tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"The",
"main",
"goal",
"of",
"this",
"malware",
"is",
"to",
"steal",
"banking",
"credentials",
"from",
"the",
"victim's",
"device."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
1,
9,
9,
16,
5,
13,
13
] |
[
"]",
"759383",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"So",
",",
"users",
"should",
"beware",
"of",
"certain",
"modified",
"Android",
"firmware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"Honkbox",
"is",
"an",
"active",
"threat",
"with",
"at",
"least",
"three",
"variants",
"and",
"multiple",
"components,",
"some",
"of",
"which",
"have",
"not",
"been",
"previously",
"documented."
] | [
3,
16,
16,
3,
11,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9985",
"Infostealer.Limitail",
"TSPY_INFILOG.SM",
"TSPY_INFILOG.SM",
"TrojanSpy:MSIL/Grieftylo.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"The",
"iOS",
"and",
"Android",
"apps",
"for",
"Netflix",
"are",
"enormously",
"popular",
",",
"effectively",
"turning",
"a",
"mobile",
"device",
"into",
"a",
"television",
"with",
"which",
"users",
"can",
"stream",
"full",
"movies",
"and",
"TV",
"programs",
"anytime",
",",
"anywhere",
"."
] | [
16,
5,
16,
5,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"actor",
"responsible",
"for",
"this",
"campaign",
"utilized",
"legitimate",
"digital",
"certificates",
"to",
"sign",
"their",
"tools",
"and",
"employed",
"innovative",
"techniques",
"to",
"cloak",
"their",
"command",
"and",
"control",
"traffic."
] | [
16,
6,
16,
16,
16,
6,
16,
1,
9,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.TonersyASC.Trojan",
"Ransom/W32.Dcryptor.2415104",
"Ransom.Mambretor.A5",
"Trojan.Dcryptor.Win32.2",
"Troj.Ransom.W32.Dcryptor.toNk",
"Trojan/Filecoder.DCryptor.b",
"Win32.Trojan.WisdomEyes.16070401.9500.9975",
"W32/HDD_Cryptor.A!Eldorado",
"Ransom.HDDCryptor",
"Win.Ransomware.HDDCryptor-2",
"Win32.Trojan-Ransom.Mamba.A",
"Trojan-Ransom.Win32.Dcryptor.b",
"Trojan.Win32.Filecoder.elaurk",
"Trojan.Win32.Z.Dcryptor.2415104",
"Tool.PassView.841",
"Ransom_HDDCRYPTOR.SM",
"Trojan-Ransom.Mamba",
"W32/HDD_Cryptor.A!Eldorado",
"Trojan.Dcryptor.a",
"TR/FileCoder.rrsau",
"Trojan[Ransom]/Win32.Blocker",
"Trojan.Ransom.HDDCrypt.1",
"Trojan-Ransom.Win32.Dcryptor.b",
"Ransom:Win32/Mambretor.A",
"Trojan/Win32.Dcryptor.C1564580",
"Hoax.Dcryptor",
"Ransom.HDDCryptor",
"Trj/CI.A",
"Win32/Filecoder.DCryptor.B",
"Win32/Trojan.f14"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"packer",
",",
"besides",
"making",
"the",
"static",
"analysis",
"more",
"complex",
",",
"will",
"break",
"the",
"standard",
"debugger",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"These",
"attackers",
"have",
"used",
"additional",
"malware",
"families",
"in",
"previous",
"activity",
"dating",
"to",
"at",
"least",
"2015",
"that",
"include",
"PlugX",
",",
"Zupdax",
",",
"9002",
",",
"and",
"Poison",
"Ivy",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
16,
3,
16,
16,
3,
11,
16
] |
[
"Disturbingly",
",",
"the",
"malware",
"establishes",
"a",
"rootkit",
"on",
"the",
"device",
",",
"allowing",
"it",
"to",
"download",
"and",
"execute",
"any",
"code",
"a",
"cybercriminal",
"would",
"want",
"to",
"run",
"on",
"a",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.DL.Banload!wDurcHh4EfA",
"Spyware.Keylogger",
"TROJ_BANLOAD.AET",
"Win32.TRCrypt.Fkm",
"PUA.Packed.PECompact-1",
"Trojan-Downloader.Win32.Banload.blpr",
"Trojan-Spy.Win32.Bancos!IK",
"Trojan.DownLoader3.52680",
"TROJ_BANLOAD.AET",
"TrojanDownloader.Banload.awii",
"Downloader/Win32.Banload",
"TrojanDownloader.Banload.blmr",
"Spyware.Keylogger!rem",
"Trojan-Spy.Win32.Bancos",
"W32/Banload.BLPR!tr.dldr",
"Downloader.Banload.BKYW"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Pugeju",
"Trojan.Win32.Crypt.raab",
"TrojWare.Win32.Inject.~AT",
"BehavesLike.Win32.PUPXAC.lm",
"Trojan-GameThief.Win32.OnLineGames",
"Trojan/Crypt.acz",
"Trojan/Win32.Invader",
"Trj/CI.A",
"Win32/Obfuscated.NBX",
"Win32/Trojan.be7"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Beaugrit.S16628",
"Trojan/Spy.Shiz.ncd",
"Win32.Trojan-Spy.Shiz.b",
"Backdoor.Trojan",
"HT_SIMDA_GA310E71.UVPM",
"Trojan.Win32.Ibank.vuhyo",
"TrojWare.Win32.Spy.Shiz.ZV",
"Trojan.PWS.Ibank.373",
"Trojan.Shiz.Win32.571",
"HT_SIMDA_GA310E71.UVPM",
"BehavesLike.Win32.Backdoor.fh",
"TR/BAS.Dorkbot.20619344",
"Trojan.Zusy.Elzob.D21CE",
"PWS:Win32/Simda.K",
"Win32/Spy.Shiz.NCD",
"TrojanSpy.Shiz!qC77/NFCWBg",
"Backdoor.Win32.Simda",
"W32/Shiz.NCD!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"cause",
"for",
"this",
"uptick",
"appears",
"due",
"to",
"widespread",
"WordPress",
"site",
"compromises."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clodfd4.Trojan.50bd",
"Spyware.PasswordStealer",
"TROJ_FRS.0NA000J416",
"TROJ_FRS.0NA000J416",
"Trojan.Win32.Z.Securityxploded.418304[h]",
"BehavesLike.Win32.PWSZbot.gh",
"W32/Trojan.ZJJQ-6216",
"Unwanted/Win32.Passview.C1588969",
"Riskware.Win32.PassDumper",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"malware",
"abuses",
"the",
"Android",
"accessibility",
"feature",
"to",
"steal",
"user",
"information",
"and",
"is",
"able",
"to",
"update",
"its",
"code",
"and",
"release",
"new",
"features",
"every",
"few",
"days",
"."
