tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"Flooder.MailSpam.AnonMail.A",
"Email-Flooder.Win32.AnonMail!O",
"Win32.Trojan.Anonmail.Agkt",
"Flooder.MailSpam.AnonMail.A",
"W32/Backdoor.SPH",
"Hacktool.Flooder",
"Win.Tool.MailSpam-3",
"Email-Flooder.Win32.AnonMail.a",
"Flooder.MailSpam.AnonMail.A",
"Trojan.Win32.AnonMail.dbio",
"TrojWare.Win32.Spammer.AnonMail",
"Trojan.AnMail",
"Tool.AnonMail.Win32.14",
"Email-Flooder.Win32.AnonMail.A",
"W32/Backdoor.CDAV-2869",
"Spammer.Mail.AnonMail",
"TR/Nuker.AnonMail",
"HackTool[Flooder]/Win32.AnonMail",
"Email-Flooder.Win32.AnonMail.a",
"Flooder.MailSpam.AnonMail.A",
"Spammer.AnonMail",
"Flooder.MailSpam.AnonMail.A",
"Flooder.MailSpam.AnonMail.A",
"Trj/CI.A",
"Win32/Spammer.AnonMail"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"the",
"type",
"of",
"operation",
"they",
"are",
"carrying",
"out."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"REQUEST_COMPANION_RUN_IN_BACKGROUND",
"-",
"let",
"the",
"app",
"run",
"in",
"the",
"background",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Mlw.eweujb",
"Win32.Trojan.Inject.Auto",
"BehavesLike.Win32.Trojan.hh",
"TR/Dropper.MSIL.fkvxc",
"Spyware.InfoStealer",
"Trojan.MSIL.Inject",
"MSIL/Injector.SZD!tr",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"this",
"research",
",",
"we",
"review",
"common",
"features",
"of",
"the",
"malware",
"and",
"examine",
"the",
"improvements",
"the",
"threat",
"actor",
"made",
"in",
"each",
"version",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Little",
"has",
"been",
"published",
"on",
"the",
"threat",
"actors",
"responsible",
"for",
"Operation",
"Ke3chang",
"since",
"the",
"report",
"was",
"released",
"more",
"than",
"two",
"years",
"ago."
] | [
16,
16,
16,
16,
16,
16,
6,
14,
16,
11,
6,
16,
16,
16,
16,
16,
16,
0,
8,
8,
8,
8
] |
[
"Exodus",
"One",
"checks-in",
"by",
"sending",
"a",
"POST",
"request",
"containing",
"the",
"app",
"package",
"name",
",",
"the",
"device",
"IMEI",
"and",
"an",
"encrypted",
"body",
"containing",
"additional",
"device",
"information",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"PUP.Optional.VideiPlayer",
"Trojan.ExtenBro!",
"TROJ_SPNR.06HH14",
"Trojan-Downloader.MSIL.ExtInstall.o",
"Trojan.Win32.Kivat.dfxucy",
"TROJ_SPNR.06HH14",
"BehavesLike.Win32.Trojan.nt",
"W32/Trojan.JMSU-4938",
"Variant.Kazy.doi",
"W32/ExtenBro.E!tr",
"Trojan.Kazy.D683A9",
"Uds.Dangerousobject.Multi!c",
"TrojanDownloader:MSIL/Kivat.B",
"Trojan.ExtenBro!",
"Trj/Chgt.B",
"Win32/Trojan.Multi.daf"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Hashes",
"of",
"samples",
"Type",
"Package",
"name",
"SHA256",
"digest",
"Custom",
"ads",
"com.targetshoot.zombieapocalypse.sniper.zombieshootinggame",
"5d98d8a7a012a858f0fa4cf8d2ed3d5a82937b1a98ea2703d440307c63c6c928",
"Click",
"fraud",
"com.counterterrorist.cs.elite.combat.shootinggame",
"84672fb2f228ec749d3c3c1cb168a1c31f544970fd29136bea2a5b2cefac6d04",
"Rooting",
"trojan",
"com.android.world.news",
"bd233c1f5c477b0cc15d7f84392dab3a7a598243efa3154304327ff4580ae213",
"Zen",
"trojan",
"com.lmt.register",
"eb12cd65589cbc6f9d3563576c304273cb6a78072b0c20a155a0951370476d8d",
"Mobile",
"Campaign",
"β",
"Bouncing",
"Golf",
"β",
"Affects",
"Middle",
"East",
"We",
"uncovered",
"a",
"cyberespionage",
"campaign",
"targeting",
"Middle",
"Eastern",
"countries",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
1,
16,
16,
1,
1,
16,
16,
16,
1,
3,
16,
1,
1,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Therefore",
",",
"by",
"simulating",
"fraudulent",
"clicks",
",",
"these",
"developers",
"are",
"making",
"money",
"without",
"requiring",
"a",
"user",
"to",
"click",
"on",
"an",
"advertisement",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"If",
"it",
"is",
"the",
"first",
"execution",
",",
"and",
"if",
"the",
"app",
"β",
"s",
"path",
"does",
"not",
"contain",
"β",
"/system/app",
"β",
"(",
"i.e",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.Kolweb.a.2.Pack",
"Trojan/Delf.cf",
"W32/Trojan.ORX",
"Trojan.Kolweb.A",
"W32/Startpage.AHU",
"Win32/Startpage.LM",
"TROJ_DOWNLOAD.E",
"Trojan.Win32.Kolweb.a",
"Trojan.Win32.Kolweb.A!IK",
"TrojWare.Win32.Kolweb.A",
"Trojan.DownLoader.1317",
"TROJ_DOWNLOAD.E",
"Trojan/PSW.Almat.coi",
"Adware:Win32/Adtomi.B",
"Win-Spyware/Xema.171008",
"W32/Trojan.ORX",
"Trojan.Win32.Kolweb.a",
"Win32/Kolweb.A",
"Trojan.Win32.Kolweb.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Crypt.ES",
"Trojan.Crypt.ES",
"Win32.Trojan.WisdomEyes.16070401.9500.9996",
"Trojan.Crypt.ES",
"Trojan.Win32.Crypt.ewgrry",
"Trojan.Crypt.ES",
"Trojan.Crypt.ES",
"BehavesLike.Win32.BadFile.lm",
"Backdoor:Win32/Huceqoo.A",
"Trojan.Win32.Z.Crypt.73728.BQ",
"Trojan/Win32.Scar.C8074",
"Trojan.Crypt.ES",
"BScope.Trojan.Dropper.we",
"Trj/GdSda.A",
"Trojan.Crypt.ES",
"Win32/Trojan.b63"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"msconf.exe",
"is",
"the",
"main",
"module",
"that",
"provides",
"control",
"of",
"the",
"implant",
"and",
"reverse",
"shell",
"feature",
"."
] | [
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"However,",
"this",
"also",
"leaves",
"the",
"C",
"C",
"traffic",
"open",
"for",
"monitoring",
"by",
"others,",
"including",
"security",
"researchers."
] | [
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Pws.Watcher.A",
"Trojan-PSW.Win32.Watcher!O",
"Trojan.Pws.Watcher.A",
"Trojan.Pws.Watcher.A",
"Trojan.Pws.Watcher.A",
"Trojan.Win32.Watcher.ejkr",
"Trojan.Win32.A.PSW-Watcher.492035",
"Troj.PSW32.W.Watcher.a!c",
"Trojan.Pws.Watcher.A",
"Trojan.Pws.Watcher.A",
"Trojan.PWS.Watcher",
"Trojan.Watcher.Win32.8",
"Trojan-PWS.Win32.Watcher.i",
"Trojan/PSW.Watcher.a",
"TR/PSW.Watcher.B",
"PWS:Win32/Watcher.A",
"Trojan.Pws.Watcher.A",
"TrojanPSW.Watcher",
"Win32/PSW.Watcher.A",
"Win32.Trojan-qqpass.Qqrob.Wqwh",
"W32/PSWAtcher.A!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"However",
",",
"the",
"app",
"does",
"create",
"a",
"WebView",
"and",
"registers",
"a",
"JavaScript",
"interface",
"to",
"this",
"class",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"this",
"way",
",",
"the",
"malware",
"authors",
"can",
"submit",
"their",
"app",
"and",
"add",
"the",
"malicious",
"capabilities",
"only",
"after",
"their",
"app",
"is",
"live",
"on",
"the",
"Play",
"Store",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"Enlarge",
"/",
"Top",
"20",
"countries",
"targeted",
"by",
"Hummingbad/Shedun",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.PSW.Barok.10",
"Trojan/W32.Barok.1056825",
"Trojan.Win32.Barok.bcusy",
"W32/Pws.ZDD",
"WS.Reputation.1",
"Barok.1_0",
"TROJ_BAROK.10",
"Trojan.Spy-11230",
"Trojan-PSW.Win32.Barok.10",
"Trojan.PSW.Barok.10",
"Trojan.PWS.Barok!QhmYol9M94M",
"TrojWare.Win32.PSW.Barok.10",
"Trojan.PSW.Barok.10",
"TR/Barok.PSW.10",
"TROJ_BAROK.10",
"Trojan/PSW.Barok.10",
"Win32.Troj.Barok.kcloud",
"PWS:Win32/Barok.1_0",
"Trojan.Win32.Barok_10.Setup",
"Trojan.PSW.Barok.10",
"W32/Pws.ZDD",
"Win-Trojan/Barok.Client.v10",
"PSW.Barok.A",
"Hack.PSWbarok.10",
"Trojan-PWS.Win32.Barok.10",
"W32/Barok.10!tr.pws",
"Trj/PSW.Barok.10"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"ponethus",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"But",
",",
"behind",
"the",
"scenes",
",",
"the",
"malware",
"has",
"not",
"been",
"removed",
";",
"instead",
"it",
"starts",
"preparing",
"its",
"onslaught",
"of",
"attacks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"XLoader",
"can",
"also",
"hijack",
"the",
"infected",
"device",
"(",
"i.e.",
",",
"send",
"SMSs",
")",
"and",
"sports",
"self-protection/persistence",
"mechanisms",
"through",
"device",
"administrator",
"privileges",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"While",
"the",
"idea",
"of",
"malware",
"as",
"a",
"service",
"isn't",
"a",
"new",
"one,",
"with",
"players",
"such",
"as",
"Tox",
"and",
"Shark",
"in",
"the",
"game,",
"but",
"it",
"can",
"be",
"said",
"that",
"MacSpy",
"is",
"one",
"of",
"the",
"first",
"seen",
"for",
"the",
"OS",
"X",
"platform."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
3,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13
] |
[
"At",
"least",
"in",
"most",
"recent",
"versions",
",",
"as",
"of",
"January",
"2019",
",",
"the",
"Zip",
"archive",
"would",
"actually",
"contain",
"the",
"i686",
",",
"arm",
"and",
"arm64",
"versions",
"of",
"all",
"deployed",
"binaries",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"PUP.Optional.OpenCandy",
"WS.Reputation.1",
"Trojan.DownLoader9.52502",
"TR/Dropper.A.23950",
"Win32.Troj.Undef.kcloud",
"PE:PUF.OpenCandy!1.9DE5",
"Win32/Trojan.ca7"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.Kykymber.P.Trojan",
"Trojan.PWS.Onlinegames.KEGA",
"Trojan-PWS.Win32.Kykymber.1!O",
"PWS-OnlineGames.ke",
"Trojan/PSW.Kykymber.kyz",
"Win32.Trojan-PSW.OLGames.ay",
"Infostealer.Gampass",
"Win32/Gamepass.OQU",
"Win.Spyware.79683-2",
"Trojan-PSW.Win32.Kykymber.kyz",
"Trojan.PWS.Onlinegames.KEGA",
"Trojan.Win32.OnLineGames.bkxdd",
"Troj.PSW32.W.Kykymber.kyz!c",
"Trojan.PSW.Win32.MiBao.a",
"TrojWare.Win32.PSW.GamePass.A",
"Trojan.PWS.Onlinegames.KEGA",
"BehavesLike.Win32.PWSOnlineGames.pm",
"TR/PSW.Kykymber.CD",
"Trojan.Win32.A.PSW-Kykymber.43452[UPX]",
"Trojan-PSW.Win32.Kykymber.kyz",
"Trojan.PWS.Onlinegames.KEGA",
"Trojan.PWS.Onlinegames.KEGA",
"Win32/PSW.OnLineGames.QLR",
"Trojan.PWS.Kykymber!KKmGLDbdY4I",
"W32/OnLineGames.KY!tr.pws",
"Trj/Kykymber.A",
"Trojan.PSW.Win32.GameOnline.CP"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Recently,",
"in",
"our",
"never-ending",
"quest",
"to",
"protect",
"the",
"world",
"from",
"malware,",
"we",
"found",
"a",
"misbehaving",
"Android",
"trojan."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor:Win32/Binanen.A"
] | [
16,
3,
16,
16,
16,
1
] |
[
"The",
"stolen",
"parameters",
"follow",
":",
"ID",
"IMSI",
"IMEI",
"Phone",
"number",
"Operator",
"AID",
"Model",
"Brand",
"Version",
"Build",
"Battery",
"percentage",
"Wi-Fi",
"connection",
"state",
"Wake",
"time",
"Are",
"logs",
"enabled",
"?",
"Is",
"the",
"malware",
"already",
"set",
"as",
"the",
"default",
"SMS",
"application",
"?",
"[",
"True/False",
"]",
"Signal",
"strength",
"Screen",
"active",
"[",
"True/False",
"]",
"Orientation",
"Was",
"accessibility",
"permission",
"granted",
"?",
"[",
"True/False",
"]",
"Screen",
"size",
"List",
"of",
"the",
"installed",
"applications",
"SMS",
"messages",
"saved",
"on",
"the",
"device",
"It",
"is",
"not",
"uncommon",
"for",
"banking",
"malware",
"to",
"harvest",
"extensive",
"amounts",
"of",
"data",
"from",
"the",
"victim",
"β",
"s",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Then",
"the",
"Trojan",
"will",
"put",
"the",
"patched",
"library",
"back",
"into",
"the",
"system",
"directory",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clod912.Trojan.1f28",
"Win32.Trojan.WisdomEyes.16070401.9500.9823",
"Trojan.Munidub",
"TROJ64_ASRUEX.A",
"Trojan.Win64.MLW.eelpql",
"TROJ64_ASRUEX.A",
"BehavesLike.Win64.CrossRider.tm",
"W64/Trojan.MCVO-8253",
"Trojan/Win32.Zapchast",
"Trojan:Win64/Asruex.A!dha",
"Trojan.Zapchast.pk",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"POS",
"malware",
"refers",
"to",
"malicious",
"software",
"that",
"extracts",
"payment",
"card",
"information",
"from",
"memory",
"and",
"usually",
"uploads",
"that",
"data",
"to",
"a",
"command",
"and",
"control",
"CnC",
"server."
] | [
3,
11,
16,
16,
3,
11,
16,
16,
1,
9,
9,
16,
7,
16,
16,
1,
15,
1,
16,
16,
1,
9,
9,
9,
9
] |
[
"However",
",",
"when",
"used",
"maliciously",
",",
"accessibility",
"features",
"can",
"be",
"used",
"to",
"exploit",
"legitimate",
"services",
"for",
"malicious",
"purposes",
",",
"like",
"with",
"EventBot",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Graftor.DD2BF",
"Trojan.DownLoader.18943",
"BehavesLike.Win32.Msposer.nm",
"Trj/Lozyt.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Ransom.ANU",
"Trojan.Enrume",
"Ransom_Enrume.R00EC0DKG17",
"Trojan.Ransom.ANU",
"Trojan.Ransom.ANU",
"Trojan.Win32.Z.Ransom.6967658",
"Troj.Ransom.Anu!c",
"Trojan.Ransom.ANU",
"Trojan.Ransom.ANU",
"Ransom_Enrume.R00EC0DKG17",
"BehavesLike.Win32.PUPXBC.vc",
"TR/FileCoder.jtxjg",
"Trojan.Ransom.ANU",
"Trojan.Ransom.ANU",
"Trj/CI.A",
"Win32/Trojan.Ransom.2a7"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.SapinH.Trojan",
"Trojan-Dropper.Win32.Injector!O",
"Trojan.Mauvaise.SL1",
"Trojan.Chad",
"Trojan.Packed.Win32.29983",
"Trojan.Application.Symmi.D73F9",
"Win32/Gamepass.HKIaME",
"Trojan-Dropper.Win32.Injector.palw",
"Trojan.Win32.KillProc.brmetk",
"Troj.Dropper.W32.Injector.toQt",
"Adware.Win32.Dropper.aaa",
"Application.Win32.Kuaiba.BC",
"Trojan.KillProc.22109",
"BehavesLike.Win32.VirRansom.fh",
"TrojanDropper.Injector.ayai",
"Trojan:Win32/Scoreem.A",
"Trojan-Dropper.Win32.Injector.palw",
"Dropper/Win32.Injector.R68328",
"TrojanDropper.Injector",
"Trojan.DR.Injector!UEnRNWldneo",
"Trojan.Win32.Senta",
"W32/Injector.RREW!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.SumanyaQZA.Worm",
"Worm.AutoRun",
"W32/Autorun.worm.j",
"Worm.AutoRun.Win32.2713",
"TROJ_FAM_0001c56.TOMA",
"Win32.Worm.AutoRun.d",
"W32.SillyDC",
"Win32/SillyFDC.CD",
"TROJ_FAM_0001c56.TOMA",
"Worm.Win32.AutoRun.beh",
"Trojan.Win32.AutoRun.uvsfh",
"Worm.Win32.Autorun.204800",
"Trojan.Copier.8",
"BehavesLike.Win32.VBObfus.dm",
"Worm.Win32.VB",
"Worm/AutoRun.ahnn",
"Worm:Win32/Manyasu.A",
"Worm/Win32.AutoRun",
"Worm:Win32/Manyasu.A",
"Trojan.Heur.E08BA4",
"Worm.Win32.AutoRun.beh",
"Worm/Win32.AutoRun.R18800",
"Trojan.VBO.012000",
"Trj/Manyasu.A",
"Win32/AutoRun.VB.IY",
"Trojan.Win32.VB.mct",
"Worm.AutoRun!WxdQD2QNztM"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"ongoing",
"attacks",
"attempt",
"to",
"circumvent",
"the",
"extra",
"protections",
"conferred",
"by",
"two-factor",
"authentication",
"in",
"Gmail,",
"and",
"rely",
"heavily",
"on",
"phone-call",
"based",
"phishing",
"and",
"real",
"time",
"login",
"attempts",
"by",
"the",
"attackers."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
1,
9,
9,
9,
16,
16,
16,
16,
1,
9,
9,
16,
1,
9,
9,
9,
16,
16,
6
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win32.Stub!O",
"Backdoor/Stub.j",
"Win32.Worm.Delf.a",
"Backdoor.Trojan",
"Win32/Bosbot.D",
"BKDR_STUB.G",
"Backdoor.Win32.Stub.j",
"Trojan.Win32.Stub.bbeaok",
"Backdoor.Win32.A.Stub.114843[UPX]",
"BackDoor.Stfu",
"Backdoor.Stub.Win32.24",
"BKDR_STUB.G",
"BehavesLike.Win32.Backdoor.cm",
"Virus.Win32.Imponex",
"Backdoor/Stub.n",
"W32/Sality.Patched",
"Trojan/Win32.Unknown",
"Backdoor:Win32/Stub.P",
"W32.W.Bagle.kZt7",
"Backdoor.Win32.Stub.j",
"Win32.Worm.Imponex.A",
"Trojan/Win32.Stub.C408823",
"BScope.Malware-Cryptor.Hlux",
"W32/DelpDldr.A!tr.bdr",
"W32/Knase.C"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Java.Adwind.dkmdei",
"Java.Adwind.2",
"Trojan.Java.Adwind",
"Trojan.Java.o",
"JAVA/RemoteAd.dld",
"Trojan:Java/Adwind.G",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"plugins",
"are",
"stored",
"in",
"its",
"resource",
"section",
"and",
"can",
"be",
"protected",
"by",
"the",
"same",
"VM",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"functionality",
"can",
"be",
"seen",
"in",
"Figure",
"6",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Patched.FR",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Backdoor.Sheedash",
"Win32/Sfcpatched.A",
"TROJ_PATCH.SMLD",
"Win.Trojan.Sfcpatch-10",
"Trojan.Win32.Patched.fr",
"Trojan.Win32.Patched.cwsyqv",
"W32.W.AutoRun.kYRk",
"Trojan.WinSpy.921",
"Trojan.Patched.Win32.27797",
"TROJ_PATCH.SMLD",
"Trojan.Win32.Patched",
"Trojan/Win32.Patched",
"Trojan.Patched.1",
"Trojan.Win32.Patched.fr",
"Trojan:Win32/Parchood.A",
"Trojan/Win32.Patched.R3621",
"BScope.Trojan.Crex",
"Trojan.Win32.Patched.f",
"Trojan.Patched!j5lr5VQfEwA",
"Win32/Trojan.2c9"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"group",
"has",
"been",
"operating",
"since",
"2012",
"and",
"became",
"particularly",
"active",
"in",
"Q2",
"2015."
] | [
6,
14,
16,
16,
16,
16,
0,
16,
16,
16,
16,
16,
0,
8
] |
[
"SpyNote",
"is",
"similar",
"to",
"OmniRat",
"and",
"DroidJack,",
"which",
"are",
"RATs",
"remote",
"administration",
"tools",
"that",
"allow",
"malware",
"owners",
"to",
"gain",
"remote",
"administrative",
"control",
"of",
"an",
"Android",
"device."
] | [
3,
16,
16,
16,
3,
16,
3,
16,
16,
3,
11,
11,
11,
16,
16,
6,
14,
16,
1,
9,
9,
9,
16,
16,
5,
13
] |
[
"As",
"predicted",
"following",
"the",
"leak",
"of",
"Hacking",
"Team",
"exploit",
"codes",
"covered",
"here,",
"the",
"Zscaler",
"security",
"research",
"team",
"has",
"recently",
"started",
"seeing",
"a",
"Chinese",
"cyber",
"espionage",
"group",
"weaponizing",
"malware",
"payloads",
"using",
"the",
"0-day",
"exploits",
"found",
"in",
"the",
"leaked",
"Hacking",
"Team",
"archives."
] | [
16,
16,
16,
16,
16,
16,
4,
12,
3,
11,
16,
16,
16,
4,
12,
12,
12,
16,
16,
16,
16,
16,
6,
14,
14,
14,
16,
3,
11,
16,
16,
3,
11,
16,
16,
16,
16,
4,
12,
16
] |
[
"The",
"World",
"Anti-Doping",
"Agency",
"WADA",
"has",
"alerted",
"their",
"stakeholders",
"that",
"email",
"phishing",
"scams",
"are",
"being",
"reported",
"in",
"connection",
"with",
"WADA",
"and",
"therefore",
"asks",
"its",
"recipients",
"to",
"be",
"careful."
] | [
4,
12,
12,
12,
12,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
4,
16,
16,
16
] |
[
"Attackers",
"create",
"accounts",
"on",
"those",
"services",
"and",
"post",
"encoded",
"IP",
"addresses",
"or",
"the",
"domain",
"names",
"of",
"real",
"C2",
"servers",
"in",
"advance",
"of",
"distributing",
"the",
"backdoor."
] | [
6,
1,
9,
9,
9,
9,
16,
12,
16,
1,
9,
16,
1,
9,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16,
3
] |
[
"The",
"injection",
"method",
"used",
"for",
"winlogon.exe",
"is",
"also",
"interesting",
"and",
"quite",
"unusual",
"."
] | [
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16
] |
[
"Succeeding",
"monitoring",
"efforts",
"revealed",
"a",
"newer",
"variant",
"that",
"exploits",
"the",
"social",
"media",
"platforms",
"Instagram",
"and",
"Tumblr",
"instead",
"of",
"Twitter",
"to",
"hide",
"its",
"C",
"&",
"C",
"address",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
4,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"P2P-Worm.Win32.Delf!O",
"Worm.Delf.9767",
"W32/Delf.ao",
"WORM_YOOHOO.D",
"Win32.Worm.Delf.a",
"W32/SillyP2P.BR",
"W32.HLLW.Yoohoo",
"WORM_YOOHOO.D",
"Win.Trojan.Delf-1033",
"P2P-Worm.Win32.Delf.ao",
"Trojan.Win32.Delf.bojqna",
"Win32.Worm-p2p.Delf.Lnfa",
"Win32.HLLW.Woofka",
"Worm.Delf.Win32.191",
"BehavesLike.Win32.Backdoor.ch",
"Worm/Delf.ot",
"Worm[P2P]/Win32.Delf",
"Worm.Win32.A.P2P-Delf.70675[UPX]",
"P2P-Worm.Win32.Delf.ao",
"Win32/P2PDelf.worm.45056",
"Worm.Delf",
"Win32/Delf.AO",
"Worm.P2P.Delf.AAF!AU",
"P2P-Worm.Win32.Delf",
"W32/Delf.AO!worm.p2p",
"W32/Spybot.TN.worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"RECEIVE_BOOT_COMPLETED",
"-",
"allow",
"the",
"application",
"to",
"launch",
"itself",
"after",
"system",
"boot",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"February",
"2017,",
"we",
"observed",
"an",
"evolution",
"of",
"the",
"Infy",
"malware",
"that",
"we're",
"calling",
"Foudre",
"lightning",
"in",
"French."
] | [
16,
0,
8,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
3,
16,
16,
16
] |
[
"The",
"ACCESS_SUPERUSER",
"may",
"have",
"been",
"removed",
"because",
"it",
"was",
"deprecated",
"upon",
"the",
"release",
"of",
"Android",
"5.0",
"Lollipop",
"which",
"happened",
"in",
"2014",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
5,
16,
16,
16,
16,
16
] |
[
"IOC's",
"related",
"to",
"a",
"new",
"version",
"of",
"Citadel",
"that",
"hit",
"the",
"streets",
"on",
"November",
"2015"
] | [
1,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
0,
8
] |
[
"One",
"of",
"these",
"[",
"CVE-2015-5119",
"]",
"was",
"a",
"Flash",
"zero-day",
"."
] | [
16,
16,
16,
16,
7,
16,
16,
16,
16,
16,
16
] |
[
"In",
"July",
"2015,",
"Check",
"Point's",
"Incident",
"Response",
"team",
"was",
"contacted",
"by",
"a",
"customer",
"after",
"they",
"noticed",
"strange",
"file",
"system",
"activities",
"in",
"one",
"of",
"their",
"Linux-based",
"DNS",
"BIND",
"servers."
] | [
16,
0,
8,
4,
12,
12,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
16,
5,
13,
13,
13
] |
[
"This",
"new",
"version",
"CryptoWall",
"includes",
"multiple",
"updates,",
"such",
"as",
"a",
"more",
"streamlined",
"network",
"communication",
"channel,",
"modified",
"ransom",
"message,",
"and",
"the",
"encryption",
"of",
"filenames."
] | [
16,
16,
16,
3,
16,
16,
11,
16,
16,
16,
1,
9,
9,
9,
9,
16,
1,
9,
16,
16,
1,
9,
9
] |
[
"They",
"can",
"also",
"be",
"installed",
"by",
"other",
"malware,",
"or",
"by",
"exploiting",
"software",
"vulnerabilities."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
7,
15,
15
] |
[
"Kaspersky",
"Lab",
"products",
"detect",
"it",
"as",
"Trojan.AndroidOS.Dvmap.a",
"."
] | [
4,
12,
16,
16,
16,
16,
1,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BackdoorAPT.Hikit.MD6",
"BKDR64_GOALMAY.SM",
"BKDR64_GOALMAY.SM",
"Win.Trojan.HiKit-41",
"Trojan.Hikit.Win64.4",
"BehavesLike.Win64.PdfCrypt.cc",
"Trojan.Dropper",
"Backdoor:Win64/Hikiti.N!dha",
"Trojan/Win32.HDC.C1382826",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"These",
"attacks",
"occurred",
"in",
"several",
"different",
"countries,",
"but",
"our",
"investigation",
"revealed",
"that",
"the",
"primary",
"targets",
"were",
"individuals",
"and",
"organizations",
"primarily",
"located",
"in",
"India."
] | [
16,
1,
16,
16,
16,
16,
2,
16,
16,
16,
16,
15,
16,
4,
12,
16,
4,
16,
4,
16,
16,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.ExpiroPC.PE",
"Trojan.Win32.ServStart.exsakp",
"Trojan.Win32.Z.Servstart.15876.A",
"Trojan.DownLoader9.26576",
"Trojan.Win32.Rozena",
"TR/ServStart.dplva",
"TrojanDownloader:Win32/Yemrok.A",
"W32/Parite.dam",
"W32/ServStart.DV!tr",
"Win32/Trojan.849"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/VB.l",
"Trojan.Heur.EC3E8C",
"WORM_ZAKA.AD",
"W32/VB.UQEY-1535",
"W32.HLLW.Asterz.intd",
"WORM_ZAKA.AD",
"Win.Worm.VB-29",
"P2P-Worm.Win32.VB.l",
"Trojan.Win32.VB.hxbs",
"Worm.Win32.P2P-VB.24576.D",
"W32.W.VB.l!c",
"Win32.VB.L",
"Win32.HLLW.Kirk.24576",
"Worm.VB.Win32.51",
"BehavesLike.Win32.Virus.mz",
"Trojan-Banker.Win32.Bancos",
"W32/VB.KA@p2p",
"Worm/VB.qvg",
"Worm:Win32/Icasur.Q",
"WORM/VB.A",
"Worm[P2P]/Win32.VB",
"Worm.P2PVB.a.kcloud",
"Worm:Win32/Icasur.Q",
"P2P-Worm.Win32.VB.l",
"Worm.VB",
"Win32/VB.L",
"Win32.Virus.Vb.Lkdy",
"Worm.P2P.Zaka.R",
"W32/VB.L!worm.p2p"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Throughout",
"2015,",
"Symantec.cloud",
"has",
"been",
"detecting",
"a",
"stream",
"of",
"emails",
"that",
"have",
"the",
"Xtreme",
"remote",
"access",
"Trojan",
"RAT,",
"which",
"we",
"detect",
"as",
"W32.Extrat,",
"as",
"an",
"attachment."
] | [
16,
0,
4,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
3,
11,
11,
11,
11,
16,
16,
16,
16,
1,
16,
16,
4
] |
[
"In",
"November",
"2016,",
"we",
"observed",
"the",
"reemergence",
"of",
"destructive",
"attacks",
"associated",
"with",
"the",
"2012",
"Shamoon",
"attack",
"campaign."
] | [
16,
0,
8,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
0,
6,
14,
14
] |
[
"This",
"malware",
"masquerades",
"as",
"typical",
"ransomware:",
"it",
"encrypts",
"the",
"data",
"on",
"the",
"computer",
"and",
"demands",
"$300",
"bitcoins",
"for",
"recovery."
] | [
16,
3,
16,
16,
16,
3,
16,
1,
9,
9,
16,
16,
5,
16,
16,
16,
16,
16,
16
] |
[
"TREASUREHUNT",
"enumerates",
"running",
"processes,",
"extracts",
"payment",
"card",
"information",
"from",
"memory,",
"and",
"then",
"transmits",
"this",
"information",
"to",
"a",
"command",
"and",
"control",
"server."
] | [
3,
16,
1,
9,
9,
9,
9,
9,
9,
9,
16,
16,
1,
16,
1,
16,
16,
1,
9,
9,
9
] |
[
"Technical",
"analysis",
"Obfuscation",
"On",
"top",
"of",
"recreating",
"ransomware",
"behavior",
"in",
"ways",
"we",
"haven",
"β",
"t",
"seen",
"before",
",",
"the",
"Android",
"malware",
"variant",
"uses",
"a",
"new",
"obfuscation",
"technique",
"unique",
"to",
"the",
"Android",
"platform",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Androm",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"W32/Trojan.CFAT-3750",
"Trojan.MulDrop7.39399",
"Backdoor.Androm.tas",
"Trojan[Backdoor]/Win32.Androm",
"Trojan:Win32/Lamooc.A",
"Trojan/Win32.Androm.C2185535",
"Backdoor.Androm",
"Trj/GdSda.A",
"Backdoor.Androm!dAFAsy80jho"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"is",
"a",
"common",
"trick",
"played",
"by",
"malware",
"developers",
",",
"making",
"the",
"user",
"think",
"the",
"app",
"may",
"have",
"been",
"removed",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"method",
"checks",
"if",
"eight",
"hours",
"have",
"passed",
"from",
"the",
"first",
"run",
"of",
"application",
",",
"and",
"if",
"so",
",",
"request",
"containing",
"the",
"device",
"β",
"s",
"data",
"to",
"the",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Comfoo.a",
"Backdoor.Vinself",
"TROJ_COMFOO.AI",
"Trojan.PWS.DPD.14",
"TROJ_COMFOO.AI",
"Trojan[Dropper]/Win32.Injector",
"Backdoor:Win32/Comfoo.C",
"Win-Trojan/Comfoo.114688",
"Backdoor.Win32.Comfoo",
"W32/PWS_y.AI!tr",
"Win32/Trojan.3fc"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"October",
"we",
"saw",
"an",
"increase",
"in",
"infections."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"TeslaCrypt/AlphaCrypt",
"uses",
"AES256",
"encryption."
] | [
1,
16,
1,
9
] |
[
"The",
"principles",
"of",
"this",
"bootkit's",
"work,",
"named",
"HDRoot,",
"have",
"been",
"described",
"in",
"the",
"first",
"part",
"of",
"our",
"article."
] | [
16,
16,
16,
16,
3,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"body",
"contains",
"a",
"message",
"and",
"URL",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Stepaik.A",
"Worm.Stepaik",
"Win32.Stepaik.A",
"W32/Trojan.ILKV-7384",
"Win32.Stepaik.A",
"Email-Worm.Win32.Stepaik.c",
"Win32.Stepaik.A",
"Email.Worm.W32!c",
"Win32.Stepaik.A",
"Win32.Stepaik.A",
"Trojan.Inject3.836",
"BehavesLike.Win32.Virut.mh",
"Worm[Email]/Win32.Stepaik",
"Email-Worm.Win32.Stepaik.c",
"Win32.Stepaik.A",
"Trj/CI.A",
"Win32.Worm-email.Stepaik.Day",
"Worm.Win32.Stepar",
"W32/Stepaik.C@mm",
"Win32/Trojan.7ee"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"setup",
"a",
"system",
"with",
"weak",
"and",
"default",
"passwords",
"to",
"capture",
"any",
"and",
"all",
"malware",
"spread",
"in",
"this",
"fashion."
] | [
16,
16,
16,
5,
16,
1,
9,
9,
9,
16,
16,
16,
16,
16,
3,
1,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.5B9D",
"Packer.Malware.NSAnti.A",
"Packer.Malware.NSAnti.A",
"Trojan.MalPack.NSPack",
"Trojan/PornoBlocker.afxh",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Trojan.Packed.NsAnti",
"Packer.Malware.NSAnti.A",
"Packed.Win32.NSAnti.r",
"Packer.Malware.NSAnti.A",
"Trojan.Win32.NSAnti.fthc",
"Packer.Malware.NSAnti.A",
"BackDoor.Singu",
"Packed.NSAnti.frd",
"Packer.Malware.NSAnti.A",
"Packed.Win32.NSAnti.r",
"Trojan:Win32/Vanti.B.dll",
"Trojan/Win32.Hupigon.C134220",
"TScope.Malware-Cryptor.SB",
"Rootkit.Win32.Vanti.D"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"also",
"found",
"several",
"apps",
"containing",
"the",
"malware",
",",
"which",
"were",
"developed",
"by",
"other",
"developers",
"on",
"Google",
"Play",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"The",
"ransomware",
"makes",
"this",
"connection",
"presumably",
"to",
"report",
"that",
"your",
"computer",
"has",
"been",
"compromised."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
7
] |
[
"This",
"attack",
"took",
"advantage",
"of",
"a",
"Java",
"zero-day",
"exploit",
"and",
"used",
"hacked",
"forums",
"as",
"watering",
"holes."
] | [
16,
1,
16,
16,
16,
16,
5,
3,
11,
16,
16,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.QPassHV.Trojan",
"Trojan.Zenshirsh.SL7",
"Trojan/QQPass.owd",
"Win32.Trojan-PSW.QQPass.af",
"Win32/Oflwr.A!crypt",
"Trojan.Win32.Scar.oetk",
"Trojan.Win32.DangerousObject.dnizrq",
"Win32.Trojan.Scar.Wsts",
"TrojWare.Win32.PWS.QQPass.AZF",
"Trojan.DownLoader12.31656",
"Trojan.QQPass.Win32.24405",
"BehavesLike.Win32.Trojan.nc",
"TR/PSW.QQSteal.boeu",
"Trojan.Win32.Z.Qqpass.100934",
"Trojan.Scar",
"Win32/PSW.QQPass.OWD",
"Win32/Worm.Scar.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Throughout",
"the",
"year,",
"Bankbot",
"has",
"been",
"distributed",
"as",
"benign",
"apps,",
"some",
"of",
"which",
"made",
"their",
"way",
"onto",
"popular",
"app",
"stores."
] | [
16,
0,
8,
3,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13
] |
[
"In",
"June",
"2022,",
"Mandiant",
"Managed",
"Defense",
"detected",
"and",
"responded",
"to",
"an",
"UNC2970",
"phishing",
"campaign",
"targeting",
"a",
"U.S.-based",
"technology",
"company."
] | [
16,
0,
8,
6,
16,
4,
16,
16,
16,
16,
16,
6,
14,
14,
16,
4,
12,
12,
12
] |
[
"But",
"attackers",
"were",
"still",
"constantly",
"looking",
"for",
"new",
"methods",
"to",
"steal",
"TANs",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"the",
"examined",
"version",
",",
"it",
"was",
"downloaded",
"from",
":",
"hxxp",
":",
"//url",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.NSIS.Androm.7",
"Ransom.Onion.A",
"Win32.Trojan.Injector.je",
"Packed.NSISPacker!g7",
"Win32/Injector.CXKV",
"TROJ_GE.F5258674",
"Zum.Ransom.NSIS.Cerber.1",
"Trojan.NSIS.Androm.7",
"Trojan.Win32.CXKV.ecdllh",
"Trojan.Kovter.118",
"BehavesLike.Win32.Ransom.dc",
"Trojan.Win32.Injector",
"Trojan/Win32.Injector.cxkv",
"Zum.Ransom.NSIS.Cerber.1",
"Trojan/Win32.Cerber.R180093",
"Trojan.Injector!M8gUkRYeGG8",
"W32/Injector.CXKV!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"appears",
"the",
"same",
"actor",
"developed",
"both",
"the",
"Komplex",
"and",
"XAgentOSX",
"tools,",
"based",
"on",
"similarities",
"within",
"the",
"following",
"project",
"paths",
"found",
"within",
"the",
"tools."
] | [
16,
16,
16,
16,
6,
16,
16,
16,
3,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"The",
"construction",
"of",
"the",
"webshell",
"was",
"interesting",
"by",
"itself,",
"as",
"it",
"was",
"actually",
"two",
"separate",
"webshells:",
"an",
"initial",
"webshell",
"that",
"was",
"responsible",
"for",
"saving",
"and",
"loading",
"the",
"second",
"fully",
"functional",
"webshell."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Hacktool.Flystudio.16558",
"Trojan.DownLoader12.49203",
"Trojan-Downloader.Win32.Raykmerd",
"Trojan/Badur.jao",
"TR/Dldr.Raykmerd.amotd",
"TrojanDownloader:Win32/Raykmerd.A",
"Trojan.Badur"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"On",
"September",
"18,",
"2015,",
"we",
"saw",
"an",
"activity",
"on",
"koreatimes.com",
"where",
"we",
"captured",
"a",
"malicious",
"binary."
] | [
16,
0,
8,
8,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
3,
11
] |
[
"Much",
"like",
"we",
"have",
"seen",
"in",
"recent",
"months",
",",
"anyone",
"can",
"be",
"impacted",
"by",
"a",
"mobile",
"device",
"attack",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"EventBot",
"method",
"responsible",
"for",
"the",
"library",
"loading",
"The",
"method",
"responsible",
"for",
"the",
"library",
"loading",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"During",
"our",
"investigation",
",",
"we",
"observed",
"the",
"C2",
"server",
"sending",
"multiple",
"β",
"balance",
"β",
"commands",
"to",
"different",
"institutions",
",",
"presumably",
"to",
"query",
"the",
"victim",
"β",
"s",
"financial",
"account",
"balances",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Triada",
"β",
"s",
"functionality",
"allows",
"it",
"to",
"modify",
"those",
"messages",
",",
"so",
"the",
"money",
"is",
"sent",
"not",
"to",
"some",
"app",
"developer",
",",
"but",
"to",
"the",
"malware",
"operators",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"These",
"innovations",
"included",
"two",
"significant",
"changes",
"in",
"Dyre",
"behavior:"
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FlameF.Worm",
"Trojan.Flame.B",
"Worm.Win32.Flame!O",
"Worm.Flamea",
"Worm.Win32.Flame.a",
"Trojan/Flamer.a",
"Win32.Trojan.WisdomEyes.16070401.9500.9790",
"W32/Flamer.A",
"W32.Flamer",
"Win32/Flame.A",
"WORM_FLAMER.A",
"Win.Worm.Flame-9",
"Trojan.Flame.B",
"Worm.Win32.Flame.a",
"Trojan.Flame.B",
"Trojan.Win32.Flame.sbruw",
"W32.W.Flame.a!c",
"Win32.Worm.Flame.Wpjf",
"Worm.Win32.Flame.a",
"Trojan.Flame.B",
"Win32.HLLW.Flame.1",
"Worm.Flame.Win32.3",
"WORM_FLAMER.A",
"W32/Flamer.OWIT-2039",
"Worm/Flame.f",
"W32.Worm.Flame",
"TR/Flamer.A.1",
"Worm/Win32.Flame",
"Trojan.Flame.B",
"Worm.Win32.Flame.1721856",
"Worm.Win32.Flame.a",
"Win-Trojan/Flamer.1721856",
"Worm.Flame",
"Worm.Win32.Flame.a",
"Trojan.Flame.B",
"Win32/Flamer.A",
"Trojan.Flame.A",
"Worm.Win32.Flame",
"W32/Flame.A!worm",
"Trojan.Flame.3535",
"W32/Flamer.A.worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |