tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Inject",
"Win32.Trojan.Delf.am",
"W32/Trojan.SHRZ-8205",
"Win32.Worm.Delf.Dxcp",
"Trojan.PWS.Banks.799",
"W32.W.AutoRun.lmnK",
"Backdoor:Win32/Aybo.B",
"Trojan.Delf",
"Trojan.Win32.VMProtect",
"Win32/Trojan.079"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"On",
"several",
"occasions,",
"we",
"verified",
"that",
"these",
"details",
"are",
"correct",
"for",
"the",
"intended",
"victim."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"\"",
"Emboldened",
"by",
"financial",
"and",
"technological",
"independence",
",",
"their",
"skillsets",
"will",
"advance–putting",
"end",
"users",
",",
"enterprises",
",",
"and",
"government",
"agencies",
"at",
"risk",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Packed-76",
"Trojan-Downloader.Win32.Qvod.col",
"Trojan.Win32.Swisyn!IK",
"Trojan.Win32.Swisyn",
"W32/Qvod.EF!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"The",
"increasing",
"sophistication",
"of",
"surveillanceware",
"The",
"structure",
"of",
"the",
"surveillanceware",
"indicates",
"it",
"is",
"very",
"sophisticated",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Wekby",
"actors",
"have",
"recently",
"been",
"observed",
"compromising",
"organizations",
"in",
"the",
"Manufacturing,",
"Technology",
"and",
"Utilities",
"verticals,",
"but",
"have",
"had",
"a",
"long",
"standing",
"interest",
"in",
"the",
"HealthCare",
"industry."
] | [
16,
6,
14,
16,
16,
16,
16,
16,
4,
16,
16,
4,
12,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12
] |
[
"''",
"Debug",
"information",
"on",
"logcat",
"Another",
"indicator",
"is",
"the",
"amount",
"of",
"debugging",
"information",
"the",
"trojan",
"is",
"still",
"generating",
"—",
"a",
"production-level",
"trojan",
"would",
"keep",
"its",
"logging",
"to",
"a",
"minimum",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Redrac.A@mm",
"Win32.Redrac.A@mm",
"Win32.Redrac.A@mm",
"Trojan.Win32.Redrac.enor",
"W32.Redrac@mm",
"Win32/Redrac.A",
"Email-Worm.Win32.Redrac",
"Win32.Redrac.A@mm",
"Worm.Redrac!vQPr8wluFnM",
"W32.W.Redrac!c",
"Win32.Redrac.A@mm",
"Worm.Win32.Redrac.A",
"Win32.Redrac.A@mm",
"Win32.HLLM.Redrac",
"Worm.Redrac.Win32.1",
"BehavesLike.Win32.AdwareRBlast.cc",
"W32/Redrac.AFIQ-7566",
"Worm/Sramota.axa",
"WORM/Redrac.A",
"Worm[Email]/Win32.Redrac",
"Win32.Redrac.E90817",
"Trojan/Win32.Xema",
"Worm:Win32/Redrac.A@mm",
"Virus.Win32.Heur.l",
"W32/Gnome.C.worm",
"Win32.Redrac.A@mm",
"I-Worm/Redrac.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"enables",
"it",
"to",
"launch",
"malicious",
"apps",
"without",
"the",
"user",
"’",
"s",
"awareness",
"and",
"explicit",
"consent",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"provides",
"a",
"robust",
"set",
"of",
"capabilities,",
"including:",
"file",
"transfer,",
"screen",
"capture,",
"keystroke",
"logging,",
"process",
"injection,",
"process",
"manipulation,",
"and",
"task",
"scheduling."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"CONCLUSIONS",
"FakeSpy",
"was",
"first",
"seen",
"in",
"October",
"2017",
"and",
"until",
"recently",
"mainly",
"targeted",
"East",
"Asian",
"countries",
"."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"common",
"misconfiguration",
"attempts",
"to",
"download",
"the",
"non-existant",
"file",
"at",
"http://www.server.com/sqlite3.dll"
] | [
16,
16,
1,
16,
16,
16,
16,
16,
1,
16,
1
] |
[
"Check",
"Point",
"researchers",
"discovered",
"another",
"widespread",
"malware",
"campaign",
"on",
"Google",
"Play",
",",
"Google",
"’",
"s",
"official",
"app",
"store",
"."
] | [
4,
12,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
4,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Ladex.A@mm",
"W32/Ladex.worm",
"W32.W.Ladex.a!c",
"W32/Ladex.worm",
"Win32.Ladex.E90817",
"W32.Dalbug.Worm",
"Win32/Ladex.A",
"Win.Worm.Ladex-1",
"Worm.Win32.Ladex.a",
"Win32.Ladex.A@mm",
"Trojan.Win32.Ladex.bxker",
"Win32.Ladex.A@mm",
"Worm.Win32.Ladex.A",
"Win32.Ladex.A@mm",
"Win32.HLLW.Ladex",
"Worm.Ladex.Win32.2",
"W32/Ladex.worm",
"W32/Risk.UDJC-2718",
"WORM/Ladex.A",
"W32/Ladex.A!worm",
"Worm/Win32.Ladex",
"Worm.Win32.Ladex.a",
"Win32.Ladex.A@mm",
"Worm.Ladex",
"W32/Ladex.D.worm",
"Worm.Win32.Ladex.a.2",
"Trojan-IM.Win16.PS",
"Win32.Ladex.A@mm",
"Win32/Worm.f02"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"is",
"quite",
"unusual",
"to",
"find",
"an",
"actual",
"organization",
"behind",
"mobile",
"malware",
",",
"as",
"most",
"of",
"them",
"are",
"developed",
"by",
"purely",
"malicious",
"actors",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.ZbalCS.S302126",
"Backdoor.Konus.Win32.1",
"Trojan/Kryptik.flew",
"Trojan.Midie.D88E4",
"TROJ_KRYPTIK_GC140164.UVPM",
"Win32.Trojan.WisdomEyes.16070401.9500.9700",
"TROJ_KRYPTIK_GC140164.UVPM",
"Win.Trojan.Ag-4254306-1",
"Trojan.Win32.Kryptik.emceui",
"Trojan.DownLoader23.52205",
"BehavesLike.Win32.PWSZbot.fc",
"Backdoor.Konus.b",
"TR/Crypt.EPACK.rguwm",
"Backdoor.Konus!",
"W32/Kryptik.FLEW!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Enterprises",
"are",
"currently",
"being",
"targeted",
"by",
"the",
"macro",
"malware",
"BARTALEX",
"in",
"a",
"recent",
"outbreak",
"of",
"thousands",
"of",
"spammed",
"emails."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Ares.A",
"Backdoor/W32.Aresdor.15872",
"Backdoor/Aresdor.13",
"Backdoor.Ares.A",
"W32/Risk.WUTO-4007",
"Backdoor.Trojan",
"Win32/Aresdor.13.C",
"BKDR_ARESDOR.A",
"Backdoor.Win32.Aresdor.13",
"Trojan.Win32.Aresdor.dblp",
"Backdoor.Win32.Z.Aresdor.15872[h]",
"Backdoor.W32.Aresdor.13!c",
"Backdoor.Ares.A",
"Backdoor.Win32.Aresdor.13.C",
"Backdoor.Ares.A",
"BackDoor.Ares.13",
"Backdoor.Aresdor.Win32.3",
"BKDR_ARESDOR.A",
"Backdoor/Aresdor.a",
"BDC/Aresdor.13.1.A",
"W32/Ares.C!tr.bdr",
"Trojan[Backdoor]/Win32.Aresdor",
"Backdoor.Ares.A",
"Win-Trojan/Aresdor.15872",
"Backdoor:Win32/Ares.A",
"Backdoor.Ares.A",
"Backdoor.Aresdor",
"Win32.Backdoor.Aresdor.Wpte",
"Backdoor.Aresdor!SN6VLScBnkQ",
"Trojan.Win32.Aresdor",
"Backdoor.Ares.A",
"BackDoor.Aresdor.C",
"Backdoor.Win32.Aresdor.13",
"Win32/Backdoor.a98"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W97M.Dropper.E",
"W97M/DownldExe.A",
"W97M.Downloader",
"W97M/DownldExe.A",
"W2000M/Dldr.Jetoypt.A",
"W97M/Dloader.NCN!tr",
"HEUR.VBA.Trojan",
"Heur.MSWord.Downloader.b",
"Trojan-Downloader.W97M.Small",
"Macro.Trojan-Downloader.Broxoff.B",
"heur.macro.download.e"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"highlights",
"the",
"analysis",
"flow",
"using",
"two",
"of",
"our",
"flagship",
"products,",
"Security",
"Analytics",
"SA",
"and",
"the",
"Enterprise",
"Compromise",
"Assessment",
"Tool",
"ECAT,",
"for",
"an",
"Advance",
"Persistent",
"Threat",
"APT",
"intrusion",
"investigation."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
13,
13,
16,
5,
13,
13,
13,
13,
13,
16,
16,
6,
14,
14,
14,
16,
16
] |
[
"This",
"app",
"appears",
"to",
"have",
"become",
"unavailable",
"on",
"Google",
"Play",
"in",
"March",
"2020",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Perkesh.B",
"TrojanDropper.Perkesh.C2",
"Trojan.Perkesh.B",
"Trojan/Downloader.Fiegi.ar",
"TROJ_PERKESH.SMF",
"TROJ_PERKESH.SMF",
"Trojan.Perkesh.B",
"Trojan.Perkesh.B",
"Trojan.Win32.Downloader.44032.DO",
"TrojWare.Win32.Downloader.Small.ai43",
"Trojan.MulDrop.34331",
"TrojanDropper:Win32/Perkesh.C",
"Trojan.Perkesh.B",
"BScope.Trojan.SvcHorse.01643",
"Trojan.Perkesh.B",
"Trj/Murlo.P",
"Win32/TrojanDownloader.Perkesh.F",
"Trojan-Downloader.Win32.Perkesh"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"MalwareBytes",
"recently",
"came",
"across",
"a",
"campaign",
"targeting",
"a",
"Saudi",
"Arabia",
"Government",
"entity",
"via",
"a",
"malicious",
"Word",
"document",
"which",
"at",
"first",
"reminded",
"us",
"of",
"an",
"attack",
"we",
"had",
"previously",
"described",
"on",
"this",
"blog."
] | [
3,
16,
16,
16,
6,
14,
16,
4,
12,
12,
12,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"have",
"been",
"monitoring",
"a",
"new",
"campaign",
"specifically",
"targeting",
"WordPress",
"sites,",
"using",
"hundreds",
"of",
"them",
"for",
"SEO",
"spam",
"distribution."
] | [
16,
16,
16,
16,
16,
16,
6,
16,
16,
1,
9,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/VB.auv",
"BKDR_VB.GXX",
"Win32.Trojan.WisdomEyes.16070401.9500.9813",
"W32/Backdoor2.EBKN",
"Backdoor.Trojan",
"BKDR_VB.GXX",
"Backdoor.Win32.VB.apw",
"Trojan.Win32.VB.ehzv",
"Backdoor.Win32.S.VB.1007657.A",
"Backdoor.W32.VB.apw!c",
"Backdoor.Win32.VB.~UU",
"Backdoor.VB.Win32.2378",
"BehavesLike.Win32.Trojan.dm",
"W32/Backdoor.LCBL-3812",
"BDS/VB.A.109",
"Trojan[Backdoor]/Win32.VB",
"Backdoor.Win32.VB.apw",
"Trojan/Win32.Xema.C44642",
"BScope.Trojan-Dropper.Injector",
"Trj/SpyMaster.C",
"Win32/VB.AUV",
"Win32.Backdoor.Vb.srv",
"Backdoor.VB!xTNIvgAXzis",
"Backdoor.Win32.VB",
"W32/VB.0F07!tr",
"Win32/Backdoor.8f4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"last",
"time",
"I",
"wrote",
"about",
"poker-related",
"malware,",
"it",
"was",
"about",
"PokerAgent,",
"a",
"trojan",
"propagating",
"through",
"Facebook",
"that",
"was",
"used",
"to",
"steal",
"Facebook",
"users'",
"logon",
"credentials,",
"credit",
"card",
"information",
"and",
"the",
"level",
"of",
"Zynga",
"poker",
"credit."
] | [
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
3,
16,
3,
16,
16,
4,
16,
16,
16,
16,
16,
4,
1,
16,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Joke/W32.BadJoke.230912",
"Hoax.Fakedel",
"JokeTool.RJLSoftware",
"Aplicacion/FakeDel.c",
"W32/Joke.BE",
"Joke.FakeDel",
"JOKE_FAKEDEL.C",
"Win.Joke.FakeDelete-1",
"Hoax.Win32.BadJoke.FakeDel.c",
"Riskware.Win32.FakeDel.hsrd",
"Hoax.W32.BadJoke.FakeDel.c!c",
"Joke.Fakedel",
"Tool.BadJoke.Win32.441",
"JOKE_FAKEDEL.C",
"not-a-virus:BadJoke.Win32.FakeDel.b",
"W32/Joke.HLOW-7548",
"Hoax.BadJoke.FakeDel.a",
"Joke:Win32/Fakedel.C",
"JOKE/FakeDel.C",
"HackTool[Hoax]/Win32.FakeDel",
"Joke:Win32/Fakedel.C",
"Hoax.Win32.BadJoke.FakeDel.c",
"BadJoke.Win32.FakeDel.c",
"Joke/Fakedel.D",
"Win32.Trojan-psw.Badjoke.Svrk",
"Trojan.BadJoke!Ig2iP/M1kgM",
"Win32/Joke.309"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.921B",
"Trojan.Win32.VBKrypt!O",
"Trojan.VBKrypt",
"Trojan.Heur.E6E8D0",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win32.VBKrypt.hrqc",
"Trojan.Win32.Drop.bccyya",
"Trojan.Win32.Z.Vbkrypt.602112.J",
"Trojan.MulDrop2.63923",
"BehavesLike.Win32.Trojan.hc",
"Trojan.Win32.VB",
"Trojan/VBKrypt.gkpp",
"Trojan/Win32.VBKrypt",
"Trojan:Win32/Msposer.A",
"Trojan.Win32.VBKrypt.hrqc",
"Trojan.VBKrypt",
"Win32.Trojan.Vbkrypt.Phrb",
"W32/Refroso.AGEA!tr",
"Win32/Trojan.169"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Troj.W32.Autoit!c",
"TROJ_FILPOR.AI",
"Backdoor.Enfourks",
"TROJ_FILPOR.AI",
"Trojan.Win32.Autoit.ezc",
"Trojan.Win32.Autoit.ecevvi",
"Trojan.DownLoader21.32598",
"Trojan.Autoit.Win32.30656",
"BehavesLike.Win32.Autorun.hc",
"TR/Autoit.qhpu",
"Trojan.Win32.Autoit.ezc",
"Trojan:Win32/Filpor.A",
"Win32.Trojan.Autoit.Pepf",
"Trojan.Win32.Autoit",
"W32/Autoit.EZC!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DropperHQc.Trojan",
"Trojan.Dropper.UUW",
"Trojan.Dynamer.A4",
"W32/Trojan.YSAI-0703",
"Win32/Tnega.ARWO",
"Trojan-Spy.MSIL.KeyLogger.cssc",
"Trojan.Dropper.UUW",
"Trojan.Win32.Drop.ewucrk",
"Uds.Dangerousobject.Multi!c",
"Trojan.Dropper.UUW",
"Trojan.DownLoader1.49310",
"BehavesLike.Win32.Shodi.cc",
"Trojan.Dropper.UUW",
"Trojan.Win32.Z.Dropper.833273",
"Trojan-Spy.MSIL.KeyLogger.cssc",
"TrojanDropper:Win32/FakeFlexnet.A",
"Trojan.Dropper.UUW",
"Trojan.Dropper.UUW",
"Hoax.Win32.BadJoke",
"Trj/CI.A",
"Win32/Trojan.BO.19d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"And",
"that",
"’",
"s",
"exactly",
"what",
"has",
"happened",
"recently",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom/W32.Blocker.3262976",
"Trojan.MSIL.FC.4195",
"Win32.Trojan.WisdomEyes.16070401.9500.9943",
"W32/Trojan.RPCY-7702",
"Ransom_Blocker.R038C0DAH18",
"Trojan-Ransom.Win32.Blocker.juiv",
"Trojan.Win32.Blocker.etmtcp",
"Trojan.Win32.Z.Blocker.3262976.X",
"Troj.Ransom.W32.Blocker!c",
"Trojan.MulDrop7.48467",
"Ransom_Blocker.R038C0DAH18",
"Trojan[Ransom]/Win32.Blocker",
"Trojan.MSILPerseus.D107B2",
"Trojan-Ransom.Win32.Blocker.juiv",
"TrojanSpy:MSIL/Reven.A!bit",
"Trojan/Win32.Blocker.R203232",
"Ransom.FileCryptor",
"Trj/CI.A",
"Win32.Trojan.Blocker.Aiip",
"Trojan.MSIL.Spy",
"Win32/Trojan.Ransom.df0"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"few",
"weeks",
"ago",
"Cisco",
"Talos",
"became",
"interested",
"in",
"just",
"such",
"a",
"campaign",
"with",
"a",
"smaller",
"number",
"of",
"circulating",
"email",
"messages."
] | [
0,
8,
8,
16,
4,
12,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
1,
9
] |
[
"As",
"FileCoder",
"was",
"incomplete",
"at",
"the",
"time",
"of",
"its",
"discovery,",
"we",
"believe",
"KeRanger",
"is",
"the",
"first",
"fully",
"functional",
"ransomware",
"seen",
"on",
"the",
"OS",
"X",
"platform."
] | [
16,
3,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
3,
11,
11,
16,
16,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BehavesLike:Win32.Malware",
"DLOADER.Trojan",
"SHeur.CDXP",
"Heuristic.Malware"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"Banking",
"trojans",
"are",
"among",
"some",
"of",
"the",
"biggest",
"threats",
"to",
"everyday",
"users",
"as",
"they",
"directly",
"impact",
"the",
"user",
"in",
"terms",
"of",
"financial",
"loss."
] | [
3,
11,
16,
16,
16,
16,
16,
16,
3,
0,
8,
8,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16
] |
[
"XLoader",
"also",
"prevents",
"victims",
"from",
"accessing",
"the",
"device",
"’",
"s",
"settings",
"or",
"using",
"a",
"known",
"antivirus",
"(",
"AV",
")",
"app",
"in",
"the",
"country",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Remsec",
"is",
"a",
"stealthy",
"tool",
"that",
"appears",
"to",
"be",
"primarily",
"designed",
"for",
"spying",
"purposes."
] | [
3,
16,
16,
3,
11,
15,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"does",
"so",
"for",
"each",
"and",
"every",
"app",
"on",
"the",
"device",
"as",
"long",
"as",
"the",
"package",
"names",
"are",
"on",
"its",
"prey",
"list",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Flooder.Napsterokoz!ZeoO3ZzZXAQ",
"PUA.Win32.Packer.NetExecutable-1",
"Flooder.Win32.Napsterokoz.a",
"Trojan.DownLoader5.2173",
"Trojan-PWS.Win32.Fignotok!IK",
"Flooder.Napsterokoz.a",
"Flooder.Napsterokoz.a",
"Trojan-PWS.Win32.Fignotok",
"Flooder.IJJ"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Mdropper",
"TROJ_MDROPPR.CA",
"Win32.Mdropper",
"TROJ_MDROPPR.CA",
"Trojan.Mdropper"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"Attackers",
"know",
"that",
"rooting",
"devices",
"via",
"malware",
"exploits",
"is",
"an",
"effective",
"means",
"to",
"control",
"devices",
"and",
"gather",
"information",
"from",
"them",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HackerAu3.Worm",
"Win32.Worm.Autoit.Q",
"Backdoor.Win32.Shark.axz!O",
"Worm.Autoit.i",
"Win32.Worm.Autoit.Q",
"Worm.AutoIt.Win32.2",
"W32/AutoRun.fjx",
"WORM_UTOTI.RC",
"Win32.Worm.Sohanad.br",
"W32/Downloader.AEEC-3989",
"W32.SillyDC",
"Win32/Vishawon.A",
"WORM_UTOTI.RC",
"Worm.Win32.AutoIt.i",
"Win32.Worm.Autoit.Q",
"Trojan.Script.AutoIt.delira",
"Worm.Win32.Autorun.215552.B",
"Win32.Virus.Alman.Svhc",
"Win32.Worm.Autoit.Q",
"Worm.Win32.AutoIt.~MT",
"Win32.HLLW.Autoruner.1483",
"W32/Downldr2.AICJ",
"Worm/AutoRun.jsl",
"W32/Almanahe.C",
"Win32.Worm.Autoit.Q",
"W32.W.AutoRun.lbrr",
"Worm.Win32.AutoIt.i",
"Win32.Worm.Autoit.Q",
"Trojan/Win32.AutoRun.C97057",
"Worm.AutoRun.FLD",
"I-Worm.Autoit.AC",
"Win32/Autoit.BA",
"Worm.AutoIT.V",
"Worm.Win32.AutoIt",
"W32/AutoIt.I!worm",
"Win32/Worm.c3b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"98.05",
"%",
"of",
"all",
"malware",
"detected",
"in",
"2013",
"targeted",
"this",
"platform",
",",
"confirming",
"both",
"the",
"popularity",
"of",
"this",
"mobile",
"OS",
"and",
"the",
"vulnerability",
"of",
"its",
"architecture",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FakeuserinitQC.Trojan",
"TrojanDownloader.Paglst.B4",
"Trojan.Ursu.D206A",
"Backdoor.Graybird",
"Win32/Adload.NOU",
"Win.Trojan.Adload-2949",
"Trojan-Downloader.Win32.Adload.cfms",
"Trojan.Win32.Adload.rhwua",
"Trojan.Win32.A.Downloader.6381568",
"Adware.Win32.AdLoader.a",
"TrojWare.Win32.Downloader.AdLoad.CFMS",
"Trojan.DownLoad2.64118",
"Downloader.Adload.Win32.13800",
"TrojanDownloader.Adload.oqx",
"TR/Adload.V",
"Trojan[Downloader]/Win32.Adload.cfms",
"TrojanDownloader:Win32/Paglst.B",
"Troj.Downloader.W32.Adload.toiw",
"Trojan-Downloader.Win32.Adload.cfms",
"Downloader/Win32.Adload.R32544",
"TScope.Malware-Cryptor.SB",
"Win32/TrojanDownloader.Adload.NJM",
"Trojan-Downloader.Win32.Adload",
"W32/Adload.CFMS!tr.dldr",
"Trojan.PSW.Win32.QQPass.DT"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clod6d6.Trojan.587c",
"Trojan.Downloader.JMWD",
"Trojan.Downloader.JMWD",
"Trojan.Boupke.A6",
"Trojan.Downloader.JMWD",
"Trojan.Win32.S.Downloader.196096.A",
"Trojan.Downloader.JMWD",
"Trojan.Downloader.JMWD",
"DDoS.5686",
"Trojan:Win32/Doschald.A",
"Trojan.Downloader.JMWD",
"Trj/Downloader.MDW",
"Trojan.Win32.Downloader.au",
"Win32/Trojan.Downloader.001"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Mobile",
"malware",
"is",
"a",
"significant",
"risk",
"for",
"organizations",
"and",
"consumers",
"alike",
",",
"and",
"must",
"be",
"considered",
"when",
"protecting",
"personal",
"and",
"business",
"data",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"mediaserver",
"will",
"first",
"builds",
"a",
"new",
"unique",
"track",
",",
"start",
"to",
"play",
"the",
"track",
",",
"loop",
"play",
"all",
"audio",
"buffer",
",",
"then",
"finally",
"stop",
"the",
"playback",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Letbetom.Trojan",
"Trojan-Spy.MSIL.Redator!O",
"Trojan/Redator.a",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/MalwareF.LRAK",
"Win.Trojan.Keylogger-796",
"Trojan-Spy.MSIL.Redator.a",
"Trojan.Win32.Redator.cwfoqm",
"Trojan.Win32.Z.Redator.186456",
"Backdoor.PePatch.Win32.36732",
"W32/Risk.TYVS-3062",
"TrojanSpy.MSIL.dwl",
"System.Monitor.Stealthddos",
"Trojan[Spy]/MSIL.Redator",
"Trojan.MSIL.Krypt.2",
"Troj.Spy.MSIL.KeyLogger.ljvI",
"Trojan-Spy.MSIL.Redator.a",
"Trojan/Win32.Keylogger.R4155",
"TrojanSpy.MSIL.Redator",
"Trj/CI.A",
"MSIL/Spy.Keylogger.AK",
"Msil.Trojan-spy.Redator.Pgcw",
"W32/Mdrop.CRV!tr",
"Win32/Trojan.Spy.17f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Trojan",
"native",
"capabilities",
"This",
"is",
"a",
"full-fledged",
"trojan",
"with",
"capabilities",
"ranging",
"from",
"those",
"of",
"a",
"banking",
"trojan",
"to",
"a",
"full",
"spying",
"trojan",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"is",
"this",
"second",
"webshell",
"that",
"enabled",
"the",
"threat",
"actor",
"to",
"run",
"a",
"variety",
"of",
"commands",
"on",
"the",
"compromised",
"server."
] | [
16,
16,
16,
16,
3,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16,
1,
16,
5,
13,
13
] |
[
"As",
"an",
"example",
",",
"in",
"the",
"two",
"images",
"below",
",",
"we",
"can",
"see",
"the",
"encrypted",
"and",
"decrypted",
"shared",
"preferences",
"file",
",",
"which",
"is",
"encrypted",
"using",
"the",
"java",
"“",
"PBEWithMD5AndDES",
"”",
"algorithm",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"1",
"–",
"Phishing",
"Email",
"When",
"the",
"email",
"link",
"is",
"opened",
"from",
"an",
"Android",
"device",
",",
"an",
"APK",
"file",
"(",
"Fattura002873.apk",
")",
",",
"is",
"downloaded",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16
] |
[
"Not",
"long",
"ago,",
"news",
"appeared",
"online",
"of",
"a",
"younger",
"sibling",
"for",
"the",
"sensational",
"vulnerability",
"EternalBlue."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
7,
15,
3
] |
[
"At",
"the",
"time",
"of",
"writing",
"this",
"article,",
"the",
"Joao",
"downloader",
"was",
"being",
"distributed",
"via",
"the",
"anime-themed",
"MMORPG",
"Grand",
"Fantasia",
"offered",
"on",
"gf.ignitgames[.]to."
] | [
3,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
1,
9,
9,
9,
9,
16,
16,
1
] |
[
"DDoS",
"tools",
"developed",
"by",
"this",
"organization",
"use",
"SSH",
"weak",
"passwords",
"and",
"server",
"vulnerabilities",
"to",
"control",
"many",
"Linux",
"chickens."
] | [
3,
11,
16,
16,
16,
6,
16,
1,
9,
9,
16,
1,
15,
16,
16,
16,
5,
16
] |
[
"If",
"the",
"device",
"is",
"located",
"outside",
"Russia",
"or",
"is",
"an",
"emulator",
",",
"the",
"application",
"displays",
"a",
"stub",
"page",
":",
"In",
"this",
"case",
",",
"the",
"Trojan",
"’",
"s",
"logs",
"contain",
"records",
"in",
"Russian",
"with",
"grammatical",
"errors",
"and",
"spelling",
"mistakes",
":",
"If",
"the",
"check",
"is",
"successful",
",",
"Rotexy",
"registers",
"with",
"GCM",
"and",
"launches",
"SuperService",
"which",
"tracks",
"if",
"the",
"Trojan",
"has",
"device",
"administrator",
"privileges",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9848",
"BehavesLike.Win64.BadFile.lm",
"Backdoor:Win64/Syscon.A",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Flooder.ICQ.Raptof.01",
"Trojan/W32.Flooder.223744",
"Flooder.Raptof.ra",
"Trojan.Flooder.ICQ.Raptof.01",
"IM-Flooder.W32.Raptof.01!c",
"Trojan.Flooder.ICQ.Raptof.01",
"Flooder.Raptof!8im4oqjQSco",
"Hacktool.Flooder",
"Win32/Flooder.ICQ.Raptof.01",
"Win.Trojan.Raptof",
"IM-Flooder.Win32.Raptof.01",
"Trojan.Win32.Raptof.dlvc",
"Spyware.IM-Flooder.Raptof.223744[h]",
"Trojan.Flooder.ICQ.Raptof.01",
"TrojWare.Win32.Flooder.ICQ.01",
"Trojan.Flooder.ICQ.Raptof.01",
"FDOS.Raptof",
"Tool.Raptof.Win32.1",
"BehavesLike.Win32.Malware.dc",
"W32/Risk.YFGX-8652",
"Flooder.ICQ.Raptof.01",
"HackTool[Flooder]/Win32.Raptof",
"Win-Trojan/Raptof.223744",
"Trojan.Flooder.ICQ.Raptof.01",
"IMFlooder.Raptof",
"Win32.Trojan.Raptof.Eflc",
"Malware_fam.gw",
"Flooder.BBR",
"Trojan.Win32.ICQ.Raptof",
"Win32/Trojan.Flood.be5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"suggests",
"that",
"multiple",
"actors",
"may",
"be",
"using",
"similar",
"source",
"code,",
"or",
"the",
"malware",
"is",
"being",
"customized",
"as",
"a",
"service",
"for",
"targeted",
"campaigns."
] | [
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.QuastihusLTG.Trojan",
"Worm.Jenxcus.A4",
"Trojan/Autoit.jh",
"Trojan.Heur.AutoIT.10",
"W32/Trojan2.OIEK",
"Win.Trojan.Autoit-581",
"W32.Sality.mCD7",
"Worm.AutoIT.Win32",
"BehavesLike.Win32.Dropper.jh",
"W32/Trojan.WAFR-6845",
"TrojanDropper.Sysn.fg",
"Trojan:AutoIt/Nateqj.B",
"Trojan/Win32.Zapchast.R114120",
"Worm.AutoIt",
"Trj/CI.A",
"I-Worm.Autoit.JH",
"Win32/Autoit.JH",
"Win32.Worm.Autoit.Wofs",
"Win32/Trojan.5a2"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper/W32.Keylogger.2292572",
"RiskWare.WinActivator",
"MSIL.Riskware.Hacktool.B",
"Tool.Wpakill.13",
"Trojan.Keylogger.Win32.50652",
"HackTool.Win32.Wpakill",
"W32.Hack.Tool",
"Trojan[Spy]/MSIL.Keylogger",
"HackTool/Win32.Wpakill.C2293432",
"TrojanSpy.MSIL.Keylogger",
"TrojanSpy.Keylogger!axHWqO6gDEY"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"attackers",
"invested",
"significant",
"effort",
"in",
"attempting",
"to",
"hide",
"the",
"tool",
"by",
"changing",
"the",
"source",
"code",
"of",
"the",
"RAT",
"and",
"the",
"RAT",
"server,",
"and",
"by",
"using",
"an",
"obfuscator",
"and",
"packer."
] | [
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
3,
5,
16,
16,
16,
5,
13,
16,
5
] |
[
"In",
"addition",
",",
"this",
"type",
"of",
"Android",
"banking",
"malware",
"does",
"not",
"require",
"the",
"device",
"to",
"be",
"rooted",
"or",
"the",
"app",
"to",
"have",
"any",
"specific",
"Android",
"permission",
"(",
"besides",
"android.permission.INTERNET",
"to",
"retrieve",
"the",
"overlay",
"contents",
"and",
"send",
"its",
"captured",
"data",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Cloddf4.Trojan.f747",
"Win32.Worm.P2p.Reur.P",
"I-Worm.Reur.l.n2",
"W32/Reur.worm!p2p",
"Worm.Reur.Win32.19",
"W32/Reur.p",
"Worm.P2P.Reur!QrOO3e6Ele8",
"W32/Reur.YOAP-3596",
"W32.HLLW.Reur",
"Win32/Reur.J",
"P2P-Worm.Win32.Reur.p",
"Win32.Worm.P2p.Reur.P",
"Trojan.Win32.Reur.inko",
"Win32.Worm.P2p.Reur.P",
"Worm.Win32.Reur.S",
"Win32.Worm.P2p.Reur.P",
"BehavesLike.Win32.Dropper.gc",
"W32/Reur.K",
"Worm/Sramota.afo",
"Worm[P2P]/Win32.Reur",
"Worm.Reur.p.kcloud",
"Worm:Win32/Reur.S",
"Win32.Worm.P2p.Reur.P",
"Trojan/Win32.HDC",
"Worm.Reur",
"Win32/Reur.S",
"W32/Reur.K!worm.p2p",
"Worm/Reur.V",
"Worm.Win32.Reur.alHx",
"Win32/Worm.226"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"phishing",
"site",
"uses",
"the",
"gathered",
"information",
"as",
"its",
"GET",
"parameter",
",",
"allowing",
"the",
"attacker",
"to",
"access",
"the",
"stolen",
"information",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"it",
"Catania",
"server2cz.exodus.connexxa",
"[",
"."
] | [
9,
9,
16,
1,
9,
9
] |
[
"Its",
"main",
"job",
"is",
"to",
"send",
"spam,",
"but",
"it",
"is",
"able",
"to",
"do",
"other",
"tasks",
"as",
"well."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"actors",
"attempted",
"to",
"exploit",
"CVE-2014-6332",
"using",
"a",
"slightly",
"modified",
"version",
"of",
"the",
"proof-of-concept",
"POC",
"code",
"to",
"install",
"a",
"Trojan",
"called",
"Emissary,",
"which",
"is",
"related",
"to",
"the",
"Operation",
"Lotus",
"Blossom",
"campaign."
] | [
16,
6,
16,
16,
7,
1,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
3,
16,
3,
16,
16,
16,
16,
16,
6,
14,
14,
1
] |
[
"Limiting",
"app",
"installations",
"on",
"corporate",
"devices",
",",
"as",
"well",
"as",
"ensuring",
"that",
"applications",
"are",
"created",
"by",
"trusted",
"developers",
"on",
"official",
"marketplaces",
",",
"can",
"help",
"in",
"reducing",
"the",
"risk",
"of",
"infection",
"as",
"well",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"''",
"in",
"a",
"variety",
"of",
"ways",
",",
"such",
"as",
"static",
"analysis",
",",
"dynamic",
"analysis",
",",
"and",
"machine",
"learning",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Although",
"most",
"apps",
"have",
"positive",
"ratings",
",",
"some",
"of",
"the",
"users",
"have",
"noticed",
"and",
"reported",
"Judy",
"’",
"s",
"suspicious",
"activities",
",",
"as",
"seen",
"in",
"the",
"images",
"below",
":",
"As",
"seen",
"in",
"previous",
"malware",
",",
"such",
"as",
"DressCode",
",",
"a",
"high",
"reputation",
"does",
"not",
"necessarily",
"indicate",
"that",
"the",
"app",
"is",
"safe",
"for",
"use",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"combination",
"of",
"factors",
"made",
"this",
"pattern",
"effective",
"and",
"successful,",
"explaining",
"why",
"ITG08",
"has",
"remained",
"operational",
"for",
"so",
"long."
] | [
16,
16,
16,
1,
16,
16,
1,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16
] |
[
"''",
"The",
"latest",
"samples",
"attributed",
"to",
"this",
"campaign",
"were",
"discovered",
"by",
"security",
"researchers",
"from",
"ClearSky",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16
] |
[
"It",
"then",
"decrypts",
"a",
"hardcoded",
"encrypted",
"value",
"and",
"sets",
"the",
"“",
"action",
"”",
"parameter",
"of",
"the",
"Intent",
"using",
"the",
"setAction",
"API",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Ploutus",
"is",
"one",
"of",
"the",
"most",
"advanced",
"ATM",
"malware",
"families",
"we've",
"seen",
"in",
"the",
"last",
"few",
"years."
] | [
3,
16,
16,
16,
16,
16,
3,
11,
11,
11,
16,
16,
16,
0,
8,
8,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win.HLLP.Sector.C",
"Win.HLLP.Sector.C",
"Win.HLLP.Sector.C",
"Win.HLLP.Sector",
"Win/HLLP.Sector.C",
"NE_HLLP_SECTOR.C",
"Win.HLLP.Sector.C",
"Win.HLLP.Sector.C",
"Trojan.Win16.HLLP.exkzou",
"Win.Hllp.Sector!c",
"Win.HLLP.Sector.C",
"Win.HLLP.Sector.C",
"Win.HLLP.Sector.18864",
"NE_HLLP_SECTOR.C",
"W16/TNT.a",
"W16/HLLP.Sector.C",
"Backdoor:Win16/Sector.C",
"W16/TNT.a",
"Win32.Virus.Hllp.Akes",
"Virus.Win.Hllp"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Per",
"its",
"advertisements",
"it",
"is",
"an",
"infostealer",
"that",
"steals",
"form",
"data",
"from",
"various",
"web",
"browsers",
"and",
"other",
"applications."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
1,
9,
9,
9,
9,
9,
9,
16,
1,
9
] |
[
"However",
",",
"in",
"order",
"to",
"block",
"Janus",
"abuse",
",",
"app",
"developers",
"need",
"to",
"sign",
"their",
"apps",
"with",
"the",
"new",
"scheme",
"so",
"that",
"Android",
"framework",
"security",
"component",
"could",
"conduct",
"integrity",
"checks",
"with",
"enhanced",
"features",
"."
] | [
16,
16,
16,
16,
16,
16,
7,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"WS.Reputation.1",
"WORM_DUPTWU.SMIA",
"Worm.Autorun-6650",
"Backdoor.Win32.LolBot.dyk",
"Trojan.Downloader.JNUS",
"Backdoor.Win32.LolBot!IK",
"Trojan.Downloader.JNUS",
"WORM_DUPTWU.SMIA",
"Worm:Win32/Duptwux.A",
"Trojan.Downloader.JNUS",
"Backdoor/Win32.LolBot",
"Backdoor.LolBot.ju",
"Worm.Win32.FakeFolder.t",
"Backdoor.Win32.LolBot",
"W32/LolBot.DYK!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win.Trojan.Scarpnex-1",
"Trojan.MulDrop4.61017",
"Trojan[Spy]/MSIL.KeyLogger",
"Trojan:MSIL/Scarpnex.A",
"Trojan.Zusy.D9B94",
"TrojanSpy.KeyLogger!icGvcsfSy6M",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Msxrat",
"Trojan.Win32.Z.Msxrat.522564",
"TR/Crypt.Xpack.wccie",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"The",
"LOCKBIT",
"ransomware",
"group",
"is",
"one",
"of",
"the",
"most",
"notorious",
"cyber-thieves",
"in",
"the",
"world,",
"targeting",
"companies",
"across",
"Europe,",
"the",
"United",
"States,",
"India,",
"and",
"the",
"Middle",
"East",
"in",
"a",
"series",
"of",
"attacks",
"that",
"began",
"in",
"December",
"2022."
] | [
6,
14,
14,
14,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
4,
16,
2,
10,
10,
10,
10,
16,
2,
10,
10,
16,
16,
16,
16,
1,
16,
16,
16,
0,
8
] |
[
"It",
"is",
"unknown",
"what",
"is",
"the",
"intent",
"behind",
"the",
"campaign",
"as",
"of",
"this",
"writing,",
"however,",
"the",
"profile",
"of",
"the",
"targets",
"resembles",
"those",
"that",
"are",
"common",
"targets",
"of",
"Advanced",
"Persistent",
"Threat",
"APT",
"actors."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
14,
14
] |
[
"We",
"investigated",
"further",
"and",
"found",
"that",
"this",
"campaign",
"is",
"specifically",
"targeted",
"to",
"Korean",
"sites",
"and",
"Korean",
"banks."
] | [
16,
16,
16,
16,
16,
15,
16,
6,
16,
16,
16,
16,
1,
9,
16,
4,
12
] |
[
"The",
"activities",
"continue",
":",
"the",
"most",
"recently",
"observed",
"domain",
"was",
"registered",
"on",
"October",
"31",
",",
"2017",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"latest",
"Petya-like",
"outbreak",
"has",
"gathered",
"a",
"lot",
"of",
"attention",
"from",
"the",
"media."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"After",
"installation",
",",
"the",
"malware",
"connects",
"to",
"the",
"designated",
"Command",
"and",
"Control",
"(",
"C",
"&",
"C",
")",
"server",
",",
"and",
"receives",
"a",
"command",
"to",
"perform",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"division",
"of",
"labor",
"among",
"the",
"cybercriminals",
"can",
"also",
"be",
"seen",
"in",
"the",
"behavior",
"of",
"their",
"Trojans",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Ransom.Win32.Gimemo!O",
"Trojan.PornoAsset.Win32.9310",
"Trojan/Gimemo.aunq",
"Trojan.Symmi.D1B0C",
"Trojan.Winlock.7482",
"BehavesLike.Win32.BadFile.ch",
"Trojan/PornoAsset.ooo",
"Trojan[Ransom]/Win32.Gimemo",
"Trojan:Win32/Fsblock.A",
"TScope.Trojan.VB",
"Trojan-Dropper.Win32.Injector",
"W32/Injector.CLTY!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9520",
"Win32.Trojan.Razy.Hsjc",
"BehavesLike.Win32.BadFile.mz",
"TR/Razy.anyu",
"Trojan:Win32/Rekilc.C",
"Trojan.Razy.D822B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Degrub",
"Trojan-Spy.Win32.Delf.avce",
"Trojan.Win32.Symmi.daxrzp",
"Trojan.Win32.Z.Delf.731648",
"Troj.Spy.W32.Delf!c",
"Trojan.Delf.Win32.64416",
"BehavesLike.Win32.Dropper.bh",
"Trojan-Spy.Win32.Delf",
"TrojanSpy.Delf.iwz",
"TR/Spy.Delf.agiu",
"Backdoor:Win32/Degrub.A",
"Trojan-Spy.Win32.Delf.avce",
"TScope.Trojan.Delf",
"Trj/Chgt.A",
"Win32.Trojan-spy.Delf.Akpg",
"TrojanSpy.Delf!bLkOUU0IMLc",
"W32/Delf.AFB!tr",
"Win32/Trojan.Keylog.e29"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9995",
"Trojan.Win32.Mlw.ewygwi",
"Backdoor.W32.Androm.mfVY",
"Trojan.Injector.Win32.586108",
"TR/Dropper.MSIL.xejse",
"Trojan.MSIL.Inject",
"Trj/GdSda.A",
"Win32/Trojan.e6d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"VB:Trojan.Valyria.401",
"Vb.Troj.Valyria!c",
"Trojan.GQXF-6",
"VB:Trojan.Valyria.401",
"Trojan.Ole2.Vbs-heuristic.druvzi",
"VB:Trojan.Valyria.401",
"VB:Trojan.Valyria.401",
"HEUR_VBA.E",
"HEUR.VBA.Trojan.d",
"TrojanDropper:O97M/SilverMob.A!dha",
"VB:Trojan.Valyria.401",
"Macro.Trojan.Dropperd.Auto",
"Trojan.VB.Valyria",
"VB:Trojan.Valyria.401",
"virus.office.obfuscated.1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Troj.GameThief.W32.Magania.lhJV",
"Win32.Trojan-PSW.OLGames.ck",
"TSPY_ONLINEG.VBY",
"Win.Spyware.18411-2",
"Trojan-GameThief.Win32.OnLineGames.hmv",
"Trojan.Win32.OnLineGames.bjsgmk",
"TrojWare.Win32.Magania.~I",
"Trojan.PWS.Wsgame.4325",
"TSPY_ONLINEG.VBY",
"Trojan-GameThief.Win32.OnLineGames",
"TR/CrashSystem.C",
"Trojan[GameThief]/Win32.OnLineGames",
"Win32.Troj.OnLimeGamesT.gs.73779",
"Trojan-GameThief.Win32.OnLineGames.hmv",
"Trojan/Win32.OnlineGameHack.R96963",
"Trojan.Graftor.Elzob.D370C",
"Trojan.PWS.OnLineGames!SkDSyFiZd8U"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"has",
"the",
"same",
"functionality",
"as",
"mcpef.apk",
"."
] | [
16,
16,
16,
16,
16,
16,
1,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.ProxyChanger",
"Trojan.Banload",
"Trojan/ProxyChanger.ik",
"TROJ_BANLOAD.HVU",
"W32/Trojan2.NXCH",
"Win32/Tnega.ASRL",
"Trojan.ProxyChanger.IK",
"TROJ_BANLOAD.HVU",
"Win.Trojan.Dealply-6391261-0",
"Trojan.DownLoad3.29408",
"BehavesLike.Win32.Dropper.gh",
"W32/Trojan.YDHZ-1016",
"TR/ProxyChanger.H.1",
"Trojan/Win32.Unknown",
"Trojan:Win32/ProxyChanger.H",
"Trojan/Win32.ChePro.R102488",
"TScope.Trojan.Delf",
"Win32/ProxyChanger.IK",
"Trojan.ProxyChanger!NBBwWIBks/E",
"Trojan.Crypt",
"W32/Banloa.NX!tr",
"Win32/Trojan.e6d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"other",
"words",
",",
"it",
"goes",
"through",
"every",
"object",
"on",
"the",
"screen",
"and",
"saves",
"its",
"text",
"data",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Gaobot.iawc",
"W32/Joke.OA",
"Joke.Rosenu",
"TROJ_SPNR.03D111",
"Backdoor.Pasur!NYY0BVh8dz8",
"TrojWare.Win32.Trojan.Chifrax.~A",
"TROJ_SPNR.03D111",
"W32/Joke.ERJK-0662",
"Joke.Rosenu",
"Win32/Joke.ScreenRoses",
"Trojan.Win32.Inject",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"family",
"of",
"ransomware",
"Trojans",
"that",
"encrypts",
"files",
"and",
"adds",
"the",
"extensions",
".xtbl",
"and",
".ytbl",
"emerged",
"in",
"late",
"2014/early",
"2015,",
"and",
"quickly",
"established",
"itself",
"among",
"the",
"top",
"three",
"most",
"widespread",
"encryptors",
"in",
"Russia",
"along",
"with",
"Trojan-Ransom.Win32.Cryakl",
"and",
"Trojan-Ransom.BAT.Scatter."
] | [
16,
16,
16,
3,
11,
15,
1,
9,
16,
1,
9,
9,
9,
16,
4,
16,
16,
0,
8,
8,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
2,
16,
16,
1,
16,
1
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.