tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"We",
"decided",
"to",
"call",
"the",
"operation",
"β",
"ViceLeaker",
"β",
",",
"because",
"of",
"strings",
"and",
"variables",
"in",
"its",
"code",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Decompiled",
"APK",
"resources",
"."
] | [
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Adware.Toolbar.Win32.2435",
"Trojan.Win32.Spraxeth.elldrz",
"RemoteAdmin.Dexn.v",
"Worm:Win32/Spraxeth.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"Although",
"the",
"threat",
"actor",
"responsible",
"for",
"the",
"development",
"of",
"EventBot",
"is",
"still",
"unknown",
"and",
"the",
"malware",
"does",
"not",
"appear",
"to",
"be",
"involved",
"in",
"major",
"attacks",
",",
"it",
"is",
"interesting",
"to",
"follow",
"the",
"early",
"stages",
"of",
"mobile",
"malware",
"development",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"infomavis-dracula",
"[",
"."
] | [
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HT_PATCHER_FC170076.UVPA",
"Win32.Trojan.WisdomEyes.16070401.9500.9787",
"Backdoor.Graybird",
"HT_PATCHER_FC170076.UVPA",
"Tool.Patcher.140",
"BehavesLike.Win32.Dropper.pm",
"not-a-virus:RiskTool.Win32.Patcher",
"HackTool:Win32/Patcher.D",
"HackTool/Win32.Patcher.C862855",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"With",
"the",
"capability",
"to",
"open",
"market",
"applications",
",",
"such",
"as",
"Google",
"Play",
"and",
"9Apps",
",",
"with",
"a",
"specific",
"keyword",
"search",
"or",
"even",
"a",
"single",
"application",
"β",
"s",
"page",
",",
"the",
"actor",
"can",
"gain",
"exposure",
"for",
"other",
"threat",
"actors",
"and",
"increase",
"his",
"profits",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"XLoader",
"can",
"also",
"start",
"other",
"attacker-specified",
"packages",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.W.Otwycal.l4av",
"not-a-virus:NetTool.Win32.TCPScan.a",
"Win-AppCare/Tcpscan.108750",
"HackTool.Win32.TCPScan.fge"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"We",
"have",
"notified",
"Google",
"of",
"the",
"abuse",
"and",
"are",
"working",
"with",
"them",
"to",
"share",
"additional",
"information."
] | [
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Here",
"the",
"list",
"of",
"the",
"files",
"potentially",
"dropped",
"during",
"the",
"installation",
"stage",
":",
"FILE",
"NAME",
"STAGE",
"DESCRIPTION",
"d3d9.dll",
"Stage",
"4",
"Malware",
"loader",
"used",
"for",
"UAC",
"environments",
"with",
"limited",
"privileges",
";",
"also",
"protected",
"by",
"VM",
"obfuscation",
"aepic.dll",
",",
"sspisrv.dll",
",",
"userenv.dll",
"Stage",
"4",
"Malware",
"loader",
"used",
"in",
"presence",
"of",
"administrative",
"privileges",
";",
"executed",
"from",
"(",
"and",
"injected",
"into",
")",
"a",
"fake",
"service",
";",
"also",
"protected",
"by",
"VM",
"obfuscation",
"msvcr90.dll",
"Stage",
"5",
"Malware",
"payload",
"injected",
"into",
"the",
"explorer.exe",
"or",
"winlogon.exe",
"process",
";",
"also",
"protected",
"by",
"VM",
"obfuscation",
".cab",
"Config",
"Main",
"configuration",
"file",
";",
"encrypted",
"setup.cab",
"Unknown",
"Last",
"section",
"of",
"the",
"setup",
"executable",
";",
"content",
"still",
"unknown",
".7z",
"Plugin",
"Malware",
"plugin",
"used",
"to",
"spy",
"the",
"victim",
"network",
"communications",
"wsecedit.rar",
"Stage",
"6",
"Main",
"malware",
"executable",
"After",
"writing",
"some",
"of",
"these",
"files",
",",
"the",
"malware",
"decides",
"which",
"kind",
"of",
"installation",
"to",
"perform",
"based",
"on",
"the",
"current",
"privilege",
"provided",
"by",
"the",
"hosting",
"process",
"(",
"for",
"example",
",",
"if",
"a",
"Microsoft",
"Office",
"process",
"was",
"used",
"as",
"exploit",
"vector",
")",
":",
"Installation",
"process",
"under",
"UAC",
"When",
"running",
"under",
"a",
"limited",
"UAC",
"account",
",",
"the",
"installer",
"extracts",
"d3d9.dll",
"and",
"creates",
"a",
"persistence",
"key",
"under",
"HKCU\\Software\\Microsoft\\Windows\\Run",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
1,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
1,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
1,
16
] |
[
"In",
"cooperation",
"with",
"Cisco",
"Advanced",
"Services",
"Incident",
"Response,",
"Talos",
"identified",
"several",
"key",
"aspects",
"of",
"the",
"attack."
] | [
16,
16,
16,
4,
12,
12,
12,
12,
12,
16,
16,
16,
16,
16,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.StartPage!O",
"TrojanDownloader.Small.DF3",
"Trojan/Dropper.StartPage.bdz",
"TROJ_FAVADD.SMI",
"Win32.Trojan.WisdomEyes.16070401.9500.9719",
"TROJ_FAVADD.SMI",
"Win.Downloader.134775-1",
"Win32.Trojan.Favadd.A",
"Trojan.Win32.Alien.bnu",
"Trojan.Win32.Zbot.dydfgj",
"Trojan.Win32.Z.Startpage.69632.D",
"Troj.Downloader.W32.VB.lkln",
"TrojWare.Win32.Pasta.SAB",
"Trojan.MulDrop1.43517",
"Dropper.StartPage.Win32.220",
"BehavesLike.Win32.VBObfus.km",
"TrojanDropper.StartPage.ty",
"Trojan[Downloader]/Win32.VB",
"Trojan.Buzy.114",
"Trojan.Win32.Alien.bnu",
"Trojan:Win32/Favadd.C",
"Trojan/Win32.StartPage.R6041",
"Trojan.VBRA.06132",
"Trojan.DL.VB!NOyJWQLVTJg",
"Win32/Trojan.835"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader.Hegel",
"TROJ_SHIZ.SMP6",
"W32/Shiz.MU",
"TROJ_SHIZ.SMP6",
"Trojan.Win32.A.Downloader.53760.HN",
"Trojan.Packed.20771",
"BehavesLike.Win32.Cutwail.qh",
"W32/Shiz.FQWK-1945",
"TrojanDownloader:Win32/Hegel.F",
"Trojan/Win32.ADH.R23078",
"W32/Shiz.NCF!tr",
"Win32/Trojan.74e"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Android/Twitoor",
"is",
"a",
"backdoor",
"capable",
"of",
"downloading",
"other",
"malware",
"onto",
"an",
"infected",
"device.",
"It",
"has",
"been",
"active",
"for",
"around",
"one",
"month."
] | [
3,
16,
16,
3,
16,
16,
16,
16,
3,
16,
16,
5,
13,
16,
16,
16,
16,
16,
0,
8,
8
] |
[
"Devices",
"running",
"Android",
"4.4",
"and",
"higher",
"are",
"protected",
"by",
"Verified",
"Boot",
"."
] | [
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Using",
"a",
"publicly",
"available",
"rooting",
"framework",
",",
"the",
"PHA",
"attempts",
"to",
"root",
"devices",
"and",
"gain",
"persistence",
"on",
"them",
"by",
"reinstalling",
"itself",
"on",
"the",
"system",
"partition",
"of",
"rooted",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"RIG",
"exploit",
"kit",
"sends",
"Ramnit",
"payloads",
"via",
"VBScript",
"CVE-2016-0189"
] | [
3,
11,
11,
16,
3,
11,
16,
1,
9
] |
[
"Some",
"applications",
"rely",
"on",
"SMS",
"when",
"it",
"comes",
"to",
"in-app",
"purchases",
"β",
"the",
"transaction",
"data",
"is",
"transferred",
"via",
"a",
"short",
"text",
"message",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Angler",
"began",
"exploiting",
"CVE-2015-3090",
"about",
"two",
"weeks",
"after",
"Adobe",
"released",
"a",
"patch."
] | [
3,
16,
7,
15,
16,
0,
8,
16,
4,
16,
16,
16
] |
[
"It",
"checks",
"for",
"different",
"kinds",
"of",
"emulators",
",",
"including",
"QEMU",
",",
"Genymotion",
",",
"BlueStacks",
"and",
"Bignox",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
16,
5,
16,
5,
16
] |
[
"So",
"let's",
"make",
"a",
"level-headed",
"assessment",
"of",
"what",
"is",
"really",
"out",
"there."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"loads",
"code",
"from",
"encrypted",
"resources",
"dynamically",
",",
"which",
"most",
"detection",
"engines",
"can",
"not",
"penetrate",
"and",
"inspect",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Three",
"distinctive",
"elements",
"of",
"BAIJIU",
"drew",
"and",
"held",
"our",
"attention:",
"the",
"unusual",
"complexity",
"of",
"the",
"attack;",
"the",
"appropriation",
"of",
"web",
"hosting",
"service",
"GeoCities",
"of",
"1990s",
"fame;",
"and",
"the",
"use",
"of",
"multiple",
"methods",
"of",
"obfuscation."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
1,
9,
9,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"assume",
"that",
"these",
"two",
"elements",
"were",
"chosen",
"to",
"trick",
"security",
"products."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"stealer",
"is",
"disguised",
"as",
"a",
"legitimate",
"Google",
"Drive",
"extension",
"and",
"it",
"can",
"monitor",
"browsing",
"history,",
"capture",
"screenshots,",
"and",
"inject",
"malicious",
"scripts",
"to",
"steal",
"funds",
"from",
"cryptocurrency",
"exchanges."
] | [
3,
11,
16,
16,
16,
16,
5,
13,
13,
13,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9,
16,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Mansabo.389120.B",
"Win32.Trojan-Spy.Trickbot.F",
"Trojan.Win32.Mansabo.aiu",
"Trojan.Win32.Mansabo.evnqvj",
"Trojan.Inject2.64433",
"Trojan.Mansabo.ni",
"TR/AD.Inject.jyiec",
"Trojan/Win32.Mansabo",
"Trojan.Win32.Mansabo.aiu",
"Trojan/Win32.Inject.C2278939",
"TScope.Trojan.VB",
"Trojan.TrickBot",
"Trj/GdSda.A",
"Win32.Trojan.Mansabo.Ljab",
"W32/Mansabo.AIU!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Exploit/W32.Pidief.6283.GLW",
"JS/Pdfcm.AQ",
"Exploit-PDF.sd",
"Bloodhound.Exploit.196",
"EXPL_EXECOD.A",
"Pdf.Exploit.CVE_2009_0927-1",
"Exploit.Win32.Pidief.bni",
"PDF.Exploit.CVE-2009-0927.A",
"Exploit.W32.Pidief!c",
"Trojan-Dropper:JS/PdfDropper.A",
"EXPL_EXECOD.A",
"BehavesLike.PDF.Exploit.xn",
"EXP/Pidief.arl",
"Exploit.Win32.Pidief.bni",
"Trojan.JS.Downloader.BEZ",
"Exploit.Win32.Pidief.bni",
"Win32.Exploit.Pidief.Hupr",
"Trojan.Js.Exploit",
"virus.pdf.pdfjs.1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"All",
"Firefox",
"users",
"are",
"urged",
"to",
"update",
"to",
"Firefox",
"39.0.3.",
"The",
"fix",
"has",
"also",
"been",
"shipped",
"in",
"Firefox",
"ESR",
"38.1.1."
] | [
16,
5,
13,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13
] |
[
"The",
"malware",
"documented",
"in",
"this",
"post",
"was",
"predominantly",
"64-bit,",
"however,",
"there",
"are",
"32-bit",
"versions",
"of",
"the",
"malware",
"in",
"the",
"wild."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
5,
13,
16,
16,
3,
16,
16,
16
] |
[
"The",
"new",
"Android",
"ransomware",
"variant",
"overcomes",
"these",
"barriers",
"by",
"evolving",
"further",
"than",
"any",
"Android",
"malware",
"we",
"β",
"ve",
"seen",
"before",
"."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16
] |
[
"First",
"off",
",",
"it",
"registers",
"the",
"infected",
"device",
"in",
"the",
"administrative",
"panel",
"by",
"sending",
"a",
"GET",
"request",
"to",
"the",
"relative",
"address",
"gate.php",
"(",
"in",
"later",
"versions",
"gating.php",
")",
"with",
"the",
"ID",
"(",
"device",
"identifier",
"generated",
"by",
"the",
"setPsuedoID",
"function",
"in",
"a",
"pseudo-random",
"way",
"based",
"on",
"the",
"device",
"IMEI",
")",
"and",
"screen",
"(",
"shows",
"if",
"the",
"device",
"is",
"active",
",",
"possible",
"values",
"are",
"β",
"on",
"β",
",",
"β",
"off",
"β",
",",
"β",
"none",
"β",
")",
"parameters",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"targetting",
"Linux",
"also",
"known",
"as:",
"TrojanXor.Linux.DDos.A",
"Linux/DDoS-Xor.A",
"ELF/Trojan.JWZU-2",
"Linux.Xorddos",
"ELF_XORDDOS.SM",
"Unix.Trojan.DDoS_XOR-1",
"HEUR:Trojan-DDoS.Linux.Xarcen.a",
"Trojan.Unix.Xarcen.eftmox",
"Troj.Ddos.Linux!c",
"Linux.DDoS.Xor.4",
"Trojan.Xorddos.Linux.34",
"Linux/DDoS-Xor.A",
"TrojanDDoS.Linux.ff",
"LINUX/Xorddos.tmifd",
"Trojan[DDoS]/Linux.Xarcen.a",
"Trojan.Trojan.Linux.XorDDoS.2",
"Linux/Xorddos.625867",
"HEUR:Trojan-DDoS.Linux.Xarcen.a",
"Trojan.Linux.XorDdos.a",
"Trojan.Linux.DDoS",
"ELF/DDoS.BH!tr",
"ELF/XorDDos.A",
"Win32/Trojan.DDoS.ee7"
] | [
16,
3,
16,
11,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Tibrun",
"Trojan/Kryptik.bwcw",
"Trojan.Razy.D3CCE1",
"W32/Trojan2.ODQP",
"Trojan.Bruterdep",
"TROJ_TIBRUN.B",
"Trojan-Spy.Win32.POSBrut.b",
"Trojan.Win32.Crypt.ctwfbi",
"Troj.W32.Crypt.csx!c",
"Trojan.DownLoader9.55744",
"Trojan.Crypt.Win32.14169",
"TROJ_TIBRUN.B",
"Trojan.Krypt-POS",
"W32/Trojan.WWSD-0234",
"Trojan/Crypt.eom",
"TR/Spy.13824.412",
"Trojan/Win32.Crypt.csx",
"Trojan:Win32/Tibrun.A",
"Trojan-Spy.Win32.POSBrut.b",
"Trojan/Win32.Tibrun.C287165",
"Trojan.Crypt",
"Trj/CI.A",
"Win32/Kryptik.BWCW",
"Win32.Trojan-spy.Posbrut.Sxxp",
"Trojan.Crypt!ZT6l9g/i+CQ",
"W32/BrutPOS.B!tr",
"Win32/Trojan.2d6"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9846",
"Win32/Droplet.YK",
"Trojan.NtRootKit.9406",
"TR/Horse.QWS",
"Trj/CI.A",
"W32/Malware_fam.NB",
"Win32/RootKit.Rootkit.43e"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"infection",
"happens",
"in",
"multiple",
"stages",
"and",
"the",
"dropper",
"is",
"very",
"similar",
"to",
"many",
"common",
"worm",
"that",
"targets",
"embedded",
"devices",
"from",
"multiple",
"architectures."
] | [
16,
1,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
3,
16,
16,
5,
13,
16,
5,
13
] |
[
"It",
"only",
"has",
"two",
"parts",
",",
"the",
"method",
"indicated",
"by",
"word",
"β",
"info",
"β",
"and",
"the",
"victim",
"identifier",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"BOT",
"UPDATES",
"EventBot",
"has",
"a",
"long",
"method",
"called",
"parseCommand",
"that",
"can",
"update",
"EventBot",
"β",
"s",
"configuration",
"XML",
"files",
",",
"located",
"in",
"the",
"shared",
"preferences",
"folder",
"on",
"the",
"device",
"."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Answer",
"from",
"the",
"C2",
"The",
"C2",
"will",
"check",
"the",
"country",
"field",
",",
"if",
"it",
"'s",
"empty",
"or",
"if",
"the",
"country",
"is",
"not",
"targeted",
",",
"it",
"will",
"reply",
"with",
"a",
"\"",
"Unauthorized",
"''",
"answer",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Yesterday,",
"our",
"colleagues",
"from",
"Symantec",
"published",
"their",
"analysis",
"of",
"Longhorn,",
"an",
"advanced",
"threat",
"actor",
"that",
"can",
"be",
"easily",
"compared",
"with",
"Regin,",
"ProjectSauron,",
"Equation",
"or",
"Duqu2",
"in",
"terms",
"of",
"its",
"complexity."
] | [
16,
16,
4,
16,
4,
16,
16,
16,
16,
6,
16,
6,
14,
14,
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
6,
16,
16,
16,
16,
16
] |
[
"Before",
"patching",
",",
"the",
"Trojan",
"will",
"backup",
"the",
"original",
"library",
"with",
"a",
"name",
"bak_",
"{",
"original",
"name",
"}",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Waldek.3342336",
"Trojan.Mauvaise.SL1",
"Backdoor.Trojan",
"Trojan.Win32.Waldek.wvv",
"Trojan.Win32.Waldek.elvbza",
"Troj.W32.Waldek!c",
"Trojan.Waldek.exr",
"Trojan:Win32/Waldek.A!bit",
"Trojan.Win32.Waldek.wvv",
"Backdoor.Andromeda",
"Trj/Gamarue.A",
"Win32/Worm.5d8"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Worm.AutoRun.bo",
"W32.SillyFDC",
"Trojan.DownLoader8.34261",
"Worm:Win32/Metibh.A",
"Rootkit.Ressdt"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"This",
"malware",
"also",
"contains",
"a",
"screen",
"recorder",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"helps",
"the",
"C2",
"define",
"what",
"actions",
"it",
"can",
"do",
"before",
"being",
"detected",
"on",
"the",
"mobile",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"However",
"the",
"registrar",
"NameCheap,",
"Inc.",
"covers",
"a",
"pool",
"of",
"287.411.506",
"domains",
"where",
"at",
"least",
"0.10%",
"can",
"be",
"considered",
"as",
"potentially",
"malicious."
] | [
16,
16,
16,
4,
12,
16,
16,
1,
9,
9,
9,
16,
3,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FakeWinlogonXIA.Trojan",
"Trojan.Win32.Swisyn!O",
"Trojan.Swisyn.Win32.25583",
"Trojan/Swisyn.alai",
"Win32.Worm.VB.qn",
"W32.SillyFDC",
"Win32/SillyAutorun.EYX",
"TROJ_SWISYN.AJ",
"Trojan.Win32.Swisyn.alai",
"Trojan.Win32.Vb.btqbl",
"Trojan.Win32.Swisyn.36864.C",
"Trojan.KillFiles.12035",
"TROJ_SWISYN.AJ",
"Trojan/Swisyn.vmn",
"Worm/Win32.WBNA.mjv",
"Worm:Win32/Roopirs.A",
"Trojan.Win32.Swisyn.alai",
"Trojan/Win32.Swisyn.R2752",
"Trojan.VBRA.04943",
"Trojan.PoorVirus",
"I-Worm.VB.NUV",
"Win32/VB.NUV",
"Trojan.Win32.Swisyn"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"MemScan:Backdoor.Turkojan.BM",
"Trojan.PWS.VKont!NjMVuhwtYR0",
"BKDR_TURKOJN.SMD",
"Win32.Backdoor.Turko",
"PUA.Packed.Themida-2",
"Packed.Win32.Black.a",
"MemScan:Backdoor.Turkojan.BM",
"Packed.Win32..Black.~A",
"MemScan:Backdoor.Turkojan.BM",
"Trojan.Packed.650",
"BKDR_TURKOJN.SMD",
"Heuristic.BehavesLike.Win32.Fake.O",
"Trojan:Win32/Turkojan.B!dll",
"MemScan:Backdoor.Turkojan.BM",
"Packed/Win32.Black",
"Trojan.Win32.Nodef.dqw",
"Trj/Thed.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"As",
"on",
"the",
"desktop",
",",
"mobile",
"users",
"need",
"to",
"be",
"wary",
"of",
"installing",
"applications",
"from",
"outside",
"of",
"legitimate",
"app",
"stores",
"and",
"sources",
"and",
"be",
"on",
"the",
"lookout",
"for",
"bogus",
"banking",
"sites",
"that",
"ask",
"for",
"more",
"information",
"than",
"users",
"would",
"normally",
"provide",
"on",
"legitimate",
"sites",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"report",
"analyzes",
"a",
"campaign",
"of",
"targeted",
"attacks",
"against",
"an",
"NGO",
"working",
"on",
"environmental",
"issues",
"in",
"Southeast",
"Asia."
] | [
16,
16,
16,
16,
6,
16,
16,
1,
16,
16,
4,
16,
16,
16,
16,
16,
2,
10
] |
[
"The",
"developers",
"refer",
"to",
"this",
"tool",
"by",
"the",
"name",
"Kazuar,",
"which",
"is",
"a",
"Trojan",
"written",
"using",
"the",
"Microsoft",
".NET",
"Framework",
"that",
"offers",
"actors",
"complete",
"access",
"to",
"compromised",
"systems",
"targeted",
"by",
"its",
"operator."
] | [
16,
6,
16,
16,
16,
3,
16,
16,
16,
3,
16,
16,
16,
3,
16,
16,
5,
13,
13,
13,
16,
16,
6,
16,
16,
16,
5,
13,
16,
16,
16,
6
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BackDoor-AZF.dll",
"BKDR_BITS.B",
"W32/Backdoor.FPJ",
"Backdoor.Trojan",
"Win32/Bits.A",
"BKDR_BITS.B",
"Backdoor.Win32.Bits",
"Trojan.Win32.Bits.dlhcqc",
"Backdoor.Win32.Bits.A",
"BackDoor.Bits",
"Backdoor.Bits.Win32.9",
"BackDoor-AZF.dll",
"W32/Backdoor.SUAV-1947",
"Backdoor/Bits.b",
"Backdoor:Win32/Bits.B",
"Backdoor.Win32.Bits",
"Bck/Bits.A",
"Backdoor.Bits!2M7xWD4MAec"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Once",
"installed",
",",
"the",
"RAT",
"registers",
"the",
"infected",
"device",
"as",
"shown",
"below",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.B13C",
"Trojan.Blouiroet",
"Trojan.Win32.Blouiroet.au",
"Trojan.Win32.Blouiroet.evaxpp",
"Trojan.Win32.Z.Symmi.3033600",
"Troj.W32.Blouiroet!c",
"Win32.Trojan.Blouiroet.Wvkk",
"BehavesLike.Win32.Trojan.vc",
"Trojan.Blouiroet.s",
"Trojan.Symmi.D1371C",
"Trojan.Win32.Blouiroet.au",
"Trojan:Win32/Blouiroet.A",
"Trojan/Win32.Blouiroet.C2267836",
"Trojan.Blouiroet",
"Trj/CI.A",
"Win32/Trojan.c10"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"From",
"a",
"single",
"instance",
"of",
"the",
"encoded",
"JavaScript",
"discovered",
"in",
"one",
"version",
"of",
"this",
"malware,",
"we",
"pivoted",
"on",
"the",
"Command",
"and",
"Control",
"C2",
"IPv4",
"address",
"discovered",
"during",
"static",
"analysis",
"and",
"deobfuscation,",
"using",
"our",
"Threat",
"Intelligence",
"Service",
"AutoFocus,",
"unearthed",
"many",
"more",
"versions",
"of",
"the",
"malware",
"and",
"found",
"that",
"the",
"versions",
"seen",
"to",
"date",
"were",
"delivering",
"a",
"credential-stealing",
"Trojan",
"as",
"the",
"final",
"payload."
] | [
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
13,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
3,
11,
11
] |
[
"We",
"found",
"no",
"other",
"information",
"stolen",
"from",
"the",
"victims",
"to",
"be",
"accessible",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"VirTool.VBInject",
"Trojan.Win32.Clicker!BT",
"Trojan.Kazy.D6D077",
"Win32.Trojan.Trojan-Clicker.e",
"Trojan.Win32.VB.dwztex",
"Trojan.Win32.Z.Kazy.28676",
"Win32.HLLW.VBNA.based",
"BehavesLike.Win32.Trojan.mz",
"Trojan.Win32.TrojanClicker",
"TrojanClicker.VB.fwe",
"TR/Kazy.446583.222",
"TrojanClicker:Win32/Wimg.A",
"Trojan.Win32.Clicker!BT",
"TScope.Trojan.VB",
"Trj/GdSda.A",
"W32/TrojanClicker.OFQ!tr",
"Win32/Trojan.de7"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"first",
"attack",
"vector",
"is",
"to",
"compromise",
"the",
"out",
"of",
"band",
"authentication",
"for",
"online",
"banks",
"that",
"rely",
"on",
"SMS",
"using",
"SMS",
"forwarding",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Many",
"of",
"the",
"strings",
"in",
"the",
"application",
"are",
"XOR",
"'d",
"with",
"the",
"key",
"Kjk1MmphFG",
":",
"After",
"some",
"additional",
"requests",
",",
"the",
"dropper",
"made",
"a",
"POST",
"request",
"to",
"https",
":",
"//54.71.249.137/56e087c9-fc56-49bb-bbd0-4fafc4acd6e1",
"which",
"returned",
"a",
"zip",
"file",
"containing",
"the",
"second",
"stage",
"binaries",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"July",
"13",
"Further",
"analysis",
"of",
"the",
"hacking",
"team",
"dump",
"revealed",
"that",
"the",
"company",
"used",
"UEFI",
"BIOS",
"rootkit",
"to",
"keep",
"their",
"Remote",
"Control",
"System",
"(",
"RCS",
")",
"agent",
"installed",
"in",
"their",
"targets",
"β",
"systems",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
3,
11,
11,
11,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"CONCLUSION",
"We",
"witness",
"actors",
"continually",
"using",
"open-source",
"platforms",
",",
"code",
"and",
"packages",
"to",
"create",
"their",
"own",
"software",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"SpyNote",
"RAT",
"registers",
"a",
"service",
"called",
"AutoStartup",
"and",
"a",
"broadcast",
"receiver",
"named",
"BootComplete",
"."
] | [
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"These",
"attacks",
"are",
"targeted,",
"but",
"not",
"spear-phished."
] | [
16,
1,
16,
16,
16,
16,
1
] |
[
"CVE-2017-0199",
"was",
"originally",
"a",
"zero-day",
"remote",
"code",
"execution",
"vulnerability",
"that",
"allowed",
"attackers",
"to",
"exploit",
"a",
"flaw",
"that",
"exists",
"in",
"the",
"Windows",
"Object",
"Linking",
"and",
"Embedding",
"OLE",
"interface",
"of",
"Microsoft",
"Office",
"to",
"deliver",
"malware."
] | [
1,
16,
16,
16,
7,
15,
15,
15,
15,
15,
16,
6,
16,
3,
16,
16,
16,
16,
16,
3,
11,
11,
11,
11,
11,
11,
16,
16,
5,
13,
16,
16,
3
] |
[
"By",
"performing",
"a",
"deep",
"analysis",
"of",
"the",
"malware",
",",
"we",
"were",
"able",
"to",
"extract",
"the",
"unpacked",
"JAR",
"file",
"mycode.jar",
"and",
"reveal",
"some",
"very",
"interesting",
"code",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"data",
"targeted",
"for",
"theft",
"also",
"have",
"similar",
"formats",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"second",
"stage",
"The",
"second",
"stage",
"apps",
"contain",
"the",
"surveillanceware",
"capabilities",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Triosir.682",
"Backdoor:Win32/Rupski.A",
"Trojan.Triosir!",
"AdWare.AddLyrics",
"Win32/Virus.Adware.cd5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"sendAll",
"function",
"used",
"to",
"spread",
"malicious",
"messages",
"to",
"the",
"contact",
"list",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"turns",
"out",
"that",
"those",
"smaller",
"Trojans",
"face",
"serious",
"problems",
"trying",
"to",
"get",
"root",
"access",
"on",
"Android",
"4.4.4",
"and",
"above",
",",
"because",
"a",
"lot",
"of",
"vulnerabilities",
"were",
"patched",
"in",
"these",
"versions",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HackTool.Win32.Injecter"
] | [
16,
3,
16,
16,
16,
1
] |
[
"He",
"also",
"used",
"his",
"email",
"account",
"to",
"log",
"into",
"various",
"services",
"in",
"the",
"video",
",",
"which",
"identifies",
"him",
"as",
"the",
"adware",
"domain",
"owner",
",",
"beyond",
"any",
"doubt",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Ginp",
"β",
"s",
"unusual",
"target",
"selection",
"is",
"not",
"just",
"about",
"its",
"focus",
"on",
"Spanish",
"banks",
"but",
"also",
"the",
"wide",
"selection",
"of",
"targeted",
"apps",
"per",
"bank",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojanpws.Ginapass",
"Trojan.Win32.Figina.ewevus",
"Trojan.PWS.Figina",
"Tool.DYAMAR.Win32.193",
"BehavesLike.Win32.Ransom.bc",
"PWS:Win32/GinaPass.D",
"Downloader.Delphi",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Stage",
"1",
":",
"Exodus",
"One",
"The",
"first",
"stage",
"installed",
"by",
"downloading",
"the",
"malicious",
"apps",
"uploaded",
"on",
"Google",
"Play",
"Store",
"only",
"acts",
"as",
"a",
"dropper",
"."
] | [
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16
] |
[
"They",
"decrypt",
"several",
"archive",
"files",
"from",
"the",
"assets",
"folder",
"of",
"the",
"installation",
"package",
",",
"and",
"launch",
"an",
"executable",
"file",
"from",
"them",
"with",
"the",
"name",
"β",
"start.",
"β",
"The",
"interesting",
"thing",
"is",
"that",
"the",
"Trojan",
"supports",
"even",
"the",
"64-bit",
"version",
"of",
"Android",
",",
"which",
"is",
"very",
"rare",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16
] |
[
"Bitdefender",
"Labs",
"has",
"issued",
"a",
"technical",
"advisory",
"to",
"warn",
"the",
"public",
"about",
"a",
"new",
"wave",
"of",
"opportunistic",
"attacks",
"using",
"a",
"vulnerability",
"in",
"Zoho",
"ManageEngine",
"servers,",
"which",
"could",
"affect",
"tens",
"of",
"thousands",
"of",
"businesses."
] | [
4,
12,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
7,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
4
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Clicker!BT",
"Win32.Trojan.WisdomEyes.16070401.9500.9503",
"Uds.Dangerousobject.Multi!c",
"trojanclicker.msil.fakeie.a",
"TR/Dropper.MSIL.138467",
"Trojan.MSIL.Krypt.2",
"TrojanClicker:MSIL/FakeIE.A",
"Trojan.Win32.Clicker!BT",
"Downloader.MSIL.ASXS",
"Win32/Trojan.d60"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Worm.Fujacks.AB",
"Packed.Win32.TDSS!O",
"W32/Fujacks.s",
"Worm.Fujack.Win32.6",
"W32/Fujacks.aa.2",
"PE_FUJACKS.EA",
"Win32.Worm.BMW.b",
"W32/Fujack.R",
"W32.Fujacks.E",
"Win32/Emerleox.CO",
"PE_FUJACKS.EA",
"Win.Worm.Fujack-8",
"Worm.Win32.Fujack.aa",
"Win32.Worm.Fujacks.AB",
"Trojan.Win32.Fujack.nsvf",
"W32.W.Fujack.kZ4V",
"Virus.Win32.Viking.a",
"Win32.Worm.Fujacks.AB",
"Win32.HLLP.Whboy.80",
"BehavesLike.Win32.MultiPlug.th",
"W32/Fujack.R",
"Worm/Viking.Tail",
"TR/Drop.Hupigon.kmx",
"Trojan[Packed]/Win32.CPEX-based",
"Win32.WhBoy.aa.183492",
"Trojan:WinNT/Kangkio.A",
"Win32.Worm.Fujacks.AB",
"Win32.WhBoy.AJ",
"Worm.Win32.Fujack.aa",
"Win32.Virus.Neshta.D",
"Win32/Dellboy.Z",
"Win32.Worm.Fujacks.AB",
"Win32.HLLW.Whboy",
"RiskWare.Tool.CK",
"Win32.Fujacks.AD",
"Win32/Fujacks.AD",
"Win32.HLLP.WHBoy.AP",
"Worm.Win32.Fujack",
"W32/BoyhW.V",
"Virus.Win32.Viking.LB"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Heur.E05F81",
"Win32.HLLW.Autoruner2.27649",
"BehavesLike.Win32.Fake.dc",
"Worm:Win32/Namepuk.A",
"HEUR/Fakon.mwf",
"Trojan.FKM!1pKOHJnJsdU"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Open",
"source",
"reporting",
"recently",
"indicated",
"new",
"activity",
"from",
"the",
"Iranian",
"actor",
"publicly",
"known",
"as",
"Greenbug",
"targeting",
"Saudi",
"Arabia."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
6,
16,
2,
10
] |
[
"Following",
"on",
"from",
"our",
"post",
"on",
"Angler",
"EK",
"we",
"are",
"going",
"to",
"expose",
"the",
"mechanics",
"behind",
"the",
"Bedep",
"ad-fraud",
"malware."
] | [
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11
] |
[
"The",
"exploit",
"files",
"involved",
"were",
"identical",
"to",
"the",
"Hacking",
"Team's",
"leaked",
"exploit",
"HTML,",
"JavaScript,",
"and",
"ShockWave",
"Flash",
"0-day",
"files."
] | [
16,
3,
1,
16,
16,
16,
16,
16,
4,
12,
16,
3,
1,
9,
16,
1,
9,
9,
9
] |
[
"Since",
"then",
"we",
"have",
"identified",
"a",
"number",
"of",
"attacks",
"over",
"a",
"two-year",
"period,",
"beginning",
"in",
"April",
"2014,",
"which",
"we",
"attribute",
"to",
"Suckfly."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
0,
8,
16,
16,
0,
8,
16,
16,
16,
16,
6
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win32.Koutodoor!O",
"Trojan.Koutodoor.E",
"Win32.Rootkit.Koutodoor.a",
"Trojan.Koutodoor",
"TROJ_DLOADR.SMOM",
"Backdoor.Win32.Koutodoor.aihc",
"Trojan.Win32.RKDoor.evaszd",
"Backdoor.Win32.Koutodoor.HC",
"Trojan.DownLoader3.76",
"Trojan.Koutodoor.Win32.5401",
"TROJ_DLOADR.SMOM",
"Trojan.Rootkit.Pakes",
"W32.Backdoor.Koutodoor",
"Trojan[Backdoor]/Win32.Koutodoor",
"Win32.Troj.JunkcodeT.a.188672",
"Trojan.Koutodoor.12",
"Backdoor.Win32.Koutodoor.aihc",
"TrojanDropper:Win32/Minmal.A",
"Backdoor/Win32.Koutodoor.R1785",
"Trojan.PSW.Win32.OnlineGame.d",
"Trojan.Win32.Koutodoor.AN"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Exploit.MSIL",
"Exploit.Win32.CVE20130074.eupinx",
"W32/Trojan.QBBK-0155",
"Exploit.MSIL.cn",
"EXP/CVE-2013-0074.cpsmi",
"Exploit:MSIL/CVE-2016-0034.B",
"Trj/GdSda.A",
"Trojan.Win32.Exploit",
"W32/CVE_2013_0074.GW!tr",
"Win32/Trojan.Exploit.d89"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"China",
"seems",
"to",
"a",
"mass",
"victim",
"of",
"this",
"kind",
"of",
"malware",
"having",
"a",
"92",
"%",
"share",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Code",
"snippets",
"showing",
":",
"the",
"decoding",
"algorithm",
"shared",
"by",
"both",
"Bouncing",
"Golf",
"and",
"Domestic",
"Kitten",
"(",
"top",
")",
",",
"the",
"format",
"of",
"data",
"that",
"Domestic",
"Kitten",
"β",
"s",
"malware",
"targets",
"to",
"steal",
"(",
"center",
")",
",",
"and",
"how",
"both",
"Bouncing",
"Golf",
"(",
"bottom",
"left",
")",
"and",
"Domestic",
"Kitten",
"(",
"bottom",
"right",
")",
"use",
"\"",
"\"",
"as",
"a",
"separator",
"in",
"their",
"command",
"strings",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanSpy.VBChuchelo.bk",
"Trojan/Spy.VBChuchelo.g",
"Trojan-Spy.Win32.VBChuchelo",
"TrojanSpy.VBChuchelo.G",
"Win32/Spy.KeyLogger.NDE",
"Trojan-Downloader.Win32.Noesis.11.B!IK",
"W32/VBTroj.WTX",
"Trojan.VB-7191",
"Trojan-Spy.Win32.VBChuchelo.g",
"Backdoor.VB.1",
"TrojWare.Win32.TrojanSpy.VB.~FJ",
"Trojan-Spy.Win32.VBChuchelo.g",
"TrojanSpy.VBChuchelo.v",
"Backdoor.Trojan",
"Backdoor:Win32/Zumamumy.A",
"Trojan.Win32.VBChuchelo.106667",
"Backdoor.VB.1",
"Win-Trojan/Vbchuchelo.106658",
"Trojan-Spy.Win32.VBChuchelo.g",
"Trojan-Downloader.Win32.Noesis.11.B",
"Dropper.Tiny",
"Trj/Downloader.MDW"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"That",
"is",
"actually",
"how",
"the",
"bad",
"guys",
"decided",
"to",
"monetize",
"the",
"Trojan",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"bulk",
"of",
"the",
"victims",
"were",
"predominantly",
"based",
"out",
"of",
"Ecuador,",
"Venezuela,",
"Peru,",
"Argentina,",
"and",
"Columbia;",
"however,",
"other",
"victims",
"were",
"identified",
"in",
"Korea,",
"the",
"United",
"States,",
"the",
"Dominican",
"Republic,",
"Cuba,",
"Bolivia,",
"Guatemala,",
"Nicaragua,",
"Mexico,",
"England,",
"Canada,",
"Germany,",
"Russia,",
"and",
"Ukraine."
] | [
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
2,
10,
10,
10,
16,
2,
16,
16,
4,
16,
16,
16,
2,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDropper.Yabinder.2.0",
"Trojan.DR.Yabinder!OrBzj5WtPwc",
"Win32/Yabinder.20",
"W32/Yabinder.C",
"W32.Slackor.dr",
"Slacke.A",
"TROJ_YABINDER.20",
"Trojan.Yabinder.20B",
"TrojanDropper.Yabinder.2.0",
"TrojWare.Win32.Yabinder.20",
"TrojanDropper.Yabinder.2.0",
"Trojan.MulDrop.310",
"TR/Yabinder.20.B",
"TROJ_YABINDER.20",
"Win32/TrojanRunner.Yab.200",
"W32/Yabinder.C",
"TrojanDropper:Win32/Yabinder.2_0",
"Backdoor.Win32.Bifrose.168361",
"TrojanDropper.Yabinder.2.0",
"Dropper/Yabinder.9728",
"Backdoor.Win32.Bifrose.bco",
"Malware.Slackor",
"Trojan.Yabinder.a",
"Trojan-Dropper.Win32.Yabinder.20",
"W32/Yabinder.C!tr",
"Dropper.Yabinder.A",
"Trj/Yabinder.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom_YUHAK.A",
"Trojan.MulDrop7.49600",
"Ransom_YUHAK.A",
"BehavesLike.Win32.PWSZbot.dh",
"TR/RedCap.cgaww",
"Trojan.Heur.RP.E93A3E",
"Ransom:Win32/Wagcrypt.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"Project",
"Spy",
"β",
"s",
"earlier",
"versions",
"Searching",
"for",
"the",
"domain",
"in",
"our",
"sample",
"database",
",",
"we",
"found",
"that",
"the",
"coronavirus",
"update",
"app",
"appears",
"to",
"be",
"the",
"latest",
"version",
"of",
"another",
"sample",
"that",
"we",
"detected",
"in",
"May",
"2019",
"."
] | [
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"One",
"of",
"these",
",",
"called",
"Marcher",
"(",
"aka",
"Exobot",
")",
",",
"seems",
"to",
"be",
"especially",
"active",
"with",
"different",
"samples",
"appearing",
"on",
"a",
"daily",
"basis",
"."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.ExpiroPC.PE",
"BehavesLike.Win32.Trojan.cc",
"Trojan[Dropper]/Win32.Gluer",
"TrojanDropper:Win32/Gluer.dam#2"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.DOS.Filemaker.A",
"Trojan.DOS.Filemaker.A",
"Filemaker.b",
"Trojan.DOS.Filemaker",
"Trojan.DOS.Filemaker.A",
"TrojWare.DOS.Filemaker",
"Trojan.DOS.Filemaker.A",
"Trojan.Filemaker",
"TR/Filemaker.A",
"Filemaker.b",
"Trojan/DOS.DOS",
"Trojan.DOS.Filemaker.A",
"Filemaker.A",
"Trojan.DOS.Filemaker",
"Malware_fam.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9985",
"W32/Trojan2.OWYQ",
"Trojan.Msil",
"W32/Trojan.FRCA-1486",
"Trojan.Spacekito",
"Trojan.Zusy.D177A1",
"Trojan:MSIL/Spacekito.E",
"PUP/Win32.Vittalia.R124797",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.DownLoader25.42759",
"BehavesLike.Win32.BadFile.gh"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Banker.Win32.82933",
"Win32.Trojan.WisdomEyes.16070401.9500.9712",
"Trojan.Zbot",
"Trojan-Spy.MSIL.Banker.jc",
"Trojan.Win32.Banker.datvyw",
"Troj.Spy.MSIL.Banker.jc!c",
"Trojan-Spy.MSIL.CliBanker",
"TR/Spy.Clipug.A.11",
"Win32.Troj.Banker.kcloud",
"TrojanSpy:MSIL/Clipug.A",
"Trojan.Kazy.D5F205",
"Trojan-Spy.MSIL.Banker.jc",
"Trojan/Win32.ClipBanker.C415793",
"Trj/Dtcontx.M",
"Msil.Trojan-spy.Banker.Ecua",
"Trojan.ClipBanker!",
"MSIL/ClipBanker.A!tr",
"Win32/Trojan.Spy.b4a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.