tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"Philadelphia",
"has",
"many",
"features,",
"including",
"the",
"ability",
"to",
"generate",
"PDF",
"reports",
"and",
"charts",
"of",
"victims",
"to",
"track",
"the",
"campaigns,",
"as",
"well",
"as",
"the",
"ability",
"to",
"plot",
"victims",
"around",
"the",
"world",
"using",
"Google",
"Maps."
] | [
3,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
5,
13
] |
[
"Is",
"UrlZone",
"still",
"a",
"threat",
"and",
"if",
"so,",
"how",
"has",
"it",
"changed?"
] | [
16,
3,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"this",
"version",
"of",
"Rotexy",
",",
"dynamic",
"generation",
"of",
"lowest-level",
"domains",
"was",
"not",
"used",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"JPCERT/CC",
"has",
"been",
"observing",
"attacks",
"using",
"Datper",
"since",
"around",
"June",
"2016."
] | [
3,
16,
16,
16,
1,
16,
3,
16,
16,
0,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDropper.Dapato.S8172",
"TROJ_INDIGOROSE_FC140186.UVPM",
"TROJ_INDIGOROSE_FC140186.UVPM",
"Trojan.Win32.IndigoRose.eujbip",
"Trojan.Win32.Z.Indigorose.2334813",
"Trojan.DownLoader21.23836",
"BehavesLike.Win32.BadFile.vh",
"TR/Dldr.IndigoRose.xrkh",
"TrojanDownloader:Win32/Inros.A",
"Downloader.AdLoad",
"Trj/CI.A",
"Win32/TrojanDownloader.IndigoRose.AI",
"Trojan-Downloader.Win32.Indigorose",
"Win32/Trojan.b3d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"VB:Trojan.Valyria.1019",
"O97M.Dropper.BS",
"VB:Trojan.Valyria.1019",
"VB:Trojan.Valyria.1019",
"Trojan.Ole2.Vbs-heuristic.druvzi",
"VB:Trojan.Valyria.1019",
"VB:Trojan.Valyria.1019",
"HEUR_VBA.D",
"TrojanDownloader:O97M/Crosspim.A",
"VB:Trojan.Valyria.D3FB",
"VB:Trojan.Valyria.1019",
"VBA/TrojanDownloader.DZN!tr",
"virus.office.qexvmc.1075"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"System",
"applications",
"with",
"root",
",",
"by",
"contrast",
",",
"have",
"super-user",
"permissions",
"that",
"allow",
"them",
"to",
"break",
"out",
"of",
"such",
"sandboxes",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Unit",
"42",
"has",
"recently",
"discovered",
"a",
"new",
"keylogger,",
"named",
"NexusLogger,",
"being",
"used",
"in",
"attempted",
"unsuccessful",
"attacks",
"against",
"Palo",
"Alto",
"Networks",
"customers."
] | [
4,
12,
16,
16,
16,
16,
16,
3,
16,
3,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12
] |
[
"They",
"seem",
"to",
"use",
"the",
"same",
"technique",
"of",
"mimicking",
"a",
"website",
"associated",
"with",
"well-known",
"software",
"like",
"Notepad++",
"and",
"Blender",
"3D."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
5,
16,
5,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Razy.D39F0E",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Trojan.DownLoader25.65030",
"BehavesLike.Win32.Trojan.bh",
"TrojanDropper:MSIL/Muldalun.A!bit"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"In",
"May",
"2017,",
"Palo",
"Alto",
"Networks",
"Unit",
"42",
"identified",
"a",
"limited",
"spear",
"phishing",
"campaign",
"targeting",
"various",
"individuals",
"across",
"the",
"world."
] | [
16,
0,
8,
4,
12,
12,
12,
12,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
2,
10
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Androm.drayhs",
"Trojan.DownLoader18.10874",
"Downloader.Banload.Win32.64034",
"Trojan/Inject.axyw",
"TrojanDownloader:Win32/BrobanLaw.A",
"Trojan.Strictor.D15B7B",
"Trojan/Win32.MDA.R160449",
"Trojan.Banker.IGF"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.LibarokI.Trojan",
"Trojan/Scar.ejki",
"Win32.Trojan.WisdomEyes.16070401.9500.9609",
"Trojan.Badlib",
"Win.Downloader.Delf-12262",
"Trojan.Win32.Scar.256000.B",
"Trojan.DownLoader4.22959",
"Trojan.Scar.Win32.50666",
"Backdoor.Win32.Bafruz",
"Backdoor:Win32/Bafruz.C",
"Trojan.Delf.01357",
"Bck/Koobface.AA"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Bagsu.S31234",
"Trojan/IRCBot.nhr",
"BKDR_IRCBOT.SMB",
"Backdoor.IRC.Bot",
"BKDR_IRCBOT.SMB",
"BehavesLike.Win32.Dropper.cm",
"Backdoor.Win32.Ursap",
"Backdoor.Athena",
"Win32/IRCBot.NHR"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"is",
"mainly",
"an",
"information",
"stealer",
"and",
"malware",
"downloader",
"network",
"which",
"installs",
"other",
"malware",
"on",
"infected",
"machines."
] | [
16,
16,
16,
16,
1,
9,
16,
3,
11,
11,
16,
16,
16,
3,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.PSW.FakeAIM.C",
"Trojan.PSW.FakeAIM.C",
"Trojan.PSW.FakeAIM.C",
"W32/PWS.BXQR-8711",
"Infostealer.Snatch",
"Trojan.PSW.FakeAIM.C",
"Trojan-PSW.Win32.FakeAIM.d",
"Trojan.PSW.FakeAIM.C",
"Trojan.Win32.FakeAIM.dgtt",
"Trojan.Win32.PSWFakeAIM.78848",
"Troj.PSW32.W.FakeAIM.c!c",
"Trojan.PSW.FakeAIM.C",
"TrojWare.Win32.PSW.FakeAIM.D",
"Trojan.PSW.FakeAIM.C",
"Trojan.PWS.Fakeaim",
"Trojan.FakeAIM.Win32.6",
"BehavesLike.Win32.Trojan.lc",
"W32/Pws.TXC",
"Trojan/PSW.FakeAIM.c",
"TR/PSW.FakeAIM.C.1",
"Trojan[PSW]/Win32.FakeAIM",
"PWS:Win32/FakeAIM.C",
"Trojan-PSW.Win32.FakeAIM.d",
"Trojan/Win32.Xema.R89227",
"TScope.Trojan.VB",
"Win32/PSW.FakeAIM.D",
"W32/AIMFake.C!tr.pws",
"Win32/Trojan.PSW.ee5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"On",
"March",
"9",
"2016,",
"Cyphort",
"Labs",
"discovered",
"an",
"infection",
"on",
"a",
"porn",
"site",
"keng94dotcom",
"redirecting",
"visitors",
"to",
"an",
"exploit",
"kit",
"and",
"installing",
"a",
"Ransom",
"Locker."
] | [
16,
0,
8,
8,
4,
12,
16,
16,
1,
16,
16,
1,
9,
9,
16,
16,
16,
16,
3,
11,
16,
16,
16,
3,
11
] |
[
"One",
"good",
"thing",
"about",
"having",
"a",
"lot",
"of",
"Facebook",
"friends",
"is",
"that",
"you",
"simply",
"act",
"as",
"a",
"honey",
"pot",
"when",
"your",
"friends",
"click",
"on",
"malicious",
"things."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
3,
16
] |
[
"The",
"command",
"&",
"control",
"server",
"(",
"C",
"&",
"C",
"server",
")",
"returns",
"the",
"URL",
"to",
"click",
"along",
"with",
"a",
"very",
"long",
"list",
"of",
"additional",
"parameters",
"in",
"JSON",
"format",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Screenshots",
":",
"captures",
"an",
"image",
"of",
"the",
"current",
"screen",
"via",
"the",
"raw",
"frame",
"buffer",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Going",
"one",
"step",
"further",
",",
"we",
"rebuilt",
"the",
"malware",
"to",
"execute",
"the",
"apparent",
"functionality",
"of",
"generating",
"a",
"payload",
",",
"but",
"discovered",
"that",
"the",
"APK",
"stored",
"in",
"the",
"/res/raw/",
"directory",
"is",
"empty",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malicious",
"script",
"fingerprints",
"the",
"victim's",
"machine",
"and",
"can",
"receive",
"any",
"command",
"that",
"will",
"run",
"via",
"PowerShell."
] | [
1,
9,
9,
16,
5,
13,
13,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9
] |
[
"Instead,",
"an",
"accurate",
"assessment",
"is",
"that",
"a",
"previously",
"active",
"Windows",
"botnet",
"is",
"spreading",
"a",
"Mirai",
"bot",
"variant."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
3,
11,
11
] |
[
"ESET",
"researchers",
"analyzed",
"a",
"preference",
"file",
"that",
"was",
"used",
"to",
"compromise",
"the",
"system",
"when",
"Uploader!",
"is",
"launched."
] | [
4,
12,
16,
16,
16,
16,
15,
16,
16,
16,
1,
16,
5,
16,
5,
16,
16
] |
[
"These",
"campaigns",
"not",
"only",
"represent",
"an",
"uptick",
"in",
"our",
"observed",
"instances",
"of",
"Kronos",
"banker",
"but",
"also",
"a",
"new",
"application",
"of",
"the",
"malware",
"that",
"was",
"first",
"introduced",
"in",
"June",
"2014",
"and",
"that",
"we",
"most",
"recently",
"described",
"in",
"relation",
"to",
"campaigns",
"targeting",
"Canada."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
0,
8,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
2
] |
[
"The",
"Anthem",
"attack",
"is",
"only",
"one",
"of",
"multiple",
"campaigns",
"that",
"Symantec",
"has",
"attributed",
"to",
"this",
"group."
] | [
16,
4,
1,
16,
16,
16,
16,
6,
14,
16,
6,
16,
16,
16,
16,
6
] |
[
"This",
"blog",
"post",
"describes",
"details",
"that",
"we",
"discovered",
"during",
"our",
"analysis",
"of",
"malware",
"that",
"focuses",
"on",
"a",
"specific",
"country",
"—",
"Libya."
] | [
16,
4,
12,
16,
16,
15,
16,
16,
16,
16,
16,
16,
3,
15,
16,
16,
16,
16,
16,
16,
2
] |
[
"This",
"Zscaler",
"ThreatLabz",
"research",
"article",
"investigates",
"the",
"latest",
"malware",
"campaign",
"of",
"DBatLoader,",
"which",
"is",
"being",
"used",
"by",
"threat",
"actors",
"to",
"target",
"various",
"businesses",
"in",
"European",
"countries",
"with",
"Remcos",
"RAT",
"and",
"Formbook."
] | [
16,
4,
12,
12,
16,
16,
16,
16,
6,
14,
16,
3,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
4,
16,
2,
10,
16,
3,
11,
16,
3
] |
[
"The",
"Lookout",
"Threat",
"Intelligence",
"team",
"is",
"increasingly",
"seeing",
"the",
"same",
"tradecraft",
",",
"tactics",
",",
"and",
"procedures",
"that",
"APT-C-23",
"favors",
"being",
"used",
"by",
"other",
"actors",
"."
] | [
16,
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"VBA.Trojan.Obfuscated.af",
"W2KM_DLOADR.YYSQK",
"Trojan.Ole2.Vbs-heuristic.druvzi",
"W2KM_DLOADR.YYSQK",
"Trojan:X97M/ShellHide.C",
"virus.office.obfuscated.1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"We",
"detect",
"the",
"malware",
"used",
"in",
"this",
"attack",
"as",
"“",
"Backdoor.AndroidOS.Chuli.a",
"”",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.F21F",
"W32/Trojan2.MVJQ",
"Trojan.Win32.Ace.cxham",
"Win32.Backdoor.Ace.ciih",
"Trojan.DownLoader1.8121",
"Backdoor.Ace.Win32.86",
"BehavesLike.Win32.Dropper.hh",
"W32/Trojan.QDLI-0337",
"Trojan[Backdoor]/ASP.Ace",
"TrojanDownloader:Win32/Pluzoks.A",
"Backdoor/Win32.Ace.C78643",
"Backdoor.ASP.Ace",
"Adware.Ezipop",
"Win32/Adware.AdTrigger",
"W32/ASP_Ace.MF!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"were",
"a",
"bit",
"disappointed",
"that",
"we",
"did",
"not",
"see",
"traces",
"of",
"a",
"true",
"privilege",
"escalation",
"exploit",
"after",
"all",
"this",
"deobfuscation",
"work",
",",
"but",
"it",
"seems",
"these",
"FinFisher",
"samples",
"were",
"designed",
"to",
"work",
"just",
"using",
"UAC",
"bypasses",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
7,
15,
15,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm/W32.Rahima.28672",
"Win32.Trojan.WisdomEyes.16070401.9500.9607",
"W32/Rahima.QDHZ-4096",
"W32.Fourseman.B@mm",
"P2P-Worm.Win32.Rahima",
"Trojan.Win32.Rahima.enoe",
"Worm.Win32.P2P-Rahima.28672",
"W32.W.Rahima!c",
"Worm.Rahima",
"W32/Rahima.A",
"I-Worm/Himera.i",
"WORM/Rahima.A",
"Worm[P2P]/Win32.Rahima",
"P2P-Worm.Win32.Rahima",
"Worm.Rahima",
"Win32.Worm-p2p.Rahima.Pefs",
"Worm.P2P.Rahima",
"W32/Himera.J!worm.p2p",
"Win32/Worm.IM.a16"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"use",
"of",
"Lua",
"modules,",
"which",
"we'll",
"discuss",
"later,",
"is",
"a",
"technique",
"that",
"has",
"previously",
"been",
"used",
"by",
"Flamer."
] | [
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6
] |
[
"In",
"August",
"2012,",
"an",
"attack",
"campaign",
"known",
"as",
"Shamoon",
"targeted",
"a",
"Saudi",
"Arabian",
"energy",
"company",
"to",
"deliver",
"a",
"malware",
"called",
"Disttrack."
] | [
16,
0,
8,
16,
6,
14,
16,
16,
6,
16,
16,
2,
10,
4,
12,
16,
16,
16,
3,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader.Win32.Geral!O",
"TrojanDownloader.Begseabug.A5",
"Trojan/Downloader.Geral.aazb",
"Trojan.Graftor.D540C",
"W32.SillyDC",
"Win.Trojan.Downloader-22789",
"Trojan-Downloader.Win32.Geral.aazb",
"Trojan.Win32.Geral.dkhaf",
"Trojan.Win32.A.Downloader.50176.GE",
"Troj.Downloader.W32.Geral.aazb!c",
"Trojan.Swizzor.18871",
"Downloader.Geral.Win32.7037",
"BehavesLike.Win32.Backdoor.ph",
"Trojan-Downloader.Win32.Geral",
"TrojanDownloader.Geral.cjc",
"TrojanDownloader:Win32/Begseabug.A",
"Trojan-Downloader.Win32.Geral.aazb",
"Trojan/Win32.Scar.R4495",
"TrojanDownloader.Geral",
"Trojan.KillAV",
"Win32.Trojan-downloader.Geral.Sqtn",
"Trojan.DL.Geral!qBECnW5XLLM",
"W32/Pincav.SNS!tr",
"Win32/Trojan.836"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Other",
"configuration",
"data",
"is",
"located",
"elsewhere",
",",
"and",
"some",
"of",
"it",
"can",
"been",
"seen",
"here",
":",
"The",
"encrypted",
"library",
"path",
"The",
"output",
"folder",
"on",
"the",
"device",
"for",
"the",
"dropped",
"library",
"The",
"name",
"of",
"the",
"library",
"after",
"it",
"is",
"loaded",
"eventBot",
"name",
"string",
"Version",
"number",
"A",
"string",
"used",
"as",
"an",
"RC4",
"key",
",",
"both",
"for",
"decrypting",
"the",
"library",
"and",
"as",
"a",
"part",
"of",
"the",
"network",
"data",
"encryption",
"(",
"hasn",
"’",
"t",
"changed",
"from",
"the",
"previous",
"version",
")",
"The",
"C2",
"URLs",
"A",
"randomized",
"class",
"name",
"using",
"the",
"device",
"’",
"s",
"accessibility",
"services",
"EventBot",
"extracted",
"configuration",
"Part",
"of",
"the",
"extracted",
"configuration",
"of",
"the",
"new",
"version",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"indicates",
"that",
"the",
"app",
"tries",
"to",
"hide",
"itself",
"from",
"any",
"anti-PHA",
"systems",
"that",
"look",
"for",
"a",
"specific",
"app",
"process",
"name",
"or",
"does",
"not",
"have",
"the",
"ability",
"to",
"scan",
"the",
"memory",
"of",
"the",
"system_server",
"process",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAdware.1F0C",
"Adware.SearchSafer.A",
"Adware.OutBrowse/Variant",
"Win32.Trojan.WisdomEyes.16070401.9500.9922",
"Downloader.Sesafer",
"TROJ_GE.24FE3DBE",
"not-a-virus:Downloader.Win32.SearchSafe.a",
"Adware.SearchSafer.A",
"Trojan.Nsis.SearchSafe.dyoiec",
"Adware.SearchSafer.A",
"Adware.Downware.3008",
"Downloader.SearchSafe.Win32.2",
"TROJ_GE.24FE3DBE",
"TR/AD.Uascape.myjsl",
"Trojan:Win32/Uascape.A",
"Adware.SearchSafer.A",
"not-a-virus:Downloader.Win32.SearchSafe.a",
"Adware.SearchSafer.A",
"Downloader.SearchSafe",
"PUP.Optional.SearchSafer",
"PUA.Downloader!"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.ScaraNV.Trojan",
"Trojan/W32.Scar.1611453",
"Trojan.Win32.Scar!O",
"TrojanDropper.Scudy.S12799",
"Trojan.Scar.Win32.11534",
"Trojan.Zusy.D382CD",
"WORM_SCUDY.SMA",
"WORM_SCUDY.SMA",
"Trojan.Win32.A.Scar.876573",
"Trojan:W32/Scar.O",
"Trojan.Click1.19227",
"Trojan/Scar.flx",
"TrojanDropper:Win32/Scudy.A",
"Trojan/Win32.Scar.R45219",
"Trojan.Scar",
"Trojan.Dropper",
"Trojan.Scar!3JbHUSbGsGc",
"Trojan.Win32.Scar"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"On",
"April",
"19,",
"Cyphort",
"hardware",
"sandbox",
"trolled",
"over",
"a",
"site",
"www.49lou.com",
"that",
"served",
"up",
"83",
"pieces",
"of",
"Windows",
"executable",
"files",
"EXE",
"and",
"DLL",
"binaries",
"with",
"zero",
"user",
"interaction."
] | [
16,
0,
8,
3,
11,
11,
16,
16,
16,
16,
1,
16,
16,
16,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Vake",
"BehavesLike.Win32.BadFile.mt",
"Trojan.Win32.Vake",
"TR/Vake.onkgl",
"Trojan.Heur.RX.EDF54F",
"Trojan:Win32/Vake.D",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"Another",
"interesting",
"artifact",
"part",
"of",
"the",
"EK",
"flow",
"is",
"the",
"use",
"of",
"an",
"XML",
"configuration",
"file",
"which",
"contains",
"JScript",
"code."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
1,
9
] |
[
"For",
"Android",
"4.4.4",
"and",
"older",
",",
"the",
"Trojan",
"will",
"patch",
"method",
"_Z30dvmHeapSourceStartupBeforeForkv",
"from",
"libdvm.so",
",",
"and",
"for",
"Android",
"5",
"and",
"newer",
"it",
"will",
"patch",
"method",
"nativeForkAndSpecialize",
"from",
"libandroid_runtime.so",
"."
] | [
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader.Votos",
"Trojan.Zusy.D151C6",
"Win32.Trojan.WisdomEyes.16070401.9500.9956",
"Trojan.Win32.Clicker.cqsnmq",
"Trojan.Win32.Z.Zusy.314880.BK",
"Trojan.Click2.61352",
"Trojan-Downloader.Win32.Votos",
"W32/Trojan.OORK-3033",
"TR/Taranis.2482",
"Trojan[Dropper]/Win32.Dinwod",
"TrojanDownloader:Win32/Votos.A",
"Trojan/Win32.Votos.R105546",
"TrojanDropper.Dinwod",
"Trj/CI.A",
"Win32/Trojan.ac2"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"do",
"not",
"know",
"why",
",",
"but",
"we",
"suspect",
"that",
"it",
"was",
"an",
"attempt",
"to",
"hide",
"the",
"origin",
"of",
"the",
"application",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Trojan.OXFE-7365",
"Backdoor.Chilurat",
"Trojan.Win32.Trochil.a",
"BehavesLike.Win32.Downloader.mz",
"Trojan.Trochil.a",
"Trojan.Win32.Trochil.a",
"Trojan:Win32/Trochil.A",
"Win32.Trojan.Trochil.Wrqj",
"Win32/Trojan.369"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"application",
"downloads",
"the",
"file",
"and",
"dynamically",
"loads",
"it",
"using",
"dalvik.system.DexClassLoader",
"and",
"invokes",
"class",
"and",
"method",
"specified",
"in",
"json",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9
] |
[
"]",
"it",
"Catania",
"server3.exodus.connexxa",
"[",
"."
] | [
9,
9,
16,
1,
9,
9
] |
[
"Threat",
"Source",
"newsletter",
"March",
"2,",
"2023",
"—",
"Little",
"victories",
"in",
"the",
"fight",
"against",
"ransomware"
] | [
4,
12,
12,
0,
8,
8,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"This",
"round",
"of",
"FIN7",
"phishing",
"lures",
"implements",
"hidden",
"shortcut",
"files",
"LNK",
"files",
"to",
"initiate",
"the",
"infection",
"and",
"VBScript",
"functionality",
"launched",
"by",
"mshta.exe",
"to",
"infect",
"the",
"victim."
] | [
16,
16,
16,
6,
14,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
16,
3,
16,
16,
16,
4
] |
[
"In",
"2014,",
"TrendMicro",
"began",
"seeing",
"attacks",
"that",
"abused",
"the",
"Windows",
"PowerShell."
] | [
16,
0,
4,
16,
16,
1,
16,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9944",
"TSPY_EMOTET.SMD3",
"Trojan.Win32.Inject.exldsx",
"Trojan.Encoder.24431",
"TSPY_EMOTET.SMD3",
"BehavesLike.Win32.Backdoor.dc",
"Trojan.Jorik.afpv",
"TR/Crypt.ZPACK.uxhop",
"Trojan[Dropper]/Win32.Scrop",
"Ransom:Win32/Pulobe.A",
"Trojan.Midie.DA9F2",
"Trojan.SmokeLoader",
"Win32/Trojan.9b7"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9961",
"Trojan-Dropper.Win32.Dapato",
"TrojanDropper:Win32/Ambler.F",
"Trojan.Zusy.953"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"[clearskysec]",
"Attacks",
"against",
"all",
"targets",
"in",
"the",
"Middle",
"East",
"stopped",
"at",
"once,",
"after",
"we",
"published",
"our",
"first",
"report."
] | [
4,
1,
16,
16,
4,
16,
16,
2,
10,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Thanatos",
"is",
"being",
"marketed",
"as",
"a",
"service",
"with",
"both",
"short",
"and",
"long-term",
"subscriptions",
"and",
"support",
"and",
"the",
"authors",
"claim",
"it",
"is",
"under",
"ongoing",
"development",
"with",
"new",
"plugins",
"and",
"functionality",
"being",
"actively",
"added"
] | [
3,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16
] |
[
"Details",
"about",
"the",
"sample,",
"including",
"a",
"hash",
"are",
"available",
"at",
"the",
"end",
"of",
"this",
"writeup."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Android",
"users",
"warned",
"of",
"malware",
"attack",
"spreading",
"via",
"SMS",
"FEB",
"16",
",",
"2016",
"Security",
"researchers",
"are",
"warning",
"owners",
"of",
"Android",
"smartphones",
"about",
"a",
"new",
"malware",
"attack",
",",
"spreading",
"via",
"SMS",
"text",
"messages",
"."
] | [
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Spy.MSIL.KeyLogger!O",
"TrojanSpy.Moorest",
"Trojan/KeyLogger.iec",
"Win32.Trojan.WisdomEyes.16070401.9500.9996",
"W32/Trojan2.NZWO",
"TSPY_MOOREST.SMJJ",
"Trojan-Spy.MSIL.KeyLogger.iec",
"Trojan.Win32.Clicker.dkktnp",
"IM-Flooder.W32.Delf.l2lu",
"Msil.Trojan-spy.Keylogger.Pito",
"Trojan.Click2.7338",
"TSPY_MOOREST.SMJJ",
"W32/Trojan.CJSE-3516",
"Trojan-Spy.MSIL.KeyLogger.iec",
"TrojanSpy:MSIL/Moorest.A",
"TrojanSpy.MSIL.KeyLogger",
"MSIL/Spy.Keylogger.GT",
"Win32/Trojan.Spy.9b9"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"230",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"Check",
"Point",
"Research",
"has",
"submitted",
"data",
"to",
"Google",
"and",
"law",
"enforcement",
"units",
"to",
"facilitate",
"further",
"investigation",
"."
] | [
4,
12,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Pwstool.Cain",
"Application.Pwcrack.Cain.GL",
"not-a-virus:PSWTool.Win32.Cain.s",
"Application.Pwcrack.Cain.GL",
"Riskware.Win32.Cain.ewvhjq",
"Application.Pwcrack.Cain",
"Tool.Cain",
"PUA.CainAbel",
"PSWTool.Cain.c",
"DR/PSW.Cain.284.47",
"not-a-virus:PSWTool.Win32.Cain.s",
"Trj/CI.A",
"Win32/Trojan.Dropper.0c3"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Ainslot.A3",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"BKDR_BLADABI.SMC",
"Trojan.Win32.Drop.dcmduv",
"Trojan.Win32.Z.Fraudrop.205824",
"Backdoor.MSIL.Parama.RANG",
"BKDR_BLADABI.SMC",
"BehavesLike.Win32.Trojan.dh",
"Trojan-Dropper.Win32.Dorifel",
"Trojan[Dropper]/Win32.FrauDrop",
"Win32.Troj.FrauDrop.kcloud",
"PWS:MSIL/Mintluks.A",
"Trojan/Win32.FrauDrop.R127506",
"TrojanDropper.FrauDrop",
"MSIL/Blocker.PAN!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Application.Webcrack.A",
"Trojan/WebCracker.a",
"W32/Trojan.NDIN-1455",
"Application.Webcrack.A",
"Application.Webcrack.A",
"Riskware.Win32.WebCrack.bbira",
"Application.Webcrack.A",
"TrojWare.Win32.WebCracker.A",
"Application.Webcrack.A",
"Tool.WebCrack",
"Trojan.WebCracker.Win32.2",
"W32/Trojan2.MHTV",
"HackTool.WebCrack.40",
"Win32.Troj.WebCracker.A.kcloud",
"Application.Webcrack.A",
"Trojan/Win32.Webcracker.R66570",
"Trojan.Webcracker",
"Win32/WebCracker.A",
"Trojan.Win32.WebCracker.tfe",
"Trojan.Win32.Webcracker",
"Trojan.Win32.WebCraker.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Cossta.152000",
"Trojan.Cossta",
"W32/Trojan.OSNY-0798",
"Backdoor.Cruprox",
"Win32/NukeSped.AK",
"Trojan/NukeSped.ak",
"Trojan.Win32.Cossta.akea",
"Trojan.Win32.Cossta.erwfkk",
"Troj.W32.Cossta!c",
"Trojan.DownLoader25.21345",
"Trojan.Cossta.Win32.10320",
"BehavesLike.Win32.MysticCompressor.cm",
"Trojan.Win32.Cossta",
"Worm/AutoIt.nml",
"Trojan/Win32.Cossta",
"Trojan.Win32.Cossta.akea",
"Trojan/Win32.Cossta.C2091223",
"Win32.Trojan.Cossta.Syrj",
"Trojan.Cossta!Kqe4w1x4ygI",
"W32/Cossta.AKEA!tr",
"Trojan.Cossta",
"Trj/CI.A",
"Win32/Trojan.b36"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Figure",
"5",
"."
] | [
16,
16,
16
] |
[
"This",
"simulation",
"shows",
"that",
"FakeSpy",
"behaves",
"differently",
"on",
"a",
"physical",
"device",
"versus",
"an",
"emulator",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Preferences",
"such",
"as",
"the",
"FTP",
"hostname",
"and",
"username",
"are",
"stored",
"in",
"a",
"file",
"named",
"uploadpref.dat."
] | [
16,
16,
16,
16,
1,
9,
16,
1,
16,
16,
16,
16,
1,
16,
1
] |
[
"There",
"has",
"been",
"no",
"evidence",
"found",
"yet",
"that",
"funds",
"have",
"been",
"stolen",
"from",
"any",
"infected",
"banks."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clode7b.Trojan.1410",
"Virtool.6143",
"Virtool.6143",
"Flooder.Piaoyes!YL6KHAf2k3Q",
"Flooder.AG",
"Flooder.Win32.Piaoyes.40",
"Virtool.6143",
"Virtool.6143",
"TrojWare.Win32.Flooder.Piaoyes.40",
"Virtool.6143",
"TR/Flood.Piaoyes.40.2",
"HackTool.Piaoyes",
"Win32.Hack.Piaoyes.40.kcloud",
"Win-Trojan/Piaoyes.171008",
"Virtool.6143",
"W32/Risk.PMPJ-1484",
"Win32/Flooder.Piaoyes.40",
"Flooder.Win32.Piaoyes.40",
"W32/Piaoyes.40!tr",
"Flooder.DTA",
"Trojan.Win32.Flooder.aS",
"Win32/Trojan.Flood.199"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Ivruat.A11",
"Worm.AutoRun.Win32.120028",
"Win32.Trojan.WisdomEyes.16070401.9500.9986",
"W32/Trojan.TNXK-0638",
"Trojan.Win32.Autoruner2.cvshvv",
"Win32.HLLW.Autoruner2.20037",
"BehavesLike.Win32.BadFile.fh",
"Trojan.Win32.Spy",
"W32/Trojan2.OYTC",
"W32.Worm.Pqk",
"Worm:Win32/Ivruat.A",
"Worm/Win32.AutoRun.R140023",
"Win32.Worm.Autorun.Dxwf",
"Trojan.Scar"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Push",
"notifications",
"were",
"also",
"used",
"to",
"control",
"audio",
"recording",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Optix.340187",
"Backdoor.Win32.Optix!O",
"Trojan.Madtol.C",
"Backdoor.Optix",
"Packer.W32.NSAnti.kZ85",
"Backdoor/Optix.f",
"W32/OptixPro.I",
"Backdoor.OptixPro.13",
"Win32/OptixPro.F",
"BKDR_OPTIXPRO.H",
"Win.Trojan.Optix-5",
"Backdoor.Win32.Optix.b",
"Trojan.Win32.Optix.bslhnb",
"Backdoor.Win32.Optix_Pro.340203",
"Trojan.DownLoader.60627",
"BKDR_OPTIXPRO.H",
"BehavesLike.Win32.Dropper.fc",
"W32/OptixPro.WZQS-7361",
"Backdoor/Optix.Pro.bd",
"BDS/Optix.Pro.13.7",
"Trojan[Backdoor]/Win32.Optix",
"Backdoor:Win32/Optixpro.T",
"Backdoor.Win32.Optix.b",
"Trojan/Win32.Xema.C66170",
"Backdoor.Optix",
"Bck/OptixPro.C",
"Win32/Optix.Pro.13",
"Backdoor.Optix.Pro.BD",
"Backdoor.Win32.Optix"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Hider!O",
"W32/Backdoor.BVFG",
"TROJ_HIDER.I",
"Win.Trojan.Hider-4",
"Trojan.Win32.Hider.234496",
"Troj.W32.Hider.toFP",
"Trojan.Hidn",
"Trojan.Hider.Win32.266",
"TROJ_HIDER.I",
"Trojan-Dropper.Delf",
"Trojan/Win32.Hider.gh",
"Win32.Troj.Hider.i.234496",
"Trojan.Win32.Hider.gh",
"Trojan.Hider",
"Win32/Trojan.0bc"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Being",
"aware",
"of",
"this",
"fact",
"can",
"help",
"create",
"defensive",
"strategies",
",",
"as",
"well",
"as",
"prepare",
"for",
"upcoming",
"attacks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Over",
"the",
"past",
"few",
"months,",
"new",
"strains",
"of",
"this",
"infamous",
"Android",
"malware",
"family",
"have",
"surfaced",
"in",
"third-party",
"APK",
"markets,",
"as",
"well",
"as",
"in",
"the",
"official",
"Google",
"Play",
"store."
] | [
16,
0,
8,
8,
8,
16,
3,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
5,
13,
13,
13,
13
] |
[
"These",
"repackaged",
"apps",
"pose",
"as",
"communication",
",",
"news",
",",
"lifestyle",
",",
"book",
",",
"and",
"reference",
"apps",
"popularly",
"used",
"in",
"the",
"Middle",
"East",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.VBKrypt.315392.AK",
"Trojan.Win32.VBKrypt!O",
"Trojan/Injector.wms",
"Win32.Trojan.Inject.bh",
"HV_VBKRYPT_CG092B3E.RDXN",
"Trojan.Win32.VBKrypt.nrzc",
"Trojan.Win32.VBKrypt.dzjqpk",
"Trojan.MulDrop4.8756",
"Trojan.VBKrypt.Win32.180705",
"BehavesLike.Win32.BadFile.fh",
"Trojan-PWS.Win32.Zbot",
"Trojan.VBKrypt.amiu",
"Trojan/Win32.VBKrypt",
"Trojan.Symmi.D4542",
"Trojan.Win32.A.VBKrypt.315392.CI",
"Trojan.Win32.VBKrypt.nrzc",
"Worm:Win32/Secrar.A",
"Trojan/Win32.Jorik.R37626",
"BScope.Worm.Gamarue.1191",
"W32/VBKrypt.MBW!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Proxy/W32.Mitglieder.8304",
"Trojan/Proxy.Mitglieder.af",
"TrojanProxy.Mitglied!TVlYB86T2l0",
"Trojan.Mitglieder.G",
"Win32/Mitglieder.Z",
"TSPY_TARNO.D",
"Trojan.Win32.Mitglieder.dkdz",
"TrojWare.Win32.TrojanProxy.Mitglieder.AF",
"Trojan.Mitglieder.Win32.173",
"TSPY_TARNO.D",
"BehavesLike.Win32.Downloader.xc",
"W32/Mitglieder.M",
"TrojanProxy.Mitglieder.h",
"Win32.Troj.Mitglieder.af.kcloud",
"TrojanProxy:Win32/Mitglieder.DK",
"Win-Trojan/Mitglieder.8304",
"Trojan-Proxy.Win32.Mitglieder.e",
"Trojan.Win32.Mitglieder.aTNT",
"Win32/TrojanProxy.Mitglieder.AF",
"Win32.Trojan-proxy.Mitglieder.Ectn",
"Trojan-Proxy.Win32.Mitglieder.CL",
"W32/Tarno.D!tr",
"Proxy.4.AZ",
"Win32/Trojan.63b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"SilentPush",
"investigates",
"a",
"recent",
"Facebook",
"phishing",
"campaign",
"targeting",
"social",
"media",
"users",
"on",
"Facebook",
"Messenger,",
"but",
"what",
"do",
"we",
"know",
"about",
"the",
"attack's",
"tactics",
"and",
"what",
"can",
"we",
"do",
"about",
"it?"
] | [
4,
16,
16,
16,
6,
14,
14,
16,
5,
13,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"data",
"that",
"Domestic",
"Kitten",
"steals",
"follows",
"a",
"similar",
"format",
"with",
"Bouncing",
"Golf",
"’",
"s",
",",
"with",
"each",
"type",
"of",
"data",
"having",
"a",
"unique",
"identifying",
"character",
"."
] | [
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.VB!O",
"Trojan.VB",
"Trojan.Symmi.DFDA4",
"Win32.Trojan.WisdomEyes.16070401.9500.9858",
"Trojan.Win32.VB.ckrm",
"Trojan.Win32.VB.edplzz",
"Troj.W32.Vb!c",
"Trojan:W32/Kilim.P",
"Trojan.VB.Win32.164816",
"TR/Kecix.ztie",
"Trojan/Win32.VB",
"Trojan:Win32/Kecix.A",
"Trojan.Win32.VB.ckrm",
"Trojan.VB",
"Trj/CI.A",
"Win32.Trojan.Vb.Pdlo",
"Trojan.VB!Qw/pqsBL6E0",
"Win32.Outbreak",
"Win32/Trojan.b08"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Security",
"Without",
"Borders",
"has",
"recently",
"published",
"an",
"analysis",
"of",
"this",
"family",
",",
"independently",
",",
"through",
"their",
"blog",
"."
] | [
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Tool.PassView.Win32.702",
"Win.Trojan.Lmir-87",
"not-a-virus:PSWTool.Win32.PassView.vly",
"Win32.Trojan.Psw.Szlj",
"Application.Win32.PassView.1_51",
"BehavesLike.Win32.Dropper.mh",
"not-a-virus:PSWTool.Win32.PassView",
"W32/Application.YMHQ-2387",
"Backdoor/Prorat.fxr",
"TR/PSW.Dumaru",
"Trojan[PSWTool]/Win32.PassView",
"Worm:Win32/Dumaru.H@mm",
"Application.Heur.E5E9B8",
"not-a-virus:PSWTool.Win32.PassView.vly",
"PassDump.b",
"PUP.Optional.PassView",
"Riskware.PSWTool!"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"While",
"some",
"criminals",
"blow",
"up",
"ATMs",
"to",
"steal",
"cash,",
"others",
"use",
"less",
"destructive",
"methods,",
"such",
"as",
"infecting",
"the",
"ATM",
"with",
"malware",
"and",
"then",
"stealing",
"the",
"money."
] | [
16,
16,
6,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
3,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Pinfi.B",
"Win32.Parite.B",
"Virus/W32.Parite.C",
"Virus.Win32.Parite.b!O",
"W32.Perite.A",
"W32/Pate.b",
"W32/Pate.B",
"Win32.Virus.Parite.d",
"W32/Parite.B@mm",
"W32.Pinfi.B",
"Win32/Pinfi.A",
"PE_PARITE.A",
"Heuristics.W32.Parite.B",
"Virus.Win32.Parite.b",
"Win32.Parite.B",
"Virus.Win32.Parite.bgvo",
"W32.Parite.b!c",
"Win32.Parite.B",
"Win32.Parite.B",
"Win32.Parite.2",
"Virus.Parite.Win32.9",
"PE_PARITE.A",
"BehavesLike.Win32.Pate.gc",
"Trojan.Win32.FakeAV",
"W32/Parite.LAQX-0866",
"Win32/Parite.b",
"Virus/Win32.Parite.c",
"Win32.Parite.b.5756",
"TrojanDownloader:Win32/Grogsas.A",
"Win32.Parite.B",
"Win32.Parite.A",
"Virus.Win32.Parite.b",
"Win32.Parite.B",
"Win32.Parite.B",
"Virus.Win32.Parite.b",
"Win32.Parite.B",
"Win32/Parite.B",
"Win32.Parite.B",
"W32/Parite.B",
"W32/Parite.B",
"Virus.Win32.Parite.H"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Use",
"mobile",
"threat",
"detection",
"solutions",
"for",
"enhanced",
"security",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Suslix.C",
"Backdoor/W32.PlxT.20480",
"Backdoor.Suslix.C",
"Win32.Trojan.WisdomEyes.16070401.9500.9991",
"W32/Backdoor.NXX",
"Backdoor.Trojan",
"Win32/Paltry.C",
"Win.Trojan.Delf-473",
"Backdoor.Suslix.C",
"Backdoor.Win32.PlxT.a",
"Backdoor.Suslix.C",
"Backdoor.Win32.Z.Suslix.20480",
"Backdoor.Suslix.C",
"W32/Backdoor.PGXD-0378",
"Backdoor/PlxT.b",
"Trojan[Backdoor]/Win32.Suslix",
"Backdoor.Suslix.C",
"Backdoor.Win32.PlxT.a",
"Backdoor:Win32/Suslix.A",
"Backdoor.Suslix.C",
"Trj/CI.A",
"Win32/Suslix.NAA",
"Win32.Backdoor.Plxt.Ejez",
"Trojan.Win32.Spy",
"W32/Suslix.NAA!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Cyber4Sight",
"has",
"analyzed",
"the",
"malware",
"distributed",
"via",
"the",
"compromised",
"Polish",
"Financial",
"Supervision",
"Authority",
"webpage",
"and",
"used",
"in",
"targeted",
"attacks",
"against",
"a",
"number",
"of",
"large",
"banks",
"and",
"telecommunication",
"companies."
] | [
4,
16,
16,
16,
3,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
1,
9,
16,
16,
16,
16,
4,
12,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Small.38400.AY",
"Trojan-Spy.Win32.Brospa!O",
"Trojan.Witkinat",
"Trojan/Spy.Brospa.cm",
"TROJ_BROSPA.SMC",
"Win32.Trojan.WisdomEyes.16070401.9500.9979",
"Backdoor.Trojan",
"Win32/Witkinat.AY",
"TROJ_BROSPA.SMC",
"Win.Spyware.78717-2",
"Trojan.Win32.Brospa.bpglj",
"Trojan.Win32.A.Brospa.38400.N",
"Trojan.PWS.iThink.16",
"Trojan.Brospa.Win32.159",
"Trojan.Win32.Scar",
"TrojanSpy.Brospa.o",
"W32.Trojan.Witkinat.A",
"Trojan[Spy]/Win32.Brospa",
"Trojan:Win32/Witkinat.A",
"Trojan/Win32.Brospa.R4351",
"TrojanSpy.Brospa",
"Win32.Trojan-spy.Brospa.Wrqa",
"W32/Witkinat.Q!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Potentially",
"malicious",
"iOS",
"connection",
"Using",
"the",
"codes",
"and",
"“",
"Concipit1248",
"”",
"to",
"check",
"for",
"more",
"versions",
",",
"we",
"found",
"two",
"other",
"apps",
"in",
"the",
"App",
"Store",
"."
] | [
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"Targeting",
"Postal",
"and",
"Transportation",
"Services",
"Companies",
"One",
"of",
"the",
"most",
"significant",
"findings",
"is",
"that",
"new",
"versions",
"of",
"FakeSpy",
"target",
"not",
"only",
"Korean",
"and",
"Japanese",
"speakers",
",",
"but",
"also",
"almost",
"any",
"postal",
"service",
"company",
"around",
"the",
"world",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"saw",
"the",
"following",
"hardcoded",
"C",
"&",
"C",
"server",
"location",
"in",
"the",
"RAT",
"package",
":",
"Conclusion",
":",
"The",
"DroidJack",
"RAT",
"is",
"another",
"example",
"of",
"a",
"growing",
"trend",
"in",
"which",
"malware",
"authors",
"seek",
"to",
"exploit",
"public",
"interest",
"as",
"a",
"way",
"to",
"spread",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"appears",
"to",
"have",
"evolved",
"from",
"the",
"NewPOSthings",
"family",
"of",
"malware",
"first",
"discovered",
"by",
"Dennis",
"Schwarz",
"and",
"Dave",
"Loftus",
"at",
"Arbor",
"Networks."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12
] |
[
"It",
"'s",
"also",
"raising",
"eyebrows",
"because",
"of",
"the",
"connection",
"with",
"China",
",",
"which",
"has",
"frequently",
"sparred",
"with",
"the",
"U.S.",
"over",
"cyber",
"espionage",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"new",
"variant,",
"dubbed",
"HummingWhale,'",
"includes",
"new,",
"cutting",
"edge",
"techniques",
"that",
"allow",
"it",
"to",
"perform",
"ad",
"fraud",
"better",
"than",
"ever",
"before."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16
] |
[
"Checking",
"this",
"Minigameshouse",
"page",
"further",
"indicates",
"that",
"this",
"person",
"is",
"indeed",
"the",
"owner",
"of",
"the",
"minigameshouse",
"[",
"."
] | [
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"SANS",
"mail",
"server",
"quarantined",
"this",
"file",
"FautraPago392023.gz",
"and",
"extracted",
"the",
"file",
"to",
"find",
"there",
"was",
"no",
".exe",
"extension",
"associated",
"with",
"the",
"file."
] | [
5,
13,
13,
16,
16,
1,
9,
16,
16,
16,
1,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
1
] |
[
"When",
"installed,",
"GreenDispenser",
"may",
"display",
"an",
"out",
"of",
"service'",
"message",
"on",
"the",
"ATM",
"--",
"but",
"attackers",
"who",
"enter",
"the",
"correct",
"pin",
"codes",
"can",
"then",
"drain",
"the",
"ATM's",
"cash",
"vault",
"and",
"erase",
"GreenDispenser",
"using",
"a",
"deep",
"delete",
"process,",
"leaving",
"little",
"if",
"any",
"trace",
"of",
"how",
"the",
"ATM",
"was",
"robbed."
] | [
16,
16,
3,
0,
1,
9,
9,
9,
9,
9,
16,
16,
4,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
1,
9,
9,
9,
9,
9,
9,
16,
1,
9,
9,
9,
16,
16,
16,
5,
16,
16
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.