tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"The",
"Locky",
"variant",
"of",
"ransomware",
"has",
"been",
"responsible",
"for",
"huge",
"amounts",
"of",
"spam",
"messages",
"being",
"sent",
"on",
"a",
"daily",
"basis."
] | [
3,
11,
11,
16,
3,
16,
16,
16,
11,
16,
16,
16,
1,
9,
16,
16,
16,
16,
0,
8
] |
[
"]",
"ponethus",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"TABLE",
"OF",
"CONTENTS",
"Security",
"Recommendations",
"Introduction",
"Threat",
"Analysis",
"Common",
"Features",
"Unique",
"Features",
"by",
"Version",
"Malware",
"Under",
"Active",
"Development",
"Suspected",
"Detection",
"Tests",
"by",
"the",
"Threat",
"Actor",
"EventBot",
"Infrastructure",
"Cybereason",
"Mobile",
"Conclusion",
"Indicators",
"of",
"Compromise",
"MITRE",
"ATT",
"&",
"CK",
"for",
"Mobile",
"Breakdown",
"SECURITY",
"RECOMMENDATIONS",
"Keep",
"your",
"mobile",
"device",
"up-to-date",
"with",
"the",
"latest",
"software",
"updates",
"from",
"legitimate",
"sources",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"intricate",
"anti-analysis",
"methods",
"reveal",
"how",
"much",
"effort",
"the",
"FinFisher",
"authors",
"exerted",
"to",
"keep",
"the",
"malware",
"hidden",
"and",
"difficult",
"to",
"analyze",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Fake",
"SMS",
"message",
"luring",
"users",
"to",
"enter",
"a",
"fake",
"website",
",",
"which",
"contains",
"the",
"malicious",
"APK",
"(",
"JPCERT",
"report",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.AE5C",
"Downloader.Tibs.Win32.6",
"Trojan/Tibs.al",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"Trojan.Packed.13",
"Packed.Win32.Tibs.al",
"Trojan.Win32.Small.erlei",
"Win32.Packed.Tibs.Wtdn",
"TrojWare.Win32.TrojanDownloader.Tibs.~mm",
"Trojan.Packed.142",
"Trojan.Win32.Crypt",
"TrojanDownloader.Tibs.amzo",
"TR/Small.DBY.LH.14",
"Win32.TrojDownloader.Tibs.mm.kcloud",
"TrojanDownloader:Win32/Nuwar.B",
"Trojan.Heur.TP.ED17A6",
"Troj.Downloader.W32.Tibs.mm!c",
"Packed.Win32.Tibs.al",
"Trojan-Downloader.Revelation.Tibs.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Lookout",
"notified",
"Google",
"of",
"the",
"finding",
"and",
"Google",
"removed",
"the",
"app",
"immediately",
"while",
"also",
"taking",
"action",
"on",
"it",
"in",
"Google",
"Play",
"Protect",
"."
] | [
4,
16,
4,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16
] |
[
"Reports",
"on",
"this",
"malware",
"family",
"have",
"previously",
"been",
"published",
"by",
"both",
"Intel",
"Security",
"and",
"Microsoft."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
4
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Spy/W32.KeyLogger.178176.B",
"Win32.Backdoor.Rbot.1470B0D03",
"WORM_SDBOT.CTJ",
"Virus.Win32.Rbot!IK",
"Worm/Rbot.210944",
"WORM_SDBOT.CTJ",
"Heuristic.BehavesLike.Win32.PasswordStealer.H",
"Virus.Win32.Rbot"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Methods",
"and",
"techniques",
"2013",
"not",
"only",
"saw",
"a",
"radical",
"increase",
"in",
"output",
"from",
"mobile",
"virus",
"writers",
"but",
"also",
"saw",
"them",
"actively",
"applying",
"methods",
"and",
"technologies",
"that",
"allowed",
"cybercriminals",
"to",
"use",
"their",
"malware",
"more",
"effectively",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"While",
"some",
"findings",
"where",
"very",
"interesting,",
"others",
"were",
"misleading",
"or",
"simply",
"wrong."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Mexico",
"has",
"previously",
"confirmed",
"that",
"it",
"is",
"a",
"purchaser",
"of",
"NSO",
"Group's",
"spyware."
] | [
2,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
3
] |
[
"The",
"GolfSpy",
"malware",
"embedded",
"in",
"the",
"apps",
"is",
"hardcoded",
"with",
"an",
"internal",
"name",
"used",
"by",
"the",
"attacker",
"."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"phone",
"belonging",
"to",
"the",
"Interdisciplinary",
"Group",
"of",
"Independent",
"Experts",
"GIEI,",
"a",
"group",
"of",
"investigators",
"from",
"several",
"countries,",
"was",
"sent",
"text",
"messages",
"with",
"links",
"to",
"NSO's",
"exploit",
"infrastructure"
] | [
16,
5,
16,
16,
4,
12,
12,
12,
12,
12,
12,
16,
4,
16,
4,
16,
16,
2,
16,
1,
9,
9,
9,
9,
16,
3,
11,
5
] |
[
"This",
"blog",
"post",
"describes",
"another",
"attack",
"campaign",
"where",
"attackers",
"used",
"the",
"Uri",
"terror",
"attack",
"and",
"Kashmir",
"protest",
"themed",
"spear",
"phishing",
"emails",
"to",
"target",
"officials",
"in",
"the",
"Indian",
"Embassies",
"and",
"Indian",
"Ministry",
"of",
"External",
"Affairs",
"MEA."
] | [
16,
16,
12,
16,
16,
6,
14,
16,
6,
16,
16,
1,
9,
9,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
4,
12,
12,
12,
12,
12,
12,
12,
12,
12
] |
[
"After",
"publication",
"I",
"was",
"contacted",
"by",
"another",
"analyst",
"who",
"was",
"able",
"to",
"link",
"the",
"information",
"from",
"my",
"blog",
"to",
"other",
"samples",
"from",
"an",
"actual",
"campaign."
] | [
16,
16,
4,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
12,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14
] |
[
"In",
"fact",
",",
"with",
"full",
"access",
"to",
"the",
"compromised",
"Android",
"smartphone",
",",
"the",
"opportunities",
"for",
"criminals",
"to",
"wreak",
"havoc",
"are",
"significant",
"β",
"such",
"as",
"erasing",
"infected",
"phones",
"or",
"launching",
"man-in-the-middle",
"(",
"MITM",
")",
"attacks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Etumbotb",
"Trojan/Ixeshe.i",
"Win32.Trojan.WisdomEyes.16070401.9500.9996",
"W32/Etumbot.I",
"Backdoor.Typideg",
"Trojan.Etumbot.1",
"Trojan.Ixeshe.Win32.30",
"BKDR_ETUMBOT.UQU",
"Trojan.Etumbot",
"W32/Etumbot.UDKV-8115",
"Trojan.Graftor.D234F5",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"researcher",
"came",
"upon",
"an",
"interesting",
"set",
"of",
"emails,",
"which",
"were",
"soon",
"determined",
"to",
"be",
"part",
"of",
"a",
"widespread",
"spam",
"campaign."
] | [
16,
4,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14
] |
[
"Version",
"#",
"1",
":",
"June",
"2019",
"β",
"Domain",
":",
"databit",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"The",
"site",
"was",
"infected",
"with",
"an",
"iframe",
"injector",
"that",
"redirects",
"to",
"Angler",
"EK."
] | [
16,
1,
16,
16,
16,
16,
1,
9,
16,
16,
16,
3,
11
] |
[
"The",
"number",
"of",
"LINE",
"users",
"in",
"Taiwan",
"reaches",
"up",
"to",
"17",
"million",
"in",
"the",
"same",
"year."
] | [
16,
16,
16,
4,
16,
16,
2,
16,
16,
16,
16,
16,
16,
16,
0,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.RockRat.S1875120",
"Troj.W32.Rockrat!c",
"Trojan.Johnnie.D1566D",
"Win32.Trojan.WisdomEyes.16070401.9500.9957",
"W32/Trojan.IKOU-3732",
"Backdoor.Rokrat",
"TROJ_KORPODE.A",
"Win.Trojan.Rokrat-6443187-0",
"Trojan.Win32.RockRat.exmijf",
"Trojan.Inject3.2444",
"Trojan.RockRat.Win32.1",
"W32/RockRat.A",
"Trojan.RockRat.a",
"W32/FakeAV.BCMZ!tr",
"Trojan/Win32.RockRat",
"Trojan:Win32/Korpode.A!dha",
"Trojan/Win32.Loader.R219535",
"Trj/CI.A",
"Win32.Trojan.Rockrat.Ljuk",
"Trojan.RockRat!",
"Win32/Trojan.549"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Here",
"β",
"s",
"another",
"example",
"of",
"such",
"an",
"attack",
"hitting",
"Windows",
"users",
":",
"Going",
"back",
"to",
"the",
"Android",
"Package",
"(",
"APK",
")",
"file",
"was",
"attached",
"to",
"the",
"e-mail",
",",
"this",
"is",
"pushing",
"an",
"Android",
"application",
"named",
"β",
"WUC",
"β",
"s",
"Conference.apk",
"β",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
11,
16,
16
] |
[
"The",
"injected",
"code",
"attempts",
"to",
"download",
"them",
"all",
"and",
"execute."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.Mudrop!O",
"Spyware.WSLogger",
"Trojan/Dropper.Mudrop.hs",
"Win32.Trojan.WisdomEyes.16070401.9500.9934",
"W32/Risk.AAJK-2149",
"Infostealer.Tarno.B",
"Win32/Mdrop.MD",
"not-a-virus:PSWTool.Win32.WSLogger.a",
"Trojan.Win32.Mudrop.dgpnb",
"Trojan.WSLogger.38",
"BehavesLike.Win32.Wabot.cc",
"W32/Dropper.AOIJ",
"TrojanDropper.Mudrop.amp",
"Trojan[Dropper]/Win32.Mudrop",
"TrojanDropper:Win32/Spiloog.A!bit",
"not-a-virus:PSWTool.Win32.WSLogger.a",
"Dropper/Win32.Mudrop.R19044",
"TrojanDropper.Mudrop",
"Trojan.DR.Mudrop!uBx16xyI0u0",
"Trojan-Dropper.Win32.Mudrop"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"also",
"discovered",
"and",
"analyzed",
"live",
",",
"misconfigured",
"malicious",
"command",
"and",
"control",
"servers",
"(",
"C2",
")",
",",
"from",
"which",
"we",
"were",
"able",
"to",
"identify",
"how",
"the",
"attacker",
"gets",
"new",
",",
"infected",
"apps",
"to",
"secretly",
"install",
"and",
"the",
"types",
"of",
"activities",
"they",
"are",
"monitoring",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BackDoor.Rurktar.3",
"Backdoor:MSIL/Rurktar.A"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"]",
"somtum",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"]",
"XXXX.ru/mms.apk",
"(",
"where",
"XXXX.ru",
"represents",
"the",
"hosting",
"provider",
"β",
"s",
"domain",
")",
",",
"we",
"named",
"this",
"malware",
"family",
"RuMMS",
"."
] | [
9,
9,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Jorik.IRCbot.iia",
"Win32.Trojan.WisdomEyes.16070401.9500.9935",
"Win32.Worm.Autorun.R",
"TrojWare.Win32.Kryptik.ACZQ",
"Win32.HLLW.Autoruner1.3120",
"Trojan.Jorik.Win32.159726",
"BehavesLike.Win32.RAHack.pt",
"Trojan/Jorik.ayqm",
"Trojan/Win32.IRCbot",
"Trojan.IRCbot",
"Win32.Crypt",
"W32/Jorik.FSC!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clod94b.Trojan.33b2",
"Trojan.Proxy.Webber.B",
"Trojan-Proxy/W32.Webber.6176",
"Trojan/Proxy.Webber.b",
"Trojan.PR.Webber!M1rEz2z+nTg",
"W32/Webber.XHQG-0071",
"Backdoor.Exdis",
"Webber.CB",
"Trojan-Proxy.Win32.Webber.b",
"Trojan.Proxy.Webber.B",
"Trojan.Win32.Webber.ejli",
"Hoax.W32.Renos",
"Trojan.Proxy.Webber.B",
"TrojWare.Win32.TrojanProxy.Webber.B",
"Trojan.Proxy.Webber.B",
"Trojan.Webber.Win32.42",
"BehavesLike.Win32.Dropper.xm",
"W32/Webber.J",
"TrojanProxy.Webber.r",
"TR/Proxy.Webber.B",
"Trojan[Proxy]/Win32.Webber",
"Win32.Troj.Webber.b.kcloud",
"TrojanProxy:Win32/Webber.B",
"Win-Trojan/Webber.6176",
"Trojan.Proxy.Webber.B",
"Win32/TrojanProxy.Webber.B",
"W32/DwnLdr.MO!tr",
"Proxy.2.AM",
"Trojan.Win32.Webber.aY",
"Win32/Trojan.a1a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Ports",
"6203",
"and",
"6204",
":",
"Facebook",
"extraction",
"service",
"."
] | [
1,
9,
9,
9,
16,
4,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"DLOADER.Trojan",
"Heuristic.Malware"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"BusyGasper",
"β",
"the",
"unfriendly",
"spy",
"29",
"AUG",
"2018",
"In",
"early",
"2018",
"our",
"mobile",
"intruder-detection",
"technology",
"was",
"triggered",
"by",
"a",
"suspicious",
"Android",
"sample",
"that",
",",
"as",
"it",
"turned",
"out",
",",
"belonged",
"to",
"an",
"unknown",
"spyware",
"family",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"One",
"of",
"the",
"obfuscation",
"tricks",
"included",
"by",
"the",
"malware",
"authors",
"in",
"a",
"VM",
"opcode",
"dispatcher",
"Even",
"armed",
"with",
"the",
"knowledge",
"we",
"have",
"described",
"so",
"far",
",",
"it",
"still",
"took",
"us",
"many",
"hours",
"to",
"write",
"a",
"full-fledged",
"opcode",
"interpreter",
"that",
"β",
"s",
"able",
"to",
"reconstruct",
"the",
"real",
"code",
"executed",
"by",
"FinFisher",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"The",
"malware",
"now",
"targets",
"more",
"countries",
"all",
"over",
"the",
"world",
"by",
"masquerading",
"as",
"official",
"post",
"office",
"and",
"transportation",
"services",
"apps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"They",
"are",
"never",
"well",
"detected",
"but",
"recent",
"ones",
"are",
"getting",
"very",
"poor",
"detections",
"by",
"antiviruses."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"However",
",",
"all",
"of",
"those",
"have",
"been",
"removed",
"from",
"Google",
"Play",
"β",
"despite",
"the",
"fact",
"that",
"some",
"of",
"them",
"didn",
"β",
"t",
"contain",
"any",
"adware",
"functionality",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"exploit",
"kit",
"evolves",
"on",
"an",
"almost",
"constant",
"basis."
] | [
16,
3,
11,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Application.Hacktool.MD",
"Tool.Kiser.Win32.1373",
"HackTool.Win32.HackAV.c",
"Application.Hacktool.MD",
"Application.Hacktool.MD",
"BehavesLike.Win32.BadFile.vm",
"W32/Application.MUHU-1657",
"HackTool.HackAV.e",
"HackTool:Win32/Kapahyku.A",
"Application.Hacktool.MD",
"HackTool.W32.HackAV.tn1i",
"HackTool.Win32.HackAV.c",
"Application.Hacktool.MD",
"Unwanted/Win32.HackAV.R173782",
"RiskWare.Tool.HCK",
"RiskWare.HackAV!",
"PUA.RiskWare.HackAV",
"Win32/Application.Hacktool.63c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"WildFire",
"Locker",
"ransomware",
"has",
"risen",
"from",
"the",
"dead",
"and",
"rebranded",
"itself",
"using",
"the",
"apropos",
"name",
"of",
"Hades",
"Locker."
] | [
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"We",
"β",
"ve",
"noticed",
"an",
"increase",
"in",
"the",
"number",
"of",
"attacks",
"using",
"this",
"event",
"as",
"a",
"lure",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Dos.Clodf80.Trojan.7c93",
"Trojan.AOL.PWS.SUPERNAUT.A",
"Trojan.AOL.PWS.SUPERNAUT.A",
"Smalltroj.JNY",
"Trojan.AOL.Supernaut",
"Trojan-IM.Win16.Supernaut",
"Trojan.AOL.PWS.SUPERNAUT.A",
"Trojan.Win16.Supernaut.hqzm",
"Trojan.Win16.A.IM-Supernaut.47117",
"Win16.Trojan-im.Supernaut.Ebgh",
"Trojan.AOL.PWS.SUPERNAUT.A",
"TrojWare.Win16.AOL.Supernaut",
"Trojan.AOL.PWS.SUPERNAUT.A",
"Trojan.Supernaut.Win16.1",
"Trojan/AOL.Supernaut",
"TR/Aol.Supernaut",
"Trojan[IM]/Win16.Supernaut",
"Win32.Troj.Undef.kcloud",
"Trojan.AOL.PWS.SUPERNAUT.A",
"Trojan.Win16.Supernaut.Au",
"Win16/AOL.Supernaut",
"NORMAL:Trojan.AOL.Supernaut!19246",
"Trojan-AOL.Win16.Supernaut",
"W16/AOL.D!tr",
"Trj/AOLPS.D",
"Win32/Trojan.AOL.52f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Boaxxe.E",
"Trojan.FakeMS.ED",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TROJ_ZBOT.SMUH",
"Win32.Trojan.Zbot.N",
"Packed.Win32.Krap.iu",
"Trojan.Win32.Krap.brabpa",
"Packer.W32.Krap.lKMc",
"TrojWare.Win32.Kazy.FOF",
"Trojan.DownLoad3.2720",
"Win32.Troj.Krap.iu.kcloud",
"Trojan.Graftor.D487A",
"Trojan/Win32.Plosa.R24487",
"Packed.Win32.Krap.iu",
"BScope.Malware-Cryptor.SB.01798",
"Bck/Qbot.AO",
"W32/ZBOT.HL!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Securityshield",
"W32/Trojan.JOHS-0158",
"Trojan-FakeAV.Win32.SecurityShield.vip",
"Trojan.Win32.FakeAV.euwntc",
"Win32.Trojan-fakeav.Securityshield.Syrj",
"Trojan.Click2.45032",
"BehavesLike.Win32.Spyware.dc",
"TR/Pingdel.A.15",
"W32.W.AutoIt.mr6E",
"Trojan-FakeAV.Win32.SecurityShield.vip",
"Trojan.Win32.Pingdel",
"W32/SecurityShield.RMG!tr",
"Win32/Trojan.228"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Dropper.Msil.BO"
] | [
16,
3,
16,
16,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Vetor.PE",
"Virus.Win32.Virut.1!O",
"W32.Virut.G",
"W32.Virut.CF",
"Win32/Virut.17408",
"PE_VIRUX.O",
"Win.Phishing.NikoLata-6332081-0",
"Win32.Virus.Virut.Q",
"Virus.Win32.Virut.ce",
"Virus.Win32.Virut.hpeg",
"Virus.Win32.Virut.CE",
"Win32.Virut.56",
"PE_VIRUX.O",
"Trojan.MSIL.TrojanClicker",
"Win32/Virut.bt",
"Virus/Win32.Virut.ce",
"Win32.Virut.cr.61440",
"TrojanClicker:MSIL/Worfload.A!bit",
"W32.Virut.lqtW",
"Virus.Win32.Virut.ce",
"Win32/Virut.F",
"Virus.Virut.14",
"W32/Sality.AO",
"Win32/Virut.NBP",
"Virus.Win32.VirutChangeEntry.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Typically,",
"file-less",
"malware",
"has",
"been",
"observed",
"in",
"the",
"context",
"of",
"Exploit",
"Kits",
"such",
"as",
"Angler."
] | [
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
3
] |
[
"These",
"lures",
"were",
"expected,",
"until",
"we",
"started",
"digging",
"into",
"the",
"actual",
"documents",
"attached",
"and",
"saw",
"an",
"interesting",
"method",
"within",
"the",
"Visual",
"Basic",
"VB",
"macros",
"in",
"the",
"attached",
"documents",
"used",
"for",
"dropping",
"the",
"malware."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
3,
11,
11,
11,
16,
16,
1,
9,
16,
16,
16,
16,
3
] |
[
"However,",
"the",
"occasional",
"functional",
"enhancements",
"combined",
"with",
"its",
"multiple",
"layers",
"of",
"obfuscation",
"and",
"server-side",
"polymorphism",
"periodically",
"breathe",
"new",
"life",
"into",
"this",
"seemingly",
"immortal",
"malware."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.CombotoD.Trojan",
"Backdoor.Minaps",
"BKDR_MINAPS.A",
"W32/Trojan.WDQB-6441",
"Backdoor.Wakeminap!g1",
"BKDR_MINAPS.A",
"Win.Downloader.133181-1",
"Trojan.Win32.Snojan.jj",
"Trojan.Win32.A.Downloader.52224.HP",
"DLOADER.Trojan",
"Backdoor:Win32/Minaps.A",
"Trojan.Win32.Snojan.jj",
"Win32.Trojan.Snojan.Wrgx",
"Win32/Trojan.cb9"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Compromised",
"hosts",
"cause",
"a",
"victim's",
"machine",
"to",
"be",
"attached",
"to",
"the",
"Andromeda",
"botnet,",
"giving",
"attackers",
"the",
"ability",
"to",
"push",
"plugins",
"or",
"additional",
"malware",
"onto",
"these",
"machines."
] | [
1,
9,
16,
16,
5,
13,
16,
16,
16,
16,
16,
3,
11,
16,
6,
16,
16,
16,
16,
3,
16,
3,
11,
16,
16,
5
] |
[
"In",
"early",
"2016",
"the",
"Callisto",
"Group",
"began",
"sending",
"highly",
"targeted",
"spear",
"phishing",
"emails",
"with",
"malicious",
"attachments",
"that",
"contained,",
"as",
"their",
"final",
"payload,",
"the",
"Scout",
"malware",
"tool",
"from",
"the",
"HackingTeam",
"RCS",
"Galileo",
"platform."
] | [
16,
0,
8,
6,
14,
14,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
3,
11,
11,
11,
11,
11,
16,
16,
4,
5,
13,
13
] |
[
"Our",
"analysis",
"reveals",
"that",
"APT33",
"is",
"a",
"capable",
"group",
"that",
"has",
"carried",
"out",
"cyber",
"espionage",
"operations",
"since",
"at",
"least",
"2013."
] | [
16,
16,
16,
16,
6,
16,
16,
16,
6,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
0
] |
[
"Package",
"Name",
"SHA256",
"digest",
"SHA1",
"certificate",
"com.network.android",
"98ca5f94638768e7b58889bb5df4584bf5b6af56b188da48c10a02648791b30c",
"516f8f516cc0fd8db53785a48c0a86554f75c3ba",
"com.network.android",
"5353212b70aa096d918e4eb6b49eb5ad8f59d9bec02d089e88802c01e707c3a1",
"44f6d1caa257799e57f0ecaf4e2e216178f4cb3d",
"com.binary.sms.receiver",
"9fae5d148b89001555132c896879652fe1ca633d35271db34622248e048c78ae",
"7771af1ad3a3d9c0b4d9b55260bb47c2692722cf",
"com.android.copy",
"e384694d3d17cd88ec3a66c740c6398e07b8ee401320ca61e26bdf96c20485b4",
"7771af1ad3a3d9c0b4d9b55260bb47c2692722cf",
"com.android.copy",
"12e085ab85db887438655feebd249127d813e31df766f8c7b009f9519916e389",
"7771af1ad3a3d9c0b4d9b55260bb47c2692722cf",
"com.android.copy",
"6348104f8ef22eba5ac8ee737b192887629de987badbb1642e347d0dd01420f8",
"31a8633c2cd67ae965524d0b2192e9f14d04d016",
"FinFisher",
"exposed",
":",
"A",
"researcher",
"β",
"s",
"tale",
"of",
"defeating",
"traps",
",",
"tricks",
",",
"and",
"complex",
"virtual",
"machines",
"March",
"1",
",",
"2018",
"Office",
"365",
"Advanced",
"Threat",
"Protection",
"(",
"Office",
"365",
"ATP",
")",
"blocked",
"many",
"notable",
"zero-day",
"exploits",
"in",
"2017",
"."
] | [
16,
16,
16,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
13,
13,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"However",
",",
"within",
"six",
"months",
"the",
"malicious",
"actors",
"added",
"the",
"capability",
"to",
"infect",
"iOS",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"This",
"malware",
"has",
"been",
"around",
"since",
"2011",
"and",
"shows",
"no",
"signs",
"of",
"stopping."
] | [
16,
3,
16,
16,
16,
16,
0,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"4",
"."
] | [
16,
16,
16
] |
[
"COVERAGE",
"Cisco",
"Cloud",
"Web",
"Security",
"(",
"CWS",
")",
"or",
"Web",
"Security",
"Appliance",
"(",
"WSA",
")",
"web",
"scanning",
"prevents",
"access",
"to",
"malicious",
"websites",
"and",
"detects",
"malware",
"used",
"in",
"these",
"attacks",
"."
] | [
16,
4,
5,
13,
13,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9982",
"Trojan.Win32.Dwn.eenglt",
"Win32.Trojan.Spy.Peqf",
"Trojan.DownLoader14.35508",
"BehavesLike.Win32.HToolMimiKatz.dc",
"Trojan.Symmi.D8341",
"PWS:Win32/Banker.UC!bit",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Swisyn.aqrf",
"Win32.Trojan.WisdomEyes.16070401.9500.9996",
"Win.Trojan.Swisyn-969",
"Trojan.Win32.Swisyn.deruf",
"Trojan.Win32.A.Swisyn.7680.G",
"Uds.Dangerousobject.Multi!c",
"Trojan.Swisyn.Win32.16931",
"BehavesLike.Win32.Trojan.zt",
"Trojan/Swisyn.njs",
"Trojan/Win32.Swisyn",
"TrojanDownloader:Win32/Surin.B",
"Trojan.Swisyn!uy708DPUCgU",
"Trojan.Win32.Swisyn",
"W32/Dx.WKM!tr",
"Win32/Trojan.ee6"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"addition",
",",
"just",
"as",
"uncovering",
"new",
"characteristics",
"is",
"important",
",",
"finding",
"ones",
"we",
"β",
"ve",
"also",
"seen",
"in",
"a",
"different",
"malware",
"family",
"like",
"FakeSpy",
"also",
"provides",
"valuable",
"insight",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16
] |
[
"Bookworm",
"has",
"little",
"malicious",
"functionality",
"built-in,",
"with",
"its",
"only",
"core",
"ability",
"involving",
"stealing",
"keystrokes",
"and",
"clipboard",
"contents."
] | [
3,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
1,
9
] |
[
"]",
"qwq-japan",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm/W32.VBNA.28672.Z",
"Trojan-Ransom.Win32.Blocker!O",
"Worm.VBNA.Win32.168532",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win32/VB.OHY",
"HT_DROJ_GG310200.UVPM",
"Trojan-Ransom.Win32.Blocker.cdug",
"Trojan.Win32.VB.crkzva",
"Worm.Win32.VBNA.28672.I",
"Trojan.MulDrop4.59381",
"HT_DROJ_GG310200.UVPM",
"BehavesLike.Win32.VBObfus.mz",
"Worm/VBNA.hggx",
"Trojan/Win32.Vilsel.gic",
"Trojan.Barys.D819",
"Trojan-Ransom.Win32.Blocker.cdug",
"Trojan:Win32/Droj.A",
"Worm/Win32.VBNA.R79506",
"Worm.VBNA",
"Trojan.Crypt"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Figure",
"6",
"."
] | [
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.MSIL",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.DownLoader26.11210",
"TR/Dropper.MSIL.aexpd",
"Trojan:MSIL/Upadter.A",
"Trj/GdSda.A",
"Win32.Trojan.Inject.Auto",
"Trojan.MSIL.Inject",
"Win32/Backdoor.990"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojandownloader.Tosct",
"Win32.Trojan.WisdomEyes.16070401.9500.9994",
"BKDR_WEBRV.A",
"Trojan.Click2.39104",
"BKDR_WEBRV.A",
"W32/Trojan.KRMY-0312",
"Trojan.Heur.JP.ED64BF",
"TrojanDownloader:Win32/Tosct.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Today,",
"RSA",
"Research",
"published",
"an",
"in-depth",
"report",
"on",
"a",
"commercial",
"VPN",
"network,",
"originating",
"in",
"China,",
"which",
"we",
"are",
"calling",
"Terracotta"
] | [
16,
4,
12,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
2,
16,
16,
16,
16,
3
] |
[
"At",
"the",
"end",
"of",
"March",
"2017,",
"we",
"detected",
"another",
"malicious",
"document",
"leveraging",
"an",
"unknown",
"vulnerability",
"in",
"EPS",
"and",
"a",
"recently",
"patched",
"vulnerability",
"in",
"Windows",
"Graphics",
"Device",
"Interface",
"GDI",
"to",
"drop",
"malware."
] | [
16,
16,
16,
16,
0,
8,
16,
16,
16,
1,
9,
16,
16,
7,
15,
16,
5,
16,
16,
16,
16,
7,
16,
5,
13,
13,
13,
16,
16,
16,
3
] |
[
"Google",
"also",
"stated",
"that",
"they",
"are",
"taking",
"numerous",
"steps",
"including",
"proactively",
"notifying",
"affected",
"accounts",
",",
"revoking",
"affected",
"tokens",
"and",
"deploying",
"SafetyNet",
"improvements",
"to",
"protect",
"users",
"from",
"these",
"apps",
"in",
"the",
"future",
"."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"example",
"shows",
"one",
"possible",
"implementation",
"of",
"this",
"technique",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"reported",
"it",
"to",
"Google",
"on",
"May",
"16",
",",
"2020",
"and",
"since",
"May",
"19",
",",
"2020",
"the",
"app",
"has",
"no",
"longer",
"been",
"available",
"on",
"Google",
"Play",
"."
] | [
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"Increasingly,",
"cyberattackers",
"have",
"been",
"leveraging",
"non-malware",
"attack",
"methods",
"to",
"target",
"vulnerable",
"organizations."
] | [
16,
6,
16,
16,
16,
3,
11,
16,
16,
16,
7,
15
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Troj.W32.Jorik.Virut.ltFj",
"BehavesLike.Win32.Parite.cm",
"Trojan.Kazy.D23845",
"Trojan:Win32/Dantmil.A",
"Win32/RiskWare.PEMalform.E"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Downloader.NSIS.BI",
"Trojan.NSIS.Minix.A",
"Trojan.Downloader.NSIS.BI",
"TROJ_DLDR.SMIM",
"Trackware.MegaSearch",
"TROJ_DLDR.SMIM",
"Win.Trojan.Clicker-3867",
"Trojan.Downloader.NSIS.BI",
"Trojan.Downloader.NSIS.BI",
"Trojan.Win32.Dwn.kvabt",
"Trojan.Downloader.NSIS.BI",
"Trojan.DownLoader4.20561",
"Downloader.NSIS.Win32.1874",
"TrojanDownloader:Win32/Minix.A",
"Trj/CI.A",
"W32/Dloader.EP!tr.NSIS",
"Win32/Trojan.Downloader.79d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"malware",
"connects",
"the",
"dots",
"and",
"uses",
"these",
"two",
"components",
"to",
"create",
"a",
"special",
"type",
"of",
"notification",
"that",
"triggers",
"the",
"ransom",
"screen",
"via",
"the",
"callback",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Depending",
"on",
"the",
"Trojan",
"version",
",",
"dynamically",
"generated",
"subdomains",
"can",
"also",
"be",
"used",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Infostealer.Lokibot",
"Trojan.PWS.Stealer.18836",
"TROJ_HPUTOTI.SMQ",
"BehavesLike.Win32.Downloader.dh",
"DR/Autoit.ppevb",
"Trojan:Win32/Lepoh.A",
"Spyware.LokiBot",
"Trojan.Win32.Injector",
"Trj/CI.A",
"Win32/Trojan.15d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Redsip.49152",
"Backdoor.Redsip.Win32.2",
"Trojan.Heur.LP.EDEA74",
"W32/Backdoor2.HIOG",
"Hacktool.Keylogger",
"Win32/Redsip.A",
"BKDR_REDSIP.C",
"Trojan.Win32.Redsip.dcevd",
"Uds.Dangerousobject.Multi!c",
"BKDR_REDSIP.C",
"Backdoor.Win32.Redsip",
"W32/Backdoor.WNDK-6859",
"TR/Spy.49152.662",
"Trojan[Backdoor]/Win32.Redsip",
"Win32.Hack.Redsip.b.kcloud",
"Backdoor:Win32/Redsip.B!svc",
"Win-Trojan/Nightdragon.49152",
"Backdoor.Redsip",
"Win32/Redsip.AA",
"Win32.Trojan.Spy.Lohv",
"W32/REDSIP.B!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Unit",
"42",
"has",
"reported",
"on",
"various",
"Sofacy",
"group",
"attacks",
"over",
"the",
"last",
"year,",
"most",
"recently",
"with",
"a",
"post",
"on",
"Komplex,",
"an",
"OS",
"X",
"variant",
"of",
"a",
"tool",
"commonly",
"used",
"by",
"the",
"Sofacy",
"group."
] | [
1,
9,
16,
16,
16,
16,
6,
14,
16,
16,
16,
0,
8,
16,
16,
16,
16,
16,
16,
3,
16,
5,
13,
16,
16,
16,
3,
16,
16,
16,
6,
14,
14
] |
[
"However",
",",
"this",
"time",
"the",
"app",
"name",
"for",
"both",
"HenBox",
"and",
"the",
"embedded",
"app",
"were",
"identical",
":",
"Islamawazi",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
5,
16
] |
[
"We",
"would",
"also",
"like",
"to",
"mention",
"that",
"if",
"you",
"come",
"across",
"an",
"app",
"hiding",
"it",
"'s",
"icon",
",",
"always",
"try",
"to",
"search",
"for",
"the",
"app",
"in",
"your",
"device",
"settings",
"(",
"by",
"going",
"to",
"Settings",
"-",
">",
"Apps",
"-",
">",
"Search",
"for",
"icon",
"that",
"was",
"hidden",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Analyzing",
"malware",
"is",
"often",
"like",
"solving",
"a",
"puzzle,",
"you",
"have",
"to",
"do",
"it",
"piece",
"by",
"piece",
"to",
"reach",
"the",
"final",
"image."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"By",
"connecting",
"multiple",
"Black",
"Vine",
"campaigns,",
"we",
"traced",
"how",
"the",
"attack",
"group",
"has",
"evolved",
"over",
"the",
"last",
"three",
"years."
] | [
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
0,
8,
8
] |
[
"Dump",
"data",
"from",
"the",
"Viber",
"messenger",
"app",
"."
] | [
16,
16,
16,
16,
5,
13,
16,
16
] |
[
"Following",
"simple",
"best",
"practices",
",",
"like",
"strictly",
"downloading",
"applications",
"or",
"any",
"files",
"from",
"trusted",
"sources",
"and",
"being",
"wary",
"of",
"unsolicited",
"messages",
",",
"can",
"also",
"prevent",
"similar",
"attacks",
"from",
"compromising",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"-",
"There",
"were",
"two",
"interesting",
"sub-classes",
"found",
"inside",
"Main",
"Activity",
":",
"Receiver",
"and",
"Sender",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Zusy.D2F05E",
"Win32.Trojan.WisdomEyes.16070401.9500.9757",
"Trojan.Win32.Badur.cubwxj",
"TrojWare.Win32.Delf.ebs",
"Trojan.DownLoader9.4478",
"BehavesLike.Win32.Sytro.ch",
"TrojanDownloader:Win32/Cefunlor.A",
"Trojan/Win32.Downloader.R91863",
"TScope.Trojan.Delf",
"Spyware.PasswordStealer",
"Trojan-Dropper.Delf",
"W32/Delf.RQV!tr.dldr",
"Trj/Dtcontx.L"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Our",
"data",
"shows",
",",
"on",
"average",
",",
"about",
"three",
"requests",
"per",
"hour",
"to",
"the",
"drop",
"host",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Vetor.PE",
"Virus.Win32.Virut.1!O",
"W32.Virut.G",
"W32.Virut.CF",
"Win32/Virut.17408",
"PE_VIRUX.R",
"Virus.Win32.Virut.ce",
"Virus.Win32.Virut.hpeg",
"W32.Virut.lGNe",
"Virus.Win32.Virut.CE",
"Win32.Virut.56",
"Virus.Virut.Win32.1938",
"PE_VIRUX.R",
"BehavesLike.Win32.Ramnit.fh",
"Trojan.Win32.Malex",
"Win32/Virut.bt",
"Win32.Virut.dd.368640",
"TrojanDownloader:Win32/Otlard.D",
"Virus.Win32.Virut.ce",
"Win32.Virus.Virut.U",
"Win32/Virut.F",
"Virus.Virut.14",
"Win32/Virut.NBP",
"W32/Virut.CE",
"W32/Sality.AO",
"Virus.Win32.VirutChangeEntry.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.SilentSpy.zmwjp",
"Backdoor.SilentSpy",
"Silentspy.F",
"Win32/SilentSpy.208",
"BKDR_SILENTSPY.C",
"Trojan.W32.Fadedoor.10B-3",
"Backdoor.Win32.SilentSpy.208",
"Backdoor.SilentSpy.D",
"Backdoor.Win32.SilentSpy.208",
"BackDoor.Silent.208",
"BKDR_SILENTSPY.C",
"Win32.Hack.SilentSpy.20.kcloud",
"Backdoor.Win32.SilentSpy_208.559104",
"Win-Trojan/SilentSpy.559104",
"Backdoor.SilentSpy",
"Win32/SilentSpy.208",
"Backdoor.Win32.SilentSpy.200",
"W32/Bdoor.ZT!tr.bdr",
"BackDoor.Silentspy.G"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Analysis",
"indicates",
"there",
"are",
"currently",
"two",
"distinct",
"variants",
"of",
"ViperRAT",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HackTool.Incognito",
"Trojan.Win32.Meterpreter.exjxlb",
"Trojan.Win64.Meterpreter",
"W32/Trojan.VCYK-3916",
"HackTool.Meterpreter.ei",
"HackTool/Win32.Meterpreter",
"Trj/GdSda.A",
"Win32.Hacktool.Meterpreter.Phqd",
"Win32/Trojan.Hacktool.8d0"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm/W32.PadoBot.86528",
"W32.Sality.U",
"Worm.Padobot.D",
"Win32/Sality.NBA",
"W32/Korgo.V",
"W32.Sality.AE",
"Korgo.V",
"PE_SALITY.RL",
"Worm.Padobot.M",
"Net-Worm.Win32.Padobot.m",
"Worm.Padobot.BV.Dam",
"Worm.Korgo",
"Net-Worm.Win32.Padobot!IK",
"Worm.Padobot.BV.Dam",
"Win32.Lsabot",
"W32/Sality.AT",
"PE_SALITY.RL",
"Win32/Sality.AA",
"Worm:Win32/Korgo.V",
"Win32.Sality.N",
"Worm.Padobot.BV.Dam",
"W32/Korgo.V",
"Win32/IRCBot.worm.variant",
"Virus.Win32.Sality.bakb",
"Malware.Sality",
"Worm.Padobot.bl",
"Net-Worm.Win32.Padobot",
"W32/Padobot!worm.im",
"Worm/Korgo.A",
"W32/Korgo.U.worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"first",
"message",
"after",
"establishing",
"the",
"connection",
"is",
"always",
"sent",
"by",
"the",
"server",
"β",
"the",
"most",
"important",
"thing",
"it",
"contains",
"is",
"a",
"random",
"128-byte",
"key",
"used",
"for",
"encrypting",
"further",
"communication."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.SampleswareTG.Trojan",
"Trojan-GameThief.Win32.Magania!O",
"Backdoor.Farfli.O",
"Trojan/Magania.eken",
"Win32.Trojan.Farfli.ai",
"Win32/Farfli.GKH",
"Win.Trojan.Magania-19224",
"Trojan-GameThief.Win32.Magania.uagj",
"Trojan.Win32.Magania.bvkxn",
"Troj.W32.MMM.ljA2",
"Backdoor.Win32.Gh0st.g",
"Trojan.Magania.Win32.38676",
"BKDR_INJECT.SMJ",
"BehavesLike.Win32.Backdoor.cc",
"Backdoor/IRCBot.qan",
"Trojan.Barys.62",
"Trojan-GameThief.Win32.Magania.uagj",
"Trojan/Win32.PcClient.R12944",
"TrojanPSW.Magania",
"Win32/Farfli.AK",
"Trojan.Farfli!czCLTsqt/Nw",
"Backdoor.Win32.FirstInj",
"Backdoor.Win32.Gh0st.BH"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Trojan",
"activity",
"At",
"the",
"time",
"of",
"the",
"writing",
"of",
"this",
"post",
",",
"all",
"URLs",
"(",
"see",
"IOC",
"section",
")",
"found",
"on",
"the",
"sample",
"were",
"inactive",
",",
"and",
"it",
"does",
"not",
"seem",
"to",
"be",
"widespread",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Several",
"months",
"ago",
"I",
"examined",
"a",
"malware-tainted",
"Word",
"document",
"titled",
"ISIS_twitter_list.doc.",
"I",
"didn't",
"think",
"much",
"of",
"it",
"and",
"quickly",
"moved",
"on",
"after",
"a",
"cursory",
"analysis."
] | [
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
Subsets and Splits