tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom/W32.WannaCry.5267459",
"Ransom.WannaCrypt.S1670344",
"Ransom.WannaCrypt",
"Trojan/Exploit.CVE-2017-0147.a",
"Ransom_WCRY.SMALYM",
"Win32.Worm.Rbot.a",
"Ransom.Wannacry",
"Ransom_WCRY.SMALYM",
"Win.Ransomware.WannaCry-6313787-0",
"Win32.Exploit.CVE-2017-0147.A",
"Trojan-Ransom.Win32.Wanna.m",
"Trojan.Win32.Wanna.epxkni",
"Trojan.Win32.WannaCry.5267459",
"Troj.Ransom.W32.Wanna.toP0",
"Trojan.Encoder.11432",
"Exploit.CVE.Win32.1765",
"BehavesLike.Win32.RansomWannaCry.th",
"Trojan.Wanna.k",
"Trojan[Ransom]/Win32.Wanna",
"Ransom:Win32/WannaCrypt.A!rsm",
"Trojan-Ransom.Win32.Wanna.m",
"Trojan/Win32.WannaCryptor.R200894",
"Hoax.Wanna",
"Trj/GdSda.A",
"Win32/Exploit.CVE-2017-0147.A",
"Trojan-Ransom.Win32.Wanna.m",
"Exploit.CVE-2017-0147!",
"Trojan.Win32.Exploit",
"W32/WannaCryptor.H!tr.ransom"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Packer.FSG.A",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Downloader.BFIA",
"Downloader.Trojan",
"TROJ_APHER.A",
"Win.Trojan.Small-10534",
"Packer.FSG.A",
"Trojan-Downloader.Win32.WebDown.10",
"Packer.FSG.A",
"Trojan.Win32.WebDown.cdwvkr",
"Packer.FSG.A",
"TrojWare.Win32.TrojanDownloader.Apher.0700",
"Packer.FSG.A",
"Trojan.DownLoader.4572",
"TROJ_APHER.A",
"Trojan-Downloader.Win32.WebDown",
"W32/Downloader.MUZI-7025",
"Trojan/Downloader.WebDown.10",
"Trojan/Win32.Unknown",
"Packer.FSG.A",
"Trojan-Downloader.Win32.WebDown.10",
"Win-Trojan/Apher.1312",
"Packer.FSG.A",
"Trj/Downloader.GE",
"Win32/Randon.A",
"W32/Dloader.AE!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Heur.D.EED80",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"Trojan.Win32.Bayrob.etejdt",
"BehavesLike.Win32.Ipamor.jc",
"Trojan/Win32.Scar.C59481",
"Trojan.Win32.Woripecs",
"W32/Scar.CTI!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Small.14336.BM",
"Trojan.Zenshirsh.SL7",
"Backdoor.Small.Win32.3772",
"Backdoor/Small.wn",
"BKDR_RINCUX.AD",
"Trojan.Win32.Scar.nzec",
"Backdoor.Win32.Small.32768.H[UPX]",
"Backdoor.W32.Small.wn!c",
"Trojan.DownLoad3.19355",
"BKDR_RINCUX.AD",
"BehavesLike.Win32.Backdoor.lm",
"BDS/Salamdom.A",
"Trojan.Win32.Scar.nzec",
"Backdoor:Win32/Salamdom.A",
"Adware/AdHelper.B",
"Win32/Salamdom.AA",
"Win32.Backdoor.Small.Sxyt",
"Backdoor.Small!t0Kn4UZH16w",
"Trojan-Downloader.Win32.Pangu",
"W32/ServStart.AS!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"com",
"hxxp",
":",
"//nttdocomo-qae",
"[",
"."
] | [
9,
9,
1,
9,
9,
9,
9
] |
[
"There",
"are",
"several",
"strings",
"and",
"labels",
"still",
"mentioning",
"'test",
"'",
"or",
"'testcc",
"'",
"—",
"even",
"the",
"URL",
"used",
"for",
"the",
"credit",
"card",
"data",
"exfiltration",
"is",
"named",
"\"",
"testcc.php",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16
] |
[
"Once",
"the",
"payload",
"is",
"prepared",
",",
"“",
"Agent",
"Smith",
"”",
"uses",
"it",
"to",
"build",
"another",
"APK",
"file",
",",
"exploiting",
"the",
"Janus",
"vulnerability",
":",
"Figure",
"8",
":",
"The",
"new",
"infected",
"APK",
"file",
"structure",
"Solely",
"injecting",
"the",
"code",
"of",
"the",
"loader",
"is",
"not",
"enough",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
7,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"qwe-japan",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"Our",
"analysis",
"confirms",
"the",
"excellent",
"investigative",
"work",
"done",
"by",
"TALOS",
"and",
"expands",
"on",
"what",
"they",
"found."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"TABLE",
"OF",
"CONTENTS",
"Key",
"Findings",
"Introduction",
"Threat",
"Analysis",
"Fakespy",
"Code",
"Analysis",
"Dynamic",
"Library",
"Loading",
"Stealing",
"Sensitive",
"Information",
"Anti-Emulator",
"Techniques",
"Under",
"Active",
"Development",
"Who",
"is",
"Behind",
"Fakespy",
"'s",
"Smishing",
"Campaigns",
"?",
"Conclusions",
"Cybereason",
"Mobile",
"Detects",
"and",
"Stops",
"FakeSpy",
"Indicators",
"of",
"Compromise",
"INTRODUCTION",
"For",
"the",
"past",
"several",
"weeks",
",",
"Cybereason",
"has",
"been",
"investigating",
"a",
"new",
"version",
"of",
"Android",
"malware",
"dubbed",
"FakeSpy",
",",
"which",
"was",
"first",
"identified",
"in",
"October",
"2017",
"and",
"reported",
"again",
"in",
"October",
"2018",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"For",
"example",
",",
"when",
"a",
"button",
"is",
"clicked",
",",
"a",
"view",
"is",
"focused",
",",
"etc",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Joke/W32.ArchSMS.2449920.C",
"Trojan.Zusy.D14269",
"Win32.Trojan.WisdomEyes.16070401.9500.9992",
"not-a-virus:WebToolbar.Win32.Webatla.b",
"Trojan.Win32.ArchSMS.csnmld",
"Trojan.SMSSend.4975",
"Tool.ArchSMS.Win32.17120",
"BehavesLike.Win32.BadFile.vc",
"Trojan:Win32/Blinerarch.A",
"Trojan/Win32.ArchSMS.C198920",
"Hoax.ArchSMS",
"Trojan.ArchSMS!HGAxbs185b0",
"Hoax.Win32.ArchSMS"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Over",
"the",
"course",
"of",
"their",
"campaigns,",
"we",
"analyzed",
"their",
"modus",
"operandi",
"and",
"dissected",
"their",
"tools",
"of",
"the",
"trade—and",
"uncovered",
"common",
"denominators",
"indicating",
"that",
"PLEAD,",
"Shrouded",
"Crossbow,",
"and",
"Waterbear",
"may",
"actually",
"be",
"operated",
"by",
"the",
"same",
"group."
] | [
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
3,
0,
16,
16,
16,
16,
4,
12,
12
] |
[
"Password",
"generation",
"for",
"compressed",
"files",
"takes",
"place",
"client-side",
"with",
"each",
"device",
"using",
"a",
"unique",
"key",
"in",
"most",
"scenarios",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Hancitor",
"is",
"one",
"of",
"the",
"better-known",
"malware",
"downloaders",
"due",
"to",
"its",
"numerous",
"SPAM",
"runs",
"and",
"evolving",
"delivery",
"technique."
] | [
3,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16
] |
[
"A",
"few",
"days",
"back",
",",
"we",
"wrote",
"about",
"an",
"Android",
"Marcher",
"trojan",
"variant",
"posing",
"as",
"the",
"Super",
"Mario",
"Run",
"game",
"for",
"Android",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
3,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
5,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FantibagB.Trojan",
"Email-Worm.Win32.Bagle!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9958",
"Win32/Fantibag.E",
"Email-Worm.Win32.Bagle.cv",
"Email-Worm.Win32.Bagle",
"Worm/Bagle.aac",
"TR/Bagle.BR.A.Dll",
"I-Worm.Win32.Bagle.FA",
"Email-Worm.Win32.Bagle.cv",
"Trojan:Win32/Fantibag.B",
"Win32/Bagle.BI",
"Trojan.Fantibag.A1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"is",
"meant",
"solely",
"to",
"empty",
"the",
"safe",
"of",
"ATMs.",
"We",
"detect",
"this",
"new",
"malware",
"family",
"as",
"BKDR_ALICE.A."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
9,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dropper.Refroso.B",
"Trojan/W32.Refroso.62976.D",
"Trojan.Win32.Refroso!O",
"Trojan.Injector.5265",
"Trojan.Refroso.Win32.766",
"Trojan/Refroso.dzt",
"Trojan.Dropper.Refroso.B",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"TROJ_LETHIC.SMA",
"Trojan.Win32.Refroso.ayz",
"Trojan.Dropper.Refroso.B",
"Trojan.Win32.Refroso.bwzzc",
"Trojan.Dropper.Refroso.B",
"Trojan.Dropper.Refroso.B",
"BackDoor.Bifrost.26171",
"TROJ_LETHIC.SMA",
"BehavesLike.Win32.Downloader.kc",
"Backdoor/Poison.bhw",
"Worm:Win32/Refroso.A",
"Trojan[Downloader]/Win32.Refroso",
"Win32.Troj.Refroso.kcloud",
"Worm:Win32/Refroso.A",
"Backdoor.Win32.Poison.46632",
"Trojan.Dropper.Refroso.B",
"Trojan/Win32.Refroso.R694",
"Trojan.Dropper.Refroso.B",
"Trojan.Win32.Buzus.8101325",
"Trojan.Refroso",
"Trojan.Win32.Buzus",
"W32/Injector.IA!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanPSW.LdPinch.cds",
"PWS-Lineage.dll",
"Trojan.Downloader-35380",
"Trojan-GameThief.Win32.OnLineGames.stab",
"Trojan.PWS.Wsgame.origin",
"PWS:Win32/Kotwir.A.dll",
"Trojan-Downloader.Win32.Banload.aqi"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"After",
"manual",
"launch",
",",
"it",
"shows",
"a",
"fake",
"welcome",
"notification",
"to",
"the",
"user",
":",
"Dear",
"Customer",
",",
"we",
"’",
"re",
"updating",
"your",
"configuration",
"and",
"it",
"will",
"be",
"ready",
"as",
"soon",
"as",
"possible",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Blocker.194764",
"Trojan.Bepush.Win32.889",
"Trojan.Strictor.D7317",
"TROJ_SPNR.11GF13",
"Win32.Trojan.WisdomEyes.16070401.9500.9800",
"TROJ_SPNR.11GF13",
"Win.Trojan.Truado-1",
"Trojan.Win32.Dapato.dcitdy",
"Trojan-Downloader:W32/Kilim.T",
"Trojan.DownLoader9.41166",
"Trojan.JS.FBExt",
"W32/Trojan.CAKN-6742",
"Trojan/Blocker.eyy",
"TR/Dldr.Truado.B.5",
"TrojanDownloader:MSIL/Truado.B",
"Trojan/Win32.Blocker.R77853",
"Hoax.Blocker",
"Trj/CI.A",
"Trojan.Blocker!Jm7NxUGe2as",
"Win32/Trojan.a10"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.PWS.LdPinch.TMK",
"Trojan-PWS/W32.LdPinch.557056",
"Trojan.PWS.LdPinch.TMK",
"Trojan.PWS.LdPinch.TMK",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Trojan.Win32.Pakes.nkj",
"Trojan.PWS.LdPinch.TMK",
"Trojan.Win32.Pakes.gkhlc",
"Trojan.PWS.LdPinch.TMK",
"Trojan.PWS.LdPinch.TMK",
"BehavesLike.Win32.VirRansom.hc",
"Trojan.PWS.LdPinch.TMK",
"Trojan.DR.Jeshex!G2i88bn5YEw",
"W32/LdPinch.TNV!tr.pws",
"Win32/Trojan.PWS.912"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"January",
"23",
",",
"2017",
"SpyNote",
"RAT",
"posing",
"as",
"Netflix",
"app",
"As",
"users",
"have",
"become",
"more",
"attached",
"to",
"their",
"mobile",
"devices",
",",
"they",
"want",
"everything",
"on",
"those",
"devices",
"."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BehavesLike.Win32.BadFile.nm",
"TrojanDownloader:Win32/Xuwuq.A"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"This",
"strengthens",
"our",
"suspicion",
"that",
"this",
"malware",
"is",
"still",
"undergoing",
"development",
"and",
"has",
"not",
"been",
"officially",
"marketed",
"or",
"released",
"yet",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"addition",
"to",
"“",
"Free",
"VPN",
"Master",
"Android",
",",
"”",
"we",
"’",
"ve",
"observed",
"Red",
"Alert",
"2.0",
"Trojans",
"in",
"the",
"wild",
"disguising",
"themselves",
"using",
"names",
"like",
":",
"Flash",
"Player",
"or",
"Update",
"Flash",
"Player",
"Android",
"Update",
"or",
"Android",
"Antivirus",
"Chrome",
"Update",
"or",
"Google",
"Update",
"Update",
"Google",
"Market",
"WhatsApp",
"Viber",
"OneCoin",
"Wallet",
"Pornhub",
"Tactic",
"FlashLight",
"or",
"PROFlashLight",
"Finanzonline",
"The",
"vast",
"majority",
"of",
"in-the-wild",
"Red",
"Alert",
"2.0",
"samples",
"falsely",
"present",
"themselves",
"as",
"Adobe",
"Flash",
"player",
"for",
"Android",
",",
"a",
"utility",
"that",
"Adobe",
"stopped",
"supporting",
"years",
"ago",
"."
] | [
16,
16,
16,
16,
5,
13,
13,
13,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
5,
13,
13,
5,
13,
16,
5,
13,
5,
13,
16,
5,
13,
5,
13,
13,
5,
5,
5,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
11,
16,
16,
16,
16,
5,
13,
13,
16,
5,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16
] |
[
"It",
"is",
"the",
"first",
"plain",
"stage",
"that",
"does",
"not",
"employ",
"a",
"VM",
"or",
"obfuscation",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Facebook",
"page",
"managed",
"by",
"the",
"C",
"&",
"C",
"domain",
"registrant",
"uses",
"the",
"same",
"base",
"domain",
"name",
"(",
"minigameshouse",
")",
"and",
"phone",
"number",
"as",
"the",
"registered",
"malicious",
"C",
"&",
"C",
"used",
"by",
"the",
"Ashas",
"adware",
"Of",
"interest",
"is",
"that",
"on",
"the",
"Minigameshouse",
"Facebook",
"page",
",",
"the",
"malicious",
"developer",
"promotes",
"a",
"slew",
"of",
"games",
"beyond",
"the",
"Ashas",
"family",
"for",
"download",
"on",
"both",
"Google",
"Play",
"and",
"the",
"App",
"Store",
"."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
5,
13,
16,
16,
5,
13,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W64.HfsAutoA.4EC7",
"Exploit.CVE-2015-1701.A",
"Trojan.Win64",
"Exploit.CVE-2015-1701.A",
"W64/Trojan.CBXE-7834",
"Exploit.CVE-2015-1701.A",
"Exploit.Win64.CVE-2015-1701.b",
"Exploit.CVE-2015-1701.A",
"Exploit.CVE-2015-1701.A",
"Exploit.CVE2015-1701.1",
"BehavesLike.Win64.BadFile.mh",
"Virus.Win32.Virut",
"Exploit.CVE-2015-1701.e",
"Trojan[Exploit]/EXE.CVE-2015-1701",
"Exploit.CVE-2015-1701.A",
"Exploit.Win64.CVE.tnlV",
"Exploit.Win64.CVE-2015-1701.b",
"Trojan/Win32.Exploit.R200799",
"Exploit.Win64.CVE-2015-1701",
"Trj/CI.A",
"Win64.Exploit.Cve-2015-1701.Ahyf",
"W64/CVE_2015_1701.A!tr",
"Win32/Trojan.Exploit.059"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"is",
"part",
"of",
"a",
"class",
"called",
"CaptureService",
",",
"which",
"already",
"existed",
"in",
"the",
"previous",
"version",
"but",
"it",
"was",
"not",
"duly",
"implemented",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Cult.fvly",
"W32/Cult.B@mm",
"W32.HLLW.Cult@mm",
"Win32/Cult.E",
"Email-Worm.Win32.Cult.b",
"Win32.Cult.B@mm",
"I-Worm.Cult.B",
"Worm.Win32.Cult.B",
"Win32.HLLW.SpyBot",
"I-Worm/Cult.b",
"Worm.Cult.b.kcloud",
"Worm:Win32/Cult.D@mm",
"I-Worm.Win32.Cult.16418",
"Win32/Cult.worm.16418",
"Win32.Cult.B@mm",
"W32/Cult.B@mm",
"Worm.Cult",
"Net-Worm.Cult",
"Win32/Cult.B",
"Worm.Cults.b",
"Email-Worm.Win32.Cult",
"W32/Cult.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Last",
"week,",
"an",
"Endgame",
"researcher",
"was",
"analyzing",
"spam",
"emails",
"for",
"indications",
"of",
"emergent",
"malicious",
"activity."
] | [
0,
8,
16,
4,
12,
16,
16,
1,
9,
11,
1,
16,
16,
16,
16
] |
[
"Symantec",
"is",
"currently",
"investigating",
"reports",
"of",
"yet",
"another",
"new",
"attack",
"in",
"the",
"Middle",
"East",
"involving",
"the",
"destructive",
"disk-wiping",
"malware",
"used",
"by",
"the",
"Shamoon",
"group",
"W32.Disttrack,",
"W32.Disttrack.B."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
2,
10,
16,
16,
3,
11,
11,
16,
16,
16,
6,
14,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.OnlineGamesXTUG.Worm",
"Trojan-PSW.Win32.QQShou!O",
"Trojan/PSW.QQShou.aqt",
"Trojan.Win32.QQShou.evyqv",
"TROJ_AGKT.SMUS6",
"Trojan.Qqshou-23",
"Trojan-PSW.Win32.QQShou.pfp",
"Trojan.PWS.QQShou!WQNr+ttAX9g",
"Trojan.Win32.PSWQQShou.80480[h]",
"Troj.PSW32.W.QQShou.aqt!c",
"Trojan.QQShou.Win32.1230",
"TROJ_AGKT.SMUS6",
"BehavesLike.Win32.Autorun.lc",
"Trojan/PSW.QQShou.adz",
"W32/VB.NII!tr",
"Trojan[PSW]/Win32.QQShou",
"Trojan.Graftor.D33E1",
"Trojan/Win32.QQShou",
"PWS:Win32/QQpass.DW",
"Win32/QQPass.NVO",
"TrojanPSW.QQShou",
"Win32.Trojan-qqpass.Qqrob.Hwwq",
"Trojan-PWS.Qqshou",
"Trojan.Win32.VB.NII"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Rootkit.9056.H",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Hacktool.Rootkit",
"Win32/Rookuz.S",
"Trojan.Win32.Hmir.bczend",
"Trojan.NtRootKit.13456",
"Downloader.Hmir.Win32.3829",
"Backdoor.Winnt",
"Trojan[Downloader]/Win32.Hmir",
"Troj.GameThief.W32.OnLineGames.kZeW",
"Backdoor:WinNT/Blazgel.A",
"Trojan/Win32.Rootkit.R24603",
"TrojanDownloader.Hmir",
"Win32/RootKit.Rootkit.03f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.BD3E"
] | [
16,
3,
16,
16,
16,
1
] |
[
"Symantec",
"first",
"began",
"looking",
"into",
"this",
"threat",
"in",
"the",
"fall",
"of",
"2013."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
0
] |
[
"Once",
"this",
"malware",
"has",
"successfully",
"installed",
",",
"it",
"will",
"collect",
"personal",
"data",
",",
"passwords",
",",
"keystrokes",
",",
"banking",
"information",
",",
"and",
"more",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.A.Downloader.39936.EG",
"Trojan.DownLoad2.31494",
"W32/Trojan.BMBV-5898",
"TR/Vodvit.A.10",
"Trojan:Win32/Vodvit.A",
"Trojan.Graftor.D79FB"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"This",
"allows",
"it",
"to",
"silently",
"execute",
"any",
"backdoor",
"activity",
"without",
"the",
"user",
"knowing",
"that",
"the",
"device",
"is",
"in",
"an",
"active",
"state",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.71D4",
"Win32.Trojan.Kryptik.hj",
"W32/Trojan.YMZM-8551",
"Trojan.Win32.SpyEyes.cxesvi",
"Trojan.PWS.Papras.244",
"BehavesLike.Win32.DocumentCrypt.dc",
"Trojan[Spy]/Win32.SpyEyes",
"Trojan.Kazy.D5A6E2",
"TrojanDropper:Win32/Vawtrak.A",
"Trojan/Win32.Reveton.R107579",
"TrojanPSW.Tepfer",
"Backdoor.Andromeda",
"Win32.Trojan.Atraps.Pbfq",
"TrojanSpy.SpyEyes!jq5iqgzT3B4",
"Trojan-Spy.Zbot",
"W32/Kryptik.EWVT!tr",
"Win32/Trojan.73f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.BackdoorWabot.Trojan",
"Backdoor.Win32.Wabot!O",
"Trojan.Wabot.A8",
"Trojan/Delf.nrf",
"Win32.Backdoor.Wabot.a",
"W32.Wabot",
"Win32/DCMgreen.A",
"BKDR_WABOT.SMIA",
"Win.Trojan.Wabot-6113548-0",
"Backdoor.Win32.Wabot.a",
"Trojan.Win32.Wabot.dmukv",
"Backdoor.Win32.Wabot.157619",
"Backdoor.W32.Wabot.tn6b",
"Trojan.Win32.Wabot.a",
"Backdoor.Win32.Wabot.A",
"Trojan.MulDrop6.64369",
"Backdoor.Wabot.Win32.1",
"BKDR_WABOT.SMIA",
"BehavesLike.Win32.Wabot.wc",
"P2P-Worm.Win32.Delf",
"Backdoor/Wabot.z",
"Trojan[Backdoor]/Win32.Wabot.a",
"TrojanSpy:MSIL/Omaneat.B",
"Trojan.ShellIni.E7E294",
"Backdoor.Win32.Wabot.a",
"Worm/Win32.IRCBot.R3689",
"Backdoor.Wabot",
"Backdoor.Wabot",
"I-Worm.Delf.NRF",
"Win32/Delf.NRF",
"Backdoor.Wabot!jai+hnpgbwI",
"W32/Luiha.M!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"com",
"hxxp",
":",
"//www",
"[",
"."
] | [
9,
9,
1,
9,
9,
9,
9
] |
[
"Starting",
"on",
"May",
"11,",
"2017,",
"Flashpoint",
"analysts",
"observed",
"several",
"large",
"spam",
"campaigns",
"originating",
"from",
"the",
"Necurs",
"botnet",
"that",
"aim",
"to",
"dupe",
"recipients",
"into",
"opening",
"malicious",
"attachments",
"that",
"infect",
"their",
"computers",
"with",
"Jaff",
"ransomware."
] | [
16,
16,
0,
8,
8,
4,
16,
16,
16,
16,
6,
14,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
1,
9,
9,
15,
16,
16,
5,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Celofot.D",
"Trojan/W32.Sasfis.93184.B",
"Trojan.Win32.Sasfis!O",
"Trojan.Sasfis",
"TROJ_DELF.SMH",
"Win32.Trojan.WisdomEyes.16070401.9500.9986",
"W32/Risk.WXEM-5531",
"Backdoor.Bifrose",
"Trojan.Sasfis",
"Win32/Sasfis.NUH",
"Win.Trojan.Sasfis-42",
"Backdoor.Celofot.D",
"Trojan.Win32.Sasfis.aobz",
"Backdoor.Celofot.D",
"Trojan.Win32.Sasfis.ikchn",
"Trojan.Win32.A.Sasfis.93696.C",
"Troj.W32.Smardf.lrGo",
"Backdoor.Celofot.D",
"Trojan.DownLoader4.42747",
"BehavesLike.Win32.SpywareLyndra.nc",
"Trojan-Dropper.Delf",
"W32/MalwareS.BHQS",
"Trojan/Sasfis.koz",
"Trojan/Win32.Sasfis.aobz",
"Backdoor:Win32/Nitvea.A",
"Backdoor.Celofot.D",
"Trojan.Win32.Sasfis.aobz",
"Trojan/Win32.Sasfis.R20535",
"Backdoor.Celofot.D",
"Backdoor.Celofot.D",
"Win32.Trojan.Sasfis.Pijo",
"Trojan.Sasfis!nQm4iaN0os8",
"W32/Sasfis.LB!tr",
"Win32/Trojan.6e1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.ExpiroPC.PE",
"Win32.Backdoor.Prorat.e",
"W32/Prorat.BNXP-3134",
"Backdoor.Prorat",
"Win32/Prorat.19.P",
"Win.Trojan.Delf-1540",
"Trojan.Win32.Tiny.baadu",
"Backdoor.W32.Prorat!c",
"BackDoor.ProRat.19",
"BehavesLike.Win32.Adware.tc",
"Backdoor.Win32.Prorat",
"W32/ProratX.ANJ",
"BDS/Lurpen.rts",
"W32/BDoor.AVW!dam",
"Backdoor/Win32.Prorat.R111443",
"Backdoor.Prorat",
"Bck/Prorat.HT",
"Backdoor.Prorat!o+pRlXhwebo"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.OnlinegameJTPX.Trojan",
"Virus.Win32.Sality!O",
"Troj.GameThief.W32.WOW.hre!c",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"Infostealer.Gampass",
"Win32/Wowpa.HS",
"TROJ_FAM_0001989.TOMA",
"Win.Trojan.Delf-1669",
"Trojan.Win32.PSWWow.22440.B",
"TrojWare.Win32.Trojan.Banker.~d08",
"Trojan.PWS.Wow.1283",
"Trojan.WOW.Win32.2972",
"TROJ_FAM_0001989.TOMA",
"BehavesLike.Win32.Sality.lc",
"W32/Trojan.EOQM-5227",
"Trojan/PSW.Moshou.ars",
"Trojan[GameThief]/Win32.WOW",
"Win32.Troj.PswWowT.lk.kcloud",
"TrojanDropper:Win32/Dozmot.B",
"Trojan/Win32.OnlineGameHack.C54025",
"BScope.Trojan.OnlineGames.0825",
"Win32/PSW.WOW.DZI",
"Win32.Trojan.Heurinject.Lnxt"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Joke.Movingmouse",
"Joke/W32.BadJoke.21504",
"Joke.Movingmouse",
"Joke.MoveMouse",
"Win.Joke.MovingMouse-1",
"Hoax.Win32.BadJoke.MovingMouse.a",
"Joke.Movingmouse",
"Riskware.Win32.MovingMouse.hrfx",
"Hoax.BadJoke.21504.A",
"Win32.Trojan-psw.Badjoke.Suno",
"Joke.Win32.BadJoke.MovingMouse.~FCD",
"Joke.Movingmouse",
"Trojan.MulDrop.28720",
"Aplicacion/MovingMouse.a",
"not-a-virus:BadJoke.Win32.MovingMouse.a",
"W32/Joke.RZZA-1623",
"not-virus:Joke.Win32.MovingMouse",
"HackTool[Hoax]/Win32.MovingMouse",
"Joke.Movingmouse",
"Hoax.W32.BadJoke.MovingMouse.a!c",
"Hoax.Win32.BadJoke.MovingMouse.a",
"Joke.Movingmouse",
"Unwanted/Win32.Movingmouse.R123022",
"Joke.Movingmouse",
"Win32/Hoax.MovingMouse.B",
"Win32/Trojan.2ff"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W64/Application.KFTW-0763",
"Trojan.Win64.AdAnti.exbcmq",
"ADWARE/AdAnti.nqwib",
"Adware.ChinAd",
"Trj/CI.A",
"Win32/Trojan.7be"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Figure",
"25",
":",
"infected",
"Android",
"version",
"distribution",
"To",
"further",
"analyze",
"“",
"Agent",
"Smith",
"”",
"’",
"s",
"infection",
"landscape",
",",
"we",
"dived",
"into",
"the",
"top",
"10",
"infected",
"countries",
":",
"Country",
"Total",
"Devices",
"Total",
"Infection",
"Event",
"Count",
"Avg",
"."
] | [
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"FrozenCell",
":",
"Multi-Platform",
"Surveillance",
"Campaign",
"Against",
"Palestinians",
"October",
"5",
",",
"2017",
"FrozenCell",
"has",
"been",
"seen",
"masquerading",
"as",
"various",
"well",
"known",
"social",
"media",
"and",
"chat",
"applications",
"as",
"well",
"as",
"an",
"app",
"likely",
"only",
"used",
"by",
"Palestinian",
"or",
"Jordanian",
"students",
"sitting",
"their",
"2016",
"general",
"exams",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"WAKE_LOCK",
"-",
"Allows",
"the",
"application",
"to",
"use",
"PowerManager",
"WakeLocks",
"to",
"keep",
"the",
"processor",
"from",
"sleeping",
"or",
"the",
"screen",
"from",
"dimming",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"DAN",
"GOODIN",
"-",
"1/23/2017",
",",
"4:39",
"PM",
"A",
"virulent",
"family",
"of",
"malware",
"that",
"infected",
"more",
"than",
"10",
"million",
"Android",
"devices",
"last",
"year",
"has",
"made",
"a",
"comeback",
",",
"this",
"time",
"hiding",
"inside",
"Google",
"Play",
"apps",
"that",
"have",
"been",
"downloaded",
"by",
"as",
"many",
"as",
"12",
"million",
"unsuspecting",
"users",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.MSIL",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Backdoor.MSIL.SpyGate.wsr",
"Trojan.Win32.Disfa.dqmqly",
"BehavesLike.Win32.Trojan.cc",
"GrayWare/MSIL.Injector.AWA",
"Trojan.Zusy.D28231",
"Trj/CI.A",
"Trojan.Win32.Fsysna",
"Win32/Trojan.7c5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"tcpdo",
"[",
"."
] | [
9,
9,
9
] |
[
"Consumers",
"in",
"English-speaking",
"countries,",
"in",
"particular",
"the",
"US",
"and",
"UK,",
"are",
"most",
"at",
"risk,",
"since",
"this",
"is",
"where",
"the",
"largest",
"numbers",
"of",
"targeted",
"banks",
"are",
"located."
] | [
4,
16,
16,
2,
16,
16,
16,
2,
16,
2,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16
] |
[
"Earlier",
"this",
"month,",
"we",
"spotted",
"a",
"phishing",
"campaign",
"that",
"led",
"victims",
"to",
"unknowingly",
"download",
"the",
"Banker",
"malware."
] | [
16,
0,
8,
16,
16,
16,
6,
14,
15,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Skeeyah.S5",
"Downloader.Chindo.Win32.162",
"Trojan.Adware.Graftor.D374DC",
"not-a-virus:Downloader.Win32.Chindo.ap",
"Trojan.Win32.Chindo.dumnyn",
"Variant.Mikey.mvHB",
"Adware.Chindo.12",
"PUA.RiskWare.Chindo",
"RiskWare[Downloader]/Win32.Chindo.ap",
"TrojanDownloader:Win32/Codumwis.B",
"not-a-virus:Downloader.Win32.Chindo.ap",
"BScope.Malware-Cryptor.Ngrbot",
"Win32/RiskWare.Chindo.L"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Odatv",
"is",
"a",
"secular",
"news",
"organization",
"founded",
"in",
"2007",
"with",
"a",
"reputation",
"for",
"being",
"critical",
"of",
"Turkey's",
"government",
"and",
"the",
"Gülen",
"Movement."
] | [
4,
16,
16,
4,
12,
12,
16,
16,
0,
16,
16,
16,
11,
16,
16,
16,
4,
12,
16,
4,
12,
12
] |
[
"params",
":",
"This",
"command",
"allows",
"the",
"malicious",
"operator",
"to",
"change",
"configuration",
"parameters",
"in",
"the",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"threat",
"can",
"download",
"other",
"malware",
"and",
"unwanted",
"software",
"onto",
"your",
"PC."
] | [
16,
3,
16,
16,
16,
3,
16,
16,
5,
16,
16,
5
] |
[
"This",
"malware",
"appears",
"to",
"be",
"newly",
"developed",
"with",
"code",
"that",
"differs",
"significantly",
"from",
"previously",
"known",
"Android",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"These",
"URLs",
"are",
"all",
"in",
"the",
"form",
"of",
"“",
"http",
":",
"//",
"$",
"C2.",
"$",
"SERVER.",
"$",
"IP/api/",
"?",
"id=",
"$",
"NUM",
"”",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Bladabindi.FC.3722",
"Trojan.Zusy.D3D182",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"BehavesLike.Win32.Trojan.lt",
"MSIL/Small.CM!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Yakes.8842",
"Trojan/CsNowDown.c",
"Win32.Trojan.WisdomEyes.16070401.9500.9736",
"Downloader.Darkmegi",
"Win.Trojan.Darkcpn-1",
"Trojan.Win32.Yakes.ktpl",
"Trojan.Win32.Gamania.dridjs",
"Trojan.PWS.Gamania.34539",
"BehavesLike.Win32.Backdoor.ct",
"Trojan.Graftor.DCAF7",
"Trojan.Win32.Yakes.ktpl",
"Trojan:WinNT/Waltrodock.A",
"Downloader/Win32.Darkmegi.C1839200",
"Trj/CI.A",
"W32/CsNowDown.C"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Command",
"and",
"Control",
"T1437",
"Standard",
"Application",
"Layer",
"Protocol",
"Uses",
"Firebase",
"Cloud",
"Messaging",
"for",
"C",
"&",
"C",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Decrypted",
"EventBot",
"configuration",
"Decrypted",
"EventBot",
"configuration",
"returned",
"from",
"the",
"C2",
"."
] | [
16,
3,
16,
16,
3,
16,
16,
16,
16,
16,
16
] |
[
"Upon",
"investigation",
"we",
"have",
"determined",
"the",
"malware",
"payload",
"to",
"be",
"DELoader,",
"which",
"downloads",
"a",
"Zeus",
"variant",
"banking",
"trojan",
"upon",
"execution."
] | [
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
3,
16,
16,
16,
3,
11,
11,
11,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Lexfir.A",
"TrojanAPT.Lexfir.A6",
"Trojan.Lexfir.A",
"TSPY_DERUSBI.SMJ1",
"Win32.Trojan.WisdomEyes.16070401.9500.9979",
"Infostealer.Derusbi",
"TSPY_DERUSBI.SMJ1",
"Win.Trojan.Derusbi-42",
"Trojan.Lexfir.A",
"Backdoor.Win32.Winnti.jr",
"Trojan.Lexfir.A",
"Trojan.Lexfir.A",
"Trojan.Lexfir.A",
"DLOADER.PWS.Trojan",
"W32/Trojan.ZNCA-7493",
"TR/PSW.Lexfir.A.3",
"Trojan.Lexfir.A",
"Backdoor.Win32.Winnti.jr",
"PWS:Win32/Lexfir.A",
"Backdoor/Win32.Etso.R30303",
"Win32.Backdoor.Winnti.Lfzs",
"Trojan.Derusbi!jrrDP0rufRk",
"Trojan-Spy.Win32.Derusbi",
"W32/DERUSBI.C!tr",
"Win32/Trojan.PSW.186"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"unidentified",
"financial",
"group",
"targeted",
"regional",
"and",
"global",
"banks",
"with",
"offices",
"in",
"the",
"Middle",
"East."
] | [
6,
14,
14,
14,
16,
4,
16,
4,
12,
16,
4,
16,
2,
10,
10
] |
[
"Security",
"Service",
"of",
"Ukraine",
"SBU",
"indicated",
"that",
"Russian",
"spies",
"had",
"implanted",
"malicious",
"softwares",
"in",
"the",
"State",
"Grid",
"which",
"caused",
"power",
"plants",
"shut",
"down",
"unexpectedly."
] | [
4,
12,
12,
12,
12,
16,
16,
6,
14,
16,
16,
3,
11,
16,
4,
12,
12,
16,
16,
4,
12,
16,
16,
16
] |
[
"Other",
"versions",
"included",
"all",
"the",
"pieces",
"needed",
"for",
"a",
"valid",
"disclosure",
"message",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"However",
",",
"it",
"’",
"s",
"possible",
"the",
"set",
"of",
"commands",
"may",
"change",
"in",
"future",
"versions",
"of",
"the",
"Trojan",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.LarmogasD.Trojan",
"Dropped:Backdoor.Hupigon.211672",
"W32.Jadtre.B4",
"Trojan.Black.Win32.3180",
"Trojan/Dropper.Delf.dlv",
"Dropped:Backdoor.Hupigon.211672",
"W32/Risk.UMVG-4201",
"TROJ_JADTRE.SMM",
"Win.Spyware.66802-2",
"TScope.Malware-Cryptor.SB",
"W32.Parite.lf96",
"TrojWare.Win32.PSW.OnLineGames.~LLD",
"Trojan.PWS.Legmir.3153",
"BehavesLike.Win32.Gate.nh",
"W32/Dropper.ANYI",
"Trojan/KillAV.bbj",
"TR/Drop.Delfdru.O",
"Win32.PSWTroj.OnLineGames.kcloud",
"Backdoor.Hupigon.D33AD8",
"Dropped:Backdoor.Hupigon.211672",
"Dropper/Win32.Microjoin.R1379",
"Dropped:Backdoor.Hupigon.211672",
"Dropped:Backdoor.Hupigon.211672",
"Trj/CI.A",
"Trojan.DR.Delfdru!ayAD7it/9FQ",
"Win32/Trojan.Dropper.cad"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"APT19",
"used",
"three",
"different",
"techniques",
"to",
"attempt",
"to",
"compromise",
"targets."
] | [
6,
16,
16,
16,
16,
16,
16,
16,
16,
4
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"AIT:Trojan.Autoit.CAQ",
"AIT:Trojan.Autoit.CAQ",
"Win32.Trojan.WisdomEyes.16070401.9500.9949",
"AIT:Trojan.Autoit.CAQ",
"Trojan-Banker.Win32.AutoIt.zl",
"AIT:Trojan.Autoit.CAQ",
"Trojan.DownLoader23.53524",
"Trojan/Banker.AutoIt.bu",
"TrojanSpy:Win32/Aneatop.A",
"Trojan-Banker.Win32.AutoIt.zl",
"Win32.Trojan-banker.Autoit.Suny",
"Win32/Trojan.5f1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Finally",
",",
"the",
"malware",
"spawns",
"a",
"thread",
"that",
"has",
"the",
"goal",
"to",
"load",
",",
"remap",
",",
"and",
"relocate",
"the",
"stage",
"5",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.WscmgrA.Trojan",
"Trojan-PSW.Win32.Delf!O",
"Trojan/PSW.Delf.abx",
"Win32.Trojan.WisdomEyes.16070401.9500.9700",
"W32/Autorun.MSPP-2235",
"W32.SillyFDC",
"Win32/Retecha.A",
"WORM_DELF.NAN",
"Win.Trojan.Delf-3449",
"Trojan-PSW.Win32.Delf.abx",
"Trojan.Win32.Delf.brmlqc",
"Trojan.Win32.Autorun.382020",
"Win32.Trojan-qqpass.Qqrob.Sxyo",
"Trojan.PWS.Sadas",
"Trojan.Delf.Win32.3468",
"WORM_DELF.NAN",
"W32/Autorun.O",
"Trojan/PSW.GamePass.yqg",
"TR/PSW.Delf.abx.3",
"Worm:Win32/Hamtacker.A",
"Trojan-PSW.Win32.Delf.abx",
"Worm/Win32.AutoRun.R76556",
"Worm.Brontok",
"Trojan.Delf.ABX",
"Win32/PSW.Delf.ABX",
"Hacktool.Dialuppass.A",
"not-a-virus:PSWTool.Win32.Dialupass.an",
"W32/Autorun.PG.worm",
"Win32/Trojan.PSW.8bb"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"And",
"this",
"just",
"means",
"attackers",
"will",
"continue",
"to",
"be",
"successful",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Their",
"findings",
"showed",
"that",
"Wolf",
"is",
"headquartered",
"in",
"Germany",
"with",
"offices",
"in",
"Cyprus",
",",
"Bulgaria",
",",
"Romania",
",",
"India",
"and",
"(",
"possibly",
")",
"the",
"U.S",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"following",
"scenario",
"may",
"play",
"out",
":",
"according",
"to",
"the",
"templates",
"for",
"processing",
"incoming",
"SMSs",
",",
"Rotexy",
"intercepts",
"a",
"message",
"from",
"the",
"bank",
"that",
"contains",
"the",
"last",
"four",
"digits",
"of",
"the",
"bank",
"card",
"connected",
"to",
"the",
"phone",
"number",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"is",
"a",
"custom",
"obfuscation",
"partly",
"based",
"on",
"base85",
"encoding",
",",
"which",
"is",
"in",
"itself",
"unusual",
",",
"in",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Yet",
"perhaps",
"most",
"notably,",
"BianLian",
"has",
"shifted",
"the",
"main",
"focus",
"of",
"their",
"attacks",
"away",
"from",
"ransoming",
"encrypted",
"files",
"to",
"focus",
"more",
"on",
"data-leak",
"extortion",
"as",
"a",
"means",
"to",
"extract",
"payments",
"from",
"victims."
] | [
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
1,
9,
9,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Visa",
"also",
"published",
"a",
"list",
"of",
"Internet",
"addresses",
"that",
"may",
"have",
"been",
"involved",
"in",
"the",
"Oracle",
"breach",
"and",
"are",
"thought",
"to",
"be",
"closely",
"tied",
"to",
"an",
"Eastern",
"European",
"organized",
"cybercrime",
"gang."
] | [
4,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
14,
14
] |
[
"“",
"Agent",
"Smith",
"”",
"repacks",
"its",
"prey",
"apps",
"at",
"smali/baksmali",
"code",
"level",
"."
] | [
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Destructive",
"malware",
"used",
"by",
"unknown",
"computer",
"network",
"exploitation",
"CNE",
"operators",
"has",
"been",
"identified."
] | [
3,
11,
16,
16,
16,
7,
15,
15,
15,
16,
16,
16,
16
] |
[
"The",
"earliest",
"instance",
"where",
"a",
"cyber",
"attack",
"was",
"attributed",
"to",
"the",
"OilRig",
"campaign",
"was",
"in",
"late",
"2015."
] | [
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
6,
14,
14,
16,
16,
0,
8
] |
[
"This",
"screen",
"persists",
"on",
"the",
"screen",
"and",
"prevents",
"the",
"user",
"from",
"using",
"the",
"navigation",
"buttons",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"INDICATORS",
"OF",
"COMPROMISE",
"(",
"IOCS",
")",
"Domains",
"Facebook-photos-au.su",
"Homevideo2-12l.ml",
"videohosting1-5j.gq",
"URLs",
"hxxp",
":",
"//88.99.227",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
1,
1,
16,
1,
9,
9,
9,
9
] |
[
"android.intent.action.SIM_STATE_CHANGED",
"System",
"notification",
"that",
"the",
"SIM",
"card",
"has",
"changed",
"or",
"been",
"removed",
"."
] | [
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"com/gate_cb8a5aea1ab302f0_c",
"online",
"185.158.249",
"[",
"."
] | [
9,
9,
16,
1,
9,
9
] |
[
"If",
"the",
"geolocation",
"points",
"to",
"Brazil,",
"then",
"another",
"malicious",
"file",
"is",
"downloaded."
] | [
16,
16,
2,
16,
16,
2,
16,
1,
9,
9,
9,
9
] |
[
"Command",
"Description",
"push",
"Shows",
"a",
"push",
"notification",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Furthermore",
",",
"we",
"found",
"that",
"in",
"just",
"the",
"first",
"two",
"weeks",
"of",
"2017",
",",
"there",
"have",
"been",
"more",
"than",
"120",
"such",
"spyware",
"variants",
"already",
"built",
"using",
"the",
"same",
"SpyNote",
"Trojan",
"builder",
"as",
"SpyNote",
"RAT",
"and",
"roaming",
"in",
"the",
"wild",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16
] |
[
"This",
"is",
"a",
"local",
"root",
"exploit",
"pack",
",",
"and",
"the",
"Trojan",
"uses",
"4",
"different",
"exploit",
"pack",
"files",
",",
"3",
"for",
"32-bit",
"systems",
"and",
"1",
"for",
"64-bit-systems",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.BitcoinMiner",
"Win32.Trojan.WisdomEyes.16070401.9500.9983",
"Downloader.MisleadApp",
"not-a-virus:RiskTool.Win32.BitCoinMiner.iqlc",
"Trojan.Win32.Z.Svcminer.27648",
"RiskTool.BitCoinMiner.gvg",
"TR/Downloader.knzhj",
"RiskWare[RiskTool]/Win32.BitCoinMiner",
"TrojanDownloader:Win32/SvcMiner.A!bit",
"not-a-virus:RiskTool.Win32.BitCoinMiner.iqlc",
"Trojan/Win32.Mepaow.C87266",
"Trj/GdSda.A",
"Trojan.CoinMiner"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"February",
",",
"we",
"recorded",
"767",
"infections",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"net",
"page",
"for",
"DroidVPN",
"remained",
"identical",
"when",
"serving",
"either",
"HenBox",
"or",
"DroidVPN",
"apps",
",",
"just",
"that",
"the",
"legitimate",
"APK",
"file",
"had",
"been",
"replaced",
"with",
"HenBox",
"for",
"an",
"unknown",
"period",
"of",
"time",
"."
] | [
9,
9,
16,
16,
1,
16,
16,
16,
16,
16,
3,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.RadmasAM.Trojan",
"Worm/W32.Updater.65536.B",
"Virus.Win32.Sality!O",
"Win32.Worm.Pepex.b",
"W32.Virut.CF",
"Win32/Tnega.AQRF",
"WORM_DIPASIK.SM",
"Win.Worm.Updater-4",
"Email-Worm.Win32.Updater.n",
"Hoax.W32.ArchSMS.m5oU",
"Win32.HLLM.Updater.5",
"WORM_DIPASIK.SM",
"Email-Worm.Win32.Atak",
"Worm/Updater.e",
"Worm[Email]/Win32.Updater",
"Worm:Win32/Networm.A",
"Email-Worm.Win32.Updater.n",
"Trojan/Win32.Kykymber.R128813",
"Worm.Updater",
"Win32/Pepex.I",
"Trojan.Win32.Snake.a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.