tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "We", "decided", "to", "call", "the", "operation", "β€œ", "ViceLeaker", "”", ",", "because", "of", "strings", "and", "variables", "in", "its", "code", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Decompiled", "APK", "resources", "." ]
[ 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Adware.Toolbar.Win32.2435", "Trojan.Win32.Spraxeth.elldrz", "RemoteAdmin.Dexn.v", "Worm:Win32/Spraxeth.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "Although", "the", "threat", "actor", "responsible", "for", "the", "development", "of", "EventBot", "is", "still", "unknown", "and", "the", "malware", "does", "not", "appear", "to", "be", "involved", "in", "major", "attacks", ",", "it", "is", "interesting", "to", "follow", "the", "early", "stages", "of", "mobile", "malware", "development", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "infomavis-dracula", "[", "." ]
[ 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HT_PATCHER_FC170076.UVPA", "Win32.Trojan.WisdomEyes.16070401.9500.9787", "Backdoor.Graybird", "HT_PATCHER_FC170076.UVPA", "Tool.Patcher.140", "BehavesLike.Win32.Dropper.pm", "not-a-virus:RiskTool.Win32.Patcher", "HackTool:Win32/Patcher.D", "HackTool/Win32.Patcher.C862855", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "With", "the", "capability", "to", "open", "market", "applications", ",", "such", "as", "Google", "Play", "and", "9Apps", ",", "with", "a", "specific", "keyword", "search", "or", "even", "a", "single", "application", "’", "s", "page", ",", "the", "actor", "can", "gain", "exposure", "for", "other", "threat", "actors", "and", "increase", "his", "profits", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "XLoader", "can", "also", "start", "other", "attacker-specified", "packages", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.W.Otwycal.l4av", "not-a-virus:NetTool.Win32.TCPScan.a", "Win-AppCare/Tcpscan.108750", "HackTool.Win32.TCPScan.fge" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "We", "have", "notified", "Google", "of", "the", "abuse", "and", "are", "working", "with", "them", "to", "share", "additional", "information." ]
[ 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Here", "the", "list", "of", "the", "files", "potentially", "dropped", "during", "the", "installation", "stage", ":", "FILE", "NAME", "STAGE", "DESCRIPTION", "d3d9.dll", "Stage", "4", "Malware", "loader", "used", "for", "UAC", "environments", "with", "limited", "privileges", ";", "also", "protected", "by", "VM", "obfuscation", "aepic.dll", ",", "sspisrv.dll", ",", "userenv.dll", "Stage", "4", "Malware", "loader", "used", "in", "presence", "of", "administrative", "privileges", ";", "executed", "from", "(", "and", "injected", "into", ")", "a", "fake", "service", ";", "also", "protected", "by", "VM", "obfuscation", "msvcr90.dll", "Stage", "5", "Malware", "payload", "injected", "into", "the", "explorer.exe", "or", "winlogon.exe", "process", ";", "also", "protected", "by", "VM", "obfuscation", ".cab", "Config", "Main", "configuration", "file", ";", "encrypted", "setup.cab", "Unknown", "Last", "section", "of", "the", "setup", "executable", ";", "content", "still", "unknown", ".7z", "Plugin", "Malware", "plugin", "used", "to", "spy", "the", "victim", "network", "communications", "wsecedit.rar", "Stage", "6", "Main", "malware", "executable", "After", "writing", "some", "of", "these", "files", ",", "the", "malware", "decides", "which", "kind", "of", "installation", "to", "perform", "based", "on", "the", "current", "privilege", "provided", "by", "the", "hosting", "process", "(", "for", "example", ",", "if", "a", "Microsoft", "Office", "process", "was", "used", "as", "exploit", "vector", ")", ":", "Installation", "process", "under", "UAC", "When", "running", "under", "a", "limited", "UAC", "account", ",", "the", "installer", "extracts", "d3d9.dll", "and", "creates", "a", "persistence", "key", "under", "HKCU\\Software\\Microsoft\\Windows\\Run", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 1, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 1, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 1, 16 ]
[ "In", "cooperation", "with", "Cisco", "Advanced", "Services", "Incident", "Response,", "Talos", "identified", "several", "key", "aspects", "of", "the", "attack." ]
[ 16, 16, 16, 4, 12, 12, 12, 12, 12, 16, 16, 16, 16, 16, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper.Win32.StartPage!O", "TrojanDownloader.Small.DF3", "Trojan/Dropper.StartPage.bdz", "TROJ_FAVADD.SMI", "Win32.Trojan.WisdomEyes.16070401.9500.9719", "TROJ_FAVADD.SMI", "Win.Downloader.134775-1", "Win32.Trojan.Favadd.A", "Trojan.Win32.Alien.bnu", "Trojan.Win32.Zbot.dydfgj", "Trojan.Win32.Z.Startpage.69632.D", "Troj.Downloader.W32.VB.lkln", "TrojWare.Win32.Pasta.SAB", "Trojan.MulDrop1.43517", "Dropper.StartPage.Win32.220", "BehavesLike.Win32.VBObfus.km", "TrojanDropper.StartPage.ty", "Trojan[Downloader]/Win32.VB", "Trojan.Buzy.114", "Trojan.Win32.Alien.bnu", "Trojan:Win32/Favadd.C", "Trojan/Win32.StartPage.R6041", "Trojan.VBRA.06132", "Trojan.DL.VB!NOyJWQLVTJg", "Win32/Trojan.835" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader.Hegel", "TROJ_SHIZ.SMP6", "W32/Shiz.MU", "TROJ_SHIZ.SMP6", "Trojan.Win32.A.Downloader.53760.HN", "Trojan.Packed.20771", "BehavesLike.Win32.Cutwail.qh", "W32/Shiz.FQWK-1945", "TrojanDownloader:Win32/Hegel.F", "Trojan/Win32.ADH.R23078", "W32/Shiz.NCF!tr", "Win32/Trojan.74e" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Android/Twitoor", "is", "a", "backdoor", "capable", "of", "downloading", "other", "malware", "onto", "an", "infected", "device.", "It", "has", "been", "active", "for", "around", "one", "month." ]
[ 3, 16, 16, 3, 16, 16, 16, 16, 3, 16, 16, 5, 13, 16, 16, 16, 16, 16, 0, 8, 8 ]
[ "Devices", "running", "Android", "4.4", "and", "higher", "are", "protected", "by", "Verified", "Boot", "." ]
[ 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Using", "a", "publicly", "available", "rooting", "framework", ",", "the", "PHA", "attempts", "to", "root", "devices", "and", "gain", "persistence", "on", "them", "by", "reinstalling", "itself", "on", "the", "system", "partition", "of", "rooted", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "RIG", "exploit", "kit", "sends", "Ramnit", "payloads", "via", "VBScript", "CVE-2016-0189" ]
[ 3, 11, 11, 16, 3, 11, 16, 1, 9 ]
[ "Some", "applications", "rely", "on", "SMS", "when", "it", "comes", "to", "in-app", "purchases", "β€”", "the", "transaction", "data", "is", "transferred", "via", "a", "short", "text", "message", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Angler", "began", "exploiting", "CVE-2015-3090", "about", "two", "weeks", "after", "Adobe", "released", "a", "patch." ]
[ 3, 16, 7, 15, 16, 0, 8, 16, 4, 16, 16, 16 ]
[ "It", "checks", "for", "different", "kinds", "of", "emulators", ",", "including", "QEMU", ",", "Genymotion", ",", "BlueStacks", "and", "Bignox", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 16, 5, 16, 5, 16 ]
[ "So", "let's", "make", "a", "level-headed", "assessment", "of", "what", "is", "really", "out", "there." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "loads", "code", "from", "encrypted", "resources", "dynamically", ",", "which", "most", "detection", "engines", "can", "not", "penetrate", "and", "inspect", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Three", "distinctive", "elements", "of", "BAIJIU", "drew", "and", "held", "our", "attention:", "the", "unusual", "complexity", "of", "the", "attack;", "the", "appropriation", "of", "web", "hosting", "service", "GeoCities", "of", "1990s", "fame;", "and", "the", "use", "of", "multiple", "methods", "of", "obfuscation." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 1, 9, 9, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "assume", "that", "these", "two", "elements", "were", "chosen", "to", "trick", "security", "products." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "stealer", "is", "disguised", "as", "a", "legitimate", "Google", "Drive", "extension", "and", "it", "can", "monitor", "browsing", "history,", "capture", "screenshots,", "and", "inject", "malicious", "scripts", "to", "steal", "funds", "from", "cryptocurrency", "exchanges." ]
[ 3, 11, 16, 16, 16, 16, 5, 13, 13, 13, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Mansabo.389120.B", "Win32.Trojan-Spy.Trickbot.F", "Trojan.Win32.Mansabo.aiu", "Trojan.Win32.Mansabo.evnqvj", "Trojan.Inject2.64433", "Trojan.Mansabo.ni", "TR/AD.Inject.jyiec", "Trojan/Win32.Mansabo", "Trojan.Win32.Mansabo.aiu", "Trojan/Win32.Inject.C2278939", "TScope.Trojan.VB", "Trojan.TrickBot", "Trj/GdSda.A", "Win32.Trojan.Mansabo.Ljab", "W32/Mansabo.AIU!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Exploit/W32.Pidief.6283.GLW", "JS/Pdfcm.AQ", "Exploit-PDF.sd", "Bloodhound.Exploit.196", "EXPL_EXECOD.A", "Pdf.Exploit.CVE_2009_0927-1", "Exploit.Win32.Pidief.bni", "PDF.Exploit.CVE-2009-0927.A", "Exploit.W32.Pidief!c", "Trojan-Dropper:JS/PdfDropper.A", "EXPL_EXECOD.A", "BehavesLike.PDF.Exploit.xn", "EXP/Pidief.arl", "Exploit.Win32.Pidief.bni", "Trojan.JS.Downloader.BEZ", "Exploit.Win32.Pidief.bni", "Win32.Exploit.Pidief.Hupr", "Trojan.Js.Exploit", "virus.pdf.pdfjs.1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "All", "Firefox", "users", "are", "urged", "to", "update", "to", "Firefox", "39.0.3.", "The", "fix", "has", "also", "been", "shipped", "in", "Firefox", "ESR", "38.1.1." ]
[ 16, 5, 13, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13 ]
[ "The", "malware", "documented", "in", "this", "post", "was", "predominantly", "64-bit,", "however,", "there", "are", "32-bit", "versions", "of", "the", "malware", "in", "the", "wild." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 5, 13, 16, 16, 3, 16, 16, 16 ]
[ "The", "new", "Android", "ransomware", "variant", "overcomes", "these", "barriers", "by", "evolving", "further", "than", "any", "Android", "malware", "we", "’", "ve", "seen", "before", "." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16 ]
[ "First", "off", ",", "it", "registers", "the", "infected", "device", "in", "the", "administrative", "panel", "by", "sending", "a", "GET", "request", "to", "the", "relative", "address", "gate.php", "(", "in", "later", "versions", "gating.php", ")", "with", "the", "ID", "(", "device", "identifier", "generated", "by", "the", "setPsuedoID", "function", "in", "a", "pseudo-random", "way", "based", "on", "the", "device", "IMEI", ")", "and", "screen", "(", "shows", "if", "the", "device", "is", "active", ",", "possible", "values", "are", "β€œ", "on", "”", ",", "β€œ", "off", "”", ",", "β€œ", "none", "”", ")", "parameters", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "targetting", "Linux", "also", "known", "as:", "TrojanXor.Linux.DDos.A", "Linux/DDoS-Xor.A", "ELF/Trojan.JWZU-2", "Linux.Xorddos", "ELF_XORDDOS.SM", "Unix.Trojan.DDoS_XOR-1", "HEUR:Trojan-DDoS.Linux.Xarcen.a", "Trojan.Unix.Xarcen.eftmox", "Troj.Ddos.Linux!c", "Linux.DDoS.Xor.4", "Trojan.Xorddos.Linux.34", "Linux/DDoS-Xor.A", "TrojanDDoS.Linux.ff", "LINUX/Xorddos.tmifd", "Trojan[DDoS]/Linux.Xarcen.a", "Trojan.Trojan.Linux.XorDDoS.2", "Linux/Xorddos.625867", "HEUR:Trojan-DDoS.Linux.Xarcen.a", "Trojan.Linux.XorDdos.a", "Trojan.Linux.DDoS", "ELF/DDoS.BH!tr", "ELF/XorDDos.A", "Win32/Trojan.DDoS.ee7" ]
[ 16, 3, 16, 11, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Tibrun", "Trojan/Kryptik.bwcw", "Trojan.Razy.D3CCE1", "W32/Trojan2.ODQP", "Trojan.Bruterdep", "TROJ_TIBRUN.B", "Trojan-Spy.Win32.POSBrut.b", "Trojan.Win32.Crypt.ctwfbi", "Troj.W32.Crypt.csx!c", "Trojan.DownLoader9.55744", "Trojan.Crypt.Win32.14169", "TROJ_TIBRUN.B", "Trojan.Krypt-POS", "W32/Trojan.WWSD-0234", "Trojan/Crypt.eom", "TR/Spy.13824.412", "Trojan/Win32.Crypt.csx", "Trojan:Win32/Tibrun.A", "Trojan-Spy.Win32.POSBrut.b", "Trojan/Win32.Tibrun.C287165", "Trojan.Crypt", "Trj/CI.A", "Win32/Kryptik.BWCW", "Win32.Trojan-spy.Posbrut.Sxxp", "Trojan.Crypt!ZT6l9g/i+CQ", "W32/BrutPOS.B!tr", "Win32/Trojan.2d6" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9846", "Win32/Droplet.YK", "Trojan.NtRootKit.9406", "TR/Horse.QWS", "Trj/CI.A", "W32/Malware_fam.NB", "Win32/RootKit.Rootkit.43e" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "infection", "happens", "in", "multiple", "stages", "and", "the", "dropper", "is", "very", "similar", "to", "many", "common", "worm", "that", "targets", "embedded", "devices", "from", "multiple", "architectures." ]
[ 16, 1, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 3, 16, 16, 5, 13, 16, 5, 13 ]
[ "It", "only", "has", "two", "parts", ",", "the", "method", "indicated", "by", "word", "β€œ", "info", "”", "and", "the", "victim", "identifier", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "BOT", "UPDATES", "EventBot", "has", "a", "long", "method", "called", "parseCommand", "that", "can", "update", "EventBot", "’", "s", "configuration", "XML", "files", ",", "located", "in", "the", "shared", "preferences", "folder", "on", "the", "device", "." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Answer", "from", "the", "C2", "The", "C2", "will", "check", "the", "country", "field", ",", "if", "it", "'s", "empty", "or", "if", "the", "country", "is", "not", "targeted", ",", "it", "will", "reply", "with", "a", "\"", "Unauthorized", "''", "answer", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Yesterday,", "our", "colleagues", "from", "Symantec", "published", "their", "analysis", "of", "Longhorn,", "an", "advanced", "threat", "actor", "that", "can", "be", "easily", "compared", "with", "Regin,", "ProjectSauron,", "Equation", "or", "Duqu2", "in", "terms", "of", "its", "complexity." ]
[ 16, 16, 4, 16, 4, 16, 16, 16, 16, 6, 16, 6, 14, 14, 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 6, 16, 16, 16, 16, 16 ]
[ "Before", "patching", ",", "the", "Trojan", "will", "backup", "the", "original", "library", "with", "a", "name", "bak_", "{", "original", "name", "}", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Waldek.3342336", "Trojan.Mauvaise.SL1", "Backdoor.Trojan", "Trojan.Win32.Waldek.wvv", "Trojan.Win32.Waldek.elvbza", "Troj.W32.Waldek!c", "Trojan.Waldek.exr", "Trojan:Win32/Waldek.A!bit", "Trojan.Win32.Waldek.wvv", "Backdoor.Andromeda", "Trj/Gamarue.A", "Win32/Worm.5d8" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Worm.AutoRun.bo", "W32.SillyFDC", "Trojan.DownLoader8.34261", "Worm:Win32/Metibh.A", "Rootkit.Ressdt" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "This", "malware", "also", "contains", "a", "screen", "recorder", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "helps", "the", "C2", "define", "what", "actions", "it", "can", "do", "before", "being", "detected", "on", "the", "mobile", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "However", "the", "registrar", "NameCheap,", "Inc.", "covers", "a", "pool", "of", "287.411.506", "domains", "where", "at", "least", "0.10%", "can", "be", "considered", "as", "potentially", "malicious." ]
[ 16, 16, 16, 4, 12, 16, 16, 1, 9, 9, 9, 16, 3, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FakeWinlogonXIA.Trojan", "Trojan.Win32.Swisyn!O", "Trojan.Swisyn.Win32.25583", "Trojan/Swisyn.alai", "Win32.Worm.VB.qn", "W32.SillyFDC", "Win32/SillyAutorun.EYX", "TROJ_SWISYN.AJ", "Trojan.Win32.Swisyn.alai", "Trojan.Win32.Vb.btqbl", "Trojan.Win32.Swisyn.36864.C", "Trojan.KillFiles.12035", "TROJ_SWISYN.AJ", "Trojan/Swisyn.vmn", "Worm/Win32.WBNA.mjv", "Worm:Win32/Roopirs.A", "Trojan.Win32.Swisyn.alai", "Trojan/Win32.Swisyn.R2752", "Trojan.VBRA.04943", "Trojan.PoorVirus", "I-Worm.VB.NUV", "Win32/VB.NUV", "Trojan.Win32.Swisyn" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "MemScan:Backdoor.Turkojan.BM", "Trojan.PWS.VKont!NjMVuhwtYR0", "BKDR_TURKOJN.SMD", "Win32.Backdoor.Turko", "PUA.Packed.Themida-2", "Packed.Win32.Black.a", "MemScan:Backdoor.Turkojan.BM", "Packed.Win32..Black.~A", "MemScan:Backdoor.Turkojan.BM", "Trojan.Packed.650", "BKDR_TURKOJN.SMD", "Heuristic.BehavesLike.Win32.Fake.O", "Trojan:Win32/Turkojan.B!dll", "MemScan:Backdoor.Turkojan.BM", "Packed/Win32.Black", "Trojan.Win32.Nodef.dqw", "Trj/Thed.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "As", "on", "the", "desktop", ",", "mobile", "users", "need", "to", "be", "wary", "of", "installing", "applications", "from", "outside", "of", "legitimate", "app", "stores", "and", "sources", "and", "be", "on", "the", "lookout", "for", "bogus", "banking", "sites", "that", "ask", "for", "more", "information", "than", "users", "would", "normally", "provide", "on", "legitimate", "sites", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "report", "analyzes", "a", "campaign", "of", "targeted", "attacks", "against", "an", "NGO", "working", "on", "environmental", "issues", "in", "Southeast", "Asia." ]
[ 16, 16, 16, 16, 6, 16, 16, 1, 16, 16, 4, 16, 16, 16, 16, 16, 2, 10 ]
[ "The", "developers", "refer", "to", "this", "tool", "by", "the", "name", "Kazuar,", "which", "is", "a", "Trojan", "written", "using", "the", "Microsoft", ".NET", "Framework", "that", "offers", "actors", "complete", "access", "to", "compromised", "systems", "targeted", "by", "its", "operator." ]
[ 16, 6, 16, 16, 16, 3, 16, 16, 16, 3, 16, 16, 16, 3, 16, 16, 5, 13, 13, 13, 16, 16, 6, 16, 16, 16, 5, 13, 16, 16, 16, 6 ]
[ "A", "backdoor", "also", "known", "as:", "BackDoor-AZF.dll", "BKDR_BITS.B", "W32/Backdoor.FPJ", "Backdoor.Trojan", "Win32/Bits.A", "BKDR_BITS.B", "Backdoor.Win32.Bits", "Trojan.Win32.Bits.dlhcqc", "Backdoor.Win32.Bits.A", "BackDoor.Bits", "Backdoor.Bits.Win32.9", "BackDoor-AZF.dll", "W32/Backdoor.SUAV-1947", "Backdoor/Bits.b", "Backdoor:Win32/Bits.B", "Backdoor.Win32.Bits", "Bck/Bits.A", "Backdoor.Bits!2M7xWD4MAec" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Once", "installed", ",", "the", "RAT", "registers", "the", "infected", "device", "as", "shown", "below", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.B13C", "Trojan.Blouiroet", "Trojan.Win32.Blouiroet.au", "Trojan.Win32.Blouiroet.evaxpp", "Trojan.Win32.Z.Symmi.3033600", "Troj.W32.Blouiroet!c", "Win32.Trojan.Blouiroet.Wvkk", "BehavesLike.Win32.Trojan.vc", "Trojan.Blouiroet.s", "Trojan.Symmi.D1371C", "Trojan.Win32.Blouiroet.au", "Trojan:Win32/Blouiroet.A", "Trojan/Win32.Blouiroet.C2267836", "Trojan.Blouiroet", "Trj/CI.A", "Win32/Trojan.c10" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "From", "a", "single", "instance", "of", "the", "encoded", "JavaScript", "discovered", "in", "one", "version", "of", "this", "malware,", "we", "pivoted", "on", "the", "Command", "and", "Control", "C2", "IPv4", "address", "discovered", "during", "static", "analysis", "and", "deobfuscation,", "using", "our", "Threat", "Intelligence", "Service", "AutoFocus,", "unearthed", "many", "more", "versions", "of", "the", "malware", "and", "found", "that", "the", "versions", "seen", "to", "date", "were", "delivering", "a", "credential-stealing", "Trojan", "as", "the", "final", "payload." ]
[ 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 13, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 3, 11, 11 ]
[ "We", "found", "no", "other", "information", "stolen", "from", "the", "victims", "to", "be", "accessible", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "VirTool.VBInject", "Trojan.Win32.Clicker!BT", "Trojan.Kazy.D6D077", "Win32.Trojan.Trojan-Clicker.e", "Trojan.Win32.VB.dwztex", "Trojan.Win32.Z.Kazy.28676", "Win32.HLLW.VBNA.based", "BehavesLike.Win32.Trojan.mz", "Trojan.Win32.TrojanClicker", "TrojanClicker.VB.fwe", "TR/Kazy.446583.222", "TrojanClicker:Win32/Wimg.A", "Trojan.Win32.Clicker!BT", "TScope.Trojan.VB", "Trj/GdSda.A", "W32/TrojanClicker.OFQ!tr", "Win32/Trojan.de7" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "first", "attack", "vector", "is", "to", "compromise", "the", "out", "of", "band", "authentication", "for", "online", "banks", "that", "rely", "on", "SMS", "using", "SMS", "forwarding", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Many", "of", "the", "strings", "in", "the", "application", "are", "XOR", "'d", "with", "the", "key", "Kjk1MmphFG", ":", "After", "some", "additional", "requests", ",", "the", "dropper", "made", "a", "POST", "request", "to", "https", ":", "//54.71.249.137/56e087c9-fc56-49bb-bbd0-4fafc4acd6e1", "which", "returned", "a", "zip", "file", "containing", "the", "second", "stage", "binaries", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "July", "13", "Further", "analysis", "of", "the", "hacking", "team", "dump", "revealed", "that", "the", "company", "used", "UEFI", "BIOS", "rootkit", "to", "keep", "their", "Remote", "Control", "System", "(", "RCS", ")", "agent", "installed", "in", "their", "targets", "’", "systems", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 3, 11, 11, 11, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "CONCLUSION", "We", "witness", "actors", "continually", "using", "open-source", "platforms", ",", "code", "and", "packages", "to", "create", "their", "own", "software", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "SpyNote", "RAT", "registers", "a", "service", "called", "AutoStartup", "and", "a", "broadcast", "receiver", "named", "BootComplete", "." ]
[ 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "These", "attacks", "are", "targeted,", "but", "not", "spear-phished." ]
[ 16, 1, 16, 16, 16, 16, 1 ]
[ "CVE-2017-0199", "was", "originally", "a", "zero-day", "remote", "code", "execution", "vulnerability", "that", "allowed", "attackers", "to", "exploit", "a", "flaw", "that", "exists", "in", "the", "Windows", "Object", "Linking", "and", "Embedding", "OLE", "interface", "of", "Microsoft", "Office", "to", "deliver", "malware." ]
[ 1, 16, 16, 16, 7, 15, 15, 15, 15, 15, 16, 6, 16, 3, 16, 16, 16, 16, 16, 3, 11, 11, 11, 11, 11, 11, 16, 16, 5, 13, 16, 16, 3 ]
[ "By", "performing", "a", "deep", "analysis", "of", "the", "malware", ",", "we", "were", "able", "to", "extract", "the", "unpacked", "JAR", "file", "mycode.jar", "and", "reveal", "some", "very", "interesting", "code", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "data", "targeted", "for", "theft", "also", "have", "similar", "formats", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "second", "stage", "The", "second", "stage", "apps", "contain", "the", "surveillanceware", "capabilities", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Triosir.682", "Backdoor:Win32/Rupski.A", "Trojan.Triosir!", "AdWare.AddLyrics", "Win32/Virus.Adware.cd5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "sendAll", "function", "used", "to", "spread", "malicious", "messages", "to", "the", "contact", "list", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "turns", "out", "that", "those", "smaller", "Trojans", "face", "serious", "problems", "trying", "to", "get", "root", "access", "on", "Android", "4.4.4", "and", "above", ",", "because", "a", "lot", "of", "vulnerabilities", "were", "patched", "in", "these", "versions", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HackTool.Win32.Injecter" ]
[ 16, 3, 16, 16, 16, 1 ]
[ "He", "also", "used", "his", "email", "account", "to", "log", "into", "various", "services", "in", "the", "video", ",", "which", "identifies", "him", "as", "the", "adware", "domain", "owner", ",", "beyond", "any", "doubt", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Ginp", "’", "s", "unusual", "target", "selection", "is", "not", "just", "about", "its", "focus", "on", "Spanish", "banks", "but", "also", "the", "wide", "selection", "of", "targeted", "apps", "per", "bank", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojanpws.Ginapass", "Trojan.Win32.Figina.ewevus", "Trojan.PWS.Figina", "Tool.DYAMAR.Win32.193", "BehavesLike.Win32.Ransom.bc", "PWS:Win32/GinaPass.D", "Downloader.Delphi", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Stage", "1", ":", "Exodus", "One", "The", "first", "stage", "installed", "by", "downloading", "the", "malicious", "apps", "uploaded", "on", "Google", "Play", "Store", "only", "acts", "as", "a", "dropper", "." ]
[ 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16 ]
[ "They", "decrypt", "several", "archive", "files", "from", "the", "assets", "folder", "of", "the", "installation", "package", ",", "and", "launch", "an", "executable", "file", "from", "them", "with", "the", "name", "β€œ", "start.", "”", "The", "interesting", "thing", "is", "that", "the", "Trojan", "supports", "even", "the", "64-bit", "version", "of", "Android", ",", "which", "is", "very", "rare", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16 ]
[ "Bitdefender", "Labs", "has", "issued", "a", "technical", "advisory", "to", "warn", "the", "public", "about", "a", "new", "wave", "of", "opportunistic", "attacks", "using", "a", "vulnerability", "in", "Zoho", "ManageEngine", "servers,", "which", "could", "affect", "tens", "of", "thousands", "of", "businesses." ]
[ 4, 12, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 7, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 4 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Clicker!BT", "Win32.Trojan.WisdomEyes.16070401.9500.9503", "Uds.Dangerousobject.Multi!c", "trojanclicker.msil.fakeie.a", "TR/Dropper.MSIL.138467", "Trojan.MSIL.Krypt.2", "TrojanClicker:MSIL/FakeIE.A", "Trojan.Win32.Clicker!BT", "Downloader.MSIL.ASXS", "Win32/Trojan.d60" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Worm.Fujacks.AB", "Packed.Win32.TDSS!O", "W32/Fujacks.s", "Worm.Fujack.Win32.6", "W32/Fujacks.aa.2", "PE_FUJACKS.EA", "Win32.Worm.BMW.b", "W32/Fujack.R", "W32.Fujacks.E", "Win32/Emerleox.CO", "PE_FUJACKS.EA", "Win.Worm.Fujack-8", "Worm.Win32.Fujack.aa", "Win32.Worm.Fujacks.AB", "Trojan.Win32.Fujack.nsvf", "W32.W.Fujack.kZ4V", "Virus.Win32.Viking.a", "Win32.Worm.Fujacks.AB", "Win32.HLLP.Whboy.80", "BehavesLike.Win32.MultiPlug.th", "W32/Fujack.R", "Worm/Viking.Tail", "TR/Drop.Hupigon.kmx", "Trojan[Packed]/Win32.CPEX-based", "Win32.WhBoy.aa.183492", "Trojan:WinNT/Kangkio.A", "Win32.Worm.Fujacks.AB", "Win32.WhBoy.AJ", "Worm.Win32.Fujack.aa", "Win32.Virus.Neshta.D", "Win32/Dellboy.Z", "Win32.Worm.Fujacks.AB", "Win32.HLLW.Whboy", "RiskWare.Tool.CK", "Win32.Fujacks.AD", "Win32/Fujacks.AD", "Win32.HLLP.WHBoy.AP", "Worm.Win32.Fujack", "W32/BoyhW.V", "Virus.Win32.Viking.LB" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Heur.E05F81", "Win32.HLLW.Autoruner2.27649", "BehavesLike.Win32.Fake.dc", "Worm:Win32/Namepuk.A", "HEUR/Fakon.mwf", "Trojan.FKM!1pKOHJnJsdU" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "Open", "source", "reporting", "recently", "indicated", "new", "activity", "from", "the", "Iranian", "actor", "publicly", "known", "as", "Greenbug", "targeting", "Saudi", "Arabia." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 6, 16, 2, 10 ]
[ "Following", "on", "from", "our", "post", "on", "Angler", "EK", "we", "are", "going", "to", "expose", "the", "mechanics", "behind", "the", "Bedep", "ad-fraud", "malware." ]
[ 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11 ]
[ "The", "exploit", "files", "involved", "were", "identical", "to", "the", "Hacking", "Team's", "leaked", "exploit", "HTML,", "JavaScript,", "and", "ShockWave", "Flash", "0-day", "files." ]
[ 16, 3, 1, 16, 16, 16, 16, 16, 4, 12, 16, 3, 1, 9, 16, 1, 9, 9, 9 ]
[ "Since", "then", "we", "have", "identified", "a", "number", "of", "attacks", "over", "a", "two-year", "period,", "beginning", "in", "April", "2014,", "which", "we", "attribute", "to", "Suckfly." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 0, 8, 16, 16, 0, 8, 16, 16, 16, 16, 6 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win32.Koutodoor!O", "Trojan.Koutodoor.E", "Win32.Rootkit.Koutodoor.a", "Trojan.Koutodoor", "TROJ_DLOADR.SMOM", "Backdoor.Win32.Koutodoor.aihc", "Trojan.Win32.RKDoor.evaszd", "Backdoor.Win32.Koutodoor.HC", "Trojan.DownLoader3.76", "Trojan.Koutodoor.Win32.5401", "TROJ_DLOADR.SMOM", "Trojan.Rootkit.Pakes", "W32.Backdoor.Koutodoor", "Trojan[Backdoor]/Win32.Koutodoor", "Win32.Troj.JunkcodeT.a.188672", "Trojan.Koutodoor.12", "Backdoor.Win32.Koutodoor.aihc", "TrojanDropper:Win32/Minmal.A", "Backdoor/Win32.Koutodoor.R1785", "Trojan.PSW.Win32.OnlineGame.d", "Trojan.Win32.Koutodoor.AN" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Exploit.MSIL", "Exploit.Win32.CVE20130074.eupinx", "W32/Trojan.QBBK-0155", "Exploit.MSIL.cn", "EXP/CVE-2013-0074.cpsmi", "Exploit:MSIL/CVE-2016-0034.B", "Trj/GdSda.A", "Trojan.Win32.Exploit", "W32/CVE_2013_0074.GW!tr", "Win32/Trojan.Exploit.d89" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "China", "seems", "to", "a", "mass", "victim", "of", "this", "kind", "of", "malware", "having", "a", "92", "%", "share", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Code", "snippets", "showing", ":", "the", "decoding", "algorithm", "shared", "by", "both", "Bouncing", "Golf", "and", "Domestic", "Kitten", "(", "top", ")", ",", "the", "format", "of", "data", "that", "Domestic", "Kitten", "’", "s", "malware", "targets", "to", "steal", "(", "center", ")", ",", "and", "how", "both", "Bouncing", "Golf", "(", "bottom", "left", ")", "and", "Domestic", "Kitten", "(", "bottom", "right", ")", "use", "\"", "\"", "as", "a", "separator", "in", "their", "command", "strings", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanSpy.VBChuchelo.bk", "Trojan/Spy.VBChuchelo.g", "Trojan-Spy.Win32.VBChuchelo", "TrojanSpy.VBChuchelo.G", "Win32/Spy.KeyLogger.NDE", "Trojan-Downloader.Win32.Noesis.11.B!IK", "W32/VBTroj.WTX", "Trojan.VB-7191", "Trojan-Spy.Win32.VBChuchelo.g", "Backdoor.VB.1", "TrojWare.Win32.TrojanSpy.VB.~FJ", "Trojan-Spy.Win32.VBChuchelo.g", "TrojanSpy.VBChuchelo.v", "Backdoor.Trojan", "Backdoor:Win32/Zumamumy.A", "Trojan.Win32.VBChuchelo.106667", "Backdoor.VB.1", "Win-Trojan/Vbchuchelo.106658", "Trojan-Spy.Win32.VBChuchelo.g", "Trojan-Downloader.Win32.Noesis.11.B", "Dropper.Tiny", "Trj/Downloader.MDW" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "That", "is", "actually", "how", "the", "bad", "guys", "decided", "to", "monetize", "the", "Trojan", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "bulk", "of", "the", "victims", "were", "predominantly", "based", "out", "of", "Ecuador,", "Venezuela,", "Peru,", "Argentina,", "and", "Columbia;", "however,", "other", "victims", "were", "identified", "in", "Korea,", "the", "United", "States,", "the", "Dominican", "Republic,", "Cuba,", "Bolivia,", "Guatemala,", "Nicaragua,", "Mexico,", "England,", "Canada,", "Germany,", "Russia,", "and", "Ukraine." ]
[ 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 2, 10, 10, 10, 16, 2, 16, 16, 4, 16, 16, 16, 2, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDropper.Yabinder.2.0", "Trojan.DR.Yabinder!OrBzj5WtPwc", "Win32/Yabinder.20", "W32/Yabinder.C", "W32.Slackor.dr", "Slacke.A", "TROJ_YABINDER.20", "Trojan.Yabinder.20B", "TrojanDropper.Yabinder.2.0", "TrojWare.Win32.Yabinder.20", "TrojanDropper.Yabinder.2.0", "Trojan.MulDrop.310", "TR/Yabinder.20.B", "TROJ_YABINDER.20", "Win32/TrojanRunner.Yab.200", "W32/Yabinder.C", "TrojanDropper:Win32/Yabinder.2_0", "Backdoor.Win32.Bifrose.168361", "TrojanDropper.Yabinder.2.0", "Dropper/Yabinder.9728", "Backdoor.Win32.Bifrose.bco", "Malware.Slackor", "Trojan.Yabinder.a", "Trojan-Dropper.Win32.Yabinder.20", "W32/Yabinder.C!tr", "Dropper.Yabinder.A", "Trj/Yabinder.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom_YUHAK.A", "Trojan.MulDrop7.49600", "Ransom_YUHAK.A", "BehavesLike.Win32.PWSZbot.dh", "TR/RedCap.cgaww", "Trojan.Heur.RP.E93A3E", "Ransom:Win32/Wagcrypt.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "Project", "Spy", "’", "s", "earlier", "versions", "Searching", "for", "the", "domain", "in", "our", "sample", "database", ",", "we", "found", "that", "the", "coronavirus", "update", "app", "appears", "to", "be", "the", "latest", "version", "of", "another", "sample", "that", "we", "detected", "in", "May", "2019", "." ]
[ 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "One", "of", "these", ",", "called", "Marcher", "(", "aka", "Exobot", ")", ",", "seems", "to", "be", "especially", "active", "with", "different", "samples", "appearing", "on", "a", "daily", "basis", "." ]
[ 16, 16, 16, 16, 16, 3, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.ExpiroPC.PE", "BehavesLike.Win32.Trojan.cc", "Trojan[Dropper]/Win32.Gluer", "TrojanDropper:Win32/Gluer.dam#2" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.DOS.Filemaker.A", "Trojan.DOS.Filemaker.A", "Filemaker.b", "Trojan.DOS.Filemaker", "Trojan.DOS.Filemaker.A", "TrojWare.DOS.Filemaker", "Trojan.DOS.Filemaker.A", "Trojan.Filemaker", "TR/Filemaker.A", "Filemaker.b", "Trojan/DOS.DOS", "Trojan.DOS.Filemaker.A", "Filemaker.A", "Trojan.DOS.Filemaker", "Malware_fam.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9985", "W32/Trojan2.OWYQ", "Trojan.Msil", "W32/Trojan.FRCA-1486", "Trojan.Spacekito", "Trojan.Zusy.D177A1", "Trojan:MSIL/Spacekito.E", "PUP/Win32.Vittalia.R124797", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.DownLoader25.42759", "BehavesLike.Win32.BadFile.gh" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Banker.Win32.82933", "Win32.Trojan.WisdomEyes.16070401.9500.9712", "Trojan.Zbot", "Trojan-Spy.MSIL.Banker.jc", "Trojan.Win32.Banker.datvyw", "Troj.Spy.MSIL.Banker.jc!c", "Trojan-Spy.MSIL.CliBanker", "TR/Spy.Clipug.A.11", "Win32.Troj.Banker.kcloud", "TrojanSpy:MSIL/Clipug.A", "Trojan.Kazy.D5F205", "Trojan-Spy.MSIL.Banker.jc", "Trojan/Win32.ClipBanker.C415793", "Trj/Dtcontx.M", "Msil.Trojan-spy.Banker.Ecua", "Trojan.ClipBanker!", "MSIL/ClipBanker.A!tr", "Win32/Trojan.Spy.b4a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]