tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "A", "backdoor", "also", "known", "as:", "Ransom/W32.WannaCry.5267459", "Ransom.WannaCrypt.S1670344", "Ransom.WannaCrypt", "Trojan/Exploit.CVE-2017-0147.a", "Ransom_WCRY.SMALYM", "Win32.Worm.Rbot.a", "Ransom.Wannacry", "Ransom_WCRY.SMALYM", "Win.Ransomware.WannaCry-6313787-0", "Win32.Exploit.CVE-2017-0147.A", "Trojan-Ransom.Win32.Wanna.m", "Trojan.Win32.Wanna.epxkni", "Trojan.Win32.WannaCry.5267459", "Troj.Ransom.W32.Wanna.toP0", "Trojan.Encoder.11432", "Exploit.CVE.Win32.1765", "BehavesLike.Win32.RansomWannaCry.th", "Trojan.Wanna.k", "Trojan[Ransom]/Win32.Wanna", "Ransom:Win32/WannaCrypt.A!rsm", "Trojan-Ransom.Win32.Wanna.m", "Trojan/Win32.WannaCryptor.R200894", "Hoax.Wanna", "Trj/GdSda.A", "Win32/Exploit.CVE-2017-0147.A", "Trojan-Ransom.Win32.Wanna.m", "Exploit.CVE-2017-0147!", "Trojan.Win32.Exploit", "W32/WannaCryptor.H!tr.ransom" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Packer.FSG.A", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Downloader.BFIA", "Downloader.Trojan", "TROJ_APHER.A", "Win.Trojan.Small-10534", "Packer.FSG.A", "Trojan-Downloader.Win32.WebDown.10", "Packer.FSG.A", "Trojan.Win32.WebDown.cdwvkr", "Packer.FSG.A", "TrojWare.Win32.TrojanDownloader.Apher.0700", "Packer.FSG.A", "Trojan.DownLoader.4572", "TROJ_APHER.A", "Trojan-Downloader.Win32.WebDown", "W32/Downloader.MUZI-7025", "Trojan/Downloader.WebDown.10", "Trojan/Win32.Unknown", "Packer.FSG.A", "Trojan-Downloader.Win32.WebDown.10", "Win-Trojan/Apher.1312", "Packer.FSG.A", "Trj/Downloader.GE", "Win32/Randon.A", "W32/Dloader.AE!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Heur.D.EED80", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "Trojan.Win32.Bayrob.etejdt", "BehavesLike.Win32.Ipamor.jc", "Trojan/Win32.Scar.C59481", "Trojan.Win32.Woripecs", "W32/Scar.CTI!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Small.14336.BM", "Trojan.Zenshirsh.SL7", "Backdoor.Small.Win32.3772", "Backdoor/Small.wn", "BKDR_RINCUX.AD", "Trojan.Win32.Scar.nzec", "Backdoor.Win32.Small.32768.H[UPX]", "Backdoor.W32.Small.wn!c", "Trojan.DownLoad3.19355", "BKDR_RINCUX.AD", "BehavesLike.Win32.Backdoor.lm", "BDS/Salamdom.A", "Trojan.Win32.Scar.nzec", "Backdoor:Win32/Salamdom.A", "Adware/AdHelper.B", "Win32/Salamdom.AA", "Win32.Backdoor.Small.Sxyt", "Backdoor.Small!t0Kn4UZH16w", "Trojan-Downloader.Win32.Pangu", "W32/ServStart.AS!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "com", "hxxp", ":", "//nttdocomo-qae", "[", "." ]
[ 9, 9, 1, 9, 9, 9, 9 ]
[ "There", "are", "several", "strings", "and", "labels", "still", "mentioning", "'test", "'", "or", "'testcc", "'", "—", "even", "the", "URL", "used", "for", "the", "credit", "card", "data", "exfiltration", "is", "named", "\"", "testcc.php", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16 ]
[ "Once", "the", "payload", "is", "prepared", ",", "“", "Agent", "Smith", "”", "uses", "it", "to", "build", "another", "APK", "file", ",", "exploiting", "the", "Janus", "vulnerability", ":", "Figure", "8", ":", "The", "new", "infected", "APK", "file", "structure", "Solely", "injecting", "the", "code", "of", "the", "loader", "is", "not", "enough", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 7, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "qwe-japan", "[", "." ]
[ 9, 9, 9, 9 ]
[ "Our", "analysis", "confirms", "the", "excellent", "investigative", "work", "done", "by", "TALOS", "and", "expands", "on", "what", "they", "found." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "TABLE", "OF", "CONTENTS", "Key", "Findings", "Introduction", "Threat", "Analysis", "Fakespy", "Code", "Analysis", "Dynamic", "Library", "Loading", "Stealing", "Sensitive", "Information", "Anti-Emulator", "Techniques", "Under", "Active", "Development", "Who", "is", "Behind", "Fakespy", "'s", "Smishing", "Campaigns", "?", "Conclusions", "Cybereason", "Mobile", "Detects", "and", "Stops", "FakeSpy", "Indicators", "of", "Compromise", "INTRODUCTION", "For", "the", "past", "several", "weeks", ",", "Cybereason", "has", "been", "investigating", "a", "new", "version", "of", "Android", "malware", "dubbed", "FakeSpy", ",", "which", "was", "first", "identified", "in", "October", "2017", "and", "reported", "again", "in", "October", "2018", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "For", "example", ",", "when", "a", "button", "is", "clicked", ",", "a", "view", "is", "focused", ",", "etc", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Joke/W32.ArchSMS.2449920.C", "Trojan.Zusy.D14269", "Win32.Trojan.WisdomEyes.16070401.9500.9992", "not-a-virus:WebToolbar.Win32.Webatla.b", "Trojan.Win32.ArchSMS.csnmld", "Trojan.SMSSend.4975", "Tool.ArchSMS.Win32.17120", "BehavesLike.Win32.BadFile.vc", "Trojan:Win32/Blinerarch.A", "Trojan/Win32.ArchSMS.C198920", "Hoax.ArchSMS", "Trojan.ArchSMS!HGAxbs185b0", "Hoax.Win32.ArchSMS" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Over", "the", "course", "of", "their", "campaigns,", "we", "analyzed", "their", "modus", "operandi", "and", "dissected", "their", "tools", "of", "the", "trade—and", "uncovered", "common", "denominators", "indicating", "that", "PLEAD,", "Shrouded", "Crossbow,", "and", "Waterbear", "may", "actually", "be", "operated", "by", "the", "same", "group." ]
[ 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 3, 0, 16, 16, 16, 16, 4, 12, 12 ]
[ "Password", "generation", "for", "compressed", "files", "takes", "place", "client-side", "with", "each", "device", "using", "a", "unique", "key", "in", "most", "scenarios", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Hancitor", "is", "one", "of", "the", "better-known", "malware", "downloaders", "due", "to", "its", "numerous", "SPAM", "runs", "and", "evolving", "delivery", "technique." ]
[ 3, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16 ]
[ "A", "few", "days", "back", ",", "we", "wrote", "about", "an", "Android", "Marcher", "trojan", "variant", "posing", "as", "the", "Super", "Mario", "Run", "game", "for", "Android", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 3, 16, 16, 16, 16, 16, 5, 13, 13, 16, 16, 5, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FantibagB.Trojan", "Email-Worm.Win32.Bagle!O", "Win32.Trojan.WisdomEyes.16070401.9500.9958", "Win32/Fantibag.E", "Email-Worm.Win32.Bagle.cv", "Email-Worm.Win32.Bagle", "Worm/Bagle.aac", "TR/Bagle.BR.A.Dll", "I-Worm.Win32.Bagle.FA", "Email-Worm.Win32.Bagle.cv", "Trojan:Win32/Fantibag.B", "Win32/Bagle.BI", "Trojan.Fantibag.A1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "It", "is", "meant", "solely", "to", "empty", "the", "safe", "of", "ATMs.", "We", "detect", "this", "new", "malware", "family", "as", "BKDR_ALICE.A." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 9, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dropper.Refroso.B", "Trojan/W32.Refroso.62976.D", "Trojan.Win32.Refroso!O", "Trojan.Injector.5265", "Trojan.Refroso.Win32.766", "Trojan/Refroso.dzt", "Trojan.Dropper.Refroso.B", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "TROJ_LETHIC.SMA", "Trojan.Win32.Refroso.ayz", "Trojan.Dropper.Refroso.B", "Trojan.Win32.Refroso.bwzzc", "Trojan.Dropper.Refroso.B", "Trojan.Dropper.Refroso.B", "BackDoor.Bifrost.26171", "TROJ_LETHIC.SMA", "BehavesLike.Win32.Downloader.kc", "Backdoor/Poison.bhw", "Worm:Win32/Refroso.A", "Trojan[Downloader]/Win32.Refroso", "Win32.Troj.Refroso.kcloud", "Worm:Win32/Refroso.A", "Backdoor.Win32.Poison.46632", "Trojan.Dropper.Refroso.B", "Trojan/Win32.Refroso.R694", "Trojan.Dropper.Refroso.B", "Trojan.Win32.Buzus.8101325", "Trojan.Refroso", "Trojan.Win32.Buzus", "W32/Injector.IA!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanPSW.LdPinch.cds", "PWS-Lineage.dll", "Trojan.Downloader-35380", "Trojan-GameThief.Win32.OnLineGames.stab", "Trojan.PWS.Wsgame.origin", "PWS:Win32/Kotwir.A.dll", "Trojan-Downloader.Win32.Banload.aqi" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "After", "manual", "launch", ",", "it", "shows", "a", "fake", "welcome", "notification", "to", "the", "user", ":", "Dear", "Customer", ",", "we", "’", "re", "updating", "your", "configuration", "and", "it", "will", "be", "ready", "as", "soon", "as", "possible", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Blocker.194764", "Trojan.Bepush.Win32.889", "Trojan.Strictor.D7317", "TROJ_SPNR.11GF13", "Win32.Trojan.WisdomEyes.16070401.9500.9800", "TROJ_SPNR.11GF13", "Win.Trojan.Truado-1", "Trojan.Win32.Dapato.dcitdy", "Trojan-Downloader:W32/Kilim.T", "Trojan.DownLoader9.41166", "Trojan.JS.FBExt", "W32/Trojan.CAKN-6742", "Trojan/Blocker.eyy", "TR/Dldr.Truado.B.5", "TrojanDownloader:MSIL/Truado.B", "Trojan/Win32.Blocker.R77853", "Hoax.Blocker", "Trj/CI.A", "Trojan.Blocker!Jm7NxUGe2as", "Win32/Trojan.a10" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.PWS.LdPinch.TMK", "Trojan-PWS/W32.LdPinch.557056", "Trojan.PWS.LdPinch.TMK", "Trojan.PWS.LdPinch.TMK", "Win32.Trojan.WisdomEyes.16070401.9500.9998", "Trojan.Win32.Pakes.nkj", "Trojan.PWS.LdPinch.TMK", "Trojan.Win32.Pakes.gkhlc", "Trojan.PWS.LdPinch.TMK", "Trojan.PWS.LdPinch.TMK", "BehavesLike.Win32.VirRansom.hc", "Trojan.PWS.LdPinch.TMK", "Trojan.DR.Jeshex!G2i88bn5YEw", "W32/LdPinch.TNV!tr.pws", "Win32/Trojan.PWS.912" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "January", "23", ",", "2017", "SpyNote", "RAT", "posing", "as", "Netflix", "app", "As", "users", "have", "become", "more", "attached", "to", "their", "mobile", "devices", ",", "they", "want", "everything", "on", "those", "devices", "." ]
