tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "Hide", "Icon", "Figure", "3", ":", "Code", "showing", "the", "hiding", "icon", "and", "starting", "service", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Comfold", "Trojan:Win32/Comfold.A" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "Third-party", "marketplaces", "or", "some", "other", "attacker-controlled", "domains", "are", "likely", "used", "to", "host", "the", "sample", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Indicators", "of", "Compromise", "SHA256", "Package", "App", "label", "332e68d865009d627343b89a5744843e3fde4ae870193f36b82980363439a425", "ufD.wykyx.vlhvh", "SEX", "kr", "porn", "403401aa71df1830d294b78de0e5e867ee3738568369c48ffafe1b15f3145588", "ufD.wyjyx.vahvh", "佐川急便", "466dafa82a4460dcad722d2ad9b8ca332e9a896fc59f06e16ebe981ad3838a6b", "com.dhp.ozqh", "Facebook", "5022495104c280286e65184e3164f3f248356d065ad76acef48ee2ce244ffdc8", "ufD.wyjyx.vahvh", "Anshin", "Scan", "a0f3df39d20c4eaa410a61a527507dbc6b17c7f974f76e13181e98225bda0511", "com.aqyh.xolo", "佐川急便", "cb412b9a26c1e51ece7a0e6f98f085e1c27aa0251172bf0a361eb5d1165307f7", "jp.co.sagawa.SagawaOfficialApp", "佐川急便", "Malicious", "URLs", ":", "hxxp", ":", "//38", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 1, 1, 16, 16, 16, 1, 1, 16, 1, 1, 4, 1, 1, 16, 16, 1, 1, 16, 1, 1, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Worm.Win32.AutoRun!O", "Worm.AutoRun.Win32.132231", "Win32.Trojan.ServStart.a", "Win.Trojan.Qhost-160", "Trojan.Win32.AutoRun.cvpwhj", "Trojan.DownLoader4.40333", "BehavesLike.Win32.Ipamor.lm", "TR/Dldr.JKCN", "Trojan/Win32.Downloader.C40577", "Trojan.Win32.Wc", "Win32/AutoRun.PT", "Trojan-Proxy.Win32.Ranky" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "handful", "of", "malicious", "features", "densely", "packed", "in", "this", "new", "malware", "also", "includes", "the", "ability", "to", "drop", "other", "malware." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "]", "net", "–", "C", "&", "C", "servers", "NG", "SuperShell", "–", "string", "from", "the", "reverse", "shell", "payload", "ngg", "–", "prefix", "in", "commands", "names", "of", "the", "implant", "for", "Windows", "Signature", "with", "specific", "issuer", "Whois", "records", "and", "IP", "relationships", "provide", "many", "interesting", "insights", "as", "well", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "DOWNLOAD", "AND", "UPDATE", "THE", "TARGET", "CONFIGURATION", "FILE", "By", "analyzing", "and", "decoding", "the", "HTTP", "packets", "in", "EventBot", "Version", "0.0.0.1", ",", "we", "can", "see", "that", "EventBot", "downloads", "and", "updates", "a", "configuration", "file", "with", "almost", "200", "different", "financial", "application", "targets", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Once", "the", "malware", "can", "use", "accessibility", "services", ",", "it", "has", "the", "ability", "to", "operate", "as", "a", "keylogger", "and", "can", "retrieve", "notifications", "about", "other", "installed", "applications", "and", "content", "of", "open", "windows", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.ShipBHQc.Trojan", "Trojan.Win32.ShipUp!O", "TrojanPWS.Zbot.Y", "Trojan/Kryptik.awzk", "Trojan.Razy.D3C5B", "TROJ_KRYPTK.SML3", "Win.Trojan.Redirect-6055402-0", "Trojan.Win32.ShipUp.brmnrc", "Trojan.Redirect.140", "Trojan.ShipUp.Win32.1152", "TROJ_KRYPTK.SML3", "BehavesLike.Win32.PWSZbot.dh", "Trojan.Win32.ShipUp", "Trojan/ShipUp.ix", "TR/Rogue.kdz.11287.3", "Trojan/Win32.ShipUp", "TrojanDropper:Win32/Gepys.A", "Troj.W32.ShipUp.lINm", "Trojan/Win32.Shipup.R58491", "TScope.Malware-Cryptor.SB", "Trojan.FakeMS.ED", "W32/Kryptik.AYTK!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Spy.Win32.Tibia!O", "Win32.Trojan.WisdomEyes.16070401.9500.9963", "Trojan.Win32.Drop.cbndjf", "Trojan.MulDrop3.1226", "BehavesLike.Win32.BadFile.rc", "Trojan-Dropper.Win32.Monya", "TR/Drop.Tibdef.B", "Trojan.Raldhep.1", "TrojanDropper:Win32/Tibdef.B", "W32/Dropper.AAAI!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "is", "in", "use", "by", "the", "Molerats", "aka", "Gaza", "cybergang,", "a", "politically", "motivated", "group", "whose", "main", "objective,", "we", "believe,", "is", "intelligence", "gathering." ]
[ 16, 16, 16, 16, 16, 16, 6, 16, 6, 14, 16, 6, 14, 14, 16, 16, 16, 16, 16, 16, 1, 9 ]
[ "The", "Magnitude", "exploit", "kit", "has", "been", "using", "an", "XML", "configuration", "file", "critical", "to", "retrieving", "the", "malware", "payload", "Cerber", "for", "several", "months", "already." ]
[ 3, 11, 11, 11, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 3, 11, 11, 11, 16, 16, 16, 16 ]
[ "Here", "is", "Forcepoint", "Security", "Labs", "we", "have", "seen", "a", "number", "of", "changes", "and", "improvements", "over", "the", "last", "few", "months." ]
[ 16, 16, 4, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 0, 8, 8 ]
[ "The", "actors", "compromised", "the", "sites", "of", "a", "local", "television", "network,", "educational", "organizations,", "a", "religious", "institute,", "and", "a", "known", "political", "party", "in", "Taiwan;", "and", "a", "popular", "news", "site", "in", "Hong", "Kong." ]
[ 16, 6, 1, 9, 9, 16, 16, 4, 12, 12, 12, 12, 12, 12, 12, 16, 4, 12, 12, 12, 16, 2, 16, 4, 12, 12, 12, 16, 2, 10 ]
[ "One", "of", "the", "first", "changes", "that", "stands", "out", "is", "that", "the", "screen", "recording", "feature", "mentioned", "in", "the", "previous", "sample", "has", "been", "removed", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "List", "of", "package", "names", "of", "apps", "on", "events", "from", "which", "the", "Trojan", "opens", "a", "fake", "Google", "Play", "window", "(", "for", "the", "Russian", "version", "of", "the", "Trojan", ")", "Example", "of", "Trojan", "screen", "overlapping", "other", "apps", "When", "bank", "card", "details", "are", "entered", "in", "the", "fake", "window", ",", "Riltok", "performs", "basic", "validation", "checks", ":", "card", "validity", "period", ",", "number", "checksum", ",", "CVC", "length", ",", "whether", "the", "number", "is", "in", "the", "denylist", "sewn", "into", "the", "Trojan", "code", ":", "Examples", "of", "phishing", "pages", "imitating", "mobile", "banks", "At", "the", "time", "of", "writing", ",", "the", "functionality", "of", "most", "of", "the", "Western", "versions", "of", "Riltok", "was", "somewhat", "pared", "down", "compared", "to", "the", "Russian", "one", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "disallows", "apps", "to", "be", "installed", "on", "your", "device", "from", "unknown", "sources", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Vetor.PE", "Virus.Win32.Virut.1!O", "W32.Virut.G", "PE_VIRUX.O", "W32/Trojan2.OALA", "W32.Virut.CF", "Win32/Virut.17408", "PE_VIRUX.O", "Win32.Virus.Virut.Q", "Virus.Win32.Virut.ce", "Virus.Win32.Virut.hpeg", "Virus.Win32.Virut.CE", "Win32.Virut.56", "Virus.Virut.Win32.1938", "BehavesLike.Win32.Virut.cc", "W32/Trojan.JXET-3602", "Win32/Virut.bt", "Virus/Win32.Virut.ce", "Win32.Virut.cr.61440", "W32.Virut.lM6H", "Virus.Win32.Virut.ce", "TrojanClicker:MSIL/Xobnff.A", "Win32/Virut.F", "Virus.Virut.14", "W32/Sality.AO", "Win32/Virut.NBP", "Virus.Win32.Virut", "W32/Virut.CE", "Virus.Win32.Virut.M" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Zegost.FC.2167", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Trojan.DownLoader22.48526", "BehavesLike.Win32.Trojan.cc", "Trojan.MSIL.Bladabindi.1", "MSIL/Injector.PJG!tr", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "analysis", "dissects", "FakeSpy", "’", "s", "Chunghwa", "Post", "app", "version", ",", "which", "emerged", "in", "April", "2020", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Such", "references", "would", "be", "in", "line", "with", "FrozenCell", "'s", "phishing", "tactics", "in", "which", "they", "used", "file", "names", "to", "lure", "people", "associated", "with", "the", "political", "party", "to", "open", "malicious", "documents", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Sinkhole", "data", "explained", "below", "shows", "just", "how", "quickly", "this", "campaign", "is", "impacting", "victims." ]
[ 1, 9, 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Netstop.A", "Trojan.Netstop.A", "Backdoor.Trojan", "Win32/Noshare.N", "TROJ_NETSTOPA.A", "Trojan.Netstop.A", "Trojan.Win32.Netstop.dyylkw", "Win32.Trojan-spy.Gc.Hsii", "Trojan.Netstop.A", "Worm.Win32.SpyBot.GC", "Trojan.Netstop.A", "Email-Worm.Win32.GOPworm.196", "TROJ_NETSTOPA.A", "TR/Netstop.A", "Trojan.Netstop.A", "Trojan.Netstop.A", "Email-Worm.Win32.GOPworm.196", "Win32/SpyBot.GC", "Worm.SpyBot!FiFtixQJKm8", "W32/Netstop.A!tr", "Bck/Secur.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "FireEye", "assesses", "that", "APT32", "leverages", "a", "unique", "suite", "of", "fully-featured", "malware,", "in", "conjunction", "with", "commercially-available", "tools,", "to", "conduct", "targeted", "operations", "that", "are", "aligned", "with", "Vietnamese", "state", "interests." ]
[ 4, 16, 16, 6, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 3, 16, 16, 16, 6, 16, 16, 16, 16, 2, 10, 16 ]
[ "android.intent.action.restart", "A", "legacy", "intent", "used", "to", "indicate", "a", "system", "restart", "." ]
[ 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "list", "of", "banks", "targeted", "by", "Red", "Alert", "2.0", "includes", "NatWest", ",", "Barclays", ",", "Westpac", ",", "and", "Citibank", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16 ]
[ "In", "recent", "years,", "the", "detention", "and", "interrogation", "of", "members", "of", "online", "communities", "has", "been", "publicized", "by", "state", "media", "for", "propaganda", "purposes." ]
[ 16, 0, 16, 16, 16, 16, 16, 16, 4, 16, 4, 12, 16, 16, 16, 16, 4, 12, 16, 16, 16 ]
[ "PaloAlto", "Unit", "42", "researchers", "have", "observed", "a", "new", "Remote", "Access", "Tool", "RAT", "constructed", "by", "an", "unknown", "actor", "of", "Italian", "origin." ]
[ 4, 12, 12, 12, 16, 16, 16, 16, 3, 11, 11, 11, 16, 16, 16, 6, 14, 16, 2, 10 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Inject.IA", "Trojan.Skeeyah.8818", "Infostealer.Kegotip!gm", "TSPY_KEGOTIP.SMA", "Trojan.Inject.IA", "Trojan-PSW.Win32.Minari.a", "Trojan.Inject.IA", "Trojan.Inject.IA", "Trojan.Inject.IA", "Trojan.PWS.Stealer.2518", "TSPY_KEGOTIP.SMA", "BehavesLike.Win32.Backdoor.ch", "Trojan[PSW]/Win32.Minari", "Trojan.Inject.IA", "Trojan-PSW.Win32.Minari.a", "Trojan/Win32.PWS.R100577", "Trojan.Inject.IA" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Conclusion", "Threats", "are", "better", "prevented", "than", "cured", ",", "so", "do", "not", "follow", "suspicious", "links", "in", "SMS", ",", "and", "be", "sure", "to", "install", "apps", "only", "from", "official", "sources", "and", "check", "what", "permissions", "you", "are", "granting", "during", "installation", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win32.Mutopy!O", "Trojan.Mutopy.A", "TROJ_MUTOPY.SMYN", "Win32.Trojan.WisdomEyes.16070401.9500.9995", "TROJ_MUTOPY.SMYN", "Win.Trojan.Multi-6413508-0", "Troj.Dropper.W32.Dapato.lCcB", "Trojan.MulDrop4.10927", "BehavesLike.Win32.Downloader.hh", "TR/Kazy.34213.jh", "Trojan:Win32/Mutopy.A", "Trojan.Naffy.1", "Trojan/Win32.HDC.C53646", "TScope.Malware-Cryptor.SB", "Trojan.Win32.Jorik", "W32/Rodecap.AS!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Cybereason", "Mobile", "Detecting", "EventBotCybereason", "Mobile", "detecting", "EventBot", "." ]
[ 4, 12, 16, 16, 16, 16, 3, 16 ]
[ "The", "method", "is", "a", "well-known", "trick", "used", "by", "penetration", "testers", "that", "was", "automated", "and", "generalized", "by", "FinFisher", "The", "procedure", "starts", "by", "enumerating", "the", "KnownDlls", "object", "directory", "and", "then", "scanning", "for", "section", "objects", "of", "the", "cached", "system", "DLLs", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.W32.Androm.toYX", "Trojan/Injector.drgl", "Win32.Trojan.WisdomEyes.16070401.9500.9978", "Win.Trojan.WillExec-6356235-0", "Backdoor.Androm.sdz", "Trojan.Zusy.D3FE2C", "Trojan:Win32/Lethic.Q!bit", "Backdoor.Androm", "Trj/GdSda.A", "W32/Injector.DQID!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Samples", "uploaded", "to", "public", "repositories", "indicate", "that", "the", "new", "version", "of", "Typhon", "Reborn", "has", "been", "in", "the", "wild", "since", "December", "2022." ]
[ 3, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 0, 8, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Trojan.RHUU-4415", "MSIL.Trojan.Packed.G", "Trojan-Dropper.Win32.Scrop.ccm", "Trojan.Win32.Inject.dzszva", "Trojan.PWS.Multi.1690", "BehavesLike.Win32.Trojan.tc", "TrojanDropper.Sysn.arw", "TR/Injector.drydq", "Trojan/MSIL.Inject", "Trojan:MSIL/Plimrost.B", "Trojan.Kazy.DAD984", "Trojan-Dropper.Win32.Scrop.ccm", "Trojan/Win32.Injector.C952834", "Trj/CI.A", "Trojan.MSIL.Injector", "MSIL/Kryptik.DDP!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Zcrypt", "uses", "the", "Nullsoft", "Scriptable", "Install", "System,", "which", "works", "like", "a", "Zip", "file,", "decompressing", "and", "loading", "the", "content", "while", "running." ]
[ 3, 16, 5, 13, 13, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", "used", "in", "the", "new", "attacks", "was", "a", "variant", "of", "the", "infamous", "Shamoon", "worm", "that", "targeted", "Saudi", "Aramco", "and", "Rasgas", "back", "in", "2012." ]
[ 16, 3, 16, 16, 16, 16, 1, 16, 16, 3, 16, 16, 16, 3, 11, 16, 16, 4, 12, 16, 4, 16, 16, 0 ]
[ "This", "malware", "is", "simplistic", "in", "comparison", "to", "some", "modern-day", "Android", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "Some", "of", "these", "might", "have", "been", "used", "on", "old", "campaigns", "or", "were", "already", "prepared", "for", "new", "campaigns", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Again", ",", "the", "concept", "is", "that", "new", "victims", "are", "more", "likely", "to", "install", "the", "malware", "if", "the", "SMS", "comes", "from", "someone", "they", "know", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "technical", "note", "discusses", "a", "relatively", "undocumented", "implant", "used", "by", "the", "APT10", "group." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14 ]
[ "A", "backdoor", "also", "known", "as:", "TROJ_STARTPA.NSS", "W32/Backdoor2.HTGN", "Win32/Wysotot.GJVbdHD", "TROJ_STARTPA.NSS", "Win32.Trojan-Hijacker.Wysotot.A", "Trojan.Win32.AdLoad.eizvbn", "Adware.Mutabaha.255", "Adware.MutabahaCRTD.Win32.1189", "BehavesLike.Win32.ICLoader.gc", "Backdoor.Win32.ZAccess", "W32/Backdoor.SAIZ-5729", "Trojan/Win32.StartPage", "Trojan.Adware.Zusy.D1584D", "PUP.Elex/Variant", "Downloader/Win32.Adware.R86759", "Trojan.StartPage", "PUP.Optional.Elex", "Trj/CI.A", "Trojan.StartPage!B6aZ1c5P97Y" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.MSIL.Crypt.gauf", "Trojan.Starter.7472", "Trojan.MSIL.ilny", "TR/AD.Binderon.roatv", "Trojan.Ursu.D13D6D", "Trojan.MSIL.Crypt.gauf", "PWS:AutoIt/Passup.A", "Win32/Spy.Autoit.BY", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.1BC9", "Trojan.Banavkill", "Trojan-Banker.Win32.Banbra.wjem", "Trojan.Win32.Banbra.exnyzm", "TR/Spy.Banker.ohxzm", "Trojan.Ursu.D10A45", "Trojan-Banker.Win32.Banbra.wjem", "Trojan:Win32/Banavkill.A", "Trojan/Win32.Banbra.C2352559", "Trojan-Banker.Banbra", "Trj/GdSda.A", "Win32.Trojan.Falsesign.Htma", "Win32/Trojan.f8b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "are", "providing", "a", "detailed", "analysis", "of", "the", "rootkit,", "and", "also", "making", "the", "samples", "available", "to", "the", "industry", "to", "help", "others", "block", "this", "threat." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 3 ]
[ "The", "Flash", "zero-day", "exploit", "(", "CVE-2015-5119", ")", "was", "added", "into", "the", "Angler", "Exploit", "Kit", "and", "Nuclear", "Exploit", "Pack", "." ]
[ 16, 5, 16, 16, 16, 7, 16, 16, 16, 16, 16, 3, 11, 11, 16, 3, 11, 11, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.OnGamesLT180912HKGHAAI.Trojan", "Trojan.PWS.OnlineGames.ZON", "Trojan.PWS.OnlineGames.ZON", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Infostealer.Gampass", "TSPY_ONLINEG.FGF", "Win.Trojan.Onlinegames-44", "Trojan.PWS.OnlineGames.ZON", "Trojan.PWS.OnlineGames.ZON", "Trojan.Win32.OnLineGames.rzwt", "Troj.PSW32.W.OnLineGames.aoem!c", "Trojan.PWS.OnlineGames.ZON", "Packed.Win32.MUPACK.~KW", "Trojan.PWS.OnlineGames.ZON", "Trojan.PWS.Wsgame.5652", "Trojan.OnLineGames.Win32.160328", "TSPY_ONLINEG.FGF", "BehavesLike.Win32.Sdbot.cz", "Trojan/PSW.OnLineGames.akkc", "TrojanDropper:Win32/Tilcun.E", "Trojan/Win32.MalPack.C60090", "Trojan.PWS.OnlineGames.ZON", "BScope.Trojan-PSW.Gomex.22", "Trj/Pupack.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "infamous", "Remote", "Access", "Trojan", "RAT", "Poison", "Ivy", "hereafter", "referred", "to", "as", "PIVY", "has", "resurfaced", "recently,", "and", "exhibits", "some", "new", "behaviors." ]
[ 3, 11, 11, 11, 11, 11, 11, 11, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "However,", "we", "recently", "encountered", "a", "botnet", "that", "uses", "a", "more", "unusual", "method:", "an", "FTP", "server", "that,", "in", "effect,", "acts", "as", "a", "C", "C", "server." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 1, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.Small.40960.BX", "TROJ_FAKEAV.ASI", "W32/Backdoor2.HASV", "Backdoor.Trojan.B", "Win32/Wonip.A", "TROJ_FAKEAV.ASI", "Trojan.PWS.Sniftp.15", "W32/Backdoor.YSEB-6778", "BDS/Wonip.A", "Backdoor:Win32/Wonip.A", "Trojan/Win32.Xema.C82592", "W32/Backdr.FB!tr", "Win32/Backdoor.435" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Since", "we", "published", "our", "article", "on", "Sage", "2.0", "last", "February,", "and", "the", "discovery", "of", "version", "2.2", "in", "March,", "the", "FortiGuard", "Labs", "team", "hasn't", "seen", "significant", "activity", "with", "this", "malware", "for", "over", "six", "months." ]
[ 16, 16, 16, 16, 16, 16, 3, 11, 16, 0, 16, 16, 16, 16, 3, 11, 16, 0, 4, 12, 12, 12, 16, 16, 16, 16, 16, 16, 3, 16, 0, 8, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Qhosts", "Trojan.Win32.Z.Redcap.1251647", "TR/RedCap.ymgda" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "Reverse", "shell", "payload", "The", "reverse", "shell", "module", "is", "an", "external", "ELF", "file", "compiled", "by", "the", "attackers", "to", "run", "on", "Android", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16 ]
[ "We", "identified", "one", "specific", "spear", "phishing", "campaign", "launched", "against", "targets", "within", "Palestine,", "and", "specifically", "against", "Palestinian", "law", "enforcement", "agencies." ]
[ 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 2, 16, 16, 16, 4, 12, 12, 12 ]
[ "At", "the", "time", "of", "writing", "this", "article", ",", "no", "other", "significant", "changes", "in", "Asacub", "’", "s", "network", "behavior", "had", "been", "observed", ":", "The", "origin", "of", "Asacub", "It", "is", "fairly", "safe", "to", "say", "that", "the", "Asacub", "family", "evolved", "from", "Trojan-SMS.AndroidOS.Smaps", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 1, 16 ]
[ "Once", "installed", "on", "a", "device", "FrozenCell", "is", "capable", "of", ":", "Recording", "calls", "Retrieving", "generic", "phone", "metadata", "(", "e.g.", ",", "cell", "location", ",", "mobile", "country", "code", ",", "mobile", "network", "code", ")", "Geolocating", "a", "device", "Extracting", "SMS", "messages", "Retrieving", "a", "victim", "'s", "accounts", "Exfiltrating", "images", "Downloading", "and", "installing", "additional", "applications", "Searching", "for", "and", "exfiltrating", "pdf", ",", "doc", ",", "docx", ",", "ppt", ",", "pptx", ",", "xls", ",", "and", "xlsx", "file", "types", "Retrieving", "contacts", "The", "graph", "below", "represents", "a", "split", "of", "the", "types", "of", "data", "from", "only", "one", "misconfigured", "command", "and", "control", "server", "(", "out", "of", "over", "37", "servers", ")", "." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Yurist.Win32.37", "Win32.Trojan.WisdomEyes.16070401.9500.9992", "Backdoor.Win32.Yurist.cy", "Trojan.Win32.XFlash.bodumo", "Backdoor.W32.Yurist.cp!c", "Heur.Packed.Unknown", "BackDoor.XFlash", "BehavesLike.Win32.Backdoor.ph", "Backdoor/Yurist.z", "BDS/Yurist.K", "Backdoor:Win32/Yurist.K", "Trojan.Graftor.D45274", "Backdoor.Win32.Yurist.cy", "Trojan/Win32.LdPinch.C27294", "Win32.Backdoor.Yurist.Eads", "Backdoor.Yurist!9F5bediy4gg", "Backdoor.Win32.Yurist", "Trj/CI.A", "Win32/Backdoor.c62" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "If", "the", "victim", "opens", "it", "up,", "it", "will", "not", "only", "infect", "their", "system", "but", "send", "the", "same", "phishing", "document", "to", "other", "contacts", "via", "their", "Outlook", "inbox." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "BKDR_BAYROB.SM4", "Win32.Trojan.WisdomEyes.16070401.9500.9948", "BKDR_BAYROB.SM4", "TrojWare.Win32.Bayrob.A", "Trojan.Kelios.1", "Trojan:Win32/Horkremoz.A", "W32/Bayrob.O!tr", "Win32/Trojan.4af" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win32.TDSS!O", "Backdoor.TDSS.Win32.7367", "Trojan/Olmarik.akn", "Trojan.TDss.58", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "TSPY_ALUREON_CD102969.RDXN", "Win.Trojan.Tdss-302", "Backdoor.Win32.TDSS.dtx", "Trojan.Win32.TDSS.cdwoi", "Backdoor.Win32.A.Tdss.63488.B", "TrojWare.Win32.Olmarik.AME", "Trojan.DownLoader1.46896", "TSPY_ALUREON_CD102969.RDXN", "BehavesLike.Win32.VBObfus.kh", "Backdoor.Win32.TDSS", "Backdoor/TDSS.apn", "Trojan[Backdoor]/Win32.TDSS", "Win32.Hack.TDSS.d.kcloud", "Backdoor.Win32.TDSS.dtx", "Trojan/Win32.Tdss.R1603", "DNSChanger.ca", "Trojan.FakeAlert", "Win32/Olmarik.AKN", "Backdoor.TDSS!fzuavqQuzWg", "W32/DNSChanger.CA!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "’", "s", "possible", "the", "threat", "actors", "use", "this", "list", "to", "find", "running", "antivirus", "or", "banking", "applications", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This,", "combined", "with", "its", "focus", "on", "a", "specific", "region,", "makes", "this", "threat", "interesting", "from", "the", "malware", "researchers'", "perspective." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 4, 12, 16 ]
[ "Once", "they", "obtained", "access", "to", "the", "server,", "the", "attackers", "infected", "the", "system", "with", "two", "malicious", "payloads." ]
[ 16, 16, 16, 1, 16, 16, 5, 16, 6, 16, 16, 5, 16, 16, 3, 11 ]
[ "Standard", "Encryption", "Frequently", ",", "Bread", "apps", "take", "advantage", "of", "standard", "crypto", "libraries", "in", "`", "java.util.crypto", "`", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16 ]
[ "A", "typical", "Lurk", "infection", "uses", "browser", "exploits", "to", "deliver", "non-persistent", "payloads", "to", "potential", "victims,", "probing", "their", "targets", "before", "deploying", "additional", "malware." ]
[ 16, 16, 6, 16, 16, 7, 15, 16, 16, 3, 11, 16, 4, 12, 16, 16, 16, 16, 3, 11, 11 ]
[ "Backdoored", "Conversations", "C2", "server", "analysis", "During", "the", "analysis", "of", "the", "Smali", "injected", "apps", "and", "their", "C2", "server", "infrastructure", "we", "hadn", "’", "t", "found", "any", "interesting", "clues", ",", "but", "things", "changed", "when", "we", "looked", "at", "the", "C2", "server", "of", "the", "linked", "Conversations", "messenger", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Some", "of", "the", "popular", "Android", "applications", "that", "Ewind", "targets", "include", "GTA", "Vice", "City,", "AVG", "cleaner,", "Minecraft", "–", "Pocket", "Edition,", "Avast!", "Ransomware", "Removal,", "VKontakte,", "and", "Opera", "Mobile." ]
[ 16, 16, 16, 16, 5, 13, 16, 3, 16, 16, 5, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 16, 5, 13 ]
[ "For", "example", ",", "it", "could", "be", "used", "to", "display", "unwanted", "and", "annoying", "advertisements", "on", "a", "device", ",", "or", "potentially", ",", "to", "download", "and", "deploy", "a", "payload", "that", "steals", "credentials", "from", "an", "infected", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "FakeSpy", "Chunghwa", "Post", "version", "installation", "process", "and", "application", "UI", "." ]
[ 3, 4, 12, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Strictor.D1F9FA", "Trojan.Win32.BuhTrap.c", "Trojan.YakesCRTD.Win32.4839", "Trojan/Win32.BuhTrap.c", "Backdoor:Win32/Buhtrap.A!dha", "Trojan.Win32.BuhTrap.c", "Trj/GdSda.A", "Backdoor.Win32.Buhtrap", "W32/Delf.QJL!tr", "Win32/Trojan.5c7" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Instead", "of", "being", "controlled", "by", "a", "traditional", "command-and-control", "server", ",", "it", "receives", "instructions", "via", "tweets", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Malware", "code", "showing", "loading", "of", "decrypted", "dex", "file", "Figure", "12", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "were", "able", "to", "see", "that", "his", "recently", "visited", "web", "sites", "were", "Google", "Play", "pages", "belonging", "to", "apps", "containing", "the", "Ashas", "adware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 3, 11, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Etap.d", "Win32.Trojan.WisdomEyes.16070401.9500.9826", "Trojan.GootKit!gm", "BehavesLike.Win32.Injector.fh", "Trojan.Barys.D1A48" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "We", "believe", "this", "spyware", "platform", "is", "developed", "by", "an", "Italian", "company", "called", "eSurv", ",", "which", "primarily", "operates", "in", "the", "business", "of", "video", "surveillance", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "That's", "why", "we", "refer", "to", "this", "malware", "as", "Shakti", "Trojan." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Klone.bz", "W32/MUPX.A", "Packed.Win32.Klone.bz", "BackDoor.IRC.Rxbot.69", "Backdoor.Win32.Rbot!IK", "Win32.Hack.Klone.bz.kcloud", "Packed/Win32.Klone", "Backdoor.IRCbot!312D", "Backdoor.Win32.Rbot" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Attackers", "also", "used", "the", "name", "of", "the", "top-ranking", "official", "associated", "with", "Minister", "of", "Home", "affairs", "in", "the", "signature", "of", "the", "email,", "this", "is", "to", "make", "it", "look", "like", "the", "email", "was", "sent", "by", "a", "high-ranking", "Government", "official", "associated", "with", "Ministry", "of", "Home", "Affairs", "MHA." ]
[ 6, 16, 1, 16, 16, 16, 1, 9, 9, 16, 16, 4, 12, 12, 12, 16, 16, 1, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 1, 9, 9, 9, 9, 9, 16, 16, 4, 12, 12, 12, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Crypt.GH", "Trojan.Crypt.GH", "Trojan.Crypt.GH", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Infostealer.Gampass", "TROJ_PUKISH.A", "Trojan.Crypt.GH", "Win32.Trojan-dropper.Drob.Pdmj", "Trojan.Crypt.GH", "Trojan.Crypt.GH", "Trojan.MulDrop7.42417", "TROJ_PUKISH.A", "Trojan-Dropper.Win32.Drob", "W32/Trojan.SPVB-8287", "Win32.Infect.a.124448", "TrojanDropper:Win32/Pukish.A", "Trojan.Crypt.GH", "Trj/CI.A", "Win32/Trojan.f42" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.W.CodeRed.l11t", "Exploit:Win32/CVE-2006-3942.A", "Exploit.Win32.CVE-2006-3942" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Troj.W32.Havex!c", "Win32.Trojan.WisdomEyes.16070401.9500.9950", "Trojan.Win32.Havex.tm", "Trojan.Proxy2.1026", "BehavesLike.Win32.Dropper.gh", "Trojan.Havex.w", "TR/Havex.fbdyv", "Trojan.Win32.Havex.tm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Worm.P2P.Puce.G", "Worm/W32.Kapucen.106496.EK", "I-Worm.Kapucen.b.n4", "W32/Kapucen.b", "Trojan.Win32.Kapucen.qyzel", "Win32/Puce.D", "WORM_KAPUCEN.B", "Worm.Puce.E", "P2P-Worm.Win32.Kapucen.b", "Win32.Worm.P2P.Puce.G", "Worm.Kapucen.A", "Worm.Win32.P2P-Kapucen.106496.C", "Worm.Win32.Kapucen.B", "Win32.Worm.P2P.Puce.G", "Win32.HLLW.Puce", "Worm/Puce.D.90", "WORM_KAPUCEN.B", "Worm/P2P.Kapcen.b", "Worm:Win32/Puce.D", "Win32.Worm.P2P.Puce.G", "Worm/Win32.Kapucen", "Trojan.Win32.Kapucen.B", "Win32/Kapucen.B", "P2P-Worm.Win32.Kapucen.b", "W32/Kapucen.fam!worm.p2p", "Win32/Puce.C", "W32/Puce.E.worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "On", "July", "17,", "2017,", "we", "detected", "a", "malicious", "document", "in", "VirusTotal", "exploiting", "CVE-2017-0199." ]
[ 16, 0, 8, 8, 16, 16, 16, 1, 9, 16, 4, 7, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Packed.Win32.Klone!O", "Backdoor.SkSocket", "Backdoor.Trojan", "Trojan.Win32.SkSocket.uwlqa", "Backdoor.Win32.SkSocket.109_t0", "BackDoor.Sksock", "Virus.Win32.SkSocket.C", "Backdoor/SkSocket.o", "BDS/SkSocket.109", "Win-Trojan/SkSocket.40960", "Trj/CI.A", "Win32/SkSocket.109", "Win32.Backdoor.Sksocket.Dyqp", "Trojan/Win32.lssj.2cc.rgrk" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Initial", "indicators", "of", "compromise", "from", "todays", "WannaCry", "ransomware", "outbreak." ]
[ 16, 1, 9, 9, 16, 16, 3, 11, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9971", "Win.Spyware.1756-2", "BehavesLike.Win32.Autorun.dc", "Trojan/Win32.Xema.C73573" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "Icons", "used", "for", "EventBot", "masqueraded", "as", "legitimate", "with", "these", "icons.application", "." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clod62e.Trojan.18e2", "Win32.Trojan.WisdomEyes.16070401.9500.9922", "Trojan.Kasperbogi", "W32/Trojan.PRNK-2932", "TR/Golroted.jumln", "Trojan.Strictor.D16D8E", "Trojan:Win32/Parsky.A!bit", "Trj/GdSda.A", "Win32/Trojan.cfd" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "recent", "investigation", "by", "security", "firm", "CTI", "has", "identified", "a", "new", "wave", "of", "malware", "delivered", "to", "the", "MaaS", "and", "PPI", "service", "providers", "in", "the", "underground", "black", "markets,", "including", "a", "controversial", "piece", "of", "code", "linked", "to", "North-Korean", "hackers." ]
[ 16, 16, 16, 16, 4, 12, 12, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 4, 12, 12, 12, 12, 16, 6, 14, 14, 14, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14 ]
[ "The", "phone", "number", "is", "fetched", "from", "a", "response", "from", "the", "C", "&", "C", "server", "and", "is", "stored", "in", "str3", "variable", ",", "which", "further", "is", "utilized", "using", "the", "tel", ":", "function", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "payload,", "distributed", "disguised", "as", "antivirus,", "is", "a", "variant", "of", "Korplug", "RAT", "aka", "PlugX", "–", "a", "spyware", "with", "former", "associations", "with", "Chinese", "APT", "groups,", "and", "known", "from", "targeted", "attacks", "at", "important", "institutions", "of", "various", "countries." ]
[ 16, 3, 16, 16, 16, 5, 16, 16, 16, 16, 3, 11, 16, 3, 16, 16, 3, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 1, 9, 3, 16, 4, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "PUP.Optional.FilePile.A", "PE:PUF.FilePile!1.9E19" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "The", "site", "was", "redirecting", "visitors", "to", "the", "malware", "through", "a", "compromised", "OpenX", "Ad", "server", "injecting", "a", "malicious", "iframe", "into", "the", "page." ]
[ 16, 1, 16, 16, 4, 16, 16, 3, 16, 16, 1, 9, 9, 9, 9, 16, 1, 9, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.Ad.Pdms", "Trojan.InstallCube.412", "Variant.Kazy.apq", "TR/AD.Fakruce.M.2", "Trojan.Kazy.DBFFE0", "Trojan.Win32.Z.Kazy.2435953", "Trojan:Win32/Fakruce.B", "Trojan.Kazy!YZdrjH6xcT8", "Trj/CI.A", "Win32/Trojan.824" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "main", "purpose", "of", "this", "module", "is", "to", "exfiltrate", "Skype", "call", "recordings", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16 ]
[ "Shamoon", "W32.Disttrack", "first", "made", "headlines", "in", "2012", "when", "it", "was", "used", "in", "attacks", "against", "energy", "companies", "in", "Saudi", "Arabia." ]
[ 3, 1, 16, 16, 16, 16, 0, 16, 16, 16, 16, 16, 1, 16, 4, 12, 16, 2, 10 ]
[ "In", "recent", "years", ",", "online", "activity", "has", "gradually", "been", "shifting", "from", "personal", "computers", "to", "mobile", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Rootkit.Koutodoor.a", "TrojWare.Win32.Zybr.A", "W32.Trojan.Koutodoor.E", "Trojan:Win32/Koutodoor.F", "Trojan.Zusy.D41F3C", "Trojan.Win32.koutodoor.i", "Trojan.Rootkit", "RootKit.Win32.Koutodoor.I" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]