] | [
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Cloda21.Trojan.c461",
"DLoader.QYW",
"Win32/SillyDl.ACS",
"Trojan.Win32.A.Downloader.146388",
"Trojan.DownLoader.6702",
"BehavesLike.Win32.Downloader.cm",
"TrojanDownloader:Win32/Pusrac.A",
"Trojan.Win32.Downloader.AE"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Late",
"in",
"the",
"summer",
"of",
"2016,",
"CrowdStrike",
"Intelligence",
"analysts",
"began",
"investigating",
"a",
"curious",
"Android",
"Package",
"APK",
"named",
"Попр-Д30.apk'",
"which",
"contained",
"a",
"number",
"of",
"Russian",
"language",
"artifacts",
"that",
"were",
"military",
"in",
"nature."
] | [
16,
16,
16,
16,
16,
0,
4,
12,
12,
16,
16,
16,
16,
5,
13,
13,
16,
3,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9
] |
[
"This",
"malware",
"gives",
"attackers",
"an",
"avenue",
"into",
"internal",
"networks",
"which",
"compromised",
"devices",
"are",
"connected",
"to—a",
"notable",
"risk",
"if",
"the",
"device",
"is",
"used",
"to",
"connect",
"to",
"company",
"networks."
] | [
16,
3,
16,
6,
16,
16,
16,
5,
13,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
5,
13
] |
[
"In",
"some",
"samples",
",",
"starting",
"from",
"January",
"2016",
",",
"an",
"algorithm",
"has",
"been",
"implemented",
"for",
"unpacking",
"the",
"encrypted",
"executable",
"DEX",
"file",
"from",
"the",
"assets",
"folder",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Combining",
"timebombs",
",",
"dynamic",
"code",
"loading",
",",
"and",
"use",
"of",
"reflection",
"to",
"complicate",
"reverse",
"engineering",
"of",
"the",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Trojan",
"may",
"perform",
"a",
"man-in-the-middle",
"MitM",
"attack",
"on",
"the",
"browser",
"installed",
"on",
"the",
"compromised",
"computer."
] | [
16,
3,
16,
16,
1,
9,
9,
9,
16,
5,
13,
16,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9670",
"Backdoor.Felismus",
"Trojan/Win32.Skeeyah.C1905486",
"Trj/GdSda.A",
"Trojan.Win32.Tomyjery"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.VBKrypt.208896.AN",
"Trojan.Win32.VBKrypt!O",
"WORM_VOBFUS.SMIA",
"Trojan.Packed.21297",
"WORM_VOBFUS.SMIA",
"Trojan.Barys.266",
"Trojan/Win32.VBKrypt.R2844",
"Worm.Win32.Vobfus"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Beginning",
"in",
"July",
"2015",
"and",
"possibly",
"earlier,",
"the",
"attack",
"continued",
"into",
"August",
"and",
"is",
"currently",
"ongoing."
