aa", "Trojan/Iframer.b", "Trojan.Win32.Iframer!IK", "Trojan:Win32/Ifrasif.A", "Trojan.Win32.Iframer.aa", "Trojan.Win32.Iframer" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Highlights", "Samples", "of", "the", "malicious", "code", "found", "in", "BrainTest", "have", "been", "found", "on", "Google", "Play", ",", "and", "its", "creator", "has", "used", "multiple", "methods", "to", "evade", "detection", "by", "Google", "including", "Bypassing", "Google", "Bouncer", "by", "detecting", "if", "the", "malware", "is", "being", "run", "from", "an", "IP", "or", "domain", "mapped", "to", "Google", "Bouncer", "and", ",", "if", "so", ",", "it", "will", "not", "perform", "its", "intended", "malicious", "activities", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Kazy.D1DA5C", "Win32.Trojan.WisdomEyes.16070401.9500.9993", "Trojan.Win32.Steam.cwybnb", "TrojWare.Win32.PSW.Steathie.B2", "Trojan.PWS.Steam.292", "TR/PSW.Steathie.B", "PWS:MSIL/Pasdael.A", "W32/Sc!tr.pws" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "When", "analyzing", "the", "Ginp", "’", "s", "recent", "samples", ",", "ThreatFabric", "analysts", "found", "some", "similarities", "with", "the", "famous", "Android", "banking", "Trojan", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.PSW.Vorbeld.B", "Trojan/W32.Ikmet.307200", "Trojan.PSW.Vorbeld.B", "Troj.IM.W32.Ikmet.e!c", "Trojan/Ikmet.e", "Trojan.PSW.Vorbeld.B", "TROJ_VORBELD.B", "TROJ_VORBELD.B", "Trojan.PSW.Vorbeld.B", "Trojan-IM.Win32.Ikmet.e", "Trojan.PSW.Vorbeld.B", "Trojan.Win32.Ikmet.diag", "Win32.Trojan-im.Ikmet.Lfzq", "Trojan.PSW.Vorbeld.B", "TrojWare.Win32.PSW.Vorbeld.B", "Trojan.PSW.Vorbeld.B", "Trojan.PWS.Special.11", "Trojan.Ikmet.Win32.2", "BehavesLike.Win32.Fareit.fz", "W32/Risk.ZFPE-4855", "Trojan/PSW.Vorbeld.b", "TR/PSW.Vorbeld.b", "Trojan[IM]/Win32.Ikmet", "Win32.Troj.Vorbeld.b.kcloud", "PWS:Win32/Vorbeld.B", "Trojan-IM.Win32.Ikmet.e", "TScope.Trojan.VB", "Win32/PSW.Vorbeld.B", "Trojan.Ikmet!CCqyhhL0iag", "Backdoor.VB", "W32/Vorbeld.E!tr", "Win32/Trojan.IM.00b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "EventBot", "Obfuscated", "class", "names", "Obfuscated", "class", "names", "using", "letters", "of", "the", "alphabet", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "particular", ",", "these", "apps", "try", "to", "add", "an", "additional", "method", "called", "statistics", "(", ")", "into", "the", "Activity", "class", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.PWS.OnlineGames.AAGG", "Trojan.Magania.19302", "Trojan.PWS.OnlineGames.AAGG", "TSPY_ONLINEG.IGO", "Win32.Trojan.WisdomEyes.16070401.9500.9932", "Infostealer.Onlinegame", "Win32/Frethog.CIL", "TSPY_ONLINEG.IGO", "Win.Spyware.59235-2", "Trojan-GameThief.Win32.OnLineGames.txbo", "Trojan.PWS.OnlineGames.AAGG", "Trojan.Win32.OnLineGames.lhee", "Troj.PSW32.W.QQPass.lpXN", "Trojan.PWS.OnlineGames.AAGG", "TrojWare.Win32.Trojan.Inject.~II", "Trojan.PWS.OnlineGames.AAGG", "Trojan.MulDrop4.15206", "PWS-OnlineGames.co", "Trojan/PSW.OnLineGames.auru", "Trojan[GameThief]/Win32.WOW.gic", "Win32.Troj.OnlineGames.sd.kcloud", "Trojan.PWS.OnlineGames.AAGG", "Trojan.Win32.PSWIGames.11924.B", "Trojan.PWS.OnlineGames.AAGG", "Trojan/Win32.OnlineGameHack.C909", "TrojanPSW.OnLineGames.nr", "Trojan-Spy.OnLineGames" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Cyphort", "has", "been", "monitoring", "how", "threat", "actors", "are", "exploiting", "computing", "resources", "from", "compromised", "victims", "to", "mine", "various", "crypto", "currencies." ]
[ 4, 16, 16, 16, 16, 6, 14, 16, 5, 13, 16, 16, 16, 16, 16, 1, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Ransom.Win32.Toxic.a", "BehavesLike.Win32.BadFile.jc", "Trojan.Win32.Ransom.a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "β€œ", "These", "communication", "channels", "are", "hard", "to", "discover", "and", "even", "harder", "to", "block", "entirely", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanRansom.Blocker", "Ransom_Blocker.R0C1C0DHU17", "Win32.Trojan.WisdomEyes.16070401.9500.9605", "Ransom_Blocker.R0C1C0DHU17", "Trojan-Ransom.Win32.Blocker.kgrm", "Troj.Ransom.W32.Blocker!c", "BehavesLike.Win32.RansomCerber.gh", "W32/Trojan.DOGS-7123", "W32.Trojan.Backdoor", "TR/Crypt.ZPACK.hmkaa", "Trojan-Ransom.Win32.Blocker.kgrm", "Trojan/Win32.Dapato.C1720332", "Hoax.Blocker", "Trojan.Dropper", "Trj/CI.A", "Win32.Trojan.Blocker.Akzg", "Trojan.Blocker!U13z+V78Arg", "Win32/Trojan.Ransom.acc" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Since", "the", "start", "of", "the", "Russo-Ukrainian", "conflict,", "Kaspersky", "researchers", "and", "the", "international", "community", "at", "large", "have", "identified", "a", "significant", "number", "of", "cyberattacks", "executed", "in", "a", "political", "and", "geopolitical", "context." ]
