tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.SmalBHQc.Trojan",
"Trojan.Zenshirsh.SL7",
"PUP.AdLoad/Variant",
"not-a-virus:Downloader.Win32.AdLoad.syjh",
"Trojan.Win32.Kazy.dydcdw",
"Trojan.Vittalia.800",
"BehavesLike.Win32.Downloader.lc",
"Variant.Kazy.ds",
"PUA/IStartSurf.chew",
"GrayWare[Adware]/Win32.istartsurf.a",
"Trojan.Application.Bundler.Outbrowse.16",
"not-a-virus:Downloader.Win32.AdLoad.syjh",
"TrojanDownloader:Win32/Subroate.A!bit",
"Downloader.AdLoad",
"PUA.Downloader!"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"this",
"report,",
"we'll",
"review",
"how",
"the",
"actors",
"attempted",
"to",
"exploit",
"CVE-2012-0158",
"to",
"install",
"the",
"NetTraveler",
"Trojan."
] | [
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
3,
1,
16,
16,
16,
3,
11
] |
[
"Interestingly,",
"it",
"utilizes",
"a",
"pseudorandom",
"number",
"generator",
"PRNG",
"used",
"in",
"Vawtrak",
"s",
"loader."
] | [
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
3,
11,
11
] |
[
"It",
"was",
"also",
"used",
"in",
"limited",
"attacks",
"in",
"Korea",
"and",
"Japan",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"iframe",
"leads",
"to",
"Angler",
"EK",
"which",
"downloads",
"Bedep",
"ad-fraud",
"which",
"then",
"downloads",
"a",
"Gootkit",
"loader."
] | [
1,
9,
16,
16,
3,
11,
16,
16,
3,
11,
16,
16,
16,
16,
3,
11
] |
[
"PHA",
"authors",
"usually",
"try",
"to",
"hide",
"their",
"tracks",
",",
"so",
"attribution",
"is",
"difficult",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Razy.D3D173",
"Win32.Trojan.WisdomEyes.16070401.9500.9961",
"Ransom_Nymaim.R002C0DAT18",
"Ransom_Nymaim.R002C0DAT18",
"Ransom:Win32/Nymaim.F",
"Win32/Trojan.160"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"]",
"nampriknum",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"Based",
"on",
"our",
"investigation,",
"the",
"actors",
"behind",
"Operation",
"C-Major",
"were",
"able",
"to",
"keep",
"their",
"Android",
"malware",
"on",
"Google",
"Play",
"for",
"months",
"and",
"they",
"advertised",
"their",
"apps",
"on",
"Facebook",
"pages",
"which",
"have",
"thousands",
"of",
"likes",
"from",
"high",
"profile",
"targets."
] | [
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
3,
11,
16,
5,
13,
0,
8,
16,
16,
16,
16,
5,
16,
4,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12
] |
[
"It",
"remains",
"available",
"within",
"the",
"source",
"code",
"but",
"no",
"method",
"of",
"use",
"takes",
"place",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.MMTask.59905",
"Trojan/PSW.Mmtask.a",
"Trojan.Heur.GM.040605A000",
"Win32.Trojan.WisdomEyes.16070401.9500.9759",
"W32/Trojan.ALHG-3475",
"Win.Trojan.Mmtask-1",
"Trojan-PSW.Win32.Mmtask.a",
"Trojan.Win32.Mmtask.glty",
"Trojan.Win32.MMTask.59905",
"Troj.PSW32.W.Mmtask.a!c",
"TrojWare.Win32.PSW.MMTask.A",
"Trojan.MMTask.1",
"BehavesLike.Win32.PWSZbot.qc",
"Trojan/PSW.MMTask.a",
"TR/PSW.MMTask.A1",
"Trojan[PSW]/Win32.Mmtask",
"PWS:Win32/MMTask.A",
"Trojan-PSW.Win32.Mmtask.a",
"TrojanPSW.Mmtask",
"Win32/PSW.MMTask.A",
"Win32.Trojan-qqpass.Qqrob.Wuhe",
"Trojan.PWS.Mmtask!shxUVb0b7bE",
"Trojan-PWS.Win32.Mmtask",
"W32/Bdoor.BG!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Usually",
",",
"when",
"users",
"are",
"already",
"infected",
"with",
"malware",
"like",
"TrickBot",
"on",
"their",
"desktop",
",",
"they",
"will",
"see",
"a",
"web",
"injection",
"asking",
"for",
"their",
"mobile",
"device",
"operating",
"system",
"(",
"OS",
")",
"type",
"and",
"phone",
"number",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"collection",
"of",
"basic",
"device",
"information",
"."
] | [
16,
16,
16,
16,
16,
16,
16
] |
[
"Check",
"code",
"for",
"emulators",
"As",
"part",
"of",
"its",
"defense",
",",
"the",
"malware",
"payload",
"first",
"checks",
"for",
"emulators",
"to",
"prevent",
"analysis",
"on",
"sandboxes",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Heur.Corrupt.PE",
"W32.Backdoor.Rbot",
"Trojan:Win32/Damingvat.A.dam#2",
"Backdoor/Win32.Graybird.C918907"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"REQUEST_IGNORE_BATTERY_OPTIMIZATIONS",
"-",
"whitelist",
"the",
"app",
"to",
"allow",
"it",
"to",
"ignore",
"battery",
"optimizations",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"As",
"Riltok",
"shows",
",",
"cybercriminals",
"can",
"apply",
"the",
"same",
"methods",
"of",
"infection",
"to",
"victims",
"in",
"different",
"countries",
"with",
"more",
"or",
"less",
"the",
"same",
"success",
"."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Spy/W32.Banker.113430.B",
"Heur.Win32.VBKrypt.3!O",
"Trojan.Tinba.F3",
"Trojan.Tinba.Win32.1756",
"Trojan/Injector.bzpp",
"Win32.Trojan.WisdomEyes.16070401.9500.9974",
"W32.Cridex.B",
"TROJ_TINBA.SMH",
"Win32.Trojan.Emotet.U",
"Trojan.Win32.VB.dmqp",
"Trojan.Win32.Tinba.euqtlz",
"Troj.W32.VBKrypt.tpek",
"Trojan.PWS.Tinba.161",
"TROJ_TINBA.SMH",
"BehavesLike.Win32.Emotet.cm",
"Trojan/Banker.Tinba.amp",
"TR/Tinba.A.843",
"Trojan[Banker]/Win32.Tinba",
"Trojan.Win32.VB.dmqp",
"Trojan/Win32.Cridex.R197444",
"TrojanBanker.Tinba",
"Trojan.PWS.Tinba!",
"Trojan-Banker.Emotet",
"W32/Injector.BZJE!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"comes",
"as",
"no",
"surprise",
"then",
"that",
"many",
"SMS-Trojans",
"include",
"bot",
"functionality",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.CD60",
"Downloader.Bagle.Win32.491",
"Trojan/Downloader.Bagle.atn",
"Trojan.Win32.Bagle.dswqdy",
"Troj.Downloader.W32.Bagle.atn!c",
"Trojan.Packed.650",
"Trojan-Downloader.Win32.Bagle",
"TrojanDownloader.Bagle.bfu",
"Worm/Win32.Bagle.R767",
"Trojan.DL.Bagle!+mahMemQ9a4",
"W32/Bagle.ATN!tr.dldr",
"Trj/CI.A",
"Win32/Trojan.2ff"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"XXXX",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"Although",
"this",
"injector",
"is",
"new,",
"there",
"are",
"some",
"connections",
"to",
"its",
"older",
"version",
"sharing",
"some",
"similarities."
] | [
16,
16,
3,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16
] |
[
"Proofpoint",
"calls",
"the",
"two",
"new",
"variants",
"recently",
"identified",
"Forked",
"and",
"Lite",
"IcedID."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"Blackhole's",
"author,",
"Paunch,",
"was",
"arrested",
"in",
"October",
"2013",
"and",
"while",
"criminals",
"kept",
"using",
"the",
"kit",
"for",
"the",
"next",
"few",
"months,",
"the",
"exploits",
"slowly",
"deprecated",
"and",
"lost",
"value",
"because",
"of",
"lack",
"of",
"development."
] | [
6,
14,
14,
16,
16,
16,
0,
8,
16,
16,
6,
16,
16,
16,
3,
11,
16,
0,
8,
8,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"named",
"this",
"family",
"Kemoge",
"due",
"to",
"its",
"command",
"and",
"control",
"CnC",
"domain"
] | [
16,
16,
16,
16,
3,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"According",
"to",
"its",
"profile",
"at",
"Google",
"Play",
"(",
"see",
"Figure",
"2",
")",
"the",
"app",
"reached",
"a",
"mere",
"10+",
"downloads",
"."
] | [
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Rotexy",
"may",
"start",
"requesting",
"device",
"administrator",
"privileges",
"again",
"in",
"an",
"infinite",
"loop",
";",
"in",
"that",
"case",
",",
"restart",
"the",
"device",
"in",
"safe",
"mode",
"and",
"remove",
"the",
"malicious",
"program",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"new",
"campaign",
"is",
"up",
"and",
"running",
"using",
"newly",
"improved",
",",
"significantly",
"more",
"powerful",
"malware",
"as",
"compared",
"to",
"previous",
"versions",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"There",
"has",
"been",
"significant",
"media",
"attention",
"around",
"a",
"campaign",
"likely",
"by",
"a",
"nation-state",
"actor",
"targeting",
"energy",
"organizations",
"in",
"the",
"U.S.",
"including",
"entities",
"operating",
"nuclear",
"facilities."
] | [
16,
16,
16,
16,
4,
16,
16,
16,
6,
16,
16,
16,
6,
14,
16,
4,
12,
16,
16,
2,
16,
4,
12,
12,
12
] |
[
"The",
"strings",
"of",
"code",
",",
"for",
"one",
",",
"are",
"similarly",
"structured",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W97M.Downloader.XL",
"W97M/Downloader.buv",
"W97M.Downloader",
"W2KM_DLOADER.AUSUAY",
"Trojan.Ole2.Vbs-heuristic.druvzi",
"W97M.S.Downloader.217088",
"W97M.MulDrop.158",
"W2KM_DLOADER.AUSUAY",
"W97M/Downloader.buv",
"TrojanDropper:O97M/Turla.A!dha",
"virus.office.qexvmc.1080"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Delfinject.18174",
"Win32.Trojan.WisdomEyes.16070401.9500.9930",
"Trojan.Win32.Banker.dnoogt",
"Trojan.DownLoader12.55999",
"BehavesLike.Win32.Dropper.dm",
"W32/Trojan.XESH-6077",
"TrojanDownloader.Banload.bimh",
"TR/Dldr.Banload.ybjwz",
"TrojanDownloader:Win32/BrobanKew.A",
"TrojanBanker.Banker",
"Trj/CI.A",
"Win32/TrojanDownloader.Banload.VDB",
"Trojan-Downloader.Win32.Banload",
"W32/Banload.VGG!tr.dldr",
"Win32/Trojan.994"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Check",
"Point",
"reached",
"out",
"to",
"the",
"Google",
"Security",
"team",
"immediately",
"with",
"information",
"on",
"this",
"campaign",
"."
] | [
4,
12,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9840",
"Trojan:Win32/ShadowPad.E!dha"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"]",
"64",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.FakeAv.exgvmw",
"Virus.W32.Virus!c",
"TROJ_KRYPTIK_HA230029.UVPM",
"Trojan.Win32.Crypt",
"Trojan.Banker.GozNym.ey",
"Trojan[Banker]/Win32.GozNym",
"TrojanDownloader:Win32/Nymaim.K",
"Trj/GdSda.A",
"W32/Kryptik.GCCW!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Monitoring",
"the",
"command",
"and",
"control",
"(",
"C",
"&",
"C",
")",
"servers",
"used",
"by",
"Bouncing",
"Golf",
",",
"we",
"β",
"ve",
"so",
"far",
"observed",
"more",
"than",
"660",
"Android",
"devices",
"infected",
"with",
"GolfSpy",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
3,
16
] |
[
"The",
"current",
"phase",
"of",
"the",
"Pawn",
"Storm",
"attack",
"campaign",
"started",
"a",
"little",
"over",
"a",
"month",
"ago,",
"and",
"the",
"overall",
"campaign",
"was",
"first",
"identified",
"in",
"an",
"October",
"2014",
"report",
"from",
"Trend",
"Micro",
"PDF."
] | [
16,
16,
16,
16,
16,
6,
14,
16,
6,
16,
16,
16,
0,
8,
8,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
0,
8,
16,
16,
4,
12,
16
] |
[
"We",
"classify",
"this",
"40-month",
"period",
"into",
"three",
"main",
"stages",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Security",
"Service",
"of",
"Ukraine",
"SBU",
"is",
"continuously",
"investigating",
"this",
"active",
"threat,",
"and",
"has",
"issued",
"statements",
"attributing",
"the",
"attacks",
"to",
"specific",
"branches",
"of",
"the",
"Russian",
"Federal",
"Security",
"Service",
"FSB."
] | [
4,
12,
12,
12,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Adware.Msidebar",
"TSPY_STARTPAGE_CD100271.RDXN",
"Win32.Trojan.WisdomEyes.16070401.9500.9721",
"Trojan.ADH.2",
"TSPY_STARTPAGE_CD100271.RDXN",
"not-a-virus:AdWare.Win32.Loadwar.wmx",
"Riskware.Win32.Loadwar.epwdej",
"Win32.Trojan.Multiple.drwj",
"Trojan.DownLoader7.8701",
"BehavesLike.Win32.Dropper.cc",
"TR/Msidebar.C.39",
"GrayWare[AdWare]/Win32.Loadwar",
"not-a-virus:AdWare.Win32.Loadwar.wmx",
"Trojan:Win32/Msidebar.C",
"Trj/CI.A",
"Trojan.Win32.Msidebar",
"Win32/Trojan.1a4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Ehdoor",
"Trojan/Win32.Sharik.R208903",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Hoax.Win32.ArchSMS!O",
"Tool.ArchSMS.Win32.7363",
"Trojan/ArchSMS.otfk",
"Trojan.Zusy.D4232C",
"Win32.Trojan.SMSSend.a",
"PUA.PremiumSMSScam!g14",
"Hoax.Win32.ArchSMS.cpmhw",
"Riskware.Win32.galh.eaqeda",
"Hoax.W32.Archsms!c",
"ApplicUnwnt.Win32.Hoax.ArchSMS.TP",
"Trojan.SMSSend.7500",
"BehavesLike.Win32.Dropper.vc",
"Hoax.Win32.ArchSMS",
"W32.Trojan.Archsms",
"HackTool[Hoax]/Win32.ArchSMS",
"Trojan:Win32/Tarifarch.AO",
"Hoax.Win32.ArchSMS.cpmhw",
"Unwanted/Win32.ArchSMS.R216870",
"Win32.Trojan-psw.Archsms.Htcd",
"Trojan.ArchSMS!vRB02EvsodQ",
"Win32/Trojan.SMS.604"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"app",
"loads",
"a",
"URL",
"pointing",
"to",
"a",
"Bread-controlled",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Aside",
"from",
"a",
"change",
"in",
"its",
"deployment",
"techniques",
",",
"a",
"few",
"changes",
"in",
"its",
"code",
"set",
"it",
"apart",
"from",
"its",
"previous",
"versions",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Once",
"we",
"reached",
"the",
"non-secured",
"database",
",",
"we",
"were",
"able",
"to",
"directly",
"observe",
"the",
"app",
"β",
"s",
"malicious",
"behavior",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Threat",
"actors",
"used",
"different",
"websites",
"to",
"host",
"different",
"payloads",
"at",
"different",
"times",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"From",
"the",
"beginning",
"of",
"2015,",
"a",
"malicious",
"spear-phishing",
"campaign",
"dubbed",
"Pony,",
"has",
"been",
"actively",
"luring",
"victims."
] | [
16,
16,
16,
16,
0,
16,
6,
14,
14,
16,
3,
16,
16,
16,
16,
16
] |
[
"Adups",
"addressed",
"the",
"issue",
"in",
"a",
"Nov.",
"16",
"news",
"release",
",",
"writing",
"that",
"some",
"products",
"made",
"by",
"BLU",
"were",
"updated",
"in",
"June",
"with",
"a",
"version",
"of",
"its",
"FOTA",
"that",
"had",
"actually",
"been",
"intended",
"for",
"other",
"clients",
"who",
"had",
"requested",
"an",
"ability",
"to",
"stop",
"text",
"spam",
"."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojandownloader.Script",
"W32/Trojan.EMGI-1028",
"Trojan.Win32.Banload.evocsm",
"Troj.Downloader.Script!c",
"TR/AD.Banload.jxcsg",
"Trj/GdSda.A",
"Win32/Trojan.Downloader.251"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"pw/6",
"*",
"*",
"*",
"*",
"*",
"5",
"β",
"(",
"It",
"."
] | [
9,
9,
9,
9,
9,
9,
9,
9,
16,
16,
16,
16
] |
[
"When",
"required",
",",
"the",
"Trojan",
"sends",
"an",
"SMS",
"to",
"the",
"specified",
"phone",
"number",
"with",
"the",
"information",
"it",
"has",
"received",
"from",
"the",
"intercepted",
"message",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9866",
"Ransom.BTCware",
"Win.Ransomware.BTCWare-6329927-0",
"Win32.Trojan-Ransom.BTCWare.E",
"Trojan.Win32.Filecoder.eplmfi",
"Trojan.Encoder.11958",
"BehavesLike.Win32.FDoSBEnergy.dh",
"AdWare.ConvertAd.qjt",
"Ransom.Filecoder/Variant",
"Trojan/Win32.Ransom.R208332",
"Ransom.BTCWare",
"Trj/GdSda.A",
"Trojan.Win32.BTCWare.a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"net",
"app",
"store",
"henbox_3",
"Figure",
"2",
"HenBox",
"app",
"installed",
",",
"purporting",
"to",
"be",
"DroidVPN",
"Depending",
"on",
"the",
"language",
"setting",
"on",
"the",
"device",
",",
"and",
"for",
"this",
"particular",
"variant",
"of",
"HenBox",
",",
"the",
"installed",
"HenBox",
"app",
"may",
"have",
"the",
"name",
"β",
"Backup",
"β",
"but",
"uses",
"the",
"same",
"DroidVPN",
"logo",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16
] |
[
"It",
"checks",
"whether",
"it",
"is",
"being",
"run",
"in",
"an",
"emulator",
"before",
"it",
"starts",
"its",
"malicious",
"activity",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"File",
"encryption",
"utilized",
"asymmetric",
"Elliptic",
"Curve",
"Cryptography",
"ECC",
"with",
"Curve",
"SECT233R1",
"a.k.a.",
"NIST",
"B-233",
"using",
"the",
"Tiny-ECDH",
"open",
"source",
"library",
"combined",
"with",
"a",
"per",
"file",
"Salsa20",
"symmetric",
"key."
] | [
3,
11,
16,
16,
5,
13,
13,
13,
16,
5,
13,
16,
5,
13,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Heur.kmGfrjraeapm2",
"W32/Trojan-Gypikon-based.DM2!Ma",
"BehavesLike.Win32.Downloader.cc",
"W32/Trojan-Gypikon-based.DM2!Ma",
"Trojan/Banker.Banker.zmm",
"Worm:Win32/Xtrat.B!A",
"BScope.Trojan-Spy.Zbot",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"malicious",
"application",
"da.hao.pao.bin",
"(",
"Chunghwa",
"Post",
")",
"loads",
"a",
"library",
"file",
"libmsy.so",
"used",
"to",
"execute",
"the",
"packed",
"mycode.jar",
"file",
"."
] | [
16,
16,
16,
1,
16,
4,
12,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
1,
9,
16
] |
[
"An",
"unknown",
"threat",
"actor",
"is",
"leveraging",
"an",
"evasive",
"threat",
"campaign",
"distributed",
"via",
"Discord",
"that",
"features",
"the",
"PureCrypter",
"downloader",
"and",
"targets",
"government",
"entities."
] | [
6,
14,
14,
14,
16,
16,
16,
16,
6,
14,
14,
16,
5,
15,
16,
3,
11,
11,
16,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DroxpesLTAN.Trojan",
"Trojan.Qhost",
"Trojan/Qhost.niv",
"TROJ_SPNR.0BFE11",
"Win32.Trojan.Qhost.d",
"W32/Trojan2.LITU",
"Win32/Tnega.ATUN",
"TROJ_SPNR.0BFE11",
"Win.Trojan.6761663-1",
"Trojan.BAT.Qhost.abp",
"Trojan.Win32.KKQP3298.dkyjvz",
"Trojan.Win32.Z.Qhost.33750",
"Troj.Bat.Qhost!c",
"Trojan.Hosts.43761",
"BehavesLike.Win32.BadFile.nh",
"Trojan-Dropper.Win32.StartPage",
"W32/Trojan.KKQP-3298",
"TR/Qhost.mju.53",
"Trojan.BAT.Qhost.abp",
"Trojan/Win32.Qhost.R77387",
"Trojan.BAT.Qhost",
"Trj/CI.A",
"BAT/Qhost.NTH",
"Bat.Trojan.Qhost.Lnya",
"Trojan.Comisproc!uAYBYZyFk6g",
"Win32/Trojan.34d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"What",
"Does",
"SimBad",
"Do",
"?",
"β",
"SimBad",
"β",
"has",
"capabilities",
"that",
"can",
"be",
"divided",
"into",
"three",
"groups",
"β",
"Show",
"Ads",
",",
"Phishing",
",",
"and",
"Exposure",
"to",
"other",
"applications",
"."
] | [
16,
16,
3,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"some",
"versions",
"of",
"Asacub",
",",
"strings",
"in",
"the",
"app",
"are",
"encrypted",
"using",
"the",
"same",
"algorithm",
"as",
"data",
"sent",
"to",
"C",
"&",
"C",
",",
"but",
"with",
"different",
"keys",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"threat",
"actor",
"is",
"remarkable",
"for",
"two",
"reasons",
":",
"Its",
"access",
"to",
"sophisticated",
"zero-day",
"exploits",
"for",
"Microsoft",
"and",
"Adobe",
"software",
"Its",
"use",
"of",
"an",
"advanced",
"piece",
"of",
"government-grade",
"surveillance",
"spyware",
"FinFisher",
",",
"also",
"known",
"as",
"FinSpy",
"and",
"detected",
"by",
"Microsoft",
"security",
"products",
"as",
"Wingbird",
"FinFisher",
"is",
"such",
"a",
"complex",
"piece",
"of",
"malware",
"that",
",",
"like",
"other",
"researchers",
",",
"we",
"had",
"to",
"devise",
"special",
"methods",
"to",
"crack",
"it",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
3,
16,
16,
16,
4,
16,
16,
16,
3,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.VidemoY.Trojan",
"Win32.Trojan.WisdomEyes.16070401.9500.9988",
"Backdoor.Trojan",
"Win.Trojan.Bifrose-17928",
"Trojan.Win32.Bifrost.csybxh",
"Troj.W32.Jorik.Arcdoor.bjr!c",
"BackDoor.Bifrost.15005",
"Trojan.Inject.Win32.22484",
"Worm.Win32.Msil",
"Trojan:MSIL/Harvbot.B",
"TrojanDropper.Injector",
"Trj/CI.A",
"W32/Jorik_Arcdoor.BJR!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom.FireCrypt.A3",
"Ransom.BleedGreen",
"Ransom_BleedGreen.A",
"Win32.Trojan.WisdomEyes.16070401.9500.9560",
"Ransom.FireCrypt",
"Ransom_BleedGreen.A",
"Trojan-Ransom.Win32.Crypmodadv.xee",
"Trojan.Win32.Z.Ransom.18432.C[h]",
"Trojan.Encoder.10088",
"Trojan.Crypmodadv.Win32.90",
"trojanspy.msil.neos.a",
"W32/Trojan.RPJE-7166",
"Trojan.Crypmodadv.en",
"TR/Dropper.MSIL.owdes",
"MSIL/Filecoder.DZ!tr",
"Trojan.Ransom.HiddenTears.1",
"Ransom:Win32/Firecrypt.A",
"Trojan.Ransom.FireCrypt",
"Win32.Trojan.Crypmodadv.Pbpb",
"Trojan.Crypmodadv!",
"Trojan.VB.Inject",
"Atros4.BUNV",
"Trj/GdSda.A",
"Win32/Trojan.Ransom.786"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"SUSPECTED",
"DETECTION",
"TESTS",
"BY",
"THE",
"THREAT",
"ACTOR",
"In",
"searching",
"for",
"EventBot",
",",
"we",
"β",
"ve",
"identified",
"multiple",
"submissions",
"from",
"the",
"same",
"submitter",
"hash",
",",
"22b3c7b0",
":",
"EventBot",
"22b3c7b0",
"submitter",
"hash",
"The",
"22b3c7b0",
"submitter",
"hash",
"that",
"submitted",
"most",
"of",
"the",
"EventBot",
"samples",
"to",
"VirusTotal",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
3,
1,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16
] |
[
"We",
"dubbed",
"this",
"campaign",
"Operation",
"Electric",
"Powder"
] | [
16,
16,
16,
6,
14,
14,
14
] |
[
")",
"Following",
"is",
"the",
"snippet",
"of",
"code",
"in",
"these",
"older",
"Exodus",
"One",
"samples",
"showing",
"the",
"connection",
"to",
"the",
"Command",
"&",
"Control",
":",
"Below",
"is",
"the",
"almost",
"identical",
"composition",
"of",
"the",
"request",
"to",
"the",
"Command",
"&",
"Control",
"server",
"in",
"mike.jar",
"(",
"also",
"containing",
"the",
"path",
"7e661733-e332-429a-a7e2-23649f27690f",
")",
":",
"To",
"further",
"corroborate",
"the",
"connection",
"of",
"the",
"Exodus",
"spyware",
"with",
"eSurv",
",",
"the",
"domain",
"attiva.exodus.esurv.it",
"resolves",
"to",
"the",
"IP",
"212.47.242.236",
"which",
",",
"according",
"to",
"public",
"passive",
"DNS",
"data",
",",
"in",
"2017",
"was",
"used",
"to",
"host",
"the",
"domain",
"server1cs.exodus.connexxa.it",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16
] |
[
"The",
"original",
"leak",
"is",
"no",
"longer",
"available",
"on",
"github.com",
",",
"but",
"a",
"copy",
"can",
"be",
"found",
"here",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"At",
"the",
"time",
"this",
"malware",
"was",
"reported",
"by",
"several",
"security",
"vendors",
",",
"and",
"attributed",
"to",
"different",
"malware",
"families",
"like",
"Ghostpush",
",",
"MonkeyTest",
",",
"and",
"Xinyinhe",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
16,
16,
3,
16
] |
[
"The",
"attack",
"comes",
"as",
"an",
"email",
"containing",
"a",
"malicious",
"Google",
"Docs",
"link."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9
] |
[
"Even",
"when",
"a",
"false",
"flag",
"might",
"also",
"be",
"a",
"possibility",
",",
"we",
"consider",
"this",
"to",
"be",
"unlikely",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Beginning",
"in",
"early",
"2008,",
"Iranian",
"security",
"entities",
"have",
"engaged",
"in",
"operations",
"to",
"identify",
"and",
"arrest",
"administrators",
"of",
"illicit",
"websites",
"and",
"social",
"media",
"groups."
] | [
16,
16,
0,
8,
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
1,
9,
16,
6,
14,
14
] |
[
"The",
"spear",
"phishing",
"emails",
"had",
"Myanmar",
"political-themed",
"lures",
"and",
",",
"if",
"the",
"9002",
"C2",
"server",
"responded",
",",
"the",
"Trojan",
"sent",
"system",
"specific",
"information",
"along",
"with",
"the",
"string",
"β",
"jackhex",
"β",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Cybereason",
"Nocturnus",
"team",
"has",
"concluded",
"that",
"EventBot",
"is",
"designed",
"to",
"target",
"over",
"200",
"different",
"banking",
"and",
"finance",
"applications",
",",
"the",
"majority",
"of",
"which",
"are",
"European",
"bank",
"and",
"crypto-currency",
"exchange",
"applications",
"."
] | [
16,
4,
12,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"to",
"eSurv",
"S.R.L",
"."
] | [
16,
4,
12,
12
] |
[
"Musical",
"Chairs",
"is",
"a",
"multi-year",
"campaign",
"which",
"recently",
"deployed",
"of",
"new",
"variant",
"Gh0st",
"we've",
"named",
"Piano",
"Gh0st."
] | [
6,
14,
16,
16,
0,
11,
16,
16,
16,
16,
16,
3,
11,
16,
16,
3,
11
] |
[
"Odinaff",
"is",
"typically",
"deployed",
"in",
"the",
"first",
"stage",
"of",
"an",
"attack,",
"to",
"gain",
"a",
"foothold",
"onto",
"the",
"network,",
"providing",
"a",
"persistent",
"presence",
"and",
"the",
"ability",
"to",
"install",
"additional",
"tools",
"onto",
"the",
"target",
"network."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
5
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9993",
"W32/Trojan.VVLV-9156",
"MSIL.Packed.Kryptik.JH",
"Trojan.Win32.Razy.exgpmg",
"BehavesLike.Win32.Trojan.gc",
"Trojan.Razy.D2685F",
"Trojan/Win32.Randrew.C2365157",
"Trojan-Dropper.MSIL.Small",
"Trj/CI.A",
"Win32/Trojan.24d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Due",
"to",
"TrickMo",
"β",
"s",
"persistence",
"implementation",
"mentioned",
"earlier",
",",
"this",
"lockdown",
"screen",
"persists",
"after",
"a",
"restart",
"and",
"is",
"re-initiated",
"every",
"time",
"the",
"device",
"becomes",
"interactive",
"."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"the",
"case",
"of",
"this",
"spyware",
",",
"search",
"for",
"app",
"named",
"TikTok",
"Pro",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"For",
"the",
"purpose",
"of",
"this",
"report",
"we",
"analyze",
"here",
"the",
"Exodus",
"One",
"sample",
"with",
"hash",
"8453ce501fee1ca8a321f16b09969c517f92a24b058ac5b54549eabd58bf1884",
"which",
"communicated",
"with",
"the",
"Command",
"&",
"Control",
"server",
"at",
"54.71.249.137",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16
] |
[
"The",
"payload",
"will",
"execute",
"shell",
"code",
"to",
"steal",
"data",
"from",
"various",
"applications",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"5",
"β",
"Keylogger",
"component",
"Figure",
"6",
"shows",
"one",
"of",
"the",
"most",
"noteworthy",
"functions",
"of",
"Anubis",
":",
"its",
"ransomware",
"module",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W97M_DLOADR.XTRQ",
"W97M_DLOADR.XTRQ"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Kazy.DC9EF",
"Win32.Trojan.WisdomEyes.16070401.9500.9996",
"W32/Trojan.QFDJ-7788",
"Backdoor.Trojan",
"Trojan.DownLoader5.32593",
"Trojan.Small",
"Win32.Troj.Disfa.cv.kcloud",
"Backdoor:MSIL/Sootbot.B",
"Trj/CI.A",
"Win32.Trojan.Downloader.Dyzw",
"BackDoor.WE!tr",
"Win32/Trojan.018"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"will",
"be",
"the",
"trigger",
"for",
"the",
"service",
"to",
"start",
"the",
"beaconing",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Packer.FSG.A",
"Packer.FSG.A",
"Downloader.WebDown.Win32.23",
"Troj.Downloader.W32.WebDown.10!c",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Downloader.BFIA",
"TROJ_APHER.A",
"Win.Trojan.Small-10534",
"Trojan-Downloader.Win32.WebDown.10",
"Packer.FSG.A",
"Trojan.Win32.WebDown.buycqa",
"Win32.Trojan-Downloader.Webdown.bfes",
"Packer.FSG.A",
"Trojan.DownLoader.2103",
"TROJ_APHER.A",
"W32/Downloader.MUZI-7025",
"Trojan/Downloader.WebDown.10",
"Trojan/Win32.Unknown",
"TrojanDownloader:Win32/Aphex.2_4",
"Packer.FSG.A",
"Trojan-Downloader.Win32.WebDown.10",
"Packer.FSG.A",
"Win-Trojan/Apher.1312",
"Win32/TrojanDownloader.Apher.070",
"Trojan.DL.WebDown!Zgs3lnw1FbY",
"Trojan-Downloader.Win32.WebDown",
"Trj/Downloader.GE"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Multi",
"Trojan.MalPack.VB",
"Uds.Dangerousobject.Multi!c",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan-Spy.Win32.SpyEyes.bdxs",
"Trojan.Win32.Z.Fareitvb.933888",
"BehavesLike.Win32.BadFile.dh",
"Trojan.VB.Crypt",
"TR/Dropper.VB.dtffd",
"Trojan[Spy]/Win32.SpyEyes",
"Trojan-Spy.Win32.SpyEyes.bdxs",
"Trojan/Win32.VBKrypt.R218990",
"Trj/GdSda.A",
"Win32.Trojan.Inject.Auto",
"Win32/Trojan.Spy.8cb"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Below",
"is",
"the",
"list",
"of",
"all",
"the",
"commands",
"catered",
"by",
"the",
"C",
"&",
"C",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.StrictorCS.S483160",
"Trojan.Graftor.D21F45",
"Win32.Application.PUPStudio.A",
"HEUR:Trojan.Win32.KillFiles",
"Trojan.Win32.Drop.eaoavd",
"Trojan.Win32.Z.Graftor.614400.AJ",
"Trojan.MulDrop5.12779",
"Trojan.KillFiles.Win32.6511",
"W32/Trojan.XBKC-8948",
"TR/Graftor.905216.18",
"TrojanDownloader:Win32/WebToos.A",
"HEUR:Trojan.Win32.KillFiles",
"Trojan/Win32.Krap.R106509",
"TrojanDropper.Sysn",
"Trj/CI.A",
"Trojan.DownLoader!",
"Win32/Trojan.0cb"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BackDoor.Dande.52",
"Trojan.Dande.Win32.1",
"Trojan.Win32.Dande",
"BDS/Dande.xihzl",
"Trojan.Zusy.D3503B",
"Win32/Dande.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojandropper.Scrop",
"TROJ_DROPPR.YYYJ",
"Trojan-Dropper.Win32.Scrop.cxq",
"Trojan.Win32.Autoit.euuwjs",
"Troj.Dropper.W32.Scrop!c",
"Trojan.DownLoader25.53180",
"TROJ_DROPPR.YYYJ",
"Trojan.ECCW-6",
"TR/Autoit.wkswc",
"Trojan[Exploit]/OLE.CVE-2014-6532",
"Trojan:O97M/Tanequalyn.A",
"Trojan/Win32.AutoIt.C2019675",
"Win32.Trojan-dropper.Scrop.Pavt",
"W32/Scrop.CO!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Interestingly",
"enough,",
"Sourcefire",
"was",
"the",
"only",
"security",
"vendor",
"directly",
"referenced",
"in",
"the",
"Powershell",
"script."
] | [
16,
16,
4,
16,
16,
4,
12,
12,
16,
16,
16,
1,
9,
9
] |
[
"This",
"malware",
"attempts",
"to",
"collect",
"a",
"user's",
"online",
"banking",
"data",
"and",
"sends",
"out",
"information",
"to",
"a",
"control",
"server."
] | [
16,
3,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
5,
13
] |
[
"This",
"is",
"what",
"the",
"spear",
"phishing",
"e-mail",
"looked",
"like",
":",
"In",
"regards",
"to",
"the",
"message",
"text",
"above",
",",
"multiple",
"activist",
"groups",
"have",
"recently",
"organized",
"a",
"human",
"rights",
"conference",
"event",
"in",
"Geneva",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Since",
"the",
"beginning",
"of",
"2017,",
"ESET",
"researchers",
"have",
"been",
"conducting",
"an",
"investigation",
"into",
"a",
"complex",
"threat",
"mainly",
"targeting",
"Russia",
"and",
"Ukraine."
] | [
16,
16,
16,
16,
0,
4,
12,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
2,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"AdClicker-O.dr",
"Trojan.Win32.Revop.nbqd",
"W32/TrojanX.HJO",
"Adware.Winpup",
"TROJ_REVOP.A",
"Trojan-Downloader.Win32.VB.ca",
"Trojan.Win32.A.Revop.251830[h]",
"TROJ_REVOP.A",
"AdClicker-O.dr",
"W32/Trojan.MQHB-1521",
"Win32/TrojanDownloader.VB.CA",
"SPR/Commercials.1",
"Trojan/Win32.Revop",
"Win32.Troj.Undef.kcloud",
"TrojanDownloader:Win32/VB.CA",
"TrojanDownloader.VB",
"Trj/Multidropper.BJ",
"Win32.Trojan.Revop.cxum",
"Trojan-Downloader.Win32.VB.CA",
"W32/REVOP.A!tr",
"Downloader.VB.EC",
"Trojan.Win32.VB.AhnP"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Note",
"that",
"we",
"later",
"found",
"versions",
"that",
"used",
"the",
"domain",
"as",
"a",
"C2",
"directly",
"instead",
"of",
"the",
"IP",
"address",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BackDoor-EDY.b",
"Trojan.ExeDot.Win32.325",
"Trojan/ExeDot.cra",
"Win32.Trojan.WisdomEyes.16070401.9500.9965",
"TROJ_EXEDOT.SMA",
"Win.Trojan.Exedot-43",
"Trojan.Win32.ExeDot.dsmyq",
"TrojWare.Win32.ExeDot.L",
"TROJ_EXEDOT.SMA",
"BackDoor-EDY.b",
"Trojan/ExeDot.bs",
"Trojan:Win32/Evadiped.A",
"Trojan/Win32.Unknown",
"Win32.Troj.ExeDot.kcloud",
"Trojan.Heur.E8C832",
"Trojan:Win32/Evadiped.A",
"Trojan/Win32.ExeDot.R4137",
"Trojan.ExeDot",
"Trojan.BHO!WIw+XSz27Q8",
"Trojan.Win32.ExeDot"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.