] | [
0,
8,
8,
8,
16,
16,
16,
16,
16,
16,
16,
0,
16,
16,
16,
16
] |
[
"This",
"mistake",
"in",
"operational",
"security",
"allowed",
"us",
"to",
"gain",
"visibility",
"into",
"exfiltrated",
"content",
"for",
"a",
"number",
"of",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Constructor.Macro.Ultras.A",
"Constructor.Win32.Ultras.10!O",
"WM/Uck.kit",
"Constructor.W32.Ultras!c",
"Trojan/Constructor.Ultras.10.a",
"Trojan.Constructor.Macro.Ultras.A",
"Ultras.Kit",
"Win.Tool.Macro-8",
"Trojan.Constructor.Macro.Ultras.A",
"Constructor.Win32.Ultras.10.a",
"Trojan.Constructor.Macro.Ultras.A",
"Riskware.Win32.Ultras-10.hpwc",
"Trojan.Constructor.Macro.Ultras.A",
"Constructor.Macro.Ultras.A",
"Trojan.Constructor.Macro.Ultras.A",
"VirusConstructor.Ultras.2",
"Tool.Ultras.Win32.1",
"WM/Uck.kit",
"W32/Tool.QHJM-3031",
"Constructor.Macro.Ultras.10",
"TR/ConKit.UltrasUck",
"Constructor.Win32.Ultras.10.a",
"HackTool/Win32.Constructor.C218755",
"Trojan.Constructor.Macro.Ultras.A",
"Constructor.Ultras",
"Win32.Trojan.Ultras.Pegg",
"Constructor.Win32.Ultras",
"Win32/Trojan.5bd"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Worm.Stration.D",
"Win32.Worm.Stration.D",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win32.Worm.Stration.D",
"Email-Worm.Win32.Warezov.k",
"Win32.Worm.Stration.D",
"Win32.Worm.Stration.D",
"Heur.Packed.Unknown",
"Win32.Worm.Stration.D",
"Win32.HLLM.Limar",
"Backdoor.Win32.IRCBot",
"Trojan:Win32/Stration.K",
"Win32.Worm.Stration.D",
"Email-Worm.Win32.Warezov.k"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Recently,",
"we",
"detected",
"Carbanak",
"campaigns",
"attempting",
"to:Target",
"high",
"level",
"executives",
"in",
"financial",
"companies",
"or",
"in",
"financial/decision-making",
"roles",
"in",
"the",
"Middle",
"East,",
"U.S.",
"and",
"Europe",
",Spear-phishing",
"emails",
"delivering",
"URLs,",
"macro",
"documents,",
"exploit",
"documents,Use",
"of",
"Spy.Sekur",
"Carbanak",
"malware",
"and",
"commodity",
"remote",
"access",
"Trojans",
"RATs",
"such",
"as",
"jRAT,",
"Netwire,",
"Cybergate",
"and",
"others",
"used",
"in",
"support",
"of",
"operations."
] | [
16,
16,
16,
6,
14,
16,
16,
4,
12,
12,
12,
12,
12,
16,
16,
4,
12,
16,
2,
10,
10,
10,
16,
2,
1,
9,
9,
9,
9,
9,
9,
9,
16,
3,
11,
11,
16,
3,
11,
11,
11,
11,
16,
16,
3,
11,
11,
16,
16,
16,
16,
6,
14,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.QueryexXAAF.Worm",
"Application.Hacktool.AW",
"Worm.Win32.Zombaque!O",
"Worm.Zombaque.A3",
"WORM_BIZOME.SMD",
"W32.Spybot.Worm",
"Win32/Zombaque.A",
"WORM_BIZOME.SMD",
"Win.Worm.Zombaque-12",
"Application.Hacktool.AW",
"Worm.Win32.Zombaque.a",
"Application.Hacktool.AW",
"Trojan.Win32.Zombaque.bzuxu",
"Worm.Win32.Zombaque.318464.A",
"Application.Hacktool.AW",
"Application.Hacktool.AW",
"Win32.HLLW.RAhack",
"Worm.Zombaque.Win32.2",
"BehavesLike.Win32.Sality.fc",
"Worm.Win32.Zombaque",
"Worm/Zombaque.l",
"Worm/Win32.Zombaque",
"Worm:Win32/Zombaque.A",
"Application.Hacktool.AW",
"Worm.Win32.Zombaque.a",
"Worm/Win32.Zombaque.R3338",
"Worm.Zombaque",
"Win32/Zombaque.A",
"Worm.Win32.Zombaque.a",
"Worm.Zombaque!23w9coTlBlo",
"W32/Zombaque.A.worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Figure",
"12",
"."
] | [
16,
16,
16
] |
[
"VERSIONING",
"Bread",
"has",
"also",
"leveraged",
"an",
"abuse",
"tactic",
"unique",
"to",
"app",
"stores",
":",
"versioning",
"."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"a",
"quick",
"Google",
"search",
"you",
"can",
"find",
"practically",
"anything",
"you",
"need",
"to",
"know."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Wdfload.89",
"Trojan.Win64.Wdfload",
"Trojan.Wdfload.cqq",
"TR/Wdfload.slana",
"Trojan/Win64.Wdfload",
"Trojan/Win64.Wdfload.C2364123",
"Trj/CI.A",
"W32/Wdfload.AA!tr",
"Win32/Trojan.bfd"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Downloader",
"Win32.Trojan.WisdomEyes.16070401.9500.9691",
"Trojan-Downloader.Win32.Injecter.vxy",
"BehavesLike.Win32.PWSZbot.fc",
"W32/Trojan.SBIX-6310",
"Trojan.Heur.TP.E5F612",
"Trojan-Downloader.Win32.Injecter.vxy",
"Trj/CI.A",
"Win32/Trojan.03f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Pandex",
"Heur.Packed.Unknown",
"Trojan.DownLoad.3750",
"Heuristic.LooksLike.Win32.Morphine.I",
"VirTool:Win32/Obfuscator.EK",
"Voronezh.1600.A",
"Packed.Morphine.C",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"threat",
"actor",
"leveraged",
"the",
"CVE-2017-0199",
"Microsoft",
"Word",
"Office/WordPad",
"Remote",
"Code",
"Execution",
"Vulnerability",
"with",
"carefully",
"crafted",
"decoy",
"content",
"customized",
"for",
"each",
"target",
"recipient."
] | [
6,
14,
14,
16,
16,
1,
7,
15,
15,
15,
15,
15,
15,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"first",
"stage",
"would",
"be",
"a",
"malicious",
"link",
"within",
"the",
"e-mail",
"or",
"attachment,",
"containing",
"malicious",
"code,",
"in",
"this",
"case",
"Pony."
] | [
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
1,
16,
1,
9,
9,
9,
16,
16,
16,
3
] |
[
"Mobile",
"app",
"creators",
"are",
"often",
"looking",
"for",
"ways",
"to",
"monetize",
"their",
"software."
] | [
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
5
] |
[
"The",
"attackers",
"deliver",
"malware",
"through",
"topically",
"titled",
"spearphises,",
"for",
"example",
"Energy_Data_Meeting_fall_2016."
] | [
16,
6,
16,
16,
16,
16,
16,
1,
16,
16,
1
] |
[
"The",
"source",
"code",
"for",
"Linux.Mirai",
"bot",
"was",
"released",
"a",
"few",
"weeks",
"ago."
] | [
16,
16,
16,
16,
1,
3,
16,
16,
16,
0,
8,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Graftor.D27EA8",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"BehavesLike.Win32.Expiro.hc",
"Trojan.Win32.Scar",
"TrojanDropper:Win32/Binko.A",
"W32/Cbot.NCN!tr.bdr",
"Win32/Trojan.Dropper.007"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"PureCrypter",
"campaign",
"uses",
"the",
"domain",
"of",
"a",
"compromised",
"non-profit",
"organization",
"as",
"a",
"Command",
"and",
"Control",
"C2",
"to",
"deliver",
"a",
"secondary",
"payload."
] | [
6,
14,
14,
16,
16,
1,
16,
16,
1,
4,
12,
16,
16,
1,
9,
9,
9,
16,
16,
16,
3,
11
] |
[
"Despite",
"recent",
"progress,",
"the",
"country",
"is",
"subject",
"to",
"ongoing",
"conflict",
"with",
"ethnic",
"rebels",
"and",
"an",
"ongoing",
"civil",
"war."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"code",
"snippet",
"below",
"shows",
"part",
"of",
"the",
"screen",
"parsing",
"process",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"data",
",",
"when",
"analyzed",
"with",
"the",
"number",
"of",
"commands",
"to",
"send",
"SMSs",
"that",
"Talos",
"received",
"during",
"the",
"investigation",
",",
"lead",
"us",
"to",
"conclude",
"that",
"the",
"malicious",
"operator",
"is",
"aggressively",
"spreading",
"the",
"malware",
",",
"but",
"that",
"does",
"n't",
"seem",
"to",
"result",
"in",
"the",
"same",
"number",
"of",
"new",
"infections",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Bancodor.482816",
"Backdoor/Bancodor.b",
"BKDR_BADCODOR.A",
"W32/Bancodor.C@bd",
"Backdoor.Badcodor",
"Win32/PSWSpider.G",
"BKDR_BADCODOR.A",
"Win.Trojan.Bancodor-22",
"Backdoor.Win32.Bancodor.b",
"Trojan.Win32.Bancodor.fzet",
"Backdoor.Win32.A.Bancodor.455260",
"Backdoor.Win32.Bancodor.~B",
"Trojan.Bancdo",
"Backdoor.Bancodor.Win32.150",
"W32/Bancodor.NOXQ-3353",
"Backdoor/Bancodor.b",
"BDS/Badcodor.B.6",
"Trojan[Backdoor]/Win32.Bancodor",
"Win32.Hack.Bancodor.b.kcloud",
"Backdoor:Win32/Badcodor.B",
"Backdoor.W32.Bancodor.b!c",
"Backdoor.Win32.Bancodor.b",
"Backdoor/Win32.Bancodor.R145952",
"Backdoor.Bancodor",
"Win32/Bancodor.B",
"Backdoor.Badcodor.A",
"Backdoor.Win32.Bancodor",
"Bck/Bancodor.I"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Trojan",
"drops",
"a",
"PowerPoint",
"presentation",
"that",
"contains",
"details",
"about",
"the",
"2nd",
"Myanmar",
"Industrial",
"Human",
"Resource",
"Development",
"Symposium."
] | [
16,
3,
16,
16,
1,
9,
16,
16,
1,
16,
16,
1,
9,
9,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Rincux.AV",
"Trojan.Rincux.AV",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"TROJ_DLOAD.KKK",
"Trojan.Rincux.AV",
"Trojan.Rincux.AV",
"BackDoor.Attack.594",
"TROJ_DLOAD.KKK",
"Backdoor/Ceckno.awl",
"W32/Downloader.L",
"Trojan.Rincux.AV",
"Trojan.Rincux.AV",
"Backdoor.Ceckno!6jtmdMg8Vqs",
"Virus.Win32.Small"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Recently,",
"TrendMicro",
"uncovered",
"a",
"new",
"cyber-espionage",
"attack",
"by",
"a",
"well-funded",
"and",
"organized",
"group",
"targeting",
"companies",
"close",
"to",
"governments",
"and",
"in",
"key",
"industries",
"mostly",
"in",
"Asia."
] | [
16,
4,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
6,
16,
4,
16,
16,
4,
16,
16,
11,
4,
16,
16,
2
] |
[
"The",
"sample",
"has",
"a",
"multicomponent",
"structure",
"and",
"can",
"download",
"a",
"payload",
"or",
"updates",
"from",
"its",
"C",
"&",
"C",
"server",
",",
"which",
"happens",
"to",
"be",
"an",
"FTP",
"server",
"belonging",
"to",
"the",
"free",
"Russian",
"web",
"hosting",
"service",
"Ucoz",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32/AutoRun.Delf.RF",
"Trojan.Win32.Autoruner2.czfwpa",
"Win32.HLLW.Autoruner2.13746",
"BehavesLike.Win32.Dropper.dc",
"Trojan.Graftor.D22611",
"Worm:Win32/Kerm.A",
"Worm/Win32.AutoRun.C332941",
"Win32.Worm.Autorun.Wted",
"Worm.Win32.Kerm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Trojans",
"designed",
"to",
"steal",
"money",
"from",
"bank",
"accounts",
"pose",
"a",
"serious",
"threat",
"to",
"Android",
"users."
] | [
16,
3,
16,
16,
1,
9,
16,
4,
12,
16,
16,
1,
9,
16,
5,
13
] |
[
"Sending",
"the",
"command",
"sh",
"to",
"TCP",
"port",
"6200",
"results",
"in",
"a",
"full",
"terminal",
"being",
"dropped",
":",
"Sending",
"the",
"command",
"cmd",
"followed",
"by",
"a",
"proper",
"terminal",
"command",
"will",
"execute",
"it",
"and",
"print",
"the",
"output",
"(",
"in",
"the",
"example",
"we",
"use",
"id",
"which",
"displays",
"the",
"identity",
"of",
"the",
"system",
"user",
"running",
"the",
"issued",
"commands",
")",
":",
"Doing",
"the",
"same",
"as",
"above",
"but",
"with",
"command",
"sucmd",
"will",
"run",
"the",
"terminal",
"command",
"as",
"root",
":",
"Other",
"commands",
"supported",
"by",
"rootdaemon",
"on",
"TCP",
"port",
"6200",
"are",
"su",
"(",
"which",
"in",
"our",
"tests",
"did",
"n't",
"properly",
"work",
")",
",",
"loadsocketpolicy",
",",
"loadfilepolicy",
",",
"remount",
"and",
"removeroot",
"."
] | [
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"this",
"case",
",",
"we",
"can",
"see",
"that",
"the",
"HTML",
"code",
"of",
"the",
"overlay",
"is",
"stored",
"in",
"the",
"C2",
"infrastructure",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Razy.D10C13",
"Trojan-Downloader.Win32.Sysdrop.am",
"Trojan.Win32.Z.Sysdrop.598528",
"Troj.Downloader.W32!c",
"Trojan.DownLoader22.41648",
"Adware.BrowseFox.Win32.397064",
"W32/Trojan.VFXM-3248",
"TrojanDownloader.Sysdrop.h",
"BDS/Ananlog.okrph",
"Trojan[Downloader]/Win32.Sysdrop",
"Backdoor:Win32/Ananlog.A",
"Trojan-Downloader.Win32.Sysdrop.am",
"Trj/GdSda.A",
"Win32.Trojan-downloader.Sysdrop.Eok",
"Trojan.DL.Sysdrop!",
"Win32/Backdoor.773"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.LethicKAAB.Trojan",
"Trojan.VB",
"Win32.Trojan.VB.bj",
"Trojan.KillFiles.29071",
"BehavesLike.Win32.VBObfus.cm",
"Trojan.Win32.VB",
"Trojan.Ursu.DFEE",
"TScope.Trojan.VB",
"Win32/VB.OCY",
"Win32/Worm.VB.X"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Similar",
"to",
"previous",
"malware",
"which",
"infiltrated",
"Google",
"Play",
",",
"such",
"as",
"FalseGuide",
"and",
"Skinner",
",",
"Judy",
"relies",
"on",
"the",
"communication",
"with",
"its",
"Command",
"and",
"Control",
"server",
"(",
"C",
"&",
"C",
")",
"for",
"its",
"operation",
"."
] | [
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
3,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"is",
"done",
"by",
"redirecting",
"victim",
"traffic",
"through",
"a",
"malicious",
"proxy",
"server."
] | [
16,
16,
16,
16,
1,
9,
9,
16,
16,
5,
13,
13
] |
[
"After",
"the",
"the",
"first",
"instance",
"of",
"BrainTest",
"was",
"detected",
",",
"Google",
"removed",
"the",
"app",
"from",
"Google",
"Play",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
4,
16,
16,
16,
16,
5,
13,
16
] |
[
"After",
"collecting",
"the",
"changed",
"PIN",
"code",
",",
"it",
"is",
"sent",
"back",
"to",
"the",
"C2",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.2B84",
"Worm.Esjey",
"Win32.Trojan.WisdomEyes.16070401.9500.9938",
"Trojan.Win32.CFI.dcbjxv",
"Trojan.DownLoader12.30909",
"BehavesLike.Win32.BadFile.wh",
"Worm:Win32/Esjey.A",
"Trojan.Graftor.D299B4",
"HEUR/Fakon.mwf",
"Virus.Win32.VB"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"PackageInstaller",
"shows",
"the",
"app",
"’",
"s",
"permission",
"access",
"and",
"asks",
"for",
"the",
"user",
"'s",
"approval",
",",
"which",
"then",
"installs",
"the",
"application",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"When",
"in",
"doubt",
",",
"check",
"the",
"APK",
"signature",
"and",
"hash",
"in",
"sources",
"like",
"VirusTotal",
"before",
"installing",
"it",
"on",
"your",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"some",
"cases",
",",
"the",
"decompilation",
"process",
"will",
"fail",
",",
"and",
"“",
"Agent",
"Smith",
"”",
"will",
"try",
"another",
"method",
"for",
"infecting",
"the",
"original",
"application",
"–",
"A",
"binary",
"patch",
",",
"which",
"simply",
"provides",
"a",
"binary",
"file",
"of",
"the",
"“",
"boot",
"”",
"module",
"of",
"“",
"Agent",
"Smith",
"”",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16
] |
[
"Conclusions",
"This",
"Trojan",
"was",
"distributed",
"through",
"the",
"Google",
"Play",
"Store",
"and",
"uses",
"a",
"number",
"of",
"very",
"dangerous",
"techniques",
",",
"including",
"patching",
"system",
"libraries",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"You",
"may",
"review",
"your",
"application",
"list",
"in",
"“",
"Settings",
"-",
">",
"Apps",
"”",
",",
"if",
"you",
"find",
"one",
"of",
"this",
"applications",
",",
"please",
"consider",
"downloading",
"an",
"antivirus",
"product",
"such",
"as",
"Check",
"Point",
"ZoneAlarm",
"to",
"check",
"if",
"you",
"are",
"indeed",
"infected",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
5,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"PluginPhantom",
"is",
"a",
"new",
"class",
"of",
"Google",
"Android",
"Trojan:",
"it",
"is",
"the",
"first",
"to",
"use",
"updating",
"and",
"to",
"evade",
"static",
"detection."
] | [
3,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"encrypted",
"body",
"is",
"composed",
"of",
"various",
"identifiers",
"which",
"are",
"joined",
"together",
":",
"doFinal",
"(",
")",
"is",
"called",
"to",
"encrypt",
"the",
"device",
"information",
"string",
":",
"The",
"user",
"agent",
"string",
"is",
"built",
"from",
"the",
"package",
"name",
"and",
"IMEI",
"number",
":",
"Finally",
"the",
"HTTP",
"request",
"is",
"sent",
"to",
"the",
"server",
"at",
"https",
":",
"//54.71.249.137/eddd0317-2bdc-4140-86cb-0e8d7047b874",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16
] |
[
"Recent",
"blogs",
"by",
"the",
"Zscaler",
"research",
"team",
"explain",
"how",
"some",
"variants",
"of",
"Android",
"malware",
"are",
"exploiting",
"the",
"popularity",
"of",
"this",
"game",
"and",
"tricking",
"Android",
"users",
"into",
"downloading",
"a",
"fake",
"version",
"."
] | [
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"is",
"a",
"read",
"only",
"mode",
"which",
"can",
"help",
"end",
"users",
"remain",
"protected",
"from",
"malicious",
"document",
"files."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"suspect",
"the",
"updated",
"PIN",
"is",
"sent",
"to",
"the",
"C2",
",",
"most",
"likely",
"to",
"give",
"the",
"malware",
"the",
"option",
"to",
"perform",
"privileged",
"activities",
"on",
"the",
"infected",
"device",
"related",
"to",
"payments",
",",
"system",
"configuration",
"options",
",",
"etc",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Although",
"the",
"current",
"target",
"list",
"is",
"limited",
"to",
"Spanish",
"apps",
",",
"it",
"seems",
"that",
"the",
"actor",
"is",
"taking",
"into",
"account",
"that",
"the",
"bot",
"should",
"also",
"be",
"able",
"to",
"target",
"other",
"countries",
",",
"seeing",
"that",
"the",
"path",
"used",
"in",
"the",
"inject",
"requests",
"contains",
"the",
"country",
"code",
"of",
"the",
"targeted",
"institution",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"User",
"messages",
"created",
"by",
"the",
"Trojan",
"during",
"installation",
"typically",
"contain",
"grammatical",
"and",
"spelling",
"errors",
",",
"and",
"use",
"a",
"mixture",
"of",
"Cyrillic",
"and",
"Latin",
"characters",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"4",
":",
"Alert",
"prompting",
"the",
"victim",
"to",
"download",
"an",
"Android",
"banking",
"app",
"(",
"English",
"translation",
"below",
")",
",",
"with",
"stolen",
"branding",
"and",
"fraudulent",
"copy",
"*",
"*",
"*",
"Translation",
"*",
"*",
"*",
"Dear",
"Customer",
",",
"The",
"system",
"has",
"detected",
"that",
"the",
"Bank",
"Austria",
"Security",
"App",
"is",
"not",
"installed",
"on",
"your",
"smartphone",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
13,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"net",
"app",
"store",
"showing",
"the",
"current",
"DroidVPN",
"app",
"Virtual",
"Private",
"Network",
"(",
"VPN",
")",
"tools",
"allow",
"connections",
"to",
"remote",
"private",
"networks",
",",
"increasing",
"the",
"security",
"and",
"privacy",
"of",
"the",
"user",
"’",
"s",
"communications",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Delf.rdv",
"Trojan.Win32.Qhost.afmj",
"Trojan.AVKill.28805",
"TR/Rogue.kdz.976325",
"Trojan/Win32.Qhost",
"Trojan.Graftor.D1154C",
"Trojan.Win32.Qhost.afmj",
"TrojanDownloader:Win32/Qhost.A",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Instead",
"of",
"implementing",
"very",
"basic",
"gameplay",
",",
"the",
"authors",
"pirated",
"and",
"repackaged",
"the",
"original",
"game",
"in",
"their",
"app",
"and",
"bundled",
"with",
"it",
"their",
"advertisement",
"SDK",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Turla.a",
"BKDR64_TURLA.YKV",
"Win32.Trojan.WisdomEyes.16070401.9500.9968",
"Backdoor.Trojan",
"BKDR64_TURLA.YKV",
"Win64.Rootkit.Uroburos.A",
"Backdoor.Win64.Turla.e",
"Trojan.Win64.Turla.dflvfq",
"Backdoor.Win64.Turla!c",
"Trojan:W64/Turla.B",
"BackDoor.Turla.20",
"Trojan.Turla.Win64.3",
"BDS/Turla.OE",
"Backdoor.Win64.Turla.e",
"Backdoor.Turla",
"Trj/CI.A",
"Win64/Turla.A",
"Win32.Trojan.Url.Xqlp",
"Win32/Trojan.URL.5b6"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Detailed",
"Malware",
"Structure",
"Malware",
"Strucutre",
"com.mile.brain",
"(",
"SHA256",
":",
"135d6acff3ca27e6e7997429e5f8051f88215d12351e4103f8344cd66611e0f3",
")",
":",
"This",
"is",
"the",
"main",
"application",
"found",
"on",
"Google",
"Play",
"."
] | [
16,
16,
16,
16,
16,
1,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win32.Trojan-Ransom.Cryptolocker.AB",
"Trojan.DownLoader25.64138",
"W32/Trojan.QFWN-8242",
"TR/Injector.pegqr",
"Trojan.Graftor.D472BE",
"TrojanDownloader:Win32/Zdowbot.B",
"Heur.Malware-Cryptor.Filecoder",
"Trojan.Win32.Zlader",
"W32/Injector.DASN!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Exploit.BypassUAC",
"Win.Tool.Win7Elevate-1",
"Exploit.Win32.BypassUAC.bfo",
"ApplicUnsaf.Win64.Win7Elevate",
"Exploit.BypassUAC.Win32.550",
"W64/Trojan.SZNL-6335",
"Exploit.BypassUAC.ny",
"SPR/Welevate.A",
"Trojan[Exploit]/Win32.BypassUAC",
"HackTool:Win64/Welevate.A",
"Exploit.Win32.BypassUAC.bfo",
"HackTool/Win32.Win7Elevate.R27568",
"Trj/CI.A",
"Win32.Exploit.Bypassuac.Dyqu",
"Trojan.Win32.Webprefix"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Randex.B@mm",
"Backdoor.IRCBot",
"W32/Randex.worm.B",
"Win32.Trojan.WisdomEyes.16070401.9500.9811",
"W32/Randex.B",
"W32.Randex",
"Win32/Lioten.F",
"Win.Worm.Randex-2",
"Worm.Win32.Randex.b",
"Win32.Randex.B@mm",
"Trojan.Win32.Randex.glyj",
"W32.W.Randex.b!c",
"Win32.Worm.Randex.Ajbc",
"Win32.Randex.B@mm",
"Worm.Win32.Randex.B",
"Win32.Randex.B@mm",
"Win32.HLLW.Randex.45056",
"Worm.Randex.Win32.3",
"BehavesLike.Win32.PWSZbot.lc",
"W32/Randex.B",
"Worm/Randex.b",
"Worm/Win32.Randex",
"Win32.Randex.E2C45E",
"Worm.Win32.Randex.18432",
"Worm.Win32.Randex.b",
"Worm:Win32/Randex.FN",
"Trojan/Win32.HDC.C82152",
"Win32.Randex.B@mm",
"Backdoor.IRCBot",
"Worm.Randex",
"Win32/Randex.B",
"Worm.Win32.Randex!jlps7ds/blM",
"W32/Randex.B!worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"combination",
"of",
"these",
"capabilities",
"makes",
"JSocket",
"a",
"unique",
"and",
"serious",
"threat",
"to",
"the",
"electronic",
"and",
"physical",
"security",
"of",
"victims."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
3,
16,
16,
4,
16,
4,
12,
12,
12
] |
[
"The",
"EternalBlue",
"exploit",
"MS017-010",
"was",
"initially",
"used",
"by",
"WannaCry",
"ransomware",
"and",
"Adylkuzz",
"cryptocurrency",
"miner."
] | [
3,
11,
11,
1,
16,
16,
16,
16,
3,
11,
16,
3,
11,
11
] |
[
"SELECTED",
"SAMPLES",
"Package",
"Name",
"SHA-256",
"Digest",
"com.rabbit.artcamera",
"18c277c7953983f45f2fe6ab4c7d872b2794c256604e43500045cb2b2084103f",
"org.horoscope.astrology.predict",
"6f1a1dbeb5b28c80ddc51b77a83c7a27b045309c4f1bff48aaff7d79dfd4eb26",
"com.theforest.rotatemarswallpaper",
"4e78a26832a0d471922eb61231bc498463337fed8874db5f70b17dd06dcb9f09",
"com.jspany.temp",
"0ce78efa764ce1e7fb92c4de351ec1113f3e2ca4b2932feef46d7d62d6ae87f5",
"com.hua.ru.quan",
"780936deb27be5dceea20a5489014236796a74cc967a12e36cb56d9b8df9bc86",
"com.rongnea.udonood",
"8b2271938c524dd1064e74717b82e48b778e49e26b5ac2dae8856555b5489131",
"com.mbv.a.wp",
"01611e16f573da2c9dbc7acdd445d84bae71fecf2927753e341d8a5652b89a68",
"com.pho.nec.sg",
"b4822eeb71c83e4aab5ddfecfb58459e5c5e10d382a2364da1c42621f58e119b",
"Exobot",
"(",
"Marcher",
")",
"-",
"Android",
"banking",
"Trojan",
"on",
"the",
"rise",
"February",
"2017",
"Introduction",
"The",
"past",
"months",
"many",
"different",
"banking",
"Trojans",
"for",
"the",
"Android",
"platform",
"have",
"received",
"media",
"attention",
"."
] | [
16,
16,
16,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
3,
16,
3,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FilodasD.Trojan",
"Backdoor/W32.Small.19968.AH",
"Backdoor.Win32.Small!O",
"Trojan.Downloader.slowblog",
"Backdoor/Small.klk",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win.Trojan.Small-13891",
"Backdoor.Win32.Small.klk",
"Trojan.Win32.Small.reykq",
"Backdoor.Win32.A.Small.19968",
"Backdoor.W32.Small.klk!c",
"Trojan.DownLoad2.37573",
"Backdoor.Small.Win32.7582",
"BehavesLike.Win32.Downloader.lm",
"Backdoor/Small.hcp",
"W32/Cowsid.A!tr",
"Trojan[Backdoor]/Win32.Small",
"Win32.Hack.Small.kcloud",
"Trojan.Heur.RP.E95DD0",
"Backdoor.Win32.Small.klk",
"TrojanDownloader:Win32/Coswid.A",
"Downloader/Win32.Small.C65823",
"Backdoor.Small",
"Win32/TrojanDownloader.Coswid.A",
"Backdoor.Small!nWa7meIxFMI",
"Trojan-Downloader.Win32.Small"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Udsdangerousobject.Multi",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"BackDoor.Bulknet.780",
"W32/Trojan.JPON-8649",
"TrojanDropper:Win32/Insup.A",
"Win32.Trojan.Spnr.Afhv",
"Win32/Trojan.9d8"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"July",
"11",
"Two",
"new",
"Flash",
"zero-day",
"vulnerabilities",
",",
"CVE-2015-5122",
"and",
"CVE-2015-5123",
",",
"were",
"found",
"in",
"the",
"hacking",
"team",
"dump",
"."
] | [
16,
16,
16,
16,
7,
15,
15,
16,
7,
16,
7,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"230",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"However",
",",
"we",
"have",
"noted",
"a",
"significantly",
"small",
"number",
"of",
"downloads",
"of",
"the",
"app",
"in",
"Pakistan",
",",
"India",
",",
"Afghanistan",
",",
"Bangladesh",
",",
"Iran",
",",
"Saudi",
"Arabia",
",",
"Austria",
",",
"Romania",
",",
"Grenada",
",",
"and",
"Russia",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.DownLoader25.45618",
"Trojan:Win32/Relnicar.A!dha",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"Ahnlab",
"is",
"a",
"popular",
"antivirus",
"software",
"in",
"South",
"Korea."
] | [
4,
16,
16,
5,
13,
13,
16,
2,
10
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Ransom.Cerber.1",
"Trojan.Ransom.Cerber.1",
"Trojan.Dropper",
"Trojan.Ransom.Cerber.1",
"Ransom_HPCERBER.SMALY5A",
"Win32.Trojan.Kryptik.anp",
"Ransom_HPCERBER.SMALY5A",
"Trojan.Ransom.Cerber.1",
"Trojan.Ransom.Cerber.1",
"Trojan.Ransom.Cerber.1",
"Trojan.Ransom.Cerber.1",
"Trojan.Ssebot.2",
"BehavesLike.Win32.Dropper.vc",
"Spammer:Win32/Rowdab.A",
"Trj/GdSda.A",
"W32/Kryptik.EXLK!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"But",
",",
"as",
"we",
"have",
"already",
"mentioned",
",",
"the",
"criminals",
"could",
"easily",
"turn",
"their",
"attention",
"to",
"users",
"in",
"other",
"countries",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"After",
"the",
"checks",
",",
"the",
"malware",
"becomes",
"active",
",",
"but",
"first",
",",
"it",
"goes",
"through",
"seven",
"steps",
",",
"each",
"one",
"calling",
"a",
"different",
"command",
":",
"uploadPhoneNumbers",
":",
"Exfiltrates",
"all",
"phone",
"numbers",
"that",
"are",
"in",
"the",
"contact",
"list",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"themes",
"of",
"the",
"messages",
"used",
"in",
"the",
"attacks",
"are",
"related",
"to",
"IT",
"Infrastructure",
"such",
"as",
"a",
"log",
"of",
"Server",
"Status",
"Report",
"or",
"a",
"list",
"of",
"Cisco",
"Iron",
"Port",
"Appliance",
"details."
] | [
16,
1,
16,
16,
1,
16,
16,
16,
1,
16,
16,
16,
5,
13,
16,
16,
16,
1,
9,
9,
9,
9,
16,
1,
9,
9,
9,
9,
9,
9,
9
] |
[
"Last",
"week",
"on",
"October",
"7,",
"Raytheon",
"|",
"Websense®",
"Security",
"Labs™",
"noticed",
"an",
"interesting",
"email",
"campaign",
"distributing",
"what",
"at",
"first",
"appeared",
"to",
"be",
"Dridex",
"botnet",
"220."
] | [
16,
16,
16,
0,
8,
4,
16,
12,
12,
12,
16,
16,
16,
6,
14,
16,
16,
3,
16,
16,
16,
16,
3,
11,
11
] |
[
"]",
"comaccount-manager",
"[",
"."
] | [
16,
16,
16,
16
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.