tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"Network",
"Security",
"appliances",
"such",
"as",
"Next-Generation",
"Firewall",
"(",
"NGFW",
")",
",",
"Next-Generation",
"Intrusion",
"Prevention",
"System",
"(",
"NGIPS",
")",
",",
"and",
"Meraki",
"MX",
"can",
"detect",
"malicious",
"activity",
"associated",
"with",
"this",
"threat",
"."
] | [
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
5,
13,
13,
13,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Arande.A3",
"Win32.Worm.VB.nr",
"Trojan.Win32.VB.dibs",
"Win32.Trojan.Vb.Wnwj",
"Trojan.VB.Win32.116507",
"Trojan/VB.cujo",
"W32.Heuristic.Dkvt",
"TR/Taranis.2367",
"Trojan.Heur.E914A2",
"Trojan.Win32.VB.dibs",
"Trojan/Win32.VBKrypt.C956342",
"Trojan.VB!SXP1KraqrZw",
"Trojan.VB2"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"cc/TiktokPro",
"."
] | [
9,
9,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Trupto",
"TROJ_INJECTR.BUSZ",
"Trojan.Win32.Buzus.yhkt",
"Trojan.Win32.Buzus.ewiofb",
"TROJ_INJECTR.BUSZ",
"Trojan.Win32.Crypt",
"W32/Trojan.ALBD-0280",
"Trojan.Buzus.cni",
"Trojan:Win32/Trupto.A",
"Trojan.Win32.Buzus.yhkt",
"Trj/CI.A",
"Win32.Trojan.Inject.Auto"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Mobile",
"users",
"are",
"called",
"on",
"to",
"be",
"on",
"top",
"of",
"this",
"news",
"and",
"be",
"on",
"guard",
"for",
"signs",
"of",
"monitoring",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"One",
"chunk",
"contains",
"the",
"entire",
"malware",
"DLL",
"code",
"(",
"without",
"PE",
"headers",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"To",
"distribute",
"the",
"Trojan,",
"cybercriminals",
"log",
"in",
"to",
"the",
"vulnerable",
"devices",
"via",
"the",
"SSH",
"protocol."
] | [
16,
16,
16,
3,
6,
16,
16,
16,
16,
5,
13,
16,
16,
1,
9
] |
[
"Proofpoint",
"researchers",
"originally",
"spotted",
"the",
"MarsJoke",
"ransomware",
"in",
"late",
"August",
"by",
"trawling",
"through",
"our",
"repository",
"of",
"unknown",
"malware."
] | [
4,
12,
16,
16,
16,
3,
11,
16,
16,
0,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"]",
"cendata",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.ReplaceMiKsLT.Fam.RSF",
"Trojan-PWS/W32.Frethoq.34461.C",
"Trojan-GameThief.Win32.Frethoq!O",
"TrojanPWS.Lolyda.BF5",
"Troj.GameThief.W32.OnLineGames.lnFT",
"Trojan/OnLineGames.qbf",
"TROJ_RVERSE.SMI",
"Win32.Trojan-PSW.OLGames.i",
"TROJ_RVERSE.SMI",
"Win32.Trojan-Spy.Lolyda.A",
"Trojan-GameThief.Win32.OnLineGames.ajqgf",
"Trojan.Win32.Gamania.thvvt",
"Trojan.Win32.A.Zbot.34461",
"Trojan.PWS.Gamania.36445",
"BehavesLike.Win32.PWSOnlineGames.nh",
"TR/PSW.Lolyda.bfmna",
"Trojan[GameThief]/Win32.Frethoq",
"PWS:Win32/Lolyda.BF",
"Trojan-GameThief.Win32.OnLineGames.ajqgf",
"Trojan/Win32.OnlineGameHack.R21894",
"BScope.Trojan.OLGames.4521",
"Trojan.Zusy.DBE3",
"Win32/PSW.OnLineGames.QBF",
"Trojan.PSW.Win32.GamePass.a",
"Trojan.PWS.OnLineGames!V9usvrFPqu0",
"Trojan-PWS.Win32.Lolyda",
"W32/OnLineGames.REV!tr",
"Trojan.PSW.Win32.GameOnline.CO"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"msvcr90.dll",
"file",
"is",
"opened",
",",
"read",
",",
"and",
"decrypted",
",",
"and",
"the",
"code",
"execution",
"control",
"is",
"transferred",
"to",
"the",
"RunDll",
"exported",
"routine",
"."
] | [
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"group",
"is",
"known",
"to",
"use",
"custom",
"malware",
"called",
"Daserf,",
"but",
"also",
"employs",
"multiple",
"commodity",
"and",
"custom",
"tools,",
"exploit",
"vulnerabilities,",
"and",
"use",
"social",
"engineering",
"techniques."
] | [
6,
14,
16,
16,
16,
16,
3,
11,
16,
3,
16,
16,
16,
16,
16,
16,
3,
11,
11,
7,
16,
16,
16,
16,
16
] |
[
"The",
"code",
"never",
"informed",
"phone",
"users",
"that",
"it",
"was",
"collecting",
"that",
"data",
",",
"a",
"behavior",
"uniformly",
"viewed",
"by",
"many",
"as",
"a",
"serious",
"security",
"concern",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"com/",
"hxxp",
":",
"//files.spamo",
"[",
"."
] | [
9,
9,
1,
9,
9,
9,
9
] |
[
"Its",
"targets",
"include",
"the",
"military",
"organizations",
"and",
"governments",
"of",
"countries",
"with",
"national",
"interests",
"in",
"the",
"South",
"China",
"Sea,",
"including",
"some",
"within",
"the",
"U.S.",
"defense",
"industrial",
"base."
] | [
16,
16,
16,
16,
4,
12,
16,
4,
12,
12,
16,
16,
16,
16,
2,
10,
10,
10,
16,
16,
16,
16,
2,
10,
10,
10
] |
[
"It",
"may",
"be",
"that",
"these",
"submissions",
"are",
"made",
"from",
"the",
"author",
"’",
"s",
"machine",
",",
"or",
"that",
"they",
"submit",
"it",
"to",
"a",
"detection",
"service",
"that",
"in",
"turn",
"submits",
"to",
"online",
"malware",
"databases",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Once",
"a",
"matching",
"intent",
"is",
"triggered",
",",
"the",
"respective",
"Receiver",
"code",
"will",
"be",
"executed",
",",
"leading",
"to",
"other",
"HenBox",
"behaviors",
"being",
"launched",
",",
"which",
"are",
"described",
"later",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Another",
"important",
"modification",
"is",
"in",
"the",
"message",
"transfer",
"process",
":",
"With",
"this",
"modification",
",",
"an",
"application",
"sends",
"device",
"location",
"coordinates",
"with",
"every",
"message",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Noancooe",
"MSIL.Backdoor.Bladabindi.AM",
"TR/Nanocore.dfari",
"Trojan:MSIL/Noancooe.D!bit",
"Trj/CI.A",
"Worm.Win32.Ainslot"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"FakeSpy",
"package",
"permissions",
"."
] | [
3,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Sasfis.4023296",
"Trojan/Sasfis.bnyn",
"Trojan.Strictor.DEB1C",
"Win32.Trojan.WisdomEyes.16070401.9500.9554",
"Backdoor.Graybird",
"Win.Trojan.Yobdam-4",
"Trojan-Dropper.Win32.Dapato.bwsw",
"Trojan.Win32.Sasfis.diovf",
"Trojan.MulDrop2.58470",
"Backdoor.Yobdam.Win32.845",
"BehavesLike.Win32.BadFile.wc",
"Trojan/Buzus.awfr",
"Trojan/Win32.Sasfis",
"Trojan-Dropper.Win32.Dapato.bwsw",
"Trojan/Win32.Injector.C1773",
"SScope.Trojan.MBRLock.2121",
"Trojan.Sasfis!aSW+l8me7nU"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"YOUR",
"FILES",
"WERE",
"ENCRYPTED."
] | [
1,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Infostealer.Lineage",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"W32/Nilage.XS",
"Infostealer.Lineage",
"Trojan-GameThief.Win32.Nilage.bdm",
"W32.W.Bagle.kZt7",
"Trojan.PWS.Lineage.9841",
"BehavesLike.Win32.Pate.pc",
"Trojan-PWS.Win32.Delf",
"W32/Nilage.KWZM-6493",
"Trojan/PSW.Nilage.auz",
"Trojan[GameThief]/Win32.Magania",
"Trojan-GameThief.Win32.Nilage.bdm",
"Trojan/Win32.OnlineGameHack.R24518",
"PWS-Gamania.dll",
"Infostealer.Lineage",
"MalwareScope.Trojan-PSW.Game.13",
"Trojan.PWS.Nilage!v/lUmVrQ3Ac"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"According",
"to",
"X-Force",
"research,",
"the",
"new",
"banking",
"Trojan",
"emerged",
"in",
"the",
"wild",
"in",
"September",
"2017,",
"when",
"its",
"first",
"test",
"campaigns",
"were",
"launched."
] | [
16,
16,
4,
12,
16,
16,
3,
11,
16,
16,
16,
16,
16,
0,
8,
16,
16,
6,
14,
14,
16,
16
] |
[
"The",
"focus",
"of",
"this",
"blog",
"post",
"is",
"MiKey,",
"a",
"little-known",
"and",
"poorly",
"detected",
"keylogger."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
3
] |
[
"\"",
"Due",
"to",
"the",
"special",
"RAM",
"disk",
"feature",
"of",
"Android",
"devices",
"'",
"boot",
"partition",
",",
"all",
"current",
"mobile",
"antivirus",
"products",
"in",
"the",
"world",
"ca",
"n't",
"completely",
"remove",
"this",
"Trojan",
"or",
"effectively",
"repair",
"the",
"system",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"post",
"will",
"use",
"the",
"PlugX",
"malware",
"as",
"an",
"example",
"PlugX",
"is",
"well",
"known",
"and",
"has",
"had",
"its",
"various",
"iterations",
"analyzed",
"many",
"times,",
"due",
"in",
"part",
"to",
"its",
"ongoing",
"activity",
"and",
"will",
"focus",
"on",
"leveraging",
"metadata",
"from",
"VirusTotal",
"due",
"to",
"it",
"being",
"publicly",
"accessible."
] | [
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.5FA3",
"Trojan.Glox",
"Infostealer.Gampass",
"Packed.Win32.MUPACK.~KW",
"BehavesLike.Win32.Spybot.dc",
"Trojan/Win32.ADH",
"Trj/Pupack.A",
"Win32.Trojan.Xed.Dzkj"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"If",
"the",
"package",
"name",
"of",
"the",
"foreground",
"app",
"is",
"included",
"in",
"the",
"target",
"list",
",",
"an",
"overlay",
"is",
"shown",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"1",
"."
] | [
16,
16,
16
] |
[
"Maktub",
"Locker",
"is",
"another",
"ransomware",
"that",
"comes",
"with",
"a",
"beautifully",
"designed",
"GUI",
"and",
"few",
"interesting",
"features."
] | [
3,
11,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"adds",
"the",
"file",
"extension",
".AnubisCrypt",
"to",
"each",
"encrypted",
"file",
"and",
"sends",
"it",
"to",
"the",
"C2",
"."
] | [
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"checkApps",
":",
"Asks",
"the",
"malware",
"to",
"see",
"if",
"the",
"packages",
"sent",
"as",
"parameters",
"are",
"installed",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Disguised",
"Spyware",
"Uploaded",
"on",
"Google",
"Play",
"Store",
"We",
"identified",
"previously",
"unknown",
"spyware",
"apps",
"being",
"successfully",
"uploaded",
"on",
"Google",
"Play",
"Store",
"multiple",
"times",
"over",
"the",
"course",
"of",
"over",
"two",
"years",
"."
] | [
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"is",
"done",
"by",
"reading",
"the",
"/proc/",
"[",
"pid",
"]",
"/cmdline",
"file",
"."
] | [
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
16,
16
] |
[
"That",
"is",
"why",
"Microsoft",
"has",
"been",
"working",
"to",
"extend",
"its",
"industry-leading",
"endpoint",
"protection",
"capabilities",
"beyond",
"Windows",
"."
] | [
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16
] |
[
"For",
"example",
",",
"going",
"back",
",",
"going",
"home",
",",
"opening",
"recents",
",",
"etc",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Packed.Win32.CPEX-based!O",
"Trojan.Delfinject.16926",
"PWS-LDPinch.a!hv",
"Trojan.Buzus.Win32.2199",
"Trojan/Buzus.rrb",
"TROJ_FAM_0001199.TOMA",
"Win32.Trojan.WisdomEyes.16070401.9500.9967",
"Win32/Lunibot.B",
"TROJ_FAM_0001199.TOMA",
"Win.Trojan.Buzus-2288",
"Packed.Win32.CPEX-based.eq",
"Trojan.Win32.CPEXbased.bejytp",
"Trojan.Win32.Buzus.374868",
"Win32.Trojan.Dovqplay.clht",
"TrojWare.Win32.TrojanDropper.Binder.G",
"BackDoor.Poison.61",
"BehavesLike.Win32.SoftPulse.tc",
"Virus.Win32.DelfInject",
"W32/Trojan2.CYTZ",
"Trojan/Buzus.puv",
"Trojan[Packed]/Win32.CPEX-based",
"Backdoor:Win32/Mielit.A",
"Packed.Win32.CPEX-based.eq",
"Trojan/Win32.Xema.R44960",
"BScope.Binder.Buzus.er",
"W32/Buzus.BZ.worm",
"VirTool.DelfInject!GapcEdmyxw8",
"W32/Injector.fam!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.XinarilD.Trojan",
"Trojan.Zusy.D26766",
"Trojan.Win32.Zusy.exkztw",
"W32/Trojan.HJTJ-8943",
"Trojan/Scar.bmgw",
"TR/Zusy.2726400",
"Trojan:Win64/SvcMiner.A",
"Trojan.Win32.Z.Zusy.2726400.CY",
"Backdoor.Bot",
"Trj/CI.A",
"Trojan.Scar!zCrXbtgxLOk",
"Win32/Trojan.e88"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"this",
"post,",
"we",
"will",
"focus",
"on",
"the",
"mobile",
"part",
"of",
"their",
"operation",
"and",
"discuss",
"in",
"detail",
"several",
"Android",
"and",
"BlackBerry",
"apps",
"they",
"are",
"using."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
5,
16,
5,
13,
16,
16,
16
] |
[
"Unit",
"42",
"researchers",
"identified",
"a",
"new",
"OS",
"X",
"Trojan",
"associated",
"with",
"the",
"Sofacy",
"group",
"that",
"we",
"are",
"now",
"tracking",
"with",
"the",
"Komplex'",
"tag",
"using",
"the",
"Palo",
"Alto",
"Networks",
"AutoFocus",
"threat",
"intelligence",
"platform."
] | [
4,
12,
12,
16,
16,
16,
5,
13,
3,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
4,
12,
12,
5,
13,
13,
13
] |
[
"We",
"are",
"accustomed",
"to",
"seeing",
"this",
"gate",
"operate",
"directly",
"from",
"typical'",
"compromised",
"websites,",
"but",
"not",
"so",
"much",
"from",
"ad",
"serving",
"ones."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9959",
"Trojan.Win32.Yuzi.euhfho",
"Backdoor.Yuzi",
"W32/Trojan.UPLJ-0202",
"BDS/Yuzi.lbwpa",
"Trojan.Win32.Z.Ursu.91648",
"Backdoor:MSIL/Yuzi.A",
"Trj/GdSda.A",
"Win32/Trojan.fd2"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"addition",
"to",
"Russia,",
"targeted",
"regions",
"include",
"neighboring",
"countries",
"such",
"as",
"Mongolia,",
"Belarus,",
"and",
"other",
"European",
"countries."
] | [
16,
16,
16,
2,
16,
16,
16,
16,
2,
16,
16,
2,
10,
16,
16,
2,
10
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Klevate.S3",
"Trojan.Webprefix.Win32.62419",
"Trojan.Dropper.104",
"Win32.Trojan.Webprefix.a",
"W32/WebPrefix.A",
"Trojan.Win32.Webprefix.crgiyt",
"Backdoor.W32.Androm.mCpQ",
"TrojWare.Win32.Sisron.C",
"BackDoor.Bulknet.1328",
"BehavesLike.Win32.Trojan.cc",
"W32/Application.KRYM-8973",
"TrojanDownloader.Klevate.a",
"Win32.Trojan-Dropper.Dlpro.A",
"Trojan/Win32.Zbot.R94414",
"Win32/Webprefix.D",
"W32/Webprefix.B!tr",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"For",
"example",
",",
"if",
"an",
"infected",
"device",
"is",
"connected",
"to",
"a",
"public",
"Wi-Fi",
"network",
"any",
"other",
"host",
"will",
"be",
"able",
"to",
"obtain",
"a",
"terminal",
"on",
"the",
"device",
"without",
"any",
"form",
"of",
"authentication",
"or",
"verification",
"by",
"simply",
"connecting",
"to",
"the",
"port",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"is",
"therefore",
"impossible",
"to",
"decode",
"the",
"communication",
"if",
"one",
"wasn't",
"listening",
"right",
"from",
"its",
"beginning."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Banker.Win32.BHO!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9988",
"Backdoor.Ratenjay",
"Trojan-Downloader.Win32.VB.ifws",
"Trojan.DownLoader5.54023",
"Trojan.Kazy.DE581",
"Trojan-Downloader.Win32.VB.ifws",
"Downloader/Win32.Banload.C62226",
"Trojan-Downloader.Win32.Bancos"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"new",
"malware",
"appears",
"to",
"be",
"linked",
"to",
"the",
"infamous",
"Wolf",
"Research",
"organization",
"and",
"targets",
"Android",
"devices",
"located",
"in",
"Thailand",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
5,
16,
16,
16,
16,
16
] |
[
"So",
",",
"what",
"can",
"you",
"do",
"to",
"protect",
"yourself",
"from",
"this",
"stealthy",
"beast",
"?",
"1",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"EventBot",
"uses",
"multiple",
"methods",
"to",
"exploit",
"accessibility",
"events",
"for",
"webinjects",
"and",
"other",
"information",
"stealing",
"purposes",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"today",
":",
"Som",
"Tum",
"We",
"also",
"identified",
"comments",
"in",
"Thai",
"on",
"the",
"C2",
"infrastructure",
"mentioned",
"in",
"the",
"previous",
"chapter",
":",
"MALWARE",
"DenDroid",
"The",
"Android",
"malware",
"is",
"based",
"on",
"the",
"DenDroid",
"Android",
"malware",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
5,
16,
16,
16,
16,
16,
3,
16,
16,
16
] |
[
"According",
"to",
"our",
"research",
",",
"TrickMo",
"is",
"still",
"under",
"active",
"development",
"as",
"we",
"expect",
"to",
"see",
"frequent",
"changes",
"and",
"updates",
"."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"it",
"Firenze",
"server4fi.exodus.connexxa",
"[",
"."
] | [
9,
9,
16,
1,
9,
9
] |
[
"The",
"Zen",
"trojan",
"does",
"not",
"implement",
"any",
"kind",
"of",
"obfuscation",
"except",
"for",
"one",
"string",
"that",
"is",
"encoded",
"using",
"Base64",
"encoding",
"."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Based",
"on",
"our",
"KSN",
"statistics",
",",
"there",
"are",
"several",
"infected",
"individuals",
",",
"exclusively",
"in",
"Italy",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/HLLW.Std.B",
"Worm/STD.B",
"W32/Std.18437",
"Win32/HLLP.Std.B",
"Worm.STD.A",
"I-Worm.STD.B.nw5",
"Email-Worm.Win32.STD.B",
"I-Worm/STD.b",
"Email-Worm.Win32.Std.B",
"W32/HLLW.Std.B"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"It",
"is",
"unclear",
"if",
"the",
"remote",
"server",
"is",
"capable",
"of",
"solving",
"the",
"CAPTCHA",
"image",
"automatically",
"or",
"if",
"this",
"is",
"done",
"manually",
"by",
"a",
"human",
"in",
"the",
"background",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"end",
"payload",
"that",
"was",
"installed",
"is",
"the",
"HttpBrowser",
"RAT,",
"known",
"to",
"be",
"used",
"by",
"the",
"Chinese",
"group",
"in",
"previous",
"targeted",
"attacks",
"against",
"governments."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
1,
3,
16,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
1,
16,
4
] |
[
"This",
"Trojan",
"is",
"interesting",
"due",
"to",
"its",
"ability",
"to",
"steal",
"logins,",
"passwords,",
"and",
"other",
"confidential",
"data",
"by",
"displaying",
"fraudulent",
"authentication",
"forms",
"on",
"top",
"of",
"any",
"applications."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
1,
9,
16,
1,
9,
9,
16,
16,
16,
16,
16,
5
] |
[
"It",
"appears",
"the",
"purpose",
"of",
"the",
"new",
"Disttrack",
"samples",
"were",
"solely",
"focused",
"on",
"destruction,",
"as",
"the",
"samples",
"were",
"configured",
"with",
"a",
"non-operational",
"C2",
"server",
"to",
"report",
"to",
"and",
"were",
"set",
"to",
"begin",
"wiping",
"data",
"exactly",
"on",
"2016/11/17",
"20:45."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
1,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
16,
0,
8
] |
[
"Kazuar",
"includes",
"a",
"highly",
"functional",
"command",
"set,",
"which",
"includes",
"the",
"ability",
"to",
"remotely",
"load",
"additional",
"plugins",
"to",
"increase",
"the",
"Trojan's",
"capabilities."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FakeSvchostsysLnrA.Trojan",
"Win32.Trojan.WisdomEyes.16070401.9500.9849",
"Trojan.Win32.Downloader.40960.TR",
"Trojan.Win32.Swisyn",
"W32/Trojan.UTND-0495",
"Downloader/Win32.OnlineGameHack.R3893",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"However,",
"many",
"of",
"these",
"malware",
"are",
"fileless",
"only",
"while",
"entering",
"a",
"user's",
"system,",
"as",
"they",
"eventually",
"reveal",
"themselves",
"when",
"they",
"execute",
"their",
"payload."
] | [
16,
16,
16,
16,
3,
16,
3,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Skeeyah.9109",
"Trojan.Injector",
"BKDR_RMTSVC.V",
"W32/Trojan.FQOB-6520",
"BKDR_RMTSVC.V",
"Trojan.Win32.Pincav.darg",
"Trojan.Win32.Pincav.dmwojx",
"Troj.W32.Pincav!c",
"Trojan.Inject1.50635",
"Trojan.Pincav.Win32.24903",
"BehavesLike.Win32.Dropper.gc",
"Trojan.Pincav.um",
"Trojan.Win32.Pincav.darg",
"Backdoor:Win32/Rmtsvc.C!bit",
"Trojan.Pincav",
"Win32.Trojan.Pincav.Akpm",
"Trojan.Pincav!MRbJOfrjW/0",
"Backdoor.Win32.RmtSvc",
"W32/Pincav.B!tr",
"Win32/Trojan.84c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Hupigon.Win32.133953",
"Win32.Trojan.WisdomEyes.16070401.9500.9985",
"W32/QQRob.LP",
"Trojan.PWS.QQPass",
"Win32/AdClicker.UB",
"Backdoor.Win32.Hupigon.olbg",
"Trojan.Win32.Hupigon.eajxbh",
"Trojan.PWS.Qqrobber.155",
"trojan.win32.dorv.a",
"PWS-Gamania.dll",
"W32/QQRob.TWJB-5358",
"Trojan/PSW.QQRobber.iu",
"DR/PSW.QQRob.V.2",
"Trojan[Backdoor]/Win32.Hupigon",
"Trojan.Heur.PT.E044E0",
"Trojan/Win32.Pwstealer.C63180",
"PWS-Gamania.dll",
"Win32/PSW.QQRob.NAH",
"Backdoor.Win32.Hupigon",
"Win32/Cekar.G",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"sample",
"displayed",
"ads",
"from",
"various",
"sources",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Method",
"onPostExecute",
":",
"to",
"handle",
"instructions",
"from",
"remote",
"C2",
"Figure",
"6",
"shows",
"an",
"example",
"response",
"sent",
"back",
"from",
"one",
"C2",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Content",
"of",
"bdata.xml",
"file",
":",
"It",
"can",
"be",
"added",
"to",
"the",
"/system/etc/sysconfig/",
"path",
"to",
"allowlist",
"specified",
"implant",
"components",
"from",
"the",
"battery",
"saving",
"system",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"As",
"spotted",
"by",
"FireEye",
"on",
"2015-04-17,",
"Angler",
"EK",
"is",
"now",
"taking",
"advantage",
"of",
"a",
"vulnerability",
"patched",
"with",
"the",
"last",
"version",
"of",
"Flash",
"Player",
"17.0.0.169"
] | [
16,
16,
16,
4,
16,
0,
6,
14,
16,
16,
16,
16,
16,
16,
7,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
[
"In",
"the",
"first",
"of",
"our",
"series",
"on",
"the",
"dark",
"web,",
"Cyble",
"uncovered",
"a",
"new",
"strain",
"of",
"InfoStealer",
"malware",
"targeting",
"Cryptocurrency",
"users",
"via",
"phishing",
"sites",
"and",
"YouTube",
"channels,",
"as",
"well",
"as",
"the",
"source",
"code",
"and",
"GitHub",
"repository."
] | [
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
4,
16,
16,
3,
11,
16,
3,
11,
16,
4,
12,
16,
1,
9,
16,
4,
12,
16,
16,
16,
1,
9,
9,
16,
5,
13
] |
[
"This",
"newest",
"entry",
"seems",
"to",
"indicate",
"that",
"these",
"changes",
"won",
"’",
"t",
"be",
"stopping",
"soon",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"April",
"2017,",
"the",
"Cisco",
"Talos",
"team",
"disclosed",
"the",
"Scarcruft",
"group's",
"proprietary",
"tool,",
"ROKRAT,",
"a",
"malware",
"that",
"has",
"been",
"continuously",
"modified",
"and",
"used",
"by",
"the",
"group",
"to",
"this",
"day."
] | [
16,
0,
8,
16,
4,
12,
12,
16,
6,
14,
14,
16,
16,
3,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
0
] |
[
"com.xiaomi.smarthome.receive_alarm",
"Received",
"notifications",
"from",
"Xiaomi",
"’",
"s",
"smart",
"home",
"IoT",
"devices",
"."
] | [
1,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16
] |
[
"Its",
"malicious",
"code",
"is",
"located",
"in",
"a",
"Mach-O",
"object",
"file",
"that",
"was",
"repackaged",
"into",
"some",
"versions",
"of",
"Xcode",
"installers."
] | [
16,
3,
11,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Win32.VB!O",
"TROJ_GE.C2A90427",
"Multi.Threats.InArchive",
"W32/Rewdulon.A",
"TROJ_GE.C2A90427",
"Win.Trojan.Dentenspy-1",
"Trojan.Win32.VB.pbucu",
"Trojan.WinSpy.1721",
"Trojan.VB.Win32.74988",
"W32/Rewdulon.RWFU-0950",
"TrojanSpy.VB.eqx",
"TR/Proxy.VB.mm",
"Trojan[Proxy]/Win32.VB",
"Backdoor:Win32/Rewdulon.A",
"Trojan.Heur.VP2.EA6021",
"Trojan/Win32.Winspy.R17397",
"TrojanProxy.VB",
"Win32/Spy.VB.NPF",
"Trojan.PR.VB!L9iJM/+WFQY",
"Trojan-Proxy.Win32.VB",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Android.Trojan.FakeInst.L",
"Android.FakeNotify.A",
"Android.Trojan.FakeInst.L",
"Android.Trojan.FakeInst.L",
"HEUR:Trojan-SMS.AndroidOS.Opfake.bo",
"A.H.Pay.Emugo.L",
"Trojan.Android.Opfake.dtqjss",
"Android.Malware.Trojan",
"Trojan:Android/FakeNotify.A",
"Trojan[SMS]/Android.Opfake",
"Android.Trojan.FakeInst.L",
"HEUR:Trojan-SMS.AndroidOS.Opfake.bo",
"Android-Trojan/SmsSend.837f",
"Trojan.AndroidOS.FakeInst.D",
"Trojan.AndroidOS.MalCrypt"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"new",
"spear",
"phishing",
"campaign",
"is",
"targeting",
"Saudi",
"Arabia",
"governmental",
"organizations."
] | [
16,
16,
6,
14,
14,
16,
16,
2,
10,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Graftor.D25EAD",
"Win32.Trojan.WisdomEyes.16070401.9500.9841",
"Backdoor.Trojan",
"BKDR_SMALL.W",
"Win.Trojan.Coreshell-1",
"Trojan.Win32.Metlar.hmosd",
"Trojan.Click2.7627",
"BKDR_SMALL.W",
"BDS/Metlar.A",
"Backdoor:Win32/Metlar.A",
"W32/Small.W!tr.bdr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Blackmail.Worm",
"Win32.Worm.Killav.GR",
"Worm/W32.Nyxem.65024.B",
"Email-Worm.Win32.Nyxem!O",
"Worm.Nyxem",
"W32/MyWife.d@MM!M24",
"W32/VB.bi",
"WORM_NYXEM.E",
"Win32.Worm.VB.sy",
"W32/Kapser.A@mm",
"W32.Blackmal.E@mm",
"Win32/Blackmal.F!CME24",
"WORM_NYXEM.E",
"Win.Worm.Nyxem-7",
"Email-Worm.Win32.Nyxem.e",
"Win32.Worm.Killav.GR",
"Trojan.Win32.Nyxem.wcrgf",
"W32.W.Nyxem.lNe6",
"Win32.Worm-email.Nyxem.Syhr",
"Win32.Worm.Killav.GR",
"Worm.Win32.VB.NEI",
"Email-Worm:W32/Nyxem.E",
"BehavesLike.Win32.Worm.kc",
"W32/Kapser.KOCX-1196",
"I-Worm/VB.g",
"WORM/KillAV.GR",
"Worm[Email]/Win32.Nyxem",
"Worm:Win32/Mywife.E@mm!CME24",
"Win32.Worm.Killav.GR",
"I-Worm.Win32.Nyxem.E",
"Win32.Worm.Killav.GR",
"Worm/Win32.Nyxem.R67250",
"Win32.Worm.Killav.GR",
"Email-Worm.VB",
"Win32/VB.NEI",
"Worm.P2P.VB.CIL!CME-24",
"Win32.Worm.Killav.GR",
"W32/Nyxem.E@mm",
"W32/Tearec.A.worm!CME-24",
"Trojan.Win32.KillAV.AG"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"AIT:Trojan.Nymeria.219",
"Trojan.Fsysna",
"AIT:Trojan.Nymeria.219",
"W32/Trojan.KHZX-2886",
"Trojan.Win32.Fsysna.epqb",
"AIT:Trojan.Nymeria.219",
"Trojan.Win32.Fsysna.eusaby",
"AIT:Trojan.Nymeria.219",
"AIT:Trojan.Nymeria.219",
"Trojan.Fsysna.Win32.15287",
"Trojan.Win32.Autoit",
"TR/Fsysna.vdzaj",
"AIT:Trojan.Nymeria.219",
"Trojan.Win32.Fsysna.epqb",
"Trojan:Win32/Enotdap.A",
"Trojan/Win32.Fsysna.C2239375",
"Trj/CI.A",
"Win32.Trojan.Fsysna.Iiu",
"W32/Autoit.CK!tr.spy",
"Win32/Trojan.623"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"April,",
"the",
"new",
"Infostealer",
"family",
"of",
"Spanish",
"origin",
"was",
"first",
"noted",
"targeting",
"users",
"in",
"the",
"U.S.",
"and",
"Mexico."
] | [
16,
0,
16,
16,
3,
11,
16,
2,
10,
16,
16,
16,
4,
12,
16,
2,
10,
16,
2
] |
[
"The",
"operation",
"uses",
"known",
"and",
"patched",
"exploits",
"to",
"deliver",
"a",
"custom",
"backdoor",
"known",
"as",
"KeyBoy."
] | [
6,
14,
16,
16,
16,
7,
15,
16,
16,
16,
16,
11,
16,
16,
3
] |
[
"It",
"was",
"late",
"2018",
"when",
"Riltok",
"climbed",
"onto",
"the",
"international",
"stage",
"."
] | [
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16
] |
[
"The",
"variant",
"is",
"highly",
"targeted,",
"digitally",
"signed,",
"and",
"exfiltrates",
"stolen",
"payment",
"card",
"data",
"over",
"DNS."
] | [
16,
3,
16,
1,
9,
9,
9,
16,
1,
9,
9,
9,
9,
16,
5
] |
[
"]",
"top/",
"Oct",
"17",
",",
"2017",
"hxxp",
":",
"//online.bankaustria.at.id87721",
"[",
"."
] | [
9,
9,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dropper.Snuff.A",
"Win32.TrojanDropper.Snuff.A.2",
"Trojan/Dropper.FC.a",
"Trojan.DR.FC!ID4WOR5KQxg",
"Win32/TrojanDropper.FC.A",
"Backdoor.Trojan.dr",
"W32/FC.Y",
"Win32/TrojanRunner.I",
"TROJ_DROPPER.ACU",
"Win32.TRFC.A",
"Trojan-Dropper.Win32.FC.a",
"Trojan.Dropper.Snuff.A",
"Virus.Win32.Trojano.421!IK",
"TrojWare.Win32.TrojanDropper.FC.A",
"Trojan.Dropper.Snuff.A",
"BackDoor.Bifrost.14965",
"TR/FC.A",
"TROJ_DROPPER.ACU",
"TrojanDropper.Win32.FC",
"TrojanDropper:Win32/Snuff.A",
"Trojan.Win32.FC.21040",
"Trojan.Dropper.Snuff.A",
"Dropper/FC.4096",
"Trojan-Dropper.Win32.FC.a",
"Backdoor.Trojan",
"Harm.SysCrash",
"Virus.Win32.Trojano.421",
"W32/Fc.A!tr",
"Dropper.Tiny.K",
"Trj/MultiDrp.AF"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Mauvaise.SL1",
"Trojan.Zusy.D3A031",
"Trojan.Kwampirs",
"TROJ_KWAMPIRS.SMJK",
"Trojan.Win32.Bedep.az",
"TROJ_KWAMPIRS.SMJK",
"BehavesLike.Win32.BadFile.dm",
"Trojan.Win32.Kwampirs",
"Trojan.Bedep.u",
"TR/Crypt.ZPACK.sfqtf",
"Trojan.Win32.Bedep.az",
"Trojan/Win32.Bedep.R199961",
"Trojan.Bedep",
"Trojan.Injector",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"When",
"done",
",",
"the",
"bot",
"is",
"functional",
"and",
"ready",
"to",
"receive",
"commands",
"and",
"perform",
"overlay",
"attacks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"From",
"these",
"reports,",
"we",
"know",
"that",
"the",
"group",
"uses",
"an",
"abundance",
"of",
"tools",
"and",
"tactics,",
"ranging",
"across",
"zero-day",
"exploits",
"targeting",
"common",
"applications",
"such",
"as",
"Java",
"or",
"Microsoft",
"Office,",
"heavy",
"use",
"of",
"spear-phishing",
"attacks,",
"compromising",
"legitimate",
"websites",
"to",
"stage",
"watering-hole",
"attacks,",
"and",
"targeting",
"over",
"a",
"variety",
"of",
"operating",
"systems",
"–",
"Windows,",
"OSX,",
"Linux,",
"even",
"mobile",
"iOS."
] | [
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
3,
16,
16,
16,
16,
7,
15,
16,
16,
5,
16,
16,
5,
16,
5,
13,
16,
16,
16,
1,
9,
9,
9,
9,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
5,
13,
16,
5,
13,
13,
16,
5,
13
] |
[
"The",
"algorithm",
"for",
"generating",
"the",
"lowest-level",
"domain",
"name",
"was",
"hardwired",
"in",
"the",
"Trojan",
"’",
"s",
"code",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.4D03",
"Trojan.Zenshirsh.SL7",
"Win32.Trojan.WisdomEyes.16070401.9500.9639",
"Trojan.Win32.TPM.eslggg",
"BehavesLike.Win32.PWSZbot.cc",
"Trojan.Heur.RP.ZyWaayyb2wki",
"Trojan.Win32.Z.Ircbot.839168.A",
"Win32.Trojan.Crypt.Hqux",
"Trojan.Themida!",
"Trojan-PWS.OnlineGames",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"cecilia-gilbert",
"[",
"."
] | [
1,
9,
9
] |
[
"C2",
"and",
"Targeted",
"Banks",
"As",
"described",
"earlier",
",",
"the",
"C2",
"domain",
"is",
"kept",
"in",
"the",
"app",
"’",
"s",
"resources",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"If",
"not",
",",
"the",
"response",
"is",
"scrubbed",
"of",
"the",
"strings",
"used",
"to",
"complete",
"the",
"billing",
"fraud",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader.Win32.Gamarue.2!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"BKDR_PROTUX.SMZKEB-G",
"Trojan.Win32.RedCap.exxfqg",
"Trojan.Win32.Z.Zusy.8916480",
"Trojan.MulDrop7.62734",
"Trojan.Banbra.Win32.27829",
"BKDR_PROTUX.SMZKEB-G",
"W32/Trojan.CPEN-4136",
"TR/RedCap.xslwz",
"Trojan.Symmi.D1461E",
"Trojan/Win32.Comnie.R209069",
"Trojan.Drnohell",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Bublik.274432.B",
"Backdoor.Win32.Caphaw",
"Trojan.Symmi.D1465",
"Win32.Trojan.WisdomEyes.16070401.9500.9995",
"W32/Trojan.ELRU-2307",
"Trojan.Win32.Caphaw.exkhwo",
"Trojan.Win32.A.Bublik.274432.D",
"BackDoor.Caphaw.2",
"BehavesLike.Win32.PWSZbot.dh",
"Trojan.Win32.Bublik",
"Trojan/Bublik.ank",
"Backdoor:Win32/Caphaw.D",
"Trojan/Win32.Bublik.R46085",
"Backdoor.Win32.Caphaw",
"SScope.Backdoor.Caphaw.A",
"Win32/Trojan.144"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"net",
"."
] | [
9,
9,
16
] |
[
"VICTIMOLOGY",
"ON",
"THE",
"IDENTIFIED",
"CAMPAIGNS",
"The",
"campaigns",
"we",
"analyzed",
"targeted",
"Android",
"devices",
"in",
"Thailand",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16
] |
[
"HenBox",
"Enters",
"the",
"Uyghur",
"App",
"Store",
"In",
"May",
"2016",
",",
"a",
"HenBox",
"app",
"was",
"downloaded",
"from",
"uyghurapps",
"[",
"."
] | [
3,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
1,
9,
9
] |
Subsets and Splits