tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "The", "Locky", "variant", "of", "ransomware", "has", "been", "responsible", "for", "huge", "amounts", "of", "spam", "messages", "being", "sent", "on", "a", "daily", "basis." ]
[ 3, 11, 11, 16, 3, 16, 16, 16, 11, 16, 16, 16, 1, 9, 16, 16, 16, 16, 0, 8 ]
[ "]", "ponethus", "[", "." ]
[ 9, 9, 9, 9 ]
[ "TABLE", "OF", "CONTENTS", "Security", "Recommendations", "Introduction", "Threat", "Analysis", "Common", "Features", "Unique", "Features", "by", "Version", "Malware", "Under", "Active", "Development", "Suspected", "Detection", "Tests", "by", "the", "Threat", "Actor", "EventBot", "Infrastructure", "Cybereason", "Mobile", "Conclusion", "Indicators", "of", "Compromise", "MITRE", "ATT", "&", "CK", "for", "Mobile", "Breakdown", "SECURITY", "RECOMMENDATIONS", "Keep", "your", "mobile", "device", "up-to-date", "with", "the", "latest", "software", "updates", "from", "legitimate", "sources", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "intricate", "anti-analysis", "methods", "reveal", "how", "much", "effort", "the", "FinFisher", "authors", "exerted", "to", "keep", "the", "malware", "hidden", "and", "difficult", "to", "analyze", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Fake", "SMS", "message", "luring", "users", "to", "enter", "a", "fake", "website", ",", "which", "contains", "the", "malicious", "APK", "(", "JPCERT", "report", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.AE5C", "Downloader.Tibs.Win32.6", "Trojan/Tibs.al", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "Trojan.Packed.13", "Packed.Win32.Tibs.al", "Trojan.Win32.Small.erlei", "Win32.Packed.Tibs.Wtdn", "TrojWare.Win32.TrojanDownloader.Tibs.~mm", "Trojan.Packed.142", "Trojan.Win32.Crypt", "TrojanDownloader.Tibs.amzo", "TR/Small.DBY.LH.14", "Win32.TrojDownloader.Tibs.mm.kcloud", "TrojanDownloader:Win32/Nuwar.B", "Trojan.Heur.TP.ED17A6", "Troj.Downloader.W32.Tibs.mm!c", "Packed.Win32.Tibs.al", "Trojan-Downloader.Revelation.Tibs.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Lookout", "notified", "Google", "of", "the", "finding", "and", "Google", "removed", "the", "app", "immediately", "while", "also", "taking", "action", "on", "it", "in", "Google", "Play", "Protect", "." ]
[ 4, 16, 4, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16 ]
[ "Reports", "on", "this", "malware", "family", "have", "previously", "been", "published", "by", "both", "Intel", "Security", "and", "Microsoft." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 4 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Spy/W32.KeyLogger.178176.B", "Win32.Backdoor.Rbot.1470B0D03", "WORM_SDBOT.CTJ", "Virus.Win32.Rbot!IK", "Worm/Rbot.210944", "WORM_SDBOT.CTJ", "Heuristic.BehavesLike.Win32.PasswordStealer.H", "Virus.Win32.Rbot" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Methods", "and", "techniques", "2013", "not", "only", "saw", "a", "radical", "increase", "in", "output", "from", "mobile", "virus", "writers", "but", "also", "saw", "them", "actively", "applying", "methods", "and", "technologies", "that", "allowed", "cybercriminals", "to", "use", "their", "malware", "more", "effectively", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "While", "some", "findings", "where", "very", "interesting,", "others", "were", "misleading", "or", "simply", "wrong." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Mexico", "has", "previously", "confirmed", "that", "it", "is", "a", "purchaser", "of", "NSO", "Group's", "spyware." ]
[ 2, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 3 ]
[ "The", "GolfSpy", "malware", "embedded", "in", "the", "apps", "is", "hardcoded", "with", "an", "internal", "name", "used", "by", "the", "attacker", "." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "phone", "belonging", "to", "the", "Interdisciplinary", "Group", "of", "Independent", "Experts", "GIEI,", "a", "group", "of", "investigators", "from", "several", "countries,", "was", "sent", "text", "messages", "with", "links", "to", "NSO's", "exploit", "infrastructure" ]
[ 16, 5, 16, 16, 4, 12, 12, 12, 12, 12, 12, 16, 4, 16, 4, 16, 16, 2, 16, 1, 9, 9, 9, 9, 16, 3, 11, 5 ]
[ "This", "blog", "post", "describes", "another", "attack", "campaign", "where", "attackers", "used", "the", "Uri", "terror", "attack", "and", "Kashmir", "protest", "themed", "spear", "phishing", "emails", "to", "target", "officials", "in", "the", "Indian", "Embassies", "and", "Indian", "Ministry", "of", "External", "Affairs", "MEA." ]
[ 16, 16, 12, 16, 16, 6, 14, 16, 6, 16, 16, 1, 9, 9, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 16, 4, 12, 12, 12, 12, 12, 12, 12, 12, 12 ]
[ "After", "publication", "I", "was", "contacted", "by", "another", "analyst", "who", "was", "able", "to", "link", "the", "information", "from", "my", "blog", "to", "other", "samples", "from", "an", "actual", "campaign." ]
[ 16, 16, 4, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 12, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14 ]
[ "In", "fact", ",", "with", "full", "access", "to", "the", "compromised", "Android", "smartphone", ",", "the", "opportunities", "for", "criminals", "to", "wreak", "havoc", "are", "significant", "–", "such", "as", "erasing", "infected", "phones", "or", "launching", "man-in-the-middle", "(", "MITM", ")", "attacks", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Etumbotb", "Trojan/Ixeshe.i", "Win32.Trojan.WisdomEyes.16070401.9500.9996", "W32/Etumbot.I", "Backdoor.Typideg", "Trojan.Etumbot.1", "Trojan.Ixeshe.Win32.30", "BKDR_ETUMBOT.UQU", "Trojan.Etumbot", "W32/Etumbot.UDKV-8115", "Trojan.Graftor.D234F5", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "researcher", "came", "upon", "an", "interesting", "set", "of", "emails,", "which", "were", "soon", "determined", "to", "be", "part", "of", "a", "widespread", "spam", "campaign." ]
[ 16, 4, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14 ]
[ "Version", "#", "1", ":", "June", "2019", "β€”", "Domain", ":", "databit", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "The", "site", "was", "infected", "with", "an", "iframe", "injector", "that", "redirects", "to", "Angler", "EK." ]
[ 16, 1, 16, 16, 16, 16, 1, 9, 16, 16, 16, 3, 11 ]
[ "The", "number", "of", "LINE", "users", "in", "Taiwan", "reaches", "up", "to", "17", "million", "in", "the", "same", "year." ]
[ 16, 16, 16, 4, 16, 16, 2, 16, 16, 16, 16, 16, 16, 16, 0, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.RockRat.S1875120", "Troj.W32.Rockrat!c", "Trojan.Johnnie.D1566D", "Win32.Trojan.WisdomEyes.16070401.9500.9957", "W32/Trojan.IKOU-3732", "Backdoor.Rokrat", "TROJ_KORPODE.A", "Win.Trojan.Rokrat-6443187-0", "Trojan.Win32.RockRat.exmijf", "Trojan.Inject3.2444", "Trojan.RockRat.Win32.1", "W32/RockRat.A", "Trojan.RockRat.a", "W32/FakeAV.BCMZ!tr", "Trojan/Win32.RockRat", "Trojan:Win32/Korpode.A!dha", "Trojan/Win32.Loader.R219535", "Trj/CI.A", "Win32.Trojan.Rockrat.Ljuk", "Trojan.RockRat!", "Win32/Trojan.549" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Here", "’", "s", "another", "example", "of", "such", "an", "attack", "hitting", "Windows", "users", ":", "Going", "back", "to", "the", "Android", "Package", "(", "APK", ")", "file", "was", "attached", "to", "the", "e-mail", ",", "this", "is", "pushing", "an", "Android", "application", "named", "β€œ", "WUC", "’", "s", "Conference.apk", "”", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 11, 16, 16 ]
[ "The", "injected", "code", "attempts", "to", "download", "them", "all", "and", "execute." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper.Win32.Mudrop!O", "Spyware.WSLogger", "Trojan/Dropper.Mudrop.hs", "Win32.Trojan.WisdomEyes.16070401.9500.9934", "W32/Risk.AAJK-2149", "Infostealer.Tarno.B", "Win32/Mdrop.MD", "not-a-virus:PSWTool.Win32.WSLogger.a", "Trojan.Win32.Mudrop.dgpnb", "Trojan.WSLogger.38", "BehavesLike.Win32.Wabot.cc", "W32/Dropper.AOIJ", "TrojanDropper.Mudrop.amp", "Trojan[Dropper]/Win32.Mudrop", "TrojanDropper:Win32/Spiloog.A!bit", "not-a-virus:PSWTool.Win32.WSLogger.a", "Dropper/Win32.Mudrop.R19044", "TrojanDropper.Mudrop", "Trojan.DR.Mudrop!uBx16xyI0u0", "Trojan-Dropper.Win32.Mudrop" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "also", "discovered", "and", "analyzed", "live", ",", "misconfigured", "malicious", "command", "and", "control", "servers", "(", "C2", ")", ",", "from", "which", "we", "were", "able", "to", "identify", "how", "the", "attacker", "gets", "new", ",", "infected", "apps", "to", "secretly", "install", "and", "the", "types", "of", "activities", "they", "are", "monitoring", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "BackDoor.Rurktar.3", "Backdoor:MSIL/Rurktar.A" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "]", "somtum", "[", "." ]
[ 9, 9, 9, 9 ]
[ "]", "XXXX.ru/mms.apk", "(", "where", "XXXX.ru", "represents", "the", "hosting", "provider", "’", "s", "domain", ")", ",", "we", "named", "this", "malware", "family", "RuMMS", "." ]
[ 9, 9, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Jorik.IRCbot.iia", "Win32.Trojan.WisdomEyes.16070401.9500.9935", "Win32.Worm.Autorun.R", "TrojWare.Win32.Kryptik.ACZQ", "Win32.HLLW.Autoruner1.3120", "Trojan.Jorik.Win32.159726", "BehavesLike.Win32.RAHack.pt", "Trojan/Jorik.ayqm", "Trojan/Win32.IRCbot", "Trojan.IRCbot", "Win32.Crypt", "W32/Jorik.FSC!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clod94b.Trojan.33b2", "Trojan.Proxy.Webber.B", "Trojan-Proxy/W32.Webber.6176", "Trojan/Proxy.Webber.b", "Trojan.PR.Webber!M1rEz2z+nTg", "W32/Webber.XHQG-0071", "Backdoor.Exdis", "Webber.CB", "Trojan-Proxy.Win32.Webber.b", "Trojan.Proxy.Webber.B", "Trojan.Win32.Webber.ejli", "Hoax.W32.Renos", "Trojan.Proxy.Webber.B", "TrojWare.Win32.TrojanProxy.Webber.B", "Trojan.Proxy.Webber.B", "Trojan.Webber.Win32.42", "BehavesLike.Win32.Dropper.xm", "W32/Webber.J", "TrojanProxy.Webber.r", "TR/Proxy.Webber.B", "Trojan[Proxy]/Win32.Webber", "Win32.Troj.Webber.b.kcloud", "TrojanProxy:Win32/Webber.B", "Win-Trojan/Webber.6176", "Trojan.Proxy.Webber.B", "Win32/TrojanProxy.Webber.B", "W32/DwnLdr.MO!tr", "Proxy.2.AM", "Trojan.Win32.Webber.aY", "Win32/Trojan.a1a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Ports", "6203", "and", "6204", ":", "Facebook", "extraction", "service", "." ]
[ 1, 9, 9, 9, 16, 4, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "DLOADER.Trojan", "Heuristic.Malware" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "BusyGasper", "–", "the", "unfriendly", "spy", "29", "AUG", "2018", "In", "early", "2018", "our", "mobile", "intruder-detection", "technology", "was", "triggered", "by", "a", "suspicious", "Android", "sample", "that", ",", "as", "it", "turned", "out", ",", "belonged", "to", "an", "unknown", "spyware", "family", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "One", "of", "the", "obfuscation", "tricks", "included", "by", "the", "malware", "authors", "in", "a", "VM", "opcode", "dispatcher", "Even", "armed", "with", "the", "knowledge", "we", "have", "described", "so", "far", ",", "it", "still", "took", "us", "many", "hours", "to", "write", "a", "full-fledged", "opcode", "interpreter", "that", "’", "s", "able", "to", "reconstruct", "the", "real", "code", "executed", "by", "FinFisher", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "The", "malware", "now", "targets", "more", "countries", "all", "over", "the", "world", "by", "masquerading", "as", "official", "post", "office", "and", "transportation", "services", "apps", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "They", "are", "never", "well", "detected", "but", "recent", "ones", "are", "getting", "very", "poor", "detections", "by", "antiviruses." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "However", ",", "all", "of", "those", "have", "been", "removed", "from", "Google", "Play", "–", "despite", "the", "fact", "that", "some", "of", "them", "didn", "’", "t", "contain", "any", "adware", "functionality", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "exploit", "kit", "evolves", "on", "an", "almost", "constant", "basis." ]
[ 16, 3, 11, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Application.Hacktool.MD", "Tool.Kiser.Win32.1373", "HackTool.Win32.HackAV.c", "Application.Hacktool.MD", "Application.Hacktool.MD", "BehavesLike.Win32.BadFile.vm", "W32/Application.MUHU-1657", "HackTool.HackAV.e", "HackTool:Win32/Kapahyku.A", "Application.Hacktool.MD", "HackTool.W32.HackAV.tn1i", "HackTool.Win32.HackAV.c", "Application.Hacktool.MD", "Unwanted/Win32.HackAV.R173782", "RiskWare.Tool.HCK", "RiskWare.HackAV!", "PUA.RiskWare.HackAV", "Win32/Application.Hacktool.63c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "WildFire", "Locker", "ransomware", "has", "risen", "from", "the", "dead", "and", "rebranded", "itself", "using", "the", "apropos", "name", "of", "Hades", "Locker." ]
[ 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "We", "’", "ve", "noticed", "an", "increase", "in", "the", "number", "of", "attacks", "using", "this", "event", "as", "a", "lure", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Dos.Clodf80.Trojan.7c93", "Trojan.AOL.PWS.SUPERNAUT.A", "Trojan.AOL.PWS.SUPERNAUT.A", "Smalltroj.JNY", "Trojan.AOL.Supernaut", "Trojan-IM.Win16.Supernaut", "Trojan.AOL.PWS.SUPERNAUT.A", "Trojan.Win16.Supernaut.hqzm", "Trojan.Win16.A.IM-Supernaut.47117", "Win16.Trojan-im.Supernaut.Ebgh", "Trojan.AOL.PWS.SUPERNAUT.A", "TrojWare.Win16.AOL.Supernaut", "Trojan.AOL.PWS.SUPERNAUT.A", "Trojan.Supernaut.Win16.1", "Trojan/AOL.Supernaut", "TR/Aol.Supernaut", "Trojan[IM]/Win16.Supernaut", "Win32.Troj.Undef.kcloud", "Trojan.AOL.PWS.SUPERNAUT.A", "Trojan.Win16.Supernaut.Au", "Win16/AOL.Supernaut", "NORMAL:Trojan.AOL.Supernaut!19246", "Trojan-AOL.Win16.Supernaut", "W16/AOL.D!tr", "Trj/AOLPS.D", "Win32/Trojan.AOL.52f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Boaxxe.E", "Trojan.FakeMS.ED", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "TROJ_ZBOT.SMUH", "Win32.Trojan.Zbot.N", "Packed.Win32.Krap.iu", "Trojan.Win32.Krap.brabpa", "Packer.W32.Krap.lKMc", "TrojWare.Win32.Kazy.FOF", "Trojan.DownLoad3.2720", "Win32.Troj.Krap.iu.kcloud", "Trojan.Graftor.D487A", "Trojan/Win32.Plosa.R24487", "Packed.Win32.Krap.iu", "BScope.Malware-Cryptor.SB.01798", "Bck/Qbot.AO", "W32/ZBOT.HL!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Securityshield", "W32/Trojan.JOHS-0158", "Trojan-FakeAV.Win32.SecurityShield.vip", "Trojan.Win32.FakeAV.euwntc", "Win32.Trojan-fakeav.Securityshield.Syrj", "Trojan.Click2.45032", "BehavesLike.Win32.Spyware.dc", "TR/Pingdel.A.15", "W32.W.AutoIt.mr6E", "Trojan-FakeAV.Win32.SecurityShield.vip", "Trojan.Win32.Pingdel", "W32/SecurityShield.RMG!tr", "Win32/Trojan.228" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Dropper.Msil.BO" ]
[ 16, 3, 16, 16, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Vetor.PE", "Virus.Win32.Virut.1!O", "W32.Virut.G", "W32.Virut.CF", "Win32/Virut.17408", "PE_VIRUX.O", "Win.Phishing.NikoLata-6332081-0", "Win32.Virus.Virut.Q", "Virus.Win32.Virut.ce", "Virus.Win32.Virut.hpeg", "Virus.Win32.Virut.CE", "Win32.Virut.56", "PE_VIRUX.O", "Trojan.MSIL.TrojanClicker", "Win32/Virut.bt", "Virus/Win32.Virut.ce", "Win32.Virut.cr.61440", "TrojanClicker:MSIL/Worfload.A!bit", "W32.Virut.lqtW", "Virus.Win32.Virut.ce", "Win32/Virut.F", "Virus.Virut.14", "W32/Sality.AO", "Win32/Virut.NBP", "Virus.Win32.VirutChangeEntry.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Typically,", "file-less", "malware", "has", "been", "observed", "in", "the", "context", "of", "Exploit", "Kits", "such", "as", "Angler." ]
[ 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 3 ]
[ "These", "lures", "were", "expected,", "until", "we", "started", "digging", "into", "the", "actual", "documents", "attached", "and", "saw", "an", "interesting", "method", "within", "the", "Visual", "Basic", "VB", "macros", "in", "the", "attached", "documents", "used", "for", "dropping", "the", "malware." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 3, 11, 11, 11, 16, 16, 1, 9, 16, 16, 16, 16, 3 ]
[ "However,", "the", "occasional", "functional", "enhancements", "combined", "with", "its", "multiple", "layers", "of", "obfuscation", "and", "server-side", "polymorphism", "periodically", "breathe", "new", "life", "into", "this", "seemingly", "immortal", "malware." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "W32.CombotoD.Trojan", "Backdoor.Minaps", "BKDR_MINAPS.A", "W32/Trojan.WDQB-6441", "Backdoor.Wakeminap!g1", "BKDR_MINAPS.A", "Win.Downloader.133181-1", "Trojan.Win32.Snojan.jj", "Trojan.Win32.A.Downloader.52224.HP", "DLOADER.Trojan", "Backdoor:Win32/Minaps.A", "Trojan.Win32.Snojan.jj", "Win32.Trojan.Snojan.Wrgx", "Win32/Trojan.cb9" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Compromised", "hosts", "cause", "a", "victim's", "machine", "to", "be", "attached", "to", "the", "Andromeda", "botnet,", "giving", "attackers", "the", "ability", "to", "push", "plugins", "or", "additional", "malware", "onto", "these", "machines." ]
[ 1, 9, 16, 16, 5, 13, 16, 16, 16, 16, 16, 3, 11, 16, 6, 16, 16, 16, 16, 3, 16, 3, 11, 16, 16, 5 ]
[ "In", "early", "2016", "the", "Callisto", "Group", "began", "sending", "highly", "targeted", "spear", "phishing", "emails", "with", "malicious", "attachments", "that", "contained,", "as", "their", "final", "payload,", "the", "Scout", "malware", "tool", "from", "the", "HackingTeam", "RCS", "Galileo", "platform." ]
[ 16, 0, 8, 6, 14, 14, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 16, 16, 3, 11, 11, 11, 11, 11, 16, 16, 4, 5, 13, 13 ]
[ "Our", "analysis", "reveals", "that", "APT33", "is", "a", "capable", "group", "that", "has", "carried", "out", "cyber", "espionage", "operations", "since", "at", "least", "2013." ]
[ 16, 16, 16, 16, 6, 16, 16, 16, 6, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 0 ]
[ "Package", "Name", "SHA256", "digest", "SHA1", "certificate", "com.network.android", "98ca5f94638768e7b58889bb5df4584bf5b6af56b188da48c10a02648791b30c", "516f8f516cc0fd8db53785a48c0a86554f75c3ba", "com.network.android", "5353212b70aa096d918e4eb6b49eb5ad8f59d9bec02d089e88802c01e707c3a1", "44f6d1caa257799e57f0ecaf4e2e216178f4cb3d", "com.binary.sms.receiver", "9fae5d148b89001555132c896879652fe1ca633d35271db34622248e048c78ae", "7771af1ad3a3d9c0b4d9b55260bb47c2692722cf", "com.android.copy", "e384694d3d17cd88ec3a66c740c6398e07b8ee401320ca61e26bdf96c20485b4", "7771af1ad3a3d9c0b4d9b55260bb47c2692722cf", "com.android.copy", "12e085ab85db887438655feebd249127d813e31df766f8c7b009f9519916e389", "7771af1ad3a3d9c0b4d9b55260bb47c2692722cf", "com.android.copy", "6348104f8ef22eba5ac8ee737b192887629de987badbb1642e347d0dd01420f8", "31a8633c2cd67ae965524d0b2192e9f14d04d016", "FinFisher", "exposed", ":", "A", "researcher", "’", "s", "tale", "of", "defeating", "traps", ",", "tricks", ",", "and", "complex", "virtual", "machines", "March", "1", ",", "2018", "Office", "365", "Advanced", "Threat", "Protection", "(", "Office", "365", "ATP", ")", "blocked", "many", "notable", "zero-day", "exploits", "in", "2017", "." ]
[ 16, 16, 16, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 13, 13, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "However", ",", "within", "six", "months", "the", "malicious", "actors", "added", "the", "capability", "to", "infect", "iOS", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "This", "malware", "has", "been", "around", "since", "2011", "and", "shows", "no", "signs", "of", "stopping." ]
[ 16, 3, 16, 16, 16, 16, 0, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "4", "." ]
[ 16, 16, 16 ]
[ "COVERAGE", "Cisco", "Cloud", "Web", "Security", "(", "CWS", ")", "or", "Web", "Security", "Appliance", "(", "WSA", ")", "web", "scanning", "prevents", "access", "to", "malicious", "websites", "and", "detects", "malware", "used", "in", "these", "attacks", "." ]
[ 16, 4, 5, 13, 13, 16, 16, 16, 16, 5, 13, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9982", "Trojan.Win32.Dwn.eenglt", "Win32.Trojan.Spy.Peqf", "Trojan.DownLoader14.35508", "BehavesLike.Win32.HToolMimiKatz.dc", "Trojan.Symmi.D8341", "PWS:Win32/Banker.UC!bit", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Swisyn.aqrf", "Win32.Trojan.WisdomEyes.16070401.9500.9996", "Win.Trojan.Swisyn-969", "Trojan.Win32.Swisyn.deruf", "Trojan.Win32.A.Swisyn.7680.G", "Uds.Dangerousobject.Multi!c", "Trojan.Swisyn.Win32.16931", "BehavesLike.Win32.Trojan.zt", "Trojan/Swisyn.njs", "Trojan/Win32.Swisyn", "TrojanDownloader:Win32/Surin.B", "Trojan.Swisyn!uy708DPUCgU", "Trojan.Win32.Swisyn", "W32/Dx.WKM!tr", "Win32/Trojan.ee6" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "addition", ",", "just", "as", "uncovering", "new", "characteristics", "is", "important", ",", "finding", "ones", "we", "’", "ve", "also", "seen", "in", "a", "different", "malware", "family", "like", "FakeSpy", "also", "provides", "valuable", "insight", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16 ]
[ "Bookworm", "has", "little", "malicious", "functionality", "built-in,", "with", "its", "only", "core", "ability", "involving", "stealing", "keystrokes", "and", "clipboard", "contents." ]
[ 3, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 1, 9 ]
[ "]", "qwq-japan", "[", "." ]
[ 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Worm/W32.VBNA.28672.Z", "Trojan-Ransom.Win32.Blocker!O", "Worm.VBNA.Win32.168532", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win32/VB.OHY", "HT_DROJ_GG310200.UVPM", "Trojan-Ransom.Win32.Blocker.cdug", "Trojan.Win32.VB.crkzva", "Worm.Win32.VBNA.28672.I", "Trojan.MulDrop4.59381", "HT_DROJ_GG310200.UVPM", "BehavesLike.Win32.VBObfus.mz", "Worm/VBNA.hggx", "Trojan/Win32.Vilsel.gic", "Trojan.Barys.D819", "Trojan-Ransom.Win32.Blocker.cdug", "Trojan:Win32/Droj.A", "Worm/Win32.VBNA.R79506", "Worm.VBNA", "Trojan.Crypt" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Figure", "6", "." ]
[ 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.MSIL", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.DownLoader26.11210", "TR/Dropper.MSIL.aexpd", "Trojan:MSIL/Upadter.A", "Trj/GdSda.A", "Win32.Trojan.Inject.Auto", "Trojan.MSIL.Inject", "Win32/Backdoor.990" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojandownloader.Tosct", "Win32.Trojan.WisdomEyes.16070401.9500.9994", "BKDR_WEBRV.A", "Trojan.Click2.39104", "BKDR_WEBRV.A", "W32/Trojan.KRMY-0312", "Trojan.Heur.JP.ED64BF", "TrojanDownloader:Win32/Tosct.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Today,", "RSA", "Research", "published", "an", "in-depth", "report", "on", "a", "commercial", "VPN", "network,", "originating", "in", "China,", "which", "we", "are", "calling", "Terracotta" ]
[ 16, 4, 12, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 2, 16, 16, 16, 16, 3 ]
[ "At", "the", "end", "of", "March", "2017,", "we", "detected", "another", "malicious", "document", "leveraging", "an", "unknown", "vulnerability", "in", "EPS", "and", "a", "recently", "patched", "vulnerability", "in", "Windows", "Graphics", "Device", "Interface", "GDI", "to", "drop", "malware." ]
[ 16, 16, 16, 16, 0, 8, 16, 16, 16, 1, 9, 16, 16, 7, 15, 16, 5, 16, 16, 16, 16, 7, 16, 5, 13, 13, 13, 16, 16, 16, 3 ]
[ "Google", "also", "stated", "that", "they", "are", "taking", "numerous", "steps", "including", "proactively", "notifying", "affected", "accounts", ",", "revoking", "affected", "tokens", "and", "deploying", "SafetyNet", "improvements", "to", "protect", "users", "from", "these", "apps", "in", "the", "future", "." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "example", "shows", "one", "possible", "implementation", "of", "this", "technique", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "reported", "it", "to", "Google", "on", "May", "16", ",", "2020", "and", "since", "May", "19", ",", "2020", "the", "app", "has", "no", "longer", "been", "available", "on", "Google", "Play", "." ]
[ 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16 ]
[ "Increasingly,", "cyberattackers", "have", "been", "leveraging", "non-malware", "attack", "methods", "to", "target", "vulnerable", "organizations." ]
[ 16, 6, 16, 16, 16, 3, 11, 16, 16, 16, 7, 15 ]
[ "A", "backdoor", "also", "known", "as:", "Troj.W32.Jorik.Virut.ltFj", "BehavesLike.Win32.Parite.cm", "Trojan.Kazy.D23845", "Trojan:Win32/Dantmil.A", "Win32/RiskWare.PEMalform.E" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Downloader.NSIS.BI", "Trojan.NSIS.Minix.A", "Trojan.Downloader.NSIS.BI", "TROJ_DLDR.SMIM", "Trackware.MegaSearch", "TROJ_DLDR.SMIM", "Win.Trojan.Clicker-3867", "Trojan.Downloader.NSIS.BI", "Trojan.Downloader.NSIS.BI", "Trojan.Win32.Dwn.kvabt", "Trojan.Downloader.NSIS.BI", "Trojan.DownLoader4.20561", "Downloader.NSIS.Win32.1874", "TrojanDownloader:Win32/Minix.A", "Trj/CI.A", "W32/Dloader.EP!tr.NSIS", "Win32/Trojan.Downloader.79d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "malware", "connects", "the", "dots", "and", "uses", "these", "two", "components", "to", "create", "a", "special", "type", "of", "notification", "that", "triggers", "the", "ransom", "screen", "via", "the", "callback", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Depending", "on", "the", "Trojan", "version", ",", "dynamically", "generated", "subdomains", "can", "also", "be", "used", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Infostealer.Lokibot", "Trojan.PWS.Stealer.18836", "TROJ_HPUTOTI.SMQ", "BehavesLike.Win32.Downloader.dh", "DR/Autoit.ppevb", "Trojan:Win32/Lepoh.A", "Spyware.LokiBot", "Trojan.Win32.Injector", "Trj/CI.A", "Win32/Trojan.15d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor/W32.Redsip.49152", "Backdoor.Redsip.Win32.2", "Trojan.Heur.LP.EDEA74", "W32/Backdoor2.HIOG", "Hacktool.Keylogger", "Win32/Redsip.A", "BKDR_REDSIP.C", "Trojan.Win32.Redsip.dcevd", "Uds.Dangerousobject.Multi!c", "BKDR_REDSIP.C", "Backdoor.Win32.Redsip", "W32/Backdoor.WNDK-6859", "TR/Spy.49152.662", "Trojan[Backdoor]/Win32.Redsip", "Win32.Hack.Redsip.b.kcloud", "Backdoor:Win32/Redsip.B!svc", "Win-Trojan/Nightdragon.49152", "Backdoor.Redsip", "Win32/Redsip.AA", "Win32.Trojan.Spy.Lohv", "W32/REDSIP.B!tr.bdr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Unit", "42", "has", "reported", "on", "various", "Sofacy", "group", "attacks", "over", "the", "last", "year,", "most", "recently", "with", "a", "post", "on", "Komplex,", "an", "OS", "X", "variant", "of", "a", "tool", "commonly", "used", "by", "the", "Sofacy", "group." ]
[ 1, 9, 16, 16, 16, 16, 6, 14, 16, 16, 16, 0, 8, 16, 16, 16, 16, 16, 16, 3, 16, 5, 13, 16, 16, 16, 3, 16, 16, 16, 6, 14, 14 ]
[ "However", ",", "this", "time", "the", "app", "name", "for", "both", "HenBox", "and", "the", "embedded", "app", "were", "identical", ":", "Islamawazi", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 5, 16 ]
[ "We", "would", "also", "like", "to", "mention", "that", "if", "you", "come", "across", "an", "app", "hiding", "it", "'s", "icon", ",", "always", "try", "to", "search", "for", "the", "app", "in", "your", "device", "settings", "(", "by", "going", "to", "Settings", "-", ">", "Apps", "-", ">", "Search", "for", "icon", "that", "was", "hidden", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Analyzing", "malware", "is", "often", "like", "solving", "a", "puzzle,", "you", "have", "to", "do", "it", "piece", "by", "piece", "to", "reach", "the", "final", "image." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "By", "connecting", "multiple", "Black", "Vine", "campaigns,", "we", "traced", "how", "the", "attack", "group", "has", "evolved", "over", "the", "last", "three", "years." ]
[ 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 6, 14, 16, 16, 16, 16, 0, 8, 8 ]
[ "Dump", "data", "from", "the", "Viber", "messenger", "app", "." ]
[ 16, 16, 16, 16, 5, 13, 16, 16 ]
[ "Following", "simple", "best", "practices", ",", "like", "strictly", "downloading", "applications", "or", "any", "files", "from", "trusted", "sources", "and", "being", "wary", "of", "unsolicited", "messages", ",", "can", "also", "prevent", "similar", "attacks", "from", "compromising", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "-", "There", "were", "two", "interesting", "sub-classes", "found", "inside", "Main", "Activity", ":", "Receiver", "and", "Sender", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Zusy.D2F05E", "Win32.Trojan.WisdomEyes.16070401.9500.9757", "Trojan.Win32.Badur.cubwxj", "TrojWare.Win32.Delf.ebs", "Trojan.DownLoader9.4478", "BehavesLike.Win32.Sytro.ch", "TrojanDownloader:Win32/Cefunlor.A", "Trojan/Win32.Downloader.R91863", "TScope.Trojan.Delf", "Spyware.PasswordStealer", "Trojan-Dropper.Delf", "W32/Delf.RQV!tr.dldr", "Trj/Dtcontx.L" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Our", "data", "shows", ",", "on", "average", ",", "about", "three", "requests", "per", "hour", "to", "the", "drop", "host", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Vetor.PE", "Virus.Win32.Virut.1!O", "W32.Virut.G", "W32.Virut.CF", "Win32/Virut.17408", "PE_VIRUX.R", "Virus.Win32.Virut.ce", "Virus.Win32.Virut.hpeg", "W32.Virut.lGNe", "Virus.Win32.Virut.CE", "Win32.Virut.56", "Virus.Virut.Win32.1938", "PE_VIRUX.R", "BehavesLike.Win32.Ramnit.fh", "Trojan.Win32.Malex", "Win32/Virut.bt", "Win32.Virut.dd.368640", "TrojanDownloader:Win32/Otlard.D", "Virus.Win32.Virut.ce", "Win32.Virus.Virut.U", "Win32/Virut.F", "Virus.Virut.14", "Win32/Virut.NBP", "W32/Virut.CE", "W32/Sality.AO", "Virus.Win32.VirutChangeEntry.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.SilentSpy.zmwjp", "Backdoor.SilentSpy", "Silentspy.F", "Win32/SilentSpy.208", "BKDR_SILENTSPY.C", "Trojan.W32.Fadedoor.10B-3", "Backdoor.Win32.SilentSpy.208", "Backdoor.SilentSpy.D", "Backdoor.Win32.SilentSpy.208", "BackDoor.Silent.208", "BKDR_SILENTSPY.C", "Win32.Hack.SilentSpy.20.kcloud", "Backdoor.Win32.SilentSpy_208.559104", "Win-Trojan/SilentSpy.559104", "Backdoor.SilentSpy", "Win32/SilentSpy.208", "Backdoor.Win32.SilentSpy.200", "W32/Bdoor.ZT!tr.bdr", "BackDoor.Silentspy.G" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Analysis", "indicates", "there", "are", "currently", "two", "distinct", "variants", "of", "ViperRAT", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HackTool.Incognito", "Trojan.Win32.Meterpreter.exjxlb", "Trojan.Win64.Meterpreter", "W32/Trojan.VCYK-3916", "HackTool.Meterpreter.ei", "HackTool/Win32.Meterpreter", "Trj/GdSda.A", "Win32.Hacktool.Meterpreter.Phqd", "Win32/Trojan.Hacktool.8d0" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Worm/W32.PadoBot.86528", "W32.Sality.U", "Worm.Padobot.D", "Win32/Sality.NBA", "W32/Korgo.V", "W32.Sality.AE", "Korgo.V", "PE_SALITY.RL", "Worm.Padobot.M", "Net-Worm.Win32.Padobot.m", "Worm.Padobot.BV.Dam", "Worm.Korgo", "Net-Worm.Win32.Padobot!IK", "Worm.Padobot.BV.Dam", "Win32.Lsabot", "W32/Sality.AT", "PE_SALITY.RL", "Win32/Sality.AA", "Worm:Win32/Korgo.V", "Win32.Sality.N", "Worm.Padobot.BV.Dam", "W32/Korgo.V", "Win32/IRCBot.worm.variant", "Virus.Win32.Sality.bakb", "Malware.Sality", "Worm.Padobot.bl", "Net-Worm.Win32.Padobot", "W32/Padobot!worm.im", "Worm/Korgo.A", "W32/Korgo.U.worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "first", "message", "after", "establishing", "the", "connection", "is", "always", "sent", "by", "the", "server", "–", "the", "most", "important", "thing", "it", "contains", "is", "a", "random", "128-byte", "key", "used", "for", "encrypting", "further", "communication." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 1, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "W32.SampleswareTG.Trojan", "Trojan-GameThief.Win32.Magania!O", "Backdoor.Farfli.O", "Trojan/Magania.eken", "Win32.Trojan.Farfli.ai", "Win32/Farfli.GKH", "Win.Trojan.Magania-19224", "Trojan-GameThief.Win32.Magania.uagj", "Trojan.Win32.Magania.bvkxn", "Troj.W32.MMM.ljA2", "Backdoor.Win32.Gh0st.g", "Trojan.Magania.Win32.38676", "BKDR_INJECT.SMJ", "BehavesLike.Win32.Backdoor.cc", "Backdoor/IRCBot.qan", "Trojan.Barys.62", "Trojan-GameThief.Win32.Magania.uagj", "Trojan/Win32.PcClient.R12944", "TrojanPSW.Magania", "Win32/Farfli.AK", "Trojan.Farfli!czCLTsqt/Nw", "Backdoor.Win32.FirstInj", "Backdoor.Win32.Gh0st.BH" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Trojan", "activity", "At", "the", "time", "of", "the", "writing", "of", "this", "post", ",", "all", "URLs", "(", "see", "IOC", "section", ")", "found", "on", "the", "sample", "were", "inactive", ",", "and", "it", "does", "not", "seem", "to", "be", "widespread", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Several", "months", "ago", "I", "examined", "a", "malware-tainted", "Word", "document", "titled", "ISIS_twitter_list.doc.", "I", "didn't", "think", "much", "of", "it", "and", "quickly", "moved", "on", "after", "a", "cursory", "analysis." ]
[ 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]