[ 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 4, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16 ]
[ "network.exe", "submitting", "to", "the", "server", "code", "snippet", "Code", "similarities", "We", "found", "some", "code", "similarities", "between", "the", "implant", "for", "Windows", "and", "other", "public", "accessible", "projects", "." ]
[ 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16 ]
[ "In", "the", "image", "below", ",", "we", "see", "a", "log", "TrickMo", "sent", "to", "the", "attacker", "upon", "becoming", "the", "default", "SMS", "app", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win.Trojan.Dadobra-446", "Trojan-Downloader.Win32.Banload.bnlx", "Trojan.Win32.Downloader.337408.M", "TrojWare.Win32.TrojanDownloader.Dadobra.~JK", "Trojan.DownLoader5.10443", "Trojan-Downloader.Win32.Banload", "TrojanDownloader.Banload.bhs", "Trojan[Downloader]/Win32.Banload", "Trojan-Downloader.Win32.Banload.bnlx", "Trojan:Win32/Banload.A", "Downloader/Win32.Banload.C108589", "Win32/Spy.Banker.WNS", "Win32.Trojan-downloader.Banload.Ebhk" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Dropper", "variants", "are", "usually", "barely", "functioning", "photo", "utility", ",", "games", ",", "or", "sex", "related", "apps", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "SMS", "messages", "." ]
[ 16, 16, 16 ]
[ "Let's", "examine", "a", "couple", "of", "interesting", "delivery", "techniques", "from", "an", "APT", "active", "for", "the", "past", "several", "years,", "the", "Spring", "Dragon", "APT." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 16, 11, 16, 0, 8, 8, 16, 6, 14, 14 ]
[ "]", "16", "lala513.gicp", "[", "." ]
[ 9, 9, 1, 9, 9 ]
[ "SunOrcal", "activity", "has", "been", "documented", "to", "at", "least", "2013,", "and", "based", "on", "metadata", "surrounding", "some", "of", "the", "C2s,", "may", "have", "been", "active", "as", "early", "as", "2010." ]
[ 3, 16, 16, 16, 16, 16, 0, 8, 8, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 0, 8, 8 ]
[ "A", "backdoor", "also", "known", "as:", "TSPY_MALUMPOS.SM", "TSPY_MALUMPOS.SM", "Win.Trojan.MalumPOS-1", "TR/AD.Siaacsia.ielmw", "Trojan:Win32/Malumpos.A", "Trojan/Win32.Malumpos.C1727078", "Trojan-Spy.MalumPOS", "Win32/Trojan.Spy.958" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "net", "app", "store", "was", "replaced", "with", "the", "malicious", "HenBox", "app", ";", "however", ",", "some", "indicators", "point", "to", "the", "server", "running", "an", "outdated", "version", "of", "Apache", "Web", "Server", "on", "a", "Windows", "32-Bit", "operating", "system", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16 ]
[ "An", "aside:", "the", "rootkit", "does", "appear", "to", "be", "named", "after", "the", "PokΓ©mon", "of", "the", "same", "name." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Application.Hacktool.EH", "Trojan/W32.HackTool.215552", "Trojan.Mauvaise.SL1", "Win.Tool.Wincred-6333920-0", "Application.Hacktool.EH", "HackTool.Win64.WinCred.c", "Application.Hacktool.EH", "Application.Hacktool.EH", "Tool.WinCred.1", "BehavesLike.Win64.BrowseFox.dh", "W64/Application.WFWG-6345", "Application.Hacktool.EH", "HackTool.Win64.WinCred.c", "Application.Hacktool.EH", "HackTool.Win64", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Similarly", ",", "there", "are", "many", "crucial", "commands", "that", "further", "allow", "this", "spyware", "to", "perform", "additional", "functionality", ",", "such", "as", "executing", "commands", "sent", "by", "the", "C", "&", "C", ",", "clicking", "photos", ",", "capturing", "screenshots", ",", "stealing", "location", "information", ",", "and", "more", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper/W32.Dapato.26112", "Trojan-Dropper.Win32.Dapato!O", "BackdoorAPT.Hikiti.G4", "Win32.Trojan.WisdomEyes.16070401.9500.9983", "Backdoor.Trojan", "BKDR_FEXEL.MM", "Backdoor.Win32.Fexel.b", "Trojan.Win32.Dapato.ceuzkz", "Trojan.DownLoader10.12491", "BehavesLike.Win32.Downloader.mc", "Trojan.Win32.Farfli", "W32/Backdoor.QCOF-8324", "Trojan[Dropper]/Win32.Dapato", "Trojan.Heur.E97E22", "Troj.Dropper.W32.Dapato.dawi!c", "Backdoor.Win32.Fexel.b", "Backdoor:Win32/Hikiti.G!dha", "Dropper/Win32.Dapato.C199271", "Win32.Backdoor.Fexel.Wvkt", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "legitimate", "version", "of", "this", "app", "is", "also", "available", "on", "Google", "Play", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "It", "is", "assumed", "that", "actors", "using", "the", "malware", "are", "targeting", "small-", "to", "medium-sized", "businesses", "given", "the", "malware's", "focus", "on", "VNC", "applications." ]
[ 16, 16, 16, 16, 6, 16, 16, 3, 16, 16, 4, 12, 12, 12, 16, 16, 3, 16, 16, 5, 13 ]
[ "In", "spite", "of", "these", "commonalities,", "we", "have", "not", "identified", "any", "firm", "links", "between", "the", "two", "groups." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "source", "process", "changes", "the", "registers", "in", "the", "target", "process", "so", "that", "PC", "register", "points", "directly", "to", "the", "shellcode", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "new", "wave", "of", "attacks", "has", "also", "used", "some", "infrastructure", "that", "has", "previously", "been", "used", "in", "Carbanak", "campaigns." ]
[ 16, 16, 16, 16, 1, 16, 16, 16, 16, 5, 15, 16, 16, 16, 16, 16, 6, 14 ]
[ "This", "is", "done", "using", "the", "ptrace", "syscall", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "β€œ", "The", "takeaway", "?", "Internet", "users", "should", "keep", "on", "securing", "their", "activities", "with", "good", "security", "solutions", "for", "both", "computers", "and", "mobile", "devices.", "”", "Hashes", ":", "E5212D4416486AF42E7ED1F58A526AEF77BE89BE", "A9891222232145581FE8D0D483EDB4B18836BCFC", "AFF9F39A6CA5D68C599B30012D79DA29E2672C6E", "Insidious", "Android", "malware", "gives", "up", "all", "malicious", "features", "but", "one", "to", "gain", "stealth", "ESET", "researchers", "detect", "a", "new", "way", "of", "misusing", "Accessibility", "Service", ",", "the", "Achilles", "’", "heel", "of", "Android", "security", "22", "May", "2020", "-", "03:00PM", "ESET", "researchers", "have", "analyzed", "an", "extremely", "dangerous", "Android", "app", "that", "can", "perform", "a", "host", "of", "nefarious", "actions", ",", "notably", "wiping", "out", "the", "victim", "’", "s", "bank", "account", "or", "cryptocurrency", "wallet", "and", "taking", "over", "their", "email", "or", "social", "media", "accounts", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 1, 1, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.ArchSMS!Tf0HkXJW05g", "Hoax.Win32.ArchSMS.hqqg", "Hoax.ArchSMS.hqqg", "SecurityRisk.PremiumSMSScam", "Hoax.Win32.ArchSMS", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "The", "new", "family", "appears", "to", "have", "been", "in", "the", "wild", "since", "late", "2016", "and", "to", "date", "we", "have", "only", "identified", "10", "unique", "samples,", "indicating", "it", "may", "be", "sparingly", "used." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 0, 8, 8, 8, 8, 8, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "BLOCKER_STOP", "–", "block", "display", "of", "all", "HTML", "pages", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win32.Koutodoor!IK", "Backdoor:Win32/Koutodoor.B", "Backdoor.Win32.Koutodoor.da", "SHeur2.AIKX" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "It", "specifically", "targets", "financial", "banking", "applications", "across", "the", "United", "States", "and", "Europe", ",", "including", "Italy", ",", "the", "UK", ",", "Spain", ",", "Switzerland", ",", "France", ",", "and", "Germany", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "StreamEx", "family", "has", "the", "ability", "to", "access", "and", "modify", "the", "user's", "file", "system,", "modify", "the", "registry,", "create", "system", "services,", "enumerate", "process", "and", "system", "information,", "enumerate", "network", "resources", "and", "drive", "types,", "scan", "for", "security", "tools", "such", "as", "firewall", "products", "and", "antivirus", "products,", "change", "browser", "security", "settings,", "and", "remotely", "execute", "commands." ]
[ 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 5, 16, 16, 16, 16, 5, 16, 16, 5, 16, 16, 16, 16, 16, 11, 12, 16, 16, 16, 5, 13, 16, 5, 13, 16, 16, 1, 9, 16, 1, 9, 9 ]