tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "Playing", "further", "off", "the", "suggested", "GAS", "Tecnologia", "link", ",", "the", "app", "promises", "better", "security", "for", "its", "users", "." ]
[ 16, 16, 16, 16, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "zqo-japan", "[", "." ]
[ 9, 9, 9, 9 ]
[ "Several", "days", "ago,", "researchers", "at", "FireEye", "attributed", "a", "recent", "phishing", "campaign", "to", "FIN7,", "a", "campaign", "in", "which", "cybercriminals", "delivered", "malicious", "Microsoft", "Office", "documents", "to", "users,", "deploying", "both", "Cobalt", "Strike", "and", "a", "VBS-based", "backdoor", "on", "infected", "workstations." ]
[ 16, 16, 16, 4, 16, 4, 16, 16, 16, 6, 14, 16, 6, 16, 6, 16, 16, 6, 16, 3, 11, 11, 11, 16, 16, 16, 16, 3, 11, 16, 16, 3, 11, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9974", "Trojan.Win32.ArchSMS.cwxrht", "Hoax.MSIL.gn", "Trojan:MSIL/Blinerarch.AU", "Trj/CI.A", "Msil.Risk.Hoax.Wure", "Trojan.ArchSMS!IMpJTYjIG18", "Hoax.MSIL", "Win32/Trojan.Dropper.411" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Systex.A", "Trojan.Inject1.7920", "Win32.Troj.Undef.kcloud", "VirTool:Win32/Obfuscator.XZ", "Rootkit.Xytets", "HeurEngine.Vmpbad", "Trojan.Spy.Texy!4898", "Trojan.Win32.Spy", "Trj/Thed.W" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Subsequently", ",", "the", "malware", "will", "change", "the", "screen", "off", "time-out", "to", "10", "minutes", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Graftor.D255EA", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Backdoor.Trojan", "BackDoor.Miniduke.3", "BehavesLike.Win32.RansomWannaCry.tz", "Trojan.Win32.Bayrob", "TR/Crypt.ZPACK.88814", "Trojan[Backdoor]/Win32.CosmicDuke", "Win32.Hack.CosmicDuke.h.kcloud", "Trojan:Win32/Bandiu.A", "Backdoor.CosmicDuke", "Backdoor.CosmicDuke!", "W32/CosmicDuke.F!tr.bdr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Virus.Pesin.Win32.2", "Trojan.Heur.E41DEE", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "Win32/Pesin.C", "Virus.Win32.HLLW.Delf.b", "Virus.Win32.HLLW.gjjl", "Trojan.PWS.Mob", "Trojan/HLLP.s", "W32/Banker.TOA!tr", "Worm:Win32/Pesin.C", "Virus.Win32.HLLW.Delf.b", "Trojan.Worm.Delf" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.35FE", "WORM_METSYS.SMI", "W32/Trojan.ZLO", "Win32/ProRat.AL", "WORM_METSYS.SMI", "Trojan.Ratibe", "W32/Trojan.JJUN-8278", "Trojan:Win32/Metsys.A", "HEUR/Fakon.mwf", "W32/MediaTest.A.worm" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.RansomGimemoE.Trojan", "Trojan-Ransom.Win32.Gimemo!O", "Trojan.Dofoil.A", "Trojan.Gimemo.Win32.2687", "Trojan/Injector.sxm", "Win32.Trojan.Injector.ec", "W32.Pilleuz", "Win32/Loktrom.FR", "TROJ_RANSOM.SM3", "Win.Trojan.Injector-603", "Trojan-Ransom.Win32.Gimemo.vhu", "Trojan.Win32.Gimemo.tfgni", "Trojan.Win32.A.Gimemo.83968", "Trojan.Packed.22718", "TROJ_RANSOM.SM3", "BehavesLike.Win32.ZBot.dc", "Trojan/Gimemo.cmk", "Trojan[Ransom]/Win32.Gimemo", "Ransom:Win32/Loktrom.A", "Trojan.Zusy.D2A53", "Win.Adware.Websearch.moge", "Trojan-Ransom.Win32.Gimemo.vhu", "Trojan/Win32.Injector.R30428", "BScope.Trojan-Injector.2151", "Trojan.Injector!ZShGusAMkc8", "Trojan-Ransom.Win32.Gimemo", "W32/Zbot.YW!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Employ", "stronger", "credentials", ",", "for", "instance", ",", "to", "make", "them", "less", "susceptible", "to", "unauthorized", "access", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "the", "past", "two", "years,", "two", "campaigns", "of", "Sakula", "activity", "stand", "out", "as", "being", "particularly", "significant", "–", "the", "French", "Aerospace", "Campaign", "and", "the", "Ironman", "Campaign." ]
[ 16, 16, 0, 8, 8, 6, 14, 14, 3, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 16, 4, 12, 12 ]
[ "After", "the", "files", "are", "encrypted", "filenames", "are", "appended", "with", ".rokku" ]
[ 16, 16, 16, 16, 1, 9, 16, 16, 16, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.VB", "Trojan.Midie.DA596", "Win32.Trojan.VB.gx", "W32/Trojan.ZVBM-4484", "Win32/FakeRecycled.A", "WORM_VB.SMF", "Win.Trojan.VB-684", "Trojan.Win32.VB.aqt", "Trojan.DownLoad3.64248", "WORM_VB.SMF", "BehavesLike.Win32.Dropper.wc", "Trojan.Atros6", "W32/Trojan.XUP", "Trojan.Qhost.pw", "TR/VB.AQT", "Trojan/Win32.VB", "Worm:Win32/Fakerecy.A", "Trojan.Win32.VB.aqt", "Trojan/Win32.Tiggre.R216587", "SScope.Trojan.VBRA.7311", "Trj/CI.A", "Worm.Autorun.DU" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "As", "a", "part", "of", "this", "campaign,", "we", "also", "observed", "attacks", "on", "Russian-speaking", "financial", "analysts", "working", "at", "global", "financial", "firms", "and", "covering", "telecom", "corporations", "in", "Russia,", "likely", "a", "result", "of", "collateral", "damage", "caused", "by", "the", "attackers", "targeting", "tactics." ]
[ 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 4, 12, 12, 16, 16, 4, 12, 12, 16, 16, 4, 12, 16, 2, 16, 16, 16, 16, 16, 16, 16, 16, 16, 6, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Jorik.IRCbot!O", "Trojan.Jorik", "Trojan.Jorik.Win32.190644", "Troj.W32.Jorik.Ircbot!c", "Trojan/IRCBot.nhr", "Win32.Trojan.WisdomEyes.16070401.9500.9992", "W32.IRCBot", "Trojan.Win32.Jorik.IRCbot.wja", "Trojan.Win32.Jorik.dgdeqb", "BackDoor.IRC.Sdbot.17833", "BehavesLike.Win32.Trojan.nh", "Trojan.Win32.Jorik", "Trojan/Jorik.gmen", "Trojan/Win32.IRCbot", "Trojan.Win32.Jorik.IRCbot.wja", "Trojan:Win32/Squida.A", "Worm/Win32.IRCBot.R123038", "Trojan.IRCbot", "Win32.Trojan.Jorik.Ahef", "Win32/Trojan.053" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Keylogging", ":", "record", "input", "events", "by", "hooking", "IPCThreadState", ":", ":Transact", "from", "/system/lib/libbinder.so", ",", "and", "intercepting", "android", ":", ":parcel", "with", "the", "interface", "com.android.internal.view.IInputContext", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 1, 9, 9, 16, 16, 16, 1, 16 ]
[ "The", "newest", "variant,", "TeslaCrypt", "2.0,", "uses", "the", "same", "encryption", "algorithm;", "however,", "the", "keys", "and", "other", "configuration", "data", "are", "stored", "in", "the", "Windows", "Registry", "instead", "of", "a", "file", "on", "the", "local", "disk", "as", "in", "previous", "versions." ]
[ 16, 16, 16, 3, 11, 16, 16, 1, 9, 9, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "During", "our", "investigation,", "we", "were", "able", "to", "discover", "a", "number", "of", "domains", "all", "part", "of", "the", "same", "infrastructure", "with", "custom", "skimmers", "for", "several", "Magento", "stores." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 5, 13, 16, 16, 3, 11, 16, 4, 12 ]
[ "Mobile", "ViceLeaker", "The", "following", "table", "shows", "meta", "information", "on", "the", "observed", "samples", ",", "including", "compiler", "timestamps", ":", "MD5", "Package", "Compiler", "C2", "51df2597faa3fce38a4c5ae024f97b1c", "com.xapps.SexGameForAdults", "dexlib", "2.x", "188.165.28", "[", "." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 1, 16, 16, 1, 9, 9 ]
[ "The", "Trojan", "may", "ask", "the", "user", "to", "pay", "a", "ransom", "in", "order", "to", "have", "their", "files", "decrypted." ]
[ 16, 3, 0, 16, 16, 4, 16, 1, 16, 1, 16, 16, 16, 16, 16, 1, 9 ]
[ "While", "SeaDuke", "is", "a", "single", "-", "albeit", "cross-platform", "-", "trojan,", "CloudDuke", "appears", "to", "be", "an", "entire", "toolset", "of", "malware", "components,", "or", "solutions", "as", "the", "Duke", "group", "apparently", "calls", "them." ]
[ 16, 3, 16, 16, 16, 16, 16, 16, 16, 11, 11, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 4, 12, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Strictor.D1A6AB", "BehavesLike.Win32.DlHelper.tc", "Trojan:Win32/Merca.A", "Trj/GdSda.A", "Trojan-Spy.Banker", "W32/Delf.OKU!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1 ]
[ "According", "to", "several", "timestamps", ",", "this", "payload", "is", "used", "by", "implant", "versions", "created", "since", "2016", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAuto.5860", "Backdoor.Lesbot.152", "Backdoor.Lesbot.152.n2", "Trojan.Win32.Lesbot.djep", "Win32/Lesbot.B", "WORM_NETSPREE.A", "Backdoor.Win32.Lesbot.152", "Backdoor.Lesbot.152", "Backdoor.Leeter.B", "Worm.Win32.Netspree", "Worm.Win32.Netspree.A", "Backdoor.Lesbot.152", "Win32.IRC.Bot.based", "WORM_NETSPREE.A", "Backdoor/Lesbot.152", "Bck/Lesbot.152", "Win32.Hack.Lesbot.kcloud", "Backdoor.Lesbot.152", "W32/Risk.OZRI-5730", "Win32/Netspree.worm.48448", "Win32/Netspree.A", "Backdoor.Lesbot.152.a", "Backdoor.Win32.Lesbot.152", "W32/Lesbot.152!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Spy/W32.AutoHK.877056", "TrojanSpy.AutoHK", "W32/Trojan.FIJU-8952", "Trojan-Spy.Win32.AutoHK.b", "Trojan.Win32.Z.Autohk.877056.A", "Win32.Trojan-spy.Autohk.Anzi", "TrojWare.Win32.Hadoc.AS", "BehavesLike.Win32.Dropper.ch", "PUA.EnigmaProtector", "TrojanSpy.AutoHK.a", "Trojan:Win32/Haudicx.A!bit", "Troj.Spy.W32!c", "Trojan-Spy.Win32.AutoHK.b", "Trojan/Win32.Asprox.R130565", "TrojanSpy.AutoHK", "Win32/Spy.AHK.E" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Cantone.Trojan", "Win32.Worm.TTE", "Worm.Win32.Zombaque!O", "Worm.Ppzombie.A3", "Worm.Zombaque.Win32.16", "Win32.Worm.TTE", "WORM_BIZOME.SMF", "W32/Risk.KAIL-2278", "W32.Spybot.Worm", "Win32/Zombaque.B", "WORM_BIZOME.SMF", "Win.Worm.Bizome-4", "Worm.Zombaque", "Worm.Win32.Zombaque.h", "Trojan.Win32.Zombaque.igegn", "Trojan.Win32.P2P-Icmp.437760", "Win32.HLLW.RAhack.2", "BehavesLike.Win32.Downloader.gc", "Worm.Win32.Zombaque", "W32/Zombaque.A", "Worm/Zombaque.k", "Win32.Virut.cr.61440", "Worm:Win32/Ppzombie.A", "Win32.Worm.TTE", "Worm.Win32.Zombaque.h", "Worm/Win32.Zombaque.R15854", "Win32.Worm.TTE", "Win32.Worm.TTE", "Win32/Zombaque.B", "Virus.Win32.Virut.ue", "Worm.Zombaque!1mLwNArV7Hg" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "class", "β€œ", "org.starsizew.Tb", "”", "also", "has", "a", "self-monitoring", "mechanism", "to", "restart", "itself", "when", "its", "own", "onDestroy", "API", "is", "triggered", "." ]
[ 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "first", "in-the-wild", "UEFI", "bootkit", "bypassing", "UEFI", "Secure", "Boot", "on", "fully", "updated", "UEFI", "systems", "is", "now", "a", "reality." ]
[ 16, 16, 16, 3, 11, 7, 5, 13, 13, 16, 16, 16, 5, 13, 16, 16, 16, 16 ]
[ "In", "2018", ",", "the", "most", "actively", "distributed", "versions", "were", "5.0.0", "and", "5.0.3", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Ceeinject.6879", "PWS-Spyeye.cr", "Trojan/PornoAsset.avl", "TROJ_KRYPTO.SMOZ", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win32/Ransom.AQY", "TROJ_KRYPTO.SMOZ", "Win.Trojan.Ransom-1156", "Trojan.Win32.A.PornoAsset.43521", "Trojan.Winlock.3300", "PWS-Spyeye.cr", "Trojan/PornoAsset.nh", "TR/Winlock.CR", "Trojan[Backdoor]/Win32.Buterat", "Trojan.Barys.D8A2", "Ransom:Win32/Trasbind.A", "Trojan/Win32.Tdss.R14197", "Hoax.PornoAsset", "Trojan.Win32.Jorik" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "On", "the", "9th", "of", "August,", "a", "tweet", "from", "@MalwareHunterTeam", "caught", "my", "eye;", "it", "mentioned", "a", "fake", "Flash", "update", "that", "used", "a", "PowerShell", "script", "to", "connect", "to", "a", "very", "particular", "host" ]
[ 16, 0, 8, 8, 8, 16, 4, 16, 4, 16, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 1, 9, 16, 1, 16, 16, 16, 16, 16 ]
[ "By", "late", "2015", ",", "the", "malware", "’", "s", "creators", "had", "gone", "mostly", "silent", "until", "the", "summer", "of", "2016", "when", "the", "malware", "reappeared", "with", "a", "more", "complex", "architecture", "that", "injects", "malicious", "code", "into", "Android", "system", "processes", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16 ]
[ "Nemesis,", "the", "malware", "ecosystem", "used", "by", "FIN1,", "includes", "comprehensive", "backdoors", "that", "support", "a", "variety", "of", "network", "protocols", "and", "communication", "channels", "for", "command", "and", "control", "CnC." ]
[ 3, 16, 3, 11, 16, 16, 6, 16, 16, 3, 16, 16, 16, 16, 16, 1, 9, 16, 1, 9, 9, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsOval.152A", "Backdoor.Win32.VB!O", "Backdoor.VB.MV3", "Trojan.Llac.Win32.24709", "Trojan/Injector.eih", "BKDR_RSHOT.SMA", "Win32.Backdoor.VB.y", "BKDR_RSHOT.SMA", "Win.Trojan.6387874-3", "Trojan.Win32.Temr.ssc", "Trojan.Win32.Temr.ejiehl", "Backdoor.W32.Ciadoor.lo5L", "TrojWare.Win32.Qhost.nls", "Trojan.DownLoader16.56820", "Backdoor.Win32.VB", "BehavesLike.Win32.Trojan.tc", "Trojan.Temr.ak", "Backdoor:Win32/Lybsus.A", "Trojan.Graftor.D4305", "Backdoor.Win32.A.VB.168034", "Trojan.Win32.Temr.ssc", "Backdoor.Win32.VB", "Backdoor.VB", "Trojan.Injector!pDYfo+3Pf04", "Trojan-Spy.Win32.KeyLogger", "W32/DarkKomet.GUKH!tr", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "133", "”", "as", "a", "main", "C2", "address", ",", "and", "there", "is", "only", "one", "domain", "that", "is", "hosted", "on", "this", "dedicated", "server", "–", "iliageram", "[", "." ]
[ 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "Technical", "details", "Here", "is", "the", "meta", "information", "for", "the", "observed", "samples", ",", "certificates", "and", "hardcoded", "version", "stamps", ":", "Certificate", "MD5", "Module", "Version", "Serial", "Number", ":", "0x76607c02", "Issuer", ":", "CN=Ron", "Validity", ":", "from", "=", "Tue", "Aug", "30", "13:01:30", "MSK", "2016", "to", "=", "Sat", "Aug", "24", "13:01:30", "MSK", "2041", "Subject", ":", "CN=Ron", "9e005144ea1a583531f86663a5f14607", "1", "–", "18abe28730c53de6d9e4786c7765c3d8", "2", "2.0", "Serial", "Number", ":", "0x6a0d1fec", "Issuer", ":", "CN=Sun", "Validity", ":", "from", "=", "Mon", "May", "16", "17:42:40", "MSK", "2016", "to", "=", "Fri", "May", "10", "17:42:40", "MSK", "2041", "Subject", ":", "CN=Sun", "9ffc350ef94ef840728564846f2802b0", "2", "v2.51sun", "6c246bbb40b7c6e75c60a55c0da9e2f2", "2", "v2.96s", "7c8a12e56e3e03938788b26b84b80bd6", "2", "v3.09s", "bde7847487125084f9e03f2b6b05adc3", "2", "v3.12s", "2560942bb50ee6e6f55afc495d238a12", "2", "v3.18s", "It", "’", "s", "interesting", "that", "the", "issuer", "β€œ", "Sun", "”", "matches", "the", "β€œ", "Sun1", "”", "and", "β€œ", "Sun2", "”", "identifiers", "of", "infected", "devices", "from", "the", "FTP", "server", ",", "suggesting", "they", "may", "be", "test", "devices", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 1, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 1, 16, 16, 1, 16, 16, 1, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "is", "impossible", "to", "deprive", "it", "of", "these", "rights", "without", "the", "use", "of", "specialized", "tools", "(", "such", "as", "Kaspersky", "Internet", "Security", "for", "Android", ")", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 13, 13, 16, 5, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Masteseq", "Win32.Trojan.WisdomEyes.16070401.9500.9872", "Backdoor.Masteseq", "Trojan.Win32.Masteseq.evvgyd", "Backdoor.W32.Masteseq!c", "BackDoor.Liskey", "Backdoor.Masteseq.x", "Backdoor:Win32/Masteseq.AC", "Trojan/Win32.Masteseq.R12342", "Trj/GdSda.A", "Win32.Backdoor.Masteseq.Lpbn", "Backdoor.Win32.Masteseq", "Win32/Trojan.d37" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Cisco", "Talos", "is", "currently", "observing", "a", "widespread", "campaign", "leveraging", "the", "Samas/Samsam/MSIL.B/C", "ransomware", "variant." ]
[ 4, 12, 16, 16, 16, 16, 16, 6, 16, 16, 1, 3, 11 ]
[ "Last", "March", "2016,", "we", "noted", "that", "PowerWare", "crypto-ransomware", "also", "abused", "PowerShell." ]
[ 16, 0, 8, 16, 16, 16, 3, 11, 16, 16, 3 ]
[ "Sending", "SMS", "messages", "to", "financial", "institutions", "to", "query", "account", "balances", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "What", "makes", "this", "botnet", "successful", "is", "its", "highly", "configurable", "and", "modular", "design", "that", "can", "fit", "any", "malicious", "intent,", "like", "distributing", "Zeus", "or,", "more", "recently,", "distributing", "a", "Lethic", "bot." ]
[ 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 3, 11 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Exploit.WordPerf.B", "Trojan/Exploit.WordPerf.b", "TROJ_WORDPERF.B", "W32/Risk.DAAG-1937", "Win32/Exploit.WordPerf.B", "TROJ_WORDPERF.B", "Win.Trojan.Exploit-204", "Exploit.Win32.WordPerf.b", "Trojan.Exploit.WordPerf.B", "Exploit.Win32.WordPerf.gpac", "Exploit.W32.WordPerf.b!c", "Trojan.Exploit.WordPerf.B", "TrojWare.Win32.Exploit.WordPerf.B", "Trojan.Exploit.WordPerf.B", "Exploit.Qaaz", "Exploit.WordPerf.Win32.2", "Exploit.WordPerf.b", "TR/Expl.WordPerf.B", "Trojan[Exploit]/Win32.WordPerf", "Win32.EXPLOIT.WordPerf.b.kcloud", "Exploit:Win32/WordPerf.B", "Trojan.Exploit.WordPerf.B", "Exploit.Win32.WordPerf.b", "Trojan.Exploit.WordPerf.B", "Trojan.Exploit.WordPerf.B", "Win32.Exploit.Wordperf.Wxrv", "Exploit.WordPerf!zPzGZ0A1+Q4", "Trojan.Win32.Exploit", "W32/WordPerf.B!exploit", "Win32/Trojan.827" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Original", "password", "The", "main", "service", "follows", "the", "same", "structure", "as", "the", "first", "version", ",", "the", "anti-analysis", "features", "are", "primitive", ",", "only", "checking", "the", "emulator", "environment", "without", "any", "kind", "of", "packing", "or", "obfuscation", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Additionally", ",", "during", "a", "period", "of", "several", "days", ",", "our", "infected", "test", "device", "was", "never", "remotely", "disinfected", "by", "the", "operators", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Rokku", "seems", "to", "be", "distributed", "by", "a", "malicious", "document,", "which", "contains", "a", "macro", "that", "when", "is", "executed", "downloads", "and", "runs", "Rokku." ]
[ 3, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "This", "is", "another", "reminder", "of", "why", "users", "shouldn", "’", "t", "rely", "on", "ratings", "alone", "to", "decide", "whether", "to", "trust", "an", "app", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Vetor.PE", "Virus.Win32.Virut.1!O", "W32.Virut.G", "PE_VIRUX.O", "W32.Virut.CF", "Win32/Virut.17408", "PE_VIRUX.O", "Win32.Virus.Virut.Q", "Virus.Win32.Virut.ce", "Virus.Win32.Virut.hpeg", "W32.Virut.mzNk", "Win32.Virut.56", "Virus.Virut.Win32.1938", "Win32/Virut.bt", "Virus/Win32.Virut.ce", "Win32.Virut.cr.61440", "TrojanDownloader:MSIL/Tackerkin.A", "Virus.Win32.Virut.ce", "Win32/Virut.F", "Virus.Virut.14", "W32/Sality.AO", "Win32/Virut.NBP", "Trojan-Downloader.MSIL", "W32/Virut.CE", "Virus.Win32.VirutChangeEntry.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Technical", "Analysis", "XLoader", "first", "loads", "the", "encrypted", "payload", "from", "Assets/db", "as", "test.dex", "to", "drop", "the", "necessary", "modules", "then", "requests", "for", "device", "administrator", "privileges", "." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 1, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "have", "detected", "a", "total", "of", "17", "C", "&", "C", "servers", "on", "4", "different", "domains", ",", "which", "probably", "means", "the", "bad", "guys", "are", "quite", "familiar", "with", "what", "redundancy", "is", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Both", "the", "loader", "and", "dropped", "class", "are", "obfuscated", "using", "ProGuard", ",", "which", "obfuscates", "names", "using", "alphabet", "letters", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom.Ryzerlo.A3", "Trojan.Ransom.HiddenTears.1", "Ransom_BLOCCATO.SM", "Ransom.HiddenTear", "Ransom_BLOCCATO.SM", "MSIL.Trojan-Ransom.Cryptear.B", "Trojan.Win32.Filecoder.ethwkz", "Trojan.Win32.Z.Ransom.211968.EF", "TrojWare.MSIL.Ransom.Ryzerlo.A", "Trojan.Encoder.10598", "Trojan-Ransom.HiddenTear", "TR/ATRAPS.jnrzk", "Ransom.HiddenTear/Variant", "Trojan.Ransom.HiddenTear", "Trj/GdSda.A", "MSIL/Filecoder.Y!tr", "Win32/Trojan.61e" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "implant", "provides", "the", "ability", "to", "grab", "a", "lot", "of", "exfiltrated", "data", ",", "like", "call", "records", ",", "text", "messages", ",", "geolocation", ",", "surrounding", "audio", ",", "calendar", "events", ",", "and", "other", "memory", "information", "stored", "on", "the", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Clod232.Trojan.380a", "Heur.Win32.Veebee.1!O", "TrojanSpy.VB!WEMPyAgOnlg", "W32/MalwareF.ZFHU", "Trojan-Spy.Win32.VB.dwb", "Trojan.Win32.VB.cpxay", "Trojan.Win32.A.VB.77932", "TrojWare.Win32.TrojanSpy.VB.NNW", "Trojan.DownLoader1.62643", "Trojan[Spy]/Win32.VB", "PWS:Win32/Gypthoy.A", "W32/Risk.FBWB-6710", "Trojan.VBRA.02824", "Trojan-Spy.Win32.VB", "W32/VB.DWB!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "attack", "was", "found", "to", "heavily", "rely", "on", "RTF", "exploits", "and", "at", "the", "time,", "thought", "to", "make", "use", "of", "the", "PlugX", "malware", "family." ]
[ 16, 1, 16, 16, 16, 16, 16, 16, 7, 15, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11 ]
[ "HenBox", "masquerades", "as", "apps", "such", "as", "VPN", "and", "Android", "system", "apps", "and", "often", "installs", "legitimate", "versions", "of", "these", "apps", "along", "with", "HenBox", "to", "trick", "users", "into", "thinking", "they", "downloaded", "the", "legitimate", "app", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.Vetor.PE", "Backdoor.Bot.97496", "W32.Virut.D", "Backdoor.Bot.97496", "Virus.LdPinch.Win32.1", "W32/Virut.F", "Backdoor.Bot.D17CD8", "Win32.Virus.Virut.i", "W32/Sdbot.ACIH", "W32.IRCBot", "PE_VIRUT.D-1", "Win.Trojan.Virut-16", "Backdoor.Bot.97496", "Virus.Win32.Virut.n", "Backdoor.Bot.97496", "Virus.Win32.Virut.jxol", "Backdoor.Win32.A.IRCBot.97792", "Virus.W32.Virut!c", "Backdoor.Bot.97496", "PE_VIRUT.D-1", "BehavesLike.Win32.Virut.pc", "Worm.Win32.Kulsibot", "W32/Sdbot.OGIG-1311", "Win32/Virut.e", "Virus/Win32.Virut.n", "Win32.Virut.n.2600", "Worm:Win32/Kulsibot.A", "Virus.Win32.Virut.n", "Win32/Virut.D", "Win32/Virut.E", "Virus.Win32.HanKu.e", "Virus.Win32.Virut.AT" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Moreover", ",", "BusyGasper", "boasts", "some", "keylogging", "tools", "–", "the", "malware", "processes", "every", "user", "tap", ",", "gathering", "its", "coordinates", "and", "calculating", "characters", "by", "matching", "given", "values", "with", "hardcoded", "ones", "." ]
[ 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.BypauTH.Trojan", "Application.Hacktool.Vncpass.A", "Trojan-Spy/W32.Vnc.32768", "NetTool.Win32.VNC!O", "Tool.VNC.Win32.1", "Win32.Trojan.WisdomEyes.16070401.9500.9990", "W32/Tool.PPKE-1202", "Backdoor.Prorat", "Application.Hacktool.Vncpass.A", "not-a-virus:NetTool.Win32.VNC.a", "Application.Hacktool.Vncpass.A", "Riskware.Win32.VNC.hsfc", "Application.Hacktool.Vncpass.A", "ApplicUnsaf.Win32.NetTool.VNC.A", "Application.Hacktool.Vncpass", "Tool.VncBypauth", "not-a-virus:NetTool.Win32.VNC", "W32/HackTool.CDN", "NetTool.VNC.b", "HackTool[NetTool]/Win32.VNC", "Application.Hacktool.Vncpass.A", "not-a-virus:NetTool.Win32.VNC.a", "Win-AppCare/Vnc.32768", "HackTool.VNC!Pb5Dm1ZMh30", "Win32/Virus.NetTool.8e7" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "US", "defense", "contractors", "were", "only", "fairly", "recent", "targets", "based", "on", "the", "operation's", "history,", "which", "we", "traced", "to", "spear-phishing", "in", "2010." ]
[ 4, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 6, 16, 16, 16, 16, 16, 1, 16, 0 ]
[ "As", "MainService", "is", "the", "main", "controller", ",", "the", "developer", "has", "taken", "the", "appropriate", "actions", "to", "keep", "it", "functional", "and", "running", "at", "all", "times", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "EVENTBOT", "VERSION", "0.4.0.1", "Package", "Name", "Randomization", "In", "this", "version", ",", "the", "package", "name", "is", "no", "longer", "named", "β€˜", "com.example.eventbot", "’", ",", "which", "makes", "it", "more", "difficult", "to", "track", "down", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "By", "now,", "most", "of", "the", "malware", "researchers", "are", "used", "to", "seeing", "drive-by", "infections", "that", "serve", "up", "a", "handful", "of", "malware,", "from", "droppers", "to", "payloads." ]
[ 16, 16, 16, 16, 16, 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 3 ]
[ "Conclusion", "As", "our", "computing", "increasingly", "crosses", "multiple", "screens", ",", "we", "should", "expect", "to", "see", "threats", "extending", "across", "mobile", "and", "desktop", "environments", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "July", "20", "A", "new", "zero-day", "vulnerability", "(", "CVE-2015-2426", ")", "was", "found", "in", "Windows", ",", "which", "Microsoft", "fixed", "in", "an", "out-of-band", "patch", "." ]
[ 16, 16, 16, 16, 7, 15, 16, 7, 16, 16, 16, 16, 5, 16, 16, 4, 16, 16, 16, 16, 16, 16 ]
[ "However,", "global", "security", "companies", "are", "limited", "in", "collecting", "attack", "information", "in", "Korea,", "and", "there", "is", "also", "a", "lack", "of", "information", "about", "the", "attacks", "that", "Lazarus", "or", "Lazarus", "are", "suspected", "of", "as", "a", "small", "group", "of", "threat", "groups", "in", "Korea." ]
[ 16, 4, 12, 12, 16, 16, 16, 16, 1, 9, 16, 2, 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 1, 16, 6, 16, 6, 16, 16, 16, 16, 6, 14, 14, 14, 14, 14, 16, 2 ]
[ "The", "decompile", "method", "is", "based", "on", "the", "fact", "that", "Android", "applications", "are", "Java-based", ",", "meaning", "it", "is", "possible", "to", "recompile", "it", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "post", "does", "n't", "follow", "the", "chronological", "evolution", "of", "Zen", ",", "but", "instead", "covers", "relevant", "samples", "from", "least", "to", "most", "complex", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "After", "libmsy.so", "decrypts", "the", "asset", "file", "tong.luo", ",", "it", "loads", "mycode.jar", "dynamically", "into", "FakeSpy", "’", "s", "process", ",", "as", "is", "shown", "from", "the", "output", "of", "the", "β€œ", "adb", "logcat", "”", "command", "." ]
[ 16, 1, 16, 16, 16, 16, 1, 16, 16, 16, 1, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "ir", "." ]
[ 9, 9, 16 ]
[ "But", "SamSam", "isn't", "the", "only", "ransomware", "out", "there", "charging", "eye-watering", "amounts", "to", "decrypt", "business", "servers." ]
[ 16, 3, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 5, 13, 13 ]
[ "This", "variant", "uses", "a", "new", "UAC", "bypass", "method", "that", "has", "been", "used", "by", "the", "Dridex", "malware", "since", "December,", "2014." ]
[ 16, 16, 16, 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 3, 11, 16, 0, 8 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9882", "Backdoor.Teambot", "Trojan.Win32.Kazy.cxkslh", "Trojan.PWS.Spy.19585", "Trojan.Kazy.D1E900", "Backdoor:Win32/Pavica.B!dll", "Backdoor/Win32.Pavica.R161181" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "Conclusion", "The", "case", "of", "Asacub", "shows", "that", "mobile", "malware", "can", "function", "for", "several", "years", "with", "minimal", "changes", "to", "the", "distribution", "scheme", "." ]
[ 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Android", "Trojan", "Found", "in", "Targeted", "Attack", "26", "MAR", "2013", "In", "the", "past", ",", "we", "’", "ve", "seen", "targeted", "attacks", "against", "Tibetan", "and", "Uyghur", "activists", "on", "Windows", "and", "Mac", "OS", "X", "platforms", "." ]
[ 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 5, 13, 13, 16, 16 ]
[ "It", "also", "drops", "decoy", "documents", "in", "an", "attempt", "to", "camouflage", "the", "attack." ]
[ 16, 16, 1, 9, 9, 16, 16, 16, 16, 16, 16, 1 ]
[ "The", "base64-encoded", "image", "is", "then", "uploaded", "to", "an", "image", "recognition", "service", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9821", "BehavesLike.Win32.Trojan.tc", "Trojan/Win32.MSILKrypt.C2372735" ]
[ 16, 3, 16, 16, 16, 1, 1, 1 ]
[ "If", "that", "part", "is", "found", ",", "the", "app", "loads", "Javascript", "snippets", "from", "the", "JSON", "parameters", "to", "click", "a", "button", "or", "other", "HTML", "element", ",", "simulating", "a", "real", "user", "click", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Trend", "Micro", "detects", "these", "as", "ANDROIDOS_XLOADER.HRX", "." ]
[ 4, 12, 16, 16, 16, 1, 16 ]
[ "The", "first", "method", "is", "to", "send", "a", "specially", "crafted", "URL", "to", "the", "target", "via", "SMS", "or", "email", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9890", "Backdoor.Win32.Ruledor.c", "BackDoor.Ruller", "Downloader.Adload.Win32.15034", "BehavesLike.Win32.Sural.tc", "Trojan[Backdoor]/Win32.Ruledor", "Backdoor:Win32/Ruledor.B", "Backdoor.Win32.Ruledor.c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "They", "evade", "detection", "by", "keeping", "their", "code", "simple", "and", "flying", "under", "the", "radar." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "speculate", "that", "other", "attacks", "delivering", "Bookworm", "were", "also", "targeting", "organizations", "in", "Thailand", "based", "on", "the", "contents", "of", "the", "associated", "decoys", "documents,", "as", "well", "as", "several", "of", "the", "dynamic", "DNS", "domain", "names", "used", "to", "host", "C2", "servers", "that", "contain", "the", "words", "Thai", "or", "Thailand" ]
[ 16, 16, 15, 16, 1, 16, 3, 16, 16, 4, 12, 16, 2, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 1, 9, 9, 9, 16, 16, 1, 9, 9, 16, 16, 16, 16, 2, 16, 2 ]
[ "In", "2020", ",", "it", "appears", "that", "TrickBot", "’", "s", "vast", "bank", "fraud", "is", "an", "ongoing", "project", "that", "helps", "the", "gang", "monetize", "compromised", "accounts", "." ]
[ 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Autoit.ARV", "Worm.AutoIt.Helompy.A", "Trojan.Autoit.ARV", "Worm.AutoRun.Win32.33975", "Win32.Trojan.AutoIt.a", "W32/Trojan2.MFAR", "W32.SillyDC", "Win.Trojan.Autoit-1267", "Worm.Win32.AutoIt.agm", "Trojan.Autoit.ARV", "Trojan.Win32.Napad.ijfyd", "Worm.Win32.A.IM-Sohanad.278196", "Win32.HLLW.Napad", "BehavesLike.Win32.YahLover.hc", "W32/Trojan.MASJ-0546", "Worm/AutoRun.sfx", "Worm:Win32/Helompy.A", "Trojan.Autoit.ARV", "Worm.Win32.AutoIt.agm", "HEUR/Fakon.mwf", "Trojan.Autoit.ARV", "Trj/CI.A", "I-Worm.Autoit.GP", "Worm.Win32.Autorun.aao", "Win32/Trojan.e4c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "If", "the", "user", "closes", "the", "windows", ",", "they", "will", "appear", "again", "due", "to", "the", "timer", "configuration", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.ArchSMS", "Win32.Trojan.WisdomEyes.16070401.9500.9977", "Hoax.Win32.ArchSMS.upa", "Win32.Trojan-psw.Archsms.Pgnh", "Trojan.Fraudster.307", "Trojan:Win32/MobicArch.A", "Hoax.Win32.ArchSMS.upa", "Win32.Trojan.ArchSMS.D", "Spyware/Win32.ArchSMS.R32549", "Hoax.ArchSMS.ge", "Hoax.Win32.ArchSMS", "Win32/Trojan.b8b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Pokey.A", "Trojan.Pokey.A", "Trojan.Pokey.A", "WORM_PIKACHU.A", "W32/Trojan.GNFD-9297", "W32.Pokey.Worm", "Win32/Pikachu.32768", "WORM_PIKACHU.A", "Win.Worm.Pikachu-2", "Trojan.Pokey.A", "Email-Worm.Win32.Pikachu", "Trojan.Pokey.A", "Trojan.Win32.Pikachu.enlz", "I-Worm.Win32.Pikachu", "Trojan.Pokey.A", "Worm.Win32.Pikachu.A", "Trojan.Pokey.A", "Worm.Pikachu.Win32.2", "Pokey.a", "Email-Worm.Win32.Pikachu", "W32/Trojan2.CSH", "Worm:Win32/Pokey.A@mm", "WORM/Pikachu.AuExec", "Worm[Email]/Win32.Pikachu", "Worm:Win32/Pokey.A@mm", "Worm.Pokey", "Email-Worm.Win32.Pikachu", "Pokey.a", "Email-Worm.Pikachu", "Win32/Pikachu.A", "I-Worm.Pikachu", "W32/Pikachu.A!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Derusbi", "has", "been", "widely", "covered", "and", "associated", "with", "Chinese", "threat", "actors." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14 ]
[ "Conclusions", "Every", "day", ",", "there", "are", "hundreds", "if", "not", "thousands", "of", "targeted", "attacks", "against", "Tibetan", "and", "Uyghur", "supporters", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "macro", "will", "download", "ransomware", "or", "banking", "malware", "after", "execution.", "JavaScript", "files,", "executed", "by", "Wscript", "in", "Windows,", "dropping,", "for", "example,", "Locky", "ransomware." ]
[ 16, 3, 16, 16, 3, 16, 3, 11, 16, 16, 1, 9, 16, 16, 1, 16, 5, 16, 16, 16, 3, 11 ]
[ "The", "image", "below", "shows", "the", "function", "that", "parses", "the", "SMS", "messages", ",", "decrypts", "them", "using", "the", "hardcoded", "RSA", "private", "key", "and", "executes", "the", "commands", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "archive", "also", "contained", "all", "the", "necessary", "codes", "to", "target", "Australian", "financial", "institutions", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "OceanLotus,", "also", "known", "as", "APT32,", "is", "believed", "to", "be", "a", "Vietnam-based", "APT", "group", "that", "has", "become", "increasingly", "sophisticated", "in", "its", "attack", "tactics,", "techniques,", "and", "procedures", "TTPs." ]
[ 6, 16, 16, 16, 6, 16, 16, 16, 16, 6, 14, 14, 14, 16, 16, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Worm.SoulClose.E", "Worm.Win32.VB!O", "W32.Vb.RC", "Win32.Worm.SoulClose.E", "W32/VB.rc", "Win32.Worm.SoulClose.E", "PE_SOULOPEN.A", "Win32.Worm.VB.bc", "W32/Worm.EGII-1744", "W32.Fujacks.C", "Win32/NoelOpus.B", "PE_SOULOPEN.A", "Win.Worm.VB-5176", "Win32.Worm.SoulClose.E", "Worm.Win32.VB.rc", "Win32.Worm.SoulClose.E", "Trojan.Win32.VB.ooto", "Worm.Win32.A.VB.66048.A[UPX]", "Worm.W32.Vb!c", "Win32.Worm.SoulClose.E", "Virus.Win32.VB.~A", "Win32.Worm.SoulClose.E", "Win32.HLLW.Autoruner.2173", "BehavesLike.Win32.Dropper.tm", "W32/Worm.VIF", "Worm/VB.pcu", "TR/VB.dek.1", "Worm/Win32.VB", "Worm.VB.rc.kcloud", "Worm:Win32/Soulclose.A", "Worm.Win32.VB.rc", "Trojan/Win32.HDC.C146348", "W32/HLLP.Soul.a", "Worm.VB", "Win32/AutoRun.VB.HG", "Win32.Worm.Vb.Eex", "Worm.Soulclose!T6Z53ODblJg", "Virus.Worm.Win32.VB", "W32/VB.MJU!tr", "Virus.Win32.VBViking.I" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "our", "case", ",", "the", "administrator", "phone", "number", "belongs", "to", "a", "mobile", "network", "in", "Australia", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Way", "Backdoor.Way.Win32.124", "W32/Backdoor.HAT", "Backdoor.Trojan", "Win32/FakeMS.WOCR", "Win.Trojan.Dealply-6391261-0", "Backdoor.Win32.Way.10", "Trojan.Win32.Way.wibi", "Trojan.Win32.Z.Way.314010", "Backdoor.W32.Way!c", "BackDoor.Way.10", "Backdoor.Win32.Way", "W32/Backdoor.EORF-5693", "Backdoor/NetStar.10", "Trojan[Backdoor]/Win32.Way", "Backdoor.Win32.Way.10", "Win32.Backdoor.Way.Dztb", "Backdoor.Way!jjTH+E6uXaw", "W32/Way.A!tr", "Win32/Backdoor.008" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Sirefef.A", "Backdoor/ZAccess.trq", "Win32.Trojan.WisdomEyes.16070401.9500.9982", "TROJ_SIREFEF.SM", "Trojan.Win32.ZAccess.tiikz", "Backdoor.Win32.A.ZAccess.190464.AD", "Backdoor.Win32.ZAccess.TZS", "BackDoor.Maxplus.5433", "Trojan.FakeAV.Win32.243037", "TROJ_SIREFEF.SM", "BehavesLike.Win32.ZeroAccess.cc", "Trojan.Win32.Sirefef", "Backdoor/ZAccess.dbk", "Trojan[Backdoor]/Win32.ZAccess", "Trojan:Win32/Sirefef.P", "Trojan.Kazy.D1335F", "Backdoor/Win32.ZAccess.R28242", "ZeroAccess.ex", "BScope.Backdoor.Maxplus.2613", "Rootkit.0Access" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]