tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"The",
"Trojan",
"encrypts",
"files",
"on",
"the",
"compromised",
"computer",
"and",
"adds",
"the",
"following",
"prefix",
"before",
"file",
"names:",
"ISHTAR-"
] | [
16,
3,
1,
9,
16,
16,
5,
13,
16,
16,
16,
16,
1,
16,
1,
9,
9
] |
[
"APK",
"files",
"will",
"not",
"natively",
"open",
"in",
"an",
"environment",
"other",
"than",
"an",
"Android",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Nethief.XP",
"Backdoor/W32.Nethief.78611",
"Backdoor.Win32.Nethief!O",
"Backdoor/Nethief.XP.a",
"Win32.Trojan.WisdomEyes.16070401.9500.9612",
"W32/Nethief.K@bd",
"Backdoor.Trojan",
"Win32/Nethief.XP.A.Server",
"BKDR_NETHIEFXP.A",
"Backdoor.Nethief.XP",
"Backdoor.Win32.Nethief.ek",
"Backdoor.Nethief.XP",
"Trojan.Win32.Nethief.dknn",
"Backdoor.Win32.A.Nethief.78611[UPX]",
"Win32.Backdoor.Nethief.Aiim",
"Backdoor.Nethief.XP",
"Backdoor.Win32.Nethief.XP.Server",
"Backdoor.Nethief.XP",
"BackDoor.NethiefXP",
"Backdoor.Nethief.Win32.139",
"BKDR_NETHIEFXP.A",
"BehavesLike.Win32.Virut.lc",
"W32/Nethief.HBZO-6955",
"Backdoor/Nethief.XP",
"BDS/Nethief.XP.A",
"Trojan[Backdoor]/Win32.Nethief",
"Win32.Hack.Nethief.XP.kcloud",
"Backdoor.Nethief.XP",
"Backdoor.W32.Nethief!c",
"Backdoor.Win32.Nethief.ek",
"Backdoor:Win32/NetThief_XP.B",
"Trojan/Win32.HDC.C762",
"Backdoor.Nethief.XP",
"Backdoor.Nethief",
"Backdoor.Nethief!0mFzAwzISB0",
"Backdoor.Win32.Ceckno",
"W32/Nethief.EK!tr.bdr",
"Win32/Backdoor.048"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"FakeSpy",
"first",
"targeted",
"South",
"Korean",
"and",
"Japanese",
"speakers",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"distribution",
"of",
"rooting",
"malware",
"through",
"Google",
"Play",
"is",
"not",
"a",
"new",
"thing",
"."
] | [
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.MSIL",
"Dropper/Win32.Injector"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.ExpiroPC.PE",
"Trojan.MSIL",
"Win32.Trojan.WisdomEyes.16070401.9500.9593",
"Trojan.Evrial!G1",
"Trojan.Win32.Stealer.exjasr",
"Trojan.PWS.Stealer.21117",
"BehavesLike.Win32.Backdoor.ch",
"TR/PSW.CoinStealer.nvgeg",
"Trojan.Win32.Z.Razy.139264.GJ",
"Trojan:MSIL/Evrial.B",
"MSIL.Packed.Kryptik.JH",
"Trj/GdSda.A",
"Win32/Trojan.322"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Using",
"an",
"FTP",
"server",
"has",
"some",
"advantages."
] | [
16,
16,
1,
9,
16,
16,
16
] |
[
"Versions",
"5.X.X-8.X.X",
"were",
"active",
"in",
"2016",
",",
"and",
"versions",
"9.X.X-1.X.X",
"in",
"2017",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"threat",
"group",
"continually",
"updated",
"the",
"Nemesis",
"malware",
"during",
"their",
"ongoing",
"access",
"to",
"the",
"victim",
"environment,",
"deploying",
"several",
"different",
"variants",
"of",
"the",
"same",
"tools",
"and",
"adding",
"functionality",
"between",
"iterations."
] | [
16,
6,
14,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-PWS/W32.RedZone.406528",
"Trojan/PSW.RedZone.41",
"Win32/PSW.RedZone.41",
"TSPY_REDZONE.E",
"Win.Spyware.62275-2",
"Trojan-PSW.Win32.RedZone.41",
"Trojan.Win32.RedZone.fqhw",
"Trojan.Win32.A.PSW-RedZone.406528[h]",
"Troj.PSW32.W.RedZone.41!c",
"Win32.Trojan-qqpass.Qqrob.Dyzy",
"TrojWare.Win32.PSW.RedZone.41",
"Trojan.PWS.RedZone.41",
"Trojan.RedZone.Win32.21",
"W32/Risk.MXEM-1318",
"Trojan/PSW.RedZone.41",
"TR/PSW.RedZone.41",
"Malware_fam.gw",
"Trojan[PSW]/Win32.RedZone",
"PWS:Win32/Redzone.4_1",
"TrojanPSW.RedZone",
"Trojan.PWS.RedZone!tcLid0irw8w",
"Trojan.Win32.PSW",
"Win32/Trojan.PSW.087"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Sality.PE",
"Trojan.Dropper.UYL",
"Virus/W32.Sality.D",
"W32.Sality.U",
"Trojan.Dropper.UYL",
"Virus.Sality.Win32.25",
"Trojan.Dropper.UYL",
"W32.SillyFDC",
"Win32/Sality.AA",
"WORM_SILLY.SMRP",
"Trojan.Dropper.UYL",
"Trojan.Win32.Crypted.cqxgku",
"Trojan.Win32.Dropper.abl",
"Trojan.Dropper.UYL",
"Trojan.Dropper.UYL",
"Win32.Sector.30",
"WORM_SILLY.SMRP",
"BehavesLike.Win32.Sality.th",
"Win32/HLLP.Kuku.poly2",
"W32/Sality.AT",
"Worm:Win32/Enosch.A",
"Win32.Virus.Sality.A",
"HEUR/Fakon.mwf",
"Virus.Win32.Sality.bakc",
"Trojan.DataStealer.B",
"Win32/Sality.NBA",
"Win32.Sality.BL",
"Trojan.Win32.Enosch",
"W32/DataStealer.B!tr",
"W32/Sality.AA",
"Virus.Win32.Sality.I"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.BLA.FC.3019",
"Variant.Kazy.msZ5",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.MulDrop4.60646",
"Trojan-PWS.MSIL",
"PWS:MSIL/Mintluks.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"This",
"attack",
"is",
"particularly",
"effective",
"since",
"execution",
"of",
"WTP",
"is",
"not",
"accompanied",
"by",
"a",
"security",
"warning",
"and",
"users",
"have",
"been",
"conditioned",
"to",
"run",
"the",
"troubleshooter",
"when",
"it",
"appears",
"in",
"Windows."
] | [
16,
1,
16,
16,
16,
16,
16,
16,
7,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5
] |
[
"During",
"ISSP",
"Labs",
"daily",
"threat",
"activity",
"monitoring",
"a",
"new",
"virus",
"distribution",
"campaign",
"with",
"a",
"unique",
"malware",
"sample",
"was",
"discovered."
] | [
16,
4,
12,
16,
16,
16,
16,
16,
6,
14,
14,
14,
16,
16,
16,
3,
16,
16,
16
] |
[
"The",
"attacks",
"likely",
"were",
"initially",
"delivered",
"via",
"spear-phishing",
"e-mails,",
"or",
"as",
"demonstrated",
"by",
"C0d0so0",
"in",
"the",
"past,",
"legitimate",
"websites",
"that",
"had",
"been",
"previously",
"compromised",
"then",
"used",
"as",
"watering",
"holes",
"for",
"the",
"selected",
"victims."
] | [
16,
1,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
6,
16,
16,
0,
1,
9,
16,
16,
16,
1,
9,
16,
16,
16,
1,
9,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W97M.Bendis.AU",
"X97M.Dropper.ID",
"W97M.Bendis.AU",
"W97M.Downloader",
"X2KM_DROPPER.NEZ",
"W97M.Bendis.AU",
"Trojan.Ole2.Vbs-heuristic.druvzi",
"W97M.Bendis.AU",
"W97M.Bendis.AU",
"X2KM_DROPPER.NEZ",
"X97M/Dropper.c",
"HEUR.VBA.Trojan.d",
"TrojanDropper:O97M/Credoor.A",
"X97M/Dropper.d",
"W97M.Bendis",
"W97M.Bendis.AU"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Indicators",
"related",
"to",
"a",
"group",
"of",
"attackers",
"that",
"have",
"been",
"targeting",
"Japan",
"for",
"a",
"few",
"years",
"and",
"are",
"responsible",
"for",
"recent",
"breaches",
"against",
"Japanese",
"targets"
] | [
1,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
2,
16,
16,
0,
8,
16,
16,
16,
11,
16,
16,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Rovnix.Win64.17",
"Troj.Win64.Rovnix!c",
"Trojan.Win64.Rovnix.au",
"Trojan.Win64.Mayachok.dsethy",
"Trojan.Mayachok.19009",
"Trojan/Rovnix.f",
"W32.Rovnix",
"TR/Rovnix.I",
"Trojan/Win64.Rovnix",
"Trojan.Win64.Rovnix.au",
"Trojan/Win64.Rovnix.R175307",
"Trojan.Rovnix",
"Trj/Rovnix.B",
"Win64.Trojan.Rovnix.Pdmr",
"Trojan.Rovnix!6RUsEoDKtkI",
"Trojan.Win64.Rovnix",
"Win32/Trojan.52f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"These",
".jar",
"files",
"are",
"most",
"often",
"identified",
"as",
"Adwind."
] | [
16,
1,
9,
16,
16,
16,
16,
16,
3
] |
[
"A",
"new",
"Android",
"banking",
"trojan",
"called",
"Nexus",
"has",
"been",
"promoted",
"via",
"a",
"Malware-as-Service",
"subscription",
"service,",
"but",
"is",
"still",
"in",
"its",
"early",
"stages,",
"suggests",
"security",
"researcher",
"Cleafy's",
"analysis."
] | [
16,
16,
3,
11,
11,
16,
3,
16,
16,
16,
16,
3,
11,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12
] |
[
"Next",
",",
"if",
"they",
"indicate",
"that",
"they",
"use",
"an",
"Android-based",
"device",
",",
"the",
"Trojan",
",",
"impersonating",
"their",
"bank",
"with",
"web",
"injections",
",",
"fools",
"the",
"victim",
"into",
"installing",
"a",
"fake",
"security",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:"
] | [
16,
3,
16,
16,
16
] |
[
"The",
"following",
"code",
"shows",
"EventBot",
"parsing",
"instructions",
"sent",
"from",
"the",
"C2",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"used",
"a",
"sample",
"app",
"named",
"β",
"org.starsizew",
"β",
"with",
"an",
"MD5",
"of",
"d8caad151e07025fdbf5f3c26e3ceaff",
"to",
"analyze",
"RuMMS",
"β",
"s",
"code",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
1,
16,
16,
3,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Ransom.AIG",
"Trojan/W32.Xorist.13312.E",
"Trojan-Ransom.Win32.Xorist!O",
"Trojan.Ransom.FO4",
"Trojan.Ransom.AIG",
"Win32.Trojan.Filecoder.g",
"Ransom.CryptoTorLocker",
"Ransom_XORIST.SMA",
"Win.Trojan.CryptoTorLocker2015-1",
"Trojan.Ransom.AIG",
"Trojan-Ransom.Win32.Xorist.lk",
"Trojan.Ransom.AIG",
"Trojan.Win32.Xorist.dxuuhl",
"Trojan.Win32.A.Xorist.1268736",
"Trojan.Ransom.AIG",
"TrojWare.Win32.Kryptik.ER",
"Trojan.Encoder.94",
"Ransom_XORIST.SMA",
"Trojan/Xorist.at",
"TR/Ransom.Xorist.EJ",
"Trojan[Ransom]/Win32.Xorist",
"Trojan.Ransom.AIG",
"Troj.Ransom.W32.Xorist.tnPf",
"Trojan-Ransom.Win32.Xorist.lk",
"Ransom:Win32/Sorikrypt.A",
"Trojan/Win32.Xorist.R21676",
"Hoax.Xorist",
"Ransom.FileCryptor",
"Trj/RansomXor.A",
"Trojan.Win32.CryptoTorLocker2015.a",
"Trojan-Ransom.CryptoTorLocker215",
"Win32/Trojan.1ee"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"I",
"am",
"not",
"sure",
"what",
"these",
"are",
"but",
"am",
"guessing",
"at",
"possibly",
"Emotet",
"banking",
"Trojan"
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11
] |
[
"While",
"most",
"of",
"the",
"interest",
"still",
"lies",
"in",
"the",
"public",
"sector,",
"more",
"recent",
"attacks",
"were",
"found",
"targeting",
"the",
"following",
"industries:Aviation",
"Broadcasting",
"Energy",
"Financial",
"Non-governmental",
"organizations",
"NGO",
"Pharmaceutical",
"Public",
"sector",
"Publishing",
"Software"
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
1,
16,
16,
16,
16,
16,
4,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12
] |
[
"ESET",
"contacted",
"Eltima",
"as",
"soon",
"as",
"the",
"situation",
"was",
"confirmed."
] | [
4,
16,
4,
16,
16,
16,
16,
16,
16,
16
] |
[
"Connexxa",
"was",
"a",
"company",
"also",
"from",
"Catanzaro",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.MalPack",
"Trojan.Graftor.D69EE1",
"Win32.Trojan.Kryptik.pd",
"Ransom_LOCKY.SMXA",
"Trojan.Win32.Kryptik.evdsll",
"Ransom_LOCKY.SMXA",
"BehavesLike.Win32.Upatre.qh",
"TrojanDownloader:Win32/Brucryp.G",
"Trj/GdSda.A",
"W32/Kryptik.EXPV!tr",
"Win32/Trojan.160"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Script.473379",
"Trojan/W32.Clicker.349278",
"Trojan.Clicker.r5",
"Trojan.Script.473379",
"Trojan.Win32.MLW.lvntl",
"W32/MalwareF.CARP",
"Trojan.ADH",
"Trojan.Win32.Clicker.hd",
"Trojan.Win32.S.Clicker.349278[h]",
"Trojan.Script.473379",
"Trojan.Script.473379",
"Trojan.DownLoader6.110",
"BehavesLike.Win32.Dropper.fc",
"W32/Risk.VMFK-0127",
"Trojan/Clicker.je",
"Trojan.Script.D73923",
"Trojan:Win32/Gleishug.C",
"Trojan.Script.473379",
"Trj/CI.A",
"Win32.Trojan.Clicker.Hoye",
"AdWare.FTat",
"Trojan.Script.473379"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"late",
"2014,",
"ESET",
"presented",
"an",
"attack",
"campaign",
"that",
"had",
"been",
"observed",
"over",
"a",
"period",
"of",
"time",
"targeting",
"Russia",
"and",
"other",
"Russian",
"speaking",
"nations,",
"dubbed",
"Roaming",
"Tiger"
] | [
16,
16,
0,
4,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
0,
8,
8,
16,
2,
16,
16,
4,
12,
12,
16,
6,
14
] |
[
"Its",
"different",
"modifications",
"target",
"mobile",
"devices",
"of",
"Russian",
"users",
"from",
"February",
"2015."
] | [
16,
16,
16,
16,
5,
13,
16,
4,
12,
16,
0,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.MasendosA.Trojan",
"Worm.Win32.AutoRun!O",
"Trojan.Tofsee.1",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"Win.Worm.Autorun-6961",
"P2P-Worm.Win32.Palevo.idwe",
"Trojan.Win32.Graz.vhpfw",
"Worm.Win32.A.AutoRun.90112",
"TrojWare.Win32.Kryptik.JIU",
"Win32.HLLM.Graz",
"Worm.AutoRun.Win32.31130",
"BehavesLike.Win32.Downloader.kc",
"Worm.Win32.Wergimog",
"Worm/AutoRun.agqt",
"TR/Offend.5523698",
"Worm[P2P]/Win32.Palevo",
"Worm:Win32/Wergimog.A",
"P2P-Worm.Win32.Palevo.idwe",
"Worm/Win32.Cynic.R5955",
"Worm.AutoRun",
"Win32/AutoRun.IRCBot.HL",
"Win32.Worm-p2p.Palevo.Swub",
"Worm.AutoRun!FV4PXQUzhXU",
"Win32/Trojan.515"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Over",
"the",
"past",
"few",
"months",
"there",
"has",
"been",
"a",
"lot",
"of",
"research",
"and",
"press",
"coverage",
"on",
"the",
"Shamoon",
"campaigns."
] | [
16,
16,
0,
8,
8,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14
] |
[
"For",
"versions",
"11.0",
"and",
"11.4",
",",
"the",
"installation",
"is",
"straightforward",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Each",
"of",
"these",
"behaviors",
"is",
"under",
"the",
"control",
"of",
"the",
"remote",
"C2",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"sophisticated",
"hacking",
"group",
"with",
"suspected",
"ties",
"to",
"cybercrime",
"gangs",
"operating",
"in",
"Eastern",
"Europe",
"is",
"now",
"actively",
"targeting",
"and",
"breaching",
"prominent,",
"brand",
"name",
"restaurants",
"in",
"the",
"U.S."
] | [
16,
6,
14,
14,
16,
16,
16,
16,
6,
14,
14,
16,
2,
10,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
2,
10
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Exploit.Win64",
"Exploit.Win64.Apolmy.ewzxbo",
"Trojan.Win64.Dianti",
"TR/Apolmy.paocz",
"Trojan:Win64/Apolmy.A",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"This",
"EPS",
"exploit",
"was",
"assigned",
"CVE-2015-2545."
] | [
16,
3,
11,
16,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Sality.mBZF",
"Trojan.Win32.Clicker.bcgwsn",
"Trojan.Click2.33988",
"Trojan.Win32.Alyak",
"W32/Trojan.WWZX-6000",
"TR/Graftor.27537.200",
"Trojan/Win32.Unknown",
"Backdoor:Win32/Kanav.D",
"BScope.Trojan.Win32.Inject.2",
"Trj/CI.A",
"Trojan.Symmi.DB644",
"Win32/Trojan.070"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"official",
"β",
"Golden",
"Cup",
"β",
"Facebook",
"page",
"."
] | [
16,
16,
16,
3,
11,
16,
5,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Clicker.Delf.JK",
"Trojan-Clicker.Win32.Delf!O",
"Trojan.Clicker.Delf.JK",
"Win32.Trojan-Downloader.Delf.bq",
"Win32/Bancos.QQM",
"TROJ_CLICKER.ATG",
"Win.Trojan.Delf-2308",
"Trojan-Clicker.Win32.Delf.ih",
"Trojan.Clicker.Delf.JK",
"Trojan.Win32.Delf.dxqhln",
"Win32.Trojan.Delf.Eamx",
"Trojan.Clicker.Delf.JK",
"Trojan.Clicker.Delf.JK",
"Trojan.Badjoke",
"TROJ_CLICKER.ATG",
"TrojanClicker.Delf.fq",
"TR/Clicker.Delf.IH",
"Trojan[Clicker]/Win32.Delf",
"Trojan.Win32.Clicker.475648",
"Trojan-Clicker.Win32.Delf.ih",
"Trojan.Clicker.Delf.JK",
"Trojan/Win32.AdClicker.R5452",
"Trojan.Clicker.Delf.JK",
"TrojanClicker.Delf",
"Win32/TrojanDownloader.Delf.OVE",
"Trojan.CL.Delf.BJTO",
"Trojan-Dropper.Delf",
"W32/Delf.YS!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"steps",
"implemented",
"include",
":",
"Load",
"a",
"URL",
"in",
"a",
"WebView",
"Run",
"JavaScript",
"in",
"WebView",
"Toggle",
"WiFi",
"state",
"Toggle",
"mobile",
"data",
"state",
"Read/modify",
"SMS",
"inbox",
"Solve",
"captchas",
"Captchas",
"One",
"of",
"the",
"more",
"interesting",
"states",
"implements",
"the",
"ability",
"to",
"solve",
"basic",
"captchas",
"(",
"obscured",
"letters",
"and",
"numbers",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"value",
"used",
"to",
"replace",
"GET_IMG_OBJECT",
"comes",
"from",
"the",
"JSON",
"configuration",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.MultiJoiner!O",
"Troj.Dropper.W32.Pincher.lfij",
"Trojan.Heur.GM.11400100A0",
"Win32.Trojan.WisdomEyes.16070401.9500.9992",
"Win32/MicroJoiner.A",
"TROJ_MULTIJOIN.A",
"Trojan-Dropper.Win32.Microjoin.ap",
"TrojWare.Win32.Spy.Zbot.AAT",
"Trojan.MulDrop.613",
"BehavesLike.Win32.Trojan.vc",
"Trojan-PWS.Win32.LdPinch",
"TrojanDropper.MultiJoiner.13.b",
"Win32.Troj.GaoPSGet.49893",
"TrojanDropper:Win32/MultiJoiner.A",
"Trojan-Dropper.Win32.Microjoin.ap",
"Dropper/Win32.Microjoin.C70525",
"Trj/Multijoiner.A",
"Win32/TrojanDropper.MultiJoiner.13.B",
"Trojan.DR.MultiJoiner.D"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader.Win32.Small!O",
"Downloader.Small.16212",
"Win32.Trojan.WisdomEyes.16070401.9500.9891",
"Win32/Kotan.20.A",
"Trojan-Downloader.Win32.Small.fbn",
"Trojan.Win32.Kotan.hadu",
"Troj.Downloader.W32.Small.fbn!c",
"Win32.Trojan-Downloader.Small.cmak",
"TrojWare.Win32.TrojanDownloader.Kotan",
"Trojan.Kaotan",
"Downloader.Small.Win32.3682",
"TrojanDownloader.Kotan.b",
"W32.Malware.Downloader",
"Win32.Troj.Kotan.kcloud",
"TrojanDownloader:Win32/Kotan.A",
"Trojan-Downloader.Win32.Small.fbn",
"Trojan/Win32.HDC.C69071",
"TrojanDownloader.Small",
"Win32/TrojanDownloader.Kotan",
"Trojan.DL.Small!ILxLTxTzCnE",
"Trojan-Downloader.Win32.Kotan"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.OnGamesLT180912HKGHAAI.Trojan",
"Trojan-GameThief.Win32.OnLineGames!O",
"Trojan/Dropper.Killav.lt",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32.Fiala.A",
"Win.Trojan.Geral-941",
"Trojan-Dropper.Win32.Killav.lt",
"Trojan.Win32.Killav.dqiwur",
"Troj.Dropper.W32.Killav.lt!c",
"Win32.Trojan-dropper.Killav.Sunr",
"Backdoor.Win32.Popwin.~IT",
"Trojan.KillProc.13934",
"Dropper.Killav.Win32.187",
"BehavesLike.Win32.PWSOnlineGames.mc",
"Trojan-Downloader.Win32.Geral",
"Trojan/PSW.Magania.amzf",
"Trojan[Downloader]/Win32.Geral",
"TrojanDownloader:Win32/Dogkild.S",
"Trojan/Win32.OnlineGameHack.R38048",
"BScope.Trojan.SvcHorse.01643",
"Trj/Pupack.A",
"Win32/AutoRun.KillAV.I",
"Trojan.DR.Killav!1BWU2jDjRDE"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FakeW7Folder.Fam.Trojan",
"Trojan.Mauvaise.SL1",
"Trojan.Badur.Win32.8423",
"Trojan.Win32.Badur.dgkukl",
"Win32.Trojan.Fakedoc.Auto",
"TrojWare.Win32.Imwee.A",
"BackDoor.Bulknet.1486",
"TR/Dldr.Imwee",
"Trojan/Win32.Badur",
"Trojan.Zusy.D39D62",
"Backdoor/Win32.Trojan.C753557",
"Win32/Trojan.IM.66a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"JS/Iframe.DGS",
"Script.Trojan-Downloader.IFrame.AE",
"Trojan-Downloader.JS.Iframe.deg",
"Trojan.Script.Expack.bvtkmp",
"PDF.DownLoader.3",
"BehavesLike.PDF.BadFile.db",
"JS/BlacoleRef.CZ.29",
"Trojan[Downloader]/JS.Iframe.deg",
"Trojan-Downloader.JS.Iframe.deg",
"JS/Moat.241E54F!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Fileless",
"threats",
"and",
"ransomware",
"aren't",
"new,",
"but",
"a",
"malware",
"that",
"incorporates",
"a",
"combination",
"of",
"their",
"characteristics",
"can",
"be",
"dangerous."
] | [
3,
11,
16,
3,
16,
16,
16,
16,
3,
16,
16,
16,
1,
16,
16,
1,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.Skillis.a",
"W32/Trojan.PYDC-5827",
"W32.SillyFDC",
"Win32/Oflwr.A!crypt",
"Win32.Application.PUPStudio.A",
"Trojan.Win32.Skillis.cqimdi",
"Trojan.DownLoader21.39298",
"Trojan.Skillis.Win32.2785",
"TR/Drop.KillAV.A.69",
"Trojan/Win32.Unknown",
"TrojanDropper:Win32/Killav.A",
"Trojan/Win32.Backdoor.R142720",
"Trojan.Skillis",
"Trojan.Win32.Skillis.aaa",
"Trojan.PWS.Banbra!0kkWPO51+fM",
"Win32.Outbreak",
"W32/QQPass.ELG!tr.pws",
"Win32/Trojan.7d3"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Kazy.DAD1ED",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"W32/Trojan.ESEG-0989",
"Trojan.MSIL.Crypt.fpoa",
"Trojan.Win32.Crypt.evvrmx",
"BackDoor.Tordev.976",
"BehavesLike.Win32.Trojan.fc",
"TR/Dropper.MSIL.lfcge",
"Trojan:Win32/Rebhip.AA!bit",
"Trojan.MSIL.Crypt.fpoa",
"Trj/GdSda.A",
"Msil.Trojan.Crypt.Hfp",
"Trojan.MSIL.Injector",
"MSIL/Injector.LHM!tr",
"Win32/Trojan.658"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Infostealer.Jackpos",
"BKDR_JACKPOS.SM",
"BKDR_JACKPOS.SM",
"BehavesLike.Win32.Dropper.ch",
"Trojan.Win32.Jinupd",
"W32/Trojan.RTKE-0140",
"Trojan:Win32/Jinupd.B",
"Trojan/Win32.HDC.C743594",
"Trj/JackPos.A",
"Win32/Trojan.2d8"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"First",
"observed",
"in",
"July",
"2014,",
"Dridex,",
"a",
"financial",
"banking",
"Trojan,",
"is",
"considered",
"the",
"successor",
"to",
"the",
"GameOver",
"ZeuS",
"GoZ",
"malware."
] | [
16,
16,
16,
0,
8,
3,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
3,
11,
11,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Sdbot",
"Backdoor/SdBot.zj",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Sdbot.MAM",
"W32.Spybot.Worm",
"Win32/Dopbot.B",
"WORM_SDBOT.CGE",
"Win.Trojan.SdBot-3536",
"Backdoor.Win32.SdBot.zj",
"Trojan.Win32.SdBot.esce",
"Backdoor.Win32.SdBot.28160.B",
"Backdoor.W32.SdBot.zj!c",
"BackDoor.IRC.Veritas",
"Backdoor.SdBot.Win32.2281",
"WORM_SDBOT.CGE",
"BehavesLike.Win32.Backdoor.mc",
"Packed.Morphine.a",
"WORM/IrcBot.28160.1",
"Trojan[Backdoor]/Win32.SdBot",
"Backdoor.Win32.SdBot.zj",
"BScope.Trojan-PSW.Gomex.8",
"W32/Gaobot.FCZ.worm",
"IRC/SdBot.DWM",
"Win32.Backdoor.Sdbot.Pavs",
"Worm.SdBot!xpvJkAbKgi0"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HackTool.MultiUnwrapper",
"Win32.Trojan.WisdomEyes.16070401.9500.9852",
"Infostealer.Gampass",
"Win.Trojan.736804-1",
"HackTool.Win32.MultiUnwrapper",
"Trojan[Dropper]/Win32.Dapato",
"Trj/CI.A",
"Riskware.HackTool!LCoXxVEhnjI",
"Win32/Trojan.03f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"APT-C-36,",
"also",
"known",
"as",
"Blind",
"Eagle,",
"has",
"been",
"actively",
"targeting",
"organizations",
"in",
"Colombia",
"and",
"Ecuador",
"since",
"at",
"least",
"2019."
] | [
6,
16,
16,
16,
6,
14,
16,
16,
16,
16,
4,
16,
2,
16,
2,
16,
16,
0,
8
] |
[
"Unpacker",
"thread",
"decrypt",
"java",
"archive",
"from",
"assets",
"directory",
"β",
"start.ogg",
"β",
",",
"and",
"dynamically",
"loads",
"it",
"and",
"calls",
"the",
"method",
"β",
"a.a.a.b",
"β",
"from",
"this",
"archive",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Adware.Rugo",
"Trojan.Win32.BHO.fie",
"AdWare.Win32.BHO.cdg",
"Trojan.MulDrop.15726",
"TR/BHO.fie",
"TrojanDropper:Win32/Jhee.V",
"Trojan.Win32.BHO.fie",
"Adware.WSearch.O",
"Trojan.Win32.Jhee.V",
"Trojan.BHO.fie"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader.Cabby",
"Trojan/Filecoder.MaktubLocker.c",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"RANSOM_CRYPMAKTUBLOCKER_GC3101B5.UVPM",
"Trojan.Win32.Banpak.bbb",
"Trojan.Win32.Cabby.emrzuq",
"W32.Virut.lyDR",
"Trojan.DownLoader24.13143",
"Downloader.Cabby.Win32.1871",
"RANSOM_CRYPMAKTUBLOCKER_GC3101B5.UVPM",
"TrojanDownloader.Cabby.cpa",
"TR/Crypt.Xpack.wgudg",
"Trojan[Downloader]/Win32.Cabby",
"Trojan.Razy.D255EB",
"Trojan.Win32.Ransom.59904.R",
"Trojan.Win32.Banpak.bbb",
"Trojan/Win32.Locky.R197360",
"TrojanDownloader.Cabby",
"Win32/Filecoder.MaktubLocker.C",
"Trojan.Filecoder!sTyUXy4/Qig"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Delimiters",
"Another",
"technique",
"to",
"obfuscate",
"unencrypted",
"strings",
"uses",
"repeated",
"delimiters",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Such",
"app",
"stores",
"are",
"so-called",
"because",
"they",
"are",
"not",
"officially",
"supported",
"by",
"Android",
",",
"nor",
"are",
"they",
"provided",
"by",
"Google",
",",
"unlike",
"the",
"Play",
"Store",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
5,
13,
16
] |
[
"Attackers",
"create",
"this",
"scenario",
"to",
"persuade",
"users",
"to",
"pay",
"the",
"ransom",
"so",
"they",
"can",
"gain",
"back",
"access",
"to",
"the",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Sofacy",
"group,",
"also",
"known",
"as",
"APT28,",
"Pawn",
"Storm,",
"Fancy",
"Bear,",
"and",
"Sednit,",
"continues",
"to",
"add",
"to",
"the",
"variety",
"of",
"tools",
"they",
"use",
"in",
"attacks;",
"in",
"this",
"case,",
"targeting",
"individuals",
"in",
"the",
"aerospace",
"industry",
"running",
"the",
"OS",
"X",
"operating",
"system."
] | [
16,
6,
14,
16,
16,
16,
6,
14,
14,
14,
14,
16,
6,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
1,
16,
16,
16,
16,
4,
16,
16,
4,
12,
16,
16,
5,
13,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Androm.266082.B",
"Trojandownloader.Macdowpay",
"Trojan.Win32.Godzilla.ephbuw",
"Trojan.Encoder.11909",
"Backdoor.Androm.Win32.43313",
"BehavesLike.Win32.Backdoor.dc",
"Trojan.Yakes.vjn",
"Trojan.Backdoor.Quakbot",
"TR/Fuery.shpvm",
"TrojanDownloader:Win32/Macdowpay.A",
"Trojan.Razy.D2B7A8",
"Trojan/Win32.Locky.R201696",
"Backdoor.Androm",
"Backdoor.Andromeda",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Horst",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"W32/Downloader.OMUB-6519",
"Trojan-Proxy.Win32.Horst.av",
"Trojan.Win32.Horst.dqlqvp",
"Trojan.DownLoader.9121",
"W32/Downloader.YSQ",
"Trojan[Proxy]/Win32.Horst",
"Trojan-Proxy.Win32.Horst.av",
"TrojanProxy.Horst"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan-PSW.OLGames.bp",
"W32.Rontokbro@mm",
"Trojan.Win32.Krap.dazptt",
"Trojan.Win32.Z.Onlinegames.25088.A",
"Trojan.Click3.21708",
"BehavesLike.Win32.PWSOnlineGames.mc",
"W32/Trojan.UITW-4840",
"Trojan/PSW.OnLineGames2.dg",
"PWS:Win32/Zakahic.A",
"Win32.Trojan.Dropper.Heur",
"Trojan.Win32.OnlineGames.daq",
"Trojan-GameThief.Win32.OnLineGames",
"W32/Onlinegames.PYY!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"found",
"two",
"functions",
":",
"The",
"first",
"function",
"is",
"http",
":",
"//s.psserviceonline",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"First",
",",
"the",
"app",
"creates",
"a",
"JavaScript",
"function",
"to",
"call",
"a",
"Java",
"method",
",",
"getImageBase64",
",",
"exposed",
"to",
"WebView",
"using",
"addJavascriptInterface",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"new",
"threat",
"actor",
"we",
"are",
"naming",
"YoroTrooper",
"has",
"been",
"targeting",
"governments",
"across",
"Eastern",
"Europe",
"since",
"at",
"least",
"June",
"2022,",
"and",
"Cisco",
"Talos",
"has",
"found",
"three",
"different",
"activity",
"clusters",
"with",
"overlapping",
"infrastructure",
"that",
"are",
"all",
"linked",
"to",
"the",
"same",
"threat",
"actor."
] | [
16,
16,
6,
14,
16,
16,
16,
6,
16,
16,
16,
4,
16,
2,
10,
16,
3,
16,
0,
8,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
6,
14,
14,
14
] |
[
"The",
"code",
"contains",
"multiple",
"comments",
"in",
"Italian",
",",
"here",
"is",
"the",
"most",
"noteworthy",
"example",
":",
"β",
"Receive",
"commands",
"from",
"the",
"remote",
"server",
",",
"here",
"you",
"can",
"set",
"the",
"key",
"commands",
"to",
"command",
"the",
"virus",
"β",
"Here",
"are",
"the",
"available",
"commands",
":",
"Name",
"Description",
"cd",
"Change",
"current",
"directory",
"to",
"specified",
"quit",
"Close",
"the",
"socket",
"nggexe",
"Execute",
"received",
"command",
"via",
"Python",
"β",
"s",
"subprocess.Popen",
"(",
")",
"without",
"outputs",
"ngguploads",
"Upload",
"specified",
"file",
"to",
"the",
"specified",
"URL",
"nggdownloads",
"Download",
"content",
"from",
"the",
"specified",
"URLs",
"and",
"save",
"to",
"specified",
"file",
"nggfilesystem",
"Dump",
"file",
"structure",
"of",
"the",
"C",
":",
"path",
",",
"save",
"it",
"to",
"the",
"file",
"in",
"json",
"format",
"and",
"zip",
"it",
"nggstart_screen",
"nggstop_screen",
"Enable/disable",
"screenshot",
"module",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32/SillyPWS.CT",
"Trojan-Spy.MSIL!IK",
"Trojan.MulDrop1.16499",
"TrojanSpy.MSIL.acx",
"PWS:MSIL/VB.B",
"Trojan-Spy.MSIL"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9994",
"Trojan.Win32.Waldek.aqji",
"Trojan.Win32.Dwn.dzdxxu",
"BackDoor.PlugX.7",
"Dropper.Dapato.Win32.27346",
"BehavesLike.Win32.MultiPlug.fh",
"TrojanDropper.Dapato.snz",
"TR/AD.Plugx.M.6",
"Trojan[Dropper]/Win32.Dapato",
"Trojan.Win32.Waldek.aqji",
"Backdoor:Win32/Plugx.L!dha",
"Trj/GdSda.A",
"Win32.Trojan.Waldek.Wrgj",
"Trojan.Win32.Crypt",
"W32/Kryptik.DGGW!tr",
"TrojanDropper.Dapato",
"Win32/Trojan.bdb"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Unfortunately,",
"malware",
"authors",
"often",
"utilize",
"these",
"same",
"capabilities",
"to",
"compromise",
"systems."
] | [
16,
6,
14,
16,
16,
16,
16,
16,
16,
5,
13
] |
[
"Interestingly",
",",
"there",
"is",
"a",
"domain",
"which",
"used",
"to",
"point",
"there",
",",
"β",
"DlmDocumentsExchange.com",
"β",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16
] |
[
"This",
"notable",
"characteristic",
"made",
"this",
"attack",
"worthy",
"of",
"further",
"analysis."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Talos",
"found",
"189",
"logos",
"from",
"banks",
"to",
"cryptocurrency",
"exchanges",
"inside",
"the",
"archive",
",",
"all",
"of",
"which",
"could",
"be",
"targeted",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"it",
"Napoli",
"server1rc.exodus.connexxa",
"[",
"."
] | [
9,
9,
16,
1,
9,
9
] |
[
"]",
"biz",
"adminloader",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"First,",
"this",
"domain",
"pattern",
"looks",
"just",
"like",
"the",
"extremely",
"prevalent,",
"yet",
"benign",
"Akamai",
"CDN",
"domain."
] | [
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
4,
5,
1
] |
[
"With",
"the",
"increased",
"use",
"of",
"Android",
"phones",
"in",
"business",
"environments",
",",
"it",
"is",
"important",
"to",
"defend",
"against",
"these",
"threats",
"by",
"ensuring",
"devices",
"are",
"kept",
"current",
"with",
"the",
"latest",
"updates",
"."
] | [
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"WORM_DORKBOT.SMA",
"Win32.Trojan.WisdomEyes.16070401.9500.9989",
"Trojan.FakeAV",
"WORM_DORKBOT.SMA",
"Packed.Win32.Katusha.o",
"Trojan.Win32.Katusha.exnjhu",
"BehavesLike.Win32.PWSZbot.qc",
"Packed.Katusha.agmk",
"Trojan.Downloader.126",
"Packed.Win32.Katusha.o",
"Win32.Worm.Autorun.E",
"Trojan/Win32.Cosmu.C71744",
"W32/Crypt.AAAI!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Udsdangerousobject.Multi",
"Trojan.Waldek.Win32.5328",
"Uds.Dangerousobject.Multi!c",
"BKDR_REMCOS.DRQW",
"Trojan.Win32.Waldek.akql",
"Trojan.Win32.Waldek.etvwxi",
"Trojan.Win32.Z.Highconfidence.731416",
"BKDR_REMCOS.DRQW",
"Trojan.Win32.Waldek",
"W32/Trojan.CSQN-6734",
"W32.Waldek.Akql",
"TR/Waldek.rludr",
"Trojan/Win32.Waldek",
"Trojan:Win32/Vonocksu.A",
"Trojan.Win32.Waldek.akql",
"Trojan/Win32.Waldek.C2216962",
"Trj/GdSda.A",
"Win32.Trojan.Waldek.Htvv",
"W32/REMCOS.DRQW!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Unlike",
"other",
"ATM",
"malware",
"families,",
"Alice",
"cannot",
"be",
"controlled",
"via",
"the",
"numeric",
"pad",
"of",
"ATMs;",
"neither",
"does",
"it",
"have",
"information",
"stealing",
"features."
] | [
16,
16,
3,
11,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"behavior",
"negatively",
"impacts",
"advertisement",
"networks",
"and",
"their",
"clients",
"because",
"advertising",
"budget",
"is",
"spent",
"without",
"acquiring",
"real",
"customers",
",",
"and",
"impacts",
"user",
"experience",
"by",
"consuming",
"their",
"data",
"plan",
"resources",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Malware.1",
"W32.Mailbancos@mm",
"Win32.Mailbancos@mm",
"W32.Mailbancos@mm",
"SHeur2.XWF",
"Trj/Banbra.GGU"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.A13D",
"Backdoor.Sinowal.BC",
"Backdoor/W32.Sinowal.335872.B",
"Backdoor.Sinowal.Win32.471",
"Backdoor.Sinowal.BC",
"Win32.Trojan.WisdomEyes.16070401.9500.9996",
"Trojan.Mebroot",
"Win.Trojan.Sinowal-1209",
"Backdoor.Sinowal.BC",
"Backdoor.Win32.Sinowal.eee",
"Backdoor.Sinowal.BC",
"Trojan.Win32.Sinowal.bfkka",
"Backdoor.Win32.Sinowal.335872",
"Backdoor.W32.Sinowal!c",
"Backdoor.Sinowal.BC",
"Backdoor.Win32.Sinowal.~CRSB",
"Trojan.Packed.2355",
"BehavesLike.Win32.Sality.fc",
"Backdoor.Win32.Sinowal",
"W32/Backdoor2.EHUE",
"Backdoor/Sinowal.gje",
"RKIT/MBR.Sinowal.W",
"Trojan[Backdoor]/Win32.Sinowal",
"Win32.Hack.SinowalT.bg.339968",
"Backdoor.Win32.Sinowal.eee",
"Backdoor.Sinowal.BC",
"Backdoor.Sinowal",
"Win32.Backdoor.Sinowal.Liqd",
"W32/SINOWAL.A!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"However",
",",
"the",
"existence",
"of",
"threats",
"like",
"ViperRAT",
"and",
"Pegasus",
",",
"the",
"most",
"sophisticated",
"piece",
"of",
"mobile",
"surveillanceware",
"we",
"β",
"ve",
"seen",
"to",
"date",
",",
"are",
"evidence",
"that",
"attackers",
"are",
"targeting",
"mobile",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"What",
"makes",
"this",
"interesting",
"is",
"how",
"the",
"dated",
"botnet",
"and",
"macro",
"malware",
"trick",
"are",
"used",
"together."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
11,
16,
16,
16,
16
] |
[
"This",
"weekend",
"saw",
"multiple",
"reports",
"a",
"new",
"zero-day",
"vulnerability",
"that",
"affected",
"all",
"versions",
"of",
"Microsoft",
"Word."
] | [
16,
16,
16,
16,
16,
16,
16,
7,
15,
16,
16,
16,
16,
16,
5,
13
] |
[
"A",
"17-year-old",
"vulnerability",
"in",
"Microsoft",
"Office",
"Equation",
"Editor",
"is",
"now",
"confirmed",
"to",
"be",
"exploited",
"by",
"the",
"Cobalt",
"Group."
] | [
7,
15,
15,
16,
5,
13,
13,
13,
16,
16,
16,
16,
16,
7,
16,
6,
14,
14
] |
[
"In",
"recent",
"months,",
"Kaspersky",
"observed",
"an",
"increase",
"in",
"the",
"number",
"of",
"malicious",
"campaigns",
"that",
"use",
"Google",
"Advertising",
"as",
"a",
"means",
"of",
"distributing",
"and",
"delivering",
"malware."
] | [
16,
0,
8,
4,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TROJ_BHO.SMK",
"Win32.Trojan.WisdomEyes.16070401.9500.9922",
"W32/MalwareS.AXKH",
"TROJ_BHO.SMK",
"Trojan.DownLoader7.50629",
"BehavesLike.Win32.PWSZbot.dm",
"Backdoor.WinNT.PcClient",
"W32/Risk.AWDS-7973"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Initially,",
"only",
"the",
"Windows",
"version",
"of",
"ROKRAT",
"was",
"used,",
"but",
"the",
"Android",
"version",
"of",
"the",
"malware",
"was",
"later",
"identified."
] | [
16,
16,
5,
13,
13,
16,
3,
16,
16,
16,
16,
5,
13,
16,
16,
3,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.F73E",
"Backdoor/W32.Xhaker.593920",
"Backdoor.Xhaker.b.n7",
"Backdoor.Xhaker.Win32.49",
"Backdoor/Xhaker.b",
"Trojan.Win32.Xhaker.cbfde",
"W32/BackdoorX.BNHA",
"Backdoor.Trojan",
"Smalldoor.BKPC",
"Backdoor.Win32.Xhaker.b",
"Backdoor.Xhaker!qYrnZt9Kncc",
"PE:Backdoor.Win32.VB.bnx!1075029071",
"BackDoor.Caverns.79",
"BehavesLike.Win32.Ramnit.hc",
"W32/Backdoor.IYKC-7331",
"Backdoor/Xhaker.l",
"Win32.Hack.Xhaker.b.kcloud",
"Win32.Backdoor.Xhaker.doln",
"W32/Xhaker.B!tr.bdr",
"Backdoor.Win32.Xhaker.b",
"Win32/Backdoor.bee"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"recently",
"uncovered",
"a",
"coordinated",
"campaign",
"targeting",
"Internet",
"infrastructure",
"providers,",
"a",
"media",
"organization,",
"a",
"financial",
"services",
"company,",
"and",
"an",
"Asian",
"government",
"organization."
] | [
16,
16,
16,
16,
16,
6,
16,
5,
13,
4,
16,
4,
12,
12,
12,
12,
12,
16,
16,
4,
12,
12
] |
[
"XLoader",
"can",
"also",
"load",
"multiple",
"malicious",
"modules",
"to",
"receive",
"and",
"execute",
"commands",
"from",
"its",
"remote",
"command-and-control",
"(",
"C",
"&",
"C",
")",
"server",
",",
"as",
"shown",
"below",
":",
"Here",
"β",
"s",
"a",
"list",
"of",
"the",
"modules",
"and",
"their",
"functions",
":",
"sendSms",
"β",
"send",
"SMS/MMS",
"to",
"a",
"specified",
"address",
"setWifi",
"β",
"enable",
"or",
"disable",
"Wi-Fi",
"connection",
"gcont",
"β",
"collect",
"all",
"the",
"device",
"β",
"s",
"contacts",
"lock",
"β",
"currently",
"just",
"an",
"input",
"lock",
"status",
"in",
"the",
"settings",
"(",
"pref",
")",
"file",
",",
"but",
"may",
"be",
"used",
"as",
"a",
"screenlocking",
"ransomware",
"bc",
"β",
"collect",
"all",
"contacts",
"from",
"the",
"Android",
"device",
"and",
"SIM",
"card",
"setForward",
"β",
"currently",
"not",
"implemented",
",",
"but",
"can",
"be",
"used",
"to",
"hijack",
"the",
"infected",
"device",
"getForward",
"β",
"currently",
"not",
"implemented",
",",
"but",
"can",
"be",
"used",
"to",
"hijack",
"the",
"infected",
"device",
"hasPkg",
"β",
"check",
"the",
"device",
"whether",
"a",
"specified",
"app",
"is",
"installed",
"or",
"not",
"setRingerMode",
"β",
"set",
"the",
"device",
"β",
"s",
"ringer",
"mode",
"setRecEnable",
"β",
"set",
"the",
"device",
"β",
"s",
"ringer",
"mode",
"as",
"silent",
"reqState",
"β",
"get",
"a",
"detailed",
"phone",
"connection",
"status",
",",
"which",
"includes",
"activated",
"network",
"and",
"Wi-Fi",
"(",
"with",
"or",
"without",
"password",
")",
"showHome",
"β",
"force",
"the",
"device",
"β",
"s",
"back",
"to",
"the",
"home",
"screen",
"getnpki",
":",
"get",
"files/content",
"from",
"the",
"folder",
"named",
"NPKI",
"(",
"contains",
"certificates",
"related",
"to",
"financial",
"transactions",
")",
"http",
"β",
"access",
"a",
"specified",
"network",
"using",
"HttpURLConnection",
"onRecordAction",
"β",
"simulate",
"a",
"number-dialed",
"tone",
"call",
"β",
"call",
"a",
"specified",
"number",
"get_apps",
"β",
"get",
"all",
"the",
"apps",
"installed",
"on",
"the",
"device",
"show_fs_float_window",
"β",
"show",
"a",
"full-screen",
"window",
"for",
"phishing",
"Of",
"note",
"is",
"XLoader",
"β",
"s",
"abuse",
"of",
"the",
"WebSocket",
"protocol",
"(",
"supported",
"in",
"many",
"browsers",
"and",
"web",
"applications",
")",
"via",
"ws",
"(",
"WebSockets",
")",
"or",
"wss",
"(",
"WebSockets",
"over",
"SSL/TLS",
")",
"to",
"communicate",
"with",
"its",
"C",
"&",
"C",
"servers",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.AutorunMI.Worm",
"Trojan-Downloader.Win32.Flux!O",
"Worm.AutoRun",
"Trojan/Dropper.aiv",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Win.Trojan.Autorun-973",
"Worm.Win32.AutoRun.lt",
"Trojan.Win32.AutoRun.18461",
"Constructor.W32.VB.lgxd",
"Backdoor.Win32.Popwin.~IQ",
"Trojan.Popwin",
"Worm/Win32.AutoRun",
"Worm.AutoRunsT.ot.18432",
"Worm.Win32.AutoRun.lt",
"Worm.Winko"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.