tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"Interestingly",
",",
"there",
"is",
"an",
"allowlist",
"of",
"tapped",
"activities",
":",
"ui.ConversationActivity",
"ui.ConversationListActivity",
"SemcInCallScreen",
"Quadrapop",
"SocialPhonebookActivity",
"The",
"listener",
"can",
"operate",
"with",
"only",
"coordinates",
",",
"so",
"it",
"calculates",
"pressed",
"characters",
"by",
"matching",
"given",
"values",
"with",
"hardcoded",
"ones",
":",
"Additionally",
",",
"if",
"there",
"is",
"a",
"predefined",
"command",
",",
"the",
"keylogger",
"can",
"make",
"a",
"screenshot",
"of",
"the",
"tapped",
"display",
"area",
":",
"Manual",
"access",
"and",
"operator",
"menu",
"There",
"is",
"a",
"hidden",
"menu",
"(",
"Activity",
")",
"for",
"controlling",
"implant",
"features",
"that",
"looks",
"like",
"it",
"was",
"created",
"for",
"manual",
"operator",
"control",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.DeltreeY",
"Trojan:BAT/DeltreeY.CA",
"Trojan.BAT.DeltreeY"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Application.Miner.CB",
"Application.Miner.CB",
"Linux/RubyMiner.A",
"BAT_COINMINE.WIPX",
"Application.Miner.CB",
"Troj.Downloader.Shell!c",
"Application.Miner.CB",
"Linux.DownLoader.684",
"BAT_COINMINE.WIPX",
"Trojan.RubyMiner",
"Win32/Trojan.Downloader.72e"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"malware",
"is",
"a",
"reflection",
"of",
"how",
"PoS",
"threats,",
"though",
"no",
"longer",
"novel,",
"are",
"increasingly",
"used",
"against",
"businesses",
"and",
"their",
"customers."
] | [
16,
3,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
4
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Skeeyah.19132",
"Win32.Trojan.WisdomEyes.16070401.9500.9934",
"not-a-virus:HEUR:Monitor.Win32.BeyondKeyLogger.heur",
"System.Monitor.Relytec.All-in-o",
"TR/Spy.arobe",
"not-a-virus:HEUR:Monitor.Win32.BeyondKeyLogger.heur",
"Trojan:Win32/Dhodareet.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"Actors",
"related",
"to",
"the",
"Operation",
"Lotus",
"Blossom",
"campaign",
"continue",
"their",
"attack",
"campaigns",
"in",
"the",
"Asia",
"Pacific",
"region."
] | [
6,
16,
16,
6,
14,
6,
14,
14,
16,
16,
6,
14,
16,
2,
10,
10,
10
] |
[
"]",
"205",
"7ed754a802f0b6a1740a99683173db73",
"com.psiphon3",
"dexlib",
"2.x",
"188.165.49",
"[",
"."
] | [
9,
9,
1,
1,
16,
16,
1,
9,
9
] |
[
"Based",
"on",
"the",
"data",
"we",
"have",
"acquired",
"since",
"October",
"2016,",
"about",
"500",
"organizations",
"from",
"50",
"countries",
"were",
"affected",
"by",
"the",
"attack."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
0,
8,
16,
16,
4,
16,
2,
10,
16,
16,
16,
16,
1
] |
[
"The",
"AES",
"key",
"is",
"generated",
"using",
"a",
"SHA256",
"hash",
"and",
"due",
"to",
"the",
"keys",
"being",
"stored",
"on",
"the",
"infected",
"machine,",
"victims",
"in",
"many",
"cases",
"could",
"likely",
"decrypt",
"files",
"without",
"paying",
"the",
"ransom."
] | [
16,
1,
9,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
1,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clod2e7.Trojan.3dab",
"Backdoor/W32.Bifrose.737280.H",
"Backdoor/Bifrose.chym",
"BKDR_BIFROSE.DMQ",
"W32/Trojan2.NEIM",
"Backdoor.Trojan",
"Win32/Tnega.UYbaRd",
"BKDR_BIFROSE.DMQ",
"Trojan.Win32.Bifrose.crakl",
"Backdoor.W32.Bifrose.chym!c",
"BackDoor.Bifrost.16023",
"Backdoor.Bifrose.Win32.49130",
"Backdoor.Bifrose",
"W32/Trojan.TWKO-3939",
"BDS/Bifrose.chym",
"W32/Bifrose.CHYM!tr.bdr",
"Trojan[Backdoor]/Win32.Bifrose",
"Backdoor/Win32.Bifrose.R127707",
"Backdoor.Bifrose",
"Backdoor.Bifrose!bEtmoN1K0yI"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"affected",
"educational",
"organizations,",
"for",
"instance,",
"are",
"used",
"to",
"deliver",
"employment",
"exams",
"for",
"government",
"employees."
