tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"This",
"data",
"shows",
"a",
"distinct",
"concentration",
"of",
"infected",
"devices",
"beaconing",
"from",
"Gaza",
",",
"Palestine",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"First,",
"users",
"cannot",
"easily",
"spot",
"any",
"malicious",
"behavior",
"since",
"PowerShell",
"runs",
"in",
"the",
"background."
] | [
16,
16,
7,
15,
15,
15,
15,
15,
16,
7,
15,
15,
15,
15
] |
[
"We",
"found",
"no",
"similarities",
"to",
"commercial",
"spyware",
"products",
"or",
"to",
"other",
"known",
"spyware",
"variants",
",",
"which",
"suggests",
"BusyGasper",
"is",
"self-developed",
"and",
"used",
"by",
"a",
"single",
"threat",
"actor",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"root9B's",
"analysis",
"determined",
"that",
"the",
"adversary",
"is",
"using",
"advanced",
"memory-resident",
"techniques",
"to",
"maintain",
"persistence",
"and",
"avoid",
"detection."
] | [
3,
16,
16,
16,
16,
6,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"has",
"a",
"remote",
"controlling",
"function,",
"and",
"attackers",
"sending",
"these",
"emails",
"seem",
"to",
"attempt",
"intruding",
"into",
"the",
"targets'",
"network",
"using",
"the",
"malware."
] | [
16,
3,
16,
16,
1,
9,
9,
16,
6,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
3
] |
[
"Usually",
"they",
"would",
"upload",
"a",
"clean",
"version",
"back",
"on",
"Google",
"Play",
"the",
"very",
"same",
"day",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Virus.Win32.Sality!O",
"Ransom.Exxroute.A3",
"Trojan.Kryptik.Win32.1099877",
"Troj.Downloader.W32.Banload.l42y",
"Ransom_CERBER.SM3B",
"Win32.Trojan.Kryptik.bjm",
"W32/Trojan.FUEH-0857",
"Backdoor.Trojan",
"Ransom_CERBER.SM3B",
"Trojan.Encoder.10103",
"BehavesLike.Win32.Cutwail.ph",
"Trojan.Spora.mw",
"TR/AD.Spora.svton",
"Trojan[Ransom]/Win32.Spora",
"Trojan.Symmi.DB88E",
"Ransom:Win32/Spora.A",
"Hoax.Spora",
"Virus.Win32.VBInject"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BKDR_PIRPI.YE",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Backdoor.Trojan",
"BKDR_PIRPI.YE",
"Trojan.Heur.LP.E69C7F",
"Trojan:Win32/Pirpi.O",
"Win32.Backdoor.Backdoor.Hwmn",
"Win32/Trojan.9b5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"SMS",
"message",
"with",
"a",
"link",
"to",
"a",
"banker",
"looked",
"as",
"follows",
":",
"β",
"%",
"USERNAME",
"%",
",",
"i",
"send",
"you",
"prepayment",
"gumtree",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"Called",
"β",
"DEFENSOR",
"ID",
"β",
",",
"the",
"banking",
"trojan",
"was",
"available",
"on",
"Google",
"Play",
"at",
"the",
"time",
"of",
"the",
"analysis",
"."
] | [
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TSPY_MAJIKPOS.SMA",
"Trojan.Majikpos",
"TSPY_MAJIKPOS.SMA",
"Trojan.DownLoader23.50404",
"W32/Trojan.QKOU-4044",
"Trojan.MSIL.Krypt.2",
"TrojanSpy:MSIL/Majikpos.A",
"Spyware/Win32.Majikpos.C1861368",
"Trj/GdSda.A",
"PUA.BrowseSmart",
"Win32/Trojan.d60"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"DragonOK",
"group",
"has",
"been",
"actively",
"launching",
"attacks",
"for",
"years."
] | [
4,
12,
12,
16,
16,
16,
16,
1,
16,
0
] |
[
"non-Google",
"Play",
")",
"app",
"stores",
"which",
"often",
"have",
"fewer",
"security",
"and",
"vetting",
"procedures",
"for",
"the",
"apps",
"they",
"host",
"."
] | [
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"infrastructure",
"has",
"several",
"layers",
",",
"although",
"not",
"being",
"very",
"dynamic",
",",
"still",
"has",
"several",
"layers",
"each",
"one",
"providing",
"some",
"level",
"of",
"protection",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.OnGameMITL.Trojan",
"RDN/Downloader.a!vq",
"Win32.Trojan.WisdomEyes.16070401.9500.9883",
"Trojan.FakeAV",
"Trojan.DownLoad.41552",
"BehavesLike.Win32.Backdoor.ch",
"Trojan.Win32.Redosdru",
"Trojan/PSW.WOW.amc",
"TrojanDownloader:Win32/Induiba.A",
"Trojan.Heur.RP.EEBC2E",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"By",
"analyzing",
"the",
"TaskManager",
"class",
"we",
"can",
"see",
"the",
"new",
"commands",
"that",
"are",
"supported",
"at",
"this",
"stage",
":",
"As",
"can",
"be",
"seen",
"in",
"the",
"code",
"snippet",
"above",
",",
"there",
"are",
"quite",
"a",
"lot",
"of",
"data",
"collection",
"tasks",
"that",
"are",
"now",
"available",
":",
"Collect",
"device",
"info",
"Track",
"location",
"Upload",
"contacts",
"information",
"Upload",
"sent",
"and",
"received",
"SMS",
"messages",
"Upload",
"images",
"Upload",
"video",
"files",
"Send",
"recursive",
"dirlist",
"of",
"the",
"external",
"storage",
"Upload",
"specific",
"files",
"Record",
"audio",
"using",
"the",
"microphone",
"Record",
"calls",
"Use",
"the",
"camera",
"to",
"capture",
"bursts",
"of",
"snapshots",
"Those",
"tasks",
"can",
"either",
"run",
"periodically",
",",
"on",
"event",
"(",
"such",
"as",
"incoming",
"call",
")",
"or",
"when",
"getting",
"a",
"command",
"from",
"the",
"C",
"&",
"C",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Kargatroj!O",
"Trojan.Kargatroj.Win32.5",
"BKDR_DEPPEELS.A",
"Win32.Trojan.WisdomEyes.16070401.9500.9993",
"W32/Trojan.FYPB-4329",
"Backdoor.Kargatroj",
"BKDR_DEPPEELS.A",
"Win.Trojan.Kargatroj-5",
"Trojan.Win32.Kargatroj.a",
"Trojan.Win32.Kargatroj.zribt",
"Trojan.Win32.A.Kargatroj.288256",
"Trojan.Click2.18984",
"BehavesLike.Win32.Virus.dh",
"Backdoor.Win32.IRCBot",
"Trojan/Kargatroj.e",
"WORM/Autorun.Agr.3",
"Trojan/Win32.Kargatroj",
"Backdoor:Win32/Deppeels.A",
"Trojan.Win32.Kargatroj.a",
"Trojan/Win32.Kargatroj.R50492",
"Trojan.Kargatroj",
"Trojan.Kargatroj!+VQ4l8zO8kI"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"refer",
"to",
"this",
"utility",
"as",
"BOOTRASH."
] | [
16,
16,
16,
16,
16,
16,
3
] |
[
"Security",
"analysts",
"are",
"typically",
"equipped",
"with",
"the",
"tools",
"to",
"defeat",
"a",
"good",
"number",
"of",
"similar",
"tricks",
"during",
"malware",
"investigations",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.W.Fujack.lmEa",
"Trojan.Dropper",
"Win.Trojan.Packed-24",
"Trojan.Win32.Baidu.iidnc",
"Trojan.Win32.A.PSW-Magania.1913020.A",
"Trojan/Win32.Zegost",
"Trojan.Zusy.D88F",
"TrojanDropper:Win32/Demekaf.A",
"Trojan.MalPack.NSPack",
"Win32/TrojanDropper.Demekaf.A",
"Trojan.Win32.Jorik",
"W32/Obfuscated.AAAD!tr",
"Win32/Trojan.4b9"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Check",
"Point",
"researchers",
"have",
"dubbed",
"the",
"malware",
"family",
"\"",
"HummingBad",
",",
"''",
"but",
"researchers",
"from",
"mobile",
"security",
"company",
"Lookout",
"say",
"HummingBad",
"is",
"in",
"fact",
"Shedun",
",",
"a",
"family",
"of",
"auto-rooting",
"malware",
"that",
"came",
"to",
"light",
"last",
"November",
"and",
"had",
"already",
"infected",
"a",
"large",
"number",
"of",
"devices",
"."
] | [
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
3,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"believe",
"that",
"it",
"is",
"the",
"largest",
"Google",
"account",
"breach",
"to",
"date",
",",
"and",
"we",
"are",
"working",
"with",
"Google",
"to",
"continue",
"the",
"investigation",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16
] |
[
"In",
"most",
"so-called",
"Western",
"versions",
"of",
"the",
"Trojan",
",",
"the",
"package",
"names",
"in",
"the",
"default",
"configuration",
"file",
"are",
"erased",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper/W32.Hirhir.2779437",
"TrojanDropper.Hirhir.20",
"Trojan/Dropper.Hirhir.20",
"Trojan-Dropper.Win32.Hirhir.20",
"Win32/TrojanDropper.Hirhir.20",
"W32/Hirhir.A",
"Trojan.Dropper",
"W32/Smalldrp.BTL",
"Win32.Dropper.Hirhir",
"Trojan.Dropper-1156",
"Trojan-Dropper.Win32.Hirhir.20",
"Trojan.Dropper.Hirhir.2.0",
"TrojWare.Win32.TrojanDropper.Hirhir.20",
"Trojan.Dropper.Hirhir.2.0",
"Trojan.MulDrop.1734",
"TR/Drop.Hirhir.20.5",
"TROJ_HIRHIR.20",
"Trojan.Drop.Hirhir.20.5",
"Win32/DigitalM.10",
"W32/Hirhir.A",
"TrojanDropper.Dmexeb.10",
"Trojan-Dropper.Win32.Hirhir.20!IK",
"TrojanDropper:Win32/Hirhir.2_0",
"Trojan.Win32.Hirhir.2164429",
"Trojan.Dropper.Hirhir.2.0",
"Dropper/Hirhir.11776",
"Win32.TrojanDropper.Hirhir.20",
"Trojan.DR.Hirhir.H",
"Trojan.Dmexeb.10",
"Trojan-Dropper.Win32.Hirhir.20",
"W32/Hirhir.A!tr.dr",
"Dropper.Hirhir",
"Trj/Hirhir.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"delivery",
":",
"to",
"deliver",
"specified",
"text",
"to",
"all",
"victim",
"β",
"s",
"contacts",
"(",
"SMS",
"worming",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Configuration",
"file",
"received",
"from",
"the",
"C",
"&",
"C",
"server",
"As",
"for",
"stealth",
"and",
"resilience",
",",
"the",
"attacker",
"uses",
"a",
"number",
"of",
"tricks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"6",
"."
] | [
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.ExpiroPC.PE",
"TROJ_ZYX_BK083A77.TOMC",
"Heur.Corrupt.PE",
"TROJ_ZYX_BK083A77.TOMC",
"Trojan-Downloader.Win32.Vorloma",
"TrojanDownloader:Win32/Vorloma.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"This",
"very",
"first",
"step",
"fails",
"in",
"Android",
"7.0",
"and",
"higher",
",",
"even",
"with",
"a",
"root",
"permission",
"."
] | [
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"PE:Trojan.Win32.Xcomp.a!1075128424",
"Heur.Packed.MultiPacked",
"DDoS.Rincux",
"Backdoor.Httpbot.Win32.799",
"BehavesLike.Win32.Trojan.cz",
"Backdoor:Win32/Luder.H",
"Trojan/Win32.Injector",
"Virus.Win32.Heur.c",
"Trj/CI.A",
"Packed.Win32.PolyCrypt",
"Trojan.Win32.Downloader.aC"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"specific",
"points",
"of",
"connection",
"between",
"these",
"new",
"samples",
"and",
"Operation",
"Blockbuster",
"include:",
"payloads",
"delivered",
"by",
"the",
"macros",
"discussed",
"in",
"Operation",
"Blockbuster",
"Sequel"
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
3,
16,
16,
16,
3,
16,
16,
6,
14,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.ADH.2",
"Win.Trojan.Mediyes-1761",
"Trojan.Hosts.5806",
"Trojan.VBCRTD.Win32.7945",
"Trojan:Win32/Mediyes.C",
"Trojan.Pirminay",
"Trojan.Win32.Mediyes"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Aimaster.A",
"Backdoor/W32.Aimaster.49152",
"Backdoor.Aimmaster",
"Backdoor.RAT.Aimaster",
"Backdoor.Trojan",
"Win32/Aimaster.A",
"BKDR_AIMASTER.A",
"Win.Trojan.Aimaster-4",
"Backdoor.Win32.Aimaster",
"Backdoor.Aimaster.A",
"Trojan.Win32.Aimaster-Bd.fdhc",
"Win32.Backdoor.Aimaster.Ahyt",
"Backdoor.Aimaster.A",
"Backdoor.Win32.Aimaster.A",
"Backdoor.Aimaster.A",
"BackDoor.Master.10",
"BackDoor-XT.svr",
"W32/Risk.FHHV-3782",
"BDS/Aimaster.B",
"W32/Aimaste.A!tr.bdr",
"Trojan[Backdoor]/Win32.Aimaster",
"Backdoor.Aimaster.A",
"Backdoor.W32.Aimaster!c",
"Backdoor.Win32.Aimaster",
"Trojan/Win32.Aimaster.C662411",
"BackDoor-XT.svr",
"Backdoor.Aimaster",
"Backdoor.Aimaster!2o1TvHIl4Fg",
"Backdoor.Aimaster.A",
"Win32/Backdoor.IM.d95"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"data",
"available",
"in",
"the",
"leaked",
"Hacking",
"Team",
"files",
"provides",
"circumstantial",
"evidence",
"pointing",
"to",
"an",
"interest",
"in",
"compromising",
"individuals",
"with",
"ties",
"to",
"South",
"Korea",
"i.e.,",
"Korean",
"language",
"speakers",
"who",
"use",
"software",
"or",
"apps",
"popular",
"in",
"South",
"Korea,",
"or",
"South",
"Korean",
"editions",
"of",
"Samsung",
"phones."
] | [
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
2,
10,
16,
16,
16,
16,
16,
16,
5,
16,
5,
16,
16,
2,
10,
16,
2,
10,
16,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Amitis.827392",
"Backdoor.Amitis!GgBFlh0m/G4",
"W32/Amitis.MXVV-8538",
"Backdoor.Amitis",
"Win32/Amitis.13",
"BKDR_AMITIS.B",
"Trojan.Amitis.13-B",
"Backdoor.Win32.Amitis.13",
"Trojan.Win32.Amitis.dbhy",
"Backdoor.Win32.S.Amitis.827392.A[h]",
"Backdoor.W32.Amitis.13!c",
"Backdoor.Win32.Amitis.13",
"BackDoor.Amitist.13",
"Backdoor.Amitis.Win32.17",
"BKDR_AMITIS.B",
"BehavesLike.Win32.Downloader.ch",
"W32/Amitis.N@bd",
"Backdoor/Amitis.p",
"W32/Amitis.C!tr",
"Trojan[Backdoor]/Win32.Amitis",
"Win-Trojan/Amitis.827392",
"Backdoor:Win32/Amitis.1_3",
"Win32/Amitis.13",
"Backdoor.Amitis",
"Win32.Backdoor.Amitis.Akfc",
"Backdoor.Win32.Amitis",
"BackDoor.Amitis.G",
"Backdoor.Win32.Amitis.13"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HackTool.Patcher",
"Backdoor.RBot.Win32.54805",
"Troj.GameThief.W32.Magania.lHhM",
"Multi.Threats.InArchive",
"W32.Pilleuz",
"Win.Worm.Mytob-399",
"Trojan.Win32.Rbot.bhwabq",
"Heur.Packed.Unknown",
"Win32.HLLW.MyBot.based",
"Trojan[Backdoor]/Win32.Rbot",
"Trojan/Win32.Malco.R7515",
"Trj/CI.A",
"Win32.Viking.BJ",
"Backdoor.Win32.Rbot"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Mlw.ewdlbx",
"TR/Dropper.lusig",
"Trojan.Win32.Eightow",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"Though",
"Orcus",
"has",
"all",
"the",
"typical",
"features",
"of",
"RAT",
"malware,",
"it",
"allows",
"users",
"to",
"build",
"custom",
"plugins",
"and",
"also",
"has",
"a",
"modular",
"architecture",
"for",
"better",
"management",
"and",
"scalability."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Worm.SdDrop.C",
"Worm.Sddrop",
"W32/Sddrop.worm.c!p2p",
"Win32.Worm.SdDrop.C",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32.Kwbot.Worm",
"Unix.Tool.IRC-1",
"Win32.Worm.SdDrop.C",
"P2P-Worm.Win32.SdDrop.c",
"Win32.Worm.SdDrop.C",
"Trojan.Win32.SdDrop.entp",
"W32.W.SdDrop.c!c",
"Win32.Worm.SdDrop.C",
"Win32.Worm.SdDrop.C",
"Win32.SdDrop.3",
"Worm.SdDrop.Win32.21",
"W32/Sddrop.worm.c!p2p",
"Backdoor.Win32.SdBot",
"I-Worm/P2P.SdDrop.c",
"BDS/Sdbot.AA",
"Worm[P2P]/Win32.SdDrop",
"Worm:Win32/Sddrop.C",
"P2P-Worm.Win32.SdDrop.c",
"Trojan/Win32.HDC.C38855",
"Win32.Worm.SdDrop.C",
"Backdoor.Sdbot",
"Trj/CI.A",
"Worm.SdDrop",
"Win32/Sddrop.C",
"Win32.Worm-p2p.Sddrop.Lknd",
"Worm.P2P.SdDrop!LrfriCz8zKY",
"W32/KWBot.E!worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Recently,",
"the",
"FortiGuard",
"Labs",
"research",
"team",
"observed",
"that",
"a",
"new",
"variant",
"of",
"Poison",
"Ivy",
"was",
"being",
"spread",
"through",
"a",
"compromised",
"PowerPoint",
"file."
] | [
16,
16,
4,
12,
12,
12,
16,
16,
16,
3,
11,
11,
11,
11,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"Many",
"victims",
"have",
"discussed",
"YiSpecter",
"infections",
"of",
"their",
"jailbroken",
"and",
"non-jailbroken",
"iPhones",
"in",
"online",
"forums",
"and",
"have",
"reported",
"the",
"activity",
"to",
"Apple."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
5,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4
] |
[
"This",
"particular",
"case",
"is",
"not",
"an",
"exception",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"send",
"funds",
"via",
"a",
"wire",
"transfer",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"campaign",
"operated",
"out",
"of",
"handful",
"of",
"IPs,",
"but",
"we",
"ended",
"up",
"finding",
"in",
"excess",
"of",
"80K",
"malicious",
"subdomains",
"associated",
"with",
"more",
"than",
"500",
"domains",
"leveraging",
"various",
"registrant",
"accounts."
] | [
16,
6,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Udsdangerousobject.Multi",
"TROJ_DLOADR.YLP",
"TROJ_DLOADR.YLP",
"Trojan.Win32.Dwn.dcbaru",
"Trojan.Win32.Z.Tapaoux.49152",
"Trojan.DownLoader11.19325",
"W32/Trojan.FALA-2329",
"TR/Rogue.icdl",
"Trojan.DownLoader!",
"Trojan.Rogue"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.MSIL.Bladabindi.1",
"Win32.Trojan.WisdomEyes.16070401.9500.9922",
"Trojan.Win32.Bladabindi.etjjte",
"Trojan.Win32.Z.Clicker.90624",
"Trojan.Win32.Clicker!BT",
"BehavesLike.Win32.PWSZbot.mm",
"Trojan.Win32.Clicker!BT",
"Trj/Chgt.O",
"Win32.Outbreak"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"most",
"popular",
"member",
"of",
"the",
"Android/AdDisplay.Ashas",
"family",
"on",
"Google",
"Play",
"was",
"β",
"Video",
"downloader",
"master",
"β",
"with",
"over",
"five",
"million",
"downloads",
"Ashas",
"functionality",
"All",
"the",
"apps",
"provide",
"the",
"functionality",
"they",
"promise",
",",
"besides",
"working",
"as",
"adware",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
11,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"If",
"any",
"application",
"from",
"that",
"list",
"was",
"found",
",",
"it",
"utilizes",
"the",
"Janus",
"vulnerability",
"to",
"inject",
"the",
"β",
"boot",
"β",
"module",
"into",
"the",
"repacked",
"application",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
7,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"file",
"size",
"of",
"the",
"malware",
"is",
"mostly",
"around",
"~50Kb,",
"as",
"you",
"can",
"see",
"from",
"the",
"list",
"of",
"sample",
"hashes",
"at",
"the",
"end",
"of",
"this",
"report."
] | [
16,
1,
9,
16,
16,
3,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
3,
1,
16,
16,
16,
16,
16,
16
] |
[
"C2",
"Communication",
"The",
"C2",
"communication",
"includes",
"two",
"parts",
":",
"sending",
"information",
"to",
"the",
"remote",
"HTTP",
"server",
"and",
"parsing",
"the",
"server",
"β",
"s",
"response",
"to",
"execute",
"any",
"commands",
"as",
"instructed",
"by",
"the",
"remote",
"attackers",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"For",
"this",
"purpose",
",",
"the",
"app",
"receives",
"from",
"the",
"C",
"&",
"C",
"server",
"the",
"isGoogleIp",
"flag",
",",
"which",
"indicates",
"whether",
"the",
"IP",
"address",
"of",
"the",
"affected",
"device",
"falls",
"within",
"the",
"range",
"of",
"known",
"IP",
"addresses",
"for",
"Google",
"servers",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.YahooPass.Spyware",
"Backdoor.Win32.Bredavi!O",
"Backdoor.Bredavi.Win32.215",
"Backdoor.W32.Bredavi.kYWA",
"Backdoor/Bredavi.le",
"Win32.Trojan-PSW.Yahoo.a",
"Backdoor.Trojan",
"Win32/Bredolab.PS",
"Win.Trojan.Bredolab-1635",
"Trojan.Win32.Krap.ihir",
"Backdoor.Win32.Bredavi.348960",
"Application.Win32.Adware.Superjuan.~JAJ",
"Trojan.BhoSpy.97",
"Trojan.Win32.Glecia",
"Backdoor/Bredavi.bf",
"BDS/Glecia.A",
"Trojan[Backdoor]/Win32.Bredavi",
"Adware.Heur.E51E88",
"Trojan/Win32.Bredavi.C83160",
"Backdoor.Bredavi",
"Trj/Sinowal.WNX",
"Win32/PSW.YahooPass.NAD"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Email-Worm.Win32.Scano!O",
"W32/Scano.bm",
"WORM_SCANO.BT",
"Win32.Worm.Scano.a",
"W32.Areses.P@mm",
"WORM_SCANO.BT",
"Win.Worm.Scano-70",
"Email-Worm.Win32.Scano.bm",
"Trojan.Win32.LdPinch.fmye",
"I-Worm.Win32.A.Scano.105231",
"W32.W.Otwycal.l7h6",
"Win32.HLLM.Perf",
"Worm.Scano.Win32.69",
"BehavesLike.Win32.Autorun.cm",
"Email-Worm.Win32.Scano",
"Worm/Scano.at",
"W32.Worm.Areses",
"Worm[Email]/Win32.Scano",
"Email-Worm.Win32.Scano.bm",
"Worm/Win32.Scano.R1851",
"BScope.Trojan-Dropper.Injector",
"Win32/Scano.BM",
"I-Worm.Scano!zrLOU/XMrws",
"W32/Scano.AA@mm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Fsysna",
"Win32.Trojan.WisdomEyes.16070401.9500.9969",
"Trojan.Win32.Fsysna.eqvl",
"Trojan.Win32.Z.Strictor.607232.C",
"Trojan.MulDrop7.49159",
"Trojan.Fsysna.Win32.15357",
"Trojan.MSIL.Spy",
"TrojanSpy:MSIL/Logadat.A",
"Trojan.Win32.Fsysna.eqvl",
"Trojan.Fsysna",
"Trj/GdSda.A",
"Win32.Trojan.Fsysna.Lqym"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"report",
"includes",
"extra",
"detail",
"to",
"help",
"potential",
"targets",
"recognize",
"similar",
"attacks."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"ThreatStream",
"Labs",
"recently",
"became",
"aware",
"of",
"a",
"campaign",
"beginning",
"on",
"30",
"June",
"2015",
"by",
"the",
"omniprescent",
"Wekby",
"threat",
"actors",
"a/k/a",
"TG-0416,",
"APT-18,",
"Dynamite",
"Panda."
] | [
4,
12,
16,
16,
16,
16,
16,
6,
16,
16,
0,
8,
8,
16,
16,
16,
6,
12,
14,
16,
6,
14,
14,
14
] |
[
"All",
"of",
"the",
"other",
"IP",
"address",
"we",
"discovered",
"sharing",
"the",
"same",
"TLS",
"certificate",
"behave",
"in",
"the",
"same",
"way",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Adding",
"this",
"extra",
"layer",
"of",
"filtering",
"may",
"help",
"the",
"group",
"focus",
"on",
"targets",
"of",
"interest",
"and",
"evade",
"detection",
"due",
"to",
"use",
"of",
"known",
"malware."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W97M.Downloader",
"TROJ_CVE201711882.E",
"Exploit.Xml.CVE-2017-0199.equmby",
"Xml.Exploit.Cve!c",
"TROJ_CVE201711882.E",
"Malicious_Behavior.SB",
"DOC.S.Exploit.11442",
"XML/Dloader.S1",
"Exploit.CVE-2017-0199",
"XML.Exploit.CVE-2017-0199.E"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Our",
"malware",
"analysts",
"Nikita",
"Buchka",
"and",
"Mikhail",
"Kuzin",
"can",
"easily",
"name",
"11",
"families",
"of",
"such",
"Trojans",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"was",
"a",
"standalone",
"utility",
"with",
"the",
"name",
"HDD",
"Rootkit",
"for",
"planting",
"a",
"bootkit",
"on",
"a",
"computer."
] | [
16,
16,
16,
5,
13,
16,
16,
1,
9,
9,
11,
16,
16,
3,
16,
16,
5
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32/Goft.B",
"Trojan.Win32.cvrsqp.eaqdwq",
"Trojan.MyRunner",
"BehavesLike.Win32.PWSZbot.nc",
"Virus.Win32.AA",
"Trojan/PSW.QQPass.fx",
"Trojan/Win32.QQTail.R5474"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"provides",
"the",
"same",
"functionality",
"you",
"would",
"expect",
"from",
"a",
"remote",
"access",
"tool:",
"keylogging,",
"webcam",
"access,",
"microphone",
"access,",
"remote",
"desktop,",
"URL",
"download,",
"program",
"execution,",
"etc."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Attacks",
"that",
"use",
"completely",
"fileless",
"malware",
"are",
"a",
"rare",
"occurrence,",
"so",
"we",
"thought",
"it",
"important",
"to",
"discuss",
"a",
"new",
"trojan",
"known",
"as",
"JS_POWMET",
"Detected",
"by",
"Trend",
"Micro",
"as",
"JS_POWMET.DE,",
"which",
"arrives",
"via",
"an",
"autostart",
"registry",
"procedure."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
3,
16,
16,
4,
12,
16,
1,
16,
16,
16,
1,
9,
9,
9
] |
[
"As",
"you",
"can",
"see",
"in",
"the",
"sample",
"list",
"below,",
"this",
"means",
"that",
"many",
"school",
"employees",
"will",
"have",
"received",
"this",
"spam,",
"as",
"K-12",
"schools",
"very",
"commonly",
"use",
".us",
"domain",
"names."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
15,
16,
4,
12,
16,
16,
16,
16,
3,
16,
1,
9,
16,
16,
1,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Vetor.PE",
"Virus.Win32.Virut.1!O",
"W32.Virut.G",
"PE_VIRUX.R",
"W32/Virut.AM",
"Win32/Virut.17408",
"Trojan.Scar",
"PE_VIRUX.R",
"Win.Trojan.Virtob-1456",
"Win32.Virus.Virut.U",
"Virus.Win32.Virut.ce",
"Virus.Win32.Virut.hpeg",
"Virus.Win32.Virut.CE",
"Win32.Virut.56",
"Virus.Virut.Win32.1938",
"BehavesLike.Win32.Virut.qh",
"W32/Virut.AM",
"Virus/Win32.Virut.ce",
"Win32.Virut.dd.368640",
"W32.Virut.lqR9",
"Virus.Win32.Virut.ce",
"Trojan:Win32/QHosts.BR",
"Win32/Virut.F",
"Virus.Virut.14",
"W32/Sality.AO",
"Win32/Virut.NBP",
"Trojan.Win32.Downloader.toh",
"Trojan.Win32.Scar",
"Virus.Win32.VirutChangeEntry.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Change",
"server",
"request",
"The",
"URL",
"'s",
"for",
"the",
"new",
"server",
"is",
"obfuscated",
",",
"preventing",
"easy",
"network",
"identification",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"organization",
"was",
"formerly",
"known",
"as",
"the",
"East",
"Turkestan",
"Islamic",
"Party",
"and",
"is",
"purported",
"to",
"be",
"an",
"Islamic",
"extremist",
"separatist",
"organization",
"founded",
"by",
"Uyghur",
"jihadists",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"All",
"of",
"these",
"attacks",
"leveraged",
"CVE-2014-4114",
"and",
"were",
"delivered",
"via",
"malicious",
"Microsoft",
"PowerPoint",
"Slideshow",
"files",
"*.pps."
] | [
16,
16,
16,
1,
16,
1,
16,
16,
16,
16,
16,
5,
13,
13,
13,
1
] |
[
"Brambul",
"and",
"Joanap",
"appear",
"to",
"be",
"used",
"to",
"download",
"extra",
"payloads",
"and",
"carry",
"out",
"reconnaissance",
"on",
"infected",
"computers."
] | [
3,
16,
3,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
5,
13
] |
[
"]",
"com",
"was",
"a",
"C2",
"for",
"Poison",
"Ivy",
"samples",
"associated",
"with",
"attacks",
"on",
"Myanmar",
"and",
"other",
"Asian",
"countries",
"discussed",
"in",
"a",
"blog",
"published",
"by",
"Arbor",
"Networks",
"in",
"April",
"2016",
"."
] | [
9,
9,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16
] |
[
"Then",
"the",
"app",
"finds",
"a",
"process",
"id",
"value",
"for",
"the",
"process",
"it",
"wants",
"to",
"inject",
"with",
"code",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"com",
"hxxp",
":",
"//mailsa-qaw",
"[",
"."
] | [
9,
9,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Packed.Win32.Tibs!O",
"Worm.Zhelatin",
"Trojan.Heur.RP.fqWcaaXp5um",
"Win32.Trojan.WisdomEyes.16070401.9500.9882",
"W32/Trojan.LQOD-4441",
"Trojan.Dropper",
"Email-Worm.Win32.Zhelatin.rn",
"Trojan.Win32.Z.Zhelatin.88576",
"MalCrypt.Indus!",
"Trojan.Spambot.2559",
"Email.Worm.W32!c",
"Email-Worm.Win32.Zhelatin.rn",
"Worm/Win32.Zhelatin.R38109",
"BScope.Trojan.Zhelatin.12",
"Trj/CI.A",
"Win32/Nuwar.BH",
"Win32.Worm-email.Zhelatin.Sxxs",
"Worm.Win32.Nuwar",
"Win32/Worm.Email-Worm.43d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"top/",
"Oct",
"17",
",",
"2017",
"hxxp",
":",
"//online.bankaustria.at.id58717",
"[",
"."
] | [
9,
9,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Rustock.NDU",
"Backdoor.Win32.Rbot!O",
"Backdoor.Rustock.NDU",
"Backdoor.Rbot",
"Win32.Trojan.WisdomEyes.16070401.9500.9989",
"W32/Trojan.TDBQ-4167",
"Backdoor.Rustock.B",
"Win.Trojan.Crypt-278",
"Backdoor.Rustock.NDU",
"Backdoor.Win32.Rbot.szn",
"Backdoor.Rustock.NDU",
"Backdoor.Win32.A.Rbot.70656.J",
"Backdoor.Rustock.NDU",
"Backdoor.Rustock.NDU",
"Trojan.Fakealert.33205",
"BehavesLike.Win32.Downloader.kt",
"Rootkit.KernelBot.m",
"TR/Tiny.705",
"Backdoor.Rustock.NDU",
"Backdoor.Win32.Rbot.szn",
"Trojan:Win32/Silentbanker.B",
"Worm/Win32.IRCBot.C36854",
"Backdoor.Rbot",
"Trj/CI.A",
"Win32.Backdoor.Rbot.Aiik",
"Virus.Win32.Virut.n",
"W32/RBot.SZN!tr.bdr",
"Win32/Backdoor.0a5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"During",
"a",
"recent",
"United",
"States",
"Secret",
"Service",
"investigation,",
"Trustwave",
"encountered",
"a",
"new",
"family",
"of",
"POS",
"malware,",
"that",
"we",
"named",
"Punkey."
] | [
16,
16,
16,
4,
12,
12,
12,
16,
4,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.FakeAV.29696.H",
"Backdoor.Ziyazo",
"Trojan.Graftor.D21706",
"TROJ_FAKEAV.ORH",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Backdoor.Trojan.B",
"TROJ_FAKEAV.ORH",
"Win.Trojan.Ziyazo-1",
"Trojan.Win32.FakeAv.cuscpt",
"Troj.W32.FakeAv.rxda!c",
"Trojan.Fakealert.45728",
"Trojan.FakeAV.Win32.293288",
"BehavesLike.Win32.Backdoor.mc",
"W32/Trojan.TSSV-1630",
"Trojan/Fakeav.blva",
"Trojan/Win32.FakeAv",
"Backdoor:Win32/Ziyazo.A",
"Trojan/Win32.FakeAV.R94861",
"Trj/Dynamer.A",
"Trojan.FakeAv!73pMuD6/3rE",
"Trojan.Win32.FakeAV",
"W32/FakeAv.RXDA!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Subsequent",
"to",
"the",
"publishing",
"of",
"this",
"article,",
"through",
"cooperation",
"with",
"the",
"parties",
"responsible",
"for",
"the",
"C2",
"domains,",
"Unit",
"42",
"researchers",
"successfully",
"gained",
"control",
"of",
"multiple",
"C2",
"domains."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
11,
16,
1,
9,
4,
12,
12,
16,
16,
1,
9,
9,
9,
9
] |
[
"This",
"library",
"is",
"used",
"because",
"it",
"uses",
"the",
"only",
"(",
"publicly",
"known",
")",
"way",
"to",
"retrieve",
"this",
"information",
"on",
"Android",
"6",
"(",
"using",
"the",
"process",
"OOM",
"score",
"read",
"from",
"the",
"/proc",
"directory",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Hacktool.Superscan",
"Trojan.Win32.XFMP5368.dfvidz",
"HackTool:Win32/SuperScan.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"Lurk",
"was",
"believed",
"to",
"have",
"siphoned",
"over",
"$45",
"million",
"from",
"financial",
"organizations,",
"ultimately",
"disrupting",
"the",
"victims'",
"operations,",
"reputation,",
"and",
"bottom",
"line."
] | [
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
4,
16,
16,
16,
16
] |
[
"While",
"Empire",
"RIG-E",
"disappeared",
"at",
"the",
"end",
"of",
"December",
"after",
"4",
"months",
"of",
"activity",
"on",
"2017-02-17",
"an",
"advert",
"for",
"a",
"new",
"exploit",
"kit",
"dubbed",
"Nebula",
"appeared",
"underground."
] | [
16,
3,
11,
16,
3,
16,
16,
16,
0,
16,
0,
8,
16,
16,
16,
0,
16,
16,
16,
3,
11,
11,
11,
16,
3,
16,
16
] |
[
"A",
"powerful",
"threat",
"actor",
"known",
"as",
"Wild",
"Neutron",
"also",
"known",
"as",
"Jripbot",
"and",
"Morpho",
"has",
"been",
"active",
"since",
"at",
"least",
"2011,",
"infecting",
"high",
"profile",
"companies",
"for",
"several",
"years",
"by",
"using",
"a",
"combination",
"of",
"exploits,",
"watering",
"holes",
"and",
"multi-platform",
"malware."
] | [
16,
6,
14,
14,
16,
16,
6,
14,
16,
16,
16,
6,
16,
6,
16,
16,
16,
16,
16,
16,
0,
16,
4,
12,
12,
16,
0,
8,
16,
16,
16,
16,
16,
3,
11,
11,
16,
3,
11
] |
[
"Extract",
"the",
"calls",
"log",
"."
] | [
16,
16,
16,
16,
16
] |
[
"Figure",
"4",
"."
] | [
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Application.Hacktool.Pipecmd.B",
"HackTool.Pipecmd",
"Win32.HackTool.Pipecmd.a",
"Application.Hacktool.Pipecmd.B",
"Application.Hacktool.Pipecmd.B",
"Application.Hacktool.Pipecmd.B",
"Trojan.Starter.5008",
"BehavesLike.Win32.PUP.lc",
"Application.Hacktool.Pipecmd.B",
"Trojan/Win32.Inject.C500093"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Once",
"installed",
",",
"the",
"application",
"requests",
"permissions",
"so",
"that",
"it",
"may",
"control",
"SMS",
"messages",
"and",
"steal",
"sensitive",
"data",
"on",
"the",
"device",
",",
"as",
"well",
"as",
"proliferate",
"to",
"other",
"devices",
"in",
"the",
"target",
"device",
"β",
"s",
"contact",
"list",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Following",
"a",
"three-month",
"hiatus,",
"Emotet",
"spam",
"activities",
"resumed",
"in",
"March",
"2023,",
"when",
"a",
"botnet",
"known",
"as",
"Epoch",
"4",
"began",
"delivering",
"malicious",
"documents",
"embedded",
"in",
"Zip",
"files",
"that",
"were",
"attached",
"to",
"the",
"emails."
] | [
16,
16,
0,
16,
3,
1,
9,
16,
16,
0,
8,
16,
16,
3,
16,
16,
3,
11,
16,
16,
1,
9,
9,
16,
1,
9,
16,
16,
16,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom.Sage.S1609000",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Trojan.TNMG-4793",
"Ransom.Cry",
"Trojan.Win32.Yakes.etrgag",
"BehavesLike.Win32.Ramnit.fc",
"TR/AD.MalwareCrypter.zdeue",
"Trojan.Zusy.D3FCFB",
"Trojan/Win32.Yakes.C2201035",
"Trojan.Yakes",
"Trojan.Yakes!KiOJwMzaTlA"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Bots",
"can",
"use",
"various",
"methods",
"to",
"establish",
"a",
"line",
"of",
"communication",
"between",
"themselves",
"and",
"their",
"command-and-control",
"C",
"C",
"server."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
1,
9,
9,
9
] |
[
"Knowledge",
"of",
"the",
"threat",
"landscape",
"and",
"implementation",
"of",
"the",
"right",
"detection",
"tools",
"remains",
"crucial",
"to",
"be",
"able",
"to",
"protect",
"yourself",
"from",
"fraud",
";",
"Cerberus",
"is",
"yet",
"a",
"new",
"Trojan",
"active",
"in",
"the",
"wild",
"!",
"Appendix",
"Samples",
"Some",
"of",
"the",
"latest",
"Cerberus",
"samples",
"found",
"in",
"the",
"wild",
":",
"App",
"name",
"Package",
"name",
"SHA",
"256",
"hash",
"Flash",
"Player",
"com.uxlgtsvfdc.zipvwntdy",
"728a6ea44aab94a2d0ebbccbf0c1b4a93fbd9efa8813c19a88d368d6a46b4f4f",
"Flash",
"Player",
"com.ognbsfhszj.hqpquokjdp",
"fe28aba6a942b6713d7142117afdf70f5e731c56eff8956ecdb40cdc28c7c329",
"Flash",
"Player",
"com.mwmnfwt.arhkrgajn",
"ffa5ac3460998e7b9856fc136ebcd112196c3abf24816ccab1fbae11eae4954c",
"Flash",
"Player",
"com.wogdjywtwq.oiofvpzpxyo",
"6ac7e7ed83b4b57cc4d28f14308d69d062d29a544bbde0856d5697b0fc50cde4",
"Flash",
"Player",
"com.hvdnaiujzwo.fovzeukzywfr",
"cfd77ddc5c1ebb8498c899a68ea75d2616c1c92a0e618113d7c9e5fcc650094b",
"Flash",
"Player",
"com.gzhlubw.pmevdiexmn",
"3f2ed928789c200e21fd0c2095619a346f75d84f76f1e54a8b3153385850ea63",
"Target",
"list",
"The",
"actual",
"observed",
"list",
"of",
"mobile",
"apps",
"targeted",
"by",
"Cerberus",
"contains",
"a",
"total",
"of",
"30",
"unique",
"applications",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
1,
1,
5,
13,
1,
1,
5,
13,
1,
1,
5,
13,
1,
1,
5,
13,
1,
1,
5,
13,
1,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"CVE-2015-5122",
"was",
"the",
"second",
"Adobe",
"Flash",
"zero-day",
"revealed",
"in",
"the",
"leak",
"of",
"HackingTeam's",
"internal",
"data."
] | [
1,
16,
16,
16,
5,
13,
7,
16,
16,
16,
16,
16,
4,
16,
16
] |
[
"At",
"the",
"peak",
"of",
"procrastinators",
"filing",
"their",
"taxes",
"at",
"the",
"last",
"minute,",
"those",
"who",
"send",
"in",
"their",
"tax",
"forms",
"are",
"exactly",
"the",
"technically",
"less-sophisticated",
"users",
"these",
"kinds",
"of",
"campaigns",
"target."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"same",
"happens",
"with",
"the",
"package",
"squareup.otto",
",",
"which",
"is",
"an",
"open-source",
"bus",
"implementation",
"focused",
"on",
"Android",
"implementation",
"."
] | [
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm/W32.Vesenlosow.1237156",
"Worm.Vesenlosow",
"Worm.VB.Win32.13725",
"W32.W.Vesenlosow.luZW",
"Trojan/VB.nzt",
"WORM_VESENLO.SMA",
"Win32.Worm.VB.m",
"W32.Winiga",
"WORM_VESENLO.SMA",
"Trojan.Win32.Vesenlosow.bclidy",
"Worm.Win32.A.Vesenlosow.909312",
"Trojan.MulDrop3.6950",
"BehavesLike.Win32.Rontokbro.tm",
"Trojan.Win32.VB",
"Worm/Vesenlosow.q",
"WORM/VB.argu",
"Trojan/Win32.VB",
"Worm:Win32/Vesenlosow.A",
"Trojan/Win32.VB.R46099",
"Trojan.Keylogger.1021",
"W32/Vobfus.GEP.worm",
"Win32.Virut.NBP",
"Win32/VB.NZT",
"Win32.Worm.Vb.Akzk",
"Worm.Win32.Msmm.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"VB:Trojan.Valyria.1034",
"VBS/Downldr.IA",
"W97M.Dropper",
"TROJ_RUBREG.SM",
"VB:Trojan.Valyria.1034",
"Trojan.Script.ExpKit.evbkht",
"Troj.Downloader.Script!c",
"VB:Trojan.Valyria.1034",
"VB:Trojan.Valyria.1034",
"VBS.DownLoader.1040",
"TROJ_RUBREG.SM",
"VBS/Downloader.ea",
"VBS/Downldr.IA",
"TrojanDownloader:VBS/Vibrio.P",
"VB:Trojan.Valyria.D40A",
"VBS/Downloader.ea",
"virus.vbs.houdini.b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Mydse!O",
"TrojanDropper.Goriadu",
"Win32.Trojan.WisdomEyes.16070401.9500.9578",
"TROJ_GORIADU.SMX",
"Trojan.Win32.Mydse.az",
"Trojan.Win32.Click.tdtvg",
"TROJ_GORIADU.SMX",
"BehavesLike.Win32.BadFile.fh",
"Trojan-Clicker.ANTO",
"TR/Clicker.9984610",
"Win32.Troj.AntiCloudAV.d.kcloud",
"TrojanDropper:Win32/Goriadu.A!bit",
"Trojan.Zusy.D38CD",
"Trojan.Win32.Mydse.az",
"W32/GORIADU.SMX!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Who",
"is",
"affected",
"?",
"Gooligan",
"potentially",
"affects",
"devices",
"on",
"Android",
"4",
"(",
"Jelly",
"Bean",
",",
"KitKat",
")",
"and",
"5",
"(",
"Lollipop",
")",
",",
"which",
"is",
"over",
"74",
"%",
"of",
"in-market",
"devices",
"today",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
5,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Around",
"2011",
",",
"the",
"infamous",
"Zeus",
"Trojan",
"started",
"using",
"web",
"injects",
"that",
"tricked",
"users",
"into",
"downloading",
"a",
"mobile",
"component",
"called",
"β",
"ZitMo",
"β",
"(",
"Zeus",
"in",
"the",
"Mobile",
")",
"."
] | [
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
3,
16,
16,
16,
16,
16
] |