tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"month",
"after",
"observing",
"sample",
"2",
",",
"we",
"obtained",
"another",
"which",
"used",
"the",
"same",
"package",
"name",
"as",
"sample",
"2",
"(",
"cn.android.setting",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16
] |
[
"The",
"commands",
"received",
"via",
"GCM",
"can",
"not",
"be",
"blocked",
"immediately",
"on",
"an",
"infected",
"device",
"."
] | [
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Morphick",
"is",
"tracking",
"this",
"malware",
"under",
"the",
"name",
"ScanPOS",
"due",
"to",
"the",
"build",
"string",
"present",
"in",
"the",
"malware."
] | [
4,
16,
16,
16,
3,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"They",
"also",
"state",
"that",
"the",
"code",
"is",
"written",
"from",
"scratch",
"and",
"is",
"not",
"using",
"parts",
"of",
"other",
"existing",
"banking",
"Trojans",
"unlike",
"many",
"other",
"Trojans",
"that",
"are",
"either",
"based",
"completely",
"on",
"the",
"source",
"of",
"another",
"Trojan",
"(",
"such",
"as",
"the",
"leaked",
"Anubis",
"source",
"code",
"that",
"is",
"now",
"being",
"resold",
")",
"or",
"at",
"least",
"borrow",
"parts",
"of",
"other",
"Trojans",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9673",
"Trojan.PWS.Zhui",
"BehavesLike.Win32.VTFlooder.mh",
"Win32.Troj.Wow.q.kcloud",
"Trj/QQFile.D",
"Win32.Trojan-qqpass.Qqrob.Akon",
"Trojan.SystemHijack!vG9DZPEgkqo"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"Always",
"apply",
"critical",
"thinking",
"and",
"consider",
"whether",
"you",
"should",
"give",
"a",
"certain",
"app",
"the",
"permissions",
"it",
"requests",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojandownloader.Halnine",
"Trojan.Zusy.D2FDB",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"Trojan.Win32.DlrSysWrtbased!M.bdazop",
"Trojan.Win32.Z.Zusy.15872.DI",
"TrojanDownloader:Win32/Halnine.A",
"Win32.Trojan.Spy.Swve"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BehavesLike.Win64.Fake.jh",
"Trojan.Win32.Crypt",
"Trojan.PSW.Mimikatz.un",
"TR/AD.Trier.sqhjh",
"Joke:VBS/Trier.A",
"Trj/CI.A",
"VBS/BadJoke.AL",
"Win32/Trojan.7be"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"C2",
"can",
"also",
"use",
"WebSocket",
"as",
"a",
"backup",
"communication",
"channel",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"com",
",",
"lending",
"further",
"credence",
"the",
"remaining",
"two",
"domains",
",",
"gooledriveservice",
"[",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.FakeAV.NRC",
"Trojan.Bampeass.B5",
"Trojan.FakeAV.NRC",
"TROJ64_BAMPEASS.SM",
"Win.Trojan.Fakeav-103064",
"Trojan.FakeAV.NRC",
"Trojan.Win32.Wakme.c",
"Trojan.FakeAV.NRC",
"Variant.Kazy.mAdQ",
"Trojan.FakeAV.NRC",
"Trojan.FakeAV.Win32.316028",
"TROJ64_BAMPEASS.SM",
"W64/Trojan.CZHS-5421",
"Trojan.Fakeav.bg",
"TR/Bampeass.abd",
"Trojan.FakeAV.NRC",
"PUP.BrowseFox/Variant",
"Trojan.Win32.Wakme.c",
"Trojan:Win64/Bampeass.C",
"Trojan.FakeAV.NRC",
"Trj/CI.A",
"Win32.Trojan.Wakme.Akew",
"Win32/Trojan.d9f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Forcepoint",
"Security",
"Labsβ’",
"recently",
"investigated",
"a",
"trojanized",
"RTF",
"document",
"which",
"we",
"tied",
"to",
"the",
"Carbank",
"criminal",
"gang."
] | [
4,
12,
12,
16,
16,
16,
3,
1,
9,
16,
16,
16,
16,
6,
14,
14,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader:PowerShell/Hipolel.A",
"Trojan.Win32.Swrort",
"Win32/Trojan.Downloader.c1c"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"Doc",
"with",
"Macro",
"that",
"downloads",
"Dridex"
] | [
1,
16,
1,
16,
1,
3
] |
[
"Under",
"a",
"model",
"known",
"as",
"sandboxing",
",",
"most",
"Android",
"apps",
"are",
"n't",
"permitted",
"to",
"access",
"passwords",
"or",
"other",
"data",
"available",
"to",
"most",
"other",
"apps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader/W32.Small.8704.HT",
"TrojanDownloader.Tooki",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Backdoor.Trojan",
"Win32/Tydpec.A",
"TROJ_DLOADER.OXH",
"Win.Downloader.16819-1",
"Trojan-Spy.Win32.KeyLogger.aszl",
"Trojan.DownLoader8.62321",
"TROJ_DLOADER.OXH",
"TrojanDownloader:Win32/Tooki.A",
"Trojan-Spy.Win32.KeyLogger.aszl",
"Win32.Trojan-spy.Keylogger.Lpbj"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"throughout",
"the",
"Android",
"package",
"."
] | [
16,
16,
5,
16,
16
] |
[
"Constantly",
"update",
"your",
"Android",
"devices",
"to",
"the",
"latest",
"version",
"to",
"help",
"prevent",
"exploits",
",",
"especially",
"in",
"the",
"case",
"of",
"RCSAndroid",
"which",
"can",
"affect",
"only",
"up",
"to",
"version",
"4.4.4",
"KitKat",
"."
] | [
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Small.16896.DU",
"Trojan-Spy.Win32.Zbot!O",
"Backdoor.Small.D10",
"Trojan.Spy.Zbot",
"W32.Spacefam",
"Win32/Zbot.EUI",
"TSPY_FIFESOCK_BK082A3D.TOMC",
"Win.Trojan.Zbot-13661",
"Trojan.Win32.Zbot.curnd",
"Trojan.Win32.A.Zbot.16896",
"Trojan.Proxy.18997",
"TSPY_FIFESOCK_BK082A3D.TOMC",
"TrojanSpy.Zbot.awmw",
"TR/Spy.ZBot.axcq.3",
"Trojan[Spy]/Win32.Zbot",
"Trojan.Razy.D7DC8",
"Backdoor.W32.IRCBot.liBA",
"Spyware/Win32.Zbot.R2503",
"SScope.Trojan.Zbot.01428"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Sample",
"1",
"may",
"use",
"AES-encrypted",
"strings",
"with",
"reflection",
",",
"while",
"Sample",
"2",
"(",
"submitted",
"on",
"the",
"same",
"day",
")",
"will",
"use",
"the",
"same",
"code",
"but",
"with",
"plaintext",
"strings",
"."
] | [
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Using",
"DGA",
"Domain",
"Generation",
"Algorithm",
"to",
"find",
"the",
"C",
"C",
"Command",
"and",
"Control",
"server"
] | [
16,
5,
13,
13,
13,
16,
16,
1,
9,
9,
9,
9,
9,
9
] |
[
"We",
"discovered",
"a",
"new",
"variant",
"of",
"a",
"Brazilian-made",
"ransomware,",
"Trojan-Ransom.Win32.Xpan,",
"that",
"is",
"being",
"used",
"to",
"infect",
"local",
"companies",
"and",
"hospitals,",
"directly",
"affecting",
"innocent",
"people,",
"encrypting",
"their",
"files",
"using",
"the",
"extension",
".___xratteamLucked",
"and",
"asking",
"to",
"pay",
"the",
"ransom."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
11,
1,
16,
16,
16,
16,
16,
16,
4,
12,
16,
4,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16
] |
[
"These",
"investigations",
"took",
"place",
"during",
"mid-to-late",
"2017,",
"and",
"each",
"bank",
"compromise",
"resulted",
"in",
"a",
"significant",
"amount",
"of",
"stolen",
"funds."
] | [
16,
16,
16,
16,
16,
0,
8,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Molock",
"Win32.Trojan.WisdomEyes.16070401.9500.9974",
"TR/Molock.nylne",
"Trojan.Mikey.DD047",
"PUA.BlackMoon",
"Win32/Trojan.2ce"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"In",
"March",
"2016,",
"Symantec",
"published",
"a",
"blog",
"on",
"Suckfly,",
"an",
"advanced",
"cyberespionage",
"group",
"that",
"conducted",
"attacks",
"against",
"a",
"number",
"of",
"South",
"Korean",
"organizations",
"to",
"steal",
"digital",
"certificates."
] | [
16,
0,
8,
4,
16,
16,
16,
16,
6,
16,
6,
14,
14,
16,
16,
1,
16,
16,
16,
16,
2,
10,
4,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.RansomCryakl.Trojan",
"Trojan.Cryakl",
"Trojan.Ransom.Cryakl",
"Ransom_CRYPICH.SMA",
"Win32.Trojan.WisdomEyes.16070401.9500.9790",
"W32/Trojan.GTXF-0130",
"Ransom_CRYPICH.SMA",
"Trojan-Ransom.Win32.Cryakl.sw",
"Trojan.Win32.Cryakl.drogeo",
"Trojan.Win32.Z.Filecoder.626656",
"Win32.Trojan.Cryakl.Ahys",
"Trojan.Encoder.1041",
"Trojan.Cryakl.Win32.53",
"Trojan-PWS.Win32.Delf",
"Trojan/Cryakl.ap",
"W32.Cryakl",
"TR/FileCoder.bikix",
"Trojan[Ransom]/Win32.Cryakl",
"Trojan-Ransom.Win32.Cryakl.sw",
"Trojan/Win32.Xema.C2455",
"Trojan-Ransom.Cryakl",
"Ransom.TeslaCrypt.OL",
"Trojan.Cryakl!",
"W32/Filecoder.EQ!tr",
"Win32/Trojan.c28"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"When",
"before",
"it",
"had",
"used",
"several",
"different",
"social",
"media",
"platforms",
",",
"it",
"now",
"uses",
"the",
"Twitter",
"platform",
",",
"something",
"FakeSpy",
"has",
"done",
"in",
"its",
"past",
"attacks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Dropped:Backdoor.Rootodor.H",
"Backdoor.W32.SdBot.aop!c",
"Backdoor/SdBot.aop",
"Backdoor.Rootodor.H",
"Backdoor.Sdbot",
"Win.Trojan.SdBot-8443",
"Dropped:Backdoor.Rootodor.H",
"Backdoor.Win32.SdBot.aop",
"Dropped:Backdoor.Rootodor.H",
"Trojan.Win32.SdBot.fptq",
"Dropped:Backdoor.Rootodor.H",
"Dropped:Backdoor.Rootodor.H",
"BackDoor.Rtkit.12",
"Backdoor.SDBot",
"BehavesLike.Win32.Downloader.dc",
"Backdoor/SdBot.cr",
"WORM/SdBot.298496.1",
"Win32.Hack.SdBot.kcloud",
"TrojanDropper:Win32/Srvdrop.A",
"Backdoor.Win32.SdBot.aop",
"Dropped:Backdoor.Rootodor.H",
"Backdoor.SDBot",
"Backdoor.SdBot",
"Win32.Backdoor.Sdbot.Wrgb",
"Worm.SdBot!0ktHNidYgyk",
"Backdoor.Win32.SdBot",
"W32/SDBot.AOP!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Pua.Cpush",
"W32/Trojan.VJJX-8459",
"not-a-virus:AdWare.Win32.Cpush.a",
"Adware.Cpush.Win32.21",
"BehavesLike.Win32.Downloader.fc",
"Trojan.Zusy.D2AB1B",
"not-a-virus:AdWare.Win32.Cpush.a",
"AdWare.Cpush",
"Trj/CI.A",
"Win32/VB.NYC",
"Win32.Adware.Cpush.Dwjc",
"Adware.Cpush!ybdhrKQu3UY",
"Trojan-Dropper.Win32.VB",
"W32/VB.NYC!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.NSIS.Androm.7",
"Ransom.Onion.A",
"Win32.Trojan.WisdomEyes.16070401.9500.9984",
"Packed.NSISPacker!g6",
"Ransom_.97182692",
"Trojan.NSIS.Androm.7",
"Trojan.Win32.Graftor.evkohe",
"Trojan:W32/Gamarue.E",
"Trojan.Inject2.64079",
"Ransom_.97182692",
"BehavesLike.Win32.Ransom.cc",
"Trojan.Win32.Injector",
"W32/Trojan.HJUO-7930",
"Trojan.Graftor.D6B214",
"Ransom.Cerber/Variant",
"Ransom:Win32/Malasypt.A",
"Trojan/Win32.Miuref.R183155",
"Trj/CI.A",
"Trojan.Injector!s1rN7kKLdpI",
"W32/Injector.DDGJ!tr",
"Win32/Trojan.5c1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Version",
"#",
"4",
":",
"April",
"2020",
"β",
"Domain",
":",
"nampriknum.net",
"Following",
"the",
"same",
"pattern",
",",
"this",
"version",
"has",
"some",
"added",
"features",
"and",
"others",
",",
"which",
"were",
"not",
"in",
"use",
",",
"removed",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Analysis",
"Marcher",
"is",
"frequently",
"distributed",
"via",
"SMS",
",",
"but",
"in",
"this",
"case",
",",
"victims",
"are",
"presented",
"with",
"a",
"link",
"in",
"an",
"email",
"."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"For",
"example",
",",
"version",
"9.0.7",
"(",
"2017",
")",
"featured",
"the",
"following",
"set",
"of",
"commands",
":",
"2",
",",
"4",
",",
"8",
",",
"11",
",",
"12",
",",
"15",
",",
"16",
",",
"17",
",",
"18",
",",
"19",
",",
"20",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Vectra",
"Threat",
"Labs",
"researchers",
"have",
"uncovered",
"the",
"activities",
"of",
"a",
"group",
"of",
"individuals",
"currently",
"engaged",
"in",
"targeted",
"attacks",
"against",
"entities",
"in",
"the",
"Middle",
"East."
] | [
4,
12,
12,
12,
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
1,
16,
16,
16,
2,
10,
10
] |
[
"These",
"websites,",
"and",
"the",
"hosted",
"programs,",
"were",
"designed",
"to",
"entice",
"visitors",
"to",
"download",
"and",
"install",
"the",
"programs."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Moreover",
",",
"the",
"Trojan",
"intercepts",
"SMS",
"from",
"the",
"bank",
"that",
"contain",
"one-time",
"passwords",
"and",
"information",
"about",
"the",
"balance",
"of",
"the",
"linked",
"bank",
"card",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.DownLoader23.44275",
"Trojan.Graftor.D69D4B",
"Trojan:Win32/Seepeed.A",
"Trj/CI.A",
"Win32.Trojan.Atraps.Pgmx",
"W32/Kryptik.DNGA!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-PSW.Win32.QQPass!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win.Spyware.59892-2",
"Trojan-PSW.Win32.QQPass.sso",
"Trojan.Win32.QQPass.bcshgi",
"Trojan.Win32.Downloader.75264.M",
"TrojWare.Win32.PSW.QQPass.~Sso",
"Backdoor.PePatch.Win32.16970",
"Trojan[PSW]/Win32.QQPass",
"Troj.PSW32.W.QQPass.toI3",
"Trojan-PSW.Win32.QQPass.sso",
"PWS:Win32/Stealer.M"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Figure",
"9",
":",
"Prompt",
"for",
"application",
"permissions",
"upon",
"installation",
"Figures",
"10",
"and",
"11",
"show",
"the",
"other",
"permission",
"screens",
"for",
"the",
"app",
":",
"Figure",
"10",
"Figure",
"10",
":",
"Part",
"1",
"of",
"the",
"permission",
"screen",
"for",
"the",
"app",
"Figure",
"11",
":",
"Part",
"2",
"of",
"the",
"permission",
"screen",
"for",
"the",
"app",
"Once",
"installed",
"the",
"app",
"will",
"place",
"a",
"legitimate",
"looking",
"icon",
"on",
"the",
"phone",
"β",
"s",
"home",
"screen",
",",
"again",
"using",
"branding",
"stolen",
"from",
"the",
"bank",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Step",
"1",
":",
"Download",
"Bank",
"Austria",
"Security",
"App",
"Download",
"the",
"Bank",
"Austria",
"security",
"app",
"to",
"your",
"Android",
"device",
"."
] | [
16,
16,
16,
16,
5,
13,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"smishing",
")",
"."
] | [
16,
16,
16
] |
[
"The",
"example",
"below",
"steals",
"Facebook",
"data",
":",
"All",
"the",
"other",
"hardcoded",
"applications",
"targeted",
"by",
"the",
"payload",
":",
"Package",
"name",
"Name",
"jp.naver.line.android",
"LINE",
":",
"Free",
"Calls",
"&",
"Messages",
"com.facebook.orca",
"Facebook",
"messenger",
"com.facebook.katana",
"Facebook",
"com.whatsapp",
"WhatsApp",
"com.viber.voip",
"Viber",
"Parser",
"payload",
"Upon",
"receiving",
"a",
"specific",
"command",
",",
"the",
"implant",
"can",
"download",
"a",
"special",
"payload",
"to",
"grab",
"sensitive",
"information",
"from",
"external",
"applications",
"."
] | [
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
5,
13,
13,
13,
13,
13,
1,
5,
13,
1,
5,
1,
5,
1,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"ESET",
"detects",
"the",
"games",
"that",
"install",
"the",
"Trojan",
"as",
"Android/TrojanDropper.Mapin",
"and",
"the",
"Trojan",
"itself",
"as",
"Android/Mapin."
] | [
4,
16,
16,
5,
16,
16,
16,
3,
16,
1,
16,
16,
3,
16,
16,
1
] |
[
"Malware",
"Seen",
"In",
"The",
"Middle",
"East",
"Region",
"Domains",
"used",
"by",
"APT28."
] | [
3,
16,
16,
2,
10,
10,
10,
7,
16,
16,
6
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win.Trojan.Downloader-39183",
"Trojan.Win32.Dwn.whgnl",
"Trojan.Win32.A.Downloader.28672.AMZ",
"Trojan.DownLoader6.15686",
"BehavesLike.Win32.BadFile.mm",
"Trojan[Downloader]/Win32.Tobor",
"Trojan.Graftor.D45EB",
"TrojanDownloader:Win32/Tobor.A",
"TrojanDownloader.Tobor",
"Win32/Trojan.e6d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"today",
"svc",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"The",
"software",
"manages",
"the",
"delivery",
"of",
"firmware",
"updates",
"over-the-air",
",",
"the",
"term",
"used",
"for",
"transmission",
"via",
"a",
"mobile",
"network",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"have",
"detected",
"several",
"malicious",
"programs",
"using",
"GCM",
"for",
"command",
"and",
"control",
"β",
"the",
"widespread",
"Trojan-SMS.AndroidOS.FakeInst.a",
",",
"Trojan-SMS.AndroidOS.Agent.ao",
",",
"and",
"Trojan-SMS.AndroidOS.OpFake.a",
"among",
"others",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
16,
16,
3,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Graftor.Elzob.D2B30",
"BehavesLike.Win32.BadFile.qm",
"HackTool:Win32/WMIShell.A",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Sefnit.Win32.13226",
"Trojan.Win32.Sefnit.ekkxqe",
"Trojan.DownLoader23.50639",
"Trojan.Sefnit.pj",
"Trojan/Win32.Sefnit",
"TrojanDownloader:Win32/Trulop.A",
"Trj/GdSda.A",
"Win32/RA-based.NFG",
"Trojan.Sefnit!apDWbcANJlc"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"BankBot",
"is",
"a",
"family",
"of",
"Trojan",
"malware",
"targeting",
"Android",
"devices",
"that",
"surfaced",
"in",
"the",
"second",
"half",
"of",
"2016."
] | [
3,
16,
16,
3,
11,
11,
11,
16,
5,
13,
16,
16,
16,
0,
8,
8,
8,
8
] |
[
"Let",
"β",
"s",
"compare",
"examples",
"of",
"traffic",
"from",
"Smaps",
"and",
"Asacub",
"β",
"an",
"initializing",
"request",
"to",
"the",
"C",
"&",
"C",
"server",
"with",
"information",
"about",
"the",
"infected",
"device",
"and",
"a",
"response",
"from",
"the",
"server",
"with",
"a",
"command",
"for",
"execution",
":",
"Smaps",
"request",
"Asacub",
"request",
"Decrypted",
"data",
"from",
"Asacub",
"traffic",
":",
"{",
"β",
"id",
"β",
":",
"β",
"532bf15a-b784-47e5-92fa-72198a2929f5β³",
",",
"β",
"type",
"β",
":",
"β",
"get",
"β",
",",
"β",
"info",
"β",
":",
"β",
"imei:365548770159066",
",",
"country",
":",
"PL",
",",
"cell",
":",
"Tele2",
",",
"android:4.2.2",
",",
"model",
":",
"GT-N5100",
",",
"phonenumber",
":",
"+486679225120",
",",
"sim:6337076348906359089f",
",",
"app",
":",
"null",
",",
"ver:5.0.2β³",
"}",
"Data",
"sent",
"to",
"the",
"server",
"[",
"{",
"β",
"command",
"β",
":",
"β",
"sent",
"&",
"&",
"&",
"β",
",",
"β",
"params",
"β",
":",
"{",
"β",
"to",
"β",
":",
"β",
"+79262000900β³",
",",
"β",
"body",
"β",
":",
"β",
"\\u0410\\u0412\\u0422\\u041e\\u041f\\u041b\\u0410\\u0422\\u0415\\u0416",
"1000",
"50β³",
",",
"β",
"timestamp",
"β",
":",
"β",
"1452272572β³",
"}",
"}",
",",
"{",
"β",
"command",
"β",
":",
"β",
"sent",
"&",
"&",
"&",
"β",
",",
"β",
"params",
"β",
":",
"{",
"β",
"to",
"β",
":",
"β",
"+79262000900β³",
",",
"β",
"body",
"β",
":",
"β",
"BALANCE",
"β",
",",
"β",
"timestamp",
"β",
":",
"β",
"1452272573β³",
"}",
"}",
"]",
"Instructions",
"received",
"from",
"the",
"server",
"A",
"comparison",
"can",
"also",
"be",
"made",
"of",
"the",
"format",
"in",
"which",
"Asacub",
"and",
"Smaps",
"forward",
"incoming",
"SMS",
"(",
"encoded",
"with",
"the",
"base64",
"algorithm",
")",
"from",
"the",
"device",
"to",
"the",
"C",
"&",
"C",
"server",
":",
"Smaps",
"format",
"Asacub",
"format",
"Decrypted",
"data",
"from",
"Asacub",
"traffic",
":",
"{",
"β",
"data",
"β",
":",
"β",
"2015:10:14_02:41:15β³",
",",
"β",
"id",
"β",
":",
"β",
"532bf15a-b784-47e5-92fa-72198a2929f5β³",
",",
"β",
"text",
"β",
":",
"β",
"SSB0aG91Z2h0IHdlIGdvdCBwYXN0IHRoaXMhISBJJ20gbm90IGh1bmdyeSBhbmQgbmU=",
"β",
",",
"β",
"number",
"β",
":",
"β",
"1790β³",
",",
"β",
"type",
"β",
":",
"β",
"load",
"β",
"}",
"Propagation",
"The",
"banking",
"Trojan",
"is",
"propagated",
"via",
"phishing",
"SMS",
"containing",
"a",
"link",
"and",
"an",
"offer",
"to",
"view",
"a",
"photo",
"or",
"MMS",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"this",
"way",
",",
"when",
"the",
"service",
"runs",
"during",
"boot",
",",
"the",
"original",
"Windows",
"executable",
"is",
"executed",
"from",
"a",
"different",
"location",
"and",
"it",
"will",
"automatically",
"load",
"and",
"map",
"the",
"malicious",
"DLL",
"inside",
"its",
"address",
"space",
",",
"instead",
"of",
"using",
"the",
"genuine",
"system",
"library",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"β",
".clic",
"β",
"and",
"β",
"k",
"(",
")",
";",
"β",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9972",
"Infostealer.Tarno.B",
"TrojWare.Win32.GhostDEL.~A",
"Trojan.MulDrop4.8101",
"BehavesLike.Win32.Virut.qc",
"Backdoor/Huigezi.2007.aqzf",
"TrojanDownloader:Win32/Ksare.A",
"Trj/CI.A",
"Win32/Trojan.66a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Recent",
"weeks",
"have",
"seen",
"the",
"outing",
"of",
"two",
"new",
"additions",
"to",
"the",
"Duke",
"group's",
"toolset,",
"SeaDuke",
"and",
"CloudDuke."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
3,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Graftor.D20DA2",
"TrojWare.Win32.TrojanDownloader.Delf.SAD",
"BehavesLike.Win32.Dropper.dc",
"TR/Dldr.Vifuls.pwiho",
"TrojanDownloader:Win32/Vifuls.A",
"TScope.Trojan.Delf",
"Win32.Trojan.Badur.Eddg",
"Win32/Trojan.fd8"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Several",
"bots",
"relied",
"heavily,",
"if",
"not",
"exclusively,",
"on",
"systems",
"with",
"weak",
"and/or",
"default",
"passwords",
"to",
"spread."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
5,
16,
1,
9,
9,
9,
16,
16
] |
[
"It",
"even",
"has",
"its",
"own",
"virtual",
"keyboard",
"that",
"supposedly",
"protects",
"the",
"victim",
"from",
"keyloggers",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"other",
"words,",
"the",
"attack",
"targeted",
"organizations",
"that",
"design,",
"build",
"and",
"support",
"industrial",
"solutions",
"for",
"critical",
"infrastructure."
] | [
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
4,
12,
16,
5,
13
] |
[
"While",
"revisiting",
"a",
"Flokibot",
"campaign",
"that",
"was",
"targeting",
"point",
"of",
"sale",
"PoS",
"systems",
"in",
"Brazil",
"earlier",
"this",
"year,",
"we",
"discovered",
"something",
"interesting."
] | [
16,
16,
16,
3,
6,
16,
16,
16,
12,
16,
16,
5,
13,
16,
2,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Finfish.11008",
"Backdoor.Win32.Finfish!O",
"Backdoor.Finfish.r6",
"Backdoor.Finfish.Win32.1",
"Backdoor.W32.Finfish.b!c",
"Backdoor/Finfish.b",
"Backdoor.Finfish!WTL5ZVLbFgg",
"Backdoor.Finfish",
"Win32/Belesak.D",
"TROJ_FINSPY.A",
"Backdoor.Win32.Finfish.b",
"Trojan.Win32.Finfish.wbhuj",
"Trojan.Win32.Z.Finfish.11008[h]",
"Backdoor.Win32.Finfish.B",
"Trojan:W32/FinSpy.B",
"Trojan.NtRootKit.14434",
"TROJ_FINSPY.A",
"W32/Backdoor.CLPB-2084",
"Backdoor/Finfish.a",
"W32/Belesak.D",
"Trojan:WinNT/Spinfy.A",
"Backdoor.Finfish",
"Backdoor.Win32.Finfish.b",
"Win32.Backdoor.Finfish.Iso",
"Backdoor.Win32.Finfish"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"But",
"an",
"investigation",
"now",
"suggests",
"the",
"attack",
"was",
"in",
"fact",
"carried",
"out",
"by",
"a",
"group",
"of",
"Russian",
"hackers."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
6,
14
] |
[
"The",
"Trojan",
"also",
"employs",
"various",
"obfuscation",
"methods",
":",
"from",
"the",
"simplest",
",",
"such",
"as",
"string",
"concatenation",
"and",
"renaming",
"of",
"classes",
"and",
"methods",
",",
"to",
"implementing",
"functions",
"in",
"native",
"code",
"and",
"embedding",
"SO",
"libraries",
"in",
"C/C++",
"in",
"the",
"APK",
"file",
",",
"which",
"requires",
"the",
"use",
"of",
"additional",
"tools",
"or",
"dynamic",
"analysis",
"for",
"deobfuscation",
",",
"since",
"most",
"tools",
"for",
"static",
"analysis",
"of",
"Android",
"apps",
"support",
"only",
"Dalvik",
"bytecode",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Win32.Luder!O",
"Worm.Polkayam.A3",
"Worm.Luder",
"Trojan/Spy.VB.nub",
"TROJ_SPNR.15GB13",
"Backdoor.Trojan",
"Win32/Tnega.VHcOIY",
"TROJ_SPNR.15GB13",
"Win.Trojan.Luder-83",
"Trojan.Win32.Luder.crcdfm",
"W32.W.WBNA.lJLh",
"Worm.Luder.Win32.197",
"Worm/Luder.chm",
"TR/Dynamer.dtc.9853",
"Worm/Win32.Luder",
"Worm:Win32/Polkayam.A",
"Worm/Win32.Luder.C169426",
"Worm.Luder",
"Worm.Luder!PF0ilQ/gy98",
"Worm.Win32.Luder",
"W32/Luder.BQPT!tr",
"Win32/Trojan.cfc"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Third",
",",
"based",
"on",
"the",
"server",
"response",
",",
"the",
"app",
"can",
"also",
"hide",
"its",
"icon",
"and",
"create",
"a",
"shortcut",
"instead",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"SMS",
"grabbing",
":",
"EventBot",
"has",
"the",
"ability",
"to",
"parse",
"SMS",
"messages",
"by",
"using",
"the",
"targeted",
"device",
"β",
"s",
"SDK",
"version",
"to",
"parse",
"them",
"correctly",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"this",
"post",
"we",
"will",
"show",
"links",
"to",
"a",
"recently",
"publicized",
"PoS",
"malware",
"campaign,",
"and",
"describe",
"possible",
"threat",
"motivations",
"behind",
"this",
"or",
"other",
"POS",
"vendor",
"exploitation",
"campaign."
] | [
16,
16,
13,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
7,
15,
15,
6
] |
[
"These",
"hooks",
"are",
"created",
"using",
"the",
"root",
"access",
"and",
"a",
"custom",
"native",
"code",
"called",
"Lmt_INJECT",
",",
"although",
"the",
"algorithm",
"for",
"this",
"is",
"well",
"known",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Worm.TUD",
"Trojan/W32.Hesv.372736.B",
"Worm.Folxrun",
"Win32.Worm.TUD",
"Win32.Worm.TUD",
"Win32.Trojan.VB.ja",
"W32.Rasith",
"Win32/Rasith.A",
"TROJ_FSYSNA_FB120272.UVPM",
"Win32.Worm.TUD",
"Trojan.Win32.Hesv.bjrj",
"Win32.Worm.TUD",
"Trojan.Win32.Autoruner2.ewcqfg",
"Troj.W32.Hesv!c",
"Win32.Worm.TUD",
"Win32.Worm.TUD",
"Win32.HLLW.Autoruner2.29691",
"Trojan.Fsysna.Win32.4334",
"BehavesLike.Win32.Vesenlosow.fm",
"Worm.Win32.Rasith",
"W32/Trojan.SHGP-6241",
"Trojan/Fsysna.atg",
"Trojan/Win32.Fsysna",
"Worm:Win32/Folxrun.A",
"Trojan/Win32.Injector.R167793",
"Trojan.Win32.Hesv.bjrj",
"Trojan.Fsysna",
"Trj/CI.A",
"Win32.Trojan.Hesv.Lkdf",
"Trojan.Fsysna!",
"Win32/Worm.4c0"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Novetta",
"has",
"collected",
"and",
"shares",
"within",
"this",
"report",
"evidence",
"that",
"suggests",
"multiple",
"actors,"
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"botnet",
"is",
"responsible",
"for",
"the",
"majority",
"of",
"Locky",
"and",
"Dridex",
"activity."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
3,
16,
3,
16
] |
[
"As",
"mentioned",
"previously",
",",
"the",
"beaconing",
"is",
"done",
"every",
"60",
"seconds",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
")",
"Calculate",
"the",
"difference",
"between",
"this",
"pointer",
"and",
"the",
"User32",
"base",
"address",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"tool",
"has",
"been",
"used",
"in",
"global",
"phishing",
"attacks",
"and",
"its",
"use",
"has",
"been",
"implicated",
"in",
"a",
"number",
"of",
"notable",
"attacks."
] | [
16,
3,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9
] |
[
"In",
"this",
"case",
"I",
"spent",
"more",
"time",
"analyzing",
"the",
"campaign",
"than",
"I",
"initially",
"planned."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.9E06",
"Win32.Trojan.WisdomEyes.16070401.9500.9767",
"Spyware.Perfect",
"Win32/Gamepass.QHH",
"Trojan-Dropper.Win32.Dorgam.xfl",
"Win32.TenThief.QQPsw_def.fvg",
"Trojan.PWS.Wsgame.36114",
"BehavesLike.Win32.Ransomware.dc",
"Trojan.Win32.QQpass",
"TrojanSpy.FlyStudio.cx",
"TR/QQpass.E.4",
"Trojan-Dropper.Win32.Dorgam.xfl",
"Win32/PSW.QQPass.OHY",
"Win32/Trojan.884"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"malware",
"waits",
"for",
"victims",
"to",
"open",
"the",
"Google",
"Play",
"store",
"and",
"then",
"displays",
"a",
"fake",
"html",
"overlay",
"page",
"asking",
"for",
"credit",
"card",
"information."
] | [
16,
3,
1,
11,
16,
16,
1,
16,
5,
13,
13,
16,
16,
1,
9,
9,
9,
9,
11,
16,
16,
1,
9,
9
] |
[
"On",
"July",
"14,",
"FireEye",
"researchers",
"discovered",
"attacks",
"exploiting",
"the",
"Adobe",
"Flash",
"vulnerability",
"CVE-2015-5122,",
"just",
"four",
"days",
"after",
"Adobe",
"released",
"a",
"patch."
] | [
16,
0,
8,
4,
12,
16,
16,
7,
16,
5,
13,
7,
1,
16,
0,
8,
16,
4,
16,
16,
16
] |
[
"Attacks",
"involving",
"Marcher",
"have",
"become",
"increasingly",
"sophisticated",
",",
"with",
"documented",
"cases",
"involving",
"multiple",
"attack",
"vectors",
"and",
"a",
"variety",
"of",
"targeted",
"financial",
"services",
"and",
"communication",
"platforms",
"[",
"1",
"]",
"[",
"2",
"]",
"."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dynamer.S239831",
"Trojan.RA.Win32.52",
"Trojan.Win32.Reconyc.ejtcsm",
"BehavesLike.Win32.Dropper.vc",
"TR/RemoteAdmin.romkw",
"Trojan/Win32.Scar",
"Trojan.Zusy.D258ED",
"Trojan.Banload",
"Trojan.Win32.ChePro"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"source",
"code",
"appears",
"to",
"have",
"been",
"picked",
"by",
"one",
"or",
"more",
"threat",
"actors",
"and",
"was",
"used",
"to",
"conduct",
"DDoS",
"attacks",
"against",
"Georgia",
"in",
"2008."
] | [
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
1,
9,
16,
2,
16,
0
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanAPT.Moudoor.A8",
"TROJ_BANLOAD.GDV",
"Backdoor.Moudoor",
"TROJ_BANLOAD.GDV",
"Win.Trojan.Downloader-27596",
"Trojan.DownLoader6.13038",
"Trojan-Downloader.Win32.Banload",
"W32/Trojan.MQRX-7833",
"W32.Malware.Heur",
"Trojan[Downloader]/Win32.Unknown",
"Win32.Troj.Undef.kcloud",
"Trojan.Downloader.cmGfaSmx9Rpb",
"TrojanDownloader:Win32/Moudoor.A",
"Win-Trojan/Downloader.46592.GU",
"Trojan.Downloader.46592",
"Win32/TrojanDownloader.Moudoor.A",
"W32/Downloader_a.BWT!tr",
"Win32/RootKit.Rootkit.7e5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.PWS.OnlineGames.KDPO",
"TrojanPWS.Dozmot.D4",
"Infostealer.Gampass",
"W32/Magania.GZ",
"TROJ_GAMEHTI.SMI",
"Trojan.Spy-73883",
"Trojan-GameThief.Win32.OnLineGames.bnkb",
"Trojan.PWS.OnlineGames.KDPO",
"Trojan.PWS.Magania!Tq/DAk7oVGo",
"Virus.Win32.Part.a",
"TrojWare.Win32.PSW.OnlineGames.~BNKB",
"Trojan-PSW:W32/OnlineGames.UBO",
"Trojan.PWS.Gamania.30052",
"TROJ_GAMEHTI.SMI",
"Trojan-GameThief.Win32.WOW!IK",
"Trojan/PSW.OnLineGames.bton",
"Win32.PSWTroj.OnLineGames.kcloud",
"PWS:Win32/Dozmot.D",
"Trojan.Win32.PSWIGames.27176.E",
"Trojan.PWS.OnlineGames.KDPO",
"Trojan/Win32.OnlineGameHack",
"BScope.Trojan.OnlineGames.0825",
"Trojan-PSW.Gampass",
"Win32/PSW.WOW.NQS",
"Trojan.Win32.FakeKsUsr.a",
"Trojan-GameThief.Win32.WOW",
"W32/Onlinegames.OST!tr.pws",
"Trj/Lineage.LNC"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"average",
"user",
"might",
"not",
"have",
"the",
"necessary",
"skills",
"to",
"distinguish",
"legitimate",
"sites",
"from",
"malicious",
"ones",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Upon",
"decryption",
",",
"we",
"can",
"see",
"that",
"the",
"response",
"from",
"the",
"server",
"is",
"a",
"JSON",
"object",
"of",
"EventBot",
"β",
"s",
"configuration",
",",
"which",
"contains",
"C2",
"URLs",
"and",
"a",
"targeted",
"applications",
"list",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Bedep",
"Trojan.Zusy.D3CF93",
"Backdoor.Win32.Bedep.lls",
"Win32.Backdoor.Bedep.Lnob",
"BDS/Bedep.ghjmg",
"Trojan[Backdoor]/Win32.Bedep",
"Backdoor.Win32.Bedep.lls",
"Win-Trojan/Bmdoor.100864",
"Backdoor.Win32.Bedep"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Tofsee",
"is",
"a",
"multi-purpose",
"malware",
"with",
"wide",
"array",
"of",
"capabilities",
"β",
"it",
"can",
"mine",
"bitcoins,",
"send",
"emails,",
"steal",
"credentials,",
"perform",
"DDoS",
"attacks,",
"and",
"more."
] | [
3,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9,
16,
16
] |
[
"These",
"are",
"detected",
"within",
"Alienvault",
"USM",
"by",
"looking",
"for",
"Excel",
"launching",
"Cmd.exe."
] | [
16,
16,
16,
16,
4,
12,
16,
16,
16,
1,
9,
9
] |
[
"In",
"this",
"blog",
",",
"we",
"showed",
"that",
"the",
"threat",
"actor",
"behind",
"the",
"recent",
"FakeSpy",
"campaign",
"is",
"a",
"Chinese-speaking",
"group",
"called",
"β",
"Roaming",
"Mantis",
"β",
"known",
"to",
"operate",
"mainly",
"in",
"Asia",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"impersonates",
"a",
"porn",
"player",
"app",
"or",
"MMS",
"application",
"but",
"without",
"having",
"their",
"functionality",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"that",
"research",
"we",
"discussed",
"two",
"new",
"malware",
"families",
"we",
"named",
"KASPERAGENT",
"and",
"MICROPSIA."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
3,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.FakeAV",
"Trojan.FakeSysDef.Win32.707",
"Trojan/Kryptik.ahre",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TrojWare.Win32.Spy.Zbot.HEUB",
"Trojan.DownLoader5.64514",
"BehavesLike.Win32.Downloader.dc",
"Trojan/SmartFixer.gv",
"W32.Trojan.Fakesysdef",
"TR/FakeSysdef.aqwrb",
"Trojan.Zbot.76",
"Trojan/Win32.FakeAV.R28472",
"FakeAlert-SysDef.ae",
"TrojanFakeAV.FakeSysDef",
"Trojan.Zbot"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Taiwan",
"has",
"been",
"a",
"regular",
"target",
"of",
"cyber",
"espionage",
"threat",
"actors",
"for",
"a",
"number",
"of",
"years."
] | [
2,
16,
16,
16,
16,
16,
16,
6,
14,
14,
14,
11,
16,
0,
8,
8
] |
[
"It",
"is",
"evident",
"that",
"the",
"ultimate",
"goal",
"of",
"this",
"program",
"is",
"to",
"steal",
"information",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"If",
"the",
"user",
"long-presses",
"the",
"icon",
",",
"the",
"name",
"of",
"the",
"app",
"responsible",
"for",
"the",
"activity",
"is",
"revealed",
"(",
"right",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Nekozillot",
"Win32.Trojan.WisdomEyes.16070401.9500.9656",
"Trojan.DownLoader25.61646",
"W32/Trojan.RZHM-5084",
"BDS/RedCap.gyswy",
"Trojan.MSILPerseus.D21311",
"Backdoor:MSIL/Nekozillot.A!bit",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"On",
"later",
"versions",
",",
"specifically",
"iOS",
"12.1.1",
"and",
"iOS",
"12.2",
",",
"the",
"process",
"is",
"different",
"."
] | [
16,
16,
16,
16,
16,
5,
13,
16,
5,
13,
16,
16,
16,
16,
16,
16
] |
[
"Also",
",",
"the",
"longer",
"the",
"delay",
",",
"the",
"lower",
"the",
"risk",
"of",
"the",
"user",
"associating",
"the",
"unwanted",
"ads",
"with",
"a",
"particular",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"seems",
"to",
"be",
"that",
"the",
"actors",
"behind",
"these",
"campaigns",
"are",
"back",
"now",
"and",
"launching",
"again",
"massive",
"spam",
"attacks."
] | [
16,
16,
16,
16,
15,
16,
6,
16,
16,
6,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
Subsets and Splits