tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"Playing",
"further",
"off",
"the",
"suggested",
"GAS",
"Tecnologia",
"link",
",",
"the",
"app",
"promises",
"better",
"security",
"for",
"its",
"users",
"."
] | [
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"zqo-japan",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"Several",
"days",
"ago,",
"researchers",
"at",
"FireEye",
"attributed",
"a",
"recent",
"phishing",
"campaign",
"to",
"FIN7,",
"a",
"campaign",
"in",
"which",
"cybercriminals",
"delivered",
"malicious",
"Microsoft",
"Office",
"documents",
"to",
"users,",
"deploying",
"both",
"Cobalt",
"Strike",
"and",
"a",
"VBS-based",
"backdoor",
"on",
"infected",
"workstations."
] | [
16,
16,
16,
4,
16,
4,
16,
16,
16,
6,
14,
16,
6,
16,
6,
16,
16,
6,
16,
3,
11,
11,
11,
16,
16,
16,
16,
3,
11,
16,
16,
3,
11,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9974",
"Trojan.Win32.ArchSMS.cwxrht",
"Hoax.MSIL.gn",
"Trojan:MSIL/Blinerarch.AU",
"Trj/CI.A",
"Msil.Risk.Hoax.Wure",
"Trojan.ArchSMS!IMpJTYjIG18",
"Hoax.MSIL",
"Win32/Trojan.Dropper.411"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Systex.A",
"Trojan.Inject1.7920",
"Win32.Troj.Undef.kcloud",
"VirTool:Win32/Obfuscator.XZ",
"Rootkit.Xytets",
"HeurEngine.Vmpbad",
"Trojan.Spy.Texy!4898",
"Trojan.Win32.Spy",
"Trj/Thed.W"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Subsequently",
",",
"the",
"malware",
"will",
"change",
"the",
"screen",
"off",
"time-out",
"to",
"10",
"minutes",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Graftor.D255EA",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Backdoor.Trojan",
"BackDoor.Miniduke.3",
"BehavesLike.Win32.RansomWannaCry.tz",
"Trojan.Win32.Bayrob",
"TR/Crypt.ZPACK.88814",
"Trojan[Backdoor]/Win32.CosmicDuke",
"Win32.Hack.CosmicDuke.h.kcloud",
"Trojan:Win32/Bandiu.A",
"Backdoor.CosmicDuke",
"Backdoor.CosmicDuke!",
"W32/CosmicDuke.F!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Virus.Pesin.Win32.2",
"Trojan.Heur.E41DEE",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"Win32/Pesin.C",
"Virus.Win32.HLLW.Delf.b",
"Virus.Win32.HLLW.gjjl",
"Trojan.PWS.Mob",
"Trojan/HLLP.s",
"W32/Banker.TOA!tr",
"Worm:Win32/Pesin.C",
"Virus.Win32.HLLW.Delf.b",
"Trojan.Worm.Delf"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.35FE",
"WORM_METSYS.SMI",
"W32/Trojan.ZLO",
"Win32/ProRat.AL",
"WORM_METSYS.SMI",
"Trojan.Ratibe",
"W32/Trojan.JJUN-8278",
"Trojan:Win32/Metsys.A",
"HEUR/Fakon.mwf",
"W32/MediaTest.A.worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.RansomGimemoE.Trojan",
"Trojan-Ransom.Win32.Gimemo!O",
"Trojan.Dofoil.A",
"Trojan.Gimemo.Win32.2687",
"Trojan/Injector.sxm",
"Win32.Trojan.Injector.ec",
"W32.Pilleuz",
"Win32/Loktrom.FR",
"TROJ_RANSOM.SM3",
"Win.Trojan.Injector-603",
"Trojan-Ransom.Win32.Gimemo.vhu",
"Trojan.Win32.Gimemo.tfgni",
"Trojan.Win32.A.Gimemo.83968",
"Trojan.Packed.22718",
"TROJ_RANSOM.SM3",
"BehavesLike.Win32.ZBot.dc",
"Trojan/Gimemo.cmk",
"Trojan[Ransom]/Win32.Gimemo",
"Ransom:Win32/Loktrom.A",
"Trojan.Zusy.D2A53",
"Win.Adware.Websearch.moge",
"Trojan-Ransom.Win32.Gimemo.vhu",
"Trojan/Win32.Injector.R30428",
"BScope.Trojan-Injector.2151",
"Trojan.Injector!ZShGusAMkc8",
"Trojan-Ransom.Win32.Gimemo",
"W32/Zbot.YW!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Employ",
"stronger",
"credentials",
",",
"for",
"instance",
",",
"to",
"make",
"them",
"less",
"susceptible",
"to",
"unauthorized",
"access",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"the",
"past",
"two",
"years,",
"two",
"campaigns",
"of",
"Sakula",
"activity",
"stand",
"out",
"as",
"being",
"particularly",
"significant",
"β",
"the",
"French",
"Aerospace",
"Campaign",
"and",
"the",
"Ironman",
"Campaign."
] | [
16,
16,
0,
8,
8,
6,
14,
14,
3,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
16,
4,
12,
12
] |
[
"After",
"the",
"files",
"are",
"encrypted",
"filenames",
"are",
"appended",
"with",
".rokku"
] | [
16,
16,
16,
16,
1,
9,
16,
16,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.VB",
"Trojan.Midie.DA596",
"Win32.Trojan.VB.gx",
"W32/Trojan.ZVBM-4484",
"Win32/FakeRecycled.A",
"WORM_VB.SMF",
"Win.Trojan.VB-684",
"Trojan.Win32.VB.aqt",
"Trojan.DownLoad3.64248",
"WORM_VB.SMF",
"BehavesLike.Win32.Dropper.wc",
"Trojan.Atros6",
"W32/Trojan.XUP",
"Trojan.Qhost.pw",
"TR/VB.AQT",
"Trojan/Win32.VB",
"Worm:Win32/Fakerecy.A",
"Trojan.Win32.VB.aqt",
"Trojan/Win32.Tiggre.R216587",
"SScope.Trojan.VBRA.7311",
"Trj/CI.A",
"Worm.Autorun.DU"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"As",
"a",
"part",
"of",
"this",
"campaign,",
"we",
"also",
"observed",
"attacks",
"on",
"Russian-speaking",
"financial",
"analysts",
"working",
"at",
"global",
"financial",
"firms",
"and",
"covering",
"telecom",
"corporations",
"in",
"Russia,",
"likely",
"a",
"result",
"of",
"collateral",
"damage",
"caused",
"by",
"the",
"attackers",
"targeting",
"tactics."
] | [
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
4,
12,
12,
16,
16,
4,
12,
12,
16,
16,
4,
12,
16,
2,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Jorik.IRCbot!O",
"Trojan.Jorik",
"Trojan.Jorik.Win32.190644",
"Troj.W32.Jorik.Ircbot!c",
"Trojan/IRCBot.nhr",
"Win32.Trojan.WisdomEyes.16070401.9500.9992",
"W32.IRCBot",
"Trojan.Win32.Jorik.IRCbot.wja",
"Trojan.Win32.Jorik.dgdeqb",
"BackDoor.IRC.Sdbot.17833",
"BehavesLike.Win32.Trojan.nh",
"Trojan.Win32.Jorik",
"Trojan/Jorik.gmen",
"Trojan/Win32.IRCbot",
"Trojan.Win32.Jorik.IRCbot.wja",
"Trojan:Win32/Squida.A",
"Worm/Win32.IRCBot.R123038",
"Trojan.IRCbot",
"Win32.Trojan.Jorik.Ahef",
"Win32/Trojan.053"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Keylogging",
":",
"record",
"input",
"events",
"by",
"hooking",
"IPCThreadState",
":",
":Transact",
"from",
"/system/lib/libbinder.so",
",",
"and",
"intercepting",
"android",
":",
":parcel",
"with",
"the",
"interface",
"com.android.internal.view.IInputContext",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
1,
9,
9,
16,
16,
16,
1,
16
] |
[
"The",
"newest",
"variant,",
"TeslaCrypt",
"2.0,",
"uses",
"the",
"same",
"encryption",
"algorithm;",
"however,",
"the",
"keys",
"and",
"other",
"configuration",
"data",
"are",
"stored",
"in",
"the",
"Windows",
"Registry",
"instead",
"of",
"a",
"file",
"on",
"the",
"local",
"disk",
"as",
"in",
"previous",
"versions."
] | [
16,
16,
16,
3,
11,
16,
16,
1,
9,
9,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"During",
"our",
"investigation,",
"we",
"were",
"able",
"to",
"discover",
"a",
"number",
"of",
"domains",
"all",
"part",
"of",
"the",
"same",
"infrastructure",
"with",
"custom",
"skimmers",
"for",
"several",
"Magento",
"stores."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
5,
13,
16,
16,
3,
11,
16,
4,
12
] |
[
"Mobile",
"ViceLeaker",
"The",
"following",
"table",
"shows",
"meta",
"information",
"on",
"the",
"observed",
"samples",
",",
"including",
"compiler",
"timestamps",
":",
"MD5",
"Package",
"Compiler",
"C2",
"51df2597faa3fce38a4c5ae024f97b1c",
"com.xapps.SexGameForAdults",
"dexlib",
"2.x",
"188.165.28",
"[",
"."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
1,
16,
16,
1,
9,
9
] |
[
"The",
"Trojan",
"may",
"ask",
"the",
"user",
"to",
"pay",
"a",
"ransom",
"in",
"order",
"to",
"have",
"their",
"files",
"decrypted."
] | [
16,
3,
0,
16,
16,
4,
16,
1,
16,
1,
16,
16,
16,
16,
16,
1,
9
] |
[
"While",
"SeaDuke",
"is",
"a",
"single",
"-",
"albeit",
"cross-platform",
"-",
"trojan,",
"CloudDuke",
"appears",
"to",
"be",
"an",
"entire",
"toolset",
"of",
"malware",
"components,",
"or",
"solutions",
"as",
"the",
"Duke",
"group",
"apparently",
"calls",
"them."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
11,
11,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Strictor.D1A6AB",
"BehavesLike.Win32.DlHelper.tc",
"Trojan:Win32/Merca.A",
"Trj/GdSda.A",
"Trojan-Spy.Banker",
"W32/Delf.OKU!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"According",
"to",
"several",
"timestamps",
",",
"this",
"payload",
"is",
"used",
"by",
"implant",
"versions",
"created",
"since",
"2016",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAuto.5860",
"Backdoor.Lesbot.152",
"Backdoor.Lesbot.152.n2",
"Trojan.Win32.Lesbot.djep",
"Win32/Lesbot.B",
"WORM_NETSPREE.A",
"Backdoor.Win32.Lesbot.152",
"Backdoor.Lesbot.152",
"Backdoor.Leeter.B",
"Worm.Win32.Netspree",
"Worm.Win32.Netspree.A",
"Backdoor.Lesbot.152",
"Win32.IRC.Bot.based",
"WORM_NETSPREE.A",
"Backdoor/Lesbot.152",
"Bck/Lesbot.152",
"Win32.Hack.Lesbot.kcloud",
"Backdoor.Lesbot.152",
"W32/Risk.OZRI-5730",
"Win32/Netspree.worm.48448",
"Win32/Netspree.A",
"Backdoor.Lesbot.152.a",
"Backdoor.Win32.Lesbot.152",
"W32/Lesbot.152!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Spy/W32.AutoHK.877056",
"TrojanSpy.AutoHK",
"W32/Trojan.FIJU-8952",
"Trojan-Spy.Win32.AutoHK.b",
"Trojan.Win32.Z.Autohk.877056.A",
"Win32.Trojan-spy.Autohk.Anzi",
"TrojWare.Win32.Hadoc.AS",
"BehavesLike.Win32.Dropper.ch",
"PUA.EnigmaProtector",
"TrojanSpy.AutoHK.a",
"Trojan:Win32/Haudicx.A!bit",
"Troj.Spy.W32!c",
"Trojan-Spy.Win32.AutoHK.b",
"Trojan/Win32.Asprox.R130565",
"TrojanSpy.AutoHK",
"Win32/Spy.AHK.E"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Cantone.Trojan",
"Win32.Worm.TTE",
"Worm.Win32.Zombaque!O",
"Worm.Ppzombie.A3",
"Worm.Zombaque.Win32.16",
"Win32.Worm.TTE",
"WORM_BIZOME.SMF",
"W32/Risk.KAIL-2278",
"W32.Spybot.Worm",
"Win32/Zombaque.B",
"WORM_BIZOME.SMF",
"Win.Worm.Bizome-4",
"Worm.Zombaque",
"Worm.Win32.Zombaque.h",
"Trojan.Win32.Zombaque.igegn",
"Trojan.Win32.P2P-Icmp.437760",
"Win32.HLLW.RAhack.2",
"BehavesLike.Win32.Downloader.gc",
"Worm.Win32.Zombaque",
"W32/Zombaque.A",
"Worm/Zombaque.k",
"Win32.Virut.cr.61440",
"Worm:Win32/Ppzombie.A",
"Win32.Worm.TTE",
"Worm.Win32.Zombaque.h",
"Worm/Win32.Zombaque.R15854",
"Win32.Worm.TTE",
"Win32.Worm.TTE",
"Win32/Zombaque.B",
"Virus.Win32.Virut.ue",
"Worm.Zombaque!1mLwNArV7Hg"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"class",
"β",
"org.starsizew.Tb",
"β",
"also",
"has",
"a",
"self-monitoring",
"mechanism",
"to",
"restart",
"itself",
"when",
"its",
"own",
"onDestroy",
"API",
"is",
"triggered",
"."
] | [
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"first",
"in-the-wild",
"UEFI",
"bootkit",
"bypassing",
"UEFI",
"Secure",
"Boot",
"on",
"fully",
"updated",
"UEFI",
"systems",
"is",
"now",
"a",
"reality."
] | [
16,
16,
16,
3,
11,
7,
5,
13,
13,
16,
16,
16,
5,
13,
16,
16,
16,
16
] |
[
"In",
"2018",
",",
"the",
"most",
"actively",
"distributed",
"versions",
"were",
"5.0.0",
"and",
"5.0.3",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Ceeinject.6879",
"PWS-Spyeye.cr",
"Trojan/PornoAsset.avl",
"TROJ_KRYPTO.SMOZ",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win32/Ransom.AQY",
"TROJ_KRYPTO.SMOZ",
"Win.Trojan.Ransom-1156",
"Trojan.Win32.A.PornoAsset.43521",
"Trojan.Winlock.3300",
"PWS-Spyeye.cr",
"Trojan/PornoAsset.nh",
"TR/Winlock.CR",
"Trojan[Backdoor]/Win32.Buterat",
"Trojan.Barys.D8A2",
"Ransom:Win32/Trasbind.A",
"Trojan/Win32.Tdss.R14197",
"Hoax.PornoAsset",
"Trojan.Win32.Jorik"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"On",
"the",
"9th",
"of",
"August,",
"a",
"tweet",
"from",
"@MalwareHunterTeam",
"caught",
"my",
"eye;",
"it",
"mentioned",
"a",
"fake",
"Flash",
"update",
"that",
"used",
"a",
"PowerShell",
"script",
"to",
"connect",
"to",
"a",
"very",
"particular",
"host"
] | [
16,
0,
8,
8,
8,
16,
4,
16,
4,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
1,
9,
16,
1,
16,
16,
16,
16,
16
] |
[
"By",
"late",
"2015",
",",
"the",
"malware",
"β",
"s",
"creators",
"had",
"gone",
"mostly",
"silent",
"until",
"the",
"summer",
"of",
"2016",
"when",
"the",
"malware",
"reappeared",
"with",
"a",
"more",
"complex",
"architecture",
"that",
"injects",
"malicious",
"code",
"into",
"Android",
"system",
"processes",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16
] |
[
"Nemesis,",
"the",
"malware",
"ecosystem",
"used",
"by",
"FIN1,",
"includes",
"comprehensive",
"backdoors",
"that",
"support",
"a",
"variety",
"of",
"network",
"protocols",
"and",
"communication",
"channels",
"for",
"command",
"and",
"control",
"CnC."
] | [
3,
16,
3,
11,
16,
16,
6,
16,
16,
3,
16,
16,
16,
16,
16,
1,
9,
16,
1,
9,
9,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsOval.152A",
"Backdoor.Win32.VB!O",
"Backdoor.VB.MV3",
"Trojan.Llac.Win32.24709",
"Trojan/Injector.eih",
"BKDR_RSHOT.SMA",
"Win32.Backdoor.VB.y",
"BKDR_RSHOT.SMA",
"Win.Trojan.6387874-3",
"Trojan.Win32.Temr.ssc",
"Trojan.Win32.Temr.ejiehl",
"Backdoor.W32.Ciadoor.lo5L",
"TrojWare.Win32.Qhost.nls",
"Trojan.DownLoader16.56820",
"Backdoor.Win32.VB",
"BehavesLike.Win32.Trojan.tc",
"Trojan.Temr.ak",
"Backdoor:Win32/Lybsus.A",
"Trojan.Graftor.D4305",
"Backdoor.Win32.A.VB.168034",
"Trojan.Win32.Temr.ssc",
"Backdoor.Win32.VB",
"Backdoor.VB",
"Trojan.Injector!pDYfo+3Pf04",
"Trojan-Spy.Win32.KeyLogger",
"W32/DarkKomet.GUKH!tr",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"133",
"β",
"as",
"a",
"main",
"C2",
"address",
",",
"and",
"there",
"is",
"only",
"one",
"domain",
"that",
"is",
"hosted",
"on",
"this",
"dedicated",
"server",
"β",
"iliageram",
"[",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"Technical",
"details",
"Here",
"is",
"the",
"meta",
"information",
"for",
"the",
"observed",
"samples",
",",
"certificates",
"and",
"hardcoded",
"version",
"stamps",
":",
"Certificate",
"MD5",
"Module",
"Version",
"Serial",
"Number",
":",
"0x76607c02",
"Issuer",
":",
"CN=Ron",
"Validity",
":",
"from",
"=",
"Tue",
"Aug",
"30",
"13:01:30",
"MSK",
"2016",
"to",
"=",
"Sat",
"Aug",
"24",
"13:01:30",
"MSK",
"2041",
"Subject",
":",
"CN=Ron",
"9e005144ea1a583531f86663a5f14607",
"1",
"β",
"18abe28730c53de6d9e4786c7765c3d8",
"2",
"2.0",
"Serial",
"Number",
":",
"0x6a0d1fec",
"Issuer",
":",
"CN=Sun",
"Validity",
":",
"from",
"=",
"Mon",
"May",
"16",
"17:42:40",
"MSK",
"2016",
"to",
"=",
"Fri",
"May",
"10",
"17:42:40",
"MSK",
"2041",
"Subject",
":",
"CN=Sun",
"9ffc350ef94ef840728564846f2802b0",
"2",
"v2.51sun",
"6c246bbb40b7c6e75c60a55c0da9e2f2",
"2",
"v2.96s",
"7c8a12e56e3e03938788b26b84b80bd6",
"2",
"v3.09s",
"bde7847487125084f9e03f2b6b05adc3",
"2",
"v3.12s",
"2560942bb50ee6e6f55afc495d238a12",
"2",
"v3.18s",
"It",
"β",
"s",
"interesting",
"that",
"the",
"issuer",
"β",
"Sun",
"β",
"matches",
"the",
"β",
"Sun1",
"β",
"and",
"β",
"Sun2",
"β",
"identifiers",
"of",
"infected",
"devices",
"from",
"the",
"FTP",
"server",
",",
"suggesting",
"they",
"may",
"be",
"test",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
1,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
1,
16,
16,
1,
16,
16,
1,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"is",
"impossible",
"to",
"deprive",
"it",
"of",
"these",
"rights",
"without",
"the",
"use",
"of",
"specialized",
"tools",
"(",
"such",
"as",
"Kaspersky",
"Internet",
"Security",
"for",
"Android",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
5,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Masteseq",
"Win32.Trojan.WisdomEyes.16070401.9500.9872",
"Backdoor.Masteseq",
"Trojan.Win32.Masteseq.evvgyd",
"Backdoor.W32.Masteseq!c",
"BackDoor.Liskey",
"Backdoor.Masteseq.x",
"Backdoor:Win32/Masteseq.AC",
"Trojan/Win32.Masteseq.R12342",
"Trj/GdSda.A",
"Win32.Backdoor.Masteseq.Lpbn",
"Backdoor.Win32.Masteseq",
"Win32/Trojan.d37"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Cisco",
"Talos",
"is",
"currently",
"observing",
"a",
"widespread",
"campaign",
"leveraging",
"the",
"Samas/Samsam/MSIL.B/C",
"ransomware",
"variant."
] | [
4,
12,
16,
16,
16,
16,
16,
6,
16,
16,
1,
3,
11
] |
[
"Last",
"March",
"2016,",
"we",
"noted",
"that",
"PowerWare",
"crypto-ransomware",
"also",
"abused",
"PowerShell."
] | [
16,
0,
8,
16,
16,
16,
3,
11,
16,
16,
3
] |
[
"Sending",
"SMS",
"messages",
"to",
"financial",
"institutions",
"to",
"query",
"account",
"balances",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"What",
"makes",
"this",
"botnet",
"successful",
"is",
"its",
"highly",
"configurable",
"and",
"modular",
"design",
"that",
"can",
"fit",
"any",
"malicious",
"intent,",
"like",
"distributing",
"Zeus",
"or,",
"more",
"recently,",
"distributing",
"a",
"Lethic",
"bot."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Exploit.WordPerf.B",
"Trojan/Exploit.WordPerf.b",
"TROJ_WORDPERF.B",
"W32/Risk.DAAG-1937",
"Win32/Exploit.WordPerf.B",
"TROJ_WORDPERF.B",
"Win.Trojan.Exploit-204",
"Exploit.Win32.WordPerf.b",
"Trojan.Exploit.WordPerf.B",
"Exploit.Win32.WordPerf.gpac",
"Exploit.W32.WordPerf.b!c",
"Trojan.Exploit.WordPerf.B",
"TrojWare.Win32.Exploit.WordPerf.B",
"Trojan.Exploit.WordPerf.B",
"Exploit.Qaaz",
"Exploit.WordPerf.Win32.2",
"Exploit.WordPerf.b",
"TR/Expl.WordPerf.B",
"Trojan[Exploit]/Win32.WordPerf",
"Win32.EXPLOIT.WordPerf.b.kcloud",
"Exploit:Win32/WordPerf.B",
"Trojan.Exploit.WordPerf.B",
"Exploit.Win32.WordPerf.b",
"Trojan.Exploit.WordPerf.B",
"Trojan.Exploit.WordPerf.B",
"Win32.Exploit.Wordperf.Wxrv",
"Exploit.WordPerf!zPzGZ0A1+Q4",
"Trojan.Win32.Exploit",
"W32/WordPerf.B!exploit",
"Win32/Trojan.827"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Original",
"password",
"The",
"main",
"service",
"follows",
"the",
"same",
"structure",
"as",
"the",
"first",
"version",
",",
"the",
"anti-analysis",
"features",
"are",
"primitive",
",",
"only",
"checking",
"the",
"emulator",
"environment",
"without",
"any",
"kind",
"of",
"packing",
"or",
"obfuscation",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Additionally",
",",
"during",
"a",
"period",
"of",
"several",
"days",
",",
"our",
"infected",
"test",
"device",
"was",
"never",
"remotely",
"disinfected",
"by",
"the",
"operators",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Rokku",
"seems",
"to",
"be",
"distributed",
"by",
"a",
"malicious",
"document,",
"which",
"contains",
"a",
"macro",
"that",
"when",
"is",
"executed",
"downloads",
"and",
"runs",
"Rokku."
] | [
3,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"This",
"is",
"another",
"reminder",
"of",
"why",
"users",
"shouldn",
"β",
"t",
"rely",
"on",
"ratings",
"alone",
"to",
"decide",
"whether",
"to",
"trust",
"an",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Vetor.PE",
"Virus.Win32.Virut.1!O",
"W32.Virut.G",
"PE_VIRUX.O",
"W32.Virut.CF",
"Win32/Virut.17408",
"PE_VIRUX.O",
"Win32.Virus.Virut.Q",
"Virus.Win32.Virut.ce",
"Virus.Win32.Virut.hpeg",
"W32.Virut.mzNk",
"Win32.Virut.56",
"Virus.Virut.Win32.1938",
"Win32/Virut.bt",
"Virus/Win32.Virut.ce",
"Win32.Virut.cr.61440",
"TrojanDownloader:MSIL/Tackerkin.A",
"Virus.Win32.Virut.ce",
"Win32/Virut.F",
"Virus.Virut.14",
"W32/Sality.AO",
"Win32/Virut.NBP",
"Trojan-Downloader.MSIL",
"W32/Virut.CE",
"Virus.Win32.VirutChangeEntry.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Technical",
"Analysis",
"XLoader",
"first",
"loads",
"the",
"encrypted",
"payload",
"from",
"Assets/db",
"as",
"test.dex",
"to",
"drop",
"the",
"necessary",
"modules",
"then",
"requests",
"for",
"device",
"administrator",
"privileges",
"."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
1,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"have",
"detected",
"a",
"total",
"of",
"17",
"C",
"&",
"C",
"servers",
"on",
"4",
"different",
"domains",
",",
"which",
"probably",
"means",
"the",
"bad",
"guys",
"are",
"quite",
"familiar",
"with",
"what",
"redundancy",
"is",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Both",
"the",
"loader",
"and",
"dropped",
"class",
"are",
"obfuscated",
"using",
"ProGuard",
",",
"which",
"obfuscates",
"names",
"using",
"alphabet",
"letters",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom.Ryzerlo.A3",
"Trojan.Ransom.HiddenTears.1",
"Ransom_BLOCCATO.SM",
"Ransom.HiddenTear",
"Ransom_BLOCCATO.SM",
"MSIL.Trojan-Ransom.Cryptear.B",
"Trojan.Win32.Filecoder.ethwkz",
"Trojan.Win32.Z.Ransom.211968.EF",
"TrojWare.MSIL.Ransom.Ryzerlo.A",
"Trojan.Encoder.10598",
"Trojan-Ransom.HiddenTear",
"TR/ATRAPS.jnrzk",
"Ransom.HiddenTear/Variant",
"Trojan.Ransom.HiddenTear",
"Trj/GdSda.A",
"MSIL/Filecoder.Y!tr",
"Win32/Trojan.61e"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"implant",
"provides",
"the",
"ability",
"to",
"grab",
"a",
"lot",
"of",
"exfiltrated",
"data",
",",
"like",
"call",
"records",
",",
"text",
"messages",
",",
"geolocation",
",",
"surrounding",
"audio",
",",
"calendar",
"events",
",",
"and",
"other",
"memory",
"information",
"stored",
"on",
"the",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clod232.Trojan.380a",
"Heur.Win32.Veebee.1!O",
"TrojanSpy.VB!WEMPyAgOnlg",
"W32/MalwareF.ZFHU",
"Trojan-Spy.Win32.VB.dwb",
"Trojan.Win32.VB.cpxay",
"Trojan.Win32.A.VB.77932",
"TrojWare.Win32.TrojanSpy.VB.NNW",
"Trojan.DownLoader1.62643",
"Trojan[Spy]/Win32.VB",
"PWS:Win32/Gypthoy.A",
"W32/Risk.FBWB-6710",
"Trojan.VBRA.02824",
"Trojan-Spy.Win32.VB",
"W32/VB.DWB!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"attack",
"was",
"found",
"to",
"heavily",
"rely",
"on",
"RTF",
"exploits",
"and",
"at",
"the",
"time,",
"thought",
"to",
"make",
"use",
"of",
"the",
"PlugX",
"malware",
"family."
] | [
16,
1,
16,
16,
16,
16,
16,
16,
7,
15,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11
] |
[
"HenBox",
"masquerades",
"as",
"apps",
"such",
"as",
"VPN",
"and",
"Android",
"system",
"apps",
"and",
"often",
"installs",
"legitimate",
"versions",
"of",
"these",
"apps",
"along",
"with",
"HenBox",
"to",
"trick",
"users",
"into",
"thinking",
"they",
"downloaded",
"the",
"legitimate",
"app",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Vetor.PE",
"Backdoor.Bot.97496",
"W32.Virut.D",
"Backdoor.Bot.97496",
"Virus.LdPinch.Win32.1",
"W32/Virut.F",
"Backdoor.Bot.D17CD8",
"Win32.Virus.Virut.i",
"W32/Sdbot.ACIH",
"W32.IRCBot",
"PE_VIRUT.D-1",
"Win.Trojan.Virut-16",
"Backdoor.Bot.97496",
"Virus.Win32.Virut.n",
"Backdoor.Bot.97496",
"Virus.Win32.Virut.jxol",
"Backdoor.Win32.A.IRCBot.97792",
"Virus.W32.Virut!c",
"Backdoor.Bot.97496",
"PE_VIRUT.D-1",
"BehavesLike.Win32.Virut.pc",
"Worm.Win32.Kulsibot",
"W32/Sdbot.OGIG-1311",
"Win32/Virut.e",
"Virus/Win32.Virut.n",
"Win32.Virut.n.2600",
"Worm:Win32/Kulsibot.A",
"Virus.Win32.Virut.n",
"Win32/Virut.D",
"Win32/Virut.E",
"Virus.Win32.HanKu.e",
"Virus.Win32.Virut.AT"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Moreover",
",",
"BusyGasper",
"boasts",
"some",
"keylogging",
"tools",
"β",
"the",
"malware",
"processes",
"every",
"user",
"tap",
",",
"gathering",
"its",
"coordinates",
"and",
"calculating",
"characters",
"by",
"matching",
"given",
"values",
"with",
"hardcoded",
"ones",
"."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.BypauTH.Trojan",
"Application.Hacktool.Vncpass.A",
"Trojan-Spy/W32.Vnc.32768",
"NetTool.Win32.VNC!O",
"Tool.VNC.Win32.1",
"Win32.Trojan.WisdomEyes.16070401.9500.9990",
"W32/Tool.PPKE-1202",
"Backdoor.Prorat",
"Application.Hacktool.Vncpass.A",
"not-a-virus:NetTool.Win32.VNC.a",
"Application.Hacktool.Vncpass.A",
"Riskware.Win32.VNC.hsfc",
"Application.Hacktool.Vncpass.A",
"ApplicUnsaf.Win32.NetTool.VNC.A",
"Application.Hacktool.Vncpass",
"Tool.VncBypauth",
"not-a-virus:NetTool.Win32.VNC",
"W32/HackTool.CDN",
"NetTool.VNC.b",
"HackTool[NetTool]/Win32.VNC",
"Application.Hacktool.Vncpass.A",
"not-a-virus:NetTool.Win32.VNC.a",
"Win-AppCare/Vnc.32768",
"HackTool.VNC!Pb5Dm1ZMh30",
"Win32/Virus.NetTool.8e7"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"US",
"defense",
"contractors",
"were",
"only",
"fairly",
"recent",
"targets",
"based",
"on",
"the",
"operation's",
"history,",
"which",
"we",
"traced",
"to",
"spear-phishing",
"in",
"2010."
] | [
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
1,
16,
0
] |
[
"As",
"MainService",
"is",
"the",
"main",
"controller",
",",
"the",
"developer",
"has",
"taken",
"the",
"appropriate",
"actions",
"to",
"keep",
"it",
"functional",
"and",
"running",
"at",
"all",
"times",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"EVENTBOT",
"VERSION",
"0.4.0.1",
"Package",
"Name",
"Randomization",
"In",
"this",
"version",
",",
"the",
"package",
"name",
"is",
"no",
"longer",
"named",
"β",
"com.example.eventbot",
"β",
",",
"which",
"makes",
"it",
"more",
"difficult",
"to",
"track",
"down",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"By",
"now,",
"most",
"of",
"the",
"malware",
"researchers",
"are",
"used",
"to",
"seeing",
"drive-by",
"infections",
"that",
"serve",
"up",
"a",
"handful",
"of",
"malware,",
"from",
"droppers",
"to",
"payloads."
] | [
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
3
] |
[
"Conclusion",
"As",
"our",
"computing",
"increasingly",
"crosses",
"multiple",
"screens",
",",
"we",
"should",
"expect",
"to",
"see",
"threats",
"extending",
"across",
"mobile",
"and",
"desktop",
"environments",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"July",
"20",
"A",
"new",
"zero-day",
"vulnerability",
"(",
"CVE-2015-2426",
")",
"was",
"found",
"in",
"Windows",
",",
"which",
"Microsoft",
"fixed",
"in",
"an",
"out-of-band",
"patch",
"."
] | [
16,
16,
16,
16,
7,
15,
16,
7,
16,
16,
16,
16,
5,
16,
16,
4,
16,
16,
16,
16,
16,
16
] |
[
"However,",
"global",
"security",
"companies",
"are",
"limited",
"in",
"collecting",
"attack",
"information",
"in",
"Korea,",
"and",
"there",
"is",
"also",
"a",
"lack",
"of",
"information",
"about",
"the",
"attacks",
"that",
"Lazarus",
"or",
"Lazarus",
"are",
"suspected",
"of",
"as",
"a",
"small",
"group",
"of",
"threat",
"groups",
"in",
"Korea."
] | [
16,
4,
12,
12,
16,
16,
16,
16,
1,
9,
16,
2,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
1,
16,
6,
16,
6,
16,
16,
16,
16,
6,
14,
14,
14,
14,
14,
16,
2
] |
[
"The",
"decompile",
"method",
"is",
"based",
"on",
"the",
"fact",
"that",
"Android",
"applications",
"are",
"Java-based",
",",
"meaning",
"it",
"is",
"possible",
"to",
"recompile",
"it",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"post",
"does",
"n't",
"follow",
"the",
"chronological",
"evolution",
"of",
"Zen",
",",
"but",
"instead",
"covers",
"relevant",
"samples",
"from",
"least",
"to",
"most",
"complex",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"After",
"libmsy.so",
"decrypts",
"the",
"asset",
"file",
"tong.luo",
",",
"it",
"loads",
"mycode.jar",
"dynamically",
"into",
"FakeSpy",
"β",
"s",
"process",
",",
"as",
"is",
"shown",
"from",
"the",
"output",
"of",
"the",
"β",
"adb",
"logcat",
"β",
"command",
"."
] | [
16,
1,
16,
16,
16,
16,
1,
16,
16,
16,
1,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"ir",
"."
] | [
9,
9,
16
] |
[
"But",
"SamSam",
"isn't",
"the",
"only",
"ransomware",
"out",
"there",
"charging",
"eye-watering",
"amounts",
"to",
"decrypt",
"business",
"servers."
] | [
16,
3,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
5,
13,
13
] |
[
"This",
"variant",
"uses",
"a",
"new",
"UAC",
"bypass",
"method",
"that",
"has",
"been",
"used",
"by",
"the",
"Dridex",
"malware",
"since",
"December,",
"2014."
] | [
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
3,
11,
16,
0,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9882",
"Backdoor.Teambot",
"Trojan.Win32.Kazy.cxkslh",
"Trojan.PWS.Spy.19585",
"Trojan.Kazy.D1E900",
"Backdoor:Win32/Pavica.B!dll",
"Backdoor/Win32.Pavica.R161181"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"Conclusion",
"The",
"case",
"of",
"Asacub",
"shows",
"that",
"mobile",
"malware",
"can",
"function",
"for",
"several",
"years",
"with",
"minimal",
"changes",
"to",
"the",
"distribution",
"scheme",
"."
] | [
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Android",
"Trojan",
"Found",
"in",
"Targeted",
"Attack",
"26",
"MAR",
"2013",
"In",
"the",
"past",
",",
"we",
"β",
"ve",
"seen",
"targeted",
"attacks",
"against",
"Tibetan",
"and",
"Uyghur",
"activists",
"on",
"Windows",
"and",
"Mac",
"OS",
"X",
"platforms",
"."
] | [
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
13,
13,
16,
16
] |
[
"It",
"also",
"drops",
"decoy",
"documents",
"in",
"an",
"attempt",
"to",
"camouflage",
"the",
"attack."
] | [
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
1
] |
[
"The",
"base64-encoded",
"image",
"is",
"then",
"uploaded",
"to",
"an",
"image",
"recognition",
"service",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9821",
"BehavesLike.Win32.Trojan.tc",
"Trojan/Win32.MSILKrypt.C2372735"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"If",
"that",
"part",
"is",
"found",
",",
"the",
"app",
"loads",
"Javascript",
"snippets",
"from",
"the",
"JSON",
"parameters",
"to",
"click",
"a",
"button",
"or",
"other",
"HTML",
"element",
",",
"simulating",
"a",
"real",
"user",
"click",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Trend",
"Micro",
"detects",
"these",
"as",
"ANDROIDOS_XLOADER.HRX",
"."
] | [
4,
12,
16,
16,
16,
1,
16
] |
[
"The",
"first",
"method",
"is",
"to",
"send",
"a",
"specially",
"crafted",
"URL",
"to",
"the",
"target",
"via",
"SMS",
"or",
"email",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9890",
"Backdoor.Win32.Ruledor.c",
"BackDoor.Ruller",
"Downloader.Adload.Win32.15034",
"BehavesLike.Win32.Sural.tc",
"Trojan[Backdoor]/Win32.Ruledor",
"Backdoor:Win32/Ruledor.B",
"Backdoor.Win32.Ruledor.c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"They",
"evade",
"detection",
"by",
"keeping",
"their",
"code",
"simple",
"and",
"flying",
"under",
"the",
"radar."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"speculate",
"that",
"other",
"attacks",
"delivering",
"Bookworm",
"were",
"also",
"targeting",
"organizations",
"in",
"Thailand",
"based",
"on",
"the",
"contents",
"of",
"the",
"associated",
"decoys",
"documents,",
"as",
"well",
"as",
"several",
"of",
"the",
"dynamic",
"DNS",
"domain",
"names",
"used",
"to",
"host",
"C2",
"servers",
"that",
"contain",
"the",
"words",
"Thai",
"or",
"Thailand"
] | [
16,
16,
15,
16,
1,
16,
3,
16,
16,
4,
12,
16,
2,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
1,
9,
9,
16,
16,
16,
16,
2,
16,
2
] |
[
"In",
"2020",
",",
"it",
"appears",
"that",
"TrickBot",
"β",
"s",
"vast",
"bank",
"fraud",
"is",
"an",
"ongoing",
"project",
"that",
"helps",
"the",
"gang",
"monetize",
"compromised",
"accounts",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Autoit.ARV",
"Worm.AutoIt.Helompy.A",
"Trojan.Autoit.ARV",
"Worm.AutoRun.Win32.33975",
"Win32.Trojan.AutoIt.a",
"W32/Trojan2.MFAR",
"W32.SillyDC",
"Win.Trojan.Autoit-1267",
"Worm.Win32.AutoIt.agm",
"Trojan.Autoit.ARV",
"Trojan.Win32.Napad.ijfyd",
"Worm.Win32.A.IM-Sohanad.278196",
"Win32.HLLW.Napad",
"BehavesLike.Win32.YahLover.hc",
"W32/Trojan.MASJ-0546",
"Worm/AutoRun.sfx",
"Worm:Win32/Helompy.A",
"Trojan.Autoit.ARV",
"Worm.Win32.AutoIt.agm",
"HEUR/Fakon.mwf",
"Trojan.Autoit.ARV",
"Trj/CI.A",
"I-Worm.Autoit.GP",
"Worm.Win32.Autorun.aao",
"Win32/Trojan.e4c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"If",
"the",
"user",
"closes",
"the",
"windows",
",",
"they",
"will",
"appear",
"again",
"due",
"to",
"the",
"timer",
"configuration",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.ArchSMS",
"Win32.Trojan.WisdomEyes.16070401.9500.9977",
"Hoax.Win32.ArchSMS.upa",
"Win32.Trojan-psw.Archsms.Pgnh",
"Trojan.Fraudster.307",
"Trojan:Win32/MobicArch.A",
"Hoax.Win32.ArchSMS.upa",
"Win32.Trojan.ArchSMS.D",
"Spyware/Win32.ArchSMS.R32549",
"Hoax.ArchSMS.ge",
"Hoax.Win32.ArchSMS",
"Win32/Trojan.b8b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Pokey.A",
"Trojan.Pokey.A",
"Trojan.Pokey.A",
"WORM_PIKACHU.A",
"W32/Trojan.GNFD-9297",
"W32.Pokey.Worm",
"Win32/Pikachu.32768",
"WORM_PIKACHU.A",
"Win.Worm.Pikachu-2",
"Trojan.Pokey.A",
"Email-Worm.Win32.Pikachu",
"Trojan.Pokey.A",
"Trojan.Win32.Pikachu.enlz",
"I-Worm.Win32.Pikachu",
"Trojan.Pokey.A",
"Worm.Win32.Pikachu.A",
"Trojan.Pokey.A",
"Worm.Pikachu.Win32.2",
"Pokey.a",
"Email-Worm.Win32.Pikachu",
"W32/Trojan2.CSH",
"Worm:Win32/Pokey.A@mm",
"WORM/Pikachu.AuExec",
"Worm[Email]/Win32.Pikachu",
"Worm:Win32/Pokey.A@mm",
"Worm.Pokey",
"Email-Worm.Win32.Pikachu",
"Pokey.a",
"Email-Worm.Pikachu",
"Win32/Pikachu.A",
"I-Worm.Pikachu",
"W32/Pikachu.A!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Derusbi",
"has",
"been",
"widely",
"covered",
"and",
"associated",
"with",
"Chinese",
"threat",
"actors."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14
] |
[
"Conclusions",
"Every",
"day",
",",
"there",
"are",
"hundreds",
"if",
"not",
"thousands",
"of",
"targeted",
"attacks",
"against",
"Tibetan",
"and",
"Uyghur",
"supporters",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"macro",
"will",
"download",
"ransomware",
"or",
"banking",
"malware",
"after",
"execution.",
"JavaScript",
"files,",
"executed",
"by",
"Wscript",
"in",
"Windows,",
"dropping,",
"for",
"example,",
"Locky",
"ransomware."
] | [
16,
3,
16,
16,
3,
16,
3,
11,
16,
16,
1,
9,
16,
16,
1,
16,
5,
16,
16,
16,
3,
11
] |
[
"The",
"image",
"below",
"shows",
"the",
"function",
"that",
"parses",
"the",
"SMS",
"messages",
",",
"decrypts",
"them",
"using",
"the",
"hardcoded",
"RSA",
"private",
"key",
"and",
"executes",
"the",
"commands",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"archive",
"also",
"contained",
"all",
"the",
"necessary",
"codes",
"to",
"target",
"Australian",
"financial",
"institutions",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"OceanLotus,",
"also",
"known",
"as",
"APT32,",
"is",
"believed",
"to",
"be",
"a",
"Vietnam-based",
"APT",
"group",
"that",
"has",
"become",
"increasingly",
"sophisticated",
"in",
"its",
"attack",
"tactics,",
"techniques,",
"and",
"procedures",
"TTPs."
] | [
6,
16,
16,
16,
6,
16,
16,
16,
16,
6,
14,
14,
14,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Worm.SoulClose.E",
"Worm.Win32.VB!O",
"W32.Vb.RC",
"Win32.Worm.SoulClose.E",
"W32/VB.rc",
"Win32.Worm.SoulClose.E",
"PE_SOULOPEN.A",
"Win32.Worm.VB.bc",
"W32/Worm.EGII-1744",
"W32.Fujacks.C",
"Win32/NoelOpus.B",
"PE_SOULOPEN.A",
"Win.Worm.VB-5176",
"Win32.Worm.SoulClose.E",
"Worm.Win32.VB.rc",
"Win32.Worm.SoulClose.E",
"Trojan.Win32.VB.ooto",
"Worm.Win32.A.VB.66048.A[UPX]",
"Worm.W32.Vb!c",
"Win32.Worm.SoulClose.E",
"Virus.Win32.VB.~A",
"Win32.Worm.SoulClose.E",
"Win32.HLLW.Autoruner.2173",
"BehavesLike.Win32.Dropper.tm",
"W32/Worm.VIF",
"Worm/VB.pcu",
"TR/VB.dek.1",
"Worm/Win32.VB",
"Worm.VB.rc.kcloud",
"Worm:Win32/Soulclose.A",
"Worm.Win32.VB.rc",
"Trojan/Win32.HDC.C146348",
"W32/HLLP.Soul.a",
"Worm.VB",
"Win32/AutoRun.VB.HG",
"Win32.Worm.Vb.Eex",
"Worm.Soulclose!T6Z53ODblJg",
"Virus.Worm.Win32.VB",
"W32/VB.MJU!tr",
"Virus.Win32.VBViking.I"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"our",
"case",
",",
"the",
"administrator",
"phone",
"number",
"belongs",
"to",
"a",
"mobile",
"network",
"in",
"Australia",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Way",
"Backdoor.Way.Win32.124",
"W32/Backdoor.HAT",
"Backdoor.Trojan",
"Win32/FakeMS.WOCR",
"Win.Trojan.Dealply-6391261-0",
"Backdoor.Win32.Way.10",
"Trojan.Win32.Way.wibi",
"Trojan.Win32.Z.Way.314010",
"Backdoor.W32.Way!c",
"BackDoor.Way.10",
"Backdoor.Win32.Way",
"W32/Backdoor.EORF-5693",
"Backdoor/NetStar.10",
"Trojan[Backdoor]/Win32.Way",
"Backdoor.Win32.Way.10",
"Win32.Backdoor.Way.Dztb",
"Backdoor.Way!jjTH+E6uXaw",
"W32/Way.A!tr",
"Win32/Backdoor.008"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Sirefef.A",
"Backdoor/ZAccess.trq",
"Win32.Trojan.WisdomEyes.16070401.9500.9982",
"TROJ_SIREFEF.SM",
"Trojan.Win32.ZAccess.tiikz",
"Backdoor.Win32.A.ZAccess.190464.AD",
"Backdoor.Win32.ZAccess.TZS",
"BackDoor.Maxplus.5433",
"Trojan.FakeAV.Win32.243037",
"TROJ_SIREFEF.SM",
"BehavesLike.Win32.ZeroAccess.cc",
"Trojan.Win32.Sirefef",
"Backdoor/ZAccess.dbk",
"Trojan[Backdoor]/Win32.ZAccess",
"Trojan:Win32/Sirefef.P",
"Trojan.Kazy.D1335F",
"Backdoor/Win32.ZAccess.R28242",
"ZeroAccess.ex",
"BScope.Backdoor.Maxplus.2613",
"Rootkit.0Access"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits