tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "Flooder.MailSpam.AnonMail.A", "Email-Flooder.Win32.AnonMail!O", "Win32.Trojan.Anonmail.Agkt", "Flooder.MailSpam.AnonMail.A", "W32/Backdoor.SPH", "Hacktool.Flooder", "Win.Tool.MailSpam-3", "Email-Flooder.Win32.AnonMail.a", "Flooder.MailSpam.AnonMail.A", "Trojan.Win32.AnonMail.dbio", "TrojWare.Win32.Spammer.AnonMail", "Trojan.AnMail", "Tool.AnonMail.Win32.14", "Email-Flooder.Win32.AnonMail.A", "W32/Backdoor.CDAV-2869", "Spammer.Mail.AnonMail", "TR/Nuker.AnonMail", "HackTool[Flooder]/Win32.AnonMail", "Email-Flooder.Win32.AnonMail.a", "Flooder.MailSpam.AnonMail.A", "Spammer.AnonMail", "Flooder.MailSpam.AnonMail.A", "Flooder.MailSpam.AnonMail.A", "Trj/CI.A", "Win32/Spammer.AnonMail" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "the", "type", "of", "operation", "they", "are", "carrying", "out." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "REQUEST_COMPANION_RUN_IN_BACKGROUND", "-", "let", "the", "app", "run", "in", "the", "background", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Mlw.eweujb", "Win32.Trojan.Inject.Auto", "BehavesLike.Win32.Trojan.hh", "TR/Dropper.MSIL.fkvxc", "Spyware.InfoStealer", "Trojan.MSIL.Inject", "MSIL/Injector.SZD!tr", "Trj/GdSda.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "this", "research", ",", "we", "review", "common", "features", "of", "the", "malware", "and", "examine", "the", "improvements", "the", "threat", "actor", "made", "in", "each", "version", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Little", "has", "been", "published", "on", "the", "threat", "actors", "responsible", "for", "Operation", "Ke3chang", "since", "the", "report", "was", "released", "more", "than", "two", "years", "ago." ]
[ 16, 16, 16, 16, 16, 16, 6, 14, 16, 11, 6, 16, 16, 16, 16, 16, 16, 0, 8, 8, 8, 8 ]
[ "Exodus", "One", "checks-in", "by", "sending", "a", "POST", "request", "containing", "the", "app", "package", "name", ",", "the", "device", "IMEI", "and", "an", "encrypted", "body", "containing", "additional", "device", "information", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "PUP.Optional.VideiPlayer", "Trojan.ExtenBro!", "TROJ_SPNR.06HH14", "Trojan-Downloader.MSIL.ExtInstall.o", "Trojan.Win32.Kivat.dfxucy", "TROJ_SPNR.06HH14", "BehavesLike.Win32.Trojan.nt", "W32/Trojan.JMSU-4938", "Variant.Kazy.doi", "W32/ExtenBro.E!tr", "Trojan.Kazy.D683A9", "Uds.Dangerousobject.Multi!c", "TrojanDownloader:MSIL/Kivat.B", "Trojan.ExtenBro!", "Trj/Chgt.B", "Win32/Trojan.Multi.daf" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Hashes", "of", "samples", "Type", "Package", "name", "SHA256", "digest", "Custom", "ads", "com.targetshoot.zombieapocalypse.sniper.zombieshootinggame", "5d98d8a7a012a858f0fa4cf8d2ed3d5a82937b1a98ea2703d440307c63c6c928", "Click", "fraud", "com.counterterrorist.cs.elite.combat.shootinggame", "84672fb2f228ec749d3c3c1cb168a1c31f544970fd29136bea2a5b2cefac6d04", "Rooting", "trojan", "com.android.world.news", "bd233c1f5c477b0cc15d7f84392dab3a7a598243efa3154304327ff4580ae213", "Zen", "trojan", "com.lmt.register", "eb12cd65589cbc6f9d3563576c304273cb6a78072b0c20a155a0951370476d8d", "Mobile", "Campaign", "β€˜", "Bouncing", "Golf", "’", "Affects", "Middle", "East", "We", "uncovered", "a", "cyberespionage", "campaign", "targeting", "Middle", "Eastern", "countries", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 1, 16, 16, 1, 1, 16, 16, 16, 1, 3, 16, 1, 1, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Therefore", ",", "by", "simulating", "fraudulent", "clicks", ",", "these", "developers", "are", "making", "money", "without", "requiring", "a", "user", "to", "click", "on", "an", "advertisement", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "If", "it", "is", "the", "first", "execution", ",", "and", "if", "the", "app", "’", "s", "path", "does", "not", "contain", "β€œ", "/system/app", "”", "(", "i.e", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.Kolweb.a.2.Pack", "Trojan/Delf.cf", "W32/Trojan.ORX", "Trojan.Kolweb.A", "W32/Startpage.AHU", "Win32/Startpage.LM", "TROJ_DOWNLOAD.E", "Trojan.Win32.Kolweb.a", "Trojan.Win32.Kolweb.A!IK", "TrojWare.Win32.Kolweb.A", "Trojan.DownLoader.1317", "TROJ_DOWNLOAD.E", "Trojan/PSW.Almat.coi", "Adware:Win32/Adtomi.B", "Win-Spyware/Xema.171008", "W32/Trojan.ORX", "Trojan.Win32.Kolweb.a", "Win32/Kolweb.A", "Trojan.Win32.Kolweb.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Crypt.ES", "Trojan.Crypt.ES", "Win32.Trojan.WisdomEyes.16070401.9500.9996", "Trojan.Crypt.ES", "Trojan.Win32.Crypt.ewgrry", "Trojan.Crypt.ES", "Trojan.Crypt.ES", "BehavesLike.Win32.BadFile.lm", "Backdoor:Win32/Huceqoo.A", "Trojan.Win32.Z.Crypt.73728.BQ", "Trojan/Win32.Scar.C8074", "Trojan.Crypt.ES", "BScope.Trojan.Dropper.we", "Trj/GdSda.A", "Trojan.Crypt.ES", "Win32/Trojan.b63" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "msconf.exe", "is", "the", "main", "module", "that", "provides", "control", "of", "the", "implant", "and", "reverse", "shell", "feature", "." ]
[ 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "However,", "this", "also", "leaves", "the", "C", "C", "traffic", "open", "for", "monitoring", "by", "others,", "including", "security", "researchers." ]
[ 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 4, 12 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Pws.Watcher.A", "Trojan-PSW.Win32.Watcher!O", "Trojan.Pws.Watcher.A", "Trojan.Pws.Watcher.A", "Trojan.Pws.Watcher.A", "Trojan.Win32.Watcher.ejkr", "Trojan.Win32.A.PSW-Watcher.492035", "Troj.PSW32.W.Watcher.a!c", "Trojan.Pws.Watcher.A", "Trojan.Pws.Watcher.A", "Trojan.PWS.Watcher", "Trojan.Watcher.Win32.8", "Trojan-PWS.Win32.Watcher.i", "Trojan/PSW.Watcher.a", "TR/PSW.Watcher.B", "PWS:Win32/Watcher.A", "Trojan.Pws.Watcher.A", "TrojanPSW.Watcher", "Win32/PSW.Watcher.A", "Win32.Trojan-qqpass.Qqrob.Wqwh", "W32/PSWAtcher.A!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "However", ",", "the", "app", "does", "create", "a", "WebView", "and", "registers", "a", "JavaScript", "interface", "to", "this", "class", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "this", "way", ",", "the", "malware", "authors", "can", "submit", "their", "app", "and", "add", "the", "malicious", "capabilities", "only", "after", "their", "app", "is", "live", "on", "the", "Play", "Store", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "Enlarge", "/", "Top", "20", "countries", "targeted", "by", "Hummingbad/Shedun", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.PSW.Barok.10", "Trojan/W32.Barok.1056825", "Trojan.Win32.Barok.bcusy", "W32/Pws.ZDD", "WS.Reputation.1", "Barok.1_0", "TROJ_BAROK.10", "Trojan.Spy-11230", "Trojan-PSW.Win32.Barok.10", "Trojan.PSW.Barok.10", "Trojan.PWS.Barok!QhmYol9M94M", "TrojWare.Win32.PSW.Barok.10", "Trojan.PSW.Barok.10", "TR/Barok.PSW.10", "TROJ_BAROK.10", "Trojan/PSW.Barok.10", "Win32.Troj.Barok.kcloud", "PWS:Win32/Barok.1_0", "Trojan.Win32.Barok_10.Setup", "Trojan.PSW.Barok.10", "W32/Pws.ZDD", "Win-Trojan/Barok.Client.v10", "PSW.Barok.A", "Hack.PSWbarok.10", "Trojan-PWS.Win32.Barok.10", "W32/Barok.10!tr.pws", "Trj/PSW.Barok.10" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "ponethus", "[", "." ]
[ 9, 9, 9, 9 ]
[ "But", ",", "behind", "the", "scenes", ",", "the", "malware", "has", "not", "been", "removed", ";", "instead", "it", "starts", "preparing", "its", "onslaught", "of", "attacks", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "XLoader", "can", "also", "hijack", "the", "infected", "device", "(", "i.e.", ",", "send", "SMSs", ")", "and", "sports", "self-protection/persistence", "mechanisms", "through", "device", "administrator", "privileges", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "While", "the", "idea", "of", "malware", "as", "a", "service", "isn't", "a", "new", "one,", "with", "players", "such", "as", "Tox", "and", "Shark", "in", "the", "game,", "but", "it", "can", "be", "said", "that", "MacSpy", "is", "one", "of", "the", "first", "seen", "for", "the", "OS", "X", "platform." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 3, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13 ]
[ "At", "least", "in", "most", "recent", "versions", ",", "as", "of", "January", "2019", ",", "the", "Zip", "archive", "would", "actually", "contain", "the", "i686", ",", "arm", "and", "arm64", "versions", "of", "all", "deployed", "binaries", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "PUP.Optional.OpenCandy", "WS.Reputation.1", "Trojan.DownLoader9.52502", "TR/Dropper.A.23950", "Win32.Troj.Undef.kcloud", "PE:PUF.OpenCandy!1.9DE5", "Win32/Trojan.ca7" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.Kykymber.P.Trojan", "Trojan.PWS.Onlinegames.KEGA", "Trojan-PWS.Win32.Kykymber.1!O", "PWS-OnlineGames.ke", "Trojan/PSW.Kykymber.kyz", "Win32.Trojan-PSW.OLGames.ay", "Infostealer.Gampass", "Win32/Gamepass.OQU", "Win.Spyware.79683-2", "Trojan-PSW.Win32.Kykymber.kyz", "Trojan.PWS.Onlinegames.KEGA", "Trojan.Win32.OnLineGames.bkxdd", "Troj.PSW32.W.Kykymber.kyz!c", "Trojan.PSW.Win32.MiBao.a", "TrojWare.Win32.PSW.GamePass.A", "Trojan.PWS.Onlinegames.KEGA", "BehavesLike.Win32.PWSOnlineGames.pm", "TR/PSW.Kykymber.CD", "Trojan.Win32.A.PSW-Kykymber.43452[UPX]", "Trojan-PSW.Win32.Kykymber.kyz", "Trojan.PWS.Onlinegames.KEGA", "Trojan.PWS.Onlinegames.KEGA", "Win32/PSW.OnLineGames.QLR", "Trojan.PWS.Kykymber!KKmGLDbdY4I", "W32/OnLineGames.KY!tr.pws", "Trj/Kykymber.A", "Trojan.PSW.Win32.GameOnline.CP" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Recently,", "in", "our", "never-ending", "quest", "to", "protect", "the", "world", "from", "malware,", "we", "found", "a", "misbehaving", "Android", "trojan." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor:Win32/Binanen.A" ]
[ 16, 3, 16, 16, 16, 1 ]
[ "The", "stolen", "parameters", "follow", ":", "ID", "IMSI", "IMEI", "Phone", "number", "Operator", "AID", "Model", "Brand", "Version", "Build", "Battery", "percentage", "Wi-Fi", "connection", "state", "Wake", "time", "Are", "logs", "enabled", "?", "Is", "the", "malware", "already", "set", "as", "the", "default", "SMS", "application", "?", "[", "True/False", "]", "Signal", "strength", "Screen", "active", "[", "True/False", "]", "Orientation", "Was", "accessibility", "permission", "granted", "?", "[", "True/False", "]", "Screen", "size", "List", "of", "the", "installed", "applications", "SMS", "messages", "saved", "on", "the", "device", "It", "is", "not", "uncommon", "for", "banking", "malware", "to", "harvest", "extensive", "amounts", "of", "data", "from", "the", "victim", "’", "s", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Then", "the", "Trojan", "will", "put", "the", "patched", "library", "back", "into", "the", "system", "directory", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clod912.Trojan.1f28", "Win32.Trojan.WisdomEyes.16070401.9500.9823", "Trojan.Munidub", "TROJ64_ASRUEX.A", "Trojan.Win64.MLW.eelpql", "TROJ64_ASRUEX.A", "BehavesLike.Win64.CrossRider.tm", "W64/Trojan.MCVO-8253", "Trojan/Win32.Zapchast", "Trojan:Win64/Asruex.A!dha", "Trojan.Zapchast.pk", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "POS", "malware", "refers", "to", "malicious", "software", "that", "extracts", "payment", "card", "information", "from", "memory", "and", "usually", "uploads", "that", "data", "to", "a", "command", "and", "control", "CnC", "server." ]
[ 3, 11, 16, 16, 3, 11, 16, 16, 1, 9, 9, 16, 7, 16, 16, 1, 15, 1, 16, 16, 1, 9, 9, 9, 9 ]
[ "However", ",", "when", "used", "maliciously", ",", "accessibility", "features", "can", "be", "used", "to", "exploit", "legitimate", "services", "for", "malicious", "purposes", ",", "like", "with", "EventBot", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Graftor.DD2BF", "Trojan.DownLoader.18943", "BehavesLike.Win32.Msposer.nm", "Trj/Lozyt.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Ransom.ANU", "Trojan.Enrume", "Ransom_Enrume.R00EC0DKG17", "Trojan.Ransom.ANU", "Trojan.Ransom.ANU", "Trojan.Win32.Z.Ransom.6967658", "Troj.Ransom.Anu!c", "Trojan.Ransom.ANU", "Trojan.Ransom.ANU", "Ransom_Enrume.R00EC0DKG17", "BehavesLike.Win32.PUPXBC.vc", "TR/FileCoder.jtxjg", "Trojan.Ransom.ANU", "Trojan.Ransom.ANU", "Trj/CI.A", "Win32/Trojan.Ransom.2a7" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.SapinH.Trojan", "Trojan-Dropper.Win32.Injector!O", "Trojan.Mauvaise.SL1", "Trojan.Chad", "Trojan.Packed.Win32.29983", "Trojan.Application.Symmi.D73F9", "Win32/Gamepass.HKIaME", "Trojan-Dropper.Win32.Injector.palw", "Trojan.Win32.KillProc.brmetk", "Troj.Dropper.W32.Injector.toQt", "Adware.Win32.Dropper.aaa", "Application.Win32.Kuaiba.BC", "Trojan.KillProc.22109", "BehavesLike.Win32.VirRansom.fh", "TrojanDropper.Injector.ayai", "Trojan:Win32/Scoreem.A", "Trojan-Dropper.Win32.Injector.palw", "Dropper/Win32.Injector.R68328", "TrojanDropper.Injector", "Trojan.DR.Injector!UEnRNWldneo", "Trojan.Win32.Senta", "W32/Injector.RREW!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.SumanyaQZA.Worm", "Worm.AutoRun", "W32/Autorun.worm.j", "Worm.AutoRun.Win32.2713", "TROJ_FAM_0001c56.TOMA", "Win32.Worm.AutoRun.d", "W32.SillyDC", "Win32/SillyFDC.CD", "TROJ_FAM_0001c56.TOMA", "Worm.Win32.AutoRun.beh", "Trojan.Win32.AutoRun.uvsfh", "Worm.Win32.Autorun.204800", "Trojan.Copier.8", "BehavesLike.Win32.VBObfus.dm", "Worm.Win32.VB", "Worm/AutoRun.ahnn", "Worm:Win32/Manyasu.A", "Worm/Win32.AutoRun", "Worm:Win32/Manyasu.A", "Trojan.Heur.E08BA4", "Worm.Win32.AutoRun.beh", "Worm/Win32.AutoRun.R18800", "Trojan.VBO.012000", "Trj/Manyasu.A", "Win32/AutoRun.VB.IY", "Trojan.Win32.VB.mct", "Worm.AutoRun!WxdQD2QNztM" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "ongoing", "attacks", "attempt", "to", "circumvent", "the", "extra", "protections", "conferred", "by", "two-factor", "authentication", "in", "Gmail,", "and", "rely", "heavily", "on", "phone-call", "based", "phishing", "and", "real", "time", "login", "attempts", "by", "the", "attackers." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 1, 9, 9, 9, 16, 16, 16, 16, 1, 9, 9, 16, 1, 9, 9, 9, 16, 16, 6 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Win32.Stub!O", "Backdoor/Stub.j", "Win32.Worm.Delf.a", "Backdoor.Trojan", "Win32/Bosbot.D", "BKDR_STUB.G", "Backdoor.Win32.Stub.j", "Trojan.Win32.Stub.bbeaok", "Backdoor.Win32.A.Stub.114843[UPX]", "BackDoor.Stfu", "Backdoor.Stub.Win32.24", "BKDR_STUB.G", "BehavesLike.Win32.Backdoor.cm", "Virus.Win32.Imponex", "Backdoor/Stub.n", "W32/Sality.Patched", "Trojan/Win32.Unknown", "Backdoor:Win32/Stub.P", "W32.W.Bagle.kZt7", "Backdoor.Win32.Stub.j", "Win32.Worm.Imponex.A", "Trojan/Win32.Stub.C408823", "BScope.Malware-Cryptor.Hlux", "W32/DelpDldr.A!tr.bdr", "W32/Knase.C" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Java.Adwind.dkmdei", "Java.Adwind.2", "Trojan.Java.Adwind", "Trojan.Java.o", "JAVA/RemoteAd.dld", "Trojan:Java/Adwind.G", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "plugins", "are", "stored", "in", "its", "resource", "section", "and", "can", "be", "protected", "by", "the", "same", "VM", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "functionality", "can", "be", "seen", "in", "Figure", "6", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Patched.FR", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Backdoor.Sheedash", "Win32/Sfcpatched.A", "TROJ_PATCH.SMLD", "Win.Trojan.Sfcpatch-10", "Trojan.Win32.Patched.fr", "Trojan.Win32.Patched.cwsyqv", "W32.W.AutoRun.kYRk", "Trojan.WinSpy.921", "Trojan.Patched.Win32.27797", "TROJ_PATCH.SMLD", "Trojan.Win32.Patched", "Trojan/Win32.Patched", "Trojan.Patched.1", "Trojan.Win32.Patched.fr", "Trojan:Win32/Parchood.A", "Trojan/Win32.Patched.R3621", "BScope.Trojan.Crex", "Trojan.Win32.Patched.f", "Trojan.Patched!j5lr5VQfEwA", "Win32/Trojan.2c9" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "group", "has", "been", "operating", "since", "2012", "and", "became", "particularly", "active", "in", "Q2", "2015." ]
[ 6, 14, 16, 16, 16, 16, 0, 16, 16, 16, 16, 16, 0, 8 ]
[ "SpyNote", "is", "similar", "to", "OmniRat", "and", "DroidJack,", "which", "are", "RATs", "remote", "administration", "tools", "that", "allow", "malware", "owners", "to", "gain", "remote", "administrative", "control", "of", "an", "Android", "device." ]
