tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Fifesock",
"W32.W.Otwycal.l4av",
"Net-Worm.Win32.Koobface",
"Spammer:Win32/Fifesock.B",
"Win32/RiskWare.PEMalform.E",
"Win32/Trojan.c9e"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Most",
"mobile",
"malware",
"is",
"designed",
"to",
"steal",
"users",
"’",
"money",
",",
"including",
"SMS-Trojans",
",",
"and",
"lots",
"of",
"backdoors",
"and",
"Trojans",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.RansomGimemoB.Trojan",
"Trojan.Win32.Kazy!O",
"Trojan.Qhost.Win32.6280",
"Trojan.Kazy.D7BDE9",
"Win32.Trojan.WisdomEyes.16070401.9500.9903",
"Win32/Ternanu.C",
"HV_ZYX_BG26035C.TOMC",
"Trojan.Win32.Inject.sbpf",
"Trojan.Win32.DownLoad2.brqxff",
"Packer.W32.Krap.ldx7",
"Trojan.DownLoad2.39110",
"BehavesLike.Win32.Virus.dh",
"Trojan-Ransom.Win32.Gimemo",
"Trojan/Qhost.cty",
"W32.Gimemo",
"Trojan[Backdoor]/Win32.Delf",
"Trojan/Win32.FakeAV.R10033",
"Trojan-Dropper.11705",
"Ransom.FileCryptor",
"W32/Injector.HVQ!tr",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"FAKE",
"REVIEWS",
"When",
"early",
"versions",
"of",
"apps",
"are",
"first",
"published",
",",
"many",
"five",
"star",
"reviews",
"appear",
"with",
"comments",
"like",
":",
"“",
"So",
"..",
"good",
"..",
"”",
"“",
"very",
"beautiful",
"”",
"Later",
",",
"1",
"star",
"reviews",
"from",
"real",
"users",
"start",
"appearing",
"with",
"comments",
"like",
":",
"“",
"Deception",
"”",
"“",
"The",
"app",
"is",
"not",
"honest",
"…",
"”",
"SUMMARY",
"Sheer",
"volume",
"appears",
"to",
"be",
"the",
"preferred",
"approach",
"for",
"Bread",
"developers",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16
] |
[
"We",
"are",
"not",
"including",
"the",
"IP",
"addresses",
"from",
"the",
"C2",
"infrastructure",
"since",
"it",
"is",
"compromised",
"infrastructure",
"that",
"is",
"not",
"longer",
"in",
"use"
] | [
16,
16,
16,
16,
16,
1,
9,
16,
16,
5,
13,
16,
16,
16,
7,
16,
15,
16,
16,
16,
16,
16
] |
[
"This",
"version",
"adds",
"one",
"significant",
"class",
"—",
"it",
"requests",
"DEVICE_ADMIN",
"privileges",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dynamer.S488527",
"Trojan.Smallprox",
"Trojan.Win32.Zusy.elolmi",
"Trojan.Proxy2.577",
"TR/Proxy.mzyhy",
"Trojan.Symmi.D11AD5",
"Win32/Trojan.1ff"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"diagram",
"illustrates",
"the",
"whole",
"process",
"."
] | [
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.HackTool.18432.M",
"Win32.Trojan.WisdomEyes.16070401.9500.9952",
"Hacktool.Notahproxy",
"HackTool:Win32/Onaht.A",
"Riskware.HackTool!NeLzDaI7P40",
"Malware_fam.NB",
"Win32/Trojan.Hacktool.4e9"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"Examples",
"included",
"fake",
"commercial",
"suppliers",
"or",
"shipping",
"companies",
"sending",
"an",
"updated",
"price",
"list,",
"banks",
"asking",
"customers",
"to",
"validate",
"banking",
"information,",
"or",
"confirmation",
"of",
"equipment",
"delivery."
] | [
16,
16,
1,
9,
9,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
16,
1,
9,
9,
9
] |
[
"We",
"have",
"chosen",
"to",
"join",
"forces",
"to",
"continue",
"the",
"investigation",
"around",
"Gooligan",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Heur.Adware.FC.529",
"Trojan.Razy.D2449C",
"Win32.Trojan.WisdomEyes.16070401.9500.9898",
"Riskware.Win32.Dotdo.ewnrxt",
"Adware.Dotdo.25",
"Trojan.MSIL.Trojanproxy",
"TR/Proxy.ulkkx",
"Trojan:MSIL/Faikdal.A",
"PUP.DotDo/Variant",
"Adware.DotDo.DotPrx",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.OpaservA.Worm",
"Net-Worm.Win32.Opasoft!O",
"W32.OpaServ.A",
"W32/Opaserv.worm.a",
"WORM_OPASERV.A",
"Win32.Worm.Opaserv.e",
"W32/Opaserv.worm.A",
"W32.Opaserv.Worm",
"Win32/Opaserv.A",
"WORM_OPASERV.A",
"Win.Worm.OpaSoft-3",
"Net-Worm.Win32.Opasoft.a",
"Trojan.Win32.Opasoft.wglh",
"Worm.Win32.Opaserv",
"Win32.Worm-net.Opasoft.Eeqs",
"Win32.Opasoft",
"Trojan.OpaKill.Win32.1",
"W32/Opaserv.worm.a",
"Worm.Win32.Opasoft.A",
"W32/Opaserv.worm.A",
"Worm/Opasoft.a",
"Worm[Net]/Win32.Opasoft",
"Worm.Opasoft",
"Net-Worm.Win32.Opasoft.a",
"Worm:Win32/Opaserv.A",
"Win32/Opasoft.worm.28672",
"Worm.Opaserv.AT",
"W32/Opaserv.fam"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Hidden",
"Configuration",
"Data",
"As",
"mentioned",
"above",
",",
"EventBot",
"begins",
"using",
"obfuscation",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16
] |
[
"Version",
"#",
"3",
":",
"Sept.",
"-",
"Dec.",
"2019",
"—",
"Domain",
":",
"ponethus",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"The",
"threat",
"actors",
"are",
"reusing",
"tools,",
"techniques,",
"and",
"procedures",
"which",
"overlap",
"throughout",
"these",
"operations",
"with",
"little",
"variance."
] | [
6,
14,
14,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"attack",
"highlights",
"how",
"macro",
"malware",
"in",
"Microsoft",
"Office",
"files",
"is",
"fast",
"becoming",
"a",
"big",
"threat",
"to",
"businesses",
"and",
"organizations."
] | [
16,
16,
16,
16,
3,
11,
16,
5,
13,
16,
16,
16,
16,
16,
7,
15,
16,
4,
16,
4
] |
[
"]",
"infogooogel-drive",
"[",
"."
] | [
9,
9,
1,
9
] |
[
"Both",
"of",
"these",
"libraries",
"are",
"runtime",
"libraries",
"related",
"to",
"Dalvik",
"and",
"ART",
"runtime",
"environments",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Heur.Corrupt.PE",
"Trojan[Exploit]/Win32.CCProxyOver",
"Exploit:Win32/Prix.A.dam#2"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"As",
"reported,",
"the",
"source",
"of",
"the",
"attack",
"appears",
"to",
"have",
"been",
"the",
"website",
"of",
"the",
"Polish",
"financial",
"regulator."
] | [
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
1,
16,
4,
12,
12,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9996",
"Trojan:MSIL/Bogoclak.A",
"Trojan.MSIL.Lynx.3",
"Trj/GdSda.A",
"Backdoor.MSIL",
"MSIL/Stealors.NET!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Signing",
"the",
"malware",
"with",
"a",
"stolen",
"and",
"subsequently",
"publicly",
"leaked",
"code-signing",
"certificate",
"is",
"sloppy",
"even",
"for",
"well-known",
"CN-APT",
"groups."
] | [
16,
16,
3,
16,
16,
1,
16,
16,
1,
9,
9,
9,
16,
16,
16,
16,
16,
6,
14
] |
[
"Through",
"correlation",
"of",
"technical",
"indicators",
"and",
"command",
"and",
"control",
"infrastructure,",
"FireEye",
"assess",
"that",
"APT28",
"is",
"probably",
"responsible",
"for",
"this",
"activity."
] | [
16,
16,
16,
16,
16,
16,
5,
16,
13,
13,
4,
16,
15,
6,
16,
16,
16,
16,
16,
16
] |
[
"With",
"every",
"Android",
"update",
",",
"the",
"malware",
"authors",
"are",
"forced",
"to",
"come",
"up",
"with",
"new",
"tricks",
"."
] | [
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Chiko.Worm",
"Trojan/W32.StartPage.377856",
"Trojan.Win32.StartPage!O",
"Worm.AutoRun",
"W32.W.Fearso.kYUv",
"WORM_SILLY.ICA",
"Win32.Worm.Delf.cg",
"W32.SillyFDC",
"Win32/Chike.A",
"Worm.Win32.AutoRun.ihn",
"Trojan.Win32.StartPage.yqro",
"Trojan.Win32.StartPage.377856",
"Trojan.StartPage.52501",
"Trojan.StartPage.Win32.1",
"Virus.Win32.Alman",
"Trojan/StartPage.de",
"TR/Delf.AKP",
"Trojan/Win32.StartPage",
"Win32.Virut.ce.57344",
"Trojan.Heur.ED91C9",
"Worm.Win32.AutoRun.ihn",
"Worm:Win32/Chiki.A",
"HEUR/Fakon.mwf",
"TScope.Trojan.Delf",
"W32/Chike.C.worm",
"Win32/Delf.NFT",
"Win32.Worm.Autorun.Pavh",
"Trojan.StartPage!orHv1sw9Olo",
"W32/StartPage.AJH!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.W32.Nethief.l7ro",
"TrojWare.Win32.Packed.PNC",
"BehavesLike.Win32.Backdoor.kc",
"Trojan.Krypt.19",
"Trojan-Dropper.Delf",
"Trj/CI.A",
"Win32/Trojan.8cd"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Inject.ASP",
"Trojan.Inject.ASP",
"Trojan.Inject.ASP",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Inject.ASP",
"Trojan.Inject.ASP",
"Trojan.Win32.Kryptik.evmmfw",
"Trojan.Win32.Z.Inject.49664",
"Trojan.Inject.ASP",
"Trojan.Inject.ASP",
"Trojan.Crypt3",
"W32/Trojan.HLQX-0378",
"Backdoor:Win32/Deselia.B!dha",
"Trojan/Win32.Kryptik.R153606",
"W32/ESILE.C!tr",
"Script/Trojan.b13"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Longhorn,",
"which",
"we",
"internally",
"refer",
"to",
"as",
"The",
"Lamberts",
"first",
"came",
"to",
"the",
"attention",
"of",
"the",
"ITSec",
"community",
"in",
"2014,",
"when",
"our",
"colleagues",
"from",
"FireEye",
"discovered",
"an",
"attack",
"using",
"a",
"zero",
"day",
"vulnerability",
"CVE-2014-4148."
] | [
6,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
0,
16,
16,
16,
16,
4,
16,
16,
1,
16,
7,
15,
15,
15,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Zusy.D2E557",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1
] |
[
"Windows",
"Defender",
"ATP",
"also",
"integrates",
"with",
"the",
"Windows",
"protection",
"stack",
"so",
"that",
"protections",
"from",
"Windows",
"Defender",
"AV",
"and",
"Windows",
"Defender",
"Exploit",
"Guard",
"are",
"reported",
"in",
"Windows",
"Defender",
"ATP",
"portal",
",",
"enabling",
"SecOps",
"personnel",
"to",
"centrally",
"manage",
"security",
",",
"and",
"as",
"well",
"as",
"promptly",
"investigate",
"and",
"respond",
"to",
"hostile",
"activity",
"in",
"the",
"network",
"."
] | [
5,
13,
13,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
5,
13,
13,
13,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"is",
"hardly",
"surprising",
"that",
"there",
"is",
"an",
"element",
"of",
"overlap,",
"considering",
"both",
"actors",
"have",
"for",
"years",
"mined",
"victims",
"in",
"the",
"South",
"China",
"Sea",
"area,",
"apparently",
"in",
"search",
"of",
"geo-political",
"intelligence."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
2,
10,
10,
10,
16,
16,
16,
16,
16,
16
] |
[
"BEBLOH",
"always",
"came",
"up",
"with",
"new",
"defensive",
"measures",
"to",
"avoid",
"AV",
"products,",
"and",
"this",
"time",
"is",
"no",
"different."
] | [
3,
16,
16,
16,
16,
1,
9,
9,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16
] |
[
"Other",
"attacks",
"on",
"Bank",
"Austria",
"customers",
"that",
"we",
"observed",
"resolved",
"to",
"the",
"following",
".top",
"domains",
":",
"Oct",
"23",
",",
"2017",
"hxxp",
":",
"//online.bankaustria.at.id8817062",
"[",
"."
] | [
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"]",
"923525",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Downloader.Banload.reo",
"Win32.Trojan.WisdomEyes.16070401.9500.9590",
"Win.Trojan.Graftor-2494",
"Trojan.Win32.Graftor.cuifrv",
"Trojan.Banker.Win32.94901",
"TR/Graftor.6930.12",
"Trojan.Graftor.D17FC",
"TrojanDownloader:Win32/Bangkgrob.A",
"Trj/CI.A",
"TrojanSpy.Banker!0zttYTGMFlo",
"Trojan-Downloader.Win32.Banload",
"W32/Banker.ZZN!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"That",
"number",
"is",
"likely",
"inflated,",
"mainly",
"because",
"of",
"dynamic",
"IP",
"allocation",
"and",
"historic",
"records",
"not",
"being",
"removed",
"promptly."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
7,
15,
15,
15,
15,
15
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Malruze",
"Trojan.Win32.Z.Malruze.113664",
"Trojan:Win32/Malruze.A!gfc"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Ransom.Win32.Birele!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9907",
"W32/Miner.UKCL-7487",
"W32/Miner.B",
"Trojan.Win32.CoinMiner.pmp",
"Trojan/Win32.Miner.C2255099"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Recently,",
"the",
"Threat",
"Monitoring",
"System",
"of",
"QiAnXin",
"Threat",
"Intelligence",
"Center",
"monitored",
"that",
"a",
"botnet",
"written",
"in",
"GO",
"language",
"was",
"spreading",
"through",
"multiple",
"vulnerabilities."
] | [
16,
5,
13,
13,
13,
16,
4,
12,
12,
12,
16,
16,
16,
3,
16,
16,
5,
13,
16,
16,
16,
7,
15
] |
[
"Details",
":",
"Name",
":",
"Super",
"Mario",
"Run",
"Package",
"Name",
":",
"net.droidjack.server",
"MD5",
":",
"69b4b32e4636f1981841cbbe3b927560",
"Technical",
"Analysis",
":",
"The",
"malicious",
"package",
"claims",
"to",
"be",
"the",
"Super",
"Mario",
"Run",
"game",
",",
"as",
"shown",
"in",
"the",
"permissions",
"screenshot",
"below",
",",
"but",
"in",
"reality",
"this",
"is",
"a",
"malicious",
"RAT",
"called",
"DroidJack",
"(",
"also",
"known",
"as",
"SandroRAT",
")",
"that",
"is",
"getting",
"installed",
"."
] | [
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
1,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16
] |
[
"The",
"site",
"is",
"redirecting",
"users",
"to",
"rgdotfoldersasapdotcom",
"which",
"is",
"a",
"RIG",
"EK",
"landing",
"page",
"that",
"serves",
"a",
"malicious",
"flash",
"file",
"and",
"a",
"malicious",
"binary."
] | [
16,
1,
16,
1,
16,
16,
1,
16,
16,
16,
3,
11,
1,
9,
15,
16,
16,
3,
11,
11,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.WintaskLTH.Trojan",
"Worm.Psyokym.A3",
"W32.SillyFDC",
"WORM_PSYOKYM.SM23",
"Trojan-Dropper.Win32.Sysn.bqcc",
"Trojan.Win32.WBNA.ctgbxm",
"Trojan.DownLoader5.33626",
"WORM_PSYOKYM.SM23",
"Worm.Win32.Psyokym",
"WORM/Psyokym.A.34",
"Worm:Win32/Psyokym.A",
"Trojan.Zusy.D393D",
"Trojan.Win32.Downloader.189952.AV",
"Trojan-Dropper.Win32.Sysn.bqcc",
"HEUR/Fakon.mwf",
"Worm.AutoRun!angV1RJQRlk",
"W32/Virut.CE"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"For",
"over",
"half",
"a",
"decade,",
"the",
"Naikon",
"APT",
"waged",
"multiple",
"attack",
"campaigns",
"on",
"sensitive",
"targets",
"throughout",
"South-eastern",
"Asia",
"and",
"around",
"the",
"South",
"China",
"Sea."
] | [
11,
16,
16,
16,
16,
16,
6,
14,
16,
16,
6,
14,
16,
16,
16,
16,
2,
10,
16,
16,
16,
2,
10,
10
] |
[
"ussd",
":",
"to",
"call",
"a",
"C2-specified",
"phone",
"number",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Allows",
"an",
"application",
"to",
"initiate",
"a",
"phone",
"call",
"without",
"going",
"through",
"the",
"Dialer",
"user",
"interface",
"for",
"the",
"user",
"to",
"confirm",
"the",
"call",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Zusy.D14EB5",
"Win32/Oflwr.A!crypt",
"Win.Downloader.Boltolog-223",
"Win32.Application.PUPStudio.A",
"Worm.Win32.Dropper.RA",
"Trojan:W32/DelfInject.R",
"BackDoor.BlackHole.20244",
"TR/Graftor.123479.4",
"Trojan:Win32/Semsubim.A",
"Trojan.Wecod",
"Win32/Trojan.Clicker.4d5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.CED3",
"Trojan.Zenshirsh.SL7",
"Trojan.Zusy.D13E0F",
"Win32.Trojan.Kryptik.av",
"Trojan.Win32.Emager.ngb",
"Trojan.Win32.FKM.dsobxk",
"Trojan.Win32.Z.Zusy.159744.AME",
"Backdoor.W32.Hupigon.le6i",
"TrojWare.Win32.BHO.NJYY",
"Trojan.Packed.26400",
"BehavesLike.Win32.Backdoor.cc",
"Trojan.Win32.Spy",
"Trojan.Emager.ly",
"W32.Infostealer.Zeus",
"Win32.Troj.Undef.kcloud",
"Trojan.Win32.Emager.ngb",
"Trojan/Win32.Small.C10819",
"TScope.Malware-Cryptor.SB",
"Trojan.Win32.Dropper.abe",
"Trojan.Emager!"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"EventBot",
"screenPinPrefs.xml",
"The",
"content",
"of",
"screenPinPrefs.xml",
"."
] | [
16,
1,
16,
16,
16,
1,
16
] |
[
"During",
"our",
"research",
"we",
"also",
"arrived",
"at",
"the",
"conclusion",
"that",
"this",
"Trojan",
"evolved",
"from",
"an",
"SMS",
"spyware",
"Trojan",
"that",
"was",
"first",
"spotted",
"in",
"October",
"2014",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Unit",
"42",
"researchers",
"at",
"Palo",
"Alto",
"Networks",
"have",
"discovered",
"new",
"attack",
"activity",
"targeting",
"individuals",
"involved",
"with",
"United",
"States",
"defense",
"contractors."
] | [
4,
12,
12,
16,
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12
] |
[
"However,",
"it",
"should",
"be",
"noted",
"that",
"this",
"was",
"not",
"an",
"isolated",
"incident:",
"this",
"is",
"the",
"latest",
"in",
"a",
"series",
"of",
"similar",
"attacks",
"in",
"Ukraine."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"At",
"the",
"time,",
"it",
"was",
"being",
"distributed",
"via",
"both",
"targeted",
"email",
"campaigns",
"and",
"exploit",
"kits",
"EKs."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
3,
11,
11
] |
[
"MISLEADING",
"USERS",
"Bread",
"apps",
"sometimes",
"display",
"a",
"pop-up",
"to",
"the",
"user",
"that",
"implies",
"some",
"form",
"of",
"compliance",
"or",
"disclosure",
",",
"showing",
"terms",
"and",
"conditions",
"or",
"a",
"confirm",
"button",
"."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"While",
"investing",
"a",
"lot",
"of",
"resources",
"in",
"the",
"development",
"of",
"this",
"malware",
",",
"the",
"actor",
"behind",
"“",
"Agent",
"Smith",
"”",
"does",
"not",
"want",
"a",
"real",
"update",
"to",
"remove",
"all",
"of",
"the",
"changes",
"made",
",",
"so",
"here",
"is",
"where",
"the",
"“",
"patch",
"”",
"module",
"comes",
"in",
"to",
"play",
"With",
"the",
"sole",
"purpose",
"of",
"disabling",
"automatic",
"updates",
"for",
"the",
"infected",
"application",
",",
"this",
"module",
"observes",
"the",
"update",
"directory",
"for",
"the",
"original",
"application",
"and",
"removes",
"the",
"file",
"once",
"it",
"appears",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDropper.RAR",
"W32/Trojan.WAHH-7616",
"Trojan.Win32.RAR.crvcdy",
"Trojan.Win32.Z.Dropper.1318323",
"Trojan:MSIL/Ainslot.A",
"Win32/PSW.Tibia.NGP"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.BypassUAC",
"Exploit.Win32.BypassUAC.ihb",
"Trojan.Win32.Tordev.exuhxz",
"Exploit.W32.Bypassuac!c",
"BackDoor.Tordev.976",
"Exploit.BypassUAC.Win32.1119",
"BehavesLike.Win32.Dropper.bc",
"Trojan.Win32.Ekstak",
"Exploit.BypassUAC.amp",
"TR/Injector.otvkc",
"Trojan[Exploit]/Win32.BypassUAC",
"Trojan.Graftor.D71C73",
"Exploit.Win32.BypassUAC.ihb",
"Backdoor:Win32/Rescoms.B",
"Trojan/Win32.BypassUAC.C2399731",
"Exploit.BypassUAC",
"Trj/CI.A",
"Win32.Trojan.Inject.Auto",
"Win32/Trojan.852"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"is",
"why",
"we",
"recently",
"released",
"Cybereason",
"Mobile",
",",
"a",
"new",
"offering",
"that",
"strengthens",
"the",
"Cybereason",
"Defense",
"Platform",
"by",
"bringing",
"prevention",
",",
"detection",
",",
"and",
"response",
"capabilities",
"to",
"mobile",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader.VB.z4",
"Trojan.VB.Win32.155172",
"Trojan/Dropper.StartPage.dzs",
"Win32.Trojan.WisdomEyes.16070401.9500.9663",
"Trojan.Win32.VBKrypt",
"TrojanDownloader:Win32/Swity.C",
"Trojan.VB!g1fz4qjxDzc",
"W32/VB.NTK!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.SmokeLdr.A3",
"Trojan.Ransom.GlobeImposter",
"Trojan.Injector",
"TROJ_INJECT.AUSPTF",
"Win32.Trojan.Injector.MH",
"Trojan.Win32.Khalesi.bjm",
"Trojan.Win32.Khalesi.exdymq",
"Trojan.Win32.Z.Razy.286720.EN",
"Trojan.Encoder.11539",
"TROJ_INJECT.AUSPTF",
"BehavesLike.Win32.PWSZbot.dm",
"Trojan-Ransom.GlobeImposter",
"W32/Trojan.BXWF-8222",
"Trojan.Khalesi.jz",
"TR/Kryptik.nopxu",
"Trojan/Win32.Khalesi",
"Trojan.Razy.D3C133",
"Trojan.Win32.Khalesi.bjm",
"Trojan/Win32.VBKrypt.C2374802",
"Trojan.Khalesi",
"Trj/GdSda.A",
"Win32.Trojan.Khalesi.Swkj",
"Win32/Trojan.674"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"AOSP",
"patched",
"the",
"Janus",
"vulnerability",
"since",
"version",
"7",
"by",
"introducing",
"APK",
"Signature",
"Scheme",
"V2",
"."
] | [
16,
16,
16,
7,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"is",
"an",
"old",
"threat",
"and",
"was",
"well-described",
"by",
"Symantec",
"back",
"in",
"2009."
] | [
16,
16,
16,
3,
11,
16,
16,
16,
16,
4,
16,
16,
0
] |
[
"Also",
",",
"we",
"found",
"a",
"debug",
"version",
"of",
"the",
"implant",
"(",
"70a937b2504b3ad6c623581424c7e53d",
")",
"that",
"contains",
"interesting",
"constants",
",",
"including",
"the",
"version",
"of",
"the",
"spyware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"this",
"case",
",",
"it",
"registers",
"three",
"broadcast",
"receivers",
":",
"MyReceiver",
"-",
"Triggers",
"when",
"the",
"device",
"is",
"booted",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"nubmer",
"of",
"downloaders",
"installing",
"further",
"malware",
"from",
"http://mondaynightfundarts[.]com/images/Nu48djdi.zip"
] | [
16,
16,
16,
3,
16,
16,
3,
16,
1
] |
[
"It's",
"a",
"trojan",
"spy",
"which",
"is",
"installed",
"as",
"service",
"called",
"RCSU."
] | [
16,
16,
3,
11,
16,
16,
1,
9,
9,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Clodeac.Trojan.9edf",
"Trojan.PlugX.A4",
"BKDR_PLUGX.DUKH",
"Win32.Trojan.WisdomEyes.16070401.9500.9975",
"BKDR_PLUGX.DUKH",
"Trojan-Spy.Win32.Lurk.vtx",
"Trojan.Win32.Datufly.ebtzfj",
"Trojan.Win32.Z.Injector.9728.AR[h]",
"Uds.Dangerousobject.Multi!c",
"Trojan.Injector.Win32.378784",
"worm.win32.gamarue.z",
"TrojanSpy.Lurk.ep",
"TR/Datufly.hmoo",
"W32/Injector.CXAC!tr",
"Trojan.Graftor.D429AC",
"Trojan:Win32/Datufly.B!dha",
"Trojan/Win32.Datufly.R184100",
"TrojanSpy.Lurk",
"Win32.Trojan-spy.Lurk.Amck",
"TrojanSpy.Lurk!fV54mUiVDuY",
"Trojan.Win32.Injector",
"Inject3.AMFK",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Irc.Mimic.C",
"Trojan.Glitch.A",
"BKDR_IRCMIMIC.C",
"IRC/Mimic.C",
"Hacktool.Flooder",
"BKDR_IRCMIMIC.C",
"Win.Trojan.Soldier-7",
"Backdoor.IRC.Mimic.c",
"Backdoor.Irc.Mimic.C",
"DoS.W32.LifeWare!c",
"Backdoor.Irc.Mimic.C",
"DDoS.LifeWire",
"BehavesLike.Win32.PWSZbot.bc",
"Trojan.Win32.DoS",
"IRC/Mimic.C",
"IRC/Mimic.8",
"HackTool[DoS]/Win32.LifeWare",
"DDoS:Win32/LifeWire.A",
"Backdoor.IRC.Mimic.c",
"DoS.LifeWare",
"Trojan.HideWindows",
"Bck/Iroffer.BG",
"Irc.Backdoor.Mimic.Htmt",
"VBS.Flood.L",
"W32/LifeWare.A!dos",
"Win32/Virus.IRC.f2c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Using",
"the",
"Dynamic",
"Threat",
"Intelligence",
"Cloud",
"DTI,",
"FireEye",
"researchers",
"detected",
"a",
"pattern",
"of",
"attacks",
"beginning",
"on",
"April",
"13th,",
"2015."
] | [
16,
16,
5,
13,
13,
13,
13,
4,
16,
16,
16,
1,
9,
9,
16,
16,
0,
8,
8
] |
[
"Just",
"recently,",
"we",
"found",
"a",
"new",
"spam",
"campaign",
"of",
"Hancitor",
"with",
"some",
"notable",
"developments",
"that",
"may",
"have",
"been",
"in",
"the",
"previous",
"variants,",
"but",
"were",
"not",
"discussed",
"in",
"any",
"other",
"reports."
] | [
16,
16,
16,
16,
16,
6,
14,
14,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Fadedoor.287744",
"Email-Worm.Win32.GOPworm.196",
"Trojan.Heur.rGWarTuQ32piy",
"Win32.Trojan.WisdomEyes.16070401.9500.9787",
"W32/Backdoor.MAW",
"Backdoor.Trojan",
"Backdoor.Win32.Fadedoor.a",
"Trojan.Win32.Fadedoor.frpv",
"Backdoor.Win32.Fadedoor.287744",
"Backdoor.W32.Fadedoor.a!c",
"Backdoor.Win32.Fadedoor.10",
"BackDoor.Fade.10",
"Backdoor.Fadedoor.Win32.22",
"W32/Backdoor.THLZ-3240",
"Backdoor/Fadedoor.i",
"BDS/Fade.10.Srv1",
"Trojan[Backdoor]/Win32.Fadedoor",
"Win32.Hack.Fadedoor.a.kcloud",
"Backdoor:Win32/Fakedoor.B",
"Backdoor.Win32.Fadedoor.a",
"Worm/Win32.IRCBot.R67641",
"Email-Worm.Win32.GOPworm.196",
"TScope.Trojan.Delf",
"Bck/Fadedoor.A",
"Win32.Backdoor.Fadedoor.Efue",
"Backdoor.Fadedoor!nYSsZcqQ6hQ",
"W32/Fadedoor.A!tr",
"Win32/Trojan.fd1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"strings",
"section",
"of",
"the",
"app",
"contains",
"embedded",
"command-and-control",
"IP",
"addresses",
",",
"ports",
",",
"and",
"domain",
"names",
"in",
"plaintext",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Downloader.VB.lvv",
"W32/Downldr2.FUOC",
"DLoader.APBLQ",
"TROJ_SPNR.07L611",
"Win32.HEURCrypted",
"Trojan.Downloader-71476",
"Trojan-Downloader.Win32.VB.lwz",
"Trojan.DL.VB!n7YxP+4/z6k",
"Trojan.Win32.Downloader.94208.EO",
"Virus.Win32.Heur.k",
"TrojWare.Win32.Trojan.VB.~BVZ",
"Trojan.DownLoad1.50365",
"TROJ_SPNR.0CA512",
"TrojanDownloader.VB.rbu",
"Win32.TrojDownloader.VB.kcloud",
"W32/Downloader.RCLB-8389",
"Win-Trojan/Xema.variant",
"TrojanDownloader.VB",
"Trojan-Downloader.Win32.VB",
"W32/VB.LVV!tr.dldr",
"Trj/Downloader.VVG"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"AsyncRAT",
"is",
"a",
"popular",
"malware",
"commodity",
"and",
"tools",
"used",
"by",
"attackers",
"to",
"gain",
"access",
"to",
"targeted",
"hosts",
"or",
"networks,",
"including",
"those",
"using",
"Microsoft's",
"OneNote",
"email",
"address."
] | [
3,
16,
16,
16,
3,
16,
16,
3,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
5,
13,
1,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Razy.D1D44E"
] | [
16,
3,
16,
16,
16,
1
] |
[
"JPCERT",
"/",
"CC",
"confirms",
"that",
"a",
"targeted",
"mail",
"with",
"a",
"ZIP",
"file",
"containing",
"an",
"executable",
"file",
"has",
"been",
"sent",
"to",
"domestic",
"organizations",
"around",
"October",
"2016."
] | [
4,
16,
4,
16,
16,
16,
16,
1,
16,
16,
1,
9,
16,
16,
1,
9,
16,
16,
16,
16,
4,
12,
16,
0,
8
] |
[
"Typically",
",",
"it",
"is",
"a",
"message",
"saying",
"that",
"the",
"user",
"has",
"received",
"a",
"money",
"transfer",
",",
"and",
"that",
"they",
"must",
"enter",
"their",
"bank",
"card",
"details",
"so",
"the",
"money",
"can",
"be",
"transferred",
"to",
"their",
"account",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Recently,",
"we",
"have",
"discovered",
"132",
"Android",
"apps",
"on",
"Google",
"Play",
"infected",
"with",
"tiny",
"hidden",
"IFrames",
"that",
"link",
"to",
"malicious",
"domains",
"in",
"their",
"local",
"HTML",
"pages,",
"with",
"the",
"most",
"popular",
"one",
"having",
"more",
"than",
"10,000",
"installs",
"alone."
] | [
16,
16,
16,
16,
16,
5,
13,
13,
13,
13,
16,
16,
1,
9,
9,
15,
16,
16,
1,
9,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"threat",
"actors",
"target",
"a",
"wide",
"range",
"of",
"organizations:",
"CTU",
"researchers",
"have",
"observed",
"TG-3390",
"actors",
"obtaining",
"confidential",
"data",
"on",
"defense",
"manufacturing",
"projects,",
"but",
"also",
"targeting",
"other",
"industry",
"verticals",
"and",
"attacking",
"organizations",
"involved",
"in",
"international",
"relations."
] | [
6,
14,
14,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
6,
16,
1,
9,
9,
16,
4,
16,
16,
16,
16,
16,
16,
4,
16,
16,
1,
4,
16,
16,
4,
12
] |
[
"]",
"190:8822",
"61",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9607",
"Trojan.Win32.DownLoad4.exjknn",
"Trojan.DownLoad4.114",
"Trojan/Win32.Cerber.R219560",
"Trojan.BitCoinMiner",
"Trojan.Zusy.D42D87",
"Trj/CI.A",
"Win32/Trojan.5a2"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"attackers",
"used",
"compromised",
"websites",
"or",
"watering",
"holes",
"to",
"infect",
"pre-selected",
"targets",
"with",
"previously",
"unknown",
"malware."
] | [
16,
6,
16,
1,
9,
16,
1,
9,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"Structure",
"of",
"data",
"sent",
"to",
"the",
"server",
":",
"To",
"begin",
"with",
",",
"the",
"Trojan",
"sends",
"information",
"about",
"the",
"device",
"to",
"the",
"server",
":",
"In",
"response",
",",
"the",
"server",
"sends",
"the",
"code",
"of",
"the",
"command",
"for",
"execution",
"(",
"“",
"command",
"”",
")",
",",
"its",
"parameters",
"(",
"“",
"params",
"”",
")",
",",
"and",
"the",
"time",
"delay",
"before",
"execution",
"(",
"“",
"waitrun",
"”",
"in",
"milliseconds",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"On",
"the",
"C2",
"panel",
",",
"we",
"found",
"a",
"potential",
"link",
"between",
"Wolf",
"Research",
"and",
"another",
"Cyprus",
"organization",
"named",
"Coralco",
"Tech",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
4,
12,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Downloader.Kather.e",
"Win32.Trojan.WisdomEyes.16070401.9500.9855",
"W32/Downldr2.ANMO",
"Backdoor.Trojan",
"WORM_POSAM.A",
"Win.Trojan.Kather-1",
"Trojan-Downloader.Win32.Kather.e",
"Trojan.Win32.Kather.dips",
"Win32.Trojan-downloader.Kather.Tdfl",
"TrojWare.Win32.TrojanDownloader.Kather.E",
"Trojan.Kather.43661",
"Downloader.Kather.Win32.6",
"WORM_POSAM.A",
"W32/Downloader.KXIZ-5728",
"Trojan/Kather.i",
"TR/Dldr.Kather.E",
"Trojan[Downloader]/Win32.Kather",
"Win32.TrojDownloader.Kather.e.kcloud",
"Troj.Downloader.W32.Kather.e!c",
"Trojan-Downloader.Win32.Kather.e",
"TrojanDownloader:Win32/Kather.E",
"Win32/TrojanDownloader.Kather.E",
"Trojan.DL.Kather!WhdeU9hib+w",
"W32/Kather.A!tr.dldr",
"Win32/Trojan.b64"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.VBTipocadLTJ.Trojan",
"Trojan/W32.Reconyc.95744",
"Trojan.Reconyc",
"Trojan.Win32.Reconyc.ghqx",
"Trojan.Win64.Reconyc.ewbtpt",
"Troj.W32.Reconyc.tnqK",
"BehavesLike.Win64.Downloader.nh",
"Trojan.Win32.Reconyc",
"TR/Dropper.onknt",
"TrojanDownloader:Win32/Reconyc.B!bit",
"Trojan.Win32.Reconyc.ghqx",
"Trojan/Win64.Reconyc.C1746256",
"Trojan.Reconyc",
"Trojan.Reconyc",
"Trj/CI.A",
"VBS/Kryptik.D",
"Win32.Trojan.Reconyc.Hwdh",
"Trojan.Reconyc!",
"Win32/Trojan.658"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"discovered",
"this",
"China-based",
"third-party",
"iOS",
"app",
"store",
"aggressively",
"promoting",
"their",
"repackaged",
"apps",
"in",
"social",
"network",
"channels—YouTube,",
"Facebook,",
"Google+,",
"and",
"Twitter—banking",
"on",
"the",
"popularity",
"of",
"games",
"and",
"apps",
"such",
"as",
"Minecraft,",
"Terraria,",
"and",
"Instagram",
"to",
"lure",
"users",
"into",
"downloading",
"them."
] | [
16,
16,
16,
5,
13,
13,
13,
13,
16,
16,
16,
1,
9,
16,
16,
16,
5,
13,
13,
16,
5,
16,
16,
16,
16,
5,
16,
5,
16,
16,
5,
13,
16,
5,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Sirefef.A",
"Trojan.CoinMiner.Win32.474",
"Trojan.Kazy.D54A3A",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Infostealer.Limitail",
"Trojan.Win32.Yakes.cvappu",
"Troj.W32.Yakes.egne!c",
"Trojan.BtcMine.148",
"BehavesLike.Win32.Downloader.fh",
"Trojan.Win32.CoinMiner",
"W32/Trojan.XYUN-7891",
"Trojan/Yakes.mzh",
"TR/Rogue.1594174",
"Trojan/Win32.Yakes",
"Trojan:Win32/Kraziomel.D",
"Trojan/Win32.Yakes.C284072",
"Trojan.TDSS.01414",
"Win32/CoinMiner.CF",
"Trojan.Yakes!WgDSy6aOE8s",
"W32/Kryptik.EXA!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"simple",
"measure",
"prevents",
"the",
"Trojan",
"from",
"running",
"and",
"being",
"analyzed",
"in",
"dynamic",
"analysis",
"environments",
"(",
"sandboxes",
")",
"and",
"on",
"the",
"test",
"devices",
"of",
"malware",
"analysts",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.NSIS.Androm.8",
"Troj.Nsis.Androm!c",
"Win32.Trojan.WisdomEyes.16070401.9500.9791",
"Ransom.Rokku",
"Ransom_.97182692",
"Zum.Ransom.NSIS.Cerber.1",
"Trojan-Ransom.Win32.Zcryptor.g",
"Trojan.NSIS.Androm.8",
"Trojan.Win32.Inject.evkooj",
"Trojan.Win32.Z.Injector.697990",
"Ransom_.97182692",
"BehavesLike.Win32.Ransom.jc",
"Trojan.Win32.Injector",
"Ransom:Win32/ZCryptor.A",
"Trojan-Ransom.Win32.Zcryptor.g",
"Trojan-Ransom.Zcryptor",
"Trj/CI.A",
"Zum.Ransom.NSIS.Cerber.1",
"Win32.Trojan.Zcryptor.Lndy",
"Win32/Trojan.Ransom.a9f"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Slowly",
"putting",
"the",
"pieces",
"together,",
"the",
"global",
"picture",
"began",
"to",
"take",
"shape,",
"exposing",
"a",
"massive",
"adware",
"campaign",
"affecting",
"approximately",
"half",
"a",
"million",
"users."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
16,
4,
12,
12,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Android.Trojan.Banker.DF",
"Android.Trojan.Banker.DF",
"Other:Android.Reputation.2",
"Infostealer.Bancos",
"Android.Trojan.Banker.DF",
"HEUR:Trojan-Banker.AndroidOS.Svpeng.q",
"A.H.Pri.SvPeng.E",
"Trojan.Android.Banker.egowei",
"Trojan:Android/InfoStealer.CM",
"Android.Banker.70.origin",
"ZIP/Trojan.IGVK-5",
"Android.Trojan.Banker.DF",
"Android-Trojan/Svpeng.3becd",
"HEUR:Trojan-Banker.AndroidOS.Svpeng.q",
"Trojan.AndroidOS.Banker.A",
"a.expense.fakeinstall.b",
"Trojan-Banker.AndroidOS.Svpeng"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.MSIL",
"Trojan.SpamThru",
"Trojan.DownLoader25.28452",
"BehavesLike.Win32.Trojan.wm",
"TR/Dropper.MSIL.qtean",
"Backdoor:VBS/Sisbot.A",
"Trojan.MSIL.Androm.9",
"Trojan/Win32.Sisbot.R216242",
"Trj/GdSda.A",
"MSIL/Dropper.XXX!tr",
"Win32/Trojan.b5b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Functionality",
"After",
"starting",
",",
"DEFENSOR",
"ID",
"requests",
"the",
"following",
"permissions",
":",
"allow",
"modify",
"system",
"settings",
"permit",
"drawing",
"over",
"other",
"apps",
",",
"and",
"activate",
"accessibility",
"services",
"."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.A728",
"Trojan.PWS.OnlineGames.AADX",
"Trojan-GameThief.Win32.OnLineGames!O",
"Trojan.PWS.OnlineGames.AADX",
"Trojan/OnLineGames.snrt",
"Win32.Trojan.WisdomEyes.16070401.9500.9990",
"Infostealer.Gampass",
"TROJ_SYSTEMHI.IM",
"Win.Spyware.50098-2",
"Trojan-GameThief.Win32.OnLineGames.snrt",
"Trojan.PWS.OnlineGames.AADX",
"Trojan.Win32.Drop.bbdxzx",
"Trojan.PWS.OnlineGames.AADX",
"Trojan.PWS.OnlineGames.AADX",
"Trojan.MulDrop.21159",
"TROJ_SYSTEMHI.IM",
"Backdoor/Bifrose.jhl",
"Trojan[GameThief]/Win32.OnLineGames",
"Trojan.PWS.OnlineGames.AADX",
"Trojan.Win32.PSWIGames.21508",
"Trojan-GameThief.Win32.OnLineGames.snrt",
"Trojan.PWS.OnlineGames.AADX",
"Trojan/Win32.OnlineGameHack.R10533",
"Win32.Trojan-GameThief.Onlinegames.cruv",
"Trojan-PWS.LDPinch"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Androm.A5",
"Win32.Trojan.WisdomEyes.16070401.9500.9994",
"Virus.W32.Rootkit!c",
"Trojan.Inject2.30717",
"Trojan.Kryptik.Win32.1154178",
"Trojan.Win32.Crypt",
"Trojan.Scarsi.ait",
"Trojan/Win32.Scarsi",
"Trojan.Win32.Z.Kryptik.563972",
"W32/Dorkbot.B!tr",
"Win32/RootKit.Rootkit.7e5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Microsoft",
"refers",
"to",
"this",
"family",
"of",
"malware",
"as",
"Sarvdap,",
"however",
"it",
"must",
"be",
"noted",
"that",
"the",
"detection",
"appears",
"somewhat",
"generic."
] | [
4,
16,
16,
16,
16,
16,
3,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"FIN7",
"is",
"a",
"financially-motivated",
"threat",
"group",
"that",
"has",
"been",
"associated",
"with",
"malicious",
"operations",
"dating",
"back",
"to",
"late",
"2015."
] | [
6,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
0,
8,
8,
8,
8
] |
[
"As",
"already",
"stated",
"in",
"the",
"‘",
"malware",
"features",
"’",
"part",
",",
"there",
"are",
"multiple",
"giveaways",
"in",
"the",
"code",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"''",
"For",
"each",
"interaction",
",",
"the",
"malware",
"will",
"check",
"if",
"the",
"generator",
"is",
"a",
"package",
"that",
"belongs",
"to",
"the",
"anti-virus",
"list",
",",
"the",
"malware",
"will",
"abuse",
"another",
"feature",
"of",
"the",
"Accessibility",
"API",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16
] |
Subsets and Splits