tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "The", "main", "goal", "of", "this", "malware", "is", "to", "steal", "banking", "credentials", "from", "the", "victim's", "device." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 1, 9, 9, 16, 5, 13, 13 ]
[ "]", "759383", "[", "." ]
[ 9, 9, 9, 9 ]
[ "So", ",", "users", "should", "beware", "of", "certain", "modified", "Android", "firmware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "Honkbox", "is", "an", "active", "threat", "with", "at", "least", "three", "variants", "and", "multiple", "components,", "some", "of", "which", "have", "not", "been", "previously", "documented." ]
[ 3, 16, 16, 3, 11, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9985", "Infostealer.Limitail", "TSPY_INFILOG.SM", "TSPY_INFILOG.SM", "TrojanSpy:MSIL/Grieftylo.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "The", "iOS", "and", "Android", "apps", "for", "Netflix", "are", "enormously", "popular", ",", "effectively", "turning", "a", "mobile", "device", "into", "a", "television", "with", "which", "users", "can", "stream", "full", "movies", "and", "TV", "programs", "anytime", ",", "anywhere", "." ]
[ 16, 5, 16, 5, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "actor", "responsible", "for", "this", "campaign", "utilized", "legitimate", "digital", "certificates", "to", "sign", "their", "tools", "and", "employed", "innovative", "techniques", "to", "cloak", "their", "command", "and", "control", "traffic." ]
[ 16, 6, 16, 16, 16, 6, 16, 1, 9, 9, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "W32.TonersyASC.Trojan", "Ransom/W32.Dcryptor.2415104", "Ransom.Mambretor.A5", "Trojan.Dcryptor.Win32.2", "Troj.Ransom.W32.Dcryptor.toNk", "Trojan/Filecoder.DCryptor.b", "Win32.Trojan.WisdomEyes.16070401.9500.9975", "W32/HDD_Cryptor.A!Eldorado", "Ransom.HDDCryptor", "Win.Ransomware.HDDCryptor-2", "Win32.Trojan-Ransom.Mamba.A", "Trojan-Ransom.Win32.Dcryptor.b", "Trojan.Win32.Filecoder.elaurk", "Trojan.Win32.Z.Dcryptor.2415104", "Tool.PassView.841", "Ransom_HDDCRYPTOR.SM", "Trojan-Ransom.Mamba", "W32/HDD_Cryptor.A!Eldorado", "Trojan.Dcryptor.a", "TR/FileCoder.rrsau", "Trojan[Ransom]/Win32.Blocker", "Trojan.Ransom.HDDCrypt.1", "Trojan-Ransom.Win32.Dcryptor.b", "Ransom:Win32/Mambretor.A", "Trojan/Win32.Dcryptor.C1564580", "Hoax.Dcryptor", "Ransom.HDDCryptor", "Trj/CI.A", "Win32/Filecoder.DCryptor.B", "Win32/Trojan.f14" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "packer", ",", "besides", "making", "the", "static", "analysis", "more", "complex", ",", "will", "break", "the", "standard", "debugger", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "These", "attackers", "have", "used", "additional", "malware", "families", "in", "previous", "activity", "dating", "to", "at", "least", "2015", "that", "include", "PlugX", ",", "Zupdax", ",", "9002", ",", "and", "Poison", "Ivy", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 3, 16, 3, 16, 16, 3, 11, 16 ]
[ "Disturbingly", ",", "the", "malware", "establishes", "a", "rootkit", "on", "the", "device", ",", "allowing", "it", "to", "download", "and", "execute", "any", "code", "a", "cybercriminal", "would", "want", "to", "run", "on", "a", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.DL.Banload!wDurcHh4EfA", "Spyware.Keylogger", "TROJ_BANLOAD.AET", "Win32.TRCrypt.Fkm", "PUA.Packed.PECompact-1", "Trojan-Downloader.Win32.Banload.blpr", "Trojan-Spy.Win32.Bancos!IK", "Trojan.DownLoader3.52680", "TROJ_BANLOAD.AET", "TrojanDownloader.Banload.awii", "Downloader/Win32.Banload", "TrojanDownloader.Banload.blmr", "Spyware.Keylogger!rem", "Trojan-Spy.Win32.Bancos", "W32/Banload.BLPR!tr.dldr", "Downloader.Banload.BKYW" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Pugeju", "Trojan.Win32.Crypt.raab", "TrojWare.Win32.Inject.~AT", "BehavesLike.Win32.PUPXAC.lm", "Trojan-GameThief.Win32.OnLineGames", "Trojan/Crypt.acz", "Trojan/Win32.Invader", "Trj/CI.A", "Win32/Obfuscated.NBX", "Win32/Trojan.be7" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Beaugrit.S16628", "Trojan/Spy.Shiz.ncd", "Win32.Trojan-Spy.Shiz.b", "Backdoor.Trojan", "HT_SIMDA_GA310E71.UVPM", "Trojan.Win32.Ibank.vuhyo", "TrojWare.Win32.Spy.Shiz.ZV", "Trojan.PWS.Ibank.373", "Trojan.Shiz.Win32.571", "HT_SIMDA_GA310E71.UVPM", "BehavesLike.Win32.Backdoor.fh", "TR/BAS.Dorkbot.20619344", "Trojan.Zusy.Elzob.D21CE", "PWS:Win32/Simda.K", "Win32/Spy.Shiz.NCD", "TrojanSpy.Shiz!qC77/NFCWBg", "Backdoor.Win32.Simda", "W32/Shiz.NCD!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "cause", "for", "this", "uptick", "appears", "due", "to", "widespread", "WordPress", "site", "compromises." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clodfd4.Trojan.50bd", "Spyware.PasswordStealer", "TROJ_FRS.0NA000J416", "TROJ_FRS.0NA000J416", "Trojan.Win32.Z.Securityxploded.418304[h]", "BehavesLike.Win32.PWSZbot.gh", "W32/Trojan.ZJJQ-6216", "Unwanted/Win32.Passview.C1588969", "Riskware.Win32.PassDumper", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "malware", "abuses", "the", "Android", "accessibility", "feature", "to", "steal", "user", "information", "and", "is", "able", "to", "update", "its", "code", "and", "release", "new", "features", "every", "few", "days", "." ]
[ 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Cloda21.Trojan.c461", "DLoader.QYW", "Win32/SillyDl.ACS", "Trojan.Win32.A.Downloader.146388", "Trojan.DownLoader.6702", "BehavesLike.Win32.Downloader.cm", "TrojanDownloader:Win32/Pusrac.A", "Trojan.Win32.Downloader.AE" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Late", "in", "the", "summer", "of", "2016,", "CrowdStrike", "Intelligence", "analysts", "began", "investigating", "a", "curious", "Android", "Package", "APK", "named", "Попр-Д30.apk'", "which", "contained", "a", "number", "of", "Russian", "language", "artifacts", "that", "were", "military", "in", "nature." ]
[ 16, 16, 16, 16, 16, 0, 4, 12, 12, 16, 16, 16, 16, 5, 13, 13, 16, 3, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9 ]
[ "This", "malware", "gives", "attackers", "an", "avenue", "into", "internal", "networks", "which", "compromised", "devices", "are", "connected", "to—a", "notable", "risk", "if", "the", "device", "is", "used", "to", "connect", "to", "company", "networks." ]
[ 16, 3, 16, 6, 16, 16, 16, 5, 13, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 5, 13 ]
[ "In", "some", "samples", ",", "starting", "from", "January", "2016", ",", "an", "algorithm", "has", "been", "implemented", "for", "unpacking", "the", "encrypted", "executable", "DEX", "file", "from", "the", "assets", "folder", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Combining", "timebombs", ",", "dynamic", "code", "loading", ",", "and", "use", "of", "reflection", "to", "complicate", "reverse", "engineering", "of", "the", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "Trojan", "may", "perform", "a", "man-in-the-middle", "MitM", "attack", "on", "the", "browser", "installed", "on", "the", "compromised", "computer." ]
[ 16, 3, 16, 16, 1, 9, 9, 9, 16, 5, 13, 16, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9670", "Backdoor.Felismus", "Trojan/Win32.Skeeyah.C1905486", "Trj/GdSda.A", "Trojan.Win32.Tomyjery" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.VBKrypt.208896.AN", "Trojan.Win32.VBKrypt!O", "WORM_VOBFUS.SMIA", "Trojan.Packed.21297", "WORM_VOBFUS.SMIA", "Trojan.Barys.266", "Trojan/Win32.VBKrypt.R2844", "Worm.Win32.Vobfus" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Beginning", "in", "July", "2015", "and", "possibly", "earlier,", "the", "attack", "continued", "into", "August", "and", "is", "currently", "ongoing." ]
[ 0, 8, 8, 8, 16, 16, 16, 16, 16, 16, 16, 0, 16, 16, 16, 16 ]
[ "This", "mistake", "in", "operational", "security", "allowed", "us", "to", "gain", "visibility", "into", "exfiltrated", "content", "for", "a", "number", "of", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Constructor.Macro.Ultras.A", "Constructor.Win32.Ultras.10!O", "WM/Uck.kit", "Constructor.W32.Ultras!c", "Trojan/Constructor.Ultras.10.a", "Trojan.Constructor.Macro.Ultras.A", "Ultras.Kit", "Win.Tool.Macro-8", "Trojan.Constructor.Macro.Ultras.A", "Constructor.Win32.Ultras.10.a", "Trojan.Constructor.Macro.Ultras.A", "Riskware.Win32.Ultras-10.hpwc", "Trojan.Constructor.Macro.Ultras.A", "Constructor.Macro.Ultras.A", "Trojan.Constructor.Macro.Ultras.A", "VirusConstructor.Ultras.2", "Tool.Ultras.Win32.1", "WM/Uck.kit", "W32/Tool.QHJM-3031", "Constructor.Macro.Ultras.10", "TR/ConKit.UltrasUck", "Constructor.Win32.Ultras.10.a", "HackTool/Win32.Constructor.C218755", "Trojan.Constructor.Macro.Ultras.A", "Constructor.Ultras", "Win32.Trojan.Ultras.Pegg", "Constructor.Win32.Ultras", "Win32/Trojan.5bd" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Worm.Stration.D", "Win32.Worm.Stration.D", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win32.Worm.Stration.D", "Email-Worm.Win32.Warezov.k", "Win32.Worm.Stration.D", "Win32.Worm.Stration.D", "Heur.Packed.Unknown", "Win32.Worm.Stration.D", "Win32.HLLM.Limar", "Backdoor.Win32.IRCBot", "Trojan:Win32/Stration.K", "Win32.Worm.Stration.D", "Email-Worm.Win32.Warezov.k" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Recently,", "we", "detected", "Carbanak", "campaigns", "attempting", "to:Target", "high", "level", "executives", "in", "financial", "companies", "or", "in", "financial/decision-making", "roles", "in", "the", "Middle", "East,", "U.S.", "and", "Europe", ",Spear-phishing", "emails", "delivering", "URLs,", "macro", "documents,", "exploit", "documents,Use", "of", "Spy.Sekur", "Carbanak", "malware", "and", "commodity", "remote", "access", "Trojans", "RATs", "such", "as", "jRAT,", "Netwire,", "Cybergate", "and", "others", "used", "in", "support", "of", "operations." ]
[ 16, 16, 16, 6, 14, 16, 16, 4, 12, 12, 12, 12, 12, 16, 16, 4, 12, 16, 2, 10, 10, 10, 16, 2, 1, 9, 9, 9, 9, 9, 9, 9, 16, 3, 11, 11, 16, 3, 11, 11, 11, 11, 16, 16, 3, 11, 11, 16, 16, 16, 16, 6, 14, 14 ]
[ "A", "backdoor", "also", "known", "as:", "W32.QueryexXAAF.Worm", "Application.Hacktool.AW", "Worm.Win32.Zombaque!O", "Worm.Zombaque.A3", "WORM_BIZOME.SMD", "W32.Spybot.Worm", "Win32/Zombaque.A", "WORM_BIZOME.SMD", "Win.Worm.Zombaque-12", "Application.Hacktool.AW", "Worm.Win32.Zombaque.a", "Application.Hacktool.AW", "Trojan.Win32.Zombaque.bzuxu", "Worm.Win32.Zombaque.318464.A", "Application.Hacktool.AW", "Application.Hacktool.AW", "Win32.HLLW.RAhack", "Worm.Zombaque.Win32.2", "BehavesLike.Win32.Sality.fc", "Worm.Win32.Zombaque", "Worm/Zombaque.l", "Worm/Win32.Zombaque", "Worm:Win32/Zombaque.A", "Application.Hacktool.AW", "Worm.Win32.Zombaque.a", "Worm/Win32.Zombaque.R3338", "Worm.Zombaque", "Win32/Zombaque.A", "Worm.Win32.Zombaque.a", "Worm.Zombaque!23w9coTlBlo", "W32/Zombaque.A.worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Figure", "12", "." ]
[ 16, 16, 16 ]
[ "VERSIONING", "Bread", "has", "also", "leveraged", "an", "abuse", "tactic", "unique", "to", "app", "stores", ":", "versioning", "." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "a", "quick", "Google", "search", "you", "can", "find", "practically", "anything", "you", "need", "to", "know." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Wdfload.89", "Trojan.Win64.Wdfload", "Trojan.Wdfload.cqq", "TR/Wdfload.slana", "Trojan/Win64.Wdfload", "Trojan/Win64.Wdfload.C2364123", "Trj/CI.A", "W32/Wdfload.AA!tr", "Win32/Trojan.bfd" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Downloader", "Win32.Trojan.WisdomEyes.16070401.9500.9691", "Trojan-Downloader.Win32.Injecter.vxy", "BehavesLike.Win32.PWSZbot.fc", "W32/Trojan.SBIX-6310", "Trojan.Heur.TP.E5F612", "Trojan-Downloader.Win32.Injecter.vxy", "Trj/CI.A", "Win32/Trojan.03f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Pandex", "Heur.Packed.Unknown", "Trojan.DownLoad.3750", "Heuristic.LooksLike.Win32.Morphine.I", "VirTool:Win32/Obfuscator.EK", "Voronezh.1600.A", "Packed.Morphine.C", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "threat", "actor", "leveraged", "the", "CVE-2017-0199", "Microsoft", "Word", "Office/WordPad", "Remote", "Code", "Execution", "Vulnerability", "with", "carefully", "crafted", "decoy", "content", "customized", "for", "each", "target", "recipient." ]
[ 6, 14, 14, 16, 16, 1, 7, 15, 15, 15, 15, 15, 15, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "first", "stage", "would", "be", "a", "malicious", "link", "within", "the", "e-mail", "or", "attachment,", "containing", "malicious", "code,", "in", "this", "case", "Pony." ]
[ 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 1, 16, 1, 9, 9, 9, 16, 16, 16, 3 ]
[ "Mobile", "app", "creators", "are", "often", "looking", "for", "ways", "to", "monetize", "their", "software." ]
[ 4, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 5 ]
[ "The", "attackers", "deliver", "malware", "through", "topically", "titled", "spearphises,", "for", "example", "Energy_Data_Meeting_fall_2016." ]
[ 16, 6, 16, 16, 16, 16, 16, 1, 16, 16, 1 ]
[ "The", "source", "code", "for", "Linux.Mirai", "bot", "was", "released", "a", "few", "weeks", "ago." ]
[ 16, 16, 16, 16, 1, 3, 16, 16, 16, 0, 8, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Graftor.D27EA8", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "BehavesLike.Win32.Expiro.hc", "Trojan.Win32.Scar", "TrojanDropper:Win32/Binko.A", "W32/Cbot.NCN!tr.bdr", "Win32/Trojan.Dropper.007" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "PureCrypter", "campaign", "uses", "the", "domain", "of", "a", "compromised", "non-profit", "organization", "as", "a", "Command", "and", "Control", "C2", "to", "deliver", "a", "secondary", "payload." ]
[ 6, 14, 14, 16, 16, 1, 16, 16, 1, 4, 12, 16, 16, 1, 9, 9, 9, 16, 16, 16, 3, 11 ]
[ "Despite", "recent", "progress,", "the", "country", "is", "subject", "to", "ongoing", "conflict", "with", "ethnic", "rebels", "and", "an", "ongoing", "civil", "war." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "code", "snippet", "below", "shows", "part", "of", "the", "screen", "parsing", "process", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "data", ",", "when", "analyzed", "with", "the", "number", "of", "commands", "to", "send", "SMSs", "that", "Talos", "received", "during", "the", "investigation", ",", "lead", "us", "to", "conclude", "that", "the", "malicious", "operator", "is", "aggressively", "spreading", "the", "malware", ",", "but", "that", "does", "n't", "seem", "to", "result", "in", "the", "same", "number", "of", "new", "infections", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.Bancodor.482816", "Backdoor/Bancodor.b", "BKDR_BADCODOR.A", "W32/Bancodor.C@bd", "Backdoor.Badcodor", "Win32/PSWSpider.G", "BKDR_BADCODOR.A", "Win.Trojan.Bancodor-22", "Backdoor.Win32.Bancodor.b", "Trojan.Win32.Bancodor.fzet", "Backdoor.Win32.A.Bancodor.455260", "Backdoor.Win32.Bancodor.~B", "Trojan.Bancdo", "Backdoor.Bancodor.Win32.150", "W32/Bancodor.NOXQ-3353", "Backdoor/Bancodor.b", "BDS/Badcodor.B.6", "Trojan[Backdoor]/Win32.Bancodor", "Win32.Hack.Bancodor.b.kcloud", "Backdoor:Win32/Badcodor.B", "Backdoor.W32.Bancodor.b!c", "Backdoor.Win32.Bancodor.b", "Backdoor/Win32.Bancodor.R145952", "Backdoor.Bancodor", "Win32/Bancodor.B", "Backdoor.Badcodor.A", "Backdoor.Win32.Bancodor", "Bck/Bancodor.I" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Trojan", "drops", "a", "PowerPoint", "presentation", "that", "contains", "details", "about", "the", "2nd", "Myanmar", "Industrial", "Human", "Resource", "Development", "Symposium." ]
[ 16, 3, 16, 16, 1, 9, 16, 16, 1, 16, 16, 1, 9, 9, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Rincux.AV", "Trojan.Rincux.AV", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "TROJ_DLOAD.KKK", "Trojan.Rincux.AV", "Trojan.Rincux.AV", "BackDoor.Attack.594", "TROJ_DLOAD.KKK", "Backdoor/Ceckno.awl", "W32/Downloader.L", "Trojan.Rincux.AV", "Trojan.Rincux.AV", "Backdoor.Ceckno!6jtmdMg8Vqs", "Virus.Win32.Small" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Recently,", "TrendMicro", "uncovered", "a", "new", "cyber-espionage", "attack", "by", "a", "well-funded", "and", "organized", "group", "targeting", "companies", "close", "to", "governments", "and", "in", "key", "industries", "mostly", "in", "Asia." ]
[ 16, 4, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 6, 16, 4, 16, 16, 4, 16, 16, 11, 4, 16, 16, 2 ]
[ "The", "sample", "has", "a", "multicomponent", "structure", "and", "can", "download", "a", "payload", "or", "updates", "from", "its", "C", "&", "C", "server", ",", "which", "happens", "to", "be", "an", "FTP", "server", "belonging", "to", "the", "free", "Russian", "web", "hosting", "service", "Ucoz", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32/AutoRun.Delf.RF", "Trojan.Win32.Autoruner2.czfwpa", "Win32.HLLW.Autoruner2.13746", "BehavesLike.Win32.Dropper.dc", "Trojan.Graftor.D22611", "Worm:Win32/Kerm.A", "Worm/Win32.AutoRun.C332941", "Win32.Worm.Autorun.Wted", "Worm.Win32.Kerm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "Trojans", "designed", "to", "steal", "money", "from", "bank", "accounts", "pose", "a", "serious", "threat", "to", "Android", "users." ]
[ 16, 3, 16, 16, 1, 9, 16, 4, 12, 16, 16, 1, 9, 16, 5, 13 ]
[ "Sending", "the", "command", "sh", "to", "TCP", "port", "6200", "results", "in", "a", "full", "terminal", "being", "dropped", ":", "Sending", "the", "command", "cmd", "followed", "by", "a", "proper", "terminal", "command", "will", "execute", "it", "and", "print", "the", "output", "(", "in", "the", "example", "we", "use", "id", "which", "displays", "the", "identity", "of", "the", "system", "user", "running", "the", "issued", "commands", ")", ":", "Doing", "the", "same", "as", "above", "but", "with", "command", "sucmd", "will", "run", "the", "terminal", "command", "as", "root", ":", "Other", "commands", "supported", "by", "rootdaemon", "on", "TCP", "port", "6200", "are", "su", "(", "which", "in", "our", "tests", "did", "n't", "properly", "work", ")", ",", "loadsocketpolicy", ",", "loadfilepolicy", ",", "remount", "and", "removeroot", "." ]
[ 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "this", "case", ",", "we", "can", "see", "that", "the", "HTML", "code", "of", "the", "overlay", "is", "stored", "in", "the", "C2", "infrastructure", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Razy.D10C13", "Trojan-Downloader.Win32.Sysdrop.am", "Trojan.Win32.Z.Sysdrop.598528", "Troj.Downloader.W32!c", "Trojan.DownLoader22.41648", "Adware.BrowseFox.Win32.397064", "W32/Trojan.VFXM-3248", "TrojanDownloader.Sysdrop.h", "BDS/Ananlog.okrph", "Trojan[Downloader]/Win32.Sysdrop", "Backdoor:Win32/Ananlog.A", "Trojan-Downloader.Win32.Sysdrop.am", "Trj/GdSda.A", "Win32.Trojan-downloader.Sysdrop.Eok", "Trojan.DL.Sysdrop!", "Win32/Backdoor.773" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.LethicKAAB.Trojan", "Trojan.VB", "Win32.Trojan.VB.bj", "Trojan.KillFiles.29071", "BehavesLike.Win32.VBObfus.cm", "Trojan.Win32.VB", "Trojan.Ursu.DFEE", "TScope.Trojan.VB", "Win32/VB.OCY", "Win32/Worm.VB.X" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Similar", "to", "previous", "malware", "which", "infiltrated", "Google", "Play", ",", "such", "as", "FalseGuide", "and", "Skinner", ",", "Judy", "relies", "on", "the", "communication", "with", "its", "Command", "and", "Control", "server", "(", "C", "&", "C", ")", "for", "its", "operation", "." ]
[ 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 3, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "is", "done", "by", "redirecting", "victim", "traffic", "through", "a", "malicious", "proxy", "server." ]
[ 16, 16, 16, 16, 1, 9, 9, 16, 16, 5, 13, 13 ]
[ "After", "the", "the", "first", "instance", "of", "BrainTest", "was", "detected", ",", "Google", "removed", "the", "app", "from", "Google", "Play", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 4, 16, 16, 16, 16, 5, 13, 16 ]
[ "After", "collecting", "the", "changed", "PIN", "code", ",", "it", "is", "sent", "back", "to", "the", "C2", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.2B84", "Worm.Esjey", "Win32.Trojan.WisdomEyes.16070401.9500.9938", "Trojan.Win32.CFI.dcbjxv", "Trojan.DownLoader12.30909", "BehavesLike.Win32.BadFile.wh", "Worm:Win32/Esjey.A", "Trojan.Graftor.D299B4", "HEUR/Fakon.mwf", "Virus.Win32.VB" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "PackageInstaller", "shows", "the", "app", "’", "s", "permission", "access", "and", "asks", "for", "the", "user", "'s", "approval", ",", "which", "then", "installs", "the", "application", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "When", "in", "doubt", ",", "check", "the", "APK", "signature", "and", "hash", "in", "sources", "like", "VirusTotal", "before", "installing", "it", "on", "your", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "some", "cases", ",", "the", "decompilation", "process", "will", "fail", ",", "and", "“", "Agent", "Smith", "”", "will", "try", "another", "method", "for", "infecting", "the", "original", "application", "–", "A", "binary", "patch", ",", "which", "simply", "provides", "a", "binary", "file", "of", "the", "“", "boot", "”", "module", "of", "“", "Agent", "Smith", "”", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16 ]
[ "Conclusions", "This", "Trojan", "was", "distributed", "through", "the", "Google", "Play", "Store", "and", "uses", "a", "number", "of", "very", "dangerous", "techniques", ",", "including", "patching", "system", "libraries", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "You", "may", "review", "your", "application", "list", "in", "“", "Settings", "-", ">", "Apps", "”", ",", "if", "you", "find", "one", "of", "this", "applications", ",", "please", "consider", "downloading", "an", "antivirus", "product", "such", "as", "Check", "Point", "ZoneAlarm", "to", "check", "if", "you", "are", "indeed", "infected", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 5, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "PluginPhantom", "is", "a", "new", "class", "of", "Google", "Android", "Trojan:", "it", "is", "the", "first", "to", "use", "updating", "and", "to", "evade", "static", "detection." ]
[ 3, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "encrypted", "body", "is", "composed", "of", "various", "identifiers", "which", "are", "joined", "together", ":", "doFinal", "(", ")", "is", "called", "to", "encrypt", "the", "device", "information", "string", ":", "The", "user", "agent", "string", "is", "built", "from", "the", "package", "name", "and", "IMEI", "number", ":", "Finally", "the", "HTTP", "request", "is", "sent", "to", "the", "server", "at", "https", ":", "//54.71.249.137/eddd0317-2bdc-4140-86cb-0e8d7047b874", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16 ]
[ "Recent", "blogs", "by", "the", "Zscaler", "research", "team", "explain", "how", "some", "variants", "of", "Android", "malware", "are", "exploiting", "the", "popularity", "of", "this", "game", "and", "tricking", "Android", "users", "into", "downloading", "a", "fake", "version", "." ]
[ 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "is", "a", "read", "only", "mode", "which", "can", "help", "end", "users", "remain", "protected", "from", "malicious", "document", "files." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "suspect", "the", "updated", "PIN", "is", "sent", "to", "the", "C2", ",", "most", "likely", "to", "give", "the", "malware", "the", "option", "to", "perform", "privileged", "activities", "on", "the", "infected", "device", "related", "to", "payments", ",", "system", "configuration", "options", ",", "etc", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Although", "the", "current", "target", "list", "is", "limited", "to", "Spanish", "apps", ",", "it", "seems", "that", "the", "actor", "is", "taking", "into", "account", "that", "the", "bot", "should", "also", "be", "able", "to", "target", "other", "countries", ",", "seeing", "that", "the", "path", "used", "in", "the", "inject", "requests", "contains", "the", "country", "code", "of", "the", "targeted", "institution", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "User", "messages", "created", "by", "the", "Trojan", "during", "installation", "typically", "contain", "grammatical", "and", "spelling", "errors", ",", "and", "use", "a", "mixture", "of", "Cyrillic", "and", "Latin", "characters", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "4", ":", "Alert", "prompting", "the", "victim", "to", "download", "an", "Android", "banking", "app", "(", "English", "translation", "below", ")", ",", "with", "stolen", "branding", "and", "fraudulent", "copy", "*", "*", "*", "Translation", "*", "*", "*", "Dear", "Customer", ",", "The", "system", "has", "detected", "that", "the", "Bank", "Austria", "Security", "App", "is", "not", "installed", "on", "your", "smartphone", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 13, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "net", "app", "store", "showing", "the", "current", "DroidVPN", "app", "Virtual", "Private", "Network", "(", "VPN", ")", "tools", "allow", "connections", "to", "remote", "private", "networks", ",", "increasing", "the", "security", "and", "privacy", "of", "the", "user", "’", "s", "communications", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Delf.rdv", "Trojan.Win32.Qhost.afmj", "Trojan.AVKill.28805", "TR/Rogue.kdz.976325", "Trojan/Win32.Qhost", "Trojan.Graftor.D1154C", "Trojan.Win32.Qhost.afmj", "TrojanDownloader:Win32/Qhost.A", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Instead", "of", "implementing", "very", "basic", "gameplay", ",", "the", "authors", "pirated", "and", "repackaged", "the", "original", "game", "in", "their", "app", "and", "bundled", "with", "it", "their", "advertisement", "SDK", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Turla.a", "BKDR64_TURLA.YKV", "Win32.Trojan.WisdomEyes.16070401.9500.9968", "Backdoor.Trojan", "BKDR64_TURLA.YKV", "Win64.Rootkit.Uroburos.A", "Backdoor.Win64.Turla.e", "Trojan.Win64.Turla.dflvfq", "Backdoor.Win64.Turla!c", "Trojan:W64/Turla.B", "BackDoor.Turla.20", "Trojan.Turla.Win64.3", "BDS/Turla.OE", "Backdoor.Win64.Turla.e", "Backdoor.Turla", "Trj/CI.A", "Win64/Turla.A", "Win32.Trojan.Url.Xqlp", "Win32/Trojan.URL.5b6" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Detailed", "Malware", "Structure", "Malware", "Strucutre", "com.mile.brain", "(", "SHA256", ":", "135d6acff3ca27e6e7997429e5f8051f88215d12351e4103f8344cd66611e0f3", ")", ":", "This", "is", "the", "main", "application", "found", "on", "Google", "Play", "." ]
[ 16, 16, 16, 16, 16, 1, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win32.Trojan-Ransom.Cryptolocker.AB", "Trojan.DownLoader25.64138", "W32/Trojan.QFWN-8242", "TR/Injector.pegqr", "Trojan.Graftor.D472BE", "TrojanDownloader:Win32/Zdowbot.B", "Heur.Malware-Cryptor.Filecoder", "Trojan.Win32.Zlader", "W32/Injector.DASN!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Exploit.BypassUAC", "Win.Tool.Win7Elevate-1", "Exploit.Win32.BypassUAC.bfo", "ApplicUnsaf.Win64.Win7Elevate", "Exploit.BypassUAC.Win32.550", "W64/Trojan.SZNL-6335", "Exploit.BypassUAC.ny", "SPR/Welevate.A", "Trojan[Exploit]/Win32.BypassUAC", "HackTool:Win64/Welevate.A", "Exploit.Win32.BypassUAC.bfo", "HackTool/Win32.Win7Elevate.R27568", "Trj/CI.A", "Win32.Exploit.Bypassuac.Dyqu", "Trojan.Win32.Webprefix" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Randex.B@mm", "Backdoor.IRCBot", "W32/Randex.worm.B", "Win32.Trojan.WisdomEyes.16070401.9500.9811", "W32/Randex.B", "W32.Randex", "Win32/Lioten.F", "Win.Worm.Randex-2", "Worm.Win32.Randex.b", "Win32.Randex.B@mm", "Trojan.Win32.Randex.glyj", "W32.W.Randex.b!c", "Win32.Worm.Randex.Ajbc", "Win32.Randex.B@mm", "Worm.Win32.Randex.B", "Win32.Randex.B@mm", "Win32.HLLW.Randex.45056", "Worm.Randex.Win32.3", "BehavesLike.Win32.PWSZbot.lc", "W32/Randex.B", "Worm/Randex.b", "Worm/Win32.Randex", "Win32.Randex.E2C45E", "Worm.Win32.Randex.18432", "Worm.Win32.Randex.b", "Worm:Win32/Randex.FN", "Trojan/Win32.HDC.C82152", "Win32.Randex.B@mm", "Backdoor.IRCBot", "Worm.Randex", "Win32/Randex.B", "Worm.Win32.Randex!jlps7ds/blM", "W32/Randex.B!worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "combination", "of", "these", "capabilities", "makes", "JSocket", "a", "unique", "and", "serious", "threat", "to", "the", "electronic", "and", "physical", "security", "of", "victims." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 3, 16, 16, 4, 16, 4, 12, 12, 12 ]
[ "The", "EternalBlue", "exploit", "MS017-010", "was", "initially", "used", "by", "WannaCry", "ransomware", "and", "Adylkuzz", "cryptocurrency", "miner." ]
[ 3, 11, 11, 1, 16, 16, 16, 16, 3, 11, 16, 3, 11, 11 ]
[ "SELECTED", "SAMPLES", "Package", "Name", "SHA-256", "Digest", "com.rabbit.artcamera", "18c277c7953983f45f2fe6ab4c7d872b2794c256604e43500045cb2b2084103f", "org.horoscope.astrology.predict", "6f1a1dbeb5b28c80ddc51b77a83c7a27b045309c4f1bff48aaff7d79dfd4eb26", "com.theforest.rotatemarswallpaper", "4e78a26832a0d471922eb61231bc498463337fed8874db5f70b17dd06dcb9f09", "com.jspany.temp", "0ce78efa764ce1e7fb92c4de351ec1113f3e2ca4b2932feef46d7d62d6ae87f5", "com.hua.ru.quan", "780936deb27be5dceea20a5489014236796a74cc967a12e36cb56d9b8df9bc86", "com.rongnea.udonood", "8b2271938c524dd1064e74717b82e48b778e49e26b5ac2dae8856555b5489131", "com.mbv.a.wp", "01611e16f573da2c9dbc7acdd445d84bae71fecf2927753e341d8a5652b89a68", "com.pho.nec.sg", "b4822eeb71c83e4aab5ddfecfb58459e5c5e10d382a2364da1c42621f58e119b", "Exobot", "(", "Marcher", ")", "-", "Android", "banking", "Trojan", "on", "the", "rise", "February", "2017", "Introduction", "The", "past", "months", "many", "different", "banking", "Trojans", "for", "the", "Android", "platform", "have", "received", "media", "attention", "." ]
[ 16, 16, 16, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 3, 16, 3, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FilodasD.Trojan", "Backdoor/W32.Small.19968.AH", "Backdoor.Win32.Small!O", "Trojan.Downloader.slowblog", "Backdoor/Small.klk", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win.Trojan.Small-13891", "Backdoor.Win32.Small.klk", "Trojan.Win32.Small.reykq", "Backdoor.Win32.A.Small.19968", "Backdoor.W32.Small.klk!c", "Trojan.DownLoad2.37573", "Backdoor.Small.Win32.7582", "BehavesLike.Win32.Downloader.lm", "Backdoor/Small.hcp", "W32/Cowsid.A!tr", "Trojan[Backdoor]/Win32.Small", "Win32.Hack.Small.kcloud", "Trojan.Heur.RP.E95DD0", "Backdoor.Win32.Small.klk", "TrojanDownloader:Win32/Coswid.A", "Downloader/Win32.Small.C65823", "Backdoor.Small", "Win32/TrojanDownloader.Coswid.A", "Backdoor.Small!nWa7meIxFMI", "Trojan-Downloader.Win32.Small" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Udsdangerousobject.Multi", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "BackDoor.Bulknet.780", "W32/Trojan.JPON-8649", "TrojanDropper:Win32/Insup.A", "Win32.Trojan.Spnr.Afhv", "Win32/Trojan.9d8" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "July", "11", "Two", "new", "Flash", "zero-day", "vulnerabilities", ",", "CVE-2015-5122", "and", "CVE-2015-5123", ",", "were", "found", "in", "the", "hacking", "team", "dump", "." ]
[ 16, 16, 16, 16, 7, 15, 15, 16, 7, 16, 7, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "230", "[", "." ]
[ 9, 9, 9, 9 ]
[ "However", ",", "we", "have", "noted", "a", "significantly", "small", "number", "of", "downloads", "of", "the", "app", "in", "Pakistan", ",", "India", ",", "Afghanistan", ",", "Bangladesh", ",", "Iran", ",", "Saudi", "Arabia", ",", "Austria", ",", "Romania", ",", "Grenada", ",", "and", "Russia", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.DownLoader25.45618", "Trojan:Win32/Relnicar.A!dha", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "Ahnlab", "is", "a", "popular", "antivirus", "software", "in", "South", "Korea." ]
[ 4, 16, 16, 5, 13, 13, 16, 2, 10 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Ransom.Cerber.1", "Trojan.Ransom.Cerber.1", "Trojan.Dropper", "Trojan.Ransom.Cerber.1", "Ransom_HPCERBER.SMALY5A", "Win32.Trojan.Kryptik.anp", "Ransom_HPCERBER.SMALY5A", "Trojan.Ransom.Cerber.1", "Trojan.Ransom.Cerber.1", "Trojan.Ransom.Cerber.1", "Trojan.Ransom.Cerber.1", "Trojan.Ssebot.2", "BehavesLike.Win32.Dropper.vc", "Spammer:Win32/Rowdab.A", "Trj/GdSda.A", "W32/Kryptik.EXLK!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "But", ",", "as", "we", "have", "already", "mentioned", ",", "the", "criminals", "could", "easily", "turn", "their", "attention", "to", "users", "in", "other", "countries", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "After", "the", "checks", ",", "the", "malware", "becomes", "active", ",", "but", "first", ",", "it", "goes", "through", "seven", "steps", ",", "each", "one", "calling", "a", "different", "command", ":", "uploadPhoneNumbers", ":", "Exfiltrates", "all", "phone", "numbers", "that", "are", "in", "the", "contact", "list", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "themes", "of", "the", "messages", "used", "in", "the", "attacks", "are", "related", "to", "IT", "Infrastructure", "such", "as", "a", "log", "of", "Server", "Status", "Report", "or", "a", "list", "of", "Cisco", "Iron", "Port", "Appliance", "details." ]
[ 16, 1, 16, 16, 1, 16, 16, 16, 1, 16, 16, 16, 5, 13, 16, 16, 16, 1, 9, 9, 9, 9, 16, 1, 9, 9, 9, 9, 9, 9, 9 ]
[ "Last", "week", "on", "October", "7,", "Raytheon", "|", "Websense®", "Security", "Labs™", "noticed", "an", "interesting", "email", "campaign", "distributing", "what", "at", "first", "appeared", "to", "be", "Dridex", "botnet", "220." ]
[ 16, 16, 16, 0, 8, 4, 16, 12, 12, 12, 16, 16, 16, 6, 14, 16, 16, 3, 16, 16, 16, 16, 3, 11, 11 ]
[ "]", "comaccount-manager", "[", "." ]
[ 16, 16, 16, 16 ]