tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"The",
"iOS",
"versions",
"were",
"available",
"outside",
"the",
"app",
"store",
",",
"through",
"phishing",
"sites",
",",
"and",
"abused",
"the",
"Apple",
"Developer",
"Enterprise",
"program",
"."
] | [
16,
5,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanSpy.MSIL",
"Win32.Trojan.WisdomEyes.16070401.9500.9866",
"Trojan.Win32.Downeks.exeslg",
"Troj.Spy.Msil.Downeks!c",
"Trojan.MSILPerseus.D21B6F",
"TrojanSpy:MSIL/Tinclex.A",
"Riskware.Confuser!",
"Trj/GdSda.A",
"Win32/Trojan.Spy.7a8"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"By",
"comparing",
"the",
"sizes",
"of",
"the",
"encrypted",
"asset",
"file",
"tong.luo",
"vs",
"the",
"decrypted",
"JAR",
"file",
"mycode.jar",
",",
"it",
"is",
"interesting",
"to",
"note",
"that",
"it",
"is",
"the",
"same",
"file",
"(",
"almost",
"the",
"same",
"size",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware,",
"which",
"has",
"been",
"identified",
"by",
"many",
"vendors",
"on",
"VirusTotal,",
"has",
"been",
"labeled",
"by",
"our",
"researchers",
"as",
"Trojan.Chinad",
"or",
"just",
"Chinad",
"as",
"an",
"alternative",
"short",
"label."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
3,
16,
16,
16,
16,
16
] |
[
"The",
"group",
"behind",
"the",
"attacks",
"is",
"possibly",
"associated",
"with",
"the",
"Russian",
"government",
"and",
"has",
"been",
"active",
"since",
"at",
"least",
"2007."
] | [
16,
6,
16,
16,
9,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
0
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.BCDE",
"Backdoor.Baceed",
"Backdoor.Hupigon.Win32.11548",
"Backdoor.W32.Hupigon.torp",
"W32/Backdoor2.EVBN",
"Backdoor.Trojan",
"Win.Trojan.Hupigon-27433",
"Backdoor.Win32.Hupigon.gklq",
"Trojan.Win32.Hupigon.wnxa",
"Backdoor.Win32.Hupigon.163840.I",
"Backdoor.Win32.Hupigon.gklqo",
"BackDoor.Pigeon1.8593",
"W32/Backdoor.ECNM-9194",
"Backdoor/Hupigon.jmk",
"W32.Backdoor.Hupigon",
"BDS/Baceed.hrhsh",
"Trojan[Backdoor]/Win32.Hupigon",
"Backdoor:Win32/Baceed.A!bit",
"Backdoor.Win32.Hupigon.gklq",
"Trojan/Win32.Hupigon.R42586",
"TScope.Malware-Cryptor.SB",
"Win32.Backdoor.Hupigon.Pavs",
"Backdoor.Win32.Hupigon",
"Win32/Trojan.aab"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Ransom.Crypt12",
"Ransom.Kristina",
"Ransom_CRYPTWELVE.B",
"Win32.Trojan.WisdomEyes.16070401.9500.9562",
"Ransom.CryptXXX",
"Ransom_CRYPTWELVE.B",
"Win.Ransomware.Kristina-6367716-1",
"MSIL.Trojan-Ransom.Crypt12.B",
"Trojan.Win32.Encoder.evktgv",
"Trojan.Win32.Z.Ransom.124928.G",
"Trojan.Encoder.15080",
"Trojan.Filecoder.Win32.6738",
"Ransom.MSIL.Natiris",
"W32/Trojan.ERVC-5011",
"TR/RedCap.khogd",
"Ransom:MSIL/Natiris.A",
"Trojan/Win32.Ransom.C2247299",
"Trj/GdSda.A",
"Win32/Trojan.Ransom.15c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Wolf",
"Research",
"claimed",
"to",
"shut",
"down",
"their",
"operations",
"but",
"we",
"clearly",
"see",
"that",
"their",
"previous",
"work",
"continues",
"under",
"another",
"guise",
"."
] | [
11,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"First",
"we",
"got",
"the",
"Linux",
"variant,",
"and",
"with",
"information",
"extracted",
"from",
"its",
"binary,",
"we",
"were",
"able",
"to",
"find",
"the",
"variant",
"for",
"Windows",
"desktops,",
"too."
] | [
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"However",
",",
"although",
"the",
"β",
"Concipit1248",
"β",
"app",
"requested",
"permissions",
"to",
"open",
"the",
"device",
"camera",
"and",
"read",
"photos",
",",
"the",
"code",
"only",
"can",
"upload",
"a",
"self-contained",
"PNG",
"file",
"to",
"a",
"remote",
"sever",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"https",
":",
"//github.com/El3ct71k/Keylogger/",
"It",
"appears",
"the",
"developers",
"have",
"copied",
"the",
"functional",
"part",
"of",
"the",
"keylogger",
"module",
"from",
"this",
"project",
"."
] | [
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Each",
"value",
"represents",
"a",
"different",
"type",
"of",
"data",
"to",
"steal",
"from",
"the",
"device",
":",
"Value",
"Data",
"Type",
"1",
"Accounts",
"2",
"Installed",
"APP",
"list",
"3",
"Running",
"processes",
"list",
"4",
"Battery",
"status",
"5",
"Browser",
"bookmarks",
"and",
"histories",
"6",
"Call",
"logs",
"7",
"Clipboard",
"8",
"Contacts",
"9",
"Mobile",
"operator",
"information",
"a",
"File",
"list",
"on",
"SD",
"card",
"b",
"Location",
"c",
"Image",
"list",
"d",
"Audio",
"list",
"e",
"Video",
"list",
"f",
"Storage",
"and",
"memory",
"information",
"g",
"Connection",
"information",
"h",
"Sensors",
"information",
"i",
"SMS",
"messages",
"j",
"VCard",
"format",
"contacts",
"Table",
"1",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Esacel",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Trojan.Win32.Kryptik.exqpjd",
"Trojan.Kryptik.Win32.1351348",
"W32/Trojan.MCPS-3536",
"TR/Crypt.ZPACK.ocodu",
"Trojan.Esacel",
"Trj/CI.A",
"Trojan.Kryptik!MH3d/6dQFBI",
"Trojan.Inject",
"Malicious_Behavior.SB"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Any",
"app",
"can",
"ask",
"for",
"accessibility",
"permissions",
"and",
"implement",
"features",
"such",
"as",
"screen",
"reading",
",",
"changing",
"sizes",
"and",
"colors",
"of",
"objects",
",",
"hearing",
"enhancements",
",",
"replacing",
"touch",
"with",
"other",
"forms",
"of",
"control",
"and",
"more",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"At",
"FireEye",
"Labs,",
"we",
"recently",
"detected",
"the",
"resurgence",
"of",
"a",
"coin",
"mining",
"campaign",
"with",
"a",
"novel",
"and",
"unconventional",
"infection",
"vector",
"in",
"the",
"form",
"of",
"an",
"iFRAME",
"inline",
"frame",
"β",
"an",
"HTML",
"document",
"embedded",
"inside",
"another",
"HTML",
"document",
"on",
"a",
"web",
"page",
"that",
"allows",
"users",
"to",
"get",
"content",
"from",
"another",
"separate",
"source",
"and",
"display",
"it",
"within",
"the",
"main",
"web",
"page",
"β",
"embedded",
"in",
"a",
"PE",
"binary",
"Portable",
"Executable",
"Binary,",
"or",
".exe."
] | [
3,
4,
12,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16,
7,
15,
16,
16,
16,
16,
16,
1,
9,
9,
16,
1,
9,
9,
9,
9,
9,
9,
9,
16,
16,
4,
11,
15,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.QHost.ACI",
"Trojan.Win32.Qhost!O",
"Trojan.QHost.ACI",
"TROJ_RENOS.TU",
"Win32.Trojan.WisdomEyes.16070401.9500.9838",
"W32/Trojan.YCCB-6079",
"Trojan.Dropper",
"TROJ_RENOS.TU",
"Win.Trojan.Small-4579",
"Trojan.Win32.Qhost.abh",
"Trojan.QHost.ACI",
"Trojan.Win32.Qhost.slro",
"Trojan.QHost.ACI",
"TrojWare.Win32.TrojanDownloader.FakeAlert.G",
"Trojan.QHost.ACI",
"Trojan.Fakealert.399",
"BehavesLike.Win32.Dropper.nc",
"W32/Trojan2.CMAE",
"Trojan/Qhost.tf",
"Trojan:Win32/Wantvi.C",
"Trojan.Win32.Qhost.abh",
"Trojan.QHost.ACI",
"Trojan/Win32.Qhost.R34501",
"Trojan.QHost.ACI",
"OScope.Hoax.Win32.FakeAlert",
"Trojan.Qhost",
"Win32/TrojanDownloader.FakeAlert.G",
"Trojan.Qhost.EP",
"Trojan.Win32.Qhost.abh",
"W32/Qhost.ABH!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader.Mediket.CD",
"Troj.Downloader.W32.Mediket.cd!c",
"Trojan/Downloader.Mediket.cd",
"Win32.Trojan.WisdomEyes.16070401.9500.9810",
"W32/Downloader.JJGI-8097",
"Win32/SillyDl.FL",
"Trojan-Downloader.Win32.Mediket.cd",
"Trojan.Win32.Mediket.dkal",
"Trojan.Win32.Downloader.10240.ES",
"Trojan.DownLoader.7470",
"Downloader.Mediket.Win32.64",
"Trojan-Downloader.Win32.Mediket.bl",
"W32/DldrX.DHK",
"TrojanDownloader.Mediket.fv",
"TR/Dldr.Mediket.S.2",
"Trojan[Downloader]/Win32.Mediket",
"Trojan.Heur.amGfYI3rB7li",
"Trojan-Downloader.Win32.Mediket.cd",
"Trojan/Win32.Small.C140121",
"Trojan-Downloader.Win32.Mediket.ca",
"Trojan-Downloader.Mediket.CD",
"Win32.Trojan-downloader.Mediket.Ajvz",
"W32/Dloader.CD!tr.dldr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"particular",
"focus",
"appears",
"to",
"have",
"been",
"placed",
"on",
"the",
"healthcare",
"industry."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Small.6656.AAX",
"Trojan.Win32.Small!O",
"Trojan.Tosct",
"Trojan.Heur.RP.EF49A0",
"TROJ_DLOADER.FAV",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Trojan.MPRY-6149",
"TROJ_DLOADER.FAV",
"Trojan.Win32.Small.coy",
"Trojan.Win32.Small.cwxndz",
"Trojan.Click2.56220",
"Trojan.Small.Win32.19363",
"Trojan.Win32.Tosct",
"Trojan/Small.ovb",
"TR/Spy.6656.106",
"Trojan/Win32.Small",
"Win32.Troj.Undef.kcloud",
"Trojan.Win32.Small.coy",
"Trojan:Win32/Tosct.A",
"Trojan/Win32.Connapts.C256364",
"Trojan.Small.coy",
"Trojan.Small",
"Win32.Trojan.Small.Aiik",
"Trojan.Small!nYMaRKVOefk",
"W32/Dloader.FAV!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"these",
"websites",
"they",
"hosted",
"malware",
"that",
"was",
"digitally",
"signed",
"with",
"a",
"valid,",
"likely",
"stolen",
"code",
"signing",
"certificate"
] | [
16,
16,
1,
16,
16,
3,
15,
16,
16,
16,
16,
16,
16,
16,
3,
11,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Hybris.B@mm",
"Email-Worm.Win32.Hybris!O",
"Worm.Hybris",
"W32/Hybris.dll@MM",
"W95.Hybris.PI.msOW",
"W32/Hybris.dll@MM",
"WORM_HYBRIS.F",
"Win32.Trojan.WisdomEyes.16070401.9500.9989",
"W32/Hybris.worm.B",
"W95.Hybris.worm",
"WORM_HYBRIS.F",
"Win.Trojan.Hybris-10",
"Win32.Hybris.B@mm",
"Email-Worm.Win32.Hybris.plugin",
"Win32.Hybris.B@mm",
"Trojan.Win32.Hybris.upukw",
"Win32.Hybris",
"Win32.Hybris.B@mm",
"EmailWorm.Win32.Hybris.lki",
"Win98.Vecna.23040",
"Worm.Hybris.Win32.8",
"BehavesLike.Win32.Virut.pm",
"W32/Hybris.worm.B",
"Worm/Hybris.c",
"Worm[Email]/Win32.Hybris",
"Worm:Win32/Hybris.C@mm",
"Email-Worm.Win32.Hybris.plugin",
"I-Worm/Hybris.Variant",
"Win32.Hybris.B@mm",
"W32/Hybris.Wsock",
"Win32.Hybris.E2C45E",
"Win32/Hybris.dll",
"Win32.Worm-email.Hybris.Wuqu",
"I-Worm.Hybris",
"Email-Worm.Win32.Hybris.Based",
"W32/Hybris.dll@mm",
"Win32/Worm.Email-Worm.47d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Who",
"is",
"behind",
"Judy",
"?",
"The",
"malicious",
"apps",
"are",
"all",
"developed",
"by",
"a",
"Korean",
"company",
"named",
"Kiniwini",
",",
"registered",
"on",
"Google",
"Play",
"as",
"ENISTUDIO",
"corp",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
5,
13,
16,
4,
12,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.8BE3",
"Win32.Neveg.C@mm",
"Worm/W32.Neveg.52294.B",
"W32/Neveg.c@MM",
"W32/Neveg.c",
"Win32.Neveg.C@mm",
"Trojan.Win32.Neveg.iclu",
"W32/Neveg.D@mm",
"W32.Neveg.C@mm",
"Win32/Neveg.C",
"WORM_NEVEG.C",
"Worm.Neveg.C.4",
"Email-Worm.Win32.Neveg.c",
"I-Worm.Neveg!ysm95GgJE50",
"I-Worm.Win32.Neveg.52294.C[h]",
"W32.W.Neveg.c!c",
"Win32.Neveg.C@mm",
"Worm.Win32.Neveg.C",
"Win32.Neveg.C@mm",
"Win32.HLLM.Peerage",
"Worm.Neveg.Win32.1",
"WORM_NEVEG.C",
"BehavesLike.Win32.Ramnit.qc",
"W32/Neveg.URKR-8484",
"Worm[Email]/Win32.Neveg",
"Win32.Neveg.EB4884",
"Worm/Win32.MyDoom",
"Worm:Win32/Neveng.C@mm",
"Win32.Neveg.C@mm",
"Worm.Neveg",
"W32/Neveg.D.worm",
"Win32.Worm-email.Neveg.Lpbl",
"Email-Worm.Win32.Neveg.C",
"Win32.Neveg.C@mm",
"I-Worm/Neveg.C",
"Worm.Win32.Neveg.C"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Below",
"are",
"descriptions",
"of",
"some",
"of",
"the",
"most",
"interesting",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Ahmed",
"Mansoor",
"is",
"an",
"internationally",
"recognized",
"human",
"rights",
"defender,",
"based",
"in",
"the",
"United",
"Arab",
"Emirates",
"UAE,",
"and",
"recipient",
"of",
"the",
"Martin",
"Ennals",
"Award",
"sometimes",
"referred",
"to",
"as",
"a",
"Nobel",
"Prize",
"for",
"human",
"rights",
"."
] | [
4,
12,
16,
16,
16,
16,
4,
12,
12,
16,
16,
2,
10,
10,
10,
10,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"All",
"of",
"the",
"URLs",
"reference",
"the",
"file",
"β",
"mms.apk",
"β",
"and",
"all",
"use",
"the",
"domain",
"β",
"XXXX.ru",
"β",
",",
"which",
"belongs",
"to",
"a",
"top",
"five",
"shared",
"hosting",
"platform",
"in",
"Russia",
"(",
"the",
"domain",
"itself",
"has",
"been",
"obfuscated",
"to",
"anonymize",
"the",
"provider",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Allows",
"an",
"application",
"to",
"send",
"SMS",
"messages",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Trojan.MOBS-7437",
"Win.Trojan.B-474",
"Virus.Win32.Virut.CE",
"Trojan.Heur.LP.EE1B95",
"Backdoor:Win32/Liudoor.B!dha",
"Backdoor/Win32.Liudoor.R192527",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDropper.Dorkbot.II4",
"Backdoor.Bifrose.Win32.18816",
"Backdoor.Bifrose",
"Trojan/Midgare.advf",
"TROJ_DROPPER.SMS",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Dropper",
"Win32/Bifrose.KJ",
"TROJ_DROPPER.SMS",
"Win.Trojan.Bifrose-9522",
"Trojan.Win32.Midgare.bqxuse",
"BackDoor.Bifrost.26217",
"BehavesLike.Win32.Downloader.kc",
"Backdoor/Bifrose.ovy",
"TR/Midgare.adjf",
"Trojan[Backdoor]/Win32.Bifrose",
"Win32.Hack.MnlessT.lo.88519",
"TrojanDropper:Win32/Dooxud.A",
"Trojan.Graftor.D46F7",
"Backdoor.Win32.Bifrose.77824.N",
"Trojan/Win32.Bifrose.R3685",
"Backdoor.Bifrose",
"VirTool.Injector!nUBzjCDRby4",
"Trojan.Win32.Midgare"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Proofpoint",
"researchers",
"originally",
"discovered",
"the",
"Panda",
"Banker",
"malware",
"in",
"February,",
"2016."
] | [
4,
12,
16,
16,
3,
11,
11,
11,
16,
0,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9961",
"Trojan.Win32.Bladabindi.esnxij",
"Trojan.Win32.Z.Bladabindi.116224.CW",
"Worm.MSIL.Autorun",
"Trojan.MSIL.Bladabindi.1",
"TrojanDownloader:MSIL/Prardrukat.A",
"Trj/GdSda.A",
"Win32.Trojan.Atraps.Taew",
"Win32/Trojan.62b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Beginning",
"on",
"October",
"30,",
"2015,",
"Palo",
"Alto",
"Networks",
"began",
"seeing",
"instances",
"of",
"this",
"new",
"version",
"of",
"CryptoWall,",
"which",
"some",
"researchers",
"have",
"begun",
"calling",
"version",
"4."
] | [
16,
16,
0,
8,
8,
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
4,
16,
16,
16,
3,
11
] |
[
"Table",
"2",
"below",
"lists",
"some",
"of",
"these",
"apps",
"with",
"their",
"respective",
"metadata",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FakeFolderDAS.Trojan",
"Backdoor.Win32.BlackHole!O",
"Worm.RussoTuristo",
"Worm.RussoTuristo.Win32.83",
"Trojan.Heur.E54A1B",
"Win32/Russo.A",
"Worm.Win32.RussoTuristo.f",
"Trojan.Win32.Amorale.crsxml",
"Worm.Win32.RussoTuristo.53326",
"Trojan.Win32.FakeFolder.pb",
"Win32.HLLW.Amorale",
"BehavesLike.Win32.Adware.qh",
"Backdoor/Blackhole.bmv",
"Worm/Win32.RussoTuristo",
"Worm.Win32.RussoTuristo.f",
"Worm/Win32.RussoTuristo.R58000",
"Worm.TycKa.K",
"Worm.Win32.RussoTuristo",
"Worm.Win32.FakeFolder.CI"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"the",
"past",
"weeks",
"on",
"6",
"August",
"2016,",
"Cyberkov",
"Security",
"Incident",
"Response",
"Team",
"CSIRT",
"received",
"a",
"numerous",
"Android",
"malwares",
"operating",
"in",
"different",
"areas",
"in",
"Libya",
"especially",
"in",
"Tripoli",
"and",
"Benghazi."
] | [
16,
16,
0,
8,
16,
0,
8,
8,
4,
12,
12,
12,
12,
12,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
2,
16,
16,
2,
16,
2
] |
[
"Since",
"January",
"2016,",
"discreet",
"campaigns",
"involving",
"malware",
"called",
"Trojan.Odinaff",
"have",
"targeted",
"a",
"number",
"of",
"financial",
"organizations",
"worldwide."
] | [
16,
0,
8,
16,
6,
16,
3,
11,
1,
16,
16,
16,
16,
16,
4,
12,
12
] |
[
"The",
"campaign",
"Talos",
"analysed",
"focused",
"on",
"Brazilian",
"users",
"and",
"also",
"attempted",
"to",
"remain",
"stealthy",
"by",
"using",
"multiple",
"methods",
"of",
"re-direction",
"in",
"an",
"attempt",
"to",
"infect",
"the",
"victim",
"machine."
] | [
6,
14,
4,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Syamcrog",
"Trojan.Ursu.D1107",
"Win.Trojan.Bifrose-10939",
"Trojan.Win32.Tiny.etjahi",
"TR/Downloader.wgueo",
"Trojan:Win32/Syamcrog.A",
"Trojan.Refroso",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Unfortunately,",
"the",
"ransomware",
"developers",
"were",
"not",
"apprehended",
"and",
"it",
"now",
"appears",
"they",
"have",
"been",
"biding",
"their",
"time",
"before",
"releasing",
"a",
"new",
"ransomware."
] | [
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"This",
"malware",
"variant",
"also",
"appears",
"to",
"be",
"technically",
"superior",
"to",
"many",
"other",
"banking",
"Trojans",
"being",
"able",
"to",
"use",
"its",
"overlay",
"attack",
"even",
"on",
"Android",
"6",
",",
"which",
"has",
"technical",
"improvements",
"compared",
"to",
"the",
"previous",
"Android",
"versions",
"to",
"prevent",
"such",
"attacks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16
] |
[
"Meanwhile,",
"we",
"have",
"informed",
"the",
"Google",
"Play",
"security",
"team",
"about",
"the",
"RetroTetris",
"app",
"and",
"are",
"awaiting",
"their",
"response."
] | [
16,
16,
16,
16,
16,
4,
12,
12,
12,
16,
16,
3,
11,
16,
16,
16,
16,
16
] |
[
"Adobe",
"released",
"a",
"patch",
"for",
"the",
"vulnerability",
"on",
"July",
"8,",
"2015."
] | [
4,
16,
16,
16,
16,
16,
7,
16,
0,
8,
8
] |
[
"Evolution",
"of",
"Rotexy",
"2014β2015",
"Since",
"the",
"malicious",
"program",
"was",
"detected",
"in",
"2014",
",",
"its",
"main",
"functions",
"and",
"propagation",
"method",
"have",
"not",
"changed",
":",
"Rotexy",
"spreads",
"via",
"links",
"sent",
"in",
"phishing",
"SMSs",
"that",
"prompt",
"the",
"user",
"to",
"install",
"an",
"app",
"."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"payloads",
"observed",
"to",
"be",
"associated",
"with",
"the",
"Uyghur",
"themed",
"C2",
"domains",
"so",
"far",
"consist",
"of",
"PlugX,",
"Gh0st",
"RAT,",
"and",
"Saker/Xbox,",
"although",
"there",
"may",
"be",
"others",
"that",
"are",
"yet",
"to",
"be",
"discovered."
] | [
3,
11,
11,
16,
16,
16,
16,
16,
16,
4,
1,
9,
9,
16,
16,
16,
16,
3,
11,
11,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"approach",
"of",
"separating",
"malicious",
"functionality",
"out",
"into",
"separate",
"stages",
"that",
"are",
"later",
"downloaded",
"during",
"execution",
"and",
"not",
"present",
"in",
"the",
"initial",
"app",
"published",
"to",
"the",
"Google",
"Play",
"Store",
",",
"combined",
"with",
"social",
"engineering",
"delivered",
"via",
"social",
"media",
"platforms",
"like",
"Facebook",
",",
"requires",
"minimal",
"investment",
"in",
"comparison",
"to",
"premium",
"tooling",
"like",
"Pegasus",
"or",
"FinFisher",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
16
] |
[
"However",
",",
"this",
"method",
"may",
"not",
"work",
"if",
"the",
"threat",
"actors",
"react",
"quickly",
"to",
"an",
"attempt",
"to",
"remove",
"the",
"Trojan",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BackDoor.RevetRat.2",
"BehavesLike.Win32.Trojan.cc"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"Not",
"only",
"that,",
"but",
"the",
"Windows",
"version",
"was",
"additionally",
"equipped",
"with",
"a",
"valid",
"code",
"signing",
"signature."
] | [
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
1,
9,
9,
9
] |
[
"This",
"was",
"followed",
"by",
"another",
"great",
"blog",
"by",
"McAfee",
"on",
"the",
"same",
"subject",
"but",
"my",
"focus",
"will",
"be",
"on",
"a",
"specific",
"aspect",
"mentioned",
"in",
"the",
"RSA",
"blog",
"which",
"is",
"the",
"exploit",
"used.",
"FireEye",
"discovered",
"a",
"malicious",
"docx",
"exploiting",
"a",
"zero",
"day",
"vulnerability",
"in",
"Microsoft's",
"Encapsulated",
"Postscript",
"EPS",
"filter,",
"in",
"the",
"summer",
"of",
"2015."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
3,
16,
4,
16,
16,
1,
9,
7,
15,
15,
15,
15,
16,
1,
9,
9,
9,
9,
16,
0,
8,
8,
8
] |
[
"The",
"malware",
"can",
"execute",
"a",
"variety",
"of",
"arbitrary",
"commands",
",",
"including",
"(",
"for",
"example",
")",
"intercepting",
"or",
"sending",
"text",
"messages",
"without",
"the",
"user",
"β",
"s",
"knowledge",
",",
"obtaining",
"a",
"copy",
"of",
"the",
"victim",
"β",
"s",
"Address",
"Book",
",",
"or",
"call",
"or",
"text",
"message",
"logs",
",",
"or",
"sending",
"phone",
"network",
"feature",
"codes",
"(",
"also",
"known",
"as",
"USSD",
"codes",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Most",
"of",
"them",
"are",
"almost",
"harmless",
"β",
"all",
"they",
"did",
"until",
"recently",
"was",
"injecting",
"tons",
"of",
"ads",
"and",
"downloading",
"others",
"of",
"their",
"kind",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Care",
"and",
"concern",
"both",
"for",
"using",
"a",
"mobile",
"device",
"and",
"for",
"securing",
"a",
"mobile",
"device",
"is",
"critical",
",",
"especially",
"for",
"those",
"organizations",
"that",
"allow",
"bring-your-own-devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"some",
"cases",
",",
"TrickMo",
"may",
"use",
"this",
"feature",
"to",
"intercept",
"SMS",
"messages",
"without",
"the",
"knowledge",
"of",
"the",
"user",
"by",
"activating",
"the",
"lockdown",
"screen",
"and",
"intercepting",
"SMS",
"messages",
"in",
"the",
"background",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"first",
"trace",
"of",
"this",
"tool",
"in",
"our",
"telemetry",
"data",
"dates",
"back",
"to",
"late",
"2015."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
5,
13,
16,
16,
16,
0,
8
] |
[
"This",
"report",
"is",
"a",
"comprehensive",
"description",
"of",
"the",
"JSocket",
"Remote",
"Access",
"Tool",
"RAT,",
"and",
"its",
"significant",
"capability",
"to",
"control",
"PCs,",
"Linux",
"machines,",
"Macs",
"and",
"Android",
"devices."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
11,
11,
16,
16,
16,
16,
16,
1,
9,
5,
13,
13,
16,
5,
13
] |
[
"Earlier",
"this",
"month,",
"FortiGuard",
"Labs",
"researchers",
"published",
"findings",
"about",
"a",
"malware",
"campaign",
"exploiting",
"a",
"PowerPoint",
"vulnerability."
] | [
16,
16,
0,
4,
12,
12,
16,
16,
16,
16,
6,
14,
7,
15,
15,
15
] |
[
"While",
"the",
"cyber-world",
"was",
"still",
"shaking",
"under",
"the",
"destructive",
"ExPetr/Petya",
"attack",
"that",
"hit",
"on",
"June",
"27,",
"another",
"ransomware",
"attack",
"targeting",
"Ukraine",
"at",
"the",
"same",
"time",
"went",
"almost",
"unnoticed."
] | [
16,
16,
6,
16,
16,
16,
16,
16,
16,
3,
1,
16,
16,
16,
0,
8,
16,
1,
9,
16,
2,
16,
16,
16,
16,
16,
16,
16
] |
[
"Cybereason",
"Mobile",
"detects",
"EventBot",
"and",
"provides",
"the",
"user",
"with",
"immediate",
"actions",
"."
] | [
5,
13,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Johnnie.DB3AF",
"Trojan.Win32.Clicker!BT",
"W32/Trojan.IUSC-1586",
"TrojanClicker:MSIL/Youclick.A",
"Trojan.Win32.Clicker!BT",
"Trojan-Clicker.MSIL.Youclick"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"These",
"included",
"the",
"use",
"of",
"certificate",
"pinning",
"and",
"public",
"key",
"encryption",
"for",
"C2",
"communications",
",",
"geo-restrictions",
"imposed",
"by",
"the",
"C2",
"when",
"delivering",
"the",
"second",
"stage",
",",
"and",
"the",
"comprehensive",
"and",
"well",
"implemented",
"suite",
"of",
"surveillance",
"features",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Recently,",
"while",
"researching",
"attacks",
"on",
"targets",
"in",
"Thailand,",
"Unit",
"42",
"discovered",
"a",
"tool",
"that",
"initially",
"appeared",
"to",
"be",
"a",
"variant",
"of",
"the",
"well-known",
"PlugX",
"RAT",
"based",
"on",
"similar",
"observed",
"behavior",
"such",
"as",
"the",
"usage",
"of",
"DLL",
"side-loading",
"and",
"a",
"shellcode",
"file."
] | [
16,
16,
16,
1,
16,
16,
16,
2,
4,
12,
16,
16,
3,
15,
16,
16,
16,
16,
16,
3,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
1,
9
] |
[
"We",
"sourced",
"the",
"over",
"561MB",
"of",
"exfiltrated",
"data",
"from",
"this",
"domain",
"alone",
",",
"all",
"of",
"which",
"we",
"found",
"to",
"be",
"7z",
"compressed",
"and",
"password",
"protected",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"YOUR",
"PERSONAL",
"ID:",
"Personal",
"ID",
"of",
"your",
"computer,",
"for",
"example:",
"4df7065b1d049d098526344faaabf3f8"
] | [
1,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9
] |
[
"Threat",
"data",
"from",
"endpoints",
"are",
"combined",
"with",
"signals",
"from",
"email",
"and",
"data",
",",
"identities",
",",
"and",
"apps",
"in",
"Microsoft",
"365",
"Defender",
"(",
"previously",
"Microsoft",
"Threat",
"Protection",
")",
",",
"which",
"orchestrates",
"detection",
",",
"prevention",
",",
"investigation",
",",
"and",
"response",
"across",
"domains",
",",
"providing",
"coordinated",
"defense",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Sality.lak4",
"Trojan.Heur.EFE584",
"Win32.Trojan.WisdomEyes.16070401.9500.9961",
"Backdoor.Trojan",
"Trojan-PSW.Win32.LdPinch.zie",
"Trojan.DownLoader.origin",
"BehavesLike.Win32.Virut.nt",
"Trojan-PSW.Win32.LdPinch.zie"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
")",
"Technical",
"Analysis",
"App",
"Name",
":",
"TikTok",
"Pro",
"Hash",
":",
"9fed52ee7312e217bd10d6a156c8b988",
"Package",
"Name",
":",
"com.example.dat.a8andoserverx",
"Upon",
"installation",
",",
"the",
"spyware",
"portrays",
"itself",
"as",
"TikTok",
"using",
"the",
"name",
"TikTok",
"Pro",
"."
] | [
9,
16,
16,
16,
16,
16,
5,
13,
16,
16,
1,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
5,
13,
16
] |
[
"]",
"us",
"."
] | [
9,
9,
16
] |
[
"The",
"international",
"investigation",
"into",
"the",
"2014",
"Iguala",
"Mass",
"Disappearance",
"was",
"targeted",
"with",
"infection",
"attempts",
"using",
"spyware",
"developed",
"by",
"the",
"NSO",
"group,",
"an",
"Israeli",
"cyber",
"warfare",
"company"
] | [
16,
16,
16,
16,
16,
0,
4,
12,
16,
16,
16,
16,
1,
9,
16,
3,
16,
16,
4,
12,
12,
16,
4,
12,
12,
14
] |
[
"In",
"recent",
"attacks",
"they",
"set",
"up",
"a",
"fake",
"VPN",
"Web",
"Portal",
"and",
"targeted",
"at",
"least",
"five",
"Israeli",
"IT",
"vendors,",
"several",
"financial",
"institutes,",
"and",
"the",
"Israeli",
"Post",
"Office."
] | [
16,
16,
1,
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
16,
16,
2,
4,
12,
16,
4,
12,
16,
16,
4,
12,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"VB:Trojan.VBA.Downloader.BU",
"X97M.Petya.A",
"VB:Trojan.VBA.Downloader.BU",
"X2KM_GOLDENEYE.B",
"Xls.Dropper.Goldeneye-3",
"VB:Trojan.VBA.Downloader.BU",
"Trojan.Script.DnlrObj.ejzqyq",
"Troj.Downloader.Script!c",
"VB:Trojan.VBA.Downloader.BU",
"VB:Trojan.VBA.Downloader.BU",
"X2KM_GOLDENEYE.B",
"X97M/Downloader.au",
"VB:Trojan.VBA.Downloader.BU",
"Trojan:O97M/Goldeneye.A",
"X97M/Downloader.au",
"Trojan-Ransom.VBA.GoldenEye",
"Macro.Trojan-Dropper.Petya.R",
"O97M/Dropper.ALI",
"virus.office.obfuscated.1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"finding",
",",
"in",
"part",
",",
"shows",
"the",
"risk",
"that",
"can",
"come",
"in",
"opting",
"for",
"less",
"expensive",
"smartphones",
",",
"whose",
"manufacturers",
"may",
"not",
"diligently",
"fix",
"security",
"vulnerabilities",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
7,
15,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.Haed!O",
"Trojan/Dropper.Haed.co",
"TROJ_DROP.SMUS1",
"W32/Dropper.BJGT",
"Backdoor.Trojan",
"TROJ_DROP.SMUS1",
"Win.Trojan.Haed-1",
"Trojan-Dropper.Win32.Haed.eno",
"Trojan.Win32.Drop.mqlso",
"Troj.Dropper.W32.Haed.eno!c",
"TrojWare.Win32.Kryptik.BAN",
"Trojan.Click1.57099",
"Dropper.Haed.Win32.381",
"virus.win32.ramnit.j",
"W32/Risk.OLFU-0240",
"TR/Drop.He4Hook.B",
"W32/Haed.A!tr.dldr",
"Trojan[Dropper]/Win32.Haed",
"Trojan.Heur.JP.E9E07C",
"Dropper/Win32.Haed.N349364692",
"AdWare.AdPlus",
"Win32.Trojan-Dropper.Haed.cfsr",
"Trojan-Downloader.Win32.Frethog"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"most",
"cases",
",",
"these",
"click",
"fraud",
"apps",
"were",
"uninstalled",
"by",
"the",
"users",
",",
"probably",
"due",
"to",
"the",
"low",
"quality",
"of",
"the",
"apps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Fortunately",
",",
"FireEye",
"Mobile",
"Threat",
"Prevention",
"platform",
"can",
"recognize",
"the",
"malicious",
"SMS",
"and",
"networking",
"behaviors",
"used",
"by",
"these",
"RuMMS",
"samples",
",",
"and",
"help",
"us",
"quickly",
"identify",
"the",
"threat",
"."
] | [
16,
16,
5,
13,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"During",
"the",
"account",
"sign-up",
"process",
",",
"Google",
"may",
"flag",
"the",
"account",
"creation",
"attempt",
"as",
"suspicious",
"and",
"prompt",
"the",
"app",
"to",
"solve",
"a",
"CAPTCHA",
"."
] | [
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"APC",
"routine",
"creates",
"a",
"thread",
"in",
"the",
"context",
"of",
"the",
"svchost.exe",
"process",
"that",
"will",
"map",
"and",
"execute",
"the",
"stage",
"5",
"malware",
"into",
"the",
"winlogon.exe",
"process",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16
] |
[
"In",
"recent",
"months,",
"the",
"malware",
"used",
"in",
"the",
"EITest",
"campaign",
"has",
"been",
"ransomware",
"such",
"as",
"Spora",
"and",
"Mole."
] | [
16,
16,
16,
3,
11,
16,
16,
6,
14,
14,
16,
16,
3,
16,
16,
3,
16,
3
] |
[
"Example",
"note:Please",
"follow",
"the",
"instructions",
"Send",
"$300",
"worth",
"of",
"Bitcoin",
"to",
"following",
"address:",
"1Mz7153HMuxXTuR2R1t78mGSdzaAtNbBWX"
] | [
1,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9
] |
[
"This",
"specific",
"APK",
"was",
"modified",
"to",
"include",
"the",
"malicious",
"remote",
"access",
"tool",
"RAT",
"called",
"DroidJack",
"also",
"known",
"as",
"SandroRAT,",
"which",
"would",
"virtually",
"give",
"an",
"attacker",
"full",
"control",
"over",
"a",
"victim's",
"phone."
] | [
16,
16,
5,
16,
16,
16,
16,
16,
3,
11,
11,
11,
11,
11,
11,
16,
16,
16,
3,
16,
16,
16,
16,
16,
6,
16,
11,
16,
16,
4,
12
] |
[
"While",
"performing",
"some",
"research",
"online,",
"Unit",
"42",
"was",
"able",
"to",
"identify",
"the",
"following",
"sample,",
"which",
"is",
"being",
"labeled",
"as",
"Trojan.Win32.Seadask'",
"by",
"a",
"number",
"of",
"anti-virus",
"companies."
] | [
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
4,
12
] |
[
"Truth",
"be",
"told,",
"these",
"are",
"all",
"likely",
"just",
"improvements",
"by",
"the",
"author",
"to",
"fix",
"bugs",
"or",
"simply",
"a",
"shift",
"in",
"approach",
"to",
"make",
"signature",
"matching",
"more",
"difficult",
"rather",
"then",
"a",
"completely",
"new",
"variant."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TROJ_INJECT.YYTS",
"Win32.Trojan.WisdomEyes.16070401.9500.9953",
"Infostealer.Limitail",
"TROJ_INJECT.YYTS",
"Trojan.Win32.Inject.dkhjux",
"Trojan/Scarsi.uz",
"W32.Tepfer.Uqxl",
"TR/MailPassStlr.A.87",
"Trojan[Dropper]/Win32.FrauDrop",
"Trojan:MSIL/Limitless.A",
"Trojan/Win32.DarkKomet.C641651",
"TrojanDropper.Injector",
"Trj/CI.A",
"Trojan.Injector!yje4mrhO7hs"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Exploit.SWF.CVE-2012-0754.B",
"Exploit/W32.CVE-2012-0754",
"Exp.SWF.CVE-2012-0754",
"Exploit.CVE-2012-0754",
"Exploit.SWF.CVE-2012-0754.a!c",
"Trojan.Mdropper",
"SWF/Exploit.CVE-2012-0754.A",
"SWF_EXPLCVE.A",
"Exploit.SWF.CVE-2012-0754.B",
"Exploit.SWF.CVE-2012-0754.a",
"Exploit.SWF.CVE-2012-0754.B",
"Exploit.S.D-Encrypted.106604",
"Exploit.SWF.CVE-2012-0754.B",
"Exploit.SWF.CVE-2012-0754.B",
"Exploit.CVE-2012-0754.1",
"SWF_EXPLCVE.A",
"Exploit-MSWord.o",
"DOC/SWFDropper.A!Camelot",
"TrojanDownloader.SWF.t",
"Trojan[Exploit]/SWF.CVE-2012-0754.a",
"Exploit:Win32/CVE-2012-0754.A",
"Exploit.SWF.CVE-2012-0754.B",
"Exploit.SWF.CVE-2012-0754.a",
"Exploit-MSWord.o",
"Exploit.SWF.CVE-2012-0754.a",
"Win32.Exploit.Cve-2012-0754.Ajli",
"Exploit.CVE-2012-0754.A",
"Exploit.SWF.CVE-2012-0754",
"W32/SWFExp.AS!tr",
"Win32/Trojan.Exploit.6a5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.BHO!O",
"TrojanDownloader.Gamup",
"Trojan/BHO.obt",
"Trojan.Zusy.D42D95",
"TROJ_STARTP.SML2",
"Win32.Trojan.BHO.n",
"TROJ_STARTP.SML2",
"Win.Trojan.OnlineGames-65",
"Trojan-Downloader.Win32.Gamup.qjl",
"Trojan.Win32.Gamup.ciurh",
"Trojan.Win32.A.Downloader.409816[UPX]",
"Troj.Downloader.W32.Gamup!c",
"Trojan.DownLoad2.34122",
"Downloader.Gamup.Win32.146",
"BehavesLike.Win32.Backdoor.cc",
"Trojan.Win32.StartPage",
"TR/BHO.efkmnb",
"Trojan[Downloader]/Win32.Gamup",
"Trojan-Downloader.Win32.Gamup.qjl",
"TrojanDownloader.Gamup",
"Win32.Trojan-downloader.Gamup.Ebhc",
"Win32/Trojan.f4f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"During",
"the",
"past",
"few",
"weeks",
"there",
"has",
"been",
"an",
"increase",
"in",
"malvertising",
"attacks,",
"for",
"example",
"via",
"a",
"series",
"of",
"compromises",
"of",
"open",
"source",
"Revive",
"ad",
"servers",
"which",
"is",
"still",
"continuing."
] | [
16,
0,
8,
8,
8,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
1,
16,
5,
13,
13,
13,
13,
16,
16,
16,
16
] |
[
"In",
"the",
"third",
"version",
"spotted",
"in",
"the",
"wild",
",",
"the",
"author",
"introduced",
"parts",
"of",
"the",
"source",
"code",
"of",
"the",
"infamous",
"Anubis",
"Trojan",
"(",
"which",
"was",
"leaked",
"earlier",
"in",
"2019",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Utilizing",
"AutoIT",
"within",
"a",
"payload",
"is",
"unique",
"because",
"it",
"is",
"a",
"legitimate",
"management",
"tool."
] | [
16,
3,
16,
16,
3,
16,
16,
16,
16,
16,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Batman.B",
"Trojan/W32.Batman.24576",
"Trojan.Batman.B",
"Trojan/Batman.b",
"Trojan.Batman.B",
"W32.BatmanTroj",
"Win32/Batman.B",
"TROJ_BATMAN.B",
"Dos.Trojan.an-1",
"Trojan.Win32.Batman.b",
"Trojan.Win32.Batman.dcuw",
"Trojan.Win32.S.Batman.24576[h]",
"Win32.Trojan.Batman.Efkt",
"Trojan.Batman.B",
"TrojWare.Win32.Batman.B0",
"Trojan.Batman.B",
"Trojan.Batman.24576",
"Trojan.Batman.Win32.2",
"TROJ_BATMAN.B",
"W32/Trojan.DVOK-6663",
"Trojan/Win32.Batman.b",
"TR/Batman.B",
"W32/Batman.B!tr",
"Trojan/Win32.Batman",
"Trojan.Batman.B",
"Troj.W32.Batman.b!c",
"Trojan:Win32/Batman.B",
"Trojan/Win32.Batman.N15760",
"Trojan.Batman",
"Trojan.Batman!bY5LWYbvsHM",
"Trojan.Win32.Batman",
"Trojan.Batman.B",
"Trj/Batman.B",
"Win32/Trojan.022"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TrojWare.MSIL.Injector.AOX",
"BackDoor.Blackshades.2",
"Trojan/Foreign.axc",
"Trojan[Ransom]/Win32.Foreign",
"Trojan:MSIL/Parpwuts.C",
"Win32/Trojan.74b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.Daws!O",
"TrojanDropper.Daws",
"Win32.Worm.VB.sk",
"W32.SillyFDC",
"Trojan-Dropper.Win32.Daws.bkbb",
"Trojan.Win32.Daws.dwunho",
"Trojan.MulDrop4.55506",
"Dropper.Daws.Win32.11917",
"BehavesLike.Win32.VBObfus.vz",
"Win32/Virut.bv",
"Trojan[Dropper]/Win32.Daws",
"TrojanDropper:Win32/Vimdop.A!bit",
"Trojan.Razy.D1F32",
"Trojan-Dropper.Win32.Daws.bkbb",
"Dropper/Win32.Daws.R88727",
"TScope.Trojan.VB",
"Win32.Trojan-dropper.Daws.Wsug",
"Trojan.DR.Daws!i7I48rjdKf8",
"Trojan.VB2"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-PWS/W32.WebGame.66136.T",
"Trojan-GameThief.Win32.OnLineGames!O",
"PWS.Zhengtu.BB3",
"Trojan/OnLineGames.ajcfn",
"Trojan.Zusy.D2717",
"Win32.Trojan-PSW.OLGames.cm",
"Infostealer.Onlinegame",
"Win.Trojan.Onlinegames-14906",
"Trojan.Win32.OnLineGames.vtdwn",
"Troj.GameThief.W32.OnLineGames.lulb",
"TrojWare.Win32.GameThief.Magania.~NWABZ",
"Trojan.PWS.Wsgame.34942",
"Trojan.OnLineGames.Win32.120767",
"BehavesLike.Win32.Vundo.kh",
"Heur:Trojan/PSW.OnLineGames",
"Trojan[GameThief]/Win32.OnLineGames",
"PWS:Win32/Zhengtu.B!dll",
"Trojan/Win32.OnlineGameHack.R23439",
"PWS-OnlineGames.ld",
"TrojanPSW.OnLineGames.ai",
"Trojan.Win32.OnlineGames.zt",
"Trojan.PWS.OnLineGames!atUPCfHrrdw",
"Trojan-Spy.OnLineGames",
"W32/Onlinegames.WXA!tr",
"Trojan.PSW.Win32.GameOnline.EN"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Our",
"Threat",
"Intelligence",
"and",
"Interdiction",
"team",
"found",
"the",
"Gustuff",
"malware",
"being",
"advertised",
"in",
"the",
"Exploit.in",
"forum",
"as",
"a",
"botnet",
"for",
"rent",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Crypt.Delf.E",
"Trojan.Crypt.Delf.E",
"Trojan/Downloader.Dadobra.as",
"Trojan.Crypt.Delf.E",
"Trojan.DL.Dadobra!9AHkQxAvV1E",
"W32/Bancos.APF",
"Downloader.Trojan",
"TSPY_BANKER.UV",
"Trojan-Downloader.Win32.Dadobra.af",
"Trojan.Crypt.Delf.E",
"Trojan.Win32.Dadobra.cmicp",
"Trojan.Win32.Downloader.375808.K[h]",
"Trojan.Crypt.Delf.E",
"Trojan.Crypt.Delf.E",
"Trojan.DownLoader.2321",
"Downloader.Dadobra.Win32.410",
"TSPY_BANKER.UV",
"TrojanDownloader.Dadobra.as",
"Trojan[Downloader]/Win32.Dadobra",
"TrojanDownloader:Win32/Dadobra.BM",
"Troj.Downloader.W32.Dadobra.as!c",
"Trojan/Win32.Dadobra",
"Trojan.Crypt.Delf.E",
"Trojan.Win32.Dadobra.af",
"Trojan-Dropper.Delf",
"W32/Delf.DOA!tr.dldr",
"PSW.Banker.33.BG"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.VariantNetvat.Trojan",
"Trojan.Netvat",
"Backdoor.Trojan",
"Trojan.Win32.Netvat.45056",
"Worm.Win32.Tenavt.A",
"Trojan.DownLoader11.42361",
"BehavesLike.Win32.Downloader.pt",
"W32/Trojan.SSPB-9075",
"Trojan:Win32/Netvat.E!Dll",
"Trojan.Graftor.D29A7D",
"Trojan/Win32.Menti.R124411",
"Win32.Trojan.Dropper.Heur",
"Worm.Tenavt!JDujK3yXihg",
"W32/Kryptik.DTAI!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"On",
"the",
"other",
"side",
",",
"ByteDance",
"has",
"filed",
"a",
"lawsuit",
"suing",
"the",
"Trump",
"administration",
"."
] | [
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"However",
"it's",
"important",
"to",
"say",
"that",
"these",
"attackers,",
"and",
"the",
"toolset",
"used,",
"share",
"a",
"number",
"of",
"similarities",
"with",
"the",
"BlackEnergy",
"group,",
"which",
"conducted",
"attacks",
"against",
"the",
"energy",
"industry",
"in",
"Ukraine",
"in",
"December",
"2015",
"and",
"January",
"2016."
] | [
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
1,
16,
16,
16,
16,
16,
2,
16,
0,
8,
16,
0,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9906",
"Trojan.Win32.PeaceDuke.gfb",
"Trojan.Win32.Z.Peaceduke.3126830",
"Win32.Trojan.Peaceduke.Taow",
"BehavesLike.Win32.Worm.vc",
"TR/PeaceDuke.wuwtd",
"Backdoor:Win32/Cozer.A!dha",
"Trojan.Win32.PeaceDuke.gfb",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"opens",
"the",
"service",
"thread",
"of",
"the",
"service",
"process",
"and",
"uses",
"the",
"ZwQueueApcThread",
"native",
"API",
"to",
"inject",
"an",
"APC",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32/RiskWare.PEMalform.E",
"W32.W.Otwycal.l4av",
"Tool.YahooCrack",
"HackTool.YahoCrack.21",
"HackTool:Win32/Yacra.2_1",
"HackTool.Win32.Yacra"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Phishing",
"page",
"from",
"the",
"French",
"version",
"of",
"the",
"Trojan",
"Communication",
"with",
"C",
"&",
"C",
"Riltok",
"actively",
"communicates",
"with",
"its",
"C",
"&",
"C",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.