tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "As", "the", "attack", "is", "currently", "active,", "it", "effectively", "turns", "compromised", "sites", "into", "attack", "surfaces", "against", "their", "visitors." ]
[ 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 4 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader.Stegvob.C9", "Win32.Trojan-Downloader.Delf.c", "WORM_TOPHOS.BKD", "Trojan.Win32.Dropper.aas", "Win32.HLLW.Tophos.1", "WORM_TOPHOS.BKD", "Trojan.Symmi.DD7FE", "Worm:Win32/Tophos.B", "BScope.Worm.Tophos.2612", "Backdoor.Bot", "Virus.Win32.Sality", "W32/Tophos.AAA!tr", "Win32/Trojan.278" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "most", "affected", "countries", "were", "India", ",", "Brazil", ",", "and", "Indonesia", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Aside", "from", "stealing", "keystrokes,", "passwords,", "Bitcoins,", "system", "information,", "and", "files", "on", "disk,", "NionSpy", "also", "known", "as", "Mewsei", "and", "MewsSpy", "can", "record", "video", "using", "the", "webcam,", "audio", "using", "the", "microphone,", "take", "screenshots,", "and", "use", "infected", "machines", "as", "a", "proxy", "tunnel", "to", "connect", "to", "other", "machines", "within", "the", "network." ]
[ 16, 16, 16, 16, 16, 16, 16, 12, 16, 16, 16, 16, 3, 16, 16, 16, 3, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 1, 9, 16, 16, 16, 16, 5, 16, 16, 5 ]
[ "The", "actors", "behind", "this", "adware", "utilize", "a", "simple", "yet", "effective", "approach", "–", "they", "download", "a", "popular,", "legitimate", "Android", "application,", "decompile", "it,", "add", "their", "malicious", "routines,", "then", "repackage", "the", "Android", "application", "package", "APK." ]
[ 16, 6, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 3, 11, 16, 16, 5, 13, 13, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Mauvaise.SL1", "Trojan.FlyStudio.Win32.19742", "Trojan/FlyStudio.ooa", "Trojan.Zusy.D38745", "Win32.Trojan.FlyStudio.we", "Win32.Application.PUPStudio.B", "Trojan.Win32.Dwn.eeopgy", "Trojan.DownLoader24.6094", "Trojan.Win32.Antavmu", "TR/Winder.sbcde", "Trojan[Dropper]/Win32.Sysn", "Trojan:Win32/Winder.A", "RiskWare.GameHack", "Backdoor.Farfli!+OYA++JJfG8" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "#ISMDoor", "impersonates", "ZAHRANI", "an", "electrical", "equipment", "and", "engineering", "company", "in", "Saudi", "Arabia", "and", "ThetaRay." ]
[ 3, 16, 4, 16, 4, 12, 16, 4, 12, 16, 2, 10, 16, 4 ]
[ "In", "the", "third", "intrusion,", "the", "Mandiant", "Incident", "Response", "team", "was", "contacted", "after", "UNC961", "had", "compromised", "the", "victim", "and", "transferred", "access", "to", "UNC3966." ]
[ 16, 16, 16, 16, 4, 12, 12, 12, 12, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 6 ]
[ "Modification", "of", "KBOT", "from", "the", "Carberp", "leak." ]
[ 16, 16, 3, 16, 16, 3, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Lossymem", "MSIL/Filecoder.LI", "Ransom_LTML.THAOJH", "Trojan.Win32.Ransom.ewugaq", "Ransom_LTML.THAOJH", "Trojan-Ransom.FileCoder", "W32/Trojan.QFKV-3532", "TR/Ransom.xaclx", "Trojan/Win32.Ransom.C2353444", "Trojan.Ransom.LongTermMemoryLoss", "Trj/GdSda.A", "MSIL.Trojan-Ransom.LTML.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Floxif.S1578425", "Trojan.Rozena.Win32.59165", "BKDR_CCHACK.A", "W32/CChack.A", "Trojan.Ccleaner", "BKDR_CCHACK.A", "Win.Spyware.CCBkdr-6336251-2", "Win32.Backdoor.Forpivast.B", "Backdoor.Win32.InfeCleaner.a", "Trojan.PRForm.A", "Trojan.Win32.Floxif.estdxt", "Trojan.Win32.Z.Floxif.5000118", "Trojan.PRForm.A", "Trojan.CCleaner.2", "BehavesLike.Win32.Dropper.rc", "Backdoor.Hacked.CCleaner", "W32/CChack.SQBY-7641", "Trojan[FakeAV]/Win32.CCleaner", "Backdoor.Win32.InfeCleaner.a", "Win-Trojan/Floxif.9791816", "Backdoor.InfeCleaner", "Trj/CI.A", "Trojan.PRForm.A", "Win32.Backdoor.Infecleaner.Lkns", "Win32/Trojan.54c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Additionally", ",", "we", "have", "determined", "that", "though", "original", "reports", "of", "this", "story", "attribute", "this", "surveillanceware", "tool", "to", "Hamas", ",", "this", "may", "not", "be", "the", "case", ",", "as", "we", "demonstrate", "below", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Malicious", "codes", "are", "embedded", "in", "apps", "that", "the", "operators", "repackaged", "from", "legitimate", "applications", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Exp.OLE.CVE-2015-1641.E", "Trojan.Mdropper", "Win32/Exploit.CVE-2015-1641.V", "TROJ_MDROP.YYSRH", "TROJ_MDROP.YYSRH", "RTF/Trojan.BTCC-93", "Trojan[Exploit]/Win32.CVE-2015-1641", "Exploit.CVE-2015-1641", "Exploit.CVE-2015-1641" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "eSurv", "’", "s", "public", "marketing", "is", "centered", "around", "video", "surveillance", "software", "and", "image", "recognition", "systems", ",", "but", "there", "are", "a", "number", "of", "individuals", "claiming", "to", "be", "mobile", "security", "researchers", "working", "at", "the", "company", ",", "including", "one", "who", "has", "publically", "made", "claims", "to", "be", "developing", "a", "mobile", "surveillance", "agent", "." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W97M.Downloader.CXJ", "O97M.Drop.P", "W97M.Downloader.CXJ", "VBA.Trojan.Obfuscated.u", "VBA/Obfuscated.C", "W2KM_GOLROTED.AGG", "W97M.Downloader.CXJ", "W97M.Downloader.CXJ", "Trojan.Ole2.Vbs-heuristic.druvzi", "W97M.Downloader.CXJ", "W97M.Downloader.CXJ", "W97M.DownLoader.1033", "W2KM_GOLROTED.AGG", "W97M.Downloader.CXJ", "WM/Obfuscated.C!tr", "virus.office.obfuscated.1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "new", "custom", "backdoor", "used", "by", "the", "Mustang", "Panda", "APT", "group", "is", "targeting", "a", "governmental", "institution", "in", "Taiwan,", "according", "to", "ESET", "researchers", "who", "have", "analyzed", "samples", "of", "MQsTTang,", "a", "new", "type", "of", "malware." ]
[ 16, 3, 11, 11, 16, 16, 16, 6, 14, 14, 14, 16, 16, 4, 12, 12, 16, 2, 16, 16, 4, 12, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9970", "Backdoor.Trojan.B", "Win.Trojan.10430800-1", "Trojan.Win32.Pugeshe.ctexqh", "BDS/Pugeshe.A.2", "Trj/Ziyang.A", "Win32.Backdoor.Pugeshe.Phzt", "Trojan.Ziyanzho!" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "original", "code", "of", "BankBot", "was", "divulged", "on", "a", "Russian", "forum", "in", "late", "2016,", "and", "you", "can", "read", "more", "about", "that", "here." ]
[ 3, 11, 11, 16, 3, 16, 16, 16, 6, 14, 14, 16, 0, 8, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Based", "on", "observations", "on", "infrastructure,", "and", "the", "state", "of", "the", "code,", "we", "believe", "these", "incidents", "represent", "the", "first", "attempts", "to", "deploy", "the", "agent,", "and", "features", "such", "as", "persistence", "do", "not", "appear", "to", "work." ]
[ 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "β€˜", "SimBad", "’", "comes", "with", "a", "respected", "list", "of", "capabilities", "on", "the", "user", "’", "s", "device", ",", "such", "as", "removing", "the", "icon", "from", "the", "launcher", ",", "thus", "making", "it", "harder", "for", "the", "user", "to", "uninstall", ",", "start", "to", "display", "background", "ads", "and", "open", "a", "browser", "with", "a", "given", "URL", "." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "malware", "contains", "an", "old", "school", "exclusion", "list", "that", "performs", "extremely", "rapid", "double", "word", "comparisons", "rather", "than", "the", "slower", "but", "far", "more", "common", "string", "comparisons", "to", "identify", "which", "process", "to", "ignore,", "and", "internally", "validates", "the", "identified", "account", "data", "through", "an", "implementation", "of", "the", "Luhn", "algorithm." ]
[ 16, 3, 16, 16, 1, 9, 9, 9, 15, 16, 16, 1, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "While", "our", "systems", "are", "great", "at", "automatically", "detecting", "and", "protecting", "against", "PHAs", ",", "we", "believe", "the", "best", "security", "comes", "from", "the", "combination", "of", "automated", "scanning", "and", "skilled", "human", "review", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Symantec's", "latest", "whitepaper", "documents", "multiple", "Black", "Vine", "operations", "that", "have", "been", "occurring", "since", "2012." ]
[ 4, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16, 0 ]
[ "A", "backdoor", "also", "known", "as:", "HT_BLADABINDI_GL190001.UVPM", "HT_BLADABINDI_GL190001.UVPM", "Backdoor.MSIL.Bladabindi.alfk", "Trojan.Win32.Bladabindi.exqcus", "Ht.Bladabindi.Gl190001!c", "BehavesLike.Win32.Dropper.wc", "Trojan:Win32/Trogle.A", "Backdoor.MSIL.Bladabindi.alfk", "Trj/CI.A", "Msil.Backdoor.Bladabindi.Tbsy" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "targetting", "Linux", "also", "known", "as:", "Backdoor.Linux.Tsunami.A", "Linux.Kaiten.B", "ELF_KAITEN.SMK", "Trojan.Tsunami.excyez", "Linux.BackDoor.Tsunami.123", "ELF_KAITEN.SMK", "ELF/Backdoor.MRMO-", "LINUX/Tsunami.ojldj", "Trojan.Backdoor.Linux.Tsunami.1", "Backdoor.Linux.Tsunami!c", "Linux.Backdoor.Tsunami.Wrpx" ]
[ 16, 3, 16, 11, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Yes", ",", "we", "are", "talking", "about", "SuperMarioRun", ",", "which", "was", "recently", "launched", "by", "Nintendo", "only", "for", "iOS", "users", "." ]
[ 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 4, 16, 16, 5, 16, 16 ]
[ "This", "version", "has", "some", "small", "modifications", "which", "seems", "to", "be", "unused", ",", "as", "the", "malware", "behaviour", "is", "the", "same", "as", "the", "previous", "version", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "August", "contains", "stealing", "functionality", "targeting", "credentials", "and", "sensitive", "documents", "from", "the", "infected", "computer." ]
[ 3, 16, 1, 16, 16, 1, 16, 1, 9, 16, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.VB!O", "Trojan/VB.htj", "Trojan.Heur.RX.ED14C7A", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Backdoor.Trojan", "Win.Trojan.VB-8430", "Trojan-Dropper.Win32.Daws.enmy", "Troj.Downloader.W32.VB.ldQ2", "TrojWare.Win32.Trojan.VB.~DQ", "Trojan.VB.Win32.6994", "BehavesLike.Win32.Trojan.nm", "Trojan.Win32.VB", "Trojan/VB.fgm", "Backdoor:Win32/Lordly.A", "Trojan-Dropper.Win32.Daws.enmy", "Trojan/Win32.Downloader.R12171", "Trojan.VB!jnJsu+mHRvk", "W32/VB.JHO!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Trojan.Revetrat", "Trojan:MSIL/Starter.I", "Trj/GdSda.A", "Win32/Trojan.db5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Z.Pemalform.45056.A", "W32.W.Otwycal.l4av", "TrojanDownloader:Win32/Raemnk.A", "Win32/RiskWare.PEMalform.E", "Win32/Trojan.444" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "If", "the", "mobile", "operator", "does", "n't", "enforce", "proper", "client", "isolation", ",", "it", "is", "possible", "that", "the", "infected", "devices", "are", "also", "exposed", "to", "the", "rest", "of", "the", "cellular", "network", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "targets", "were", "then", "further", "narrowed", "to", "those", "that", "were", "running", "the", "Mac", "OS", "X", "operating", "system,", "had", "not", "previously", "visited", "the", "website,", "and", "had", "specific", "browser", "versions." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 15, 16, 16, 5, 13, 13, 13, 13, 13, 16, 16, 16, 16, 1, 9, 16, 16, 16, 5, 13 ]
[ "HummingBad", "sends", "notifications", "to", "Umeng", ",", "a", "tracking", "and", "analytics", "service", "attackers", "use", "to", "manage", "their", "campaign", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "comupload101", "[", "." ]
[ 9, 9, 1, 9 ]
[ "The", "sample", "’", "s", "first", "appearance", "seems", "to", "be", "May", "15", ",", "2018", ",", "when", "it", "was", "uploaded", "to", "VirusTotal", ",", "but", "it", "’", "s", "unclear", "how", "the", "tainted", "sample", "is", "disseminated", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Ginp", "embeds", "the", "following", "set", "of", "features", ",", "allowing", "it", "to", "remain", "under", "the", "radar", "and", "successfully", "perform", "attacks", ":", "Overlaying", ":", "Dynamic", "(", "local", "overlays", "obtained", "from", "the", "C2", ")", "SMS", "harvesting", ":", "SMS", "listing", "SMS", "harvesting", ":", "SMS", "forwarding", "Contact", "list", "collection", "Application", "listing", "Overlaying", ":", "Targets", "list", "update", "SMS", ":", "Sending", "Calls", ":", "Call", "forwarding", "C2", "Resilience", ":", "Auxiliary", "C2", "list", "Self-protection", ":", "Hiding", "the", "App", "icon", "Self-protection", ":", "Preventing", "removal", "Self-protection", ":", "Emulation-detection", "Update", "10/03/2020", "At", "the", "end", "of", "February", "the", "actors", "behind", "Ginp", "added", "screen", "capture", "capabilities", "to", "their", "Trojan", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanPWS.Grozlex.A3", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "TSPY_GROZLEX.SMA", "Win.Spyware.Grozlex-1", "TSPY_GROZLEX.SMA", "PWS:MSIL/Mintluks.A", "Trojan.PasswordStealer.MSIL" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "top/", "These", "permutations", "of", "TLDs", "and", "canonical", "domains", "incorporating", "the", "legitimate", "domain", "expected", "by", "the", "targeted", "banking", "customers", "exemplifies", "recent", "trends", "in", "social", "engineering", "by", "threat", "actors", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.ArtemisPuty.Trojan", "Trojan.Modputty.A5", "Trojan.Puty.Win32.1", "Trojan/MalPutty.a", "W32/Trojan.SHOY-1500", "Win.Trojan.Stealzilla-1", "Trojan-PSW.Win32.Puty.a", "Trojan.Win32.Puty.dsnaim", "Troj.PSW32.W.Puty.tnaX", "Win32.Trojan-qqpass.Qqrob.Llhf", "BackDoor.DaVinci.18", "BehavesLike.Win32.BadFile.hh", "Trojan.Win32.Modputty", "Trojan/PSW.Puty.a", "Trojan:Win32/Modputty.A", "Trojan-PSW.Win32.Puty.a", "Trojan/Win32.Modputty.C862836", "TrojanPSW.Puty", "Trojan.PWS.Puty!", "W32/MalPutty.A!tr", "Trj/Fakeputty.A", "Win32/Trojan.Spy.b9b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "”", "social", "”", "–", "this", "command", "that", "starts", "the", "β€˜", "AndroidMDMSupport", "’", "service", "–", "this", "allows", "the", "files", "of", "any", "other", "installed", "application", "to", "be", "grabbed", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "have", "analyzed", "the", "samples", "to", "determine", "the", "author's", "ultimate", "goal", "and", "have", "named", "this", "malware", "KeyRaider" ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "VBS/Downldr.HM", "VBS.Downloader.B", "VBS_LOCKY.DLDSARF", "Win.Trojan.Locky-6360731-0", "Trojan.Script.ExpKit.etmlqw", "Troj.Downloader.Script!c", "VBS.DownLoader.1006", "VBS_LOCKY.DLDSARF", "VBS/Downldr.HM", "Trojan/VBS.downloder", "TrojanDownloader:VBS/Locky.A", "VBS/Obfus.S8", "Trojan-Ransom.Script.Locky", "virus.vbs.qexvmc.1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "this", "blog", "post", ",", "we", "do", "not", "differentiate", "between", "the", "rooting", "component", "and", "the", "component", "that", "abuses", "root", ":", "we", "refer", "to", "them", "interchangeably", "as", "Zen", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16 ]
[ "It", "uses", "insidious", "injection", "and", "other", "sophisticated", "and", "stealthy", "methods." ]
[ 16, 16, 1, 9, 16, 16, 1, 16, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Sasser.D", "Win32.Trojan.WisdomEyes.16070401.9500.9679", "W32.Sasser.D", "Win32/Sasser.D", "Win.Worm.Sasser-2", "Net-Worm.Win32.Sasser.c", "Trojan.Win32.Sasser.fvek", "Worm.Win32.Sasser.16384", "W32.W.Sasser.kZ72", "W32/Sasser.worm.d", "I-Worm/Sasser.d", "WORM/Sasser.D", "Worm[Net]/Win32.Sasser", "Net-Worm.Win32.Sasser.c", "Worm:Win32/Sasser.dam", "W32/Sasser.worm.d", "Worm.Sasser", "W32/Sasser.D.worm", "Email-Worm.Win32.Plexus", "W32/Sasser.C!worm.im" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Full", "remote", "access", "capabilities", "is", "a", "dream", "tool", "for", "the", "black", "hat", "community,", "and", "are", "highly", "sought", "after." ]
[ 16, 3, 11, 16, 16, 16, 16, 3, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16 ]
[ "The", "purpose", "of", "using", "such", "a", "design", "is", "likely", "to", "make", "understanding", "and", "analyzing", "the", "malware's", "code", "flow", "more", "difficult", "for", "researchers." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4 ]
[ "This", "routine", "is", "a", "form", "of", "generic", "and", "variable", "generator", "of", "DLL", "side-loading", "combinations", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Recently,", "I've", "been", "investigating", "malware", "utilizing", "PowerShell", "and", "have", "spent", "a", "considerable", "amount", "of", "time", "refining", "ways", "to", "identify", "new", "variants", "of", "attacks", "as", "they", "appear." ]
[ 16, 16, 16, 16, 3, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 1, 16, 16, 16 ]
[ "The", "following", "screenshot", "shows", "the", "command", "execution", "functionality", "in", "action", ":", "The", "paramString", "parameter", "shown", "in", "the", "above", "screenshot", "can", "be", "any", "command", "received", "from", "C", "&", "C", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "As", "proof", "of", "its", "popularity,", "certain", "government", "officials", "are", "said", "to", "employ", "this", "application", "for", "communication", "purposes", "in", "the", "office." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Turla.ar", "Trojan.Asprox.B", "Trojan.MulDrop7.18901", "BehavesLike.Win32.Downloader.dc", "Trojan:Win32/Regin.D!dha", "Trj/Chgt.J", "Win32/Turla.AR", "Trojan.Turla!gdUjdZ2fM5A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Now,", "three", "months", "after", "the", "source", "code", "was", "published,", "we", "decided", "to", "have", "a", "look", "at", "what", "has", "changed", "in", "the", "banking", "malware", "landscape." ]
[ 16, 0, 8, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Crypt.RI", "Trojan.Crypt.RI", "Trojan.Crypt.RI", "Trojan.Crypt.RI", "Trojan.Crypt.RI", "Trojan.Crypt.RI", "Trojan.Crypt", "Trojan.Crypt.RI" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "More", "technically", "inclined", "people", "can", "detect", "infections", "by", "seeing", "if", "a", "device", "connects", "to", "a", "control", "server", "located", "at", "app.blinkingcamera.com", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16 ]
[ "Infection", "chain", "The", "threat", "actors", "behind", "this", "version", "used", "several", "fake", "websites", "as", "their", "host", "β€”", "copying", "that", "of", "a", "Japanese", "mobile", "phone", "operator", "’", "s", "website", "in", "particular", "β€”", "to", "trick", "users", "into", "downloading", "the", "fake", "security", "Android", "application", "package", "(", "APK", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16 ]
[ "Sysget", "malware", "was", "delivered", "both", "directly", "via", "phishing", "emails,", "as", "well", "as", "in", "Rich", "Text", "Format", "RTF", "documents", "exploiting", "the", "CVE-2015-1641", "vulnerability", "patched", "in", "MS15-033", "that", "in", "turn", "leveraged", "a", "very", "unique", "shellcode." ]
[ 3, 11, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 1, 9, 9, 9, 9, 7, 16, 1, 7, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9 ]
[ "All", "these", "packages", "used", "provisioning", "profiles", "with", "distribution", "certificates", "associated", "with", "the", "company", "Connexxa", "S.R.L", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12 ]
[ "Indicators", "about", "Sakula", "and", "multiple", "RATs", "that", "are", "being", "used", "across", "multiple", "intrusions." ]
[ 16, 16, 3, 16, 3, 11, 16, 16, 16, 16, 16, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win32/Tofsee.B", "Trojan-Proxy.Win32.Xorpix.m", "Trojan.Win32.Xorpix.zybt", "Trojan.Win32.Proxy.12800.C", "Trojan.DownLoader.19108", "Trojan.Small.Win32.39831", "TrojanProxy.Xorpix.k", "Troj.Proxy.W32!c", "Trojan-Proxy.Win32.Xorpix.m", "Trojan/Win32.Xorpix.R72000", "Win32/Small.NCN", "Win32.Trojan-proxy.Xorpix.Amci", "Trojan.Win32.Small", "Bck/Xorpix.AG", "Win32/Trojan.Proxy.211" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Mobile", "monetization", "platforms", "create", "software", "libraries", "that", "authors", "can", "embed", "into", "their", "apps", "to", "start", "earning", "money", "quickly." ]
[ 4, 12, 12, 16, 5, 13, 16, 6, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16 ]
[ "Many", "of", "these", "servers", "are", "control", "panels", "for", "video", "surveillance", "systems", "developed", "by", "the", "Italian", "company", "eSurv", ",", "based", "in", "Catanzaro", ",", "in", "Calabria", ",", "Italy", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "required", "other", "means", "to", "be", "deployed", "on", "targeted", "organizations'", "networks", "and", "is", "configured", "with", "previously", "stolen", "credentials." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "2", ":", "Bit.ly", "statistics", "for", "a", "phishing", "landing", "page", "targeting", "Bank", "Austria", "customers", "The", "actor", "appears", "to", "have", "recently", "begun", "using", "β€œ", ".top", "”", "top-level", "domains", "(", "TLDs", ")", "for", "their", "phishing", "landing", "pages", "and", "have", "implemented", "a", "consistent", "naming", "structure", "as", "shown", "below", "." ]
[ 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "To", "catch", "these", "threats", ",", "security", "solutions", "used", "heuristics", "that", "focused", "on", "detecting", "this", "behavior", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.ExpiroPC.PE", "Heur.Corrupt.PE", "TrojanDownloader:Win32/WarezSet.dam#2" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.KloggerQKA.Trojan", "Trojan-Downloader.Win32.Delf!O", "Backdoor.Gobot", "Downloader.Delf.Win32.70", "Backdoor.W32.Gobot.lfDt", "Trojan/Downloader.Delf.bm", "Win32.Trojan.WisdomEyes.16070401.9500.9965", "W32/Avokado.SIKN-9031", "W32.Gobot.A", "Backdoor.Gobot", "Win32/Gobot.B", "WORM_GOBOT.G", "Win.Downloader.Delf-144", "Trojan.Win32.Delf.gvzc", "Trojan.Win32.Delf.47087", "Win32.HLLW.Ghostbot", "WORM_GOBOT.G", "BehavesLike.Win32.Kudj.pc", "Backdoor.Win32.Gobot", "W32/Avokado.B@bd", "TrojanDownloader.Delf.pgr", "TR/Dldr.Delf.BM", "Trojan[Backdoor]/Win32.Gobot", "Backdoor:Win32/Gobot.A", "Worm/Win32.IRCBot.R29095", "Bck/Gotob.AA", "Trojan.Delf.BM", "Win32/TrojanDownloader.Delf.BM", "Trojan.DL.Delf!UOW7nlBxiow" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Since", "it", "becomes", "a", "part", "of", "the", "boot", "partition", ",", "formatting", "the", "device", "will", "not", "solve", "the", "problem", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "greater", "worry", "is", "that", "these", "situations", "may", "sometimes", "not", "be", "simple", "mistakes", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "recent", "weeks,", "Unit", "42", "has", "discovered", "three", "documents", "crafted", "to", "exploit", "the", "InPage", "program." ]
[ 16, 0, 8, 4, 12, 16, 16, 1, 9, 9, 16, 3, 16, 5, 13 ]
[ "The", "malware", "families", "identified", "at", "this", "time", "are", "DarkComet,", "LuminosityLink", "RAT,", "Pony,", "ImmenentMonitor,", "and", "some", "multiple", "variations", "of", "shellcode." ]
[ 3, 11, 11, 16, 16, 16, 16, 16, 3, 11, 11, 11, 11, 16, 16, 16, 3, 11, 11 ]
[ "Call", "Service", "Figure", "5", ":", "Code", "for", "the", "calls", "service", "As", "seen", "above", ",", "the", "calls", "service", "stores", "incoming", "call", "details", "in", ".mp3", "format", "in", "the", "/sdcard/DCIM/.dat/", "directory", "with", "file", "name", "appended", "with", "\"", "In_", "''", "for", "incoming", "calls", "and", "\"", "Out_", "''", "for", "outgoing", "calls", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Despite", "the", "2016", "Olympics", "coming", "to", "a", "close,", "cybercriminals", "remain", "relentless", "in", "using", "the", "sporting", "event", "as", "a", "social", "engineering", "hook", "to", "distribute", "a", "banking", "Trojan." ]
[ 16, 16, 0, 4, 16, 16, 16, 16, 6, 15, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Program.Optimizer.12", "TrojanDownloader:Win32/Javsisxep.A", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "We", "believe", "the", "initial", "versions", "of", "this", "malware", "were", "created", "at", "least", "three", "years", "ago", "–", "at", "the", "end", "of", "2014", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "One", "of", "its", "most", "notable", "routines", "is", "capturing", "voice", "calls", "in", "real", "time", "by", "hooking", "into", "the", "β€œ", "mediaserver", "”", "system", "service", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Call", "Command", "Figure", "9", ":", "The", "calling", "functionality", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "After", "landing", "on", "the", "victim", "’", "s", "phone", ",", "the", "RuMMS", "apps", "will", "request", "device", "administrator", "privileges", ",", "remove", "their", "icons", "to", "hide", "themselves", "from", "users", ",", "and", "remain", "running", "in", "the", "background", "to", "perform", "a", "series", "of", "malicious", "behaviors", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Of", "note,", "this", "is", "three", "years", "earlier", "than", "the", "oldest", "Elise", "sample", "we", "have", "found,", "suggesting", "this", "group", "has", "been", "active", "longer", "than", "previously", "documented." ]
[ 16, 16, 16, 16, 0, 8, 8, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TSPY_KILLAV_BK2200FA.TOMC", "Trojan.Win32.NtRootKit.dgaent", "Troj.GameThief.W32.OnLineGames.l7iy", "Trojan.DownLoad3.35430", "Trojan.KillAV.Win32.9854", "TSPY_KILLAV_BK2200FA.TOMC", "TR/Killav.OI.2", "Trojan/Win32.Unknown", "Trojan.Graftor.D3B65", "Trojan:WinNT/Killav.E", "Trojan/Win32.KillAV.R32978", "Trojan.Win32.KillAV.aal", "W32/KillAV.NKC!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Users", "do", "not", "see", "those", "SMS", "because", "they", "are", "processed", "not", "by", "the", "SMS", "app", ",", "but", "by", "the", "app", "that", "has", "initiated", "the", "transaction", "β€”", "e.g", "a", "free-to-play", "game", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrjnDwnldr.Banload.FC.2467", "Win32.Trojan.WisdomEyes.16070401.9500.9993", "W32/Trojan.FOJF-1615", "Ransom_Blocker.R004C0DAM18", "Win.Trojan.12504345-1", "Trojan-Ransom.Win32.Blocker.kqil", "Troj.Ransom.W32.Blocker!c", "Trojan.DownLoader13.59179", "Ransom_Blocker.R004C0DAM18", "Trojan/Blocker.kir", "TR/Spy.Banker.37888.6", "Trojan[Ransom]/Win32.Blocker", "Trojan.Kazy.D81FF3", "Trojan-Ransom.Win32.Blocker.kqil", "TrojanSpy:MSIL/Banker.M", "Trojan/Win32.MDA.C931868", "Hoax.Blocker", "Trojan.Banker.WHS", "Win32.Trojan.Blocker.Pgmu", "Trojan.Blocker!RxWDop6Ua70", "Trojan.MSIL.PSW", "Win32/Trojan.Spy.d2d" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "\"", "This", "malware", "employs", "several", "tactics", "to", "keep", "its", "activity", "hidden", ",", "meaning", "users", "might", "be", "unaware", "of", "its", "existence", "on", "their", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Through", "this", "entry,", "in", "which", "we", "take", "a", "closer", "look", "at", "an", "individual", "who", "we", "believe", "might", "be", "connected", "to", "the", "Winnti", "group,", "we", "hope", "to", "give", "both", "ordinary", "users", "and", "organizations", "better", "insights", "into", "some", "of", "the", "tools", "–", "notably", "the", "server", "infrastructures-", "these", "kinds", "of", "threat", "actors", "use,", "as", "well", "as", "the", "scale", "in", "which", "they", "operate." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16, 4, 12, 16, 4, 16, 16, 16, 16, 16, 16, 3, 16, 16, 5, 13, 13, 16, 16, 16, 6, 14, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Also", ",", "command", "communications", "with", "the", "malware", "are", "parsed", "with", "a", "function", "named", "β€œ", "chuli", "(", ")", "”", "prior", "to", "POSTing", "stolen", "data", "to", "the", "command-and-control", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "β€œ", "tk1", "”", "will", "disable", "all", "the", "effects", "of", "the", "β€œ", "tk0", "”", "command", ",", "while", "β€œ", "input", "keyevent", "3", "”", "is", "the", "shell", "command", "that", "simulates", "the", "pressing", "of", "the", "β€˜", "home", "’", "button", "so", "all", "the", "current", "activities", "will", "be", "minimized", "and", "the", "user", "won", "’", "t", "suspect", "anything", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Dropper.Win32.Dinwod!O", "W32.Virut.Cur1", "W32.Virut.CF", "Win32/Virut.17408!corrupt", "WORM_OTORUN.SMN1", "Trojan-Dropper.Win32.Dinwod.by", "Trojan.Win32.Dinwod.cooobe", "Troj.Dropper.W32.Dinwod.mmkC", "Virus.Win32.Virut.ua", "Virus.Win32.Virut.CE", "Trojan.MulDrop3.51046", "WORM_OTORUN.SMN1", "Win32/Virut.bv", "TR/VB.Inject.qopannv", "Trojan[Dropper]/Win32.Dinwod", "Win32.Virut.cr.61440", "Trojan.Zusy.D423D8", "Dropper.Dinwod.151552", "Trojan-Dropper.Win32.Dinwod.by", "Worm:Win32/Rortoti.A", "HEUR/Fakon.mwf", "TScope.Trojan.VB", "Trojan.FileLock", "I-Worm.Filecoder.A", "Win32/Virut.NBP", "Trojan-Dropper.Win32.Dinwod", "W32/Sality.AO" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Ursu.D1347A", "Win32.Trojan.WisdomEyes.16070401.9500.9990", "Trojan.MulDrop7.48244", "Trojan-Ransom.Rantest", "W32.Ransomsimulation", "TR/StartPage.wgude", "Trojan/MSIL.Miner", "RiskWare.RansomSimulator", "Trj/GdSda.A", "Trojan.StartPage!pRfC+LclTxM", "Win32/Trojan.7c5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.WebSearch", "W32/Application.KWFL-8070", "Trojan.Win32.WebSearch.ak", "Trojan.Win32.WebSearch.ommdf", "Trojan.Win32.Z.Websearch.263168", "Troj.W32.Websearch!c", "TR/WebSearch.V", "Trojan:Win32/WebSearch.F", "Trojan.Win32.WebSearch.ak", "Trj/CI.A", "Win32.Trojan.Websearch.Lmap", "Trojan.WebSearch!GWyPJuQViZY", "Win32/Trojan.3ff" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Locky", "is", "a", "ransomware", "that", "can", "be", "installed", "when", "you", "open", "an", "attachment,", "usually", "as", "a", "Word", "file", "from", "a", "spam", "email." ]
[ 3, 16, 16, 3, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 1, 9, 16, 1, 9, 9 ]
[ "We", "are", "seeing", "a", "bit", "of", "an", "uptick", "of", "emails", "containing", "java", "adwind", "or", "Java", "Jacksbot", "attachments." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 1, 3, 16, 1, 3, 1 ]
[ "It", "then", "starts", "the", "final", "detonator", "function", "to", "load", "the", "dropped", ".dex", "file", "into", "memory", "and", "triggers", "the", "main", "payload", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9991", "W32/Dropper.ANAB", "TROJ_DROPPER.SMW", "Packed.Win32.Krap.ap", "Trojan.Winlock.587", "TROJ_DROPPER.SMW", "BehavesLike.Win32.FakeAlertSecurityTool.fc", "W32/Risk.VFHY-0574", "Trojan[Packed]/Win32.Krap", "Packed.Win32.Krap.ap", "Dropper/Win32.Smiscer.R13962", "Trojan.DR.Procesemes!WkidsgpO+Do", "Packed.Win32.Krap" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.BitCoinMiner.jz", "Trojan.Win32.BitCoinMiner.euxcee", "Win32.Trojan.Bitcoinminer.Wrgk", "Trojan.DownLoader25.54215", "Trojan.CoinMiner.Win32.6503", "Trojan/Win32.BitCoinMiner", "Trojan.Win32.BitCoinMiner.jz", "TrojanDownloader:MSIL/CoinMiner.A!bit", "Trojan.BitCoinMiner", "Trojan.BitCoinMiner", "Trj/GdSda.A", "Trojan.BitCoinMiner!x6PcA/gbW/U", "W32/BitCoinMiner.JZ!tr", "Win32/Trojan.5d5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "few", "weeks", "ago,", "we", "observed", "new", "activity", "from", "ChessMaster,", "with", "notable", "evolutions", "in", "terms", "of", "new", "tools", "and", "tactics", "that", "weren't", "present", "in", "the", "initial", "attacks." ]
[ 0, 8, 8, 8, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "It", "abuses", "the", "legitimate", "and", "popular", "open", "source", "framework", "DroidPlugin", "which", "allows", "an", "app", "to", "dynamically", "launch", "any", "apps", "as", "plugins", "without", "installing", "them", "in", "the", "system." ]
[ 16, 7, 16, 16, 16, 16, 7, 15, 15, 15, 16, 7, 15, 15, 15, 15, 15, 15, 15, 15, 15, 16, 16, 16, 16, 16, 5 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.StartPage.e.Trojan", "Trojan.Startpage", "TROJ_STARTPAGE_FD050152.UVPM", "Trojan.Win32.Z.Startpage.4001399", "TROJ_STARTPAGE_FD050152.UVPM", "TR/StartPage.sdjtv", "W32/STARTPAGE_FD050152.UVPM!tr", "Win32/Trojan.41b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Application", "launch", "When", "launching", "for", "the", "first", "time", ",", "the", "Trojan", "checks", "if", "it", "is", "being", "launched", "in", "an", "emulation", "environment", ",", "and", "in", "which", "country", "it", "is", "being", "launched", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]