[ 3, 16, 16, 16, 3, 16, 3, 16, 16, 3, 11, 11, 11, 16, 16, 6, 14, 16, 1, 9, 9, 9, 16, 16, 5, 13 ]
[ "As", "predicted", "following", "the", "leak", "of", "Hacking", "Team", "exploit", "codes", "covered", "here,", "the", "Zscaler", "security", "research", "team", "has", "recently", "started", "seeing", "a", "Chinese", "cyber", "espionage", "group", "weaponizing", "malware", "payloads", "using", "the", "0-day", "exploits", "found", "in", "the", "leaked", "Hacking", "Team", "archives." ]
[ 16, 16, 16, 16, 16, 16, 4, 12, 3, 11, 16, 16, 16, 4, 12, 12, 12, 16, 16, 16, 16, 16, 6, 14, 14, 14, 16, 3, 11, 16, 16, 3, 11, 16, 16, 16, 16, 4, 12, 16 ]
[ "The", "World", "Anti-Doping", "Agency", "WADA", "has", "alerted", "their", "stakeholders", "that", "email", "phishing", "scams", "are", "being", "reported", "in", "connection", "with", "WADA", "and", "therefore", "asks", "its", "recipients", "to", "be", "careful." ]
[ 4, 12, 12, 12, 12, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 4, 16, 16, 16 ]
[ "Attackers", "create", "accounts", "on", "those", "services", "and", "post", "encoded", "IP", "addresses", "or", "the", "domain", "names", "of", "real", "C2", "servers", "in", "advance", "of", "distributing", "the", "backdoor." ]
[ 6, 1, 9, 9, 9, 9, 16, 12, 16, 1, 9, 16, 1, 9, 9, 9, 9, 9, 9, 16, 16, 16, 16, 16, 3 ]
[ "The", "injection", "method", "used", "for", "winlogon.exe", "is", "also", "interesting", "and", "quite", "unusual", "." ]
[ 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16 ]
[ "Succeeding", "monitoring", "efforts", "revealed", "a", "newer", "variant", "that", "exploits", "the", "social", "media", "platforms", "Instagram", "and", "Tumblr", "instead", "of", "Twitter", "to", "hide", "its", "C", "&", "C", "address", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 4, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "P2P-Worm.Win32.Delf!O", "Worm.Delf.9767", "W32/Delf.ao", "WORM_YOOHOO.D", "Win32.Worm.Delf.a", "W32/SillyP2P.BR", "W32.HLLW.Yoohoo", "WORM_YOOHOO.D", "Win.Trojan.Delf-1033", "P2P-Worm.Win32.Delf.ao", "Trojan.Win32.Delf.bojqna", "Win32.Worm-p2p.Delf.Lnfa", "Win32.HLLW.Woofka", "Worm.Delf.Win32.191", "BehavesLike.Win32.Backdoor.ch", "Worm/Delf.ot", "Worm[P2P]/Win32.Delf", "Worm.Win32.A.P2P-Delf.70675[UPX]", "P2P-Worm.Win32.Delf.ao", "Win32/P2PDelf.worm.45056", "Worm.Delf", "Win32/Delf.AO", "Worm.P2P.Delf.AAF!AU", "P2P-Worm.Win32.Delf", "W32/Delf.AO!worm.p2p", "W32/Spybot.TN.worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "RECEIVE_BOOT_COMPLETED", "-", "allow", "the", "application", "to", "launch", "itself", "after", "system", "boot", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "February", "2017,", "we", "observed", "an", "evolution", "of", "the", "Infy", "malware", "that", "we're", "calling", "Foudre", "lightning", "in", "French." ]
[ 16, 0, 8, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 3, 16, 16, 16 ]
[ "The", "ACCESS_SUPERUSER", "may", "have", "been", "removed", "because", "it", "was", "deprecated", "upon", "the", "release", "of", "Android", "5.0", "Lollipop", "which", "happened", "in", "2014", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 5, 16, 16, 16, 16, 16 ]
[ "IOC's", "related", "to", "a", "new", "version", "of", "Citadel", "that", "hit", "the", "streets", "on", "November", "2015" ]
[ 1, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 0, 8 ]
[ "One", "of", "these", "[", "CVE-2015-5119", "]", "was", "a", "Flash", "zero-day", "." ]
[ 16, 16, 16, 16, 7, 16, 16, 16, 16, 16, 16 ]
[ "In", "July", "2015,", "Check", "Point's", "Incident", "Response", "team", "was", "contacted", "by", "a", "customer", "after", "they", "noticed", "strange", "file", "system", "activities", "in", "one", "of", "their", "Linux-based", "DNS", "BIND", "servers." ]
[ 16, 0, 8, 4, 12, 12, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 16, 5, 13, 13, 13 ]
[ "This", "new", "version", "CryptoWall", "includes", "multiple", "updates,", "such", "as", "a", "more", "streamlined", "network", "communication", "channel,", "modified", "ransom", "message,", "and", "the", "encryption", "of", "filenames." ]
[ 16, 16, 16, 3, 16, 16, 11, 16, 16, 16, 1, 9, 9, 9, 9, 16, 1, 9, 16, 16, 1, 9, 9 ]
[ "They", "can", "also", "be", "installed", "by", "other", "malware,", "or", "by", "exploiting", "software", "vulnerabilities." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 7, 15, 15 ]
[ "Kaspersky", "Lab", "products", "detect", "it", "as", "Trojan.AndroidOS.Dvmap.a", "." ]
[ 4, 12, 16, 16, 16, 16, 1, 16 ]
[ "A", "backdoor", "also", "known", "as:", "BackdoorAPT.Hikit.MD6", "BKDR64_GOALMAY.SM", "BKDR64_GOALMAY.SM", "Win.Trojan.HiKit-41", "Trojan.Hikit.Win64.4", "BehavesLike.Win64.PdfCrypt.cc", "Trojan.Dropper", "Backdoor:Win64/Hikiti.N!dha", "Trojan/Win32.HDC.C1382826", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "These", "attacks", "occurred", "in", "several", "different", "countries,", "but", "our", "investigation", "revealed", "that", "the", "primary", "targets", "were", "individuals", "and", "organizations", "primarily", "located", "in", "India." ]
[ 16, 1, 16, 16, 16, 16, 2, 16, 16, 16, 16, 15, 16, 4, 12, 16, 4, 16, 4, 16, 16, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.ExpiroPC.PE", "Trojan.Win32.ServStart.exsakp", "Trojan.Win32.Z.Servstart.15876.A", "Trojan.DownLoader9.26576", "Trojan.Win32.Rozena", "TR/ServStart.dplva", "TrojanDownloader:Win32/Yemrok.A", "W32/Parite.dam", "W32/ServStart.DV!tr", "Win32/Trojan.849" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32/VB.l", "Trojan.Heur.EC3E8C", "WORM_ZAKA.AD", "W32/VB.UQEY-1535", "W32.HLLW.Asterz.intd", "WORM_ZAKA.AD", "Win.Worm.VB-29", "P2P-Worm.Win32.VB.l", "Trojan.Win32.VB.hxbs", "Worm.Win32.P2P-VB.24576.D", "W32.W.VB.l!c", "Win32.VB.L", "Win32.HLLW.Kirk.24576", "Worm.VB.Win32.51", "BehavesLike.Win32.Virus.mz", "Trojan-Banker.Win32.Bancos", "W32/VB.KA@p2p", "Worm/VB.qvg", "Worm:Win32/Icasur.Q", "WORM/VB.A", "Worm[P2P]/Win32.VB", "Worm.P2PVB.a.kcloud", "Worm:Win32/Icasur.Q", "P2P-Worm.Win32.VB.l", "Worm.VB", "Win32/VB.L", "Win32.Virus.Vb.Lkdy", "Worm.P2P.Zaka.R", "W32/VB.L!worm.p2p" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Throughout", "2015,", "Symantec.cloud", "has", "been", "detecting", "a", "stream", "of", "emails", "that", "have", "the", "Xtreme", "remote", "access", "Trojan", "RAT,", "which", "we", "detect", "as", "W32.Extrat,", "as", "an", "attachment." ]
[ 16, 0, 4, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 3, 11, 11, 11, 11, 16, 16, 16, 16, 1, 16, 16, 4 ]
[ "In", "November", "2016,", "we", "observed", "the", "reemergence", "of", "destructive", "attacks", "associated", "with", "the", "2012", "Shamoon", "attack", "campaign." ]
[ 16, 0, 8, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 0, 6, 14, 14 ]
[ "This", "malware", "masquerades", "as", "typical", "ransomware:", "it", "encrypts", "the", "data", "on", "the", "computer", "and", "demands", "$300", "bitcoins", "for", "recovery." ]
[ 16, 3, 16, 16, 16, 3, 16, 1, 9, 9, 16, 16, 5, 16, 16, 16, 16, 16, 16 ]
[ "TREASUREHUNT", "enumerates", "running", "processes,", "extracts", "payment", "card", "information", "from", "memory,", "and", "then", "transmits", "this", "information", "to", "a", "command", "and", "control", "server." ]
[ 3, 16, 1, 9, 9, 9, 9, 9, 9, 9, 16, 16, 1, 16, 1, 16, 16, 1, 9, 9, 9 ]
[ "Technical", "analysis", "Obfuscation", "On", "top", "of", "recreating", "ransomware", "behavior", "in", "ways", "we", "haven", "’", "t", "seen", "before", ",", "the", "Android", "malware", "variant", "uses", "a", "new", "obfuscation", "technique", "unique", "to", "the", "Android", "platform", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Androm", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "W32/Trojan.CFAT-3750", "Trojan.MulDrop7.39399", "Backdoor.Androm.tas", "Trojan[Backdoor]/Win32.Androm", "Trojan:Win32/Lamooc.A", "Trojan/Win32.Androm.C2185535", "Backdoor.Androm", "Trj/GdSda.A", "Backdoor.Androm!dAFAsy80jho" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "is", "a", "common", "trick", "played", "by", "malware", "developers", ",", "making", "the", "user", "think", "the", "app", "may", "have", "been", "removed", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "method", "checks", "if", "eight", "hours", "have", "passed", "from", "the", "first", "run", "of", "application", ",", "and", "if", "so", ",", "request", "containing", "the", "device", "’", "s", "data", "to", "the", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Comfoo.a", "Backdoor.Vinself", "TROJ_COMFOO.AI", "Trojan.PWS.DPD.14", "TROJ_COMFOO.AI", "Trojan[Dropper]/Win32.Injector", "Backdoor:Win32/Comfoo.C", "Win-Trojan/Comfoo.114688", "Backdoor.Win32.Comfoo", "W32/PWS_y.AI!tr", "Win32/Trojan.3fc" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "October", "we", "saw", "an", "increase", "in", "infections." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "TeslaCrypt/AlphaCrypt", "uses", "AES256", "encryption." ]
[ 1, 16, 1, 9 ]
[ "The", "principles", "of", "this", "bootkit's", "work,", "named", "HDRoot,", "have", "been", "described", "in", "the", "first", "part", "of", "our", "article." ]
[ 16, 16, 16, 16, 3, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "body", "contains", "a", "message", "and", "URL", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Stepaik.A", "Worm.Stepaik", "Win32.Stepaik.A", "W32/Trojan.ILKV-7384", "Win32.Stepaik.A", "Email-Worm.Win32.Stepaik.c", "Win32.Stepaik.A", "Email.Worm.W32!c", "Win32.Stepaik.A", "Win32.Stepaik.A", "Trojan.Inject3.836", "BehavesLike.Win32.Virut.mh", "Worm[Email]/Win32.Stepaik", "Email-Worm.Win32.Stepaik.c", "Win32.Stepaik.A", "Trj/CI.A", "Win32.Worm-email.Stepaik.Day", "Worm.Win32.Stepar", "W32/Stepaik.C@mm", "Win32/Trojan.7ee" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "setup", "a", "system", "with", "weak", "and", "default", "passwords", "to", "capture", "any", "and", "all", "malware", "spread", "in", "this", "fashion." ]
[ 16, 16, 16, 5, 16, 1, 9, 9, 9, 16, 16, 16, 16, 16, 3, 1, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.5B9D", "Packer.Malware.NSAnti.A", "Packer.Malware.NSAnti.A", "Trojan.MalPack.NSPack", "Trojan/PornoBlocker.afxh", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Trojan.Packed.NsAnti", "Packer.Malware.NSAnti.A", "Packed.Win32.NSAnti.r", "Packer.Malware.NSAnti.A", "Trojan.Win32.NSAnti.fthc", "Packer.Malware.NSAnti.A", "BackDoor.Singu", "Packed.NSAnti.frd", "Packer.Malware.NSAnti.A", "Packed.Win32.NSAnti.r", "Trojan:Win32/Vanti.B.dll", "Trojan/Win32.Hupigon.C134220", "TScope.Malware-Cryptor.SB", "Rootkit.Win32.Vanti.D" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "also", "found", "several", "apps", "containing", "the", "malware", ",", "which", "were", "developed", "by", "other", "developers", "on", "Google", "Play", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "The", "ransomware", "makes", "this", "connection", "presumably", "to", "report", "that", "your", "computer", "has", "been", "compromised." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 7 ]
[ "This", "attack", "took", "advantage", "of", "a", "Java", "zero-day", "exploit", "and", "used", "hacked", "forums", "as", "watering", "holes." ]
[ 16, 1, 16, 16, 16, 16, 5, 3, 11, 16, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.QPassHV.Trojan", "Trojan.Zenshirsh.SL7", "Trojan/QQPass.owd", "Win32.Trojan-PSW.QQPass.af", "Win32/Oflwr.A!crypt", "Trojan.Win32.Scar.oetk", "Trojan.Win32.DangerousObject.dnizrq", "Win32.Trojan.Scar.Wsts", "TrojWare.Win32.PWS.QQPass.AZF", "Trojan.DownLoader12.31656", "Trojan.QQPass.Win32.24405", "BehavesLike.Win32.Trojan.nc", "TR/PSW.QQSteal.boeu", "Trojan.Win32.Z.Qqpass.100934", "Trojan.Scar", "Win32/PSW.QQPass.OWD", "Win32/Worm.Scar.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Throughout", "the", "year,", "Bankbot", "has", "been", "distributed", "as", "benign", "apps,", "some", "of", "which", "made", "their", "way", "onto", "popular", "app", "stores." ]
[ 16, 0, 8, 3, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13 ]
[ "In", "June", "2022,", "Mandiant", "Managed", "Defense", "detected", "and", "responded", "to", "an", "UNC2970", "phishing", "campaign", "targeting", "a", "U.S.-based", "technology", "company." ]
[ 16, 0, 8, 6, 16, 4, 16, 16, 16, 16, 16, 6, 14, 14, 16, 4, 12, 12, 12 ]
[ "But", "attackers", "were", "still", "constantly", "looking", "for", "new", "methods", "to", "steal", "TANs", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "the", "examined", "version", ",", "it", "was", "downloaded", "from", ":", "hxxp", ":", "//url", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.NSIS.Androm.7", "Ransom.Onion.A", "Win32.Trojan.Injector.je", "Packed.NSISPacker!g7", "Win32/Injector.CXKV", "TROJ_GE.F5258674", "Zum.Ransom.NSIS.Cerber.1", "Trojan.NSIS.Androm.7", "Trojan.Win32.CXKV.ecdllh", "Trojan.Kovter.118", "BehavesLike.Win32.Ransom.dc", "Trojan.Win32.Injector", "Trojan/Win32.Injector.cxkv", "Zum.Ransom.NSIS.Cerber.1", "Trojan/Win32.Cerber.R180093", "Trojan.Injector!M8gUkRYeGG8", "W32/Injector.CXKV!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "appears", "the", "same", "actor", "developed", "both", "the", "Komplex", "and", "XAgentOSX", "tools,", "based", "on", "similarities", "within", "the", "following", "project", "paths", "found", "within", "the", "tools." ]
[ 16, 16, 16, 16, 6, 16, 16, 16, 3, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "The", "construction", "of", "the", "webshell", "was", "interesting", "by", "itself,", "as", "it", "was", "actually", "two", "separate", "webshells:", "an", "initial", "webshell", "that", "was", "responsible", "for", "saving", "and", "loading", "the", "second", "fully", "functional", "webshell." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Hacktool.Flystudio.16558", "Trojan.DownLoader12.49203", "Trojan-Downloader.Win32.Raykmerd", "Trojan/Badur.jao", "TR/Dldr.Raykmerd.amotd", "TrojanDownloader:Win32/Raykmerd.A", "Trojan.Badur" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "On", "September", "18,", "2015,", "we", "saw", "an", "activity", "on", "koreatimes.com", "where", "we", "captured", "a", "malicious", "binary." ]
[ 16, 0, 8, 8, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 3, 11 ]
[ "Much", "like", "we", "have", "seen", "in", "recent", "months", ",", "anyone", "can", "be", "impacted", "by", "a", "mobile", "device", "attack", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "EventBot", "method", "responsible", "for", "the", "library", "loading", "The", "method", "responsible", "for", "the", "library", "loading", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "During", "our", "investigation", ",", "we", "observed", "the", "C2", "server", "sending", "multiple", "β€œ", "balance", "”", "commands", "to", "different", "institutions", ",", "presumably", "to", "query", "the", "victim", "’", "s", "financial", "account", "balances", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Triada", "’", "s", "functionality", "allows", "it", "to", "modify", "those", "messages", ",", "so", "the", "money", "is", "sent", "not", "to", "some", "app", "developer", ",", "but", "to", "the", "malware", "operators", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "These", "innovations", "included", "two", "significant", "changes", "in", "Dyre", "behavior:" ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FlameF.Worm", "Trojan.Flame.B", "Worm.Win32.Flame!O", "Worm.Flamea", "Worm.Win32.Flame.a", "Trojan/Flamer.a", "Win32.Trojan.WisdomEyes.16070401.9500.9790", "W32/Flamer.A", "W32.Flamer", "Win32/Flame.A", "WORM_FLAMER.A", "Win.Worm.Flame-9", "Trojan.Flame.B", "Worm.Win32.Flame.a", "Trojan.Flame.B", "Trojan.Win32.Flame.sbruw", "W32.W.Flame.a!c", "Win32.Worm.Flame.Wpjf", "Worm.Win32.Flame.a", "Trojan.Flame.B", "Win32.HLLW.Flame.1", "Worm.Flame.Win32.3", "WORM_FLAMER.A", "W32/Flamer.OWIT-2039", "Worm/Flame.f", "W32.Worm.Flame", "TR/Flamer.A.1", "Worm/Win32.Flame", "Trojan.Flame.B", "Worm.Win32.Flame.1721856", "Worm.Win32.Flame.a", "Win-Trojan/Flamer.1721856", "Worm.Flame", "Worm.Win32.Flame.a", "Trojan.Flame.B", "Win32/Flamer.A", "Trojan.Flame.A", "Worm.Win32.Flame", "W32/Flame.A!worm", "Trojan.Flame.3535", "W32/Flamer.A.worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]