tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"Hide",
"Icon",
"Figure",
"3",
":",
"Code",
"showing",
"the",
"hiding",
"icon",
"and",
"starting",
"service",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Comfold",
"Trojan:Win32/Comfold.A"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"Third-party",
"marketplaces",
"or",
"some",
"other",
"attacker-controlled",
"domains",
"are",
"likely",
"used",
"to",
"host",
"the",
"sample",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Indicators",
"of",
"Compromise",
"SHA256",
"Package",
"App",
"label",
"332e68d865009d627343b89a5744843e3fde4ae870193f36b82980363439a425",
"ufD.wykyx.vlhvh",
"SEX",
"kr",
"porn",
"403401aa71df1830d294b78de0e5e867ee3738568369c48ffafe1b15f3145588",
"ufD.wyjyx.vahvh",
"佐川急便",
"466dafa82a4460dcad722d2ad9b8ca332e9a896fc59f06e16ebe981ad3838a6b",
"com.dhp.ozqh",
"Facebook",
"5022495104c280286e65184e3164f3f248356d065ad76acef48ee2ce244ffdc8",
"ufD.wyjyx.vahvh",
"Anshin",
"Scan",
"a0f3df39d20c4eaa410a61a527507dbc6b17c7f974f76e13181e98225bda0511",
"com.aqyh.xolo",
"佐川急便",
"cb412b9a26c1e51ece7a0e6f98f085e1c27aa0251172bf0a361eb5d1165307f7",
"jp.co.sagawa.SagawaOfficialApp",
"佐川急便",
"Malicious",
"URLs",
":",
"hxxp",
":",
"//38",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
1,
16,
16,
16,
1,
1,
16,
1,
1,
4,
1,
1,
16,
16,
1,
1,
16,
1,
1,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Win32.AutoRun!O",
"Worm.AutoRun.Win32.132231",
"Win32.Trojan.ServStart.a",
"Win.Trojan.Qhost-160",
"Trojan.Win32.AutoRun.cvpwhj",
"Trojan.DownLoader4.40333",
"BehavesLike.Win32.Ipamor.lm",
"TR/Dldr.JKCN",
"Trojan/Win32.Downloader.C40577",
"Trojan.Win32.Wc",
"Win32/AutoRun.PT",
"Trojan-Proxy.Win32.Ranky"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"handful",
"of",
"malicious",
"features",
"densely",
"packed",
"in",
"this",
"new",
"malware",
"also",
"includes",
"the",
"ability",
"to",
"drop",
"other",
"malware."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"]",
"net",
"–",
"C",
"&",
"C",
"servers",
"NG",
"SuperShell",
"–",
"string",
"from",
"the",
"reverse",
"shell",
"payload",
"ngg",
"–",
"prefix",
"in",
"commands",
"names",
"of",
"the",
"implant",
"for",
"Windows",
"Signature",
"with",
"specific",
"issuer",
"Whois",
"records",
"and",
"IP",
"relationships",
"provide",
"many",
"interesting",
"insights",
"as",
"well",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"DOWNLOAD",
"AND",
"UPDATE",
"THE",
"TARGET",
"CONFIGURATION",
"FILE",
"By",
"analyzing",
"and",
"decoding",
"the",
"HTTP",
"packets",
"in",
"EventBot",
"Version",
"0.0.0.1",
",",
"we",
"can",
"see",
"that",
"EventBot",
"downloads",
"and",
"updates",
"a",
"configuration",
"file",
"with",
"almost",
"200",
"different",
"financial",
"application",
"targets",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Once",
"the",
"malware",
"can",
"use",
"accessibility",
"services",
",",
"it",
"has",
"the",
"ability",
"to",
"operate",
"as",
"a",
"keylogger",
"and",
"can",
"retrieve",
"notifications",
"about",
"other",
"installed",
"applications",
"and",
"content",
"of",
"open",
"windows",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.ShipBHQc.Trojan",
"Trojan.Win32.ShipUp!O",
"TrojanPWS.Zbot.Y",
"Trojan/Kryptik.awzk",
"Trojan.Razy.D3C5B",
"TROJ_KRYPTK.SML3",
"Win.Trojan.Redirect-6055402-0",
"Trojan.Win32.ShipUp.brmnrc",
"Trojan.Redirect.140",
"Trojan.ShipUp.Win32.1152",
"TROJ_KRYPTK.SML3",
"BehavesLike.Win32.PWSZbot.dh",
"Trojan.Win32.ShipUp",
"Trojan/ShipUp.ix",
"TR/Rogue.kdz.11287.3",
"Trojan/Win32.ShipUp",
"TrojanDropper:Win32/Gepys.A",
"Troj.W32.ShipUp.lINm",
"Trojan/Win32.Shipup.R58491",
"TScope.Malware-Cryptor.SB",
"Trojan.FakeMS.ED",
"W32/Kryptik.AYTK!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Spy.Win32.Tibia!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9963",
"Trojan.Win32.Drop.cbndjf",
"Trojan.MulDrop3.1226",
"BehavesLike.Win32.BadFile.rc",
"Trojan-Dropper.Win32.Monya",
"TR/Drop.Tibdef.B",
"Trojan.Raldhep.1",
"TrojanDropper:Win32/Tibdef.B",
"W32/Dropper.AAAI!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"is",
"in",
"use",
"by",
"the",
"Molerats",
"aka",
"Gaza",
"cybergang,",
"a",
"politically",
"motivated",
"group",
"whose",
"main",
"objective,",
"we",
"believe,",
"is",
"intelligence",
"gathering."
] | [
16,
16,
16,
16,
16,
16,
6,
16,
6,
14,
16,
6,
14,
14,
16,
16,
16,
16,
16,
16,
1,
9
] |
[
"The",
"Magnitude",
"exploit",
"kit",
"has",
"been",
"using",
"an",
"XML",
"configuration",
"file",
"critical",
"to",
"retrieving",
"the",
"malware",
"payload",
"Cerber",
"for",
"several",
"months",
"already."
] | [
3,
11,
11,
11,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
3,
11,
11,
11,
16,
16,
16,
16
] |
[
"Here",
"is",
"Forcepoint",
"Security",
"Labs",
"we",
"have",
"seen",
"a",
"number",
"of",
"changes",
"and",
"improvements",
"over",
"the",
"last",
"few",
"months."
] | [
16,
16,
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
0,
8,
8
] |
[
"The",
"actors",
"compromised",
"the",
"sites",
"of",
"a",
"local",
"television",
"network,",
"educational",
"organizations,",
"a",
"religious",
"institute,",
"and",
"a",
"known",
"political",
"party",
"in",
"Taiwan;",
"and",
"a",
"popular",
"news",
"site",
"in",
"Hong",
"Kong."
] | [
16,
6,
1,
9,
9,
16,
16,
4,
12,
12,
12,
12,
12,
12,
12,
16,
4,
12,
12,
12,
16,
2,
16,
4,
12,
12,
12,
16,
2,
10
] |
[
"One",
"of",
"the",
"first",
"changes",
"that",
"stands",
"out",
"is",
"that",
"the",
"screen",
"recording",
"feature",
"mentioned",
"in",
"the",
"previous",
"sample",
"has",
"been",
"removed",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"List",
"of",
"package",
"names",
"of",
"apps",
"on",
"events",
"from",
"which",
"the",
"Trojan",
"opens",
"a",
"fake",
"Google",
"Play",
"window",
"(",
"for",
"the",
"Russian",
"version",
"of",
"the",
"Trojan",
")",
"Example",
"of",
"Trojan",
"screen",
"overlapping",
"other",
"apps",
"When",
"bank",
"card",
"details",
"are",
"entered",
"in",
"the",
"fake",
"window",
",",
"Riltok",
"performs",
"basic",
"validation",
"checks",
":",
"card",
"validity",
"period",
",",
"number",
"checksum",
",",
"CVC",
"length",
",",
"whether",
"the",
"number",
"is",
"in",
"the",
"denylist",
"sewn",
"into",
"the",
"Trojan",
"code",
":",
"Examples",
"of",
"phishing",
"pages",
"imitating",
"mobile",
"banks",
"At",
"the",
"time",
"of",
"writing",
",",
"the",
"functionality",
"of",
"most",
"of",
"the",
"Western",
"versions",
"of",
"Riltok",
"was",
"somewhat",
"pared",
"down",
"compared",
"to",
"the",
"Russian",
"one",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"disallows",
"apps",
"to",
"be",
"installed",
"on",
"your",
"device",
"from",
"unknown",
"sources",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Vetor.PE",
"Virus.Win32.Virut.1!O",
"W32.Virut.G",
"PE_VIRUX.O",
"W32/Trojan2.OALA",
"W32.Virut.CF",
"Win32/Virut.17408",
"PE_VIRUX.O",
"Win32.Virus.Virut.Q",
"Virus.Win32.Virut.ce",
"Virus.Win32.Virut.hpeg",
"Virus.Win32.Virut.CE",
"Win32.Virut.56",
"Virus.Virut.Win32.1938",
"BehavesLike.Win32.Virut.cc",
"W32/Trojan.JXET-3602",
"Win32/Virut.bt",
"Virus/Win32.Virut.ce",
"Win32.Virut.cr.61440",
"W32.Virut.lM6H",
"Virus.Win32.Virut.ce",
"TrojanClicker:MSIL/Xobnff.A",
"Win32/Virut.F",
"Virus.Virut.14",
"W32/Sality.AO",
"Win32/Virut.NBP",
"Virus.Win32.Virut",
"W32/Virut.CE",
"Virus.Win32.Virut.M"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Zegost.FC.2167",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Trojan.DownLoader22.48526",
"BehavesLike.Win32.Trojan.cc",
"Trojan.MSIL.Bladabindi.1",
"MSIL/Injector.PJG!tr",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"analysis",
"dissects",
"FakeSpy",
"’",
"s",
"Chunghwa",
"Post",
"app",
"version",
",",
"which",
"emerged",
"in",
"April",
"2020",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Such",
"references",
"would",
"be",
"in",
"line",
"with",
"FrozenCell",
"'s",
"phishing",
"tactics",
"in",
"which",
"they",
"used",
"file",
"names",
"to",
"lure",
"people",
"associated",
"with",
"the",
"political",
"party",
"to",
"open",
"malicious",
"documents",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Sinkhole",
"data",
"explained",
"below",
"shows",
"just",
"how",
"quickly",
"this",
"campaign",
"is",
"impacting",
"victims."
] | [
1,
9,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Netstop.A",
"Trojan.Netstop.A",
"Backdoor.Trojan",
"Win32/Noshare.N",
"TROJ_NETSTOPA.A",
"Trojan.Netstop.A",
"Trojan.Win32.Netstop.dyylkw",
"Win32.Trojan-spy.Gc.Hsii",
"Trojan.Netstop.A",
"Worm.Win32.SpyBot.GC",
"Trojan.Netstop.A",
"Email-Worm.Win32.GOPworm.196",
"TROJ_NETSTOPA.A",
"TR/Netstop.A",
"Trojan.Netstop.A",
"Trojan.Netstop.A",
"Email-Worm.Win32.GOPworm.196",
"Win32/SpyBot.GC",
"Worm.SpyBot!FiFtixQJKm8",
"W32/Netstop.A!tr",
"Bck/Secur.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"FireEye",
"assesses",
"that",
"APT32",
"leverages",
"a",
"unique",
"suite",
"of",
"fully-featured",
"malware,",
"in",
"conjunction",
"with",
"commercially-available",
"tools,",
"to",
"conduct",
"targeted",
"operations",
"that",
"are",
"aligned",
"with",
"Vietnamese",
"state",
"interests."
] | [
4,
16,
16,
6,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
3,
16,
16,
16,
6,
16,
16,
16,
16,
2,
10,
16
] |
[
"android.intent.action.restart",
"A",
"legacy",
"intent",
"used",
"to",
"indicate",
"a",
"system",
"restart",
"."
] | [
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"list",
"of",
"banks",
"targeted",
"by",
"Red",
"Alert",
"2.0",
"includes",
"NatWest",
",",
"Barclays",
",",
"Westpac",
",",
"and",
"Citibank",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16
] |
[
"In",
"recent",
"years,",
"the",
"detention",
"and",
"interrogation",
"of",
"members",
"of",
"online",
"communities",
"has",
"been",
"publicized",
"by",
"state",
"media",
"for",
"propaganda",
"purposes."
] | [
16,
0,
16,
16,
16,
16,
16,
16,
4,
16,
4,
12,
16,
16,
16,
16,
4,
12,
16,
16,
16
] |
[
"PaloAlto",
"Unit",
"42",
"researchers",
"have",
"observed",
"a",
"new",
"Remote",
"Access",
"Tool",
"RAT",
"constructed",
"by",
"an",
"unknown",
"actor",
"of",
"Italian",
"origin."
] | [
4,
12,
12,
12,
16,
16,
16,
16,
3,
11,
11,
11,
16,
16,
16,
6,
14,
16,
2,
10
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Inject.IA",
"Trojan.Skeeyah.8818",
"Infostealer.Kegotip!gm",
"TSPY_KEGOTIP.SMA",
"Trojan.Inject.IA",
"Trojan-PSW.Win32.Minari.a",
"Trojan.Inject.IA",
"Trojan.Inject.IA",
"Trojan.Inject.IA",
"Trojan.PWS.Stealer.2518",
"TSPY_KEGOTIP.SMA",
"BehavesLike.Win32.Backdoor.ch",
"Trojan[PSW]/Win32.Minari",
"Trojan.Inject.IA",
"Trojan-PSW.Win32.Minari.a",
"Trojan/Win32.PWS.R100577",
"Trojan.Inject.IA"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Conclusion",
"Threats",
"are",
"better",
"prevented",
"than",
"cured",
",",
"so",
"do",
"not",
"follow",
"suspicious",
"links",
"in",
"SMS",
",",
"and",
"be",
"sure",
"to",
"install",
"apps",
"only",
"from",
"official",
"sources",
"and",
"check",
"what",
"permissions",
"you",
"are",
"granting",
"during",
"installation",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win32.Mutopy!O",
"Trojan.Mutopy.A",
"TROJ_MUTOPY.SMYN",
"Win32.Trojan.WisdomEyes.16070401.9500.9995",
"TROJ_MUTOPY.SMYN",
"Win.Trojan.Multi-6413508-0",
"Troj.Dropper.W32.Dapato.lCcB",
"Trojan.MulDrop4.10927",
"BehavesLike.Win32.Downloader.hh",
"TR/Kazy.34213.jh",
"Trojan:Win32/Mutopy.A",
"Trojan.Naffy.1",
"Trojan/Win32.HDC.C53646",
"TScope.Malware-Cryptor.SB",
"Trojan.Win32.Jorik",
"W32/Rodecap.AS!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Cybereason",
"Mobile",
"Detecting",
"EventBotCybereason",
"Mobile",
"detecting",
"EventBot",
"."
] | [
4,
12,
16,
16,
16,
16,
3,
16
] |
[
"The",
"method",
"is",
"a",
"well-known",
"trick",
"used",
"by",
"penetration",
"testers",
"that",
"was",
"automated",
"and",
"generalized",
"by",
"FinFisher",
"The",
"procedure",
"starts",
"by",
"enumerating",
"the",
"KnownDlls",
"object",
"directory",
"and",
"then",
"scanning",
"for",
"section",
"objects",
"of",
"the",
"cached",
"system",
"DLLs",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.W32.Androm.toYX",
"Trojan/Injector.drgl",
"Win32.Trojan.WisdomEyes.16070401.9500.9978",
"Win.Trojan.WillExec-6356235-0",
"Backdoor.Androm.sdz",
"Trojan.Zusy.D3FE2C",
"Trojan:Win32/Lethic.Q!bit",
"Backdoor.Androm",
"Trj/GdSda.A",
"W32/Injector.DQID!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Samples",
"uploaded",
"to",
"public",
"repositories",
"indicate",
"that",
"the",
"new",
"version",
"of",
"Typhon",
"Reborn",
"has",
"been",
"in",
"the",
"wild",
"since",
"December",
"2022."
] | [
3,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
0,
8,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Trojan.RHUU-4415",
"MSIL.Trojan.Packed.G",
"Trojan-Dropper.Win32.Scrop.ccm",
"Trojan.Win32.Inject.dzszva",
"Trojan.PWS.Multi.1690",
"BehavesLike.Win32.Trojan.tc",
"TrojanDropper.Sysn.arw",
"TR/Injector.drydq",
"Trojan/MSIL.Inject",
"Trojan:MSIL/Plimrost.B",
"Trojan.Kazy.DAD984",
"Trojan-Dropper.Win32.Scrop.ccm",
"Trojan/Win32.Injector.C952834",
"Trj/CI.A",
"Trojan.MSIL.Injector",
"MSIL/Kryptik.DDP!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Zcrypt",
"uses",
"the",
"Nullsoft",
"Scriptable",
"Install",
"System,",
"which",
"works",
"like",
"a",
"Zip",
"file,",
"decompressing",
"and",
"loading",
"the",
"content",
"while",
"running."
] | [
3,
16,
5,
13,
13,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"used",
"in",
"the",
"new",
"attacks",
"was",
"a",
"variant",
"of",
"the",
"infamous",
"Shamoon",
"worm",
"that",
"targeted",
"Saudi",
"Aramco",
"and",
"Rasgas",
"back",
"in",
"2012."
] | [
16,
3,
16,
16,
16,
16,
1,
16,
16,
3,
16,
16,
16,
3,
11,
16,
16,
4,
12,
16,
4,
16,
16,
0
] |
[
"This",
"malware",
"is",
"simplistic",
"in",
"comparison",
"to",
"some",
"modern-day",
"Android",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"Some",
"of",
"these",
"might",
"have",
"been",
"used",
"on",
"old",
"campaigns",
"or",
"were",
"already",
"prepared",
"for",
"new",
"campaigns",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Again",
",",
"the",
"concept",
"is",
"that",
"new",
"victims",
"are",
"more",
"likely",
"to",
"install",
"the",
"malware",
"if",
"the",
"SMS",
"comes",
"from",
"someone",
"they",
"know",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"technical",
"note",
"discusses",
"a",
"relatively",
"undocumented",
"implant",
"used",
"by",
"the",
"APT10",
"group."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TROJ_STARTPA.NSS",
"W32/Backdoor2.HTGN",
"Win32/Wysotot.GJVbdHD",
"TROJ_STARTPA.NSS",
"Win32.Trojan-Hijacker.Wysotot.A",
"Trojan.Win32.AdLoad.eizvbn",
"Adware.Mutabaha.255",
"Adware.MutabahaCRTD.Win32.1189",
"BehavesLike.Win32.ICLoader.gc",
"Backdoor.Win32.ZAccess",
"W32/Backdoor.SAIZ-5729",
"Trojan/Win32.StartPage",
"Trojan.Adware.Zusy.D1584D",
"PUP.Elex/Variant",
"Downloader/Win32.Adware.R86759",
"Trojan.StartPage",
"PUP.Optional.Elex",
"Trj/CI.A",
"Trojan.StartPage!B6aZ1c5P97Y"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.MSIL.Crypt.gauf",
"Trojan.Starter.7472",
"Trojan.MSIL.ilny",
"TR/AD.Binderon.roatv",
"Trojan.Ursu.D13D6D",
"Trojan.MSIL.Crypt.gauf",
"PWS:AutoIt/Passup.A",
"Win32/Spy.Autoit.BY",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.1BC9",
"Trojan.Banavkill",
"Trojan-Banker.Win32.Banbra.wjem",
"Trojan.Win32.Banbra.exnyzm",
"TR/Spy.Banker.ohxzm",
"Trojan.Ursu.D10A45",
"Trojan-Banker.Win32.Banbra.wjem",
"Trojan:Win32/Banavkill.A",
"Trojan/Win32.Banbra.C2352559",
"Trojan-Banker.Banbra",
"Trj/GdSda.A",
"Win32.Trojan.Falsesign.Htma",
"Win32/Trojan.f8b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"are",
"providing",
"a",
"detailed",
"analysis",
"of",
"the",
"rootkit,",
"and",
"also",
"making",
"the",
"samples",
"available",
"to",
"the",
"industry",
"to",
"help",
"others",
"block",
"this",
"threat."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
3
] |
[
"The",
"Flash",
"zero-day",
"exploit",
"(",
"CVE-2015-5119",
")",
"was",
"added",
"into",
"the",
"Angler",
"Exploit",
"Kit",
"and",
"Nuclear",
"Exploit",
"Pack",
"."
] | [
16,
5,
16,
16,
16,
7,
16,
16,
16,
16,
16,
3,
11,
11,
16,
3,
11,
11,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.OnGamesLT180912HKGHAAI.Trojan",
"Trojan.PWS.OnlineGames.ZON",
"Trojan.PWS.OnlineGames.ZON",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Infostealer.Gampass",
"TSPY_ONLINEG.FGF",
"Win.Trojan.Onlinegames-44",
"Trojan.PWS.OnlineGames.ZON",
"Trojan.PWS.OnlineGames.ZON",
"Trojan.Win32.OnLineGames.rzwt",
"Troj.PSW32.W.OnLineGames.aoem!c",
"Trojan.PWS.OnlineGames.ZON",
"Packed.Win32.MUPACK.~KW",
"Trojan.PWS.OnlineGames.ZON",
"Trojan.PWS.Wsgame.5652",
"Trojan.OnLineGames.Win32.160328",
"TSPY_ONLINEG.FGF",
"BehavesLike.Win32.Sdbot.cz",
"Trojan/PSW.OnLineGames.akkc",
"TrojanDropper:Win32/Tilcun.E",
"Trojan/Win32.MalPack.C60090",
"Trojan.PWS.OnlineGames.ZON",
"BScope.Trojan-PSW.Gomex.22",
"Trj/Pupack.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"infamous",
"Remote",
"Access",
"Trojan",
"RAT",
"Poison",
"Ivy",
"hereafter",
"referred",
"to",
"as",
"PIVY",
"has",
"resurfaced",
"recently,",
"and",
"exhibits",
"some",
"new",
"behaviors."
] | [
3,
11,
11,
11,
11,
11,
11,
11,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"However,",
"we",
"recently",
"encountered",
"a",
"botnet",
"that",
"uses",
"a",
"more",
"unusual",
"method:",
"an",
"FTP",
"server",
"that,",
"in",
"effect,",
"acts",
"as",
"a",
"C",
"C",
"server."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
1,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Small.40960.BX",
"TROJ_FAKEAV.ASI",
"W32/Backdoor2.HASV",
"Backdoor.Trojan.B",
"Win32/Wonip.A",
"TROJ_FAKEAV.ASI",
"Trojan.PWS.Sniftp.15",
"W32/Backdoor.YSEB-6778",
"BDS/Wonip.A",
"Backdoor:Win32/Wonip.A",
"Trojan/Win32.Xema.C82592",
"W32/Backdr.FB!tr",
"Win32/Backdoor.435"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Since",
"we",
"published",
"our",
"article",
"on",
"Sage",
"2.0",
"last",
"February,",
"and",
"the",
"discovery",
"of",
"version",
"2.2",
"in",
"March,",
"the",
"FortiGuard",
"Labs",
"team",
"hasn't",
"seen",
"significant",
"activity",
"with",
"this",
"malware",
"for",
"over",
"six",
"months."
] | [
16,
16,
16,
16,
16,
16,
3,
11,
16,
0,
16,
16,
16,
16,
3,
11,
16,
0,
4,
12,
12,
12,
16,
16,
16,
16,
16,
16,
3,
16,
0,
8,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Qhosts",
"Trojan.Win32.Z.Redcap.1251647",
"TR/RedCap.ymgda"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"Reverse",
"shell",
"payload",
"The",
"reverse",
"shell",
"module",
"is",
"an",
"external",
"ELF",
"file",
"compiled",
"by",
"the",
"attackers",
"to",
"run",
"on",
"Android",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16
] |
[
"We",
"identified",
"one",
"specific",
"spear",
"phishing",
"campaign",
"launched",
"against",
"targets",
"within",
"Palestine,",
"and",
"specifically",
"against",
"Palestinian",
"law",
"enforcement",
"agencies."
] | [
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
2,
16,
16,
16,
4,
12,
12,
12
] |
[
"At",
"the",
"time",
"of",
"writing",
"this",
"article",
",",
"no",
"other",
"significant",
"changes",
"in",
"Asacub",
"’",
"s",
"network",
"behavior",
"had",
"been",
"observed",
":",
"The",
"origin",
"of",
"Asacub",
"It",
"is",
"fairly",
"safe",
"to",
"say",
"that",
"the",
"Asacub",
"family",
"evolved",
"from",
"Trojan-SMS.AndroidOS.Smaps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
1,
16
] |
[
"Once",
"installed",
"on",
"a",
"device",
"FrozenCell",
"is",
"capable",
"of",
":",
"Recording",
"calls",
"Retrieving",
"generic",
"phone",
"metadata",
"(",
"e.g.",
",",
"cell",
"location",
",",
"mobile",
"country",
"code",
",",
"mobile",
"network",
"code",
")",
"Geolocating",
"a",
"device",
"Extracting",
"SMS",
"messages",
"Retrieving",
"a",
"victim",
"'s",
"accounts",
"Exfiltrating",
"images",
"Downloading",
"and",
"installing",
"additional",
"applications",
"Searching",
"for",
"and",
"exfiltrating",
"pdf",
",",
"doc",
",",
"docx",
",",
"ppt",
",",
"pptx",
",",
"xls",
",",
"and",
"xlsx",
"file",
"types",
"Retrieving",
"contacts",
"The",
"graph",
"below",
"represents",
"a",
"split",
"of",
"the",
"types",
"of",
"data",
"from",
"only",
"one",
"misconfigured",
"command",
"and",
"control",
"server",
"(",
"out",
"of",
"over",
"37",
"servers",
")",
"."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Yurist.Win32.37",
"Win32.Trojan.WisdomEyes.16070401.9500.9992",
"Backdoor.Win32.Yurist.cy",
"Trojan.Win32.XFlash.bodumo",
"Backdoor.W32.Yurist.cp!c",
"Heur.Packed.Unknown",
"BackDoor.XFlash",
"BehavesLike.Win32.Backdoor.ph",
"Backdoor/Yurist.z",
"BDS/Yurist.K",
"Backdoor:Win32/Yurist.K",
"Trojan.Graftor.D45274",
"Backdoor.Win32.Yurist.cy",
"Trojan/Win32.LdPinch.C27294",
"Win32.Backdoor.Yurist.Eads",
"Backdoor.Yurist!9F5bediy4gg",
"Backdoor.Win32.Yurist",
"Trj/CI.A",
"Win32/Backdoor.c62"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"If",
"the",
"victim",
"opens",
"it",
"up,",
"it",
"will",
"not",
"only",
"infect",
"their",
"system",
"but",
"send",
"the",
"same",
"phishing",
"document",
"to",
"other",
"contacts",
"via",
"their",
"Outlook",
"inbox."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BKDR_BAYROB.SM4",
"Win32.Trojan.WisdomEyes.16070401.9500.9948",
"BKDR_BAYROB.SM4",
"TrojWare.Win32.Bayrob.A",
"Trojan.Kelios.1",
"Trojan:Win32/Horkremoz.A",
"W32/Bayrob.O!tr",
"Win32/Trojan.4af"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win32.TDSS!O",
"Backdoor.TDSS.Win32.7367",
"Trojan/Olmarik.akn",
"Trojan.TDss.58",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TSPY_ALUREON_CD102969.RDXN",
"Win.Trojan.Tdss-302",
"Backdoor.Win32.TDSS.dtx",
"Trojan.Win32.TDSS.cdwoi",
"Backdoor.Win32.A.Tdss.63488.B",
"TrojWare.Win32.Olmarik.AME",
"Trojan.DownLoader1.46896",
"TSPY_ALUREON_CD102969.RDXN",
"BehavesLike.Win32.VBObfus.kh",
"Backdoor.Win32.TDSS",
"Backdoor/TDSS.apn",
"Trojan[Backdoor]/Win32.TDSS",
"Win32.Hack.TDSS.d.kcloud",
"Backdoor.Win32.TDSS.dtx",
"Trojan/Win32.Tdss.R1603",
"DNSChanger.ca",
"Trojan.FakeAlert",
"Win32/Olmarik.AKN",
"Backdoor.TDSS!fzuavqQuzWg",
"W32/DNSChanger.CA!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"’",
"s",
"possible",
"the",
"threat",
"actors",
"use",
"this",
"list",
"to",
"find",
"running",
"antivirus",
"or",
"banking",
"applications",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This,",
"combined",
"with",
"its",
"focus",
"on",
"a",
"specific",
"region,",
"makes",
"this",
"threat",
"interesting",
"from",
"the",
"malware",
"researchers'",
"perspective."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
4,
12,
16
] |
[
"Once",
"they",
"obtained",
"access",
"to",
"the",
"server,",
"the",
"attackers",
"infected",
"the",
"system",
"with",
"two",
"malicious",
"payloads."
] | [
16,
16,
16,
1,
16,
16,
5,
16,
6,
16,
16,
5,
16,
16,
3,
11
] |
[
"Standard",
"Encryption",
"Frequently",
",",
"Bread",
"apps",
"take",
"advantage",
"of",
"standard",
"crypto",
"libraries",
"in",
"`",
"java.util.crypto",
"`",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16
] |
[
"A",
"typical",
"Lurk",
"infection",
"uses",
"browser",
"exploits",
"to",
"deliver",
"non-persistent",
"payloads",
"to",
"potential",
"victims,",
"probing",
"their",
"targets",
"before",
"deploying",
"additional",
"malware."
] | [
16,
16,
6,
16,
16,
7,
15,
16,
16,
3,
11,
16,
4,
12,
16,
16,
16,
16,
3,
11,
11
] |
[
"Backdoored",
"Conversations",
"C2",
"server",
"analysis",
"During",
"the",
"analysis",
"of",
"the",
"Smali",
"injected",
"apps",
"and",
"their",
"C2",
"server",
"infrastructure",
"we",
"hadn",
"’",
"t",
"found",
"any",
"interesting",
"clues",
",",
"but",
"things",
"changed",
"when",
"we",
"looked",
"at",
"the",
"C2",
"server",
"of",
"the",
"linked",
"Conversations",
"messenger",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Some",
"of",
"the",
"popular",
"Android",
"applications",
"that",
"Ewind",
"targets",
"include",
"GTA",
"Vice",
"City,",
"AVG",
"cleaner,",
"Minecraft",
"–",
"Pocket",
"Edition,",
"Avast!",
"Ransomware",
"Removal,",
"VKontakte,",
"and",
"Opera",
"Mobile."
] | [
16,
16,
16,
16,
5,
13,
16,
3,
16,
16,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
16,
5,
13
] |
[
"For",
"example",
",",
"it",
"could",
"be",
"used",
"to",
"display",
"unwanted",
"and",
"annoying",
"advertisements",
"on",
"a",
"device",
",",
"or",
"potentially",
",",
"to",
"download",
"and",
"deploy",
"a",
"payload",
"that",
"steals",
"credentials",
"from",
"an",
"infected",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"FakeSpy",
"Chunghwa",
"Post",
"version",
"installation",
"process",
"and",
"application",
"UI",
"."
] | [
3,
4,
12,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Strictor.D1F9FA",
"Trojan.Win32.BuhTrap.c",
"Trojan.YakesCRTD.Win32.4839",
"Trojan/Win32.BuhTrap.c",
"Backdoor:Win32/Buhtrap.A!dha",
"Trojan.Win32.BuhTrap.c",
"Trj/GdSda.A",
"Backdoor.Win32.Buhtrap",
"W32/Delf.QJL!tr",
"Win32/Trojan.5c7"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Instead",
"of",
"being",
"controlled",
"by",
"a",
"traditional",
"command-and-control",
"server",
",",
"it",
"receives",
"instructions",
"via",
"tweets",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Malware",
"code",
"showing",
"loading",
"of",
"decrypted",
"dex",
"file",
"Figure",
"12",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"were",
"able",
"to",
"see",
"that",
"his",
"recently",
"visited",
"web",
"sites",
"were",
"Google",
"Play",
"pages",
"belonging",
"to",
"apps",
"containing",
"the",
"Ashas",
"adware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
3,
11,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Etap.d",
"Win32.Trojan.WisdomEyes.16070401.9500.9826",
"Trojan.GootKit!gm",
"BehavesLike.Win32.Injector.fh",
"Trojan.Barys.D1A48"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"We",
"believe",
"this",
"spyware",
"platform",
"is",
"developed",
"by",
"an",
"Italian",
"company",
"called",
"eSurv",
",",
"which",
"primarily",
"operates",
"in",
"the",
"business",
"of",
"video",
"surveillance",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"That's",
"why",
"we",
"refer",
"to",
"this",
"malware",
"as",
"Shakti",
"Trojan."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Klone.bz",
"W32/MUPX.A",
"Packed.Win32.Klone.bz",
"BackDoor.IRC.Rxbot.69",
"Backdoor.Win32.Rbot!IK",
"Win32.Hack.Klone.bz.kcloud",
"Packed/Win32.Klone",
"Backdoor.IRCbot!312D",
"Backdoor.Win32.Rbot"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Attackers",
"also",
"used",
"the",
"name",
"of",
"the",
"top-ranking",
"official",
"associated",
"with",
"Minister",
"of",
"Home",
"affairs",
"in",
"the",
"signature",
"of",
"the",
"email,",
"this",
"is",
"to",
"make",
"it",
"look",
"like",
"the",
"email",
"was",
"sent",
"by",
"a",
"high-ranking",
"Government",
"official",
"associated",
"with",
"Ministry",
"of",
"Home",
"Affairs",
"MHA."
] | [
6,
16,
1,
16,
16,
16,
1,
9,
9,
16,
16,
4,
12,
12,
12,
16,
16,
1,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
1,
9,
9,
9,
9,
9,
16,
16,
4,
12,
12,
12,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Crypt.GH",
"Trojan.Crypt.GH",
"Trojan.Crypt.GH",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Infostealer.Gampass",
"TROJ_PUKISH.A",
"Trojan.Crypt.GH",
"Win32.Trojan-dropper.Drob.Pdmj",
"Trojan.Crypt.GH",
"Trojan.Crypt.GH",
"Trojan.MulDrop7.42417",
"TROJ_PUKISH.A",
"Trojan-Dropper.Win32.Drob",
"W32/Trojan.SPVB-8287",
"Win32.Infect.a.124448",
"TrojanDropper:Win32/Pukish.A",
"Trojan.Crypt.GH",
"Trj/CI.A",
"Win32/Trojan.f42"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.W.CodeRed.l11t",
"Exploit:Win32/CVE-2006-3942.A",
"Exploit.Win32.CVE-2006-3942"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Troj.W32.Havex!c",
"Win32.Trojan.WisdomEyes.16070401.9500.9950",
"Trojan.Win32.Havex.tm",
"Trojan.Proxy2.1026",
"BehavesLike.Win32.Dropper.gh",
"Trojan.Havex.w",
"TR/Havex.fbdyv",
"Trojan.Win32.Havex.tm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Worm.P2P.Puce.G",
"Worm/W32.Kapucen.106496.EK",
"I-Worm.Kapucen.b.n4",
"W32/Kapucen.b",
"Trojan.Win32.Kapucen.qyzel",
"Win32/Puce.D",
"WORM_KAPUCEN.B",
"Worm.Puce.E",
"P2P-Worm.Win32.Kapucen.b",
"Win32.Worm.P2P.Puce.G",
"Worm.Kapucen.A",
"Worm.Win32.P2P-Kapucen.106496.C",
"Worm.Win32.Kapucen.B",
"Win32.Worm.P2P.Puce.G",
"Win32.HLLW.Puce",
"Worm/Puce.D.90",
"WORM_KAPUCEN.B",
"Worm/P2P.Kapcen.b",
"Worm:Win32/Puce.D",
"Win32.Worm.P2P.Puce.G",
"Worm/Win32.Kapucen",
"Trojan.Win32.Kapucen.B",
"Win32/Kapucen.B",
"P2P-Worm.Win32.Kapucen.b",
"W32/Kapucen.fam!worm.p2p",
"Win32/Puce.C",
"W32/Puce.E.worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"On",
"July",
"17,",
"2017,",
"we",
"detected",
"a",
"malicious",
"document",
"in",
"VirusTotal",
"exploiting",
"CVE-2017-0199."
] | [
16,
0,
8,
8,
16,
16,
16,
1,
9,
16,
4,
7,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Packed.Win32.Klone!O",
"Backdoor.SkSocket",
"Backdoor.Trojan",
"Trojan.Win32.SkSocket.uwlqa",
"Backdoor.Win32.SkSocket.109_t0",
"BackDoor.Sksock",
"Virus.Win32.SkSocket.C",
"Backdoor/SkSocket.o",
"BDS/SkSocket.109",
"Win-Trojan/SkSocket.40960",
"Trj/CI.A",
"Win32/SkSocket.109",
"Win32.Backdoor.Sksocket.Dyqp",
"Trojan/Win32.lssj.2cc.rgrk"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Initial",
"indicators",
"of",
"compromise",
"from",
"todays",
"WannaCry",
"ransomware",
"outbreak."
] | [
16,
1,
9,
9,
16,
16,
3,
11,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9971",
"Win.Spyware.1756-2",
"BehavesLike.Win32.Autorun.dc",
"Trojan/Win32.Xema.C73573"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"Icons",
"used",
"for",
"EventBot",
"masqueraded",
"as",
"legitimate",
"with",
"these",
"icons.application",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clod62e.Trojan.18e2",
"Win32.Trojan.WisdomEyes.16070401.9500.9922",
"Trojan.Kasperbogi",
"W32/Trojan.PRNK-2932",
"TR/Golroted.jumln",
"Trojan.Strictor.D16D8E",
"Trojan:Win32/Parsky.A!bit",
"Trj/GdSda.A",
"Win32/Trojan.cfd"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"recent",
"investigation",
"by",
"security",
"firm",
"CTI",
"has",
"identified",
"a",
"new",
"wave",
"of",
"malware",
"delivered",
"to",
"the",
"MaaS",
"and",
"PPI",
"service",
"providers",
"in",
"the",
"underground",
"black",
"markets,",
"including",
"a",
"controversial",
"piece",
"of",
"code",
"linked",
"to",
"North-Korean",
"hackers."
] | [
16,
16,
16,
16,
4,
12,
12,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
4,
12,
12,
12,
12,
16,
6,
14,
14,
14,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14
] |
[
"The",
"phone",
"number",
"is",
"fetched",
"from",
"a",
"response",
"from",
"the",
"C",
"&",
"C",
"server",
"and",
"is",
"stored",
"in",
"str3",
"variable",
",",
"which",
"further",
"is",
"utilized",
"using",
"the",
"tel",
":",
"function",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"payload,",
"distributed",
"disguised",
"as",
"antivirus,",
"is",
"a",
"variant",
"of",
"Korplug",
"RAT",
"aka",
"PlugX",
"–",
"a",
"spyware",
"with",
"former",
"associations",
"with",
"Chinese",
"APT",
"groups,",
"and",
"known",
"from",
"targeted",
"attacks",
"at",
"important",
"institutions",
"of",
"various",
"countries."
] | [
16,
3,
16,
16,
16,
5,
16,
16,
16,
16,
3,
11,
16,
3,
16,
16,
3,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
1,
9,
3,
16,
4,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"PUP.Optional.FilePile.A",
"PE:PUF.FilePile!1.9E19"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"The",
"site",
"was",
"redirecting",
"visitors",
"to",
"the",
"malware",
"through",
"a",
"compromised",
"OpenX",
"Ad",
"server",
"injecting",
"a",
"malicious",
"iframe",
"into",
"the",
"page."
] | [
16,
1,
16,
16,
4,
16,
16,
3,
16,
16,
1,
9,
9,
9,
9,
16,
1,
9,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.Ad.Pdms",
"Trojan.InstallCube.412",
"Variant.Kazy.apq",
"TR/AD.Fakruce.M.2",
"Trojan.Kazy.DBFFE0",
"Trojan.Win32.Z.Kazy.2435953",
"Trojan:Win32/Fakruce.B",
"Trojan.Kazy!YZdrjH6xcT8",
"Trj/CI.A",
"Win32/Trojan.824"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"main",
"purpose",
"of",
"this",
"module",
"is",
"to",
"exfiltrate",
"Skype",
"call",
"recordings",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16
] |
[
"Shamoon",
"W32.Disttrack",
"first",
"made",
"headlines",
"in",
"2012",
"when",
"it",
"was",
"used",
"in",
"attacks",
"against",
"energy",
"companies",
"in",
"Saudi",
"Arabia."
] | [
3,
1,
16,
16,
16,
16,
0,
16,
16,
16,
16,
16,
1,
16,
4,
12,
16,
2,
10
] |
[
"In",
"recent",
"years",
",",
"online",
"activity",
"has",
"gradually",
"been",
"shifting",
"from",
"personal",
"computers",
"to",
"mobile",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Rootkit.Koutodoor.a",
"TrojWare.Win32.Zybr.A",
"W32.Trojan.Koutodoor.E",
"Trojan:Win32/Koutodoor.F",
"Trojan.Zusy.D41F3C",
"Trojan.Win32.koutodoor.i",
"Trojan.Rootkit",
"RootKit.Win32.Koutodoor.I"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.