tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"As",
"the",
"attack",
"is",
"currently",
"active,",
"it",
"effectively",
"turns",
"compromised",
"sites",
"into",
"attack",
"surfaces",
"against",
"their",
"visitors."
] | [
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
4
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader.Stegvob.C9",
"Win32.Trojan-Downloader.Delf.c",
"WORM_TOPHOS.BKD",
"Trojan.Win32.Dropper.aas",
"Win32.HLLW.Tophos.1",
"WORM_TOPHOS.BKD",
"Trojan.Symmi.DD7FE",
"Worm:Win32/Tophos.B",
"BScope.Worm.Tophos.2612",
"Backdoor.Bot",
"Virus.Win32.Sality",
"W32/Tophos.AAA!tr",
"Win32/Trojan.278"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"most",
"affected",
"countries",
"were",
"India",
",",
"Brazil",
",",
"and",
"Indonesia",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Aside",
"from",
"stealing",
"keystrokes,",
"passwords,",
"Bitcoins,",
"system",
"information,",
"and",
"files",
"on",
"disk,",
"NionSpy",
"also",
"known",
"as",
"Mewsei",
"and",
"MewsSpy",
"can",
"record",
"video",
"using",
"the",
"webcam,",
"audio",
"using",
"the",
"microphone,",
"take",
"screenshots,",
"and",
"use",
"infected",
"machines",
"as",
"a",
"proxy",
"tunnel",
"to",
"connect",
"to",
"other",
"machines",
"within",
"the",
"network."
] | [
16,
16,
16,
16,
16,
16,
16,
12,
16,
16,
16,
16,
3,
16,
16,
16,
3,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
1,
9,
16,
16,
16,
16,
5,
16,
16,
5
] |
[
"The",
"actors",
"behind",
"this",
"adware",
"utilize",
"a",
"simple",
"yet",
"effective",
"approach",
"β",
"they",
"download",
"a",
"popular,",
"legitimate",
"Android",
"application,",
"decompile",
"it,",
"add",
"their",
"malicious",
"routines,",
"then",
"repackage",
"the",
"Android",
"application",
"package",
"APK."
] | [
16,
6,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
3,
11,
16,
16,
5,
13,
13,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Mauvaise.SL1",
"Trojan.FlyStudio.Win32.19742",
"Trojan/FlyStudio.ooa",
"Trojan.Zusy.D38745",
"Win32.Trojan.FlyStudio.we",
"Win32.Application.PUPStudio.B",
"Trojan.Win32.Dwn.eeopgy",
"Trojan.DownLoader24.6094",
"Trojan.Win32.Antavmu",
"TR/Winder.sbcde",
"Trojan[Dropper]/Win32.Sysn",
"Trojan:Win32/Winder.A",
"RiskWare.GameHack",
"Backdoor.Farfli!+OYA++JJfG8"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"#ISMDoor",
"impersonates",
"ZAHRANI",
"an",
"electrical",
"equipment",
"and",
"engineering",
"company",
"in",
"Saudi",
"Arabia",
"and",
"ThetaRay."
] | [
3,
16,
4,
16,
4,
12,
16,
4,
12,
16,
2,
10,
16,
4
] |
[
"In",
"the",
"third",
"intrusion,",
"the",
"Mandiant",
"Incident",
"Response",
"team",
"was",
"contacted",
"after",
"UNC961",
"had",
"compromised",
"the",
"victim",
"and",
"transferred",
"access",
"to",
"UNC3966."
] | [
16,
16,
16,
16,
4,
12,
12,
12,
12,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
6
] |
[
"Modification",
"of",
"KBOT",
"from",
"the",
"Carberp",
"leak."
] | [
16,
16,
3,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Lossymem",
"MSIL/Filecoder.LI",
"Ransom_LTML.THAOJH",
"Trojan.Win32.Ransom.ewugaq",
"Ransom_LTML.THAOJH",
"Trojan-Ransom.FileCoder",
"W32/Trojan.QFKV-3532",
"TR/Ransom.xaclx",
"Trojan/Win32.Ransom.C2353444",
"Trojan.Ransom.LongTermMemoryLoss",
"Trj/GdSda.A",
"MSIL.Trojan-Ransom.LTML.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Floxif.S1578425",
"Trojan.Rozena.Win32.59165",
"BKDR_CCHACK.A",
"W32/CChack.A",
"Trojan.Ccleaner",
"BKDR_CCHACK.A",
"Win.Spyware.CCBkdr-6336251-2",
"Win32.Backdoor.Forpivast.B",
"Backdoor.Win32.InfeCleaner.a",
"Trojan.PRForm.A",
"Trojan.Win32.Floxif.estdxt",
"Trojan.Win32.Z.Floxif.5000118",
"Trojan.PRForm.A",
"Trojan.CCleaner.2",
"BehavesLike.Win32.Dropper.rc",
"Backdoor.Hacked.CCleaner",
"W32/CChack.SQBY-7641",
"Trojan[FakeAV]/Win32.CCleaner",
"Backdoor.Win32.InfeCleaner.a",
"Win-Trojan/Floxif.9791816",
"Backdoor.InfeCleaner",
"Trj/CI.A",
"Trojan.PRForm.A",
"Win32.Backdoor.Infecleaner.Lkns",
"Win32/Trojan.54c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Additionally",
",",
"we",
"have",
"determined",
"that",
"though",
"original",
"reports",
"of",
"this",
"story",
"attribute",
"this",
"surveillanceware",
"tool",
"to",
"Hamas",
",",
"this",
"may",
"not",
"be",
"the",
"case",
",",
"as",
"we",
"demonstrate",
"below",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Malicious",
"codes",
"are",
"embedded",
"in",
"apps",
"that",
"the",
"operators",
"repackaged",
"from",
"legitimate",
"applications",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Exp.OLE.CVE-2015-1641.E",
"Trojan.Mdropper",
"Win32/Exploit.CVE-2015-1641.V",
"TROJ_MDROP.YYSRH",
"TROJ_MDROP.YYSRH",
"RTF/Trojan.BTCC-93",
"Trojan[Exploit]/Win32.CVE-2015-1641",
"Exploit.CVE-2015-1641",
"Exploit.CVE-2015-1641"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"eSurv",
"β",
"s",
"public",
"marketing",
"is",
"centered",
"around",
"video",
"surveillance",
"software",
"and",
"image",
"recognition",
"systems",
",",
"but",
"there",
"are",
"a",
"number",
"of",
"individuals",
"claiming",
"to",
"be",
"mobile",
"security",
"researchers",
"working",
"at",
"the",
"company",
",",
"including",
"one",
"who",
"has",
"publically",
"made",
"claims",
"to",
"be",
"developing",
"a",
"mobile",
"surveillance",
"agent",
"."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W97M.Downloader.CXJ",
"O97M.Drop.P",
"W97M.Downloader.CXJ",
"VBA.Trojan.Obfuscated.u",
"VBA/Obfuscated.C",
"W2KM_GOLROTED.AGG",
"W97M.Downloader.CXJ",
"W97M.Downloader.CXJ",
"Trojan.Ole2.Vbs-heuristic.druvzi",
"W97M.Downloader.CXJ",
"W97M.Downloader.CXJ",
"W97M.DownLoader.1033",
"W2KM_GOLROTED.AGG",
"W97M.Downloader.CXJ",
"WM/Obfuscated.C!tr",
"virus.office.obfuscated.1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"new",
"custom",
"backdoor",
"used",
"by",
"the",
"Mustang",
"Panda",
"APT",
"group",
"is",
"targeting",
"a",
"governmental",
"institution",
"in",
"Taiwan,",
"according",
"to",
"ESET",
"researchers",
"who",
"have",
"analyzed",
"samples",
"of",
"MQsTTang,",
"a",
"new",
"type",
"of",
"malware."
] | [
16,
3,
11,
11,
16,
16,
16,
6,
14,
14,
14,
16,
16,
4,
12,
12,
16,
2,
16,
16,
4,
12,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9970",
"Backdoor.Trojan.B",
"Win.Trojan.10430800-1",
"Trojan.Win32.Pugeshe.ctexqh",
"BDS/Pugeshe.A.2",
"Trj/Ziyang.A",
"Win32.Backdoor.Pugeshe.Phzt",
"Trojan.Ziyanzho!"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"original",
"code",
"of",
"BankBot",
"was",
"divulged",
"on",
"a",
"Russian",
"forum",
"in",
"late",
"2016,",
"and",
"you",
"can",
"read",
"more",
"about",
"that",
"here."
] | [
3,
11,
11,
16,
3,
16,
16,
16,
6,
14,
14,
16,
0,
8,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Based",
"on",
"observations",
"on",
"infrastructure,",
"and",
"the",
"state",
"of",
"the",
"code,",
"we",
"believe",
"these",
"incidents",
"represent",
"the",
"first",
"attempts",
"to",
"deploy",
"the",
"agent,",
"and",
"features",
"such",
"as",
"persistence",
"do",
"not",
"appear",
"to",
"work."
] | [
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"β",
"SimBad",
"β",
"comes",
"with",
"a",
"respected",
"list",
"of",
"capabilities",
"on",
"the",
"user",
"β",
"s",
"device",
",",
"such",
"as",
"removing",
"the",
"icon",
"from",
"the",
"launcher",
",",
"thus",
"making",
"it",
"harder",
"for",
"the",
"user",
"to",
"uninstall",
",",
"start",
"to",
"display",
"background",
"ads",
"and",
"open",
"a",
"browser",
"with",
"a",
"given",
"URL",
"."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"contains",
"an",
"old",
"school",
"exclusion",
"list",
"that",
"performs",
"extremely",
"rapid",
"double",
"word",
"comparisons",
"rather",
"than",
"the",
"slower",
"but",
"far",
"more",
"common",
"string",
"comparisons",
"to",
"identify",
"which",
"process",
"to",
"ignore,",
"and",
"internally",
"validates",
"the",
"identified",
"account",
"data",
"through",
"an",
"implementation",
"of",
"the",
"Luhn",
"algorithm."
] | [
16,
3,
16,
16,
1,
9,
9,
9,
15,
16,
16,
1,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"While",
"our",
"systems",
"are",
"great",
"at",
"automatically",
"detecting",
"and",
"protecting",
"against",
"PHAs",
",",
"we",
"believe",
"the",
"best",
"security",
"comes",
"from",
"the",
"combination",
"of",
"automated",
"scanning",
"and",
"skilled",
"human",
"review",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Symantec's",
"latest",
"whitepaper",
"documents",
"multiple",
"Black",
"Vine",
"operations",
"that",
"have",
"been",
"occurring",
"since",
"2012."
] | [
4,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16,
0
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HT_BLADABINDI_GL190001.UVPM",
"HT_BLADABINDI_GL190001.UVPM",
"Backdoor.MSIL.Bladabindi.alfk",
"Trojan.Win32.Bladabindi.exqcus",
"Ht.Bladabindi.Gl190001!c",
"BehavesLike.Win32.Dropper.wc",
"Trojan:Win32/Trogle.A",
"Backdoor.MSIL.Bladabindi.alfk",
"Trj/CI.A",
"Msil.Backdoor.Bladabindi.Tbsy"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"targetting",
"Linux",
"also",
"known",
"as:",
"Backdoor.Linux.Tsunami.A",
"Linux.Kaiten.B",
"ELF_KAITEN.SMK",
"Trojan.Tsunami.excyez",
"Linux.BackDoor.Tsunami.123",
"ELF_KAITEN.SMK",
"ELF/Backdoor.MRMO-",
"LINUX/Tsunami.ojldj",
"Trojan.Backdoor.Linux.Tsunami.1",
"Backdoor.Linux.Tsunami!c",
"Linux.Backdoor.Tsunami.Wrpx"
] | [
16,
3,
16,
11,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Yes",
",",
"we",
"are",
"talking",
"about",
"SuperMarioRun",
",",
"which",
"was",
"recently",
"launched",
"by",
"Nintendo",
"only",
"for",
"iOS",
"users",
"."
] | [
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
4,
16,
16,
5,
16,
16
] |
[
"This",
"version",
"has",
"some",
"small",
"modifications",
"which",
"seems",
"to",
"be",
"unused",
",",
"as",
"the",
"malware",
"behaviour",
"is",
"the",
"same",
"as",
"the",
"previous",
"version",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"August",
"contains",
"stealing",
"functionality",
"targeting",
"credentials",
"and",
"sensitive",
"documents",
"from",
"the",
"infected",
"computer."
] | [
3,
16,
1,
16,
16,
1,
16,
1,
9,
16,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.VB!O",
"Trojan/VB.htj",
"Trojan.Heur.RX.ED14C7A",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Backdoor.Trojan",
"Win.Trojan.VB-8430",
"Trojan-Dropper.Win32.Daws.enmy",
"Troj.Downloader.W32.VB.ldQ2",
"TrojWare.Win32.Trojan.VB.~DQ",
"Trojan.VB.Win32.6994",
"BehavesLike.Win32.Trojan.nm",
"Trojan.Win32.VB",
"Trojan/VB.fgm",
"Backdoor:Win32/Lordly.A",
"Trojan-Dropper.Win32.Daws.enmy",
"Trojan/Win32.Downloader.R12171",
"Trojan.VB!jnJsu+mHRvk",
"W32/VB.JHO!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Revetrat",
"Trojan:MSIL/Starter.I",
"Trj/GdSda.A",
"Win32/Trojan.db5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Z.Pemalform.45056.A",
"W32.W.Otwycal.l4av",
"TrojanDownloader:Win32/Raemnk.A",
"Win32/RiskWare.PEMalform.E",
"Win32/Trojan.444"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"If",
"the",
"mobile",
"operator",
"does",
"n't",
"enforce",
"proper",
"client",
"isolation",
",",
"it",
"is",
"possible",
"that",
"the",
"infected",
"devices",
"are",
"also",
"exposed",
"to",
"the",
"rest",
"of",
"the",
"cellular",
"network",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"targets",
"were",
"then",
"further",
"narrowed",
"to",
"those",
"that",
"were",
"running",
"the",
"Mac",
"OS",
"X",
"operating",
"system,",
"had",
"not",
"previously",
"visited",
"the",
"website,",
"and",
"had",
"specific",
"browser",
"versions."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
15,
16,
16,
5,
13,
13,
13,
13,
13,
16,
16,
16,
16,
1,
9,
16,
16,
16,
5,
13
] |
[
"HummingBad",
"sends",
"notifications",
"to",
"Umeng",
",",
"a",
"tracking",
"and",
"analytics",
"service",
"attackers",
"use",
"to",
"manage",
"their",
"campaign",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"comupload101",
"[",
"."
] | [
9,
9,
1,
9
] |
[
"The",
"sample",
"β",
"s",
"first",
"appearance",
"seems",
"to",
"be",
"May",
"15",
",",
"2018",
",",
"when",
"it",
"was",
"uploaded",
"to",
"VirusTotal",
",",
"but",
"it",
"β",
"s",
"unclear",
"how",
"the",
"tainted",
"sample",
"is",
"disseminated",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Ginp",
"embeds",
"the",
"following",
"set",
"of",
"features",
",",
"allowing",
"it",
"to",
"remain",
"under",
"the",
"radar",
"and",
"successfully",
"perform",
"attacks",
":",
"Overlaying",
":",
"Dynamic",
"(",
"local",
"overlays",
"obtained",
"from",
"the",
"C2",
")",
"SMS",
"harvesting",
":",
"SMS",
"listing",
"SMS",
"harvesting",
":",
"SMS",
"forwarding",
"Contact",
"list",
"collection",
"Application",
"listing",
"Overlaying",
":",
"Targets",
"list",
"update",
"SMS",
":",
"Sending",
"Calls",
":",
"Call",
"forwarding",
"C2",
"Resilience",
":",
"Auxiliary",
"C2",
"list",
"Self-protection",
":",
"Hiding",
"the",
"App",
"icon",
"Self-protection",
":",
"Preventing",
"removal",
"Self-protection",
":",
"Emulation-detection",
"Update",
"10/03/2020",
"At",
"the",
"end",
"of",
"February",
"the",
"actors",
"behind",
"Ginp",
"added",
"screen",
"capture",
"capabilities",
"to",
"their",
"Trojan",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanPWS.Grozlex.A3",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TSPY_GROZLEX.SMA",
"Win.Spyware.Grozlex-1",
"TSPY_GROZLEX.SMA",
"PWS:MSIL/Mintluks.A",
"Trojan.PasswordStealer.MSIL"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"top/",
"These",
"permutations",
"of",
"TLDs",
"and",
"canonical",
"domains",
"incorporating",
"the",
"legitimate",
"domain",
"expected",
"by",
"the",
"targeted",
"banking",
"customers",
"exemplifies",
"recent",
"trends",
"in",
"social",
"engineering",
"by",
"threat",
"actors",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.ArtemisPuty.Trojan",
"Trojan.Modputty.A5",
"Trojan.Puty.Win32.1",
"Trojan/MalPutty.a",
"W32/Trojan.SHOY-1500",
"Win.Trojan.Stealzilla-1",
"Trojan-PSW.Win32.Puty.a",
"Trojan.Win32.Puty.dsnaim",
"Troj.PSW32.W.Puty.tnaX",
"Win32.Trojan-qqpass.Qqrob.Llhf",
"BackDoor.DaVinci.18",
"BehavesLike.Win32.BadFile.hh",
"Trojan.Win32.Modputty",
"Trojan/PSW.Puty.a",
"Trojan:Win32/Modputty.A",
"Trojan-PSW.Win32.Puty.a",
"Trojan/Win32.Modputty.C862836",
"TrojanPSW.Puty",
"Trojan.PWS.Puty!",
"W32/MalPutty.A!tr",
"Trj/Fakeputty.A",
"Win32/Trojan.Spy.b9b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"β",
"social",
"β",
"β",
"this",
"command",
"that",
"starts",
"the",
"β",
"AndroidMDMSupport",
"β",
"service",
"β",
"this",
"allows",
"the",
"files",
"of",
"any",
"other",
"installed",
"application",
"to",
"be",
"grabbed",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"have",
"analyzed",
"the",
"samples",
"to",
"determine",
"the",
"author's",
"ultimate",
"goal",
"and",
"have",
"named",
"this",
"malware",
"KeyRaider"
] | [
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"VBS/Downldr.HM",
"VBS.Downloader.B",
"VBS_LOCKY.DLDSARF",
"Win.Trojan.Locky-6360731-0",
"Trojan.Script.ExpKit.etmlqw",
"Troj.Downloader.Script!c",
"VBS.DownLoader.1006",
"VBS_LOCKY.DLDSARF",
"VBS/Downldr.HM",
"Trojan/VBS.downloder",
"TrojanDownloader:VBS/Locky.A",
"VBS/Obfus.S8",
"Trojan-Ransom.Script.Locky",
"virus.vbs.qexvmc.1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"this",
"blog",
"post",
",",
"we",
"do",
"not",
"differentiate",
"between",
"the",
"rooting",
"component",
"and",
"the",
"component",
"that",
"abuses",
"root",
":",
"we",
"refer",
"to",
"them",
"interchangeably",
"as",
"Zen",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"It",
"uses",
"insidious",
"injection",
"and",
"other",
"sophisticated",
"and",
"stealthy",
"methods."
] | [
16,
16,
1,
9,
16,
16,
1,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Sasser.D",
"Win32.Trojan.WisdomEyes.16070401.9500.9679",
"W32.Sasser.D",
"Win32/Sasser.D",
"Win.Worm.Sasser-2",
"Net-Worm.Win32.Sasser.c",
"Trojan.Win32.Sasser.fvek",
"Worm.Win32.Sasser.16384",
"W32.W.Sasser.kZ72",
"W32/Sasser.worm.d",
"I-Worm/Sasser.d",
"WORM/Sasser.D",
"Worm[Net]/Win32.Sasser",
"Net-Worm.Win32.Sasser.c",
"Worm:Win32/Sasser.dam",
"W32/Sasser.worm.d",
"Worm.Sasser",
"W32/Sasser.D.worm",
"Email-Worm.Win32.Plexus",
"W32/Sasser.C!worm.im"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Full",
"remote",
"access",
"capabilities",
"is",
"a",
"dream",
"tool",
"for",
"the",
"black",
"hat",
"community,",
"and",
"are",
"highly",
"sought",
"after."
] | [
16,
3,
11,
16,
16,
16,
16,
3,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16
] |
[
"The",
"purpose",
"of",
"using",
"such",
"a",
"design",
"is",
"likely",
"to",
"make",
"understanding",
"and",
"analyzing",
"the",
"malware's",
"code",
"flow",
"more",
"difficult",
"for",
"researchers."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4
] |
[
"This",
"routine",
"is",
"a",
"form",
"of",
"generic",
"and",
"variable",
"generator",
"of",
"DLL",
"side-loading",
"combinations",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Recently,",
"I've",
"been",
"investigating",
"malware",
"utilizing",
"PowerShell",
"and",
"have",
"spent",
"a",
"considerable",
"amount",
"of",
"time",
"refining",
"ways",
"to",
"identify",
"new",
"variants",
"of",
"attacks",
"as",
"they",
"appear."
] | [
16,
16,
16,
16,
3,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
1,
16,
16,
16
] |
[
"The",
"following",
"screenshot",
"shows",
"the",
"command",
"execution",
"functionality",
"in",
"action",
":",
"The",
"paramString",
"parameter",
"shown",
"in",
"the",
"above",
"screenshot",
"can",
"be",
"any",
"command",
"received",
"from",
"C",
"&",
"C",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"As",
"proof",
"of",
"its",
"popularity,",
"certain",
"government",
"officials",
"are",
"said",
"to",
"employ",
"this",
"application",
"for",
"communication",
"purposes",
"in",
"the",
"office."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Turla.ar",
"Trojan.Asprox.B",
"Trojan.MulDrop7.18901",
"BehavesLike.Win32.Downloader.dc",
"Trojan:Win32/Regin.D!dha",
"Trj/Chgt.J",
"Win32/Turla.AR",
"Trojan.Turla!gdUjdZ2fM5A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Now,",
"three",
"months",
"after",
"the",
"source",
"code",
"was",
"published,",
"we",
"decided",
"to",
"have",
"a",
"look",
"at",
"what",
"has",
"changed",
"in",
"the",
"banking",
"malware",
"landscape."
] | [
16,
0,
8,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Crypt.RI",
"Trojan.Crypt.RI",
"Trojan.Crypt.RI",
"Trojan.Crypt.RI",
"Trojan.Crypt.RI",
"Trojan.Crypt.RI",
"Trojan.Crypt",
"Trojan.Crypt.RI"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"More",
"technically",
"inclined",
"people",
"can",
"detect",
"infections",
"by",
"seeing",
"if",
"a",
"device",
"connects",
"to",
"a",
"control",
"server",
"located",
"at",
"app.blinkingcamera.com",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16
] |
[
"Infection",
"chain",
"The",
"threat",
"actors",
"behind",
"this",
"version",
"used",
"several",
"fake",
"websites",
"as",
"their",
"host",
"β",
"copying",
"that",
"of",
"a",
"Japanese",
"mobile",
"phone",
"operator",
"β",
"s",
"website",
"in",
"particular",
"β",
"to",
"trick",
"users",
"into",
"downloading",
"the",
"fake",
"security",
"Android",
"application",
"package",
"(",
"APK",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16
] |
[
"Sysget",
"malware",
"was",
"delivered",
"both",
"directly",
"via",
"phishing",
"emails,",
"as",
"well",
"as",
"in",
"Rich",
"Text",
"Format",
"RTF",
"documents",
"exploiting",
"the",
"CVE-2015-1641",
"vulnerability",
"patched",
"in",
"MS15-033",
"that",
"in",
"turn",
"leveraged",
"a",
"very",
"unique",
"shellcode."
] | [
3,
11,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
1,
9,
9,
9,
9,
7,
16,
1,
7,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9
] |
[
"All",
"these",
"packages",
"used",
"provisioning",
"profiles",
"with",
"distribution",
"certificates",
"associated",
"with",
"the",
"company",
"Connexxa",
"S.R.L",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12
] |
[
"Indicators",
"about",
"Sakula",
"and",
"multiple",
"RATs",
"that",
"are",
"being",
"used",
"across",
"multiple",
"intrusions."
] | [
16,
16,
3,
16,
3,
11,
16,
16,
16,
16,
16,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win32/Tofsee.B",
"Trojan-Proxy.Win32.Xorpix.m",
"Trojan.Win32.Xorpix.zybt",
"Trojan.Win32.Proxy.12800.C",
"Trojan.DownLoader.19108",
"Trojan.Small.Win32.39831",
"TrojanProxy.Xorpix.k",
"Troj.Proxy.W32!c",
"Trojan-Proxy.Win32.Xorpix.m",
"Trojan/Win32.Xorpix.R72000",
"Win32/Small.NCN",
"Win32.Trojan-proxy.Xorpix.Amci",
"Trojan.Win32.Small",
"Bck/Xorpix.AG",
"Win32/Trojan.Proxy.211"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Mobile",
"monetization",
"platforms",
"create",
"software",
"libraries",
"that",
"authors",
"can",
"embed",
"into",
"their",
"apps",
"to",
"start",
"earning",
"money",
"quickly."
] | [
4,
12,
12,
16,
5,
13,
16,
6,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16
] |
[
"Many",
"of",
"these",
"servers",
"are",
"control",
"panels",
"for",
"video",
"surveillance",
"systems",
"developed",
"by",
"the",
"Italian",
"company",
"eSurv",
",",
"based",
"in",
"Catanzaro",
",",
"in",
"Calabria",
",",
"Italy",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"required",
"other",
"means",
"to",
"be",
"deployed",
"on",
"targeted",
"organizations'",
"networks",
"and",
"is",
"configured",
"with",
"previously",
"stolen",
"credentials."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"2",
":",
"Bit.ly",
"statistics",
"for",
"a",
"phishing",
"landing",
"page",
"targeting",
"Bank",
"Austria",
"customers",
"The",
"actor",
"appears",
"to",
"have",
"recently",
"begun",
"using",
"β",
".top",
"β",
"top-level",
"domains",
"(",
"TLDs",
")",
"for",
"their",
"phishing",
"landing",
"pages",
"and",
"have",
"implemented",
"a",
"consistent",
"naming",
"structure",
"as",
"shown",
"below",
"."
] | [
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"To",
"catch",
"these",
"threats",
",",
"security",
"solutions",
"used",
"heuristics",
"that",
"focused",
"on",
"detecting",
"this",
"behavior",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.ExpiroPC.PE",
"Heur.Corrupt.PE",
"TrojanDownloader:Win32/WarezSet.dam#2"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.KloggerQKA.Trojan",
"Trojan-Downloader.Win32.Delf!O",
"Backdoor.Gobot",
"Downloader.Delf.Win32.70",
"Backdoor.W32.Gobot.lfDt",
"Trojan/Downloader.Delf.bm",
"Win32.Trojan.WisdomEyes.16070401.9500.9965",
"W32/Avokado.SIKN-9031",
"W32.Gobot.A",
"Backdoor.Gobot",
"Win32/Gobot.B",
"WORM_GOBOT.G",
"Win.Downloader.Delf-144",
"Trojan.Win32.Delf.gvzc",
"Trojan.Win32.Delf.47087",
"Win32.HLLW.Ghostbot",
"WORM_GOBOT.G",
"BehavesLike.Win32.Kudj.pc",
"Backdoor.Win32.Gobot",
"W32/Avokado.B@bd",
"TrojanDownloader.Delf.pgr",
"TR/Dldr.Delf.BM",
"Trojan[Backdoor]/Win32.Gobot",
"Backdoor:Win32/Gobot.A",
"Worm/Win32.IRCBot.R29095",
"Bck/Gotob.AA",
"Trojan.Delf.BM",
"Win32/TrojanDownloader.Delf.BM",
"Trojan.DL.Delf!UOW7nlBxiow"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Since",
"it",
"becomes",
"a",
"part",
"of",
"the",
"boot",
"partition",
",",
"formatting",
"the",
"device",
"will",
"not",
"solve",
"the",
"problem",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"greater",
"worry",
"is",
"that",
"these",
"situations",
"may",
"sometimes",
"not",
"be",
"simple",
"mistakes",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"recent",
"weeks,",
"Unit",
"42",
"has",
"discovered",
"three",
"documents",
"crafted",
"to",
"exploit",
"the",
"InPage",
"program."
] | [
16,
0,
8,
4,
12,
16,
16,
1,
9,
9,
16,
3,
16,
5,
13
] |
[
"The",
"malware",
"families",
"identified",
"at",
"this",
"time",
"are",
"DarkComet,",
"LuminosityLink",
"RAT,",
"Pony,",
"ImmenentMonitor,",
"and",
"some",
"multiple",
"variations",
"of",
"shellcode."
] | [
3,
11,
11,
16,
16,
16,
16,
16,
3,
11,
11,
11,
11,
16,
16,
16,
3,
11,
11
] |
[
"Call",
"Service",
"Figure",
"5",
":",
"Code",
"for",
"the",
"calls",
"service",
"As",
"seen",
"above",
",",
"the",
"calls",
"service",
"stores",
"incoming",
"call",
"details",
"in",
".mp3",
"format",
"in",
"the",
"/sdcard/DCIM/.dat/",
"directory",
"with",
"file",
"name",
"appended",
"with",
"\"",
"In_",
"''",
"for",
"incoming",
"calls",
"and",
"\"",
"Out_",
"''",
"for",
"outgoing",
"calls",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Despite",
"the",
"2016",
"Olympics",
"coming",
"to",
"a",
"close,",
"cybercriminals",
"remain",
"relentless",
"in",
"using",
"the",
"sporting",
"event",
"as",
"a",
"social",
"engineering",
"hook",
"to",
"distribute",
"a",
"banking",
"Trojan."
] | [
16,
16,
0,
4,
16,
16,
16,
16,
6,
15,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Program.Optimizer.12",
"TrojanDownloader:Win32/Javsisxep.A",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"We",
"believe",
"the",
"initial",
"versions",
"of",
"this",
"malware",
"were",
"created",
"at",
"least",
"three",
"years",
"ago",
"β",
"at",
"the",
"end",
"of",
"2014",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"One",
"of",
"its",
"most",
"notable",
"routines",
"is",
"capturing",
"voice",
"calls",
"in",
"real",
"time",
"by",
"hooking",
"into",
"the",
"β",
"mediaserver",
"β",
"system",
"service",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Call",
"Command",
"Figure",
"9",
":",
"The",
"calling",
"functionality",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"After",
"landing",
"on",
"the",
"victim",
"β",
"s",
"phone",
",",
"the",
"RuMMS",
"apps",
"will",
"request",
"device",
"administrator",
"privileges",
",",
"remove",
"their",
"icons",
"to",
"hide",
"themselves",
"from",
"users",
",",
"and",
"remain",
"running",
"in",
"the",
"background",
"to",
"perform",
"a",
"series",
"of",
"malicious",
"behaviors",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Of",
"note,",
"this",
"is",
"three",
"years",
"earlier",
"than",
"the",
"oldest",
"Elise",
"sample",
"we",
"have",
"found,",
"suggesting",
"this",
"group",
"has",
"been",
"active",
"longer",
"than",
"previously",
"documented."
] | [
16,
16,
16,
16,
0,
8,
8,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TSPY_KILLAV_BK2200FA.TOMC",
"Trojan.Win32.NtRootKit.dgaent",
"Troj.GameThief.W32.OnLineGames.l7iy",
"Trojan.DownLoad3.35430",
"Trojan.KillAV.Win32.9854",
"TSPY_KILLAV_BK2200FA.TOMC",
"TR/Killav.OI.2",
"Trojan/Win32.Unknown",
"Trojan.Graftor.D3B65",
"Trojan:WinNT/Killav.E",
"Trojan/Win32.KillAV.R32978",
"Trojan.Win32.KillAV.aal",
"W32/KillAV.NKC!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Users",
"do",
"not",
"see",
"those",
"SMS",
"because",
"they",
"are",
"processed",
"not",
"by",
"the",
"SMS",
"app",
",",
"but",
"by",
"the",
"app",
"that",
"has",
"initiated",
"the",
"transaction",
"β",
"e.g",
"a",
"free-to-play",
"game",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrjnDwnldr.Banload.FC.2467",
"Win32.Trojan.WisdomEyes.16070401.9500.9993",
"W32/Trojan.FOJF-1615",
"Ransom_Blocker.R004C0DAM18",
"Win.Trojan.12504345-1",
"Trojan-Ransom.Win32.Blocker.kqil",
"Troj.Ransom.W32.Blocker!c",
"Trojan.DownLoader13.59179",
"Ransom_Blocker.R004C0DAM18",
"Trojan/Blocker.kir",
"TR/Spy.Banker.37888.6",
"Trojan[Ransom]/Win32.Blocker",
"Trojan.Kazy.D81FF3",
"Trojan-Ransom.Win32.Blocker.kqil",
"TrojanSpy:MSIL/Banker.M",
"Trojan/Win32.MDA.C931868",
"Hoax.Blocker",
"Trojan.Banker.WHS",
"Win32.Trojan.Blocker.Pgmu",
"Trojan.Blocker!RxWDop6Ua70",
"Trojan.MSIL.PSW",
"Win32/Trojan.Spy.d2d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"\"",
"This",
"malware",
"employs",
"several",
"tactics",
"to",
"keep",
"its",
"activity",
"hidden",
",",
"meaning",
"users",
"might",
"be",
"unaware",
"of",
"its",
"existence",
"on",
"their",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Through",
"this",
"entry,",
"in",
"which",
"we",
"take",
"a",
"closer",
"look",
"at",
"an",
"individual",
"who",
"we",
"believe",
"might",
"be",
"connected",
"to",
"the",
"Winnti",
"group,",
"we",
"hope",
"to",
"give",
"both",
"ordinary",
"users",
"and",
"organizations",
"better",
"insights",
"into",
"some",
"of",
"the",
"tools",
"β",
"notably",
"the",
"server",
"infrastructures-",
"these",
"kinds",
"of",
"threat",
"actors",
"use,",
"as",
"well",
"as",
"the",
"scale",
"in",
"which",
"they",
"operate."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16,
4,
12,
16,
4,
16,
16,
16,
16,
16,
16,
3,
16,
16,
5,
13,
13,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Also",
",",
"command",
"communications",
"with",
"the",
"malware",
"are",
"parsed",
"with",
"a",
"function",
"named",
"β",
"chuli",
"(",
")",
"β",
"prior",
"to",
"POSTing",
"stolen",
"data",
"to",
"the",
"command-and-control",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"β",
"tk1",
"β",
"will",
"disable",
"all",
"the",
"effects",
"of",
"the",
"β",
"tk0",
"β",
"command",
",",
"while",
"β",
"input",
"keyevent",
"3",
"β",
"is",
"the",
"shell",
"command",
"that",
"simulates",
"the",
"pressing",
"of",
"the",
"β",
"home",
"β",
"button",
"so",
"all",
"the",
"current",
"activities",
"will",
"be",
"minimized",
"and",
"the",
"user",
"won",
"β",
"t",
"suspect",
"anything",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.Dinwod!O",
"W32.Virut.Cur1",
"W32.Virut.CF",
"Win32/Virut.17408!corrupt",
"WORM_OTORUN.SMN1",
"Trojan-Dropper.Win32.Dinwod.by",
"Trojan.Win32.Dinwod.cooobe",
"Troj.Dropper.W32.Dinwod.mmkC",
"Virus.Win32.Virut.ua",
"Virus.Win32.Virut.CE",
"Trojan.MulDrop3.51046",
"WORM_OTORUN.SMN1",
"Win32/Virut.bv",
"TR/VB.Inject.qopannv",
"Trojan[Dropper]/Win32.Dinwod",
"Win32.Virut.cr.61440",
"Trojan.Zusy.D423D8",
"Dropper.Dinwod.151552",
"Trojan-Dropper.Win32.Dinwod.by",
"Worm:Win32/Rortoti.A",
"HEUR/Fakon.mwf",
"TScope.Trojan.VB",
"Trojan.FileLock",
"I-Worm.Filecoder.A",
"Win32/Virut.NBP",
"Trojan-Dropper.Win32.Dinwod",
"W32/Sality.AO"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Ursu.D1347A",
"Win32.Trojan.WisdomEyes.16070401.9500.9990",
"Trojan.MulDrop7.48244",
"Trojan-Ransom.Rantest",
"W32.Ransomsimulation",
"TR/StartPage.wgude",
"Trojan/MSIL.Miner",
"RiskWare.RansomSimulator",
"Trj/GdSda.A",
"Trojan.StartPage!pRfC+LclTxM",
"Win32/Trojan.7c5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.WebSearch",
"W32/Application.KWFL-8070",
"Trojan.Win32.WebSearch.ak",
"Trojan.Win32.WebSearch.ommdf",
"Trojan.Win32.Z.Websearch.263168",
"Troj.W32.Websearch!c",
"TR/WebSearch.V",
"Trojan:Win32/WebSearch.F",
"Trojan.Win32.WebSearch.ak",
"Trj/CI.A",
"Win32.Trojan.Websearch.Lmap",
"Trojan.WebSearch!GWyPJuQViZY",
"Win32/Trojan.3ff"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Locky",
"is",
"a",
"ransomware",
"that",
"can",
"be",
"installed",
"when",
"you",
"open",
"an",
"attachment,",
"usually",
"as",
"a",
"Word",
"file",
"from",
"a",
"spam",
"email."
] | [
3,
16,
16,
3,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
1,
9,
16,
1,
9,
9
] |
[
"We",
"are",
"seeing",
"a",
"bit",
"of",
"an",
"uptick",
"of",
"emails",
"containing",
"java",
"adwind",
"or",
"Java",
"Jacksbot",
"attachments."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
1,
3,
16,
1,
3,
1
] |
[
"It",
"then",
"starts",
"the",
"final",
"detonator",
"function",
"to",
"load",
"the",
"dropped",
".dex",
"file",
"into",
"memory",
"and",
"triggers",
"the",
"main",
"payload",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9991",
"W32/Dropper.ANAB",
"TROJ_DROPPER.SMW",
"Packed.Win32.Krap.ap",
"Trojan.Winlock.587",
"TROJ_DROPPER.SMW",
"BehavesLike.Win32.FakeAlertSecurityTool.fc",
"W32/Risk.VFHY-0574",
"Trojan[Packed]/Win32.Krap",
"Packed.Win32.Krap.ap",
"Dropper/Win32.Smiscer.R13962",
"Trojan.DR.Procesemes!WkidsgpO+Do",
"Packed.Win32.Krap"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.BitCoinMiner.jz",
"Trojan.Win32.BitCoinMiner.euxcee",
"Win32.Trojan.Bitcoinminer.Wrgk",
"Trojan.DownLoader25.54215",
"Trojan.CoinMiner.Win32.6503",
"Trojan/Win32.BitCoinMiner",
"Trojan.Win32.BitCoinMiner.jz",
"TrojanDownloader:MSIL/CoinMiner.A!bit",
"Trojan.BitCoinMiner",
"Trojan.BitCoinMiner",
"Trj/GdSda.A",
"Trojan.BitCoinMiner!x6PcA/gbW/U",
"W32/BitCoinMiner.JZ!tr",
"Win32/Trojan.5d5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"few",
"weeks",
"ago,",
"we",
"observed",
"new",
"activity",
"from",
"ChessMaster,",
"with",
"notable",
"evolutions",
"in",
"terms",
"of",
"new",
"tools",
"and",
"tactics",
"that",
"weren't",
"present",
"in",
"the",
"initial",
"attacks."
] | [
0,
8,
8,
8,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"It",
"abuses",
"the",
"legitimate",
"and",
"popular",
"open",
"source",
"framework",
"DroidPlugin",
"which",
"allows",
"an",
"app",
"to",
"dynamically",
"launch",
"any",
"apps",
"as",
"plugins",
"without",
"installing",
"them",
"in",
"the",
"system."
] | [
16,
7,
16,
16,
16,
16,
7,
15,
15,
15,
16,
7,
15,
15,
15,
15,
15,
15,
15,
15,
15,
16,
16,
16,
16,
16,
5
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.StartPage.e.Trojan",
"Trojan.Startpage",
"TROJ_STARTPAGE_FD050152.UVPM",
"Trojan.Win32.Z.Startpage.4001399",
"TROJ_STARTPAGE_FD050152.UVPM",
"TR/StartPage.sdjtv",
"W32/STARTPAGE_FD050152.UVPM!tr",
"Win32/Trojan.41b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Application",
"launch",
"When",
"launching",
"for",
"the",
"first",
"time",
",",
"the",
"Trojan",
"checks",
"if",
"it",
"is",
"being",
"launched",
"in",
"an",
"emulation",
"environment",
",",
"and",
"in",
"which",
"country",
"it",
"is",
"being",
"launched",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.