Datasets:
tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"We",
"believe",
"the",
"TelePort",
"Crew",
"Threat",
"Actor",
"is",
"operating",
"out",
"of",
"Russia",
"or",
"Eastern",
"Europe",
"with",
"the",
"groups",
"major",
"motivations",
"appearing",
"to",
"be",
"financial",
"in",
"nature",
"through",
"cybercrime",
"and/or",
"corporate",
"espionage."
] | [
16,
16,
16,
6,
14,
14,
14,
16,
16,
16,
16,
2,
16,
2,
10,
16,
16,
6,
16,
16,
16,
16,
16,
4,
16,
16,
16,
6,
16,
6,
14
] |
[
"The",
"group",
"behind",
"the",
"OilRig",
"campaign",
"continues",
"to",
"leverage",
"spear-phishing",
"emails",
"with",
"malicious",
"Microsoft",
"Excel",
"documents",
"to",
"compromise",
"victims."
] | [
16,
6,
16,
6,
14,
14,
16,
16,
16,
1,
9,
16,
3,
11,
11,
11,
16,
16,
4
] |
[
"Its",
"major",
"functionality",
"is",
"also",
"implemented",
"through",
"the",
"call",
"of",
"the",
"asynchronous",
"task",
"(",
"“",
"org.starsizew.i",
"”",
")",
",",
"including",
"uploading",
"the",
"incoming",
"SMS",
"messages",
"to",
"the",
"remote",
"C2",
"server",
"and",
"executing",
"any",
"commands",
"as",
"instructed",
"by",
"the",
"remote",
"attacker",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.WebToos.A6",
"Trojan.Gadoopt.Win64.4",
"Trojan/Gadoopt.aa",
"Win64.Backdoor.Gadoopt.b",
"TROJ_WEBTOOS_EL150244.UVPM",
"Win.Trojan.Win64-93",
"BackDoor.Gates.19",
"TROJ_WEBTOOS_EL150244.UVPM",
"TR/Gadoopt.maz",
"Trojan:Win32/WebToos.A",
"Win64/Gadoopt.AA",
"Trojan.Win32.WebToos"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"short",
",",
"constant",
"string",
"of",
"characters",
"is",
"inserted",
"at",
"strategic",
"points",
"to",
"break",
"up",
"keywords",
":",
"At",
"runtime",
",",
"the",
"delimiter",
"is",
"removed",
"before",
"using",
"the",
"string",
":",
"API",
"OBFUSCATION",
"SMS",
"and",
"toll",
"fraud",
"generally",
"requires",
"a",
"few",
"basic",
"behaviors",
"(",
"for",
"example",
",",
"disabling",
"WiFi",
"or",
"accessing",
"SMS",
")",
",",
"which",
"are",
"accessible",
"by",
"a",
"handful",
"of",
"APIs",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clodc4c.Trojan.f31e",
"Win32.Packed.VMProtect.a",
"Trojan.Win32.Zapchast.ajbs",
"Trojan.Win32.Black.elkboj",
"Trojan.Win32.Z.Vmprotbad.242576[h]",
"W32/Trojan.TYMW-2040",
"Trojan/Win32.PcClient.R191990",
"Trojan.VMProtect!",
"Trojan.Win32.VMProtect",
"Trj/CI.A",
"Win32/Trojan.f26"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Below",
"is",
"a",
"collection",
"of",
"API",
"methods",
"and",
"a",
"brief",
"description",
"around",
"their",
"purpose",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9952",
"PWS:MSIL/Bahmajip.A"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"HTTP",
"Communication",
"In",
"addition",
"to",
"the",
"MQTT",
"communication",
",",
"the",
"app",
"also",
"uses",
"plain",
"text",
"HTTP",
"communication",
"in",
"order",
"to",
"download",
"the",
".dex",
"file",
"and",
"upload",
"collected",
"data",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Win32.Radminer!O",
"TrojanDropper.Small.PQ4",
"Worm.Radminer.Win32.8",
"Trojan/Radmin.b",
"TROJ_SPNR.03EF12",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Trojan.XJGC-7764",
"Remacc.Radmin",
"TROJ_SPNR.03EF12",
"Dos.Trojan.RAdmin-17",
"Trojan-Dropper.RadmIns",
"Worm.Win32.Radminer.d",
"Trojan.Win32.Radminer.dxpafi",
"Worm.Win32.A.Radminer.307200",
"Trojan.DownLoader9.15517",
"BehavesLike.Win32.Skintrim.fh",
"W32/Trojan2.OCDS",
"Trojan[RemoteAdmin]/Win32.RAdmin",
"Backdoor:Win32/Radmin.B",
"Worm.Win32.Radminer.d",
"Trojan/Win32.RAdmin.R103271",
"Trj/CI.A",
"Trojan.Radmin.B",
"Win32/Radmin.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Antavmu.Win32.50",
"Trojan/Antavmu.ejw",
"Trojan.Heur2.RP.E5C8CC",
"Win32.Trojan.WisdomEyes.16070401.9500.9564",
"W32/Trojan2.IKTO",
"Downloader.Trojan",
"Win.Trojan.Antavmu-74",
"Trojan-Downloader.Win32.Murlo.vqg",
"Trojan.Win32.Antavmu.wseg",
"Spyware.Antavmu.455005",
"TrojWare.Win32.Antavmu.~bar",
"Trojan.1",
"Trojan.Win32.Antavmu",
"W32/Trojan.ASFC-3590",
"Trojan.Antavmu.y",
"Troj.W32.Antavmu.jf!c",
"Trojan-Downloader.Win32.Murlo.vqg",
"Trojan/Win32.Antavmu.R18411",
"Trojan.1",
"Trojan.Antavmu!m7hjC7OtKPY"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"today",
"svcws",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"Figure",
"4",
":",
"Loader",
"calls",
"initialization",
"method",
"Technical",
"Analysis",
"–",
"Core",
"Module",
"With",
"the",
"main",
"purpose",
"of",
"spreading",
"the",
"infection",
",",
"“",
"Agent",
"Smith",
"”",
"implements",
"in",
"the",
"“",
"core",
"”",
"module",
":",
"A",
"series",
"of",
"‘",
"Bundle",
"’",
"vulnerabilities",
",",
"which",
"is",
"used",
"to",
"install",
"applications",
"without",
"the",
"victim",
"’",
"s",
"awareness",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
7,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Control",
"of",
"malware",
"from",
"a",
"single",
"center",
"provides",
"maximum",
"flexibility",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"new",
"online",
"banking",
"malware",
"with",
"the",
"same",
"technique",
"used",
"in",
"Operation",
"Emmental",
"has",
"been",
"hitting",
"users",
"in",
"Japan."
] | [
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
2
] |
[
"Once",
"granted",
"permission",
",",
"it",
"hides",
"its",
"icon",
"from",
"the",
"launcher",
"application",
"list",
"then",
"starts",
"a",
"service",
"that",
"it",
"keeps",
"running",
"in",
"the",
"background",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"most",
"advanced",
"mobile",
"malicious",
"programs",
"today",
"are",
"Trojans",
"targeting",
"users",
"’",
"bank",
"accounts",
"–",
"the",
"most",
"attractive",
"source",
"of",
"criminal",
"earnings",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"name",
"of",
"this",
"injector",
"is",
"based",
"on",
"its",
"version",
"information",
"which",
"is",
"the",
"same",
"for",
"both",
"dotRunpeX",
"versions,",
"consistent",
"across",
"all",
"samples",
"we",
"analyzed",
"and",
"containing",
"ProductName",
"–",
"RunpeX.Stub.Framework."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
1
] |
[
"The",
"researchers",
"wrote",
":",
"While",
"profit",
"is",
"powerful",
"motivation",
"for",
"any",
"attacker",
",",
"Yingmob",
"’",
"s",
"apparent",
"self-sufficiency",
"and",
"organizational",
"structure",
"make",
"it",
"well-positioned",
"to",
"expand",
"into",
"new",
"business",
"ventures",
",",
"including",
"productizing",
"the",
"access",
"to",
"the",
"85",
"million",
"Android",
"devices",
"it",
"controls",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16
] |
[
"If",
"you",
"want",
"to",
"know",
"more",
"about",
"them",
"—",
"our",
"researchers",
"have",
"an",
"article",
"about",
"them",
"on",
"Securelist",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TROJ_DROPPER.FK",
"Win32.Trojan.WisdomEyes.16070401.9500.9995",
"Infostealer.Gampass",
"TROJ_DROPPER.FK",
"Trojan.Win32.XDR.euxmtw",
"Trojan.MulDrop.18385",
"BehavesLike.Win32.Virut.cc",
"Win32.Infect.a.124448",
"Win32/Trojan.5f3"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Server-side",
"Carrier",
"Checks",
"In",
"the",
"JavaScript",
"bridge",
"API",
"obfuscation",
"example",
"covered",
"above",
",",
"the",
"server",
"supplied",
"the",
"app",
"with",
"the",
"necessary",
"strings",
"to",
"complete",
"the",
"billing",
"process",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Delfsnif",
"W32/Backdoor2.GYBX",
"Backdoor.Trojan",
"Trojan.Win32.Delphi.bjxrjc",
"BehavesLike.Win32.Rontokbro.dm",
"W32/Backdoor.XFVH-7108",
"Backdoor.Delfsnif",
"Trj/CI.A",
"Win32.Trojan.Crypt.Alih",
"Hoax.Win32.BadJoke.FakeKAV",
"Win32/Trojan.160"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"However,",
"we",
"have",
"also",
"observed",
"attacks",
"against",
"surrounding",
"nations",
"and",
"beyond,",
"including",
"targets",
"in",
"India",
"and",
"the",
"USA."
] | [
16,
16,
16,
16,
16,
1,
16,
16,
4,
16,
16,
16,
16,
16,
2,
16,
2,
10
] |
[
"Others",
"may",
"have",
"the",
"necessary",
"permissions",
",",
"but",
"are",
"missing",
"the",
"classes",
"containing",
"the",
"fraud",
"code",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"documents",
"were",
"found",
"to",
"drop",
"the",
"following",
"malware",
"families:",
"The",
"previously",
"discussed",
"CONFUCIUS_B",
"malware",
"family",
"A",
"backdoor",
"previously",
"not",
"discussed",
"in",
"the",
"public",
"domain,",
"commonly",
"detected",
"by",
"some",
"antivirus",
"solutions",
"as",
"BioData",
"A",
"previously",
"unknown",
"backdoor",
"that",
"we",
"have",
"named",
"MY24"
] | [
16,
1,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
3,
11,
11,
16,
3,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
5,
13,
16,
1,
16,
16,
3,
11,
16,
16,
16,
16,
3
] |
[
"Google",
"later",
"implemented",
"platform-level",
"changes",
"that",
"practically",
"eliminated",
"this",
"attack",
"surface",
"."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"spammed",
"attachments",
"are",
"using",
"a",
"RTF",
"trick",
"or",
"a",
"feature",
"of",
"Windows",
"OS",
"that",
"allows",
"dropping",
"an",
"executable",
"–",
"but",
"not",
"running",
"it",
"–",
"simply",
"by",
"opening",
"the",
"RTF",
"document"
] | [
1,
9,
9,
16,
16,
16,
1,
9,
16,
16,
1,
9,
9,
9,
15,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9
] |
[
"]",
"ponethus",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"Every",
"sample",
"we",
"found",
"was",
"different",
"in",
"size",
"and",
"activity",
"from",
"the",
"others",
"but",
"the",
"internal",
"name",
"and",
"other",
"identifiers",
"were",
"disturbingly",
"similar."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"disguises",
"itself",
"as",
"a",
"file",
"helper",
"app",
"and",
"then",
"uses",
"very",
"advanced",
"anti-debug",
"and",
"anti-hook",
"techniques",
"to",
"prevent",
"it",
"from",
"being",
"reverse",
"engineered."
] | [
16,
3,
1,
16,
16,
16,
1,
9,
9,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.KillAV.60689",
"Packed.Win32.TDSS!O",
"Trojan.KillAV.Win32.3036",
"Trojan/KillAV.caq",
"W32/Trojan2.GLAK",
"Infostealer.Onlinegame",
"Trojan.Win32.KillAV.60689",
"TrojWare.Win32.Patched.KSU",
"Trojan.Click.28899",
"Trojan.1",
"W32/Trojan.ANJW-2244",
"Trojan/KillAV.qx",
"Worm:Win32/QQnof.A",
"Trojan.Zusy.D1B0EC",
"Troj.W32.KillAV.caq!c",
"Trojan/Win32.KillAV.C155326",
"Trojan.1",
"Trojan.Win32.Jhee",
"W32/KillAV.CAQ!tr",
"Trj/KillAV.FJ"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9979",
"Backdoor.Trojan",
"Win32/Cyreho.A",
"Trojan.DownLoad2.18592",
"W32.Trojan.Trojan-Backdoor-Cele",
"TR/Dldr.Ftp.E",
"Trojan/Win32.Unknown",
"Trojan.Heur.VP.E82FB1",
"Trojan:Win32/Cyreho.A",
"Trojan.VBRA.02524",
"Win32.Trojan.Dldr.Oyeu",
"Trojan.Win32.Darkddoser",
"W32/VB.NZ!tr",
"Win32/Trojan.9b7"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Additionally,",
"we",
"have",
"observed",
"instances",
"of",
"the",
"IsSpace",
"and",
"TidePool",
"malware",
"families",
"being",
"delivered",
"via",
"the",
"same",
"techniques."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Pccontrol.2.1",
"Backdoor.Pccontrol.2.1",
"Backdoor.PcControl!Vqgcs0rOUEs",
"PcControl.C",
"Backdoor.Win32.PcControl.21",
"Backdoor.Pccontrol.2.1",
"Trojan.Win32.PcControl.cbiyio",
"Backdoor.Pccontrol.2.1",
"Backdoor.Win32.PcControl.21",
"Backdoor.Pccontrol.2.1",
"BackDoor.Control.21",
"BKDR_PCCONTROL.A",
"W32/Risk.SRBI-7988",
"BDS/PcControl.21.1",
"Trojan[Backdoor]/Win32.PcControl",
"Backdoor:Win32/PCControl.2_1",
"Backdoor.Pccontrol.2.1",
"Backdoor.Pccontrol.2.1",
"Backdoor.PcControl",
"Backdoor.Win32.PcControl.aa",
"Win32/PcControl.21",
"W32/PcCont.21!tr.bdr",
"BackDoor.Pccontrol.C",
"Bck/PcControl.21"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Bacterio61.A",
"Trojan.Bacterio61.A",
"Trojan.Bacterio61.r3",
"Trojan.Bacterio61.A",
"Trojan.Bacterio61.A",
"Trojan.Bacterio61!xosA0+L/cz0",
"Trojan.Dropper",
"TROJ_BACTERIO.61",
"Trojan.Win32.Bacterio61",
"Trojan.Win32.Bacterio61.fdse",
"Trojan.Win32.RenAll[h]",
"PE:Trojan.Bacterio61!1073791980",
"Trojan.Bacterio61.A",
"TrojWare.Win32.RenAll",
"Trojan.Bacterio61.A",
"Trojan.Bacterio61.Win32.1",
"TROJ_BACTERIO.61",
"W32/Virus.NFQE-4477",
"Trojan/Win32.Bacterio61",
"Win32.Troj.Bacterio61.kcloud",
"Win-Trojan/RenAll.94208",
"Trojan.Bacterio61.A",
"Win32.Trojan.Bacterio61.ddnb",
"W32/Bacterio61.A!tr",
"Trojan.Win32.Bacterio61.aW"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.CDB.3cb9",
"Virus.Win32.Patched"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"Finally",
",",
"the",
"Ashas",
"adware",
"family",
"has",
"its",
"code",
"hidden",
"under",
"the",
"com.google.xxx",
"package",
"name",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"1",
":",
"Landing",
"page",
"for",
"phishing",
"scheme",
"asking",
"for",
"the",
"victim",
"’",
"s",
"signatory",
"number",
"and",
"PIN",
"using",
"stolen",
"branding",
"from",
"Bank",
"Austria",
"Because",
"the",
"actor",
"delivered",
"phishing",
"links",
"using",
"the",
"bit.ly",
"URL",
"shortener",
",",
"we",
"can",
"access",
"delivery",
"statistics",
"for",
"this",
"particular",
"campaign",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.4CE7",
"Backdoor/W32.Tropoly.C",
"Backdoor.CPEX.Win32.21496",
"Trojan/Inject.aisx",
"Trojan.Heur.E7B492",
"Trojan.Win32.A.Inject.48640.F",
"TrojWare.Win32.Pincav.N",
"Trojan.PWS.Reggin.91",
"BehavesLike.Win32.Ramnit.pc",
"Trojan.Win32.Inject",
"Trojan/Inject.hnq",
"Troj.W32.Inject.aisx!c",
"Trojan/Win32.OnlineGameHack.R2669",
"PWS-OnlineGames.ge",
"BScope.TrojanPSW.Magania.1314",
"Trojan.Inject!H2RbMIi2jvQ",
"Trj/Inject.IR",
"Win32/Trojan.65a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Tregwihc.Trojan",
"Trojan.Inject.GK",
"Worm/W32.AutoRun.114688",
"W32/Autorun.worm.dw",
"W32/AutoRun.lrf",
"TROJ_FAM_0000e93.TOMA",
"Win32.Trojan.WisdomEyes.16070401.9500.9992",
"W32/Worm.FWLR-5025",
"Trojan.Minit",
"Win32/Milsni.D",
"TROJ_FAM_0000e93.TOMA",
"Win.Worm.Autorun-376",
"Win32.Rootkit.Uroburos.C",
"Trojan.Inject.GK",
"Trojan.Win32.AutoRun.ftwn",
"Worm.Win32.Autorun.114688.I",
"W32.W.AutoRun.lrf!c",
"Trojan.Inject.GK",
"Worm.Win32.AutoRun.COB",
"Trojan.Inject.GK",
"Win32.HLLW.Autoruner.5122",
"Worm.AutoRun.Win32.35",
"W32/Autorun.worm.dw",
"W32/Worm.AKXJ",
"Worm/AutoRun.fma",
"Worm:Win32/Yacspeel.A.dll",
"WORM/Autorun.Byt.34",
"Worm/Win32.AutoRun",
"Worm:Win32/Yacspeel.A.dll",
"Worm/Win32.AutoRun.R1836",
"Trojan.Inject.GK",
"Worm.Win32.AutoRun.byt",
"Trj/Autorun.RN",
"Win32/AutoRun.COB",
"Win32.Worm.Autorun.Lohz",
"Virus.Win32.AutoRun.sd",
"W32/AutoRun.BDJ!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"LNK.Trojan.3171",
"LNK/Trojan.TPJW-5",
"LNK_ARGULONG.SMLNK",
"HEUR:Trojan.WinLNK.Powecod.a",
"LNK_ARGULONG.SMLNK",
"LNK/Trojan.TPJW-5",
"HEUR:Trojan.WinLNK.Powecod.a",
"Trojan.LNK",
"virus.lnk.powershell.a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"commediauploader",
"[",
"."
] | [
9,
9,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.SasfisB.Worm",
"Win32.Worm.Wukill.D",
"Email-Worm.Win32.Rays!O",
"Worm.WuKill",
"Worm.Rays.Win32.1",
"Worm.Wukill",
"Win32.Worm-Email.Rays.a",
"W32.Wullik@mm",
"Win.Worm.Rays-1",
"Email-Worm.Win32.Rays.d",
"Win32.Worm.Wukill.D",
"Trojan.Win32.Rays.cvmxdt",
"W32.W.Basun.lwAE",
"Trojan.Win32.FakeFolder.wid",
"Win32.Worm.Wukill.D",
"Win32.Worm.Wukill.D",
"Win32.HLLM.Xgray",
"Email-Worm.Win32.Rays",
"Worm.Rays.d.49152",
"Win32.Worm.Wukill.D",
"I-Worm.Win32.Rays.49152",
"Email-Worm.Win32.Rays.d",
"Win32.Trojan.Wukill.B",
"Win32/Rays.worm.15024",
"Win32.Worm.Wukill.D",
"SScope.Trojan.VBRA.4977",
"I-Worm.Wukill.B",
"W32/Fawkes.A!worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"document",
"contains",
"an",
"encoded",
"Visual",
"Basic",
"Script",
"VBScript",
"typical",
"of",
"previous",
"Carbanak",
"malware."
] | [
16,
1,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Fynloski.H",
"Win32.Trojan",
"Trojan.MSIL.Crypt.cxp",
"Trojan.Inject.54745",
"TR/PSW.Fignotok.LW",
"Trojan-Dropper.Small!IK",
"Trojan/Jorik.ovo",
"TrojanDownloader:Win32/Batosecu.A",
"Trojan/Win32.Jorik",
"Trojan.Jorik.Fynloski.ft",
"Trojan-Dropper.Small",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Joke.Jepruss",
"Hoax.Win32.BadJoke!O",
"Joke.Russianjep",
"Joke.Jepruss",
"Joke.Jepruss",
"W32/Joke.NX",
"Joke.JepRuss",
"JOKE_ONLYGAME.A",
"Win.Joke.Jep-1",
"Joke.Jepruss",
"Hoax.Win32.BadJoke.JepRuss",
"Joke.Jepruss",
"Riskware.Win32.JepRuss.hybz",
"Joke.Win32.FakeScreen",
"Hoax.W32.BadJoke.JepRuss!c",
"Joke.Jepruss",
"Joke.Win32.Jep.Russ",
"Joke.Jepruss",
"Joke.Justgame",
"Tool.BadJoke.Win32.23",
"JOKE_ONLYGAME.A",
"W32/Joke.TMKA-5158",
"not-virus:Joke.Win32.JepRuss",
"HackTool[Hoax]/Win32.JepRuss",
"Win32.Joke.JepRuss.kcloud",
"Hoax.Win32.BadJoke.JepRuss",
"Win-Joke/Delete_Game.916512",
"Win32/Jep.Russ",
"Win32.Trojan-psw.Badjoke.Lmkt",
"Trojan.Jep!7Qg0TmyJLB0",
"Joke.Win32.RussianJep"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Seimon.G",
"Trojan.Seimon.G",
"Trojan.Seimon.G",
"Trojan.Seimon!4f7JwSpV94c",
"Trojan.Seimon.G",
"TrojWare.Win32.Trojan.Seimon.G0",
"Trojan.Seimon.G",
"Trojan.DownLoad.3195",
"BehavesLike.Win32.PWSGamania.lh",
"W32/PhishExe.B!tr.dldr",
"Trojan[:HEUR]/Win32.Unknown",
"Trojan.Seimon.G",
"Trojan/Win32.Casino",
"BScope.Trojan-Downloader.ILoveLanch.pj",
"Virus.Win32.Cloaker",
"Trojan.Seimon.G"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9563",
"W32/Application.THZK-5586",
"BehavesLike.Win32.BadFile.rc",
"Trojan.Win32.PSW",
"Trojan.Application.Zusy.D3D00C",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"WolfRAT",
"application",
"screen",
"The",
"Google",
"GMS",
"and",
"Firebase",
"service",
"has",
"been",
"added",
",",
"however",
",",
"no",
"configuration",
"has",
"been",
"found",
",",
"even",
"though",
"services",
"seem",
"to",
"be",
"referenced",
"in",
"the",
"of",
"a",
"new",
"class",
"."
] | [
3,
16,
16,
16,
5,
13,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"page",
"was",
"designed",
"to",
"steal",
"users",
"’",
"bank",
"card",
"details",
":",
"2017–2018",
"From",
"early",
"2017",
",",
"the",
"HTML",
"phishing",
"pages",
"bank.html",
",",
"update.html",
"and",
"extortionist.html",
"started",
"appearing",
"in",
"the",
"assets",
"folder",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
1,
16,
1,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.KillFiles!O",
"Trojan.Birele",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Risk.GBTW-1754",
"Ransom_Birele.R038C0DLB17",
"Trojan-Ransom.Win32.Birele.gss",
"Trojan.Win32.Dropper.rpje",
"Trojan.Win32.Scar.56320.B",
"Troj.Ransom.W32.Birele!c",
"Worm.Win32.Autorun.GVIT",
"Trojan.MulDrop1.6138",
"Trojan.Birele.Win32.7887",
"BehavesLike.Win32.Ransom.fc",
"Virus.Win32.VBInject",
"W32/MalwareS.BBSH",
"Trojan/Scar.pgv",
"Trojan/Win32.KillFiles",
"PWS:Win32/Kiction.A",
"Trojan.Zusy.DAEF",
"Trojan/Win32.Scar.R18936",
"Trojan-Ransom.Win32.Birele.gss",
"Worm.Spreader",
"Worm.AutoRun",
"Win32.Trojan.Birele.Pgda",
"W32/KillFiles.GMU!tr",
"Win32/Trojan.Ransom.f31"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Here",
"is",
"a",
"command",
"and",
"control",
"protocol",
"fragment",
":",
"Commands",
"from",
"C2",
"server",
"parsing",
"In",
"total",
",",
"the",
"malicious",
"APK",
"handles",
"16",
"different",
"commands",
":",
"Command",
"Endpoint",
"Description",
"1",
"reqsmscal.php",
"Send",
"specified",
"SMS",
"message",
"2",
"reqsmscal.php",
"Call",
"specified",
"number",
"3",
"reqsmscal.php",
"Exfiltrate",
"device",
"info",
",",
"such",
"as",
"phone",
"model",
"and",
"OS",
"version",
"4",
"reqsmscal.php",
"Exfiltrate",
"a",
"list",
"of",
"all",
"installed",
"applications",
"5",
"reqsmscal.php",
"Exfiltrate",
"default",
"browser",
"history",
"(",
"limited",
"to",
"a",
"given",
"date",
")",
"6",
"reqsmscal.php",
"Exfiltrate",
"Chrome",
"browser",
"history",
"(",
"limited",
"to",
"a",
"given",
"date",
")",
"7",
"reqsmscal.php",
"Exfiltrate",
"memory",
"card",
"file",
"structure",
"8",
"reqsmscal.php",
"Record",
"surrounding",
"sound",
"for",
"80",
"seconds",
"1",
"reqcalllog.php",
"Exfiltrate",
"all",
"call",
"logs",
"2",
"reqcalllog.php",
"Exfiltrate",
"all",
"SMS",
"messages",
"3",
"reqcalllog.php",
"Upload",
"specified",
"file",
"from",
"the",
"device",
"to",
"the",
"C2",
"4",
"reqcalllog.php",
"Download",
"file",
"from",
"specified",
"URL",
"and",
"save",
"on",
"device",
"5",
"reqcalllog.php",
"Delete",
"specified",
"file",
"6,7,8",
"reqcalllog.php",
"Commands",
"not",
"yet",
"implemented",
"9",
"reqcalllog.php",
"Take",
"photo",
"(",
"muted",
"audio",
")",
"with",
"rear",
"camera",
",",
"send",
"to",
"C2",
"10",
"reqcalllog.php",
"Take",
"photo",
"(",
"muted",
"audio",
")",
"with",
"front",
"camera",
",",
"send",
"to",
"C2",
"All",
"observed",
"samples",
"with",
"Smali",
"injections",
"were",
"signed",
"by",
"the",
"same",
"debug",
"certificate",
"(",
"0x936eacbe07f201df",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"will",
"also",
"report",
"the",
"version",
"of",
"Android",
"that",
"the",
"phone",
"is",
"running",
"and",
"any",
"additional",
"capabilities",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"the",
"beginning",
",",
"this",
"threat",
"group",
"mainly",
"targeted",
"Asian",
"countries",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"If",
"Google",
"Play",
"Protect",
"detects",
"one",
"of",
"these",
"apps",
",",
"Google",
"Play",
"Protect",
"will",
"show",
"a",
"warning",
"to",
"users",
"."
] | [
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Jacard",
"Win32.Trojan.WisdomEyes.16070401.9500.9987",
"W32/Trojan.YDYO-6019",
"Trojan-Banker.BestaFera",
"Trojan-Banker.Win32.BestaFera.amyc",
"Trojan.Win32.Banker.euxhdn",
"Trojan.Win32.Z.Jacard.2528768",
"BehavesLike.Win32.BadFile.vh",
"TR/Spy.Banker.vvhlz",
"Trojan[Banker]/Win32.BestaFera",
"TrojanDownloader:Win32/Qulkonwi.A",
"Trojan.Jacard.D8CA",
"Trojan-Banker.Win32.BestaFera.amyc",
"Trj/GdSda.A",
"Win32.Trojan-banker.Bestafera.Wmsm",
"W32/Banker.ADUT!tr.spy",
"Win32/Trojan.252"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Recently",
"the",
"Mobile",
"Malware",
"Research",
"Team",
"of",
"Intel",
"Security",
"found",
"on",
"Google",
"Play",
"a",
"new",
"campaign",
"of",
"Android/Clicker.G",
"in",
"dozens",
"of",
"published",
"malicious",
"apps."
] | [
16,
16,
4,
12,
12,
12,
12,
12,
12,
16,
16,
5,
13,
16,
16,
6,
16,
1,
16,
16,
16,
16,
5,
13
] |
[
"According",
"to",
"Google",
",",
"whom",
"we",
"have",
"contacted",
"to",
"alert",
"about",
"our",
"discoveries",
",",
"nearly",
"25",
"variants",
"of",
"this",
"spyware",
"were",
"uploaded",
"on",
"Google",
"Play",
"Store",
"."
] | [
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16
] |
[
"AlienVault",
"Labs",
"has",
"extracted",
"related",
"samples",
"and",
"located",
"the",
"infrastructure",
"used",
"by",
"attackers"
] | [
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Brackash.C",
"Trojan.Brackash.C",
"Win32.Trojan.WisdomEyes.16070401.9500.9774",
"Trojan.Win32.Sadenav.b",
"Trojan.Brackash.C",
"Trojan.Brackash.C",
"Brackash.dll",
"Virus.Trojan.Win32.Sadenav",
"Trojan/Sadenav.aic",
"W32.Trojan.Brackash.C",
"TR/Brackash.C100.2",
"Trojan/Win32.Sadenav",
"Trojan.Brackash.C",
"Trojan.Win32.Sadenav.b",
"Trojan/Win32.Sadenav.R1894",
"Brackash.dll",
"Trojan.Brackash.C"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"One",
"of",
"the",
"most",
"common",
"ways",
"to",
"do",
"this",
"is",
"by",
"displaying",
"advertisements",
"to",
"users",
"or",
"by",
"offering",
"in-app",
"purchases",
"IAPs."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"doing",
"so",
",",
"users",
"can",
"become",
"victims",
"to",
"malicious",
"apps",
"portraying",
"themselves",
"as",
"the",
"original",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"reality",
",",
"this",
"downloaded",
"app",
"is",
"a",
"fake",
"app",
"that",
"asks",
"for",
"credentials",
"and",
"Android",
"permissions",
"(",
"including",
"camera",
"and",
"phone",
"permissions",
")",
",",
"resulting",
"in",
"the",
"user",
"being",
"bombarded",
"with",
"advertisements",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"blog",
"post",
"outlines",
"the",
"details",
"about",
"the",
"campaign",
"that",
"we",
"discovered."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16
] |
[
"The",
"local",
"privileges",
"escalation",
"backdoor",
"code",
"for",
"debugging",
"ARM-powered",
"Android",
"devices",
"managed",
"to",
"make",
"its",
"way",
"in",
"shipped",
"firmware",
"after",
"firmware",
"makers",
"wrote",
"their",
"own",
"kernel",
"code",
"underneath",
"a",
"custom",
"Android",
"build",
"for",
"their",
"devices",
",",
"though",
"the",
"mainstream",
"kernel",
"source",
"is",
"unaffected",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"server",
"can",
"use",
"this",
"information",
"to",
"determine",
"if",
"the",
"user",
"’",
"s",
"carrier",
"is",
"one",
"of",
"Bread",
"’",
"s",
"targets",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16
] |
[
"A",
"new",
"CC",
"infrastructure",
"consisting",
"of",
"a",
"climbing",
"club",
"website."
] | [
16,
16,
5,
13,
16,
16,
1,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"O97M.Dropper.BR",
"W97M.Downloader",
"W2000M/Dldr.Rogue.aipbta",
"HEUR.VBA.Trojan.e",
"virus.office.qexvmc.1095"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.BackdoorSlingup.Trojan",
"Trojan/W32.Fsysna.77824.F",
"Heur.Win32.VBKrypt.3!O",
"Backdoor.Slingup.MF.150",
"Win32.Worm.VB.rt",
"W32/Trojan.XMLD-4299",
"W32.Difobot",
"BKDR_GORYNYCH.SM",
"Trojan.Win32.Fsysna.ccit",
"Trojan.Win32.Fsysna.dwujaf",
"Troj.W32.Fsysna.tnPd",
"Trojan.DownLoader14.15241",
"Trojan.Fsysna.Win32.7242",
"BKDR_GORYNYCH.SM",
"BehavesLike.Win32.Backdoor.lt",
"Worm.Win32.VB",
"W32/Trojan3.TRB",
"Trojan/Fsysna.dgo",
"Trojan/Win32.Fsysna",
"Trojan.Win32.Fsysna.ccit",
"Trojan/Win32.VBInject.R158763",
"Trojan.Fsysna",
"Trojan.Reconyc",
"Win32/VB.OOB",
"Win32.Trojan.Fsysna.Phgj"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor:MSIL/Hulpob.A"
] | [
16,
3,
16,
16,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Fsysna",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Trojan.HAEY-9385",
"Trojan.Bisonal",
"Trojan.Win32.Fsysna.ccap",
"Troj.W32.Fsysna!c",
"Trojan.DownLoad3.19183",
"BehavesLike.Win32.Dropper.vz",
"Trojan.Win32.Fsysna.ccap",
"Trojan:Win32/Korlia.C",
"Win-Trojan/Biscon.3140",
"Trj/CI.A",
"Win32.Trojan.Fsysna.Tayn",
"W32/Fsysna.CCAP!tr",
"Win32/Trojan.732"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"addition,",
"the",
"compromised",
"devices",
"were",
"pushed",
"Trojan",
"updates,",
"which",
"allowed",
"the",
"attackers",
"to",
"extend",
"their",
"capabilities."
] | [
16,
16,
16,
5,
13,
16,
16,
3,
11,
16,
16,
16,
6,
16,
16,
16,
16
] |
[
"In",
"February",
"2016",
"one",
"of",
"the",
"largest",
"cyber",
"heists",
"was",
"committed",
"and",
"subsequently",
"disclosed."
] | [
16,
0,
8,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16
] |
[
"Cyber",
"espionage",
"actors,",
"now",
"designated",
"by",
"FireEye",
"as",
"APT32",
"OceanLotus",
"Group,",
"are",
"carrying",
"out",
"intrusions",
"into",
"private",
"sector",
"companies",
"across",
"multiple",
"industries",
"and",
"have",
"also",
"targeted",
"foreign",
"governments,",
"dissidents,",
"and",
"journalists."
] | [
6,
14,
14,
16,
16,
16,
4,
16,
6,
14,
14,
16,
16,
16,
1,
16,
4,
12,
12,
16,
16,
4,
16,
16,
16,
16,
4,
12,
12,
16,
4
] |
[
"The",
"infected",
"apps",
"in",
"this",
"campaign",
"were",
"downloaded",
"several",
"million",
"times",
"by",
"unsuspecting",
"users."
] | [
16,
5,
13,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Charger",
"was",
"found",
"embedded",
"in",
"an",
"app",
"called",
"EnergyRescue",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Bot.MSIL",
"Trojan.Win32.StartPage.czmqzt",
"Trojan.DownLoader12.20620",
"BehavesLike.Win32.Backdoor.ch",
"TR/Dropper.MSIL.47116",
"MSIL/StartPage.AI!tr",
"Trj/CI.A",
"Msil.Trojan.Dropper.Hqll",
"Trojan.MSIL.StartPage",
"MSIL3.BCNZ",
"Trojan.MSIL.StartPage.AI"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Primarily",
"targets",
"users",
"in",
"Brazil",
"with",
"fake",
"attatchments,",
"for",
"example:",
"Auto_De_Infracao_e_Sua_Notificacao_493275324.exe"
] | [
16,
16,
16,
16,
2,
16,
1,
9,
16,
16,
1
] |
[
"The",
"connection",
"between",
"the",
"two",
"campaigns",
"remains",
"unclear",
",",
"and",
"it",
"is",
"possible",
"that",
"one",
"borrowed",
"code",
"from",
"the",
"other",
",",
"knowingly",
"or",
"unknowingly",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"is",
"named",
"Red",
"Leaves",
"after",
"strings",
"found",
"in",
"the",
"malware."
] | [
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
3
] |
[
"Reflection",
"Most",
"methods",
"for",
"hiding",
"API",
"usage",
"tend",
"to",
"use",
"Java",
"reflection",
"in",
"some",
"way",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"first",
"discovery",
"was",
"after",
"a",
"highly",
"Libyan",
"influential",
"Telegram",
"account",
"compromised",
"via",
"web"
] | [
16,
3,
16,
16,
16,
16,
16,
4,
12,
12,
1,
9,
9,
16,
7
] |
[
"Recently,",
"we",
"saw",
"an",
"app",
"that",
"leads",
"to",
"a",
"third-party",
"app",
"store",
"being",
"offered",
"on",
"the",
"official",
"iOS",
"App",
"Store."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
5,
13,
13,
13
] |
[
"This",
"paper",
"presents",
"ESET's",
"findings",
"about",
"Operation",
"Groundbait",
"based",
"on",
"our",
"research",
"into",
"the",
"Prikormka",
"malware",
"family."
] | [
16,
16,
16,
4,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
3,
11,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Win32.AutoRun!O",
"Worm.AutoRun.13924",
"W32.W.Fearso.kYUv",
"HT_STARTPAGE_FB090419.UVPM",
"Win32.Trojan.Delf.it",
"HT_STARTPAGE_FB090419.UVPM",
"Win.Trojan.Delf-1006",
"Trojan.Win32.Fsysna.digg",
"TrojWare.Win32.Magania.~AD",
"Worm.Delf.Win32.1099",
"Trojan[GameThief]/Win32.Nilage",
"Trojan.Jacard.D150AA",
"Trojan.Win32.Fsysna.digg",
"HackTool.Win32.InjectDll.a",
"Trojan.Crypt"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"the",
"course",
"of",
"our",
"research",
"we",
"uncovered",
"the",
"activity",
"of",
"a",
"hacking",
"group",
"which",
"has",
"Chinese",
"origins."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
2,
10
] |
[
"This",
"means",
"that",
"all",
"apps",
"that",
"were",
"using",
"this",
"file",
"will",
"lose",
"some",
"functionality",
"or",
"even",
"start",
"crashing",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32/Darby.N",
"Win32.Worm.P2p.Darby.N",
"Worm/W32.Darby.140470",
"W32.W.Darby.n!c",
"Win32.Worm.P2p.Darby.N",
"Worm.P2P.Darby!NxHEqfnePM8",
"W32/Darby.M",
"W32.HLLW.Darby",
"Win32/Darby.N",
"P2P-Worm.Win32.Darby.n",
"Trojan.Win32.Darby.epif",
"Worm.Win32.Darby.140470.B[h]",
"Win32.Worm.P2p.Darby.N",
"Worm.Win32.Darby.N",
"Win32.Worm.P2p.Darby.N",
"BehavesLike.Win32.MultiDropper.cc",
"W32/Darby.KOEV-0225",
"Worm/Darby.f",
"WORM/Darby.N",
"W32/Darby.N!tr",
"Worm[P2P]/Win32.Darby",
"Win32.Worm.P2p.Darby.N",
"Win32/Darby.worm.140470",
"Worm:Win32/Darby.N",
"Virus.Win32.Heur.p",
"Win32.Worm-p2p.Darby.Pdwh",
"P2P-Worm.Win32.Darby",
"Win32.Worm.P2p.Darby.N",
"Worm/Darby.P"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Yesterday,",
"Microsoft",
"patched",
"CVE-2015-2424,",
"a",
"vulnerability",
"in",
"Microsoft",
"Office",
"discovered",
"by",
"iSIGHT",
"Partners",
"while",
"monitoring",
"the",
"Russian",
"cyber",
"espionage",
"team",
"we",
"call",
"Tsar",
"Team."
] | [
16,
4,
16,
1,
16,
7,
16,
5,
13,
16,
16,
4,
12,
16,
16,
16,
6,
14,
14,
14,
16,
16,
6,
14
] |
[
"All",
"the",
"IP",
"addresses",
"belong",
"to",
"the",
"same",
"company",
"Hetzner",
",",
"an",
"IP-hosting",
"firm",
"in",
"Germany",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsIemusi.2209",
"W32/Trojan.GCQE-8180",
"DDOS_HPNITOL.SM",
"Trojan.Boht",
"Trojan.Win32.DownLoad.bfqxfq",
"Troj.W32.Vilsel.lmbl",
"Trojan.DownLoad3.40817",
"BehavesLike.Win32.HLLPPhilis.lc",
"Backdoor:Win32/Bezigate.B",
"Trj/CI.A",
"Win32/Delf.AJG",
"Backdoor.Win32.PcClient",
"W32/Inject.VXTT!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Distribution",
"via",
"botnets",
"."
] | [
16,
16,
16,
16
] |
[
"The",
"embedded",
"app",
"appears",
"to",
"be",
"a",
"media",
"player",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"real",
"C",
"&",
"C",
"address",
"is",
"encoded",
"in",
"the",
"Twitter",
"names",
",",
"and",
"can",
"only",
"be",
"revealed",
"once",
"decoded",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Oftentimes",
",",
"the",
"emailed",
"link",
"is",
"a",
"bit.ly",
"shortened",
"link",
",",
"used",
"to",
"potentially",
"evade",
"detection",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"com",
"hxxp",
":",
"//mailsa-wqw",
"[",
"."
] | [
9,
9,
1,
9,
9,
9,
9
] |
[
"It",
"eventually",
"kills",
"all",
"threads",
"that",
"belong",
"to",
"these",
"undesired",
"modules",
"(",
"using",
"ZwQueryInformationThread",
"native",
"API",
"with",
"ThreadQuerySetWin32StartAddress",
"information",
"class",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"During",
"an",
"incident",
"response",
"engagement",
"in",
"September",
"2016,",
"SecureWorks®",
"incident",
"response",
"analysts",
"observed",
"payment",
"card",
"data",
"being",
"collected",
"by",
"a",
"generic",
"remote",
"access",
"trojan",
"RAT",
"rather",
"than",
"typical",
"memory-scraping",
"malware."
] | [
16,
16,
16,
16,
16,
16,
0,
8,
4,
12,
12,
12,
16,
1,
9,
9,
9,
9,
16,
16,
3,
11,
11,
11,
11,
16,
16,
3,
11,
11
] |
[
"The",
"said",
"attackers,",
"who",
"showed",
"familiarity",
"and",
"in-depth",
"knowledge",
"of",
"their",
"agencies'",
"network",
"topology,",
"tools,",
"and",
"software,",
"were",
"able",
"to",
"gain",
"access",
"to",
"their",
"targeted",
"servers",
"and",
"install",
"malware."
] | [
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
13,
13,
13,
16,
16,
16,
1,
9,
16,
16,
5,
13,
16,
16,
3
] |
CyNER 2.0 Augmented Dataset
CyNER 2.0 Augmented Dataset is a comprehensive dataset designed for Named Entity Recognition (NER) tasks, specifically tailored for cybersecurity-related text. This dataset combines an original cybersecurity NER dataset (bnsapa/cybersecurity-ner) with additional augmented data (taken from OPENCTI using AlienValut Connect), resulting in a robust resource for training and evaluating models on cybersecurity entity recognition.
Dataset Overview
The dataset is divided into three splits:
- Train: 7,751 examples
- Validation: 1,661 examples
- Test: 1,662 examples
Each example in the dataset consists of a sequence of tokens and their corresponding NER tags. The dataset has been carefully preprocessed to ensure high quality and consistency. The dataset mostly contains threat and intelligence report descriptions from the Alien Vault
Features
tokens: A sequence of strings representing the tokens in the text.
ner_tags: A sequence of strings representing each token's Named Entity Recognition tags.
NER Tags
The NER tags follow the BIO (Begin, Inside, Outside) tagging format and cover various cybersecurity-related entities, including but not limited to:
- B-Indicator: Indicators of Compromise (IOCs) such as IP addresses, file hashes, and domain names.
- I-Indicator: Continuation of an Indicator entity.
- B-Malware: Names of malware, trojans, or viruses.
- I-Malware: Continuation of a Malware entity.
- B-Organization: Names of organisations, companies, or groups.
- I-Organization: Continuation of an Organization entity.
- B-System: Operating systems, software, and platforms.
- I-System: Continuation of a System entity.
- B-Vulnerability: Known vulnerabilities or CVEs (Common Vulnerabilities and Exposures).
- I-Vulnerability: Continuation of a Vulnerability entity.
- B-ThreatActor: Threat actor names or groups (e.g., Threat_group).
- I-ThreatActor: Continuation of a ThreatActor entity.
- B-Date: Specific dates related to incidents or reports.
- I-Date: Continuation of a Date entity.
- O: Outside of any named entity.
Usage
This dataset is suitable for training, fine-tuning, and evaluating NER models, particularly those designed for cybersecurity applications. It has been structured to work seamlessly with popular NLP frameworks such as Hugging Face's transformers and dataset libraries.
License
This dataset is released under the MIT License, which allows for open and flexible usage with minimal restrictions. Users are free to use, modify, and distribute the dataset, provided that proper attribution is given to the original creators.
Citation
If you use this dataset in your research, please cite it as follows:
@dataset{pranava_kailash_2024_cyner,
title={CyNER 2.0 Augmented Dataset},
author={Pranava Kailash},
year={2024},
howpublished={Hugging Face, https://huggingface.co/datasets/PranavaKailash/CyNER2.0_augmented_dataset},
license={MIT}
}
Contact
For questions or issues regarding the dataset, please get in touch with pranavakailashsp@gmail.com.
- Downloads last month
- 34