tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"Android.Leech.I",
"HEUR:Trojan-Dropper.AndroidOS.Leech.c",
"Android.Packed.5",
"ZIP/Trojan.PXTI-7",
"SPR/ANDR.Jiagu.zhye",
"Troj.Dropper.Androidos!c",
"HEUR:Trojan-Dropper.AndroidOS.Leech.c",
"PUA.AndroidOS.MoneyReward"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"When",
"reversing",
"malware",
"samples,",
"one",
"of",
"the",
"things",
"that",
"we",
"as",
"analysts",
"look",
"for",
"are",
"places",
"where",
"the",
"attackers",
"slip",
"up."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Packed.EZip.a",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TROJ_BIFROS.SMI",
"Win.Trojan.Mybot-4352",
"Trojan.Win32.139069.ebchy",
"Backdoor.Win32.Rbot.~d5",
"TROJ_BIFROS.SMI",
"Trojan/Win32.Unknown",
"Trojan.ManBat.1",
"Troj.W32.Refroso.lnM8",
"TrojanDropper:Win32/Bifrose.F",
"Trojan.Win32.Rbot"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Qhosts",
"Virus.W32.Specx.B!c",
"Heur.Corrupt.PE",
"Trojan[Backdoor]/Win32.IRCBot",
"Worm:Win32/Specx.C.dam#2",
"Trj/CI.A",
"Worm.Win32.Specx",
"Win32/Trojan.bba"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"After",
"analysis,",
"it",
"was",
"confirmed",
"that",
"the",
"sample",
"belonged",
"to",
"the",
"discovered",
"botnet",
"family",
"Kaiji."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11
] |
[
"The",
"many",
"changes",
"we",
"see",
"in",
"the",
"way",
"the",
"attacks",
"are",
"performed",
"show",
"that",
"attackers",
"are",
"heavily",
"experimenting",
"to",
"find",
"the",
"best",
"way",
"of",
"infecting",
"a",
"mobile",
"device",
"and",
"abusing",
"existing",
"functionality",
"to",
"perform",
"successful",
"phishing",
"attacks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"After",
"receiving",
"the",
"rights",
",",
"it",
"sets",
"itself",
"as",
"the",
"default",
"SMS",
"app",
"and",
"disappears",
"from",
"the",
"device",
"screen",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Botnets",
"can",
"make",
"considerably",
"more",
"money",
"than",
"autonomous",
"Trojans",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"orgmediauploader",
"[",
"."
] | [
16,
16,
16,
16
] |
[
"The",
"spam",
"e-mails",
"are",
"enticing",
"users",
"by",
"impersonating",
"well",
"known",
"companies,",
"using",
"their",
"logos",
"and",
"known",
"subject",
"lines",
"to",
"further",
"sell",
"the",
"deception."
] | [
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Admin",
"panel",
"The",
"administration",
"panel",
"shows",
"the",
"application",
"configuration",
",",
"which",
"matches",
"the",
"commands",
"from",
"the",
"C2",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Blogspot",
"page",
"contained",
"a",
"javascript",
"window",
"location",
"that",
"redirected",
"the",
"visitor",
"to",
"a",
"second",
"URL",
"hosted",
"on",
"a",
"dedicated",
"server."
] | [
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
4,
16,
1,
9,
9,
9,
16,
5,
13,
13
] |
[
"In",
"this",
"campaign,",
"it",
"mainly",
"tries",
"to",
"steal",
"Firefox",
"and",
"other",
"credentials."
] | [
16,
16,
6,
16,
16,
16,
16,
1,
5,
16,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9900",
"Win.Spyware.Banker-4198",
"not-a-virus:HEUR:RiskTool.Win32.BitCoinMiner.heur",
"Trojan.Winlock.5377",
"BehavesLike.Win32.Kespo.cc",
"Troj.W32.Delf.l4mb",
"not-a-virus:HEUR:RiskTool.Win32.BitCoinMiner.heur",
"Trojan:Win32/Comine.A",
"Trojan-Downloader.Win32.Banload"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Kryptik.Win32.1331272",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win32.Kryptik.ewfvwr",
"Trojan.DownLoader24.52368",
"BehavesLike.Win32.Trojan.jz",
"Trj/GdSda.A",
"Trojan.MSIL.Crypt"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Razy.DAD41",
"Win32.Trojan.WisdomEyes.16070401.9500.9993",
"PUA.Downloader",
"Trojan.Win32.AVKill.dciepf",
"Trojan.AVKill.30546",
"TR/Kryptik.clfug",
"Trojan:MSIL/Krolol.A",
"Win32/Trojan.b49"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Cloda53.Trojan.5b54",
"W32/Delf.g",
"W32/SillyWorm.CE",
"W32.Miliam@mm",
"Win.Worm.Minima-1",
"Email-Worm.Win32.Delf.g",
"Trojan.Win32.Delf.gmcr",
"W32.W.Delf.g!c",
"Worm.Win32.Delf.g",
"Worm.Delf.Win32.349",
"BehavesLike.Win32.Downloader.lc",
"W32/Worm.NVHR-2426",
"I-Worm/Delf.ls",
"WORM/Atak.L",
"W32/Delf.G@mm",
"Worm[Email]/Win32.Delf",
"Worm/Win32.Xema.N403133190",
"Worm:Win32/Miliam.A@mm",
"Worm.Delf",
"Win32.Worm-email.Delf.Ebqb",
"Email-Worm.Win32.Delf",
"I-Worm/Delf.X"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"MainService",
"is",
"the",
"brain",
"of",
"this",
"spyware",
"and",
"controls",
"almost",
"everything—from",
"stealing",
"the",
"victim",
"'s",
"data",
"to",
"deleting",
"it",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Softwarebundler.Wizrem.FC.2316",
"Win32.Trojan.WisdomEyes.16070401.9500.9991",
"Trojan.Win32.Z.Revirdit.463872",
"Backdoor:MSIL/Revirdit.A",
"Trojan.MSILPerseus.D1F0A1",
"Trj/GdSda.A",
"Win32/Trojan.ed9"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"infokalisi",
"[",
"."
] | [
9,
9,
1,
9
] |
[
"There",
"is",
"a",
"‘",
"protected",
"apps",
"’",
"list",
"in",
"this",
"brand",
"’",
"s",
"smartphones",
",",
"related",
"to",
"a",
"battery-saving",
"concept",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"total",
",",
"there",
"are",
"32",
"different",
"routines",
",",
"each",
"of",
"them",
"implementing",
"a",
"different",
"opcode",
"and",
"some",
"basic",
"functionality",
"that",
"the",
"malware",
"program",
"may",
"execute",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"During",
"a",
"recent",
"compromise",
"assessment,",
"Cylance",
"incident",
"responders",
"and",
"threat",
"researchers",
"uncovered",
"a",
"surreptitious",
"and",
"sophisticated",
"remote",
"access",
"trojan",
"RAT",
"that",
"had",
"been",
"planted",
"and",
"operated",
"by",
"the",
"suspected",
"threat",
"actor."
] | [
16,
16,
16,
16,
16,
4,
12,
12,
16,
4,
12,
16,
16,
16,
16,
16,
3,
11,
11,
11,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Trojan.DPQH-6594",
"Win32/Tnega.aTYcGTB",
"Trojan.Win32.Small.cjn",
"Troj.W32.Small!c",
"TR/Jord.dvwus",
"Trojan:Win32/Mvpaten.A",
"Trojan.Win32.Small.cjn",
"Win32.Trojan.Small.Llqr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Interestingly",
",",
"we",
"uncovered",
"several",
"expired",
"job",
"posting",
"of",
"Android",
"reverse",
"engineer",
"from",
"the",
"actor",
"’",
"s",
"front",
"business",
"published",
"in",
"2018",
"and",
"2019",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"mcpef.apk",
"(",
"SHA256",
":",
"a8e7dfac00adf661d371ac52bddc03b543bd6b7aa41314b255e53d810931ceac",
")",
":",
"The",
"malicious",
"system",
"application",
"downloaded",
"from",
"server",
"(",
"package",
"name",
"–",
"com.android.music.helper",
")",
"."
] | [
1,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16
] |
[
"Targets",
"included",
"a",
"wide",
"array",
"of",
"high-profile",
"entities,",
"including",
"intelligence",
"services,",
"military,",
"utility",
"providers",
"telecommunications",
"and",
"power,",
"embassies,",
"and",
"government",
"institutions."
] | [
16,
16,
16,
16,
16,
16,
4,
12,
16,
4,
12,
12,
12,
12,
12,
12,
12,
12,
16,
4,
12
] |
[
"Beside",
"the",
"obfuscation",
"and",
"the",
"environment",
"checks",
",",
"the",
"malware",
"also",
"has",
"some",
"interesting",
"anti-sandbox",
"mechanisms",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"first",
"part",
"is",
"the",
"target",
"directory",
",",
"the",
"second",
"is",
"a",
"regular",
"expression",
"used",
"to",
"match",
"specific",
"files",
",",
"while",
"the",
"last",
"part",
"is",
"an",
"ID",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"After",
"execution",
"it",
"takes",
"care",
"of",
"restoring",
"the",
"original",
"KernelCallbackTable",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Curiously,",
"the",
"Word",
"document",
"does",
"not",
"contain",
"any",
"macros,",
"or",
"even",
"an",
"exploit."
] | [
16,
1,
9,
9,
16,
16,
16,
16,
1,
16,
16,
16,
3
] |
[
"Attacks",
"on",
"Windows",
"XP",
"allows",
"mobile",
"malware",
"to",
"infect",
"a",
"PC",
"after",
"connecting",
"a",
"smartphone",
"or",
"tablet",
"."
] | [
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Rotexy",
"will",
"perform",
"further",
"actions",
"after",
"it",
"receives",
"the",
"corresponding",
"commands",
":",
"START",
",",
"STOP",
",",
"RESTART",
"—",
"start",
",",
"stop",
",",
"restart",
"SuperService",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"[email protected]",
"Damage.Small",
"W32/Netsky.t@MM",
"W32/Netsky.T@MM",
"I-Worm.Netsky.FJ",
"Netsky.T@mm",
"WORM_NSKY.DAM",
"Win32.NetSky.t",
"Email-Worm.Win32.NetSky.t",
"Email-Worm.Win32.NetSky!IK",
"Heur.Corrupt.PE",
"Win32.HLLM.Netsky.18432",
"Worm/Netsky.#1",
"WORM_NSKY.DAM",
"W32/Netsky.t@MM",
"I-Worm/NetSky.u",
"Worm:Win32/[email protected]#4",
"Email-Worm.Win32.NetSky.t",
"Worm.Mail.Win32.NetSky.daq",
"Email-Worm.Win32.NetSky",
"W32/Netsky.T@mm",
"W32/Netsky.T.worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"And",
"finally",
"it's",
"important",
"to",
"highlight",
"that",
"the",
"RAT",
"itself",
"is",
"not",
"new."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Autoit.CoinMiner.AT",
"Trojan/CoinMiner.jr",
"Win32.Trojan.WisdomEyes.16070401.9500.9906",
"TROJ_GE.DAFBBB38",
"Win32.Trojan.Coinminer.A",
"Troj.W32.Autoit.lWc9",
"Application.Win32.CoinMiner.B",
"Tool.BtcMine.195",
"Trojan.CoinMiner.Win32.1291",
"TR/Comitsproc.gbs",
"Trojan.Autoit.Wirus",
"Win32/Fynloski.AN",
"Worm.Win32.AutoIt"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"At",
"that",
"time",
"of",
"the",
"analysis,",
"it",
"was",
"unclear",
"how",
"victims",
"were",
"exposed",
"to",
"OSX/Keydnap."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.BSKG.dlyohq",
"Trojan.Packed.29890",
"Trojan:Win32/Chanitor.A",
"Trojan/Win32.Zbot.C916515",
"Win32/Injector.BSKG"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"But",
"if",
"your",
"device",
"is",
"not",
"from",
"a",
"Chinese",
"manufacturer",
",",
"then",
"chances",
"that",
"you",
"are",
"a",
"victim",
"of",
"it",
",",
"are",
"very",
"less",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Marijku",
"TROJ_DLOAD.XL",
"W32/Downldr2.FJJI",
"Win32/Tnega.AZ",
"TROJ_DLOAD.XL",
"Trojan.Win32.Downloader.208896.AR",
"Trojan.DownLoad3.7906",
"BehavesLike.Win32.Downloader.dc",
"W32/Downloader.MIEG-4062",
"Trojan.Heur.D.nm6fbaHVu8n",
"Trojan:Win32/Marijku.A",
"Trojan/Win32.Downloader.R6539",
"Win32/BHO.NIZ",
"Trojan.Win32.StartPage.BE"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"spear-phishing",
"email",
"targeting",
"a",
"voice",
"actor",
"YouTuber",
"in",
"South",
"Korea",
"was",
"used",
"to",
"distribute",
"Lumma",
"Stealer",
"malware,",
"according",
"to",
"analysis",
"by",
"S2W",
"TALON",
"and",
"the",
"BBC."
] | [
16,
1,
9,
16,
4,
12,
12,
12,
16,
2,
10,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
4,
12,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Troj.Downloader.W32.Zlob.kYLL",
"W32/Trojan.BZWN",
"Trojan.Farfli",
"RTKT_FARFLI.EOJ",
"Win.Downloader.13148-1",
"TrojWare.Win32.Magania.~E",
"Trojan.DownLoad.47002",
"Downloader.Win32.55183440",
"RTKT_FARFLI.EOJ",
"Virus.Win32.Hmir",
"Win32.Troj.RootkitT.r.16800",
"Backdoor:WinNT/Farfli.B!sys",
"Trojan/Win32.Hmir.C55747",
"Trojan.Graftor.D5437"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Figure",
"10",
"."
] | [
16,
16,
16
] |
[
"Their",
"targets",
"have",
"also",
"included",
"the",
"governments",
"of",
"members",
"of",
"the",
"Commonwealth",
"of",
"Independent",
"States;",
"Asian,",
"African,",
"and",
"Middle",
"Eastern",
"governments;",
"organizations",
"associated",
"with",
"Chechen",
"extremism;",
"and",
"Russian",
"speakers",
"engaged",
"in",
"the",
"illicit",
"trade",
"of",
"controlled",
"substances",
"and",
"drugs."
] | [
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
16,
4,
12,
12,
12,
16,
16,
4,
12,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9545",
"Trojan.Win32.Qhost"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom_Anunau.R002C0DK417",
"Trojan.Win32.RansomHeur.eutbif",
"Ransom_Anunau.R002C0DK417",
"BehavesLike.Win32.Evasion.dh",
"Trojan.Win32.Injector",
"TR/AD.RansomHeur.ibtfr",
"Ransom:Win32/Anunau.A",
"Trojan/Win32.Inject.R211968",
"SScope.Trojan.FakeAV.01695",
"Trj/CI.A",
"Trojan.Symmi.D13583"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.eHeur.Virus02",
"Worm.Seroteb.Win32.16",
"Win32.Trojan.WisdomEyes.16070401.9500.9522",
"W32/Trojan2.MQYM",
"Worm.Win32.Seroteb.g",
"BehavesLike.Win32.Trojan.nm",
"W32/Trojan.QDYC-8978",
"Worm:Win32/Serot.A@mm",
"Trojan.CryptRedol!B3FmVPsxcak",
"Worm.Win32.Serot",
"Trj/CI.A",
"Win32/Trojan.029"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"AT&T",
"Alientlabs",
"researchers",
"has",
"discovered",
"new",
"variant",
"of",
"BlackGuard",
"stealer",
"infections",
"using",
"spear",
"phisng",
"attack."
] | [
4,
12,
12,
16,
16,
16,
3,
16,
3,
11,
16,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Goabeny.A8",
"Trojan.Delf.Win32.88456",
"HT_GRAFTOR_GI070668.UVPM",
"HT_GRAFTOR_GI070668.UVPM",
"Trojan.Win32.Sdbot.ercwiz",
"TrojWare.Win32.Delf.QJW",
"BackDoor.IRC.Sdbot.34285",
"BehavesLike.Win32.Trojan.dc"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"One",
"interesting",
"thing",
"is",
"that",
"it",
"added",
"some",
"other",
"functions",
"you",
"wouldn't",
"expect",
"to",
"try",
"and",
"emphasize",
"it",
"wasn't",
"a",
"malicious",
"tool",
"by",
"including",
"a",
"piano",
"game",
"and",
"fun",
"manager"
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
1,
9
] |
[
"Additionally",
"new",
"endpoint",
"was",
"added",
"that",
"seems",
"related",
"to",
"downloading",
"a",
"module",
"for",
"the",
"malware",
",",
"probably",
"with",
"new",
"features",
"or",
"configuration",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Riskware.Win32.Winnti.erfdhv",
"Win32.Winnti.1",
"HackTool:Win32/Passdash.A!dha",
"Trj/CI.A",
"Win32.Risk.Adware.Ecbn",
"Win32/Virus.Adware.708"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9994",
"W32/Trojan.RBLM-5940",
"Trojan[Dropper]/Win32.Dapato",
"TrojanDownloader:Win32/Dapato.M",
"Trojan.Symmi.DB644",
"Trojan.DR.Dapato!vPidh5qsMRE",
"W32/Onlinegames.QRT!tr",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAdware.CA66",
"not-a-virus:Downloader.Win32.Elex.u",
"Riskware.Win32.WinZipper.eoijjb",
"Adware.Mutabaha.229",
"Pua.337.Technologies",
"RiskWare[Downloader]/Win32.Elex.u",
"PUP.Adware.Elex",
"Adware.Elex.612528.A",
"not-a-virus:Downloader.Win32.Elex.u",
"PUP.Optional.Elex",
"PUA.Downloader!"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.542D",
"Trojan.Zenshirsh.SL7",
"TSPY_MSPOSER.SMZ",
"TSPY_MSPOSER.SMZ",
"Trojan-Dropper.Win32.Daws.dxwt",
"BehavesLike.Win32.Sality.mc",
"Trojan.Win32.Sisron",
"Trojan:Win32/Blihan.A",
"Trj/GdSda.A",
"Trojan.Win32.Sisron.weqa",
"Win32/Trojan.a66"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"a",
"Federal",
"contractor",
"command",
"and",
"control",
"domains,",
"we",
"couldn't",
"help",
"but",
"notice",
"a",
"peculiar",
"related",
"OPM-themed",
"domain,",
"opm-learning[.]org."
] | [
16,
16,
16,
3,
11,
11,
1,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"]",
"205",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"This",
"campaign",
"was",
"sent",
"to",
"millions",
"of",
"recipients",
"across",
"numerous",
"organizations",
"primarily",
"in",
"Australia."
] | [
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
2
] |
[
"Upon",
"creation",
",",
"this",
"activity",
"launches",
"a",
"thread",
"that",
"will",
"loop",
"on",
"a",
"50-second",
"interval",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9966",
"Trojan.Win32.Disfa.eoyfmo"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"Extract",
"call",
"logs",
",",
"contacts",
"and",
"messages",
"from",
"the",
"Skype",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"Both",
"sources",
"can",
"be",
"found",
"here",
"and",
"here",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"New",
"malware",
"is",
"often",
"introduced",
"to",
"underground",
"communities",
"by",
"being",
"promoted",
"and",
"sold",
"or",
"offered",
"as",
"a",
"giveaway",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Malware",
"authors",
"are",
"evolving",
"their",
"techniques",
"to",
"evade",
"network",
"and",
"host-based",
"detection",
"mechanisms."
] | [
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Of",
"those",
",",
"21",
"were",
"still",
"available",
"at",
"the",
"time",
"of",
"discovery",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win32.VBbot!O",
"Trojan.Jorik.Win32.68017",
"Win32.Trojan.WisdomEyes.16070401.9500.9994",
"Trojan.ADH.2",
"Win.Trojan.Dishigy-5",
"Worm.Win32.WBNA.ipa",
"Trojan.VbCrypt.68",
"BehavesLike.Win32.Backdoor.dc",
"Trojan.Win32.Spyeye",
"Worm/Kolab.fyb",
"Worm.Win32.WBNA.ipa",
"Trojan/Win32.Bifrose.C110110",
"Trojan.Injector!36BeufFOyC8",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Other:Android.Reputation.2",
"HEUR:Trojan-Downloader.AndroidOS.Masplot.a",
"Riskware.Android.RemoteCode.epsqsx",
"Troj.Downloader.Androidos!c",
"Android/Masplot.A!tr.dldr",
"Trojan[Downloader]/Android.Masplot",
"HEUR:Trojan-Downloader.AndroidOS.Masplot.a",
"Android-PUP/Metasploit.5b3de",
"a.gray.stdon"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"vulnerability",
"allows",
"a",
"malicious",
"actor",
"to",
"inject",
"arbitrary",
"code",
"during",
"the",
"parsing",
"of",
"SOAP",
"WSDL",
"definition",
"contents."
] | [
16,
7,
16,
16,
6,
14,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Because",
"we",
"hate",
"scammers",
"of",
"all",
"types",
"but",
"especially",
"these",
"guys",
"--",
"tricking",
"people",
"out",
"of",
"their",
"money",
"by",
"lying",
"to",
"them",
"is",
"evil",
"here",
"are",
"some",
"more",
"Tech",
"Support",
"Scam",
"sites,",
"along",
"with",
"some",
"sample",
"screenshots",
"to",
"give",
"you",
"a",
"sense",
"of",
"the",
"different",
"ways",
"they",
"pitch",
"their",
"scams:"
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Mofei.A",
"Trojan.Win32.Mofeir.ruhef",
"W32/Mofei.A",
"W32.Femot.Worm",
"WORM_MOFEI.A",
"Win32.Femot",
"Net-Worm.Win32.Mofeir.a",
"Win32.Worm.Mopfei.B",
"I-Worm.Mofai!mDpfss79YzI",
"Worm.Win32.Mofei.A",
"Win32.Worm.Mopfei.B",
"BackDoor.Mofei",
"BDS/Mofeir.101.B",
"WORM_MOFEI.A",
"Backdoor/Mofei.101",
"Worm.Mofeir.kcloud",
"Backdoor:Win32/Mofeir.1_01",
"Worm.Win32.MoFei.11776",
"Worm/Win32.Mytob",
"Win32.Worm.Mopfei.B",
"W32/Mofei.CGUW-2000",
"Worm.Mofeir",
"Net-Worm.Femot",
"Win32/Mofei.A",
"Net-Worm.Win32.Mofeir",
"W32/MoFei.D!worm",
"Worm/Mofeir.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"However",
",",
"samples",
"don",
"’",
"t",
"have",
"key",
"capabilities",
"to",
"infect",
"innocent",
"apps",
"on",
"victim",
"devices",
"yet",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Last",
"but",
"not",
"least",
",",
"we",
"publish",
"our",
"findings",
"to",
"help",
"Android",
"users",
"protect",
"themselves",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16
] |
[
"How",
"do",
"Android",
"devices",
"become",
"infected",
"?",
"We",
"found",
"traces",
"of",
"the",
"Gooligan",
"malware",
"code",
"in",
"dozens",
"of",
"legitimate-looking",
"apps",
"on",
"third-party",
"Android",
"app",
"stores",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Zenshirsh.SL7",
"Win32.Trojan.FlyStudio.F",
"Riskware.Win32.Adw.dneswh",
"Trojan.MulDrop6.42243",
"BehavesLike.Win32.PWSZbot.tm",
"Trojan.Win32.Seodec",
"TR/Seodec.abne",
"RiskWare[Downloader]/Win32.AdLoad",
"Trojan:Win32/Seodec.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"WhatsApp",
"message",
"capture",
"The",
"service",
"com.serenegiant.service.ScreenRecorderService",
",",
"is",
"invoked",
"by",
"the",
"ScreenRecorderActivity",
"."
] | [
5,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.RustogaLTF.Worm",
"Backdoor/W32.Androm.37888",
"Worm.Kasidet.20653",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win.Trojan.Neutrino-6",
"Backdoor.Win32.Androm.hkrm",
"Trojan.Win32.Neutrino.cwggio",
"BackDoor.Neutrino.1",
"BehavesLike.Win32.VTFlooder.nh",
"Backdoor/Androm.kfh",
"Trojan[Backdoor]/Win32.Androm",
"Worm:Win32/Kasidet.A",
"Backdoor.Win32.Androm.hkrm",
"Backdoor.Neutrino"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.VBKryptPS.Trojan",
"Trojan/W32.VBKrypt.147456.CC",
"Downldr.Umbald.S624840",
"Trojan.VBKrypt.Win32.179340",
"Troj.W32.VBKrypt.tpcC",
"Trojan/VBKrypt.mhte",
"Win32.Trojan.WisdomEyes.16070401.9500.9970",
"W32/VBTrojan.Dropper.4!Maximus",
"Trojan.VBKrypt",
"Trojan.Win32.VBKrypt.xabo",
"Trojan.Win32.Umbra.efkzrr",
"Trojan.Win32.A.VBKrypt.147456.YW",
"BackDoor.Umbra.10",
"W32/VBTrojan.Dropper.4!Maximus",
"Trojan/VBKrypt.hmyy",
"Trojan/Win32.VBKrypt",
"Win32.Troj.VBKrypt.kcloud",
"TrojanDownloader:Win32/Umbald.A",
"Trojan.Symmi.DD60",
"Trojan.Win32.VBKrypt.xabo",
"Trojan/Win32.Jorik.R27694",
"Trojan.Crypt",
"Win32/Delf.AVY",
"W32/VBKrypt.MBSX!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Naturally",
",",
"this",
"resulted",
"in",
"the",
"introduction",
"of",
"malware",
"for",
"mobile",
"platforms",
",",
"especially",
"Android",
"devices",
",",
"including",
"Cerberus",
",",
"Xhelper",
"and",
"the",
"Anubis",
"Banking",
"Trojan",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
3,
16,
3,
16,
16,
3,
16,
16,
16
] |
[
"The",
"malware",
"calls",
"itself",
"Grabit",
"and",
"is",
"distinctive",
"because",
"of",
"its",
"versatile",
"behavior."
] | [
16,
3,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"People",
"who",
"want",
"to",
"know",
"if",
"their",
"Android",
"devices",
"are",
"infected",
"can",
"download",
"the",
"Check",
"Point",
"app",
"here",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16
] |
[
"By",
"analyzing",
"running",
"processes",
"on",
"the",
"infected",
"device",
",",
"it",
"shows",
"that",
"the",
"malware",
"creates",
"a",
"child",
"process",
"of",
"itself",
"to",
"perform",
"the",
"multi-process",
"ptrace",
"anti-debugging",
"technique",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Botter",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"Trojan.Wortrik",
"Email-Worm.Win32.Botter.bv",
"Trojan.Win32.Botter.eroupz",
"Email.Worm.W32!c",
"Win32.HLLW.Phorpiex.222",
"Worm.AutoRun.Win32.131461",
"Worm.Win32.Phorpiex",
"Worm.Botter.j",
"Email-Worm.Win32.Botter.bv",
"Worm:Win32/Dipasik.C!bit",
"Trojan/Win32.Phorpiex.C1326764",
"BScope.Trojan.IRCbot",
"Win32.Worm-email.Botter.Hyy",
"W32/IRCBot.C!worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.VB.Win32.155357",
"Trojan.Symmi.DEA81",
"Win32.Trojan.VB.hs",
"Trojan.Win32.VB.ebwbzr",
"TrojWare.Win32.Downloader.FraudLoad.R",
"BehavesLike.Win32.BadFile.vh",
"W32/VB.GI!tr",
"Trojan:Win32/Tacpud.A",
"Trojan/Win32.VB.C2028217",
"Trj/GdSda.A",
"Win32.Trojan.Vb.Amcv",
"Trojan.VB!9TqYT8CSaE0",
"Trojan.Win32.VB"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.E9A8",
"Trojan.Zusy.D3F56",
"Win32.Trojan.WisdomEyes.16070401.9500.9972",
"W32/Backdoor.RTBO-4851",
"Backdoor.Trojan",
"BKDR_EXPLOIT.AN",
"Win.Trojan.Ploit-1",
"BackDoor.Xconf.21",
"BKDR_EXPLOIT.AN",
"W32/Backdoor.KWF",
"BDS/DarkView.A.3",
"Backdoor:Win32/DarkView.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TROJ_WEVARM.SM",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"TROJ_WEVARM.SM",
"Win.Trojan.Regrun-429",
"Trojan.Win32.KillProc.boctad",
"Trojan.Win32.Z.Regrun.1865432",
"W32.W.AutoRun.l6Zu",
"Trojan.KillProc.12652",
"BehavesLike.Win32.VirRansom.tc",
"TrojanDropper:Win32/Vixemb.A",
"Trojan.KillProc",
"Trj/CI.A",
"Worm.Swimnag!wS08av/7yqU",
"Worm.Win32.Swimnag",
"W32/Swimnag.E!tr",
"Win32/Trojan.1e8"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"OpcJacker",
"is",
"an",
"interesting",
"piece",
"of",
"malware,",
"since",
"its",
"configuration",
"file",
"uses",
"a",
"custom",
"file",
"format",
"to",
"define",
"the",
"stealer's",
"behavior."
] | [
3,
16,
16,
16,
16,
16,
3,
16,
16,
1,
9,
9,
16,
1,
9,
9,
16,
16,
16,
6,
16
] |
[
"Android",
"documentation",
"describes",
"that",
"function",
"as",
"\"",
"a",
"global",
"action",
"."
] | [
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Zbot.Win32.171106",
"Win32.Trojan.Zbot.a",
"Trojan.Zbot",
"TSPY_ZBOT.SMQF",
"Win.Spyware.Zbot-1275",
"Trojan-Spy.Win32.Zbot.wqpm",
"Trojan.Win32.Panda.cqqwdy",
"Trojan-Spy:W32/Zbot.AVTH",
"Trojan.PWS.Panda.11236",
"TSPY_ZBOT.SMQF",
"BehavesLike.Win32.PWSZbot.dh",
"Trojan/Win32.Unknown",
"Trojan.Kazy.D359E8",
"Spyware/Win32.Zbot.R27121",
"SScope.Trojan.FakeAV.01110",
"Win32/Spy.Zbot.AAO",
"Trojan.Win32.Zbot.aaw",
"TrojanSpy.Zbot!A8UvbpHn23U",
"Trojan-Spy.Banker.Citadel",
"W32/Zbot.AT!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"pulse",
"contains",
"indicators",
"related",
"to",
"a",
"phishing",
"campaign",
"launched",
"against",
"the",
"US",
"election",
"system",
"in",
"2016."
] | [
16,
16,
16,
1,
16,
16,
6,
14,
14,
16,
16,
4,
12,
12,
12,
16,
0
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.Dorgam!O",
"Win32.Trojan-Dropper.Dorgam.cgdc",
"Backdoor.Bifrose",
"Trojan.Win32.Clicker.ddouvz",
"Trojan.Win32.A.PSW-QQPass.802816",
"Trojan.Click2.1642",
"BehavesLike.Win32.BadFile.ch",
"TR/Taranis.4038",
"Backdoor:Win32/Babmote.A",
"Troj.W32.Sasfis.lqzi",
"Win32.Trojan.FlyStudio.F",
"TrojanDropper.Dorgam",
"Trojan.DR.Dorgam!Cb+DVu4OzCQ",
"W32/QQPass.YZN!tr.pws"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Modphip.A3",
"Trojan.Graftor.D45BA7",
"Win32.Trojan.WisdomEyes.16070401.9500.9995",
"Win32/Pilleuz.H",
"Packed.Win32.Krap.hm",
"Trojan.Win32.Krap.bsvym",
"Trojan.Packed.20343",
"Trojan.Win32.Yakes",
"Trojan[Packed]/Win32.Krap",
"Trojan:Win32/Modphip.A",
"Packed.Win32.Krap.hm",
"Trojan/Win32.Krap.R35222",
"BScope.P2P-Worm.Palevo",
"W32/Kryptik.DKU!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"stolen",
"information",
"was",
"transmitted",
"back",
"to",
"the",
"threat",
"actors'",
"infrastructure",
"in",
"an",
"encrypted",
"format."
] | [
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
5,
16,
16,
1,
9
] |
[
"Based",
"on",
"reports,",
"as",
"of",
"2014,",
"it",
"has",
"global",
"users",
"of",
"more",
"than",
"490",
"million",
"registered",
"users."
] | [
16,
16,
16,
16,
16,
0,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"sample",
"we",
"analyzed",
"uses",
"an",
"icon",
"very",
"similar",
"to",
"Google",
"Apps",
",",
"with",
"the",
"label",
"\"",
"Google",
"Play",
"Marketplace",
"''",
"to",
"disguise",
"itself",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16
] |
[
"]",
"204",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Proxy.21493",
"BehavesLike.Win32.VBObfus.nm",
"Trojan.Trickster.a",
"Trojan:Win32/Donvba.A",
"Trojan.Jaik.D3551",
"Trojan/Win32.Fareit.C1614161",
"W32/Injector.DGQK!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"phones",
"are",
"sold",
"at",
"Best",
"Buy",
"and",
"Amazon.com",
",",
"among",
"other",
"retail",
"outlets",
"."
] | [
16,
16,
16,
16,
16,
4,
12,
16,
4,
16,
16,
16,
16,
16,
16
] |
[
"It",
"contained",
"a",
"part",
"of",
"recently",
"leaked",
"Zeus",
"source",
"code,",
"which",
"allowed",
"Ramnit",
"to",
"become",
"a",
"banking",
"trojan."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
3,
16,
16,
3,
11,
11
] |
[
"(",
"deprecated",
"in",
"API",
"level",
"21",
")",
"SYSTEM_ALERT_WINDOW",
"-",
"Allows",
"the",
"application",
"to",
"create",
"windows",
"shown",
"on",
"top",
"of",
"all",
"other",
"apps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Garex",
"Trojan.Win64.Wurser.b",
"Troj.Win64.Wurser!c",
"Trojan.Win64.Wurser",
"W64/Trojan.LBAM-3513",
"Trojan.Win64.Wurser.b",
"Backdoor:Win32/Garex.B!dha",
"Trojan.Win64.Wurser",
"Win64.Trojan.Wurser.Peqd",
"Win32/Trojan.7be"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits