tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"Figure",
"4",
"."
] | [
16,
16,
16
] |
[
"Four",
"of",
"them",
"had",
"more",
"than",
"10,000",
"installs",
"and",
"one",
"of",
"them",
"had",
"more",
"than",
"50,000",
"installs."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"‘",
"versatility",
"’",
"was",
"present",
"in",
"the",
"first",
"version",
"of",
"Rotexy",
"and",
"has",
"been",
"a",
"feature",
"of",
"all",
"the",
"family",
"’",
"s",
"subsequent",
"representatives",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojanpws.Win64",
"Win32.Trojan.WisdomEyes.16070401.9500.9986",
"Win64.Trojan-qqpass.Qqrob.Lmug",
"BehavesLike.Win32.Rootkit.dh",
"HackTool.Mimikatz",
"Trojan.PSW.Mimikatz.acm",
"Trojan[PSW]/Win64.Mimikatz",
"HackTool:Win32/Mimikatz.A!dha",
"Troj.Psw.Win64.Mimikatz!c",
"BScope.TrojanPSW.Mimikatz",
"Win32/Trojan.PSW.a2b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Kinkisc.Worm",
"Trojan.Dropper.SRY",
"TrojanDownloader.Zlob.A4",
"Trojan.Fanny.MB",
"TROJ_ZLOB.SMFM",
"W32.Fanni",
"Win32/Zlob.PL",
"TROJ_ZLOB.SMFM",
"Win.Worm.Autorun-7948",
"Trojan.Dropper.SRY",
"Trojan.Win32.EquationDrug.n",
"Trojan.Dropper.SRY",
"Trojan.Win32.Downloader.184320.CW",
"Trojan.Dropper.SRY",
"Trojan.DownLoad2.36935",
"BehavesLike.Win32.Backdoor.ch",
"Worm.Win32.Funny",
"Worm/Win32.AutoRun",
"Worm:Win32/Fanys.A",
"Trojan.Win32.EquationDrug.n",
"Trojan.Dropper.SRY",
"Worm.Fanny",
"Trojan.Dropper.SRY",
"Trojan.Win32.Downloader.tyo",
"Worm.Win32.Fanny.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Archive",
"files",
"ZIP,",
"RAR,",
"ACE,",
"and",
"ISOs",
"containing",
"EXE",
"payloads"
] | [
1,
9,
9,
9,
9,
16,
1,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Autoit",
"Trojan.Symmi.D10095",
"Trojan.Win32.Autoit.exnvng",
"Trojan.Win32.Z.Autoit.1079042",
"Troj.W32.Autoit!c",
"Trojan.Inject1.38999",
"Trojan.AutoIt.Win32.7",
"BehavesLike.Win32.Trojan.th",
"Trojan.Win32.Eupuds",
"Trojan.Autoit.ixi",
"Trojan:Win32/BrobanEup.A",
"Trojan.Autoit.Banker",
"Win32.Trojan.Autoit.Szbl",
"W32/Autoit.AAV!tr",
"Win32/Trojan.839"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Infecting",
"legal",
"web",
"resources",
"help",
"spread",
"mobile",
"malware",
"via",
"popular",
"websites",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"'ve",
"contacted",
"the",
"potentially",
"affected",
"users",
",",
"disabled",
"the",
"applications",
"on",
"affected",
"devices",
",",
"and",
"implemented",
"changes",
"in",
"Verify",
"Apps",
"to",
"protect",
"all",
"users",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16
] |
[
"ViperRAT",
"has",
"been",
"operational",
"for",
"quite",
"some",
"time",
",",
"with",
"what",
"appears",
"to",
"be",
"a",
"test",
"application",
"that",
"surfaced",
"in",
"late",
"2015",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Mirleg.24544",
"Backdoor/Mirleg.a",
"TROJ_LEMIR.KM",
"Win.Trojan.Mirleg-1",
"Backdoor.Win32.Mirleg.a",
"Trojan.Win32.Mirleg.dkdm",
"Backdoor.Win32.Mirleg.24544",
"Backdoor.W32.Mirleg.a!c",
"BackDoor.Mirshell",
"Backdoor.Mirleg.Win32.3",
"TROJ_LEMIR.KM",
"BehavesLike.Win32.VTFlooder.mc",
"Trojan[Backdoor]/Win32.Mirleg",
"Backdoor.Win32.Mirleg.a",
"Backdoor:Win32/Mirle.A",
"Backdoor.Mirleg",
"Bck/Lmir.D",
"Win32.Backdoor.Mirleg.Tbik",
"Trojan.PSW.LMir!RFMQExC82yY",
"Backdoor.Win32.EggDrop",
"W32/BDoor.BCV!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"have",
"named",
"this",
"tool",
"BBSRAT."
] | [
16,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.VB.EV",
"Heuristic.Crypted"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"Always",
"keep",
"the",
"\"",
"Unknown",
"Sources",
"''",
"option",
"disabled",
"in",
"the",
"Android",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Farfli.20223",
"Win32.Trojan.Farfli.t",
"W32/Trojan.LJSX-0343",
"Backdoor.Trojan",
"BKDR_ZEGOST.SM44",
"Trojan.Win32.Dwn.dxihqn",
"TrojWare.Win32.AntiAV.~D",
"Trojan.DownLoader16.26781",
"Trojan.Farfli.Win32.30753",
"BKDR_ZEGOST.SM44",
"BehavesLike.Win32.Backdoor.kc",
"BDS/Backdoor.davcs",
"Trj/CI.A",
"Trojan.Farfli!Hj4dzX9BZUM",
"Trojan-PWS.Win32.Bjlog"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Hanove",
"W32/Trojan.BLPJ-3540",
"Backdoor.Trojan",
"Trojan-Dropper.Win32.Dapato.degm",
"Trojan.Win32.Drop.ddlhu",
"Trojan.MulDrop2.26538",
"BehavesLike.Win32.Trojan.fh",
"TrojanDropper.Dapato.owp",
"Trojan-Dropper.Win32.Dapato.degm",
"Backdoor:Win32/Hanove.A",
"Trojan/Win32.Hanove.C240436",
"Win32.Trojan-dropper.Dapato.Ebhb"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Its",
"name",
"originates",
"from",
"the",
"Arabic",
"word",
"maktub",
"which",
"means",
"this",
"is",
"written",
"or",
"this",
"is",
"fate"
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"For",
"most",
"of",
"its",
"history",
"it",
"operated",
"as",
"a",
"government",
"department",
"or",
"public",
"corporation",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"this",
"version",
"of",
"Ursnif",
"I",
"have",
"also",
"encountered",
"an",
"internal",
"peer-to-peer",
"communication",
"which",
"could",
"possibly",
"add",
"the",
"ability",
"for",
"the",
"sample",
"to",
"communicate",
"with",
"other",
"Ursnif",
"peers",
"over",
"the",
"same",
"network."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DownloaderHC.Trojan",
"Trojan-Ransom.Win32.FraudBlocker!O",
"Trojan/VB.bn",
"TROJ_RANSVB.SMA",
"Win32.Trojan.WisdomEyes.16070401.9500.9983",
"W32/MalwareS.U",
"TROJ_RANSVB.SMA",
"Trojan-Ransom.Win32.Chameleon.gfl",
"Trojan.Win32.Chameleon.edluzm",
"Trojan.Win32.A.FraudBlocker.9216.A[UPX]",
"Win32.Trojan.Chameleon.Phqb",
"Trojan.Winlock.364",
"Trojan.FakeAV.Win32.150033",
"W32/Risk.WDRB-6022",
"Trojan.Chameleon.c",
"TR/Ransom.VB.BN",
"Trojan:Win32/SMSer.F",
"Troj.Downloader.W32.Small.l5Bd",
"Trojan-Ransom.Win32.Chameleon.gfl",
"Trojan/Win32.Chameleon.C2304852",
"SScope.Trojan.Validium.va",
"Trojan.FraudBlocker!3BdV5QfTi3g",
"Trojan-Ransom.Win32.Fullscreen",
"W32/LockScreen.CH!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9993",
"Win32/Tnega.THZ",
"BehavesLike.Win32.Downloader.hh",
"PWS:Win32/Tibia.BB",
"Trojan.Zusy.Elzob.D6208",
"Trojan/Win32.Scar.R8662"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Exploit/W32.CAN.28672",
"Exploit.CAN",
"Trojan/Exploit.CAN.2002-0649.a",
"TROJ_SQLEXP.A",
"TROJ_SQLEXP.A",
"Win.Trojan.Exploit-173",
"Exploit.Win32.CAN.2002-0649.a",
"Exploit.Win32.CAN-2002-0649.gpav",
"Trojan.Win32.Exploit.28672.A",
"Exploit.W32.CAN.2002-0649.a!c",
"Exploit.Sqlck",
"Exploit.CAN.Win32.23",
"W32/Risk.DCEZ-2564",
"Exploit.CAN.g",
"TR/Expl.CAN-2002-0649.A",
"Trojan[Exploit]/Win32.CAN",
"Exploit.Win32.CAN.2002-0649.a",
"Exploit:Win32/CAN20020649.A",
"Exploit.CAN",
"Win32/Exploit.CAN-2002-0649.A",
"Win32.Exploit.Can.Eeqq",
"W32/ThcSQL.A!exploit",
"Win32/Trojan.Exploit.96c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Backdoor.Trojan",
"Trojan.Win32.DownLoad3.evepic",
"Win32.Trojan.Spy.Pgde",
"Trojan.DownLoad3.47177",
"BehavesLike.Win32.Downloader.lm",
"W32/Trojan.XTOU-1556",
"Trojan:Win32/Netfosor.A!dha",
"Trojan/Win32.Netfosor.C1246582",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Deborm.AC@mm",
"Worm.Win32.Deborm!O",
"Worm.Deborm",
"Win32.Deborm.AC@mm",
"Win32.Trojan.WisdomEyes.16070401.9500.9895",
"W32.HLLW.Deborms",
"Win.Downloader.88-1",
"Win32.Deborm.AC@mm",
"Worm.Win32.Deborm.ac",
"Win32.Deborm.AC@mm",
"Trojan.Win32.Deborm.fvmw",
"Worm.W32.Deborm!c",
"Win32.Deborm.AC@mm",
"Win32.HLLW.Deborm.27",
"BehavesLike.Win32.Downloader.nz",
"BehavesLike.Win32.ExplorerHijack",
"WORM/Deborm.AC",
"Worm:Win32/Deborm.AC",
"Win32.Deborm.E5BBB3",
"Worm.Win32.Deborm.ac",
"Worm.Deborm",
"Win32.Deborm.AC@mm",
"Trj/CI.A",
"Win32.Worm.Deborm.Pjxe"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"If",
"the",
"user",
"installs",
"the",
"profile",
",",
"the",
"malicious",
"website",
"will",
"open",
",",
"revealing",
"it",
"to",
"be",
"an",
"Apple",
"phishing",
"site",
",",
"as",
"seen",
"in",
"figure",
"2",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dynamer.10163",
"Trojan.Barys.DE0C3",
"Win32/Tnega.CfKWaYC",
"Trojan.Click2.60391",
"BehavesLike.Win32.Autorun.vc",
"Trojan-Banker.Win32.Banker",
"HackTool:Win32/Asoka.A",
"Unwanted/Win32.HackTool.R76574"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Talos",
"has",
"identified",
"an",
"email-based",
"attack",
"targeting",
"the",
"energy",
"sector,",
"including",
"nuclear",
"power,",
"that",
"puts",
"a",
"new",
"spin",
"on",
"the",
"classic",
"word",
"document",
"attachment",
"phish."
] | [
4,
16,
16,
16,
1,
9,
16,
4,
12,
12,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9926",
"Trojan-Downloader.Win32.Delf.koxi",
"Trojan.Win32.Delf.eurqqv",
"Trojan.Win32.Z.Delf.2321408",
"Downloader.Delf.Win32.55823",
"BehavesLike.Win32.Dropper.vh",
"W32/Trojan.VVSX-7495",
"TR/Dldr.Delf.xofbe",
"Trojan-Downloader.Win32.Delf.koxi",
"Trj/GdSda.A",
"Trojan-Downloader.Win32.Delf",
"W32/Delf.CFW!tr.dldr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9963",
"W32.Mytob@mm",
"Net-Worm.Win32.Mytob.bf",
"W32.W.VBNA.tni6",
"TrojWare.Win32.TrojanDownloader.Delf.accr",
"Win32.HLLM.MyDoom.based",
"BehavesLike.Win32.Trojan.pc",
"Net-Worm.Win32.Mytob",
"Worm/Mytob.atd",
"WORM/Mytob.MD",
"Trojan/Win32.Rukap.C17970",
"Win32.Trojan.Hoster.Heur"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Since",
"in",
"Android",
"8.0",
"(",
"SDK",
"API",
"26",
")",
"the",
"system",
"is",
"able",
"to",
"kill",
"idle",
"services",
",",
"this",
"code",
"raises",
"a",
"fake",
"update",
"notification",
"to",
"prevent",
"it",
":",
"Cybercriminals",
"have",
"the",
"ability",
"to",
"control",
"the",
"implant",
"via",
"HTTP",
",",
"XMPP",
",",
"binary",
"SMS",
"and",
"FirebaseCloudMessaging",
"(",
"or",
"GoogleCloudMessaging",
"in",
"older",
"versions",
")",
"protocols",
"."
] | [
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.Small!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9996",
"Backdoor.Trojan",
"BKDR_PUDORATE.A",
"Win.Trojan.Pudorat-2",
"Trojan-Dropper.Win32.Small.ix",
"Trojan.Win32.Pudorat.uvlp",
"BackDoor.PudoRat",
"Dropper.Small.Win32.205",
"BKDR_PUDORATE.A",
"W32/Trojan.ATSN-3573",
"Backdoor/Pudorat.e",
"BDS/Pudorat.E.Srv",
"Trojan[Backdoor]/Win32.Pudorat",
"Trojan.Graftor.Elzob.D2736",
"Trojan-Dropper.Win32.Small.ix",
"Backdoor:Win32/Pudorat.E",
"Trojan/Win32.Small.R102192",
"Backdoor.Pudorat",
"Trojan.DR.Small!n8WI7XFkeRA",
"Backdoor.Win32.Pudorat.G",
"W32/Pudorat.E!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Katusha.Win32.25040",
"Win.Trojan.357100-1",
"Trojan.Win32.Abacab.zfokj",
"BackDoor.Abacab.102",
"Trojan[Backdoor]/Win32.Revell",
"Backdoor:Win32/Revell.1_02",
"Win32.Virus.Temcac.A@dam",
"W32/Revll.102!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.TrodowsLTK.Trojan",
"Trojan/Cosmu.atqv",
"BehavesLike.Win32.AdwareRBlast.dm",
"Trojan.Zusy.Elzob.D560E",
"Trojan.Win32.A.Cosmu.83456[h]",
"Dropper/Malware.253952.FL",
"TrojanDropper:Win32/Blmoon.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"DOC",
"and",
"XLS",
"files",
"with",
"malicious",
"macros"
] | [
1,
16,
1,
9,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Dropped:Trojan.Downloader.VU",
"TrojanDownloader.Podcast",
"Trojan/Downloader.Adload.ci",
"Win32.Trojan.WisdomEyes.16070401.9500.9963",
"W32/Downloader.AIEZ",
"TROJ_DLOADR.CH",
"Win.Downloader.Adload-85",
"Dropped:Trojan.Downloader.VU",
"Trojan-Downloader.Win32.Adload.amn",
"Dropped:Trojan.Downloader.VU",
"Trojan.Win32.Delf.epwf",
"Trojan.Win32.Downloader.140800.D",
"Dropped:Trojan.Downloader.VU",
"TrojWare.Win32.TrojanDownloader.Adload.CI",
"Dropped:Trojan.Downloader.VU",
"Trojan.DownLoader6.4157",
"TROJ_DLOADR.CH",
"BehavesLike.Win32.Fujacks.cc",
"Downloader.Delphi",
"W32/Downloader.RKBR-2696",
"TrojanDownloader.Adload.hk",
"Adware.DollarRevenue",
"TR/Drop.Start.abk.4",
"Trojan[Downloader]/Win32.Adload",
"Trojan.Downloader.VU",
"Troj.Downloader.W32.Adload.amn!c",
"Trojan-Downloader.Win32.Adload.amn",
"Trojan/Win32.Banload.R41470",
"Dropped:Trojan.Downloader.VU",
"Trojan-Downloader.Win32.10213",
"Win32/TrojanDownloader.Adload.CI",
"Win32.Trojan-downloader.Adload.Pkqr",
"Trojan.DL.Adload!u3IAhoIxyiU"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.FcodeNHc.Trojan",
"Trojan.Dorv.S8319",
"Ransom.FileLocker",
"Trojan.Foreign.Win32.9536",
"Ransom.FileLocker/Variant",
"Trojan/Kryptik.aykk",
"Win32.Trojan.Filecoder.u",
"RANSOM_CRYPNAN_GA250444.UVPM",
"Trojan.Win32.Encoder.egvznv",
"Trojan-Ransom.Win32.FileCoder.nan",
"Backdoor.Win32.Hlux.NAN",
"Trojan.Encoder.217",
"RANSOM_CRYPNAN_GA250444.UVPM",
"BehavesLike.Win32.PWSZbot.dh",
"Trojan/Foreign.ewc",
"Trojan[Ransom]/Win32.Foreign",
"Ransom:Win32/Haperlock.A",
"Trojan.Symmi.D4C7E",
"Trojan/Win32.Foreign.R61679",
"BScope.Malware-Cryptor.Hlux",
"Win32/Filecoder.NAN",
"Trojan.Foreign!VfdOCZ5FB8A",
"Trojan.Win32.Sisron",
"Trj/Dtcontx.D"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"report",
"contains",
"indicators",
"of",
"compromise",
"IOCs",
"and",
"technical",
"details",
"on",
"the",
"tactics,",
"techniques,",
"and",
"procedures",
"TTPs",
"used",
"by",
"APT",
"actors",
"on",
"compromised",
"victims'",
"networks."
] | [
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
5,
13
] |
[
"List",
"of",
"PlugX",
"Command",
"And",
"Control",
"servers",
"used",
"to",
"attack",
"targets",
"in",
"Asia."
] | [
16,
16,
3,
1,
1,
1,
1,
16,
16,
1,
16,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win32.Chyopic!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TROJ_OGRAN.A",
"Win.Trojan.Downloader-30022",
"Trojan.Win32.Chyopic.bksyf",
"Trojan.Win32.S.Downloader.9984.A",
"Backdoor.W32.Chyopic.bu!c",
"Backdoor.Win32.Chyopic.A",
"BackDoor.ClDdos.6",
"TROJ_OGRAN.A",
"BehavesLike.Win32.FDoSBEnergy.zh",
"TrojanDownloader.Ogran.j",
"Trojan:Win32/Chcod.A",
"Trojan[Backdoor]/Win32.Chyopic",
"Trojan:Win32/Chcod.A",
"Trojan/Win32.HDC.C33704",
"Trojan.Chcod!5jj9mkC/wqU",
"Backdoor.Win32.Chyopic",
"Win32/Backdoor.7b0"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"customization",
"doesn",
"t",
"end",
"with",
"the",
"lure;",
"the",
"malware",
"used",
"in",
"the",
"campaigns",
"is",
"also",
"targeted",
"by",
"region",
"and",
"vertical."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
6,
16,
16,
16,
16,
2,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Risktool.Flystudio.17330",
"DDOS_NITOL.SMD",
"DDOS_NITOL.SMD",
"Win.Trojan.7486152-1",
"Backdoor.Win32.Sethift.a",
"Trojan.Win32.Spambot.wpwqo",
"Trojan.Spambot.10932",
"BehavesLike.Win32.Downloader.qc",
"Trojan.Win32.MicroFake",
"Backdoor.Win32.Sethift.a",
"Backdoor:Win32/Payduse.A!bit",
"Trojan/Win32.PbBot.R11181",
"Trojan.Cosmu",
"Trj/CI.A",
"W32/Nitol.C",
"Win32/Trojan.b7f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Vetor.PE",
"Virus.Win32.Virut.1!O",
"W32.Virut.G",
"W32.Virut.CF",
"Win32/Virut.17408",
"PE_VIRUX.Q",
"Win.Trojan.Virut-377",
"Virus.Win32.Virut.q",
"Virus.Win32.Virut.hpeg",
"Win32.Virut.5",
"Virus.Virut.Win32.1938",
"PE_VIRUX.Q",
"BehavesLike.Win32.Ipamor.lh",
"Win32/Virut.bn",
"Virus/Win32.Virut.ce",
"Win32.Virut.cr.61440",
"Virus:Win32/Virut.BN",
"W32.Virut.l5he",
"Virus.Win32.Virut.q",
"Win32/Virut.F",
"Virus.Virut.13",
"Win32/Virut.NBP",
"Backdoor.Win32.DsBot",
"W32/Sality.AO"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"targetting",
"Linux",
"also",
"known",
"as:",
"Android.Trojan.FakeApp.FC",
"Trojan:Fakebank.B",
"Android.Trojan.FakeApp.FC",
"HEUR:Trojan-Banker.AndroidOS.Asacub.ab",
"A.H.Ste.Banker.B",
"Android.BankBot.221.origin",
"HEUR:Trojan-Banker.AndroidOS.Asacub.ab",
"Android-Trojan/Banker.5d288",
"a.privacy.spiderbank",
"Trojan-Banker.AndroidOS.RuBank",
"Android/SpyBanker.HH!tr"
] | [
16,
3,
16,
11,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Some",
"of",
"the",
"settings",
"include",
":",
"The",
"URL",
"of",
"the",
"C",
"&",
"C",
"server",
"Service",
"wake-up",
"intervals",
"Important",
"package",
"names",
"Accessibility",
"permissions",
"status",
"Lockdown",
"screen",
"status",
"Recording",
"status",
"SMS",
"app",
"status",
"Kill",
"switch",
"status",
"Stealth",
"To",
"keep",
"its",
"resources",
"safer",
"and",
"make",
"analysis",
"more",
"difficult",
"for",
"researchers",
",",
"TrickMo",
"uses",
"an",
"obfuscator",
"to",
"scramble",
"the",
"names",
"of",
"its",
"functions",
",",
"classes",
"and",
"variables",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"panels",
"also",
"contain",
"Thai",
"JavaScript",
"comments",
"and",
"the",
"domain",
"names",
"also",
"contain",
"references",
"to",
"Thai",
"food",
",",
"a",
"tactic",
"commonly",
"employed",
"to",
"entice",
"users",
"to",
"click/visit",
"these",
"C2",
"panels",
"without",
"much",
"disruption",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-PWS.Win32.Banker.1!O",
"Trojan/Kryptik.adfi",
"Win32.Trojan.WisdomEyes.16070401.9500.9985",
"Infostealer.Bancos",
"TROJ_BANKPTCH.SMA",
"Trojan.PWS.Banker1.4670",
"TROJ_BANKPTCH.SMA",
"Trojan-PWS.Win32.Banker",
"Trojan/Menti.uci",
"W32.Infostealer.Banker",
"TR/Menti.A.2",
"Trojan/Win32.Unknown",
"PWS:Win32/Banjori.A",
"Trojan.Kazy.DFB0D",
"TScope.Malware-Cryptor.SB",
"W32/Krypt.CLE!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"PDF/Dropper.C!Camelot",
"Bloodhound.PDF.24",
"PDF/Exploit.Pidief.PIT",
"Heuristics.PDF.ObfuscatedNameObject",
"Trojan.Script.ExpKit.esqnwi",
"Exploit.PDF.Pidief.f",
"Exploit.PDF.889",
"HEUR_PDFEXP.D",
"BehavesLike.PDF.BadFile.dx",
"PDF/Dropper.C",
"EXP/Pidief.akc",
"Exploit:Win32/Pdfdrop.D",
"JS/SARS.S139",
"possible-Threat.PDF.Acmd",
"VBS/BanLoader.BBAF!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9772",
"Win32.Worm.Autorun.R",
"Trojan.Win32.Inject.srauk",
"Heur.Packed.Unknown",
"Trojan/Jorik.bmit",
"TrojanDownloader:Win32/Roker.A",
"W32/Llac.SHV!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"And",
"in",
"an",
"unusual",
"reversal",
"of",
"typical",
"bank",
"phishing",
"social",
"engineering",
"tactics,",
"the",
"phishing",
"emails",
"purport",
"to",
"be",
"from",
"the",
"bank's",
"customers."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
4,
12,
12
] |
[
"For",
"example",
",",
"we",
"found",
"a",
"piece",
"of",
"a",
"particularly",
"sophisticated",
"Android",
"ransomware",
"with",
"novel",
"techniques",
"and",
"behavior",
",",
"exemplifying",
"the",
"rapid",
"evolution",
"of",
"mobile",
"threats",
"that",
"we",
"have",
"also",
"observed",
"on",
"other",
"platforms",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.B01F",
"Ransom_Troldesh.R011C0DB318",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"Ransom_Troldesh.R011C0DB318",
"Trojan-Ransom.Win32.Shade.onr",
"Troj.Ransom.W32.Shade!c",
"Trojan.MulDrop7.59017",
"BehavesLike.Win32.ObfusRansom.dc",
"TR/Injector.cjsif",
"Ransom:Win32/Troldesh.A",
"Trojan-Ransom.Win32.Shade.onr",
"Trojan/Win32.Shade.R219897",
"TrojanRansom.Shade",
"Ransom.Shade",
"Trj/CI.A",
"NSIS/Injector.YO",
"Win32.Trojan.Shade.Szbw",
"W32/Injector.YD!tr",
"Win32/Trojan.Ransom.c29"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.ServicesIpripA.Trojan",
"Trojan.Ripinip.C",
"Backdoor/W32.Ripinip.20480.L",
"Backdoor.Win32.Ripinip!O",
"Backdoor.Ripinip.28625",
"Trojan.Ripinip.C",
"Backdoor/Ripinip.eea",
"Trojan.Ripinip.C",
"Win32.Backdoor.Ripinip.b",
"Backdoor.Ripinip",
"BKDR_RIPNIP.SMIA",
"Win.Trojan.Ripnip-3",
"Trojan.Ripinip.C",
"Backdoor.Win32.Ripinip.eea",
"Trojan.Ripinip.C",
"Trojan.Win32.Ripinip.buwod",
"Backdoor.Win32.A.Ripinip.20480",
"Trojan.Ripinip.C",
"Backdoor.Win32.Ripinip.~eea",
"Trojan.Ripinip.C",
"Win32.HLLW.Autoruner.28406",
"BackDoor-EVC.a",
"Backdoor.Win32.Ripinip",
"BDS/Ripinip.BN",
"Trojan[Backdoor]/Win32.Ripinip",
"Backdoor:Win32/Ripinip.C",
"Backdoor/Win32.Ripinip.R1964",
"Backdoor.Win32.Ripinip.eea",
"Win32/Ripinip.AP",
"BackDoor-EVC.a",
"TScope.Malware-Cryptor.SB",
"Backdoor.Win32.Rip.tji",
"Backdoor.Win32.Ripinip.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Recently",
"a",
"new",
"Carbanak",
"attack",
"campaign",
"dubbed",
"Digital",
"Plagiarist",
"was",
"exposed",
"where",
"the",
"group",
"used",
"weaponized",
"office",
"documents",
"hosted",
"on",
"mirrored",
"domains,",
"in",
"order",
"to",
"distribute",
"malware."
] | [
16,
16,
16,
6,
14,
14,
16,
6,
14,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
3
] |
[
"For",
"instance,",
"Sphinx",
"ZeuS",
"has",
"enhanced",
"its",
"capabilities",
"because",
"of",
"the",
"Olympics."
] | [
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
4
] |
[
"Like",
"BlackEnergy,",
"the",
"malware",
"used",
"by",
"the",
"so-called",
"Sandworm",
"APT",
"group",
"also",
"known",
"as",
"Quedagh,",
"Potao",
"is",
"an",
"example",
"of",
"targeted",
"espionage",
"malware",
"directed",
"mostly",
"at",
"targets",
"in",
"Ukraine",
"and",
"a",
"number",
"of",
"other",
"post-Soviet",
"countries,",
"including",
"Russia,",
"Georgia",
"and",
"Belarus."
] | [
16,
6,
16,
3,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
6,
3,
16,
16,
16,
16,
3,
11,
11,
16,
16,
3,
16,
16,
2,
16,
16,
16,
16,
16,
2,
10,
16,
2,
2,
16,
2
] |
[
"The",
"fact",
"that",
"the",
"overlay",
"screens",
"are",
"almost",
"identical",
"to",
"the",
"legitimate",
"banking",
"apps",
"suggests",
"that",
"the",
"actors",
"might",
"be",
"very",
"familiar",
"with",
"the",
"Spanish",
"banking",
"applications",
"and",
"might",
"even",
"be",
"accustomed",
"to",
"the",
"language",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"230",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"Allows",
"applications",
"to",
"change",
"network",
"connectivity",
"state",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"With",
"their",
"assistance,",
"we",
"have",
"confirmed",
"over",
"76",
"additional",
"messages",
"containing",
"NSO",
"exploit",
"links."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11
] |
[
"Capabilities",
"and",
"functionality",
"In",
"2013",
",",
"we",
"detected",
"several",
"technological",
"innovations",
"developed",
"and",
"used",
"by",
"criminals",
"in",
"their",
"malicious",
"software",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"RC4",
"key",
"is",
"hardcoded",
"in",
"EventBot",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Troj.Downloader.W32.AutoIt",
"Trojan.Win32.Pasta.ztb",
"Trojan.DownLoader11.57616",
"Trojan.Strictor.DE515",
"Trojan/Win32.Inject",
"Trojan.Pasta",
"IM-Worm.Win32.Sohanad"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"ransomware",
"is",
"developed",
"using",
"the",
"Go",
"programming",
"language."
] | [
16,
3,
16,
16,
16,
5,
13,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Zusy.D3D963",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.PWS.Stealer.17779",
"BehavesLike.Win32.PUPXAG.fc",
"Trojan.MSIL.gotl",
"Trojan:MSIL/Elmb.A!bit",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"Electronicfrontierfoundation.org",
"was",
"not",
"the",
"only",
"domain",
"involved",
"in",
"this",
"attack."
] | [
1,
16,
16,
16,
16,
1,
16,
16,
16,
1
] |
[
"Other",
"samples",
"communicated",
"with",
"other",
"servers",
"listed",
"at",
"the",
"bottom",
"of",
"this",
"report",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"ITG03",
"used",
"several",
"previously",
"unreported",
"malwares,",
"including",
"backdoor",
"and",
"PowerShell",
"scripts",
"suggesting",
"continued",
"ITG03",
"interest",
"in",
"exploiting",
"SWIFT",
"three",
"years",
"after",
"its",
"initial",
"campaign",
"in",
"2016."
] | [
6,
16,
16,
16,
16,
3,
16,
3,
16,
5,
13,
16,
16,
6,
16,
16,
7,
15,
0,
8,
16,
16,
16,
6,
16,
0
] |
[
"Hence",
",",
"we",
"name",
"this",
"new",
"spin-off",
"campaign",
"as",
"Jaguar",
"Kill",
"Switch",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanPWS.Kelopol.A3",
"W32/Application.USPT-4138",
"Hacktool.Keylogger",
"PWS:MSIL/Kelopol.B",
"Trojan.Win32.KeyLogger.ctnnso",
"Trojan.KeyLogger.14630",
"TSPY_KELOPOL.SM",
"TR/Habbo.skdh",
"Trojan.MSIL.Krypt.5",
"Trojan/Win32.Vapsup.R122716"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"2015,",
"many",
"of",
"these",
"techniques",
"and",
"activities",
"remain",
"in",
"use."
] | [
16,
0,
16,
16,
16,
1,
16,
16,
16,
16,
16
] |
[
"In",
"today's",
"article,",
"AnyRun",
"look",
"at",
"LimeRAT,",
"a",
"modular",
"piece",
"of",
"malware",
"designed",
"to",
"give",
"attackers",
"control",
"over",
"a",
"victim's",
"computer",
"and",
"use",
"it",
"for",
"crypto-mining",
"or",
"DDoS",
"attacks."
] | [
16,
16,
16,
4,
16,
16,
3,
16,
3,
11,
11,
11,
16,
16,
16,
6,
16,
16,
16,
5,
13,
16,
16,
16,
16,
1,
16,
1,
9
] |
[
"In",
"the",
"case",
"of",
"this",
"ransomware",
",",
"using",
"the",
"model",
"would",
"ensure",
"that",
"its",
"ransom",
"note—typically",
"fake",
"police",
"notice",
"or",
"explicit",
"images",
"supposedly",
"found",
"on",
"the",
"device—would",
"appear",
"less",
"contrived",
"and",
"more",
"believable",
",",
"increasing",
"the",
"chances",
"of",
"the",
"user",
"paying",
"for",
"the",
"ransom",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"have",
"dubbed",
"the",
"groups",
"latest",
"campaign",
"Digital",
"Plagiarist",
"for",
"its",
"signature",
"practice",
"of",
"mirroring",
"legitimate",
"sites",
"using",
"Tenmaxs",
"TelePort",
"Pro",
"and",
"TelePort",
"Ultra",
"site",
"mirroring",
"software",
"onto",
"similarly",
"named",
"domains,",
"on",
"which",
"the",
"TelePort",
"Crew",
"would",
"host",
"and",
"serve",
"up",
"malware",
"laden",
"Office",
"documents."
] | [
16,
16,
16,
16,
6,
16,
6,
14,
14,
16,
16,
16,
16,
16,
1,
9,
9,
16,
3,
11,
11,
16,
3,
11,
11,
11,
11,
16,
16,
16,
1,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16,
3,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Kolweb!O",
"Trojan.Lokrodem.25745",
"Trojan.Kolweb.Win32.139",
"Troj.W32.Kolweb.mBu8",
"Trojan/Kolweb.a",
"Win32.Trojan.WisdomEyes.16070401.9500.9687",
"Adware.Margoc",
"Win32/Startpage.SK",
"Win.Trojan.Kolweb-96",
"Trojan.Win32.Kolweb.a",
"Trojan.Win32.Kolweb.cxqwlv",
"Trojan.Win32.A.Kolweb.224389[ASPack]",
"Trojan.PWS.Mirka",
"BehavesLike.Win32.Sality.fc",
"Trojan/Kolweb.cm",
"TR/Delf.CF.13",
"Trojan/Win32.Kolweb",
"Trojan:Win32/Lokrodem.A.dll",
"Trojan.Win32.Kolweb.a",
"Trojan/Win32.Kolweb.C12167",
"Trojan.Kolweb",
"Trojan.Graftor.D33DE",
"Win32.Trojan.Kolweb.Edns",
"Trojan.PWS.Delf!+6OEG1VoGF8",
"Win32/Trojan.f0c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Using",
"the",
"SMS",
"has",
"an",
"initial",
"infection",
"vector",
"is",
"another",
"possibility",
"for",
"the",
"exfiltration",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"the",
"case",
"of",
"Hancitor,",
"it",
"still",
"seen",
"as",
"a",
"favourite",
"carrier",
"of",
"very",
"much",
"active",
"malware",
"families",
"such",
"as",
"Pony",
"and",
"Vawtrak."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
3,
16,
3
] |
[
"We",
"believe",
"that",
"the",
"operators",
"of",
"the",
"Bunitu",
"botnet",
"are",
"selling",
"access",
"to",
"infected",
"proxy",
"bots",
"as",
"a",
"way",
"to",
"monetize",
"their",
"botnet."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
7,
15,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
3
] |
[
"In",
"May",
"2018,",
"ITG03",
"actors",
"stole",
"$10",
"million",
"from",
"the",
"Banco",
"de",
"Chile."
] | [
16,
0,
8,
6,
14,
16,
16,
16,
16,
4,
12,
12,
12
] |
[
"Our",
"telemetry",
"shows",
"that",
"H-W0rm",
"is",
"one",
"of",
"the",
"most",
"active",
"RATs",
"we",
"ve",
"seen,",
"with",
"infections",
"observed",
"across",
"virtually",
"all",
"enterprise",
"verticals",
"and",
"geographies",
"in",
"which",
"Fidelis",
"Cybersecurity",
"products",
"are",
"deployed."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
2,
16,
16,
4,
12,
5,
16,
16
] |
[
"Its",
"price",
"starts",
"around",
"$2500",
"which",
"is",
"more",
"than",
"double",
"the",
"price",
"of",
"another",
"recent",
"entry",
"to",
"the",
"market."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Other",
"ransomware",
"families",
"use",
"infinite",
"loops",
"of",
"drawing",
"non-system",
"windows",
",",
"but",
"in",
"between",
"drawing",
"and",
"redrawing",
",",
"it",
"’",
"s",
"possible",
"for",
"users",
"to",
"go",
"to",
"settings",
"and",
"uninstall",
"the",
"offending",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"April",
"2017",
"we",
"started",
"observing",
"new",
"rooting",
"malware",
"being",
"distributed",
"through",
"the",
"Google",
"Play",
"Store."
] | [
16,
0,
8,
16,
16,
16,
3,
11,
11,
16,
16,
16,
5,
13,
13,
13
] |
[
"Within",
"days",
",",
"the",
"Check",
"Point",
"research",
"team",
"detected",
"another",
"instance",
"with",
"a",
"different",
"package",
"name",
"but",
"which",
"uses",
"the",
"same",
"code",
"."
] | [
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan:MSIL/Ploprolo.A"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"In",
"order",
"to",
"infect",
"the",
"victims,",
"the",
"attackers",
"distributed",
"spear-phishing",
"emails",
"containing",
"malicious",
"word",
"document,",
"the",
"email",
"purported",
"to",
"have",
"been",
"sent",
"from",
"legitimate",
"email",
"ids."
] | [
16,
16,
16,
16,
16,
16,
16,
6,
16,
1,
9,
16,
3,
11,
11,
16,
1,
16,
16,
16,
16,
16,
16,
1,
9,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.MTSysAntiD.Worm",
"Packed.Win32.Klone!O",
"PWS-OnlineGames.es",
"PE_MAGOVEL.A",
"Win32.Virus.Induc.b",
"W32/Induc.A",
"Trojan.Packed.16",
"PE_MAGOVEL.A",
"Win.Trojan.Packed-77",
"Virus.Win32.Induc.b",
"Trojan.Win32.Downloader.85504.AX",
"Backdoor.Win32.Delf.~DD",
"Win32.HLLP.Lagic",
"Backdoor.Hupigon.Win32.100099",
"BehavesLike.Win32.MultiPlug.nc",
"W32/Induc.A",
"Win32.Troj.Klone.ab.389660",
"W32.Induc.tnqE",
"Virus.Win32.Induc.b",
"PWS:Win32/Magovel.A",
"Backdoor/Win32.Hupigon.C61571",
"Virus.Win32.Induc.c",
"RiskWare.NakedPack",
"Win32.Induc.A",
"Backdoor.Rbot",
"Virus.Win32.Viking.AV"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"have",
"seen",
"this",
"threat",
"access",
"online",
"content,",
"including:JDUDUIFIB.exe"
] | [
16,
16,
16,
16,
3,
16,
16,
16,
1
] |
[
"TUESDAY",
",",
"MAY",
"19",
",",
"2020",
"The",
"wolf",
"is",
"back",
"...",
"NEWS",
"SUMMARY",
"Thai",
"Android",
"devices",
"and",
"users",
"are",
"being",
"targeted",
"by",
"a",
"modified",
"version",
"of",
"DenDroid",
"we",
"are",
"calling",
"\"",
"WolfRAT",
",",
"''",
"now",
"targeting",
"messaging",
"apps",
"like",
"WhatsApp",
",",
"Facebook",
"Messenger",
"and",
"Line",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
13,
16,
5,
16
] |
[
"Distribution",
"/",
"Infection",
"When",
"this",
"campaign",
"started",
"at",
"the",
"start",
"of",
"2018",
",",
"the",
"malware",
"(",
"\"",
"GlanceLove",
"''",
",",
"\"",
"WinkChat",
"''",
")",
"was",
"distributed",
"by",
"the",
"perpetrators",
"mainly",
"via",
"fake",
"Facebook",
"profiles",
",",
"attempting",
"to",
"seduce",
"IDF",
"soldiers",
"to",
"socialize",
"on",
"a",
"different",
"platform",
"(",
"their",
"malware",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"June",
"23",
"FireEye",
"blog",
"post",
"titled",
"Operation",
"Clandestine",
"Wolf",
"discussed",
"a",
"cyber",
"espionage",
"group,",
"known",
"as",
"APT3,",
"that",
"had",
"been",
"exploiting",
"a",
"zero-day",
"vulnerability",
"in",
"Adobe",
"Flash."
] | [
16,
0,
8,
4,
16,
16,
16,
6,
14,
14,
16,
16,
6,
14,
14,
16,
16,
6,
16,
16,
16,
16,
16,
7,
15,
16,
5,
13
] |
[
"This",
"kind",
"of",
"“",
"moving",
"target",
"”",
"behavior",
"made",
"it",
"harder",
"to",
"track",
"their",
"actions",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"collected",
"a",
"list",
"of",
"hashes",
"and",
"the",
"files",
"corresponding",
"to",
"those",
"hashes",
"were",
"then",
"retrieved",
"from",
"VirusTotal",
"for",
"further",
"analysis."
] | [
16,
16,
16,
16,
16,
1,
16,
16,
1,
16,
16,
16,
1,
16,
16,
16,
16,
4,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.VBKrypt",
"Spyware.Pony",
"Downloader.Ponik",
"TSPY_HPFAREIT.SMB",
"Trojan.Win32.VBKrypt.ymio",
"Trojan.Win32.VBKrypt.evkxoj",
"Trojan.VBKrypt.Win32.291698",
"BehavesLike.Win32.Fareit.ch",
"Trojan.VBKrypt.cgbs",
"TR/Dropper.VB.ocnhj",
"Trojan.Win32.VBKrypt.ymio",
"Trojan/Win32.VBKrypt.R213345",
"Trojan.VBKrypt",
"Trj/GdSda.A",
"Win32.Trojan.Vbkrypt.Amwf",
"Trojan.VBKrypt!wORN5qK9fN4",
"Trojan.VB.Crypt",
"W32/FareitVB.BEOK!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"After",
"a",
"series",
"of",
"technical",
"analysis",
"(",
"which",
"is",
"covered",
"in",
"detail",
"below",
")",
"and",
"heuristic",
"threat",
"hunting",
",",
"we",
"discovered",
"that",
"a",
"complete",
"“",
"Agent",
"Smith",
"”",
"infection",
"has",
"three",
"main",
"phases",
":",
"A",
"dropper",
"app",
"lures",
"victim",
"to",
"install",
"itself",
"voluntarily",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"week",
"later,",
"an",
"anonymous",
"user,",
"supposedly",
"the",
"author",
"of",
"AES-NI",
"ransomware",
"the",
"XData",
"is",
"based",
"on,",
"released",
"the",
"master",
"private",
"key."
] | [
16,
0,
8,
16,
4,
12,
16,
16,
6,
16,
3,
11,
16,
3,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clod8cd.Trojan.9e70",
"Backdoor/W32.BlackAngel.780304",
"W32/Backdoor.AAVE-7405",
"Backdoor.Trojan",
"BKDR_BLAKANGEL.A",
"Backdoor.Win32.BlackAngel.05",
"Trojan.Win32.BlackAngel.hiov",
"Backdoor.Win32.BlackAngel.780304",
"Backdoor.W32.BlackAngel.05!c",
"Backdoor.Win32.BlackAngel.05",
"BackDoor.BlackAngel.5",
"Backdoor.BlackAngel.Win32.6",
"BKDR_BLAKANGEL.A",
"BehavesLike.Win32.PWSZbot.bc",
"W32/Backdoor.DMA",
"Backdoor/BlackAngel.05",
"BDS/BlackAngel.05",
"W32/BlackAn.05!tr.bdr",
"Trojan[Backdoor]/Win32.BlackAngel",
"Backdoor.Win32.BlackAngel.05",
"Backdoor:Win32/BlackAngel.0_5",
"Backdoor.BlackAngel",
"Win32/BlackAngel.05",
"Win32.Backdoor.Blackangel.Lndw",
"Backdoor.Win32.BlackAngel"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Since",
"late",
"November",
"2016,",
"the",
"Shamoon",
"2",
"attack",
"campaign",
"has",
"brought",
"three",
"waves",
"of",
"destructive",
"attacks",
"to",
"organizations",
"within",
"Saudi",
"Arabia."
] | [
16,
16,
0,
8,
1,
9,
9,
9,
6,
16,
16,
16,
16,
16,
16,
1,
16,
4,
16,
2,
10
] |
[
"The",
"malware",
"mainly",
"targets",
"banking",
"and",
"financial",
"applications",
",",
"but",
"also",
"looks",
"for",
"popular",
"shopping",
"apps",
"such",
"as",
"eBay",
"or",
"Amazon",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
4,
16
] |
[
"Only",
"this",
"time,",
"it's",
"a",
"Hangul",
"Word",
"Processor",
"HWP",
"document",
"leveraging",
"the",
"already",
"known",
"CVE-2015-2545",
"Encapsulated",
"PostScript",
"EPS",
"vulnerability."
] | [
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
1,
7,
15,
15,
15
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Sacto.e",
"Trojan.Graftor.D1DEE6",
"BKDR_SACTO.SM0",
"Win32.Trojan.WisdomEyes.16070401.9500.9983",
"Backdoor.Trojan",
"BKDR_SACTO.SM0",
"TrojWare.Win32.Sacto.A",
"Trojan.PWS.Multi.1194",
"Backdoor:Win32/Sacto.A!dha",
"W32/Sacto.E!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.