[ 16, 16, 16, 16, 3, 11, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "BehavesLike.Win32.BadFile.nm", "TrojanDownloader:Win32/Xuwuq.A" ]
[ 16, 3, 16, 16, 16, 1, 1 ]
[ "This", "strengthens", "our", "suspicion", "that", "this", "malware", "is", "still", "undergoing", "development", "and", "has", "not", "been", "officially", "marketed", "or", "released", "yet", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "addition", "to", "“", "Free", "VPN", "Master", "Android", ",", "”", "we", "’", "ve", "observed", "Red", "Alert", "2.0", "Trojans", "in", "the", "wild", "disguising", "themselves", "using", "names", "like", ":", "Flash", "Player", "or", "Update", "Flash", "Player", "Android", "Update", "or", "Android", "Antivirus", "Chrome", "Update", "or", "Google", "Update", "Update", "Google", "Market", "WhatsApp", "Viber", "OneCoin", "Wallet", "Pornhub", "Tactic", "FlashLight", "or", "PROFlashLight", "Finanzonline", "The", "vast", "majority", "of", "in-the-wild", "Red", "Alert", "2.0", "samples", "falsely", "present", "themselves", "as", "Adobe", "Flash", "player", "for", "Android", ",", "a", "utility", "that", "Adobe", "stopped", "supporting", "years", "ago", "." ]
[ 16, 16, 16, 16, 5, 13, 13, 13, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 5, 13, 13, 5, 13, 16, 5, 13, 5, 13, 16, 5, 13, 5, 13, 13, 5, 5, 5, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 11, 16, 16, 16, 16, 5, 13, 13, 16, 5, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16 ]
[ "It", "is", "the", "first", "plain", "stage", "that", "does", "not", "employ", "a", "VM", "or", "obfuscation", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Facebook", "page", "managed", "by", "the", "C", "&", "C", "domain", "registrant", "uses", "the", "same", "base", "domain", "name", "(", "minigameshouse", ")", "and", "phone", "number", "as", "the", "registered", "malicious", "C", "&", "C", "used", "by", "the", "Ashas", "adware", "Of", "interest", "is", "that", "on", "the", "Minigameshouse", "Facebook", "page", ",", "the", "malicious", "developer", "promotes", "a", "slew", "of", "games", "beyond", "the", "Ashas", "family", "for", "download", "on", "both", "Google", "Play", "and", "the", "App", "Store", "." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 5, 13, 16, 16, 5, 13, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W64.HfsAutoA.4EC7", "Exploit.CVE-2015-1701.A", "Trojan.Win64", "Exploit.CVE-2015-1701.A", "W64/Trojan.CBXE-7834", "Exploit.CVE-2015-1701.A", "Exploit.Win64.CVE-2015-1701.b", "Exploit.CVE-2015-1701.A", "Exploit.CVE-2015-1701.A", "Exploit.CVE2015-1701.1", "BehavesLike.Win64.BadFile.mh", "Virus.Win32.Virut", "Exploit.CVE-2015-1701.e", "Trojan[Exploit]/EXE.CVE-2015-1701", "Exploit.CVE-2015-1701.A", "Exploit.Win64.CVE.tnlV", "Exploit.Win64.CVE-2015-1701.b", "Trojan/Win32.Exploit.R200799", "Exploit.Win64.CVE-2015-1701", "Trj/CI.A", "Win64.Exploit.Cve-2015-1701.Ahyf", "W64/CVE_2015_1701.A!tr", "Win32/Trojan.Exploit.059" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "is", "part", "of", "a", "class", "called", "CaptureService", ",", "which", "already", "existed", "in", "the", "previous", "version", "but", "it", "was", "not", "duly", "implemented", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Cult.fvly", "W32/Cult.B@mm", "W32.HLLW.Cult@mm", "Win32/Cult.E", "Email-Worm.Win32.Cult.b", "Win32.Cult.B@mm", "I-Worm.Cult.B", "Worm.Win32.Cult.B", "Win32.HLLW.SpyBot", "I-Worm/Cult.b", "Worm.Cult.b.kcloud", "Worm:Win32/Cult.D@mm", "I-Worm.Win32.Cult.16418", "Win32/Cult.worm.16418", "Win32.Cult.B@mm", "W32/Cult.B@mm", "Worm.Cult", "Net-Worm.Cult", "Win32/Cult.B", "Worm.Cults.b", "Email-Worm.Win32.Cult", "W32/Cult.B" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Last", "week,", "an", "Endgame", "researcher", "was", "analyzing", "spam", "emails", "for", "indications", "of", "emergent", "malicious", "activity." ]
[ 0, 8, 16, 4, 12, 16, 16, 1, 9, 11, 1, 16, 16, 16, 16 ]
[ "Symantec", "is", "currently", "investigating", "reports", "of", "yet", "another", "new", "attack", "in", "the", "Middle", "East", "involving", "the", "destructive", "disk-wiping", "malware", "used", "by", "the", "Shamoon", "group", "W32.Disttrack,", "W32.Disttrack.B." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 2, 10, 16, 16, 3, 11, 11, 16, 16, 16, 6, 14, 1, 9 ]
[ "A", "backdoor", "also", "known", "as:", "W32.OnlineGamesXTUG.Worm", "Trojan-PSW.Win32.QQShou!O", "Trojan/PSW.QQShou.aqt", "Trojan.Win32.QQShou.evyqv", "TROJ_AGKT.SMUS6", "Trojan.Qqshou-23", "Trojan-PSW.Win32.QQShou.pfp", "Trojan.PWS.QQShou!WQNr+ttAX9g", "Trojan.Win32.PSWQQShou.80480[h]", "Troj.PSW32.W.QQShou.aqt!c", "Trojan.QQShou.Win32.1230", "TROJ_AGKT.SMUS6", "BehavesLike.Win32.Autorun.lc", "Trojan/PSW.QQShou.adz", "W32/VB.NII!tr", "Trojan[PSW]/Win32.QQShou", "Trojan.Graftor.D33E1", "Trojan/Win32.QQShou", "PWS:Win32/QQpass.DW", "Win32/QQPass.NVO", "TrojanPSW.QQShou", "Win32.Trojan-qqpass.Qqrob.Hwwq", "Trojan-PWS.Qqshou", "Trojan.Win32.VB.NII" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Rootkit.9056.H", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Hacktool.Rootkit", "Win32/Rookuz.S", "Trojan.Win32.Hmir.bczend", "Trojan.NtRootKit.13456", "Downloader.Hmir.Win32.3829", "Backdoor.Winnt", "Trojan[Downloader]/Win32.Hmir", "Troj.GameThief.W32.OnLineGames.kZeW", "Backdoor:WinNT/Blazgel.A", "Trojan/Win32.Rootkit.R24603", "TrojanDownloader.Hmir", "Win32/RootKit.Rootkit.03f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.BD3E" ]
[ 16, 3, 16, 16, 16, 1 ]
[ "Symantec", "first", "began", "looking", "into", "this", "threat", "in", "the", "fall", "of", "2013." ]
[ 4, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 0 ]
[ "Once", "this", "malware", "has", "successfully", "installed", ",", "it", "will", "collect", "personal", "data", ",", "passwords", ",", "keystrokes", ",", "banking", "information", ",", "and", "more", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.A.Downloader.39936.EG", "Trojan.DownLoad2.31494", "W32/Trojan.BMBV-5898", "TR/Vodvit.A.10", "Trojan:Win32/Vodvit.A", "Trojan.Graftor.D79FB" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "This", "allows", "it", "to", "silently", "execute", "any", "backdoor", "activity", "without", "the", "user", "knowing", "that", "the", "device", "is", "in", "an", "active", "state", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.71D4", "Win32.Trojan.Kryptik.hj", "W32/Trojan.YMZM-8551", "Trojan.Win32.SpyEyes.cxesvi", "Trojan.PWS.Papras.244", "BehavesLike.Win32.DocumentCrypt.dc", "Trojan[Spy]/Win32.SpyEyes", "Trojan.Kazy.D5A6E2", "TrojanDropper:Win32/Vawtrak.A", "Trojan/Win32.Reveton.R107579", "TrojanPSW.Tepfer", "Backdoor.Andromeda", "Win32.Trojan.Atraps.Pbfq", "TrojanSpy.SpyEyes!jq5iqgzT3B4", "Trojan-Spy.Zbot", "W32/Kryptik.EWVT!tr", "Win32/Trojan.73f" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.BackdoorWabot.Trojan", "Backdoor.Win32.Wabot!O", "Trojan.Wabot.A8", "Trojan/Delf.nrf", "Win32.Backdoor.Wabot.a", "W32.Wabot", "Win32/DCMgreen.A", "BKDR_WABOT.SMIA", "Win.Trojan.Wabot-6113548-0", "Backdoor.Win32.Wabot.a", "Trojan.Win32.Wabot.dmukv", "Backdoor.Win32.Wabot.157619", "Backdoor.W32.Wabot.tn6b", "Trojan.Win32.Wabot.a", "Backdoor.Win32.Wabot.A", "Trojan.MulDrop6.64369", "Backdoor.Wabot.Win32.1", "BKDR_WABOT.SMIA", "BehavesLike.Win32.Wabot.wc", "P2P-Worm.Win32.Delf", "Backdoor/Wabot.z", "Trojan[Backdoor]/Win32.Wabot.a", "TrojanSpy:MSIL/Omaneat.B", "Trojan.ShellIni.E7E294", "Backdoor.Win32.Wabot.a", "Worm/Win32.IRCBot.R3689", "Backdoor.Wabot", "Backdoor.Wabot", "I-Worm.Delf.NRF", "Win32/Delf.NRF", "Backdoor.Wabot!jai+hnpgbwI", "W32/Luiha.M!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "com", "hxxp", ":", "//www", "[", "." ]
[ 9, 9, 1, 9, 9, 9, 9 ]
[ "Starting", "on", "May", "11,", "2017,", "Flashpoint", "analysts", "observed", "several", "large", "spam", "campaigns", "originating", "from", "the", "Necurs", "botnet", "that", "aim", "to", "dupe", "recipients", "into", "opening", "malicious", "attachments", "that", "infect", "their", "computers", "with", "Jaff", "ransomware." ]
[ 16, 16, 0, 8, 8, 4, 16, 16, 16, 16, 6, 14, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 1, 9, 9, 15, 16, 16, 5, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Celofot.D", "Trojan/W32.Sasfis.93184.B", "Trojan.Win32.Sasfis!O", "Trojan.Sasfis", "TROJ_DELF.SMH", "Win32.Trojan.WisdomEyes.16070401.9500.9986", "W32/Risk.WXEM-5531", "Backdoor.Bifrose", "Trojan.Sasfis", "Win32/Sasfis.NUH", "Win.Trojan.Sasfis-42", "Backdoor.Celofot.D", "Trojan.Win32.Sasfis.aobz", "Backdoor.Celofot.D", "Trojan.Win32.Sasfis.ikchn", "Trojan.Win32.A.Sasfis.93696.C", "Troj.W32.Smardf.lrGo", "Backdoor.Celofot.D", "Trojan.DownLoader4.42747", "BehavesLike.Win32.SpywareLyndra.nc", "Trojan-Dropper.Delf", "W32/MalwareS.BHQS", "Trojan/Sasfis.koz", "Trojan/Win32.Sasfis.aobz", "Backdoor:Win32/Nitvea.A", "Backdoor.Celofot.D", "Trojan.Win32.Sasfis.aobz", "Trojan/Win32.Sasfis.R20535", "Backdoor.Celofot.D", "Backdoor.Celofot.D", "Win32.Trojan.Sasfis.Pijo", "Trojan.Sasfis!nQm4iaN0os8", "W32/Sasfis.LB!tr", "Win32/Trojan.6e1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.ExpiroPC.PE", "Win32.Backdoor.Prorat.e", "W32/Prorat.BNXP-3134", "Backdoor.Prorat", "Win32/Prorat.19.P", "Win.Trojan.Delf-1540", "Trojan.Win32.Tiny.baadu", "Backdoor.W32.Prorat!c", "BackDoor.ProRat.19", "BehavesLike.Win32.Adware.tc", "Backdoor.Win32.Prorat", "W32/ProratX.ANJ", "BDS/Lurpen.rts", "W32/BDoor.AVW!dam", "Backdoor/Win32.Prorat.R111443", "Backdoor.Prorat", "Bck/Prorat.HT", "Backdoor.Prorat!o+pRlXhwebo" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.OnlinegameJTPX.Trojan", "Virus.Win32.Sality!O", "Troj.GameThief.W32.WOW.hre!c", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "Infostealer.Gampass", "Win32/Wowpa.HS", "TROJ_FAM_0001989.TOMA", "Win.Trojan.Delf-1669", "Trojan.Win32.PSWWow.22440.B", "TrojWare.Win32.Trojan.Banker.~d08", "Trojan.PWS.Wow.1283", "Trojan.WOW.Win32.2972", "TROJ_FAM_0001989.TOMA", "BehavesLike.Win32.Sality.lc", "W32/Trojan.EOQM-5227", "Trojan/PSW.Moshou.ars", "Trojan[GameThief]/Win32.WOW", "Win32.Troj.PswWowT.lk.kcloud", "TrojanDropper:Win32/Dozmot.B", "Trojan/Win32.OnlineGameHack.C54025", "BScope.Trojan.OnlineGames.0825", "Win32/PSW.WOW.DZI", "Win32.Trojan.Heurinject.Lnxt" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Joke.Movingmouse", "Joke/W32.BadJoke.21504", "Joke.Movingmouse", "Joke.MoveMouse", "Win.Joke.MovingMouse-1", "Hoax.Win32.BadJoke.MovingMouse.a", "Joke.Movingmouse", "Riskware.Win32.MovingMouse.hrfx", "Hoax.BadJoke.21504.A", "Win32.Trojan-psw.Badjoke.Suno", "Joke.Win32.BadJoke.MovingMouse.~FCD", "Joke.Movingmouse", "Trojan.MulDrop.28720", "Aplicacion/MovingMouse.a", "not-a-virus:BadJoke.Win32.MovingMouse.a", "W32/Joke.RZZA-1623", "not-virus:Joke.Win32.MovingMouse", "HackTool[Hoax]/Win32.MovingMouse", "Joke.Movingmouse", "Hoax.W32.BadJoke.MovingMouse.a!c", "Hoax.Win32.BadJoke.MovingMouse.a", "Joke.Movingmouse", "Unwanted/Win32.Movingmouse.R123022", "Joke.Movingmouse", "Win32/Hoax.MovingMouse.B", "Win32/Trojan.2ff" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W64/Application.KFTW-0763", "Trojan.Win64.AdAnti.exbcmq", "ADWARE/AdAnti.nqwib", "Adware.ChinAd", "Trj/CI.A", "Win32/Trojan.7be" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "Figure", "25", ":", "infected", "Android", "version", "distribution", "To", "further", "analyze", "“", "Agent", "Smith", "”", "’", "s", "infection", "landscape", ",", "we", "dived", "into", "the", "top", "10", "infected", "countries", ":", "Country", "Total", "Devices", "Total", "Infection", "Event", "Count", "Avg", "." ]
[ 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "FrozenCell", ":", "Multi-Platform", "Surveillance", "Campaign", "Against", "Palestinians", "October", "5", ",", "2017", "FrozenCell", "has", "been", "seen", "masquerading", "as", "various", "well", "known", "social", "media", "and", "chat", "applications", "as", "well", "as", "an", "app", "likely", "only", "used", "by", "Palestinian", "or", "Jordanian", "students", "sitting", "their", "2016", "general", "exams", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "WAKE_LOCK", "-", "Allows", "the", "application", "to", "use", "PowerManager", "WakeLocks", "to", "keep", "the", "processor", "from", "sleeping", "or", "the", "screen", "from", "dimming", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "DAN", "GOODIN", "-", "1/23/2017", ",", "4:39", "PM", "A", "virulent", "family", "of", "malware", "that", "infected", "more", "than", "10", "million", "Android", "devices", "last", "year", "has", "made", "a", "comeback", ",", "this", "time", "hiding", "inside", "Google", "Play", "apps", "that", "have", "been", "downloaded", "by", "as", "many", "as", "12", "million", "unsuspecting", "users", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.MSIL", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Backdoor.MSIL.SpyGate.wsr", "Trojan.Win32.Disfa.dqmqly", "BehavesLike.Win32.Trojan.cc", "GrayWare/MSIL.Injector.AWA", "Trojan.Zusy.D28231", "Trj/CI.A", "Trojan.Win32.Fsysna", "Win32/Trojan.7c5" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "tcpdo", "[", "." ]
[ 9, 9, 9 ]
[ "Consumers", "in", "English-speaking", "countries,", "in", "particular", "the", "US", "and", "UK,", "are", "most", "at", "risk,", "since", "this", "is", "where", "the", "largest", "numbers", "of", "targeted", "banks", "are", "located." ]
[ 4, 16, 16, 2, 16, 16, 16, 2, 16, 2, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16 ]
[ "Earlier", "this", "month,", "we", "spotted", "a", "phishing", "campaign", "that", "led", "victims", "to", "unknowingly", "download", "the", "Banker", "malware." ]
[ 16, 0, 8, 16, 16, 16, 6, 14, 15, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Skeeyah.S5", "Downloader.Chindo.Win32.162", "Trojan.Adware.Graftor.D374DC", "not-a-virus:Downloader.Win32.Chindo.ap", "Trojan.Win32.Chindo.dumnyn", "Variant.Mikey.mvHB", "Adware.Chindo.12", "PUA.RiskWare.Chindo", "RiskWare[Downloader]/Win32.Chindo.ap", "TrojanDownloader:Win32/Codumwis.B", "not-a-virus:Downloader.Win32.Chindo.ap", "BScope.Malware-Cryptor.Ngrbot", "Win32/RiskWare.Chindo.L" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Odatv", "is", "a", "secular", "news", "organization", "founded", "in", "2007", "with", "a", "reputation", "for", "being", "critical", "of", "Turkey's", "government", "and", "the", "Gülen", "Movement." ]
[ 4, 16, 16, 4, 12, 12, 16, 16, 0, 16, 16, 16, 11, 16, 16, 16, 4, 12, 16, 4, 12, 12 ]
[ "params", ":", "This", "command", "allows", "the", "malicious", "operator", "to", "change", "configuration", "parameters", "in", "the", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "threat", "can", "download", "other", "malware", "and", "unwanted", "software", "onto", "your", "PC." ]
[ 16, 3, 16, 16, 16, 3, 16, 16, 5, 16, 16, 5 ]
[ "This", "malware", "appears", "to", "be", "newly", "developed", "with", "code", "that", "differs", "significantly", "from", "previously", "known", "Android", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16 ]
[ "These", "URLs", "are", "all", "in", "the", "form", "of", "“", "http", ":", "//", "$", "C2.", "$", "SERVER.", "$", "IP/api/", "?", "id=", "$", "NUM", "”", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 9, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Bladabindi.FC.3722", "Trojan.Zusy.D3D182", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "BehavesLike.Win32.Trojan.lt", "MSIL/Small.CM!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Yakes.8842", "Trojan/CsNowDown.c", "Win32.Trojan.WisdomEyes.16070401.9500.9736", "Downloader.Darkmegi", "Win.Trojan.Darkcpn-1", "Trojan.Win32.Yakes.ktpl", "Trojan.Win32.Gamania.dridjs", "Trojan.PWS.Gamania.34539", "BehavesLike.Win32.Backdoor.ct", "Trojan.Graftor.DCAF7", "Trojan.Win32.Yakes.ktpl", "Trojan:WinNT/Waltrodock.A", "Downloader/Win32.Darkmegi.C1839200", "Trj/CI.A", "W32/CsNowDown.C" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Command", "and", "Control", "T1437", "Standard", "Application", "Layer", "Protocol", "Uses", "Firebase", "Cloud", "Messaging", "for", "C", "&", "C", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Decrypted", "EventBot", "configuration", "Decrypted", "EventBot", "configuration", "returned", "from", "the", "C2", "." ]
[ 16, 3, 16, 16, 3, 16, 16, 16, 16, 16, 16 ]
[ "Upon", "investigation", "we", "have", "determined", "the", "malware", "payload", "to", "be", "DELoader,", "which", "downloads", "a", "Zeus", "variant", "banking", "trojan", "upon", "execution." ]
[ 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 3, 16, 16, 16, 3, 11, 11, 11, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Lexfir.A", "TrojanAPT.Lexfir.A6", "Trojan.Lexfir.A", "TSPY_DERUSBI.SMJ1", "Win32.Trojan.WisdomEyes.16070401.9500.9979", "Infostealer.Derusbi", "TSPY_DERUSBI.SMJ1", "Win.Trojan.Derusbi-42", "Trojan.Lexfir.A", "Backdoor.Win32.Winnti.jr", "Trojan.Lexfir.A", "Trojan.Lexfir.A", "Trojan.Lexfir.A", "DLOADER.PWS.Trojan", "W32/Trojan.ZNCA-7493", "TR/PSW.Lexfir.A.3", "Trojan.Lexfir.A", "Backdoor.Win32.Winnti.jr", "PWS:Win32/Lexfir.A", "Backdoor/Win32.Etso.R30303", "Win32.Backdoor.Winnti.Lfzs", "Trojan.Derusbi!jrrDP0rufRk", "Trojan-Spy.Win32.Derusbi", "W32/DERUSBI.C!tr", "Win32/Trojan.PSW.186" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "unidentified", "financial", "group", "targeted", "regional", "and", "global", "banks", "with", "offices", "in", "the", "Middle", "East." ]
[ 6, 14, 14, 14, 16, 4, 16, 4, 12, 16, 4, 16, 2, 10, 10 ]
[ "Security", "Service", "of", "Ukraine", "SBU", "indicated", "that", "Russian", "spies", "had", "implanted", "malicious", "softwares", "in", "the", "State", "Grid", "which", "caused", "power", "plants", "shut", "down", "unexpectedly." ]
[ 4, 12, 12, 12, 12, 16, 16, 6, 14, 16, 16, 3, 11, 16, 4, 12, 12, 16, 16, 4, 12, 16, 16, 16 ]
[ "Other", "versions", "included", "all", "the", "pieces", "needed", "for", "a", "valid", "disclosure", "message", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "However", ",", "it", "’", "s", "possible", "the", "set", "of", "commands", "may", "change", "in", "future", "versions", "of", "the", "Trojan", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.LarmogasD.Trojan", "Dropped:Backdoor.Hupigon.211672", "W32.Jadtre.B4", "Trojan.Black.Win32.3180", "Trojan/Dropper.Delf.dlv", "Dropped:Backdoor.Hupigon.211672", "W32/Risk.UMVG-4201", "TROJ_JADTRE.SMM", "Win.Spyware.66802-2", "TScope.Malware-Cryptor.SB", "W32.Parite.lf96", "TrojWare.Win32.PSW.OnLineGames.~LLD", "Trojan.PWS.Legmir.3153", "BehavesLike.Win32.Gate.nh", "W32/Dropper.ANYI", "Trojan/KillAV.bbj", "TR/Drop.Delfdru.O", "Win32.PSWTroj.OnLineGames.kcloud", "Backdoor.Hupigon.D33AD8", "Dropped:Backdoor.Hupigon.211672", "Dropper/Win32.Microjoin.R1379", "Dropped:Backdoor.Hupigon.211672", "Dropped:Backdoor.Hupigon.211672", "Trj/CI.A", "Trojan.DR.Delfdru!ayAD7it/9FQ", "Win32/Trojan.Dropper.cad" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "APT19", "used", "three", "different", "techniques", "to", "attempt", "to", "compromise", "targets." ]
[ 6, 16, 16, 16, 16, 16, 16, 16, 16, 4 ]
[ "A", "backdoor", "also", "known", "as:", "AIT:Trojan.Autoit.CAQ", "AIT:Trojan.Autoit.CAQ", "Win32.Trojan.WisdomEyes.16070401.9500.9949", "AIT:Trojan.Autoit.CAQ", "Trojan-Banker.Win32.AutoIt.zl", "AIT:Trojan.Autoit.CAQ", "Trojan.DownLoader23.53524", "Trojan/Banker.AutoIt.bu", "TrojanSpy:Win32/Aneatop.A", "Trojan-Banker.Win32.AutoIt.zl", "Win32.Trojan-banker.Autoit.Suny", "Win32/Trojan.5f1" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Finally", ",", "the", "malware", "spawns", "a", "thread", "that", "has", "the", "goal", "to", "load", ",", "remap", ",", "and", "relocate", "the", "stage", "5", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.WscmgrA.Trojan", "Trojan-PSW.Win32.Delf!O", "Trojan/PSW.Delf.abx", "Win32.Trojan.WisdomEyes.16070401.9500.9700", "W32/Autorun.MSPP-2235", "W32.SillyFDC", "Win32/Retecha.A", "WORM_DELF.NAN", "Win.Trojan.Delf-3449", "Trojan-PSW.Win32.Delf.abx", "Trojan.Win32.Delf.brmlqc", "Trojan.Win32.Autorun.382020", "Win32.Trojan-qqpass.Qqrob.Sxyo", "Trojan.PWS.Sadas", "Trojan.Delf.Win32.3468", "WORM_DELF.NAN", "W32/Autorun.O", "Trojan/PSW.GamePass.yqg", "TR/PSW.Delf.abx.3", "Worm:Win32/Hamtacker.A", "Trojan-PSW.Win32.Delf.abx", "Worm/Win32.AutoRun.R76556", "Worm.Brontok", "Trojan.Delf.ABX", "Win32/PSW.Delf.ABX", "Hacktool.Dialuppass.A", "not-a-virus:PSWTool.Win32.Dialupass.an", "W32/Autorun.PG.worm", "Win32/Trojan.PSW.8bb" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "And", "this", "just", "means", "attackers", "will", "continue", "to", "be", "successful", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Their", "findings", "showed", "that", "Wolf", "is", "headquartered", "in", "Germany", "with", "offices", "in", "Cyprus", ",", "Bulgaria", ",", "Romania", ",", "India", "and", "(", "possibly", ")", "the", "U.S", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "following", "scenario", "may", "play", "out", ":", "according", "to", "the", "templates", "for", "processing", "incoming", "SMSs", ",", "Rotexy", "intercepts", "a", "message", "from", "the", "bank", "that", "contains", "the", "last", "four", "digits", "of", "the", "bank", "card", "connected", "to", "the", "phone", "number", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "is", "a", "custom", "obfuscation", "partly", "based", "on", "base85", "encoding", ",", "which", "is", "in", "itself", "unusual", ",", "in", "malware", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Yet", "perhaps", "most", "notably,", "BianLian", "has", "shifted", "the", "main", "focus", "of", "their", "attacks", "away", "from", "ransoming", "encrypted", "files", "to", "focus", "more", "on", "data-leak", "extortion", "as", "a", "means", "to", "extract", "payments", "from", "victims." ]
[ 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 1, 9, 9, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Visa", "also", "published", "a", "list", "of", "Internet", "addresses", "that", "may", "have", "been", "involved", "in", "the", "Oracle", "breach", "and", "are", "thought", "to", "be", "closely", "tied", "to", "an", "Eastern", "European", "organized", "cybercrime", "gang." ]
[ 4, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 14, 14 ]
[ "“", "Agent", "Smith", "”", "repacks", "its", "prey", "apps", "at", "smali/baksmali", "code", "level", "." ]
[ 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Destructive", "malware", "used", "by", "unknown", "computer", "network", "exploitation", "CNE", "operators", "has", "been", "identified." ]
[ 3, 11, 16, 16, 16, 7, 15, 15, 15, 16, 16, 16, 16 ]
[ "The", "earliest", "instance", "where", "a", "cyber", "attack", "was", "attributed", "to", "the", "OilRig", "campaign", "was", "in", "late", "2015." ]
[ 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 6, 14, 14, 16, 16, 0, 8 ]
[ "This", "screen", "persists", "on", "the", "screen", "and", "prevents", "the", "user", "from", "using", "the", "navigation", "buttons", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "INDICATORS", "OF", "COMPROMISE", "(", "IOCS", ")", "Domains", "Facebook-photos-au.su", "Homevideo2-12l.ml", "videohosting1-5j.gq", "URLs", "hxxp", ":", "//88.99.227", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 1, 1, 16, 1, 9, 9, 9, 9 ]
[ "android.intent.action.SIM_STATE_CHANGED", "System", "notification", "that", "the", "SIM", "card", "has", "changed", "or", "been", "removed", "." ]
[ 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "com/gate_cb8a5aea1ab302f0_c", "online", "185.158.249", "[", "." ]
[ 9, 9, 16, 1, 9, 9 ]
[ "If", "the", "geolocation", "points", "to", "Brazil,", "then", "another", "malicious", "file", "is", "downloaded." ]
[ 16, 16, 2, 16, 16, 2, 16, 1, 9, 9, 9, 9 ]
[ "Command", "Description", "push", "Shows", "a", "push", "notification", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Furthermore", ",", "we", "found", "that", "in", "just", "the", "first", "two", "weeks", "of", "2017", ",", "there", "have", "been", "more", "than", "120", "such", "spyware", "variants", "already", "built", "using", "the", "same", "SpyNote", "Trojan", "builder", "as", "SpyNote", "RAT", "and", "roaming", "in", "the", "wild", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16 ]
[ "This", "is", "a", "local", "root", "exploit", "pack", ",", "and", "the", "Trojan", "uses", "4", "different", "exploit", "pack", "files", ",", "3", "for", "32-bit", "systems", "and", "1", "for", "64-bit-systems", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.BitcoinMiner", "Win32.Trojan.WisdomEyes.16070401.9500.9983", "Downloader.MisleadApp", "not-a-virus:RiskTool.Win32.BitCoinMiner.iqlc", "Trojan.Win32.Z.Svcminer.27648", "RiskTool.BitCoinMiner.gvg", "TR/Downloader.knzhj", "RiskWare[RiskTool]/Win32.BitCoinMiner", "TrojanDownloader:Win32/SvcMiner.A!bit", "not-a-virus:RiskTool.Win32.BitCoinMiner.iqlc", "Trojan/Win32.Mepaow.C87266", "Trj/GdSda.A", "Trojan.CoinMiner" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "February", ",", "we", "recorded", "767", "infections", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "net", "page", "for", "DroidVPN", "remained", "identical", "when", "serving", "either", "HenBox", "or", "DroidVPN", "apps", ",", "just", "that", "the", "legitimate", "APK", "file", "had", "been", "replaced", "with", "HenBox", "for", "an", "unknown", "period", "of", "time", "." ]
[ 9, 9, 16, 16, 1, 16, 16, 16, 16, 16, 3, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.RadmasAM.Trojan", "Worm/W32.Updater.65536.B", "Virus.Win32.Sality!O", "Win32.Worm.Pepex.b", "W32.Virut.CF", "Win32/Tnega.AQRF", "WORM_DIPASIK.SM", "Win.Worm.Updater-4", "Email-Worm.Win32.Updater.n", "Hoax.W32.ArchSMS.m5oU", "Win32.HLLM.Updater.5", "WORM_DIPASIK.SM", "Email-Worm.Win32.Atak", "Worm/Updater.e", "Worm[Email]/Win32.Updater", "Worm:Win32/Networm.A", "Email-Worm.Win32.Updater.n", "Trojan/Win32.Kykymber.R128813", "Worm.Updater", "Win32/Pepex.I", "Trojan.Win32.Snake.a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]