] | [
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DusbyetorLTS.Trojan",
"Trojan/W32.Kriskynote.442892.B",
"Backdoor.Kriskynote.A4",
"Trojan/Rootkitdrv.w",
"Trojan.Graftor.D35150",
"Win32.Trojan.WisdomEyes.16070401.9500.9510",
"W32/Trojan.HHCY-2846",
"Backdoor.Korplug.B",
"Win32/Rootkitdrv.W",
"BKDR_WINNT.SMD",
"Trojan.Win32.Kriskynote.ay",
"Trojan.Win32.Kriskynote.dkkllk",
"Trojan.Win32.Z.Kriskynote.442892",
"BackDoor.Korplug.18",
"Trojan.Kriskynote.Win32.1",
"BKDR_WINNT.SMD",
"Trojan.Win32.Kriskynote",
"Trojan/Kriskynote.a",
"Trojan/Win32.Kriskynote",
"Trojan.Win32.Kriskynote.ay",
"Trojan:Win64/Kriskynote.A!dha",
"Win32/Tnega.aacQTM",
"Trojan.Kriskynote",
"Win32.Trojan.Kriskynote.Lkmz",
"W32/Kriskynote.AY!tr",
"Win32/Trojan.6da"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"contained",
"approximately",
"8GB",
"of",
"stolen",
"data",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Crypt.qk",
"Win32.Trojan.WisdomEyes.16070401.9500.9532",
"TROJ_KRYPTIK.VTG",
"Trojan.MSIL.Crypt.qk",
"Trojan.Win32.Crypt.djsue",
"BackDoor.Cybergate.1727",
"Trojan.Crypt.Win32.2613",
"TROJ_KRYPTIK.VTG",
"Trojan.MSIL.Crypt",
"Trojan/MSIL.bms",
"TR/MSIL.Crypt.qk",
"Trojan.MSIL.Krypt.2",
"Trojan.MSIL.Crypt.qk",
"TrojanDownloader:Win32/Radet.A",
"Msil.Trojan.Crypt.Swvd",
"Trojan.Crypt!QtVXUF+C8/k",
"Win32/Trojan.b12"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Vetor.PE",
"W32.Virut.G",
"Win32/Virut.17408",
"PE_VIRUX.J",
"Win.Trojan.Clicker-3135",
"Virus.Win32.Virut.ce",
"Virus.Win32.Virut.hpeg",
"Virus.Win32.Virut.Ce",
"Win32.Virut.56",
"PE_VIRUX.J",
"BehavesLike.Win32.Virut.mm",
"Win32/Virut.bn",
"Virus/Win32.Virut.ce",
"Win32.Virut.ce.53248",
"TrojanClicker:Win32/Sadbick.A",
"W32.Virut.l4o5",
"Virus.Win32.Virut.ce",
"Win32/Virut.F",
"Virus.Virut.06",
"Win32/Virut.NBP",
"Worm.Win32.VBNA",
"W32/Sality.AO"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.9ED0",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win32.HLLM.Reset.493",
"BehavesLike.Win32.Ransomware.cc",
"Backdoor.Poison",
"Trojan.Midie.DA81B",
"Backdoor/Win32.Poison.R217323",
"Trojan.Nymaim"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Mandiant,",
"working",
"in",
"partnership",
"with",
"SonicWall",
"Product",
"Security",
"and",
"Incident",
"Response",
"Team",
"PSIRT,",
"has",
"identified",
"a",
"suspected",
"Chinese",
"campaign",
"that",
"involves",
"maintaining",
"long",
"term",
"persistence",
"by",
"running",
"malware",
"on",
"an",
"unpatched",
"SonicWall",
"Secure",
"Mobile",
"Access",
"SMA",
"appliance."
] | [
4,
16,
16,
16,
16,
4,
12,
12,
16,
4,
12,
12,
12,
16,
16,
6,
14,
14,
14,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
4,
5,
13,
13,
13,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Antivirus2008.DN",
"MemScan:Trojan.Peed.JRX",
"Trojan.Win32.Pakes.czg"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"This",
"ransomware",
"encrypts",
"files",
"and",
"uses",
".braincrypt",
"as",
"file",
"name",
"extension",
"for",
"encrypted",
"files."
] | [
16,
3,
1,
9,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9
] |
[
"The",
"first",
"example,",
"a",
"campaign",
"observed",
"on",
"May",
"17,",
"2016,",
"uses",
"a",
"fake",
"Microsoft",
"security",
"alert",
"social",
"engineering",
"lure",
"to",
"trick",
"the",
"victim",
"into",
"opening",
"a",
"link",
"that",
"leads",
"to",
"an",
"executable",
"download."
] | [
16,
16,
16,
16,
6,
16,
16,
0,
8,
8,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"This",
"blog",
"details",
"CNACOM,",
"a",
"web-based",
"campaign",
"that",
"appears",
"to",
"be",
"related",
"to",
"a",
"well-known",
"nation-state",
"actor",
"more",
"commonly",
"associated",
"with",
"spear-phishing",
"attacks."
] | [
16,
16,
16,
6,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dyloader",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"Trojan.Win32.Injector",
"TR/Dropper.gjdjj",
"Trojan.Graftor.D4C89C",
"W32/Injector.DHHK!tr",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Demp.cxoswz",
"TrojanDropper.Demp.aao",
"Trojan[Dropper]/Win32.Injector"
] | [
16,
3,
16,
16,
16,
1,
9,
9
] |
[
"The",
"effects",
"were",
"broad",
"reaching,",
"with",
"Ukraine",
"Cyber",
"police",
"confirming",
"over",
"2000",
"affected",
"companies",
"in",
"Ukraine",
"alone."
] | [
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
16,
16,
16,
4,
16,
2,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"RDN/Gaobot.worm!f",
"Backdoor.Agobot.Win32.5073",
"Backdoor.W32.Agobot.svu!c",
"Trojan.Heur.RP.EDFC38",
"Win32.Trojan.WisdomEyes.16070401.9500.9986",
"TROJ_ADAMOL.A",
"Trojan.Win32.Agobot.dikwjo",
"Win32.Backdoor.Agobot.Wlfl",
"TROJ_ADAMOL.A",
"BehavesLike.Win32.Downloader.gh",
"Trojan.ATRAPS",
"Backdoor/Agobot.bnd",
"W32/AgoBot.SVU!tr.bdr",
"Trojan[Backdoor]/Win32.Agobot",
"Trojan:Win32/Adamol.A",
"Trojan/Win32.Hupigon.C48593",
"Trj/Chgt.L"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"On",
"the",
"heels",
"of",
"recent",
"disclosures",
"of",
"ATM",
"malware",
"such",
"as",
"Suceful",
"Plotus",
"and",
"Padpin",
"aka",
"Tyupkin,",
"Proofpoint",
"research",
"has",
"discovered",
"yet",
"another",
"variant",
"of",
"ATM",
"malware,",
"which",
"we",
"have",
"dubbed",
"GreenDispenser."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
3,
3,
16,
3,
16,
3,
4,
12,
16,
16,
16,
16,
3,
11,
11,
11,
16,
16,
16,
16,
3
] |
[
"WE",
"GIVE",
"100",
"%",
"GUARANTEE",
"THAT",
"ALL",
"FILES",
"WILL",
"RESTORE",
"AFTER",
"WE",
"RECEIVE",
"PAYMENT",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Initial",
"reports",
"of",
"the",
"attacks,",
"published",
"April",
"26",
"in",
"Hebrew",
"by",
"the",
"Israel",
"National",
"Cyber",
"Event",
"Readiness",
"Team",
"CERT-IL",
"and",
"The",
"Marker,",
"confirm",
"that",
"the",
"attack",
"was",
"delivered",
"through",
"compromised",
"email",
"accounts",
"at",
"Ben-Gurion",
"University",
"and",
"sent",
"to",
"multiple",
"targets",
"across",
"Israel."
] | [
16,
16,
16,
16,
3,
16,
0,
8,
16,
16,
16,
4,
12,
12,
12,
12,
12,
12,
12,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
4,
12,
16,
16,
16,
16,
16,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Small",
"Trojan.Win32.Small",
"Trojan.Win32.Small.cva",
"Trojan.Win32.Crypted.dxzuxb",
"Troj.W32.Small!c",
"Trojan.PWS.Banker1.19315",
"Trojan/Win32.Small",
"Trojan.Win32.Small.cva",
"Trojan.Win32.Small",
"Trojan.Small",
"Trj/CI.A",
"Trojan.Win32.Clipbanker",
"W32/ClipBanker.F!tr",
"Win32/Trojan.65e"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"is",
"the",
"summary",
"of",
"an",
"analysis",
"by",
"an",
"IT",
"security",
"researcher,",
"which",
"we",
"publish",
"in",
"full."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
16,
16,
16,
16
] |
[
"The",
"malicious",
"library",
"is",
"loaded",
"from",
"Eventbot",
"’",
"s",
"assets",
"that",
"contain",
"a",
"font",
"file",
"called",
"default.ttf",
"which",
"is",
"actually",
"the",
"hidden",
"library",
"and",
"then",
"decoded",
"using",
"RC4",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Carbanak",
"also",
"known",
"as",
"Anunak",
"are",
"a",
"group",
"of",
"financially",
"motivated",
"criminals",
"first",
"exposed",
"in",
"2015."
] | [
6,
16,
16,
16,
6,
16,
16,
6,
16,
16,
16,
6,
16,
16,
16,
0
] |
[
"Some",
"common",
"techniques",
"include",
":",
"basic",
"XOR",
"encryption",
",",
"nested",
"XOR",
"and",
"custom",
"key-derivation",
"methods",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Previous",
"version",
"The",
"capture",
"service",
"class",
"implements",
"the",
"chat",
"applications",
"interception",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"For",
"the",
"64-bit",
"stage",
"2",
"malware",
",",
"the",
"code",
"execution",
"is",
"transferred",
"from",
"the",
"loader",
"using",
"a",
"well-known",
"technique",
"called",
"Heaven",
"’",
"s",
"Gate",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"spread",
"via",
"a",
"recompiled",
"version",
"of",
"the",
"otherwise",
"legitimate",
"open",
"source",
"BitTorrent",
"client",
"application",
"Transmission",
"and",
"distributed",
"on",
"their",
"official",
"website."
] | [
16,
1,
16,
16,
1,
9,
16,
16,
16,
16,
5,
13,
13,
13,
13,
16,
16,
16,
16,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-PWS/W32.QQPass.757760.Q",
"Trojan.Win32.Badur!O",
"Risktool.Flystudio.16885",
"Trojan/AddUser.q",
"TROJ_ADDUSER_EJ19018D.UVPM",
"Win32/Tnega.CEGPWM",
"TROJ_ADDUSER_EJ19018D.UVPM",
"Trojan-Ransom.Win32.Snocry.yj",
"Trojan.Win32.QQPass.cqivxp",
"Backdoor.W32.Hupigon.lHRl",
"Worm.Win32.Dropper.RA",
"Trojan:W32/DelfInject.R",
"Trojan.DownLoader10.35182",
"Trojan.QQPass.Win32.21864",
"Exploit.Win32.MS",
"Trojan/PSW.QQPass.qla",
"TR/Strictor.38430",
"Trojan[PSW]/Win32.QQPass",
"Trojan.Zusy.D2B925",
"Trojan-Ransom.Win32.Snocry.yj",
"Trojan:Win32/Casus.A",
"Trojan/Win32.QQPass.C217887",
"Trojan.Badur",
"Win32/AddUser.Q",
"Trojan.Win32.QQPass.i",
"Trojan.PWS.QQPass!VhZvRiUJbao",
"W32/QQPass.ELG!tr.pws",
"Trojan.Win32.Extortioner.Q"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader.Unruy.C3",
"Downloader-BPA.d",
"Trojan.Cosmu.Win32.1584",
"Trojan/Cosmu.fzo",
"Win32.Trojan-Clicker.Cycler.a",
"W32.Unruy.A",
"Win32/Unruy.NaMNFGC",
"HT_UNRUY_GF0601E8.UVPM",
"Win.Trojan.Unruy-5876",
"Trojan.Win32.Drop.bcagho",
"Troj.Spy.W32.BZub.l2bS",
"TrojWare.Win32.TrojanSpy.BZub.~IP",
"Trojan.MulDrop1.276",
"HT_UNRUY_GF0601E8.UVPM",
"BehavesLike.Win32.Downloader.rt",
"Trojan-Downloader.Win32.Unruy",
"Trojan/Cosmu.bhh",
"TR/Dldr.Unruy.C",
"Worm/Win32.Unknown",
"TrojanDownloader:Win32/Unruy.C",
"Trojan.Unruy.1",
"Trojan/Win32.Cosmu.R39186",
"TrojanClicker.Cycler",
"Trojan.CL.Cycler!gZ0c9KQr9Uk",
"W32/ZAccess.Y!tr",
"W32/OverDoom.B.worm",
"Win32/Trojan.688"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"malware",
"authors",
"seem",
"to",
"be",
"putting",
"a",
"lot",
"of",
"effort",
"into",
"improving",
"this",
"malware",
",",
"bundling",
"it",
"with",
"numerous",
"new",
"upgrades",
"that",
"make",
"it",
"more",
"sophisticated",
",",
"evasive",
",",
"and",
"well-equipped",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Also",
"seen",
"in",
"other",
"Exploits",
"Kits:",
"-",
"Neutrino",
"-",
"Nuclear",
"-",
"Magnitude",
"-",
"RIG",
"-",
"Hanjuan"
] | [
16,
16,
16,
16,
3,
11,
16,
3,
16,
3,
16,
3,
16,
3,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.PSW.Qwak.A",
"Trojan-PWS/W32.Qwak.24576",
"PSWTool.Win32.Pqwak!O",
"Trojan.Pqwak",
"Trojan.Qwak.Win32.2",
"Trojan.PSW.Qwak.A",
"W32/HackTool.AZN",
"TROJ_PQWAK.A",
"Trojan.PSW.Qwak.A",
"not-a-virus:PSWTool.Win32.Pqwak.10",
"Trojan.PSW.Qwak.A",
"Riskware.Win32.Pqwak.hqlb",
"Trojan.Win32.Z.Qwak.24576",
"Trojan.PSW.Qwak.A",
"TrojWare.Win32.PSW.Qwak.A",
"Trojan.PWS.Qwak.10",
"TROJ_PQWAK.A",
"Trojan.Win32.PSW",
"W32/Tool.QTCZ-8948",
"TR/Pqwak.A",
"Trojan[PSWTool]/Win32.Pqwak",
"not-a-virus:PSWTool.Win32.Pqwak.10",
"Win-Trojan/Qwak.24576",
"Trojan.PSW.Qwak.A",
"TrojanPSW.Qwak",
"Trj/CI.A",
"Win32/PSW.Qwak.A",
"Win32.Trojan.Pqwak.Eeha",
"Trojan.PSW.Qwak!llR4IBPnUH0",
"Win32/Trojan.006"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"For",
"example",
",",
"we",
"found",
"several",
"suspicious",
"strings",
"written",
"in",
"the",
"Chinese",
"language",
"in",
"a",
"function",
"called",
"isNetworkAvailable",
",",
"previously",
"discussed",
"in",
"this",
"blog",
":",
"An",
"almost",
"identical",
"function",
"is",
"mentioned",
"in",
"an",
"earlier",
"research",
",",
"that",
"ties",
"FakeSpy",
"and",
"other",
"malware",
"to",
"the",
"Roaming",
"Mantis",
"group",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
4,
12,
16,
16
] |
[
"mobile_treats_2013_05s",
"Infections",
"caused",
"by",
"mobile",
"banking",
"programs",
"Today",
",",
"the",
"majority",
"of",
"banking",
"Trojan",
"attacks",
"affect",
"users",
"in",
"Russia",
"and",
"the",
"CIS",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"According",
"to",
"our",
"estimates",
",",
"about",
"60",
"%",
"of",
"mobile",
"malware",
"are",
"elements",
"of",
"both",
"large",
"and",
"small",
"mobile",
"botnets",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Stretching",
"back",
"to",
"April",
"2016,",
"she",
"d",
"befriended",
"a",
"lot",
"of",
"individuals,",
"as",
"many",
"as",
"500,",
"with",
"similar",
"interests."
] | [
16,
16,
16,
0,
8,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16
] |
[
"Based",
"on",
"received",
"commands,",
"it",
"can",
"either",
"download",
"malicious",
"apps",
"or",
"switch",
"the",
"C",
"C",
"Twitter",
"account",
"to",
"another",
"one."
] | [
16,
16,
1,
9,
16,
16,
16,
16,
3,
11,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9
] |
[
"The",
"target",
"list",
"and",
"bank",
"specific",
"fake",
"login",
"pages",
"can",
"be",
"dynamically",
"updated",
"via",
"their",
"C2",
"panel",
"(",
"dashboard",
"back-end",
")",
"which",
"significantly",
"increases",
"the",
"adaptability",
"and",
"scalability",
"of",
"this",
"attack",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDropper.Goominer",
"Win32.Trojan.WisdomEyes.16070401.9500.9958",
"Trojan.Win32.Kazy.dbtlfz",
"Trojan.Win32.Z.Kazy.939008.A",
"Trojan.Kazy.D607AA",
"TrojanDropper:Win32/Goominer.A",
"Trj/GdSda.A",
"Win32.Trojan.Kazy.Pciu",
"Trojan.Win32.Comitsproc",
"Win32/Trojan.013"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"dubbed",
"this",
"activity",
"Operation",
"Wilted",
"Tulip"
] | [
16,
16,
16,
16,
6,
14,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Swisyn!O",
"Trojan.Starpage.A.mue",
"Trojan/Swisyn.bhyk",
"Win32.Trojan.Delf.it",
"Trojan.Win32.Fsysna.djck",
"Trojan.Win32.A.Swisyn.97827[UPX]",
"Worm.Win32.Pronny.BL",
"Trojan.PWS.Qqpass.6162",
"Trojan.Swisyn.Win32.21499",
"Trojan.Crypt",
"Trojan/Win32.Swisyn",
"HEUR/Fakon.mwf",
"Worm.AutoRun",
"Trojan.Win32.FakeFolder.pb",
"Trojan.Swisyn!4rRLtK78L7s"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Some",
"samples",
"talk",
"to",
"compromised",
"South",
"Korean",
"server",
"at",
"203.250.148.63",
"and",
"communicate",
"in",
"port",
"30000."
] | [
16,
16,
16,
16,
7,
2,
10,
5,
3,
1,
16,
1,
16,
1,
9
] |
[
"Port",
"6207",
":",
"Viber",
"extraction",
"service",
"."
] | [
1,
9,
16,
5,
16,
16,
16
] |
[
"The",
"new",
"GozNym",
"hybrid",
"takes",
"the",
"best",
"of",
"both",
"the",
"Nymaim",
"and",
"Gozi",
"ISFB",
"malware",
"to",
"create",
"a",
"powerful",
"Trojan."
] | [
16,
16,
3,
11,
16,
16,
4,
16,
16,
16,
3,
16,
3,
11,
11,
16,
16,
16,
3,
11
] |
[
"The",
"people",
"behind",
"the",
"attacks",
"are",
"likely",
"attempting",
"to",
"gain",
"access",
"to",
"computers",
"where",
"banking",
"transactions",
"are",
"performed,",
"in",
"order",
"to",
"steal",
"banking",
"credentials."
] | [
16,
16,
16,
16,
1,
16,
16,
16,
16,
1,
9,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9982",
"Trojan.Win64",
"Trojan[Backdoor]/Win32.Simda",
"Trojan:Win64/Claretore.B",
"W64/Simda.BD!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"One",
"of",
"them",
"was",
"of",
"particular",
"interest",
"because",
"we'd",
"never",
"seen",
"the",
"backdoor",
"before",
"and",
"it",
"leveraged",
"a",
"relatively",
"unique",
"German",
"dynamic",
"DNS",
"provider",
"for",
"command",
"and",
"control."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9
] |
[
"Finally",
",",
"the",
"app",
"can",
"remove",
"itself",
"through",
"three",
"ways",
":",
"Via",
"a",
"command",
"from",
"the",
"server",
"Autoremove",
"if",
"the",
"device",
"has",
"not",
"been",
"able",
"to",
"check",
"in",
"to",
"the",
"server",
"after",
"60",
"days",
"Via",
"an",
"antidote",
"file",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Application.Htool.WKE",
"Application.Htool.WKE",
"W32/Risk.IUUB-2604",
"HKTL_DUMPSEC.TOMA",
"Application.Htool.WKE",
"Application.Htool.WKE",
"Trojan.MulDrop3.34925",
"HKTL_DUMPSEC.TOMA",
"W32/MalwareS.ITI",
"Packed.Multi.rq",
"HackTool:Win32/Dumpsec.A",
"Application.Htool.WKE"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Marcher",
"inspects",
"its",
"infected",
"devices",
"carefully",
"by",
"using",
"a",
"dedicated,",
"hard-coded",
"configuration",
"in",
"each",
"Android",
"Package",
"Kit",
"APK,",
"Google's",
"file",
"format",
"for",
"distributing",
"and",
"installing",
"application",
"software",
"like",
"mobile",
"banking",
"apps",
"on",
"the",
"Android",
"OS."
] | [
3,
16,
16,
16,
13,
16,
16,
16,
16,
16,
1,
9,
16,
16,
5,
13,
13,
13,
13,
13,
13,
11,
16,
16,
16,
5,
13,
16,
5,
13,
13,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Downldr2.IYLF",
"Trojan.Starter.1949",
"Riskware/Win32.Krap.ii",
"Win32.Hack.Undef.kcloud",
"TrojanDropper:Win32/Kidtok.A",
"W32/Downloader.LQFG-1421",
"Virus.Win32.Heur.g",
"BScope.Trojan-Spy.Zbot",
"PE:Malware.FakeDOC@CV!1.9C3B",
"Trojan-Dropper.Win32.Kidtok"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Therefore",
"we",
"instead",
"discuss",
"a",
"number",
"of",
"ways",
"to",
"detect",
"and",
"analyse",
"these",
"documents",
"using",
"freely",
"available",
"tools."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"PDFs",
"with",
"download",
"links"
] | [
1,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"PSWTool.Win32.NetPass!O",
"HackTool.Dialupas",
"Tool.NetPass.Win32.1002",
"Win32.Trojan.WisdomEyes.16070401.9500.9825",
"W32/Risk.DWIG-1726",
"Trojan-Spy.IEPV",
"not-a-virus:PSWTool.Win32.NetPass.atx",
"Trojan.Win32.Ool.cjzhzi",
"Tool.PassView.277",
"BehavesLike.Win32.Downloader.gc",
"W32/MalwareS.AKEN",
"APPL/PSWTool.Pass.A",
"Application.Heur.BmNfbCuqfGoO",
"not-a-virus:PSWTool.Win32.NetPass.atx",
"Trojan/Win32.Klone.C127582",
"PUP.Optional.Dialupass",
"Trojan.PSWTool!vbtNAUr+Slw"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"email,",
"first",
"of",
"them",
"submitted",
"from",
"Middle",
"East,",
"purports",
"to",
"be",
"coming",
"from",
"a",
"Turkish",
"trading",
"company,",
"which",
"might",
"further",
"indicate",
"the",
"geographic",
"area",
"where",
"the",
"attacks",
"were",
"active."
] | [
16,
1,
16,
16,
16,
16,
16,
2,
10,
16,
16,
16,
16,
16,
4,
12,
12,
12,
16,
16,
16,
16,
2,
10,
10,
16,
16,
1,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Cleanmg.Trojan",
"Trojan-Spy.Win32.TianYan!O",
"BackDoor-YA.dr",
"Trojan/Spy.TianYan.b",
"TSPY_TIANYAN.SMD",
"Win32.Backdoor.Prisos.b",
"W32.Killaut.A",
"Win32/TianYan.A",
"TSPY_TIANYAN.SMD",
"Win.Spyware.35814-2",
"Trojan.Win32.TianYan.xbqa",
"Trojan.Win32.TianYan.40960",
"Troj.Spy.W32.TianYan.m9ks",
"TrojWare.Win32.TrojanSpy.TianYan.~A",
"Win32.HLLP.Nemesis.28687",
"BackDoor-YA.dr",
"TrojanSpy.TianYan.a",
"Trojan[Spy]/Win32.TianYan",
"Win32.Troj.TianYan.b.kcloud",
"Trojan.Symmi.D7121",
"Backdoor:Win32/Prisos.A",
"Worm/Win32.Mabezat.R26794",
"TrojanSpy.TianYan",
"Win32/Prisos.A",
"Trojan-Spy.Win32.TianYan.b",
"Win32/Trojan.Dropper.e23"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Our",
"documentation",
"points",
"to",
"a",
"campaign",
"that",
"started",
"somewhere",
"in",
"late",
"February",
"2015",
"and",
"ended",
"in",
"mid-March."
] | [
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
0,
8,
16,
16,
16,
0
] |
[
"Government",
"agencies",
"and",
"enterprises",
"should",
"look",
"at",
"this",
"threat",
"as",
"an",
"example",
"of",
"the",
"kind",
"of",
"spying",
"that",
"is",
"now",
"possible",
"given",
"how",
"ubiquitous",
"mobile",
"devices",
"are",
"in",
"the",
"workplace",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.LRQwegierExe.Trojan",
"Trojan/W32.Small.14848.CH",
"Trojan.Daws.17020",
"Trojan.Kazy.D192B",
"Win32.Trojan.Dalixi.f",
"Trojan-Dropper.Win32.Daws.dyru",
"Troj.W32.KillAV.lCzy",
"BehavesLike.Win32.VTFlooder.lh",
"Trojan:Win32/Ghodow.A",
"Trojan-Dropper.Win32.Daws.dyru",
"Win32/Dalixi.A",
"Trojan.Dalixi!sYT5S6B5t8c",
"W32/Dloader.IQS!tr.dldr",
"Win32/Trojan.b7f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"As",
"soon",
"as",
"the",
"victim",
"tries",
"to",
"log",
"in",
",",
"it",
"stores",
"the",
"victim",
"'s",
"credentials",
"in",
"/storage/0/DCIM/.fdat",
"Facebook",
"Login",
"Figure",
"7",
":",
"Fake",
"Facebook",
"login",
"The",
"second",
"command",
"is",
"IODBSSUEEZ",
",",
"which",
"further",
"sends",
"stolen",
"credentials",
"to",
"the",
"C",
"&",
"C",
"server",
",",
"as",
"seen",
"in",
"Figure",
"8",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"new",
"ransomware",
"called",
"CryptoLuck",
"has",
"been",
"discovered",
"by",
"Proofpoint",
"security",
"researcher",
"and",
"exploit",
"kit",
"expert",
"Kafeine",
"that",
"is",
"being",
"distributed",
"via",
"the",
"RIG-E",
"exploit",
"kit."
] | [
16,
16,
3,
16,
3,
16,
16,
16,
16,
4,
12,
12,
16,
3,
11,
3,
11,
15,
16,
16,
16,
16,
16,
3,
11,
11
] |
[
"Error",
"Registration",
"Ok",
"Empty",
"SendSMS",
"RequestGoogleCC",
"Wipe",
"OpenBrowser",
"SendUSSD",
"RequestSMSList",
"RequestAppList",
"RequestLocation",
"ShowNotification",
"SetLockPassword",
"LockNow",
"MuteSound",
"LoadScript",
"LoadPlugin",
"ServerChange",
"StartApp",
"CallPhone",
"SetPingTimer",
"SMSBroadcast",
"RequestContacts",
"AddInject",
"RemoveInject",
"Evaluate",
"Another",
"feature",
"of",
"this",
"trojan",
"is",
"the",
"ability",
"to",
"register",
"injects",
",",
"which",
"are",
"JavaScript",
"snippets",
"of",
"code",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Ransomware",
"in",
"its",
"various",
"forms",
"continues",
"to",
"make",
"headlines",
"as",
"much",
"for",
"high-profile",
"network",
"disruptions",
"as",
"for",
"the",
"ubiquity",
"of",
"attacks",
"among",
"consumers."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
1,
16,
4
] |
[
"Generic",
"detections",
",",
"advanced",
"behavioral",
"analytics",
",",
"and",
"machine",
"learning",
"technologies",
"in",
"Windows",
"Defender",
"Advanced",
"Threat",
"Protection",
"detect",
"FinFisher",
"’",
"s",
"malicious",
"behavior",
"throughout",
"the",
"attack",
"kill",
"chain",
"and",
"alert",
"SecOps",
"personnel",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
13,
13,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Staget!O",
"Trojan.Vb.AB2",
"Trojan.Injector",
"Trojan/Staget.fk",
"Trojan.Zusy.D381B",
"TROJ_CHEKAF.SMIA",
"Win32.Trojan.U-Staget.a",
"TROJ_CHEKAF.SMIA",
"Win.Trojan.Staget-28",
"Trojan.Win32.SelfDel.cdyc",
"Trojan.Win32.Staget.btpvn",
"Trojan.Win32.A.Staget.98334",
"Troj.W32.SelfDel.tnPD",
"Trojan.MulDrop1.56405",
"Trojan.Staget.Win32.367",
"BehavesLike.Win32.Swisyn.nm",
"Trojan/Staget.hg",
"Trojan/Win32.Staget",
"Win32.Troj.Staget.fk.kcloud",
"Trojan.Win32.SelfDel.cdyc",
"Trojan/Win32.Staget.R21060",
"Trojan.VBRA.09701",
"Trojan.Staget!A6l5b/HpLEg",
"Trojan.Win32.Staget",
"W32/Staget.EG!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/CoinMiner.td",
"not-a-virus:RiskTool.Win32.BitCoinMiner.wzo",
"Riskware.Win32.BitCoinMiner.dktqwy",
"Tool.BtcMine.479",
"Trojan.CoinMiner.Win32.1509",
"Trojan.Win32.CoinMiner",
"RiskWare[RiskTool]/Win32.BitCoinMiner",
"Trojan:Win32/Dimnir.A",
"Application.Heur2.EE0329",
"not-a-virus:RiskTool.Win32.BitCoinMiner.wzo",
"W32/CoinMiner.TD!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Hotdog.A",
"Backdoor.Hotdog.A",
"Trojan.Win32.Hotdog.chmwe",
"W32/Hotdog.B",
"Spyware.Hotra",
"TROJ_HOTDOG.A",
"Backdoor.Win32.Hotdog",
"Backdoor.Hotdog.A",
"Backdoor.Hotdog!YGk3IGmjo+U",
"Backdoor.Win32.Hotdog.B",
"Backdoor.Hotdog.A",
"Trojan.Hotdog.49152",
"TROJ_HOTDOG.A",
"Win32.Hack.Hotdog.8F.kcloud",
"Backdoor:Win32/Hotdog.A",
"Trojan.Win32.Hotra.49152",
"Backdoor.Hotdog.A",
"W32/Hotdog.OZIJ-0895",
"Win-Trojan/Hotra.57344",
"Spyware.Hotra",
"Win32/Hotdog.B",
"Backdoor.Win32.Hotdog",
"W32/Hotdog.A!tr.bdr",
"BackDoor.Hotdog.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"malware",
"used",
"by",
"the",
"HiddenCobra",
"threat",
"group"
] | [
3,
16,
16,
6,
14,
14,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanPWS.Dexter.A4",
"Trojan.Poxters.Win32.176",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"BKDR_DEXTR.SMM",
"HEUR:Trojan.Win32.Invader",
"Trojan.Win32.Invader.elqaga",
"Trojan.FakeAV.19781",
"BKDR_DEXTR.SMM",
"BehavesLike.Win32.VTFlooder.nh",
"Trojan.Invader.aqk",
"Trojan/Win32.Invader",
"HEUR:Trojan.Win32.Invader",
"Trojan.Invader!",
"Trojan.Win32.Poxters",
"W32/Poxters.E!tr",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dynamer.FC.316",
"Win32.Trojan.WisdomEyes.16070401.9500.9957",
"MSIL.Backdoor.Orcus.A",
"Troj.Spy.Msil!c",
"Trojan.DownLoader25.14345",
"BehavesLike.Win32.Backdoor.dc",
"TrojanSpy.MSIL.sam",
"TR/Dropper.MSIL.yknpx",
"PWS:MSIL/Orcus.A!bit",
"Win-Trojan/OrcusRAT.Exp",
"Trj/CI.A",
"Win32/Trojan.Spy.c29"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"year",
"later,",
"a",
"more",
"dangerous",
"version",
"was",
"released."
] | [
0,
8,
8,
16,
16,
16,
16,
16,
16
] |
[
"“",
"jackhex",
"”",
"is",
"not",
"a",
"common",
"word",
"or",
"phrase",
"and",
",",
"as",
"noted",
"above",
",",
"was",
"also",
"seen",
"in",
"the",
"beacon",
"activity",
"with",
"the",
"previously",
"discussed",
"9002",
"sample",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16
] |
[
"This",
"attack",
"vector",
"is",
"increasingly",
"popular",
"with",
"malicious",
"actors",
"as",
"almost",
"everyone",
"on",
"the",
"planet",
"carries",
"at",
"least",
"one",
"mobile",
"device",
"they",
"interact",
"with",
"throughout",
"any",
"given",
"day",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"spreads",
"very",
"fast",
"using",
"Telegram",
"messenger",
"application",
"in",
"smartphones,",
"targeting",
"high-profile",
"Libyan",
"influential",
"and",
"political",
"figures."
] | [
16,
3,
16,
16,
16,
16,
5,
13,
13,
16,
5,
16,
4,
12,
12,
16,
4,
12
] |
[
"Method",
"doInBackground",
":",
"to",
"send",
"information",
"to",
"remote",
"C2",
"server",
"As",
"seen",
"from",
"the",
"major",
"code",
"body",
"of",
"method",
"doInBackground",
"shown",
"in",
"Figure",
"3",
"(",
"some",
"of",
"the",
"original",
"classes",
"and",
"methods",
"are",
"renamed",
"for",
"easier",
"understanding",
")",
",",
"there",
"are",
"three",
"calls",
"to",
"HttpPost",
"with",
"different",
"contents",
"as",
"parameters",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Much",
"of",
"the",
"contents",
"of",
"that",
"report",
"are",
"reproduced",
"here."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"actor",
"has",
"shown",
"a",
"surprising",
"level",
"of",
"amateur",
"actions",
",",
"including",
"code",
"overlaps",
",",
"open-source",
"project",
"copy/paste",
",",
"classes",
"never",
"being",
"instanced",
",",
"unstable",
"packages",
"and",
"unsecured",
"panels",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Thanks",
"to",
"a",
"relative",
"lack",
"of",
"security",
"controls",
"applied",
"to",
"mobile",
"devices",
",",
"these",
"devices",
"have",
"become",
"very",
"attractive",
"targets",
"for",
"a",
"broad",
"range",
"of",
"malicious",
"actors",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Stration",
"PUA.Packed.MEW-1",
"IM-Worm.Win32.Sumom.C"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"In",
"a",
"seven-hour",
"window,",
"Raytheon",
"|",
"Websense",
"stopped",
"over",
"16,000",
"malicious",
"email",
"messages",
"from",
"being",
"delivered",
"to",
"customers,",
"all",
"of",
"which",
"appear",
"to",
"have",
"been",
"Japanese",
"targets."
] | [
16,
16,
16,
16,
4,
16,
12,
16,
16,
8,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
2,
10
] |
[
"The",
"exploit",
"code",
"attached",
"used",
"for",
"dropping",
"the",
"malware",
"is",
"older",
"–",
"CVE-2012-0158",
"–",
"and",
"from",
"our",
"vantage",
"point,",
"we",
"have",
"no",
"indication",
"of",
"successful",
"or",
"failed",
"exploitation."
] | [
3,
11,
11,
16,
16,
16,
16,
16,
3,
16,
16,
16,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
7
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.OptixKill.31744",
"Trojan/OptixKill.10",
"TROJ_OPTIXKILL.F",
"Win32.Trojan.WisdomEyes.16070401.9500.9985",
"W32/Trojan.HEHF-6024",
"TROJ_OPTIXKILL.F",
"Win.Trojan.Killer-4",
"Trojan.Win32.OptixKill.10",
"Trojan.Win32.OptixKill.dkur",
"Trojan.Win32.A.OptixKill.31744",
"TrojWare.Win32.OptixKill.10",
"Trojan.OptixKiller",
"Trojan.OptixKill.Win32.20",
"Trojan/Win32.OptixKill.10",
"W32.Trojan.Backdoor-Ealim",
"TR/OptixKill.10",
"Trojan/Win32.OptixKill",
"Trojan:Win32/Optixkiller.A",
"Troj.W32.OptixKill.10!c",
"Trojan.Win32.OptixKill.10",
"Trojan/Win32.HDC.C1938",
"Trojan.OptixKill",
"Trj/OptixKill.10",
"Win32/OptixKill.10",
"Win32.Trojan.Optixkill.Wsat",
"Trojan.OptixKill!RjZYoc6lQeg",
"Trojan-PWS.Win32.Lmir.wj",
"W32/OptixKill.10!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"While",
"threat",
"actors",
"using",
"the",
"PlugX",
"Trojan",
"typically",
"leverage",
"legitimate",
"executables",
"to",
"load",
"their",
"malicious",
"DLLs",
"through",
"a",
"technique",
"called",
"DLL",
"side-loading,",
"Unit",
"42",
"has",
"observed",
"a",
"new",
"executable",
"in",
"use",
"for",
"this",
"purpose."
] | [
16,
6,
14,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"BehavesLike.Win32.Conficker.lh",
"Trojan.Win32.Spy",
"Win32.Troj.Undef.kcloud",
"Trojan.Kazy.D2002F"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"Although",
"Banker",
"has",
"been",
"in",
"the",
"wild",
"for",
"years,",
"this",
"time",
"we",
"see",
"it",
"using",
"a",
"Dynamic",
"Loading",
"Library",
"DLL",
"with",
"malicious",
"exported",
"functions."
] | [
16,
6,
16,
16,
16,
16,
16,
16,
0,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
3,
11,
11
] |
[
"It",
"was",
"first",
"reported",
"in",
"2013",
"under",
"the",
"version",
"number",
"2.0-LNK",
"where",
"it",
"used",
"the",
"tag",
"BaneChant",
"in",
"its",
"command-and-control",
"C2",
"network",
"request."
] | [
16,
16,
16,
16,
16,
0,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
3,
16,
16,
1,
9,
9,
9
] |
[
"Due",
"to",
"its",
"ability",
"to",
"intercept",
"SMS",
"communications,",
"the",
"malware",
"is",
"also",
"able",
"to",
"bypass",
"SMS-based",
"two-factor",
"authentication."
] | [
16,
16,
16,
1,
9,
9,
9,
9,
16,
3,
16,
16,
16,
16,
1,
9,
9,
9
] |
[
"In",
"2019,",
"X-Force",
"IRIS",
"incident",
"responders",
"observed",
"ITG03",
"conducting",
"a",
"campaign",
"against",
"a",
"financial",
"institution",
"in",
"Southeast",
"Asia",
"targeting",
"the",
"institution's",
"SWIFT",
"environment."
] | [
16,
0,
4,
12,
16,
16,
16,
6,
16,
16,
6,
16,
4,
12,
12,
16,
2,
10,
16,
4,
12,
12,
12
] |
[
"The",
"targets",
"and",
"capabilities",
"of",
"HenBox",
",",
"in",
"addition",
"to",
"the",
"ties",
"to",
"previous",
"activity",
"using",
"four",
"different",
"Windows",
"malware",
"families",
"with",
"political-themed",
"lures",
"against",
"several",
"different",
"South",
"East",
"Asian",
"countries",
",",
"indicates",
"this",
"activity",
"likely",
"represents",
"an",
"at",
"least",
"three-year-old",
"espionage",
"campaign",
"."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Zenshirsh.SL7",
"W32/Small.WMNN-1529",
"TSPY_ONLING.SMIF",
"Trojan.Win32.OnLineGames.vmk",
"Trojan.DownLoader4.46724",
"TSPY_ONLING.SMIF",
"W32/Small.IH",
"TR/Fakealert.39719",
"TrojanDownloader:Win32/Rarcon.B",
"Trojan.Graftor.D46F5",
"Trojan-Downloader.Win32.Small",
"Win32/Trojan.add"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Android.SmForw.AE",
"Android.Trojan.SMSSend.IA",
"AndroidOS/Trojan.DPEF-9",
"Android.Trojan.SMSSend.IA",
"A.H.Int.SmsThief.DBA",
"Trojan.Android.SmsForward.duiqpk",
"Android.SmsSpy.672.origin",
"Trojan[SMS]/Android.SmForw.aa",
"Android.Trojan.SMSSend.IA",
"Android-Trojan/SmsSend.915f",
"Trojan.AndroidOS.Lockerpin"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits