tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.SmalBHQc.Trojan", "Trojan.Zenshirsh.SL7", "PUP.AdLoad/Variant", "not-a-virus:Downloader.Win32.AdLoad.syjh", "Trojan.Win32.Kazy.dydcdw", "Trojan.Vittalia.800", "BehavesLike.Win32.Downloader.lc", "Variant.Kazy.ds", "PUA/IStartSurf.chew", "GrayWare[Adware]/Win32.istartsurf.a", "Trojan.Application.Bundler.Outbrowse.16", "not-a-virus:Downloader.Win32.AdLoad.syjh", "TrojanDownloader:Win32/Subroate.A!bit", "Downloader.AdLoad", "PUA.Downloader!" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "this", "report,", "we'll", "review", "how", "the", "actors", "attempted", "to", "exploit", "CVE-2012-0158", "to", "install", "the", "NetTraveler", "Trojan." ]
[ 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 3, 1, 16, 16, 16, 3, 11 ]
[ "Interestingly,", "it", "utilizes", "a", "pseudorandom", "number", "generator", "PRNG", "used", "in", "Vawtrak", "s", "loader." ]
[ 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 3, 11, 11 ]
[ "It", "was", "also", "used", "in", "limited", "attacks", "in", "Korea", "and", "Japan", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "iframe", "leads", "to", "Angler", "EK", "which", "downloads", "Bedep", "ad-fraud", "which", "then", "downloads", "a", "Gootkit", "loader." ]
[ 1, 9, 16, 16, 3, 11, 16, 16, 3, 11, 16, 16, 16, 16, 3, 11 ]
[ "PHA", "authors", "usually", "try", "to", "hide", "their", "tracks", ",", "so", "attribution", "is", "difficult", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Razy.D3D173", "Win32.Trojan.WisdomEyes.16070401.9500.9961", "Ransom_Nymaim.R002C0DAT18", "Ransom_Nymaim.R002C0DAT18", "Ransom:Win32/Nymaim.F", "Win32/Trojan.160" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "]", "nampriknum", "[", "." ]
[ 9, 9, 9, 9 ]
[ "Based", "on", "our", "investigation,", "the", "actors", "behind", "Operation", "C-Major", "were", "able", "to", "keep", "their", "Android", "malware", "on", "Google", "Play", "for", "months", "and", "they", "advertised", "their", "apps", "on", "Facebook", "pages", "which", "have", "thousands", "of", "likes", "from", "high", "profile", "targets." ]
[ 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 3, 11, 16, 5, 13, 0, 8, 16, 16, 16, 16, 5, 16, 4, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12 ]
[ "It", "remains", "available", "within", "the", "source", "code", "but", "no", "method", "of", "use", "takes", "place", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.MMTask.59905", "Trojan/PSW.Mmtask.a", "Trojan.Heur.GM.040605A000", "Win32.Trojan.WisdomEyes.16070401.9500.9759", "W32/Trojan.ALHG-3475", "Win.Trojan.Mmtask-1", "Trojan-PSW.Win32.Mmtask.a", "Trojan.Win32.Mmtask.glty", "Trojan.Win32.MMTask.59905", "Troj.PSW32.W.Mmtask.a!c", "TrojWare.Win32.PSW.MMTask.A", "Trojan.MMTask.1", "BehavesLike.Win32.PWSZbot.qc", "Trojan/PSW.MMTask.a", "TR/PSW.MMTask.A1", "Trojan[PSW]/Win32.Mmtask", "PWS:Win32/MMTask.A", "Trojan-PSW.Win32.Mmtask.a", "TrojanPSW.Mmtask", "Win32/PSW.MMTask.A", "Win32.Trojan-qqpass.Qqrob.Wuhe", "Trojan.PWS.Mmtask!shxUVb0b7bE", "Trojan-PWS.Win32.Mmtask", "W32/Bdoor.BG!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Usually", ",", "when", "users", "are", "already", "infected", "with", "malware", "like", "TrickBot", "on", "their", "desktop", ",", "they", "will", "see", "a", "web", "injection", "asking", "for", "their", "mobile", "device", "operating", "system", "(", "OS", ")", "type", "and", "phone", "number", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "collection", "of", "basic", "device", "information", "." ]
[ 16, 16, 16, 16, 16, 16, 16 ]
[ "Check", "code", "for", "emulators", "As", "part", "of", "its", "defense", ",", "the", "malware", "payload", "first", "checks", "for", "emulators", "to", "prevent", "analysis", "on", "sandboxes", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Heur.Corrupt.PE", "W32.Backdoor.Rbot", "Trojan:Win32/Damingvat.A.dam#2", "Backdoor/Win32.Graybird.C918907" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "REQUEST_IGNORE_BATTERY_OPTIMIZATIONS", "-", "whitelist", "the", "app", "to", "allow", "it", "to", "ignore", "battery", "optimizations", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "As", "Riltok", "shows", ",", "cybercriminals", "can", "apply", "the", "same", "methods", "of", "infection", "to", "victims", "in", "different", "countries", "with", "more", "or", "less", "the", "same", "success", "." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Spy/W32.Banker.113430.B", "Heur.Win32.VBKrypt.3!O", "Trojan.Tinba.F3", "Trojan.Tinba.Win32.1756", "Trojan/Injector.bzpp", "Win32.Trojan.WisdomEyes.16070401.9500.9974", "W32.Cridex.B", "TROJ_TINBA.SMH", "Win32.Trojan.Emotet.U", "Trojan.Win32.VB.dmqp", "Trojan.Win32.Tinba.euqtlz", "Troj.W32.VBKrypt.tpek", "Trojan.PWS.Tinba.161", "TROJ_TINBA.SMH", "BehavesLike.Win32.Emotet.cm", "Trojan/Banker.Tinba.amp", "TR/Tinba.A.843", "Trojan[Banker]/Win32.Tinba", "Trojan.Win32.VB.dmqp", "Trojan/Win32.Cridex.R197444", "TrojanBanker.Tinba", "Trojan.PWS.Tinba!", "Trojan-Banker.Emotet", "W32/Injector.BZJE!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "comes", "as", "no", "surprise", "then", "that", "many", "SMS-Trojans", "include", "bot", "functionality", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.CD60", "Downloader.Bagle.Win32.491", "Trojan/Downloader.Bagle.atn", "Trojan.Win32.Bagle.dswqdy", "Troj.Downloader.W32.Bagle.atn!c", "Trojan.Packed.650", "Trojan-Downloader.Win32.Bagle", "TrojanDownloader.Bagle.bfu", "Worm/Win32.Bagle.R767", "Trojan.DL.Bagle!+mahMemQ9a4", "W32/Bagle.ATN!tr.dldr", "Trj/CI.A", "Win32/Trojan.2ff" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "XXXX", "[", "." ]
[ 9, 9, 9, 9 ]
[ "Although", "this", "injector", "is", "new,", "there", "are", "some", "connections", "to", "its", "older", "version", "sharing", "some", "similarities." ]
[ 16, 16, 3, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16 ]
[ "Proofpoint", "calls", "the", "two", "new", "variants", "recently", "identified", "Forked", "and", "Lite", "IcedID." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "Blackhole's", "author,", "Paunch,", "was", "arrested", "in", "October", "2013", "and", "while", "criminals", "kept", "using", "the", "kit", "for", "the", "next", "few", "months,", "the", "exploits", "slowly", "deprecated", "and", "lost", "value", "because", "of", "lack", "of", "development." ]
[ 6, 14, 14, 16, 16, 16, 0, 8, 16, 16, 6, 16, 16, 16, 3, 11, 16, 0, 8, 8, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "named", "this", "family", "Kemoge", "due", "to", "its", "command", "and", "control", "CnC", "domain" ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "According", "to", "its", "profile", "at", "Google", "Play", "(", "see", "Figure", "2", ")", "the", "app", "reached", "a", "mere", "10+", "downloads", "." ]
[ 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Rotexy", "may", "start", "requesting", "device", "administrator", "privileges", "again", "in", "an", "infinite", "loop", ";", "in", "that", "case", ",", "restart", "the", "device", "in", "safe", "mode", "and", "remove", "the", "malicious", "program", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "new", "campaign", "is", "up", "and", "running", "using", "newly", "improved", ",", "significantly", "more", "powerful", "malware", "as", "compared", "to", "previous", "versions", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "There", "has", "been", "significant", "media", "attention", "around", "a", "campaign", "likely", "by", "a", "nation-state", "actor", "targeting", "energy", "organizations", "in", "the", "U.S.", "including", "entities", "operating", "nuclear", "facilities." ]
[ 16, 16, 16, 16, 4, 16, 16, 16, 6, 16, 16, 16, 6, 14, 16, 4, 12, 16, 16, 2, 16, 4, 12, 12, 12 ]
[ "The", "strings", "of", "code", ",", "for", "one", ",", "are", "similarly", "structured", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W97M.Downloader.XL", "W97M/Downloader.buv", "W97M.Downloader", "W2KM_DLOADER.AUSUAY", "Trojan.Ole2.Vbs-heuristic.druvzi", "W97M.S.Downloader.217088", "W97M.MulDrop.158", "W2KM_DLOADER.AUSUAY", "W97M/Downloader.buv", "TrojanDropper:O97M/Turla.A!dha", "virus.office.qexvmc.1080" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Delfinject.18174", "Win32.Trojan.WisdomEyes.16070401.9500.9930", "Trojan.Win32.Banker.dnoogt", "Trojan.DownLoader12.55999", "BehavesLike.Win32.Dropper.dm", "W32/Trojan.XESH-6077", "TrojanDownloader.Banload.bimh", "TR/Dldr.Banload.ybjwz", "TrojanDownloader:Win32/BrobanKew.A", "TrojanBanker.Banker", "Trj/CI.A", "Win32/TrojanDownloader.Banload.VDB", "Trojan-Downloader.Win32.Banload", "W32/Banload.VGG!tr.dldr", "Win32/Trojan.994" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Check", "Point", "reached", "out", "to", "the", "Google", "Security", "team", "immediately", "with", "information", "on", "this", "campaign", "." ]
[ 4, 12, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9840", "Trojan:Win32/ShadowPad.E!dha" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "]", "64", "[", "." ]
[ 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.FakeAv.exgvmw", "Virus.W32.Virus!c", "TROJ_KRYPTIK_HA230029.UVPM", "Trojan.Win32.Crypt", "Trojan.Banker.GozNym.ey", "Trojan[Banker]/Win32.GozNym", "TrojanDownloader:Win32/Nymaim.K", "Trj/GdSda.A", "W32/Kryptik.GCCW!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Monitoring", "the", "command", "and", "control", "(", "C", "&", "C", ")", "servers", "used", "by", "Bouncing", "Golf", ",", "we", "’", "ve", "so", "far", "observed", "more", "than", "660", "Android", "devices", "infected", "with", "GolfSpy", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 3, 16 ]
[ "The", "current", "phase", "of", "the", "Pawn", "Storm", "attack", "campaign", "started", "a", "little", "over", "a", "month", "ago,", "and", "the", "overall", "campaign", "was", "first", "identified", "in", "an", "October", "2014", "report", "from", "Trend", "Micro", "PDF." ]
[ 16, 16, 16, 16, 16, 6, 14, 16, 6, 16, 16, 16, 0, 8, 8, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 0, 8, 16, 16, 4, 12, 16 ]
[ "We", "classify", "this", "40-month", "period", "into", "three", "main", "stages", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "Security", "Service", "of", "Ukraine", "SBU", "is", "continuously", "investigating", "this", "active", "threat,", "and", "has", "issued", "statements", "attributing", "the", "attacks", "to", "specific", "branches", "of", "the", "Russian", "Federal", "Security", "Service", "FSB." ]
[ 4, 12, 12, 12, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Adware.Msidebar", "TSPY_STARTPAGE_CD100271.RDXN", "Win32.Trojan.WisdomEyes.16070401.9500.9721", "Trojan.ADH.2", "TSPY_STARTPAGE_CD100271.RDXN", "not-a-virus:AdWare.Win32.Loadwar.wmx", "Riskware.Win32.Loadwar.epwdej", "Win32.Trojan.Multiple.drwj", "Trojan.DownLoader7.8701", "BehavesLike.Win32.Dropper.cc", "TR/Msidebar.C.39", "GrayWare[AdWare]/Win32.Loadwar", "not-a-virus:AdWare.Win32.Loadwar.wmx", "Trojan:Win32/Msidebar.C", "Trj/CI.A", "Trojan.Win32.Msidebar", "Win32/Trojan.1a4" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Ehdoor", "Trojan/Win32.Sharik.R208903", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Hoax.Win32.ArchSMS!O", "Tool.ArchSMS.Win32.7363", "Trojan/ArchSMS.otfk", "Trojan.Zusy.D4232C", "Win32.Trojan.SMSSend.a", "PUA.PremiumSMSScam!g14", "Hoax.Win32.ArchSMS.cpmhw", "Riskware.Win32.galh.eaqeda", "Hoax.W32.Archsms!c", "ApplicUnwnt.Win32.Hoax.ArchSMS.TP", "Trojan.SMSSend.7500", "BehavesLike.Win32.Dropper.vc", "Hoax.Win32.ArchSMS", "W32.Trojan.Archsms", "HackTool[Hoax]/Win32.ArchSMS", "Trojan:Win32/Tarifarch.AO", "Hoax.Win32.ArchSMS.cpmhw", "Unwanted/Win32.ArchSMS.R216870", "Win32.Trojan-psw.Archsms.Htcd", "Trojan.ArchSMS!vRB02EvsodQ", "Win32/Trojan.SMS.604" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "app", "loads", "a", "URL", "pointing", "to", "a", "Bread-controlled", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Aside", "from", "a", "change", "in", "its", "deployment", "techniques", ",", "a", "few", "changes", "in", "its", "code", "set", "it", "apart", "from", "its", "previous", "versions", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Once", "we", "reached", "the", "non-secured", "database", ",", "we", "were", "able", "to", "directly", "observe", "the", "app", "’", "s", "malicious", "behavior", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Threat", "actors", "used", "different", "websites", "to", "host", "different", "payloads", "at", "different", "times", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "From", "the", "beginning", "of", "2015,", "a", "malicious", "spear-phishing", "campaign", "dubbed", "Pony,", "has", "been", "actively", "luring", "victims." ]
[ 16, 16, 16, 16, 0, 16, 6, 14, 14, 16, 3, 16, 16, 16, 16, 16 ]
[ "Adups", "addressed", "the", "issue", "in", "a", "Nov.", "16", "news", "release", ",", "writing", "that", "some", "products", "made", "by", "BLU", "were", "updated", "in", "June", "with", "a", "version", "of", "its", "FOTA", "that", "had", "actually", "been", "intended", "for", "other", "clients", "who", "had", "requested", "an", "ability", "to", "stop", "text", "spam", "." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojandownloader.Script", "W32/Trojan.EMGI-1028", "Trojan.Win32.Banload.evocsm", "Troj.Downloader.Script!c", "TR/AD.Banload.jxcsg", "Trj/GdSda.A", "Win32/Trojan.Downloader.251" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "pw/6", "*", "*", "*", "*", "*", "5", "”", "(", "It", "." ]
[ 9, 9, 9, 9, 9, 9, 9, 9, 16, 16, 16, 16 ]
[ "When", "required", ",", "the", "Trojan", "sends", "an", "SMS", "to", "the", "specified", "phone", "number", "with", "the", "information", "it", "has", "received", "from", "the", "intercepted", "message", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9866", "Ransom.BTCware", "Win.Ransomware.BTCWare-6329927-0", "Win32.Trojan-Ransom.BTCWare.E", "Trojan.Win32.Filecoder.eplmfi", "Trojan.Encoder.11958", "BehavesLike.Win32.FDoSBEnergy.dh", "AdWare.ConvertAd.qjt", "Ransom.Filecoder/Variant", "Trojan/Win32.Ransom.R208332", "Ransom.BTCWare", "Trj/GdSda.A", "Trojan.Win32.BTCWare.a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "net", "app", "store", "henbox_3", "Figure", "2", "HenBox", "app", "installed", ",", "purporting", "to", "be", "DroidVPN", "Depending", "on", "the", "language", "setting", "on", "the", "device", ",", "and", "for", "this", "particular", "variant", "of", "HenBox", ",", "the", "installed", "HenBox", "app", "may", "have", "the", "name", "β€œ", "Backup", "”", "but", "uses", "the", "same", "DroidVPN", "logo", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16 ]
[ "It", "checks", "whether", "it", "is", "being", "run", "in", "an", "emulator", "before", "it", "starts", "its", "malicious", "activity", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "File", "encryption", "utilized", "asymmetric", "Elliptic", "Curve", "Cryptography", "ECC", "with", "Curve", "SECT233R1", "a.k.a.", "NIST", "B-233", "using", "the", "Tiny-ECDH", "open", "source", "library", "combined", "with", "a", "per", "file", "Salsa20", "symmetric", "key." ]
[ 3, 11, 16, 16, 5, 13, 13, 13, 16, 5, 13, 16, 5, 13, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Heur.kmGfrjraeapm2", "W32/Trojan-Gypikon-based.DM2!Ma", "BehavesLike.Win32.Downloader.cc", "W32/Trojan-Gypikon-based.DM2!Ma", "Trojan/Banker.Banker.zmm", "Worm:Win32/Xtrat.B!A", "BScope.Trojan-Spy.Zbot", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "malicious", "application", "da.hao.pao.bin", "(", "Chunghwa", "Post", ")", "loads", "a", "library", "file", "libmsy.so", "used", "to", "execute", "the", "packed", "mycode.jar", "file", "." ]
[ 16, 16, 16, 1, 16, 4, 12, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 1, 9, 16 ]
[ "An", "unknown", "threat", "actor", "is", "leveraging", "an", "evasive", "threat", "campaign", "distributed", "via", "Discord", "that", "features", "the", "PureCrypter", "downloader", "and", "targets", "government", "entities." ]
[ 6, 14, 14, 14, 16, 16, 16, 16, 6, 14, 14, 16, 5, 15, 16, 3, 11, 11, 16, 16, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DroxpesLTAN.Trojan", "Trojan.Qhost", "Trojan/Qhost.niv", "TROJ_SPNR.0BFE11", "Win32.Trojan.Qhost.d", "W32/Trojan2.LITU", "Win32/Tnega.ATUN", "TROJ_SPNR.0BFE11", "Win.Trojan.6761663-1", "Trojan.BAT.Qhost.abp", "Trojan.Win32.KKQP3298.dkyjvz", "Trojan.Win32.Z.Qhost.33750", "Troj.Bat.Qhost!c", "Trojan.Hosts.43761", "BehavesLike.Win32.BadFile.nh", "Trojan-Dropper.Win32.StartPage", "W32/Trojan.KKQP-3298", "TR/Qhost.mju.53", "Trojan.BAT.Qhost.abp", "Trojan/Win32.Qhost.R77387", "Trojan.BAT.Qhost", "Trj/CI.A", "BAT/Qhost.NTH", "Bat.Trojan.Qhost.Lnya", "Trojan.Comisproc!uAYBYZyFk6g", "Win32/Trojan.34d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "What", "Does", "SimBad", "Do", "?", "β€˜", "SimBad", "’", "has", "capabilities", "that", "can", "be", "divided", "into", "three", "groups", "–", "Show", "Ads", ",", "Phishing", ",", "and", "Exposure", "to", "other", "applications", "." ]
[ 16, 16, 3, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "some", "versions", "of", "Asacub", ",", "strings", "in", "the", "app", "are", "encrypted", "using", "the", "same", "algorithm", "as", "data", "sent", "to", "C", "&", "C", ",", "but", "with", "different", "keys", "." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "threat", "actor", "is", "remarkable", "for", "two", "reasons", ":", "Its", "access", "to", "sophisticated", "zero-day", "exploits", "for", "Microsoft", "and", "Adobe", "software", "Its", "use", "of", "an", "advanced", "piece", "of", "government-grade", "surveillance", "spyware", "FinFisher", ",", "also", "known", "as", "FinSpy", "and", "detected", "by", "Microsoft", "security", "products", "as", "Wingbird", "FinFisher", "is", "such", "a", "complex", "piece", "of", "malware", "that", ",", "like", "other", "researchers", ",", "we", "had", "to", "devise", "special", "methods", "to", "crack", "it", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 3, 16, 16, 16, 4, 16, 16, 16, 3, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.VidemoY.Trojan", "Win32.Trojan.WisdomEyes.16070401.9500.9988", "Backdoor.Trojan", "Win.Trojan.Bifrose-17928", "Trojan.Win32.Bifrost.csybxh", "Troj.W32.Jorik.Arcdoor.bjr!c", "BackDoor.Bifrost.15005", "Trojan.Inject.Win32.22484", "Worm.Win32.Msil", "Trojan:MSIL/Harvbot.B", "TrojanDropper.Injector", "Trj/CI.A", "W32/Jorik_Arcdoor.BJR!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom.FireCrypt.A3", "Ransom.BleedGreen", "Ransom_BleedGreen.A", "Win32.Trojan.WisdomEyes.16070401.9500.9560", "Ransom.FireCrypt", "Ransom_BleedGreen.A", "Trojan-Ransom.Win32.Crypmodadv.xee", "Trojan.Win32.Z.Ransom.18432.C[h]", "Trojan.Encoder.10088", "Trojan.Crypmodadv.Win32.90", "trojanspy.msil.neos.a", "W32/Trojan.RPJE-7166", "Trojan.Crypmodadv.en", "TR/Dropper.MSIL.owdes", "MSIL/Filecoder.DZ!tr", "Trojan.Ransom.HiddenTears.1", "Ransom:Win32/Firecrypt.A", "Trojan.Ransom.FireCrypt", "Win32.Trojan.Crypmodadv.Pbpb", "Trojan.Crypmodadv!", "Trojan.VB.Inject", "Atros4.BUNV", "Trj/GdSda.A", "Win32/Trojan.Ransom.786" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "SUSPECTED", "DETECTION", "TESTS", "BY", "THE", "THREAT", "ACTOR", "In", "searching", "for", "EventBot", ",", "we", "’", "ve", "identified", "multiple", "submissions", "from", "the", "same", "submitter", "hash", ",", "22b3c7b0", ":", "EventBot", "22b3c7b0", "submitter", "hash", "The", "22b3c7b0", "submitter", "hash", "that", "submitted", "most", "of", "the", "EventBot", "samples", "to", "VirusTotal", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 3, 1, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16 ]
[ "We", "dubbed", "this", "campaign", "Operation", "Electric", "Powder" ]
[ 16, 16, 16, 6, 14, 14, 14 ]
[ ")", "Following", "is", "the", "snippet", "of", "code", "in", "these", "older", "Exodus", "One", "samples", "showing", "the", "connection", "to", "the", "Command", "&", "Control", ":", "Below", "is", "the", "almost", "identical", "composition", "of", "the", "request", "to", "the", "Command", "&", "Control", "server", "in", "mike.jar", "(", "also", "containing", "the", "path", "7e661733-e332-429a-a7e2-23649f27690f", ")", ":", "To", "further", "corroborate", "the", "connection", "of", "the", "Exodus", "spyware", "with", "eSurv", ",", "the", "domain", "attiva.exodus.esurv.it", "resolves", "to", "the", "IP", "212.47.242.236", "which", ",", "according", "to", "public", "passive", "DNS", "data", ",", "in", "2017", "was", "used", "to", "host", "the", "domain", "server1cs.exodus.connexxa.it", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16 ]
[ "The", "original", "leak", "is", "no", "longer", "available", "on", "github.com", ",", "but", "a", "copy", "can", "be", "found", "here", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "At", "the", "time", "this", "malware", "was", "reported", "by", "several", "security", "vendors", ",", "and", "attributed", "to", "different", "malware", "families", "like", "Ghostpush", ",", "MonkeyTest", ",", "and", "Xinyinhe", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 3, 16, 16, 3, 16 ]
[ "The", "attack", "comes", "as", "an", "email", "containing", "a", "malicious", "Google", "Docs", "link." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9 ]
[ "Even", "when", "a", "false", "flag", "might", "also", "be", "a", "possibility", ",", "we", "consider", "this", "to", "be", "unlikely", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Beginning", "in", "early", "2008,", "Iranian", "security", "entities", "have", "engaged", "in", "operations", "to", "identify", "and", "arrest", "administrators", "of", "illicit", "websites", "and", "social", "media", "groups." ]
[ 16, 16, 0, 8, 4, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 6, 16, 1, 9, 16, 6, 14, 14 ]
[ "The", "spear", "phishing", "emails", "had", "Myanmar", "political-themed", "lures", "and", ",", "if", "the", "9002", "C2", "server", "responded", ",", "the", "Trojan", "sent", "system", "specific", "information", "along", "with", "the", "string", "β€œ", "jackhex", "”", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "Cybereason", "Nocturnus", "team", "has", "concluded", "that", "EventBot", "is", "designed", "to", "target", "over", "200", "different", "banking", "and", "finance", "applications", ",", "the", "majority", "of", "which", "are", "European", "bank", "and", "crypto-currency", "exchange", "applications", "." ]
[ 16, 4, 12, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "to", "eSurv", "S.R.L", "." ]
[ 16, 4, 12, 12 ]
[ "Musical", "Chairs", "is", "a", "multi-year", "campaign", "which", "recently", "deployed", "of", "new", "variant", "Gh0st", "we've", "named", "Piano", "Gh0st." ]
[ 6, 14, 16, 16, 0, 11, 16, 16, 16, 16, 16, 3, 11, 16, 16, 3, 11 ]
[ "Odinaff", "is", "typically", "deployed", "in", "the", "first", "stage", "of", "an", "attack,", "to", "gain", "a", "foothold", "onto", "the", "network,", "providing", "a", "persistent", "presence", "and", "the", "ability", "to", "install", "additional", "tools", "onto", "the", "target", "network." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 5 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9993", "W32/Trojan.VVLV-9156", "MSIL.Packed.Kryptik.JH", "Trojan.Win32.Razy.exgpmg", "BehavesLike.Win32.Trojan.gc", "Trojan.Razy.D2685F", "Trojan/Win32.Randrew.C2365157", "Trojan-Dropper.MSIL.Small", "Trj/CI.A", "Win32/Trojan.24d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Due", "to", "TrickMo", "’", "s", "persistence", "implementation", "mentioned", "earlier", ",", "this", "lockdown", "screen", "persists", "after", "a", "restart", "and", "is", "re-initiated", "every", "time", "the", "device", "becomes", "interactive", "." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "the", "case", "of", "this", "spyware", ",", "search", "for", "app", "named", "TikTok", "Pro", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "For", "the", "purpose", "of", "this", "report", "we", "analyze", "here", "the", "Exodus", "One", "sample", "with", "hash", "8453ce501fee1ca8a321f16b09969c517f92a24b058ac5b54549eabd58bf1884", "which", "communicated", "with", "the", "Command", "&", "Control", "server", "at", "54.71.249.137", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16 ]
[ "The", "payload", "will", "execute", "shell", "code", "to", "steal", "data", "from", "various", "applications", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "5", "–", "Keylogger", "component", "Figure", "6", "shows", "one", "of", "the", "most", "noteworthy", "functions", "of", "Anubis", ":", "its", "ransomware", "module", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W97M_DLOADR.XTRQ", "W97M_DLOADR.XTRQ" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Kazy.DC9EF", "Win32.Trojan.WisdomEyes.16070401.9500.9996", "W32/Trojan.QFDJ-7788", "Backdoor.Trojan", "Trojan.DownLoader5.32593", "Trojan.Small", "Win32.Troj.Disfa.cv.kcloud", "Backdoor:MSIL/Sootbot.B", "Trj/CI.A", "Win32.Trojan.Downloader.Dyzw", "BackDoor.WE!tr", "Win32/Trojan.018" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "will", "be", "the", "trigger", "for", "the", "service", "to", "start", "the", "beaconing", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Packer.FSG.A", "Packer.FSG.A", "Downloader.WebDown.Win32.23", "Troj.Downloader.W32.WebDown.10!c", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Downloader.BFIA", "TROJ_APHER.A", "Win.Trojan.Small-10534", "Trojan-Downloader.Win32.WebDown.10", "Packer.FSG.A", "Trojan.Win32.WebDown.buycqa", "Win32.Trojan-Downloader.Webdown.bfes", "Packer.FSG.A", "Trojan.DownLoader.2103", "TROJ_APHER.A", "W32/Downloader.MUZI-7025", "Trojan/Downloader.WebDown.10", "Trojan/Win32.Unknown", "TrojanDownloader:Win32/Aphex.2_4", "Packer.FSG.A", "Trojan-Downloader.Win32.WebDown.10", "Packer.FSG.A", "Win-Trojan/Apher.1312", "Win32/TrojanDownloader.Apher.070", "Trojan.DL.WebDown!Zgs3lnw1FbY", "Trojan-Downloader.Win32.WebDown", "Trj/Downloader.GE" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Multi", "Trojan.MalPack.VB", "Uds.Dangerousobject.Multi!c", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan-Spy.Win32.SpyEyes.bdxs", "Trojan.Win32.Z.Fareitvb.933888", "BehavesLike.Win32.BadFile.dh", "Trojan.VB.Crypt", "TR/Dropper.VB.dtffd", "Trojan[Spy]/Win32.SpyEyes", "Trojan-Spy.Win32.SpyEyes.bdxs", "Trojan/Win32.VBKrypt.R218990", "Trj/GdSda.A", "Win32.Trojan.Inject.Auto", "Win32/Trojan.Spy.8cb" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Below", "is", "the", "list", "of", "all", "the", "commands", "catered", "by", "the", "C", "&", "C", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.StrictorCS.S483160", "Trojan.Graftor.D21F45", "Win32.Application.PUPStudio.A", "HEUR:Trojan.Win32.KillFiles", "Trojan.Win32.Drop.eaoavd", "Trojan.Win32.Z.Graftor.614400.AJ", "Trojan.MulDrop5.12779", "Trojan.KillFiles.Win32.6511", "W32/Trojan.XBKC-8948", "TR/Graftor.905216.18", "TrojanDownloader:Win32/WebToos.A", "HEUR:Trojan.Win32.KillFiles", "Trojan/Win32.Krap.R106509", "TrojanDropper.Sysn", "Trj/CI.A", "Trojan.DownLoader!", "Win32/Trojan.0cb" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "BackDoor.Dande.52", "Trojan.Dande.Win32.1", "Trojan.Win32.Dande", "BDS/Dande.xihzl", "Trojan.Zusy.D3503B", "Win32/Dande.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojandropper.Scrop", "TROJ_DROPPR.YYYJ", "Trojan-Dropper.Win32.Scrop.cxq", "Trojan.Win32.Autoit.euuwjs", "Troj.Dropper.W32.Scrop!c", "Trojan.DownLoader25.53180", "TROJ_DROPPR.YYYJ", "Trojan.ECCW-6", "TR/Autoit.wkswc", "Trojan[Exploit]/OLE.CVE-2014-6532", "Trojan:O97M/Tanequalyn.A", "Trojan/Win32.AutoIt.C2019675", "Win32.Trojan-dropper.Scrop.Pavt", "W32/Scrop.CO!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Interestingly", "enough,", "Sourcefire", "was", "the", "only", "security", "vendor", "directly", "referenced", "in", "the", "Powershell", "script." ]
[ 16, 16, 4, 16, 16, 4, 12, 12, 16, 16, 16, 1, 9, 9 ]
[ "This", "malware", "attempts", "to", "collect", "a", "user's", "online", "banking", "data", "and", "sends", "out", "information", "to", "a", "control", "server." ]
[ 16, 3, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 5, 13 ]
[ "This", "is", "what", "the", "spear", "phishing", "e-mail", "looked", "like", ":", "In", "regards", "to", "the", "message", "text", "above", ",", "multiple", "activist", "groups", "have", "recently", "organized", "a", "human", "rights", "conference", "event", "in", "Geneva", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Since", "the", "beginning", "of", "2017,", "ESET", "researchers", "have", "been", "conducting", "an", "investigation", "into", "a", "complex", "threat", "mainly", "targeting", "Russia", "and", "Ukraine." ]
[ 16, 16, 16, 16, 0, 4, 12, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 2, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "AdClicker-O.dr", "Trojan.Win32.Revop.nbqd", "W32/TrojanX.HJO", "Adware.Winpup", "TROJ_REVOP.A", "Trojan-Downloader.Win32.VB.ca", "Trojan.Win32.A.Revop.251830[h]", "TROJ_REVOP.A", "AdClicker-O.dr", "W32/Trojan.MQHB-1521", "Win32/TrojanDownloader.VB.CA", "SPR/Commercials.1", "Trojan/Win32.Revop", "Win32.Troj.Undef.kcloud", "TrojanDownloader:Win32/VB.CA", "TrojanDownloader.VB", "Trj/Multidropper.BJ", "Win32.Trojan.Revop.cxum", "Trojan-Downloader.Win32.VB.CA", "W32/REVOP.A!tr", "Downloader.VB.EC", "Trojan.Win32.VB.AhnP" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Note", "that", "we", "later", "found", "versions", "that", "used", "the", "domain", "as", "a", "C2", "directly", "instead", "of", "the", "IP", "address", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "BackDoor-EDY.b", "Trojan.ExeDot.Win32.325", "Trojan/ExeDot.cra", "Win32.Trojan.WisdomEyes.16070401.9500.9965", "TROJ_EXEDOT.SMA", "Win.Trojan.Exedot-43", "Trojan.Win32.ExeDot.dsmyq", "TrojWare.Win32.ExeDot.L", "TROJ_EXEDOT.SMA", "BackDoor-EDY.b", "Trojan/ExeDot.bs", "Trojan:Win32/Evadiped.A", "Trojan/Win32.Unknown", "Win32.Troj.ExeDot.kcloud", "Trojan.Heur.E8C832", "Trojan:Win32/Evadiped.A", "Trojan/Win32.ExeDot.R4137", "Trojan.ExeDot", "Trojan.BHO!WIw+XSz27Q8", "Trojan.Win32.ExeDot" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]