tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"The",
"set",
"of",
"permissions",
"required",
"by",
"Marcher",
"according",
"to",
"the",
"manifest",
"is",
"as",
"follows",
":",
"β",
"android.permission.CHANGE_NETWORK_STATE",
"(",
"change",
"network",
"connectivity",
"state",
")",
"β",
"android.permission.SEND_SMS",
"(",
"send",
"SMS",
"messages",
")",
"β",
"android.permission.USES_POLICY_FORCE_LOCK",
"(",
"lock",
"the",
"device",
")",
"β",
"android.permission.RECEIVE_BOOT_COMPLETED",
"(",
"start",
"malware",
"when",
"device",
"boots",
")",
"β",
"android.permission.INTERNET",
"(",
"communicate",
"with",
"the",
"internet",
")",
"β",
"android.permission.VIBRATE",
"(",
"control",
"the",
"vibrator",
")",
"β",
"android.permission.ACCESS_WIFI_STATE",
"(",
"view",
"information",
"about",
"the",
"status",
"of",
"Wi-Fi",
")",
"β",
"android.permission.WRITE_SMS",
"(",
"edit/delete",
"SMS",
")",
"β",
"android.permission.ACCESS_NETWORK_STATE",
"(",
"view",
"the",
"status",
"of",
"all",
"networks",
")",
"β",
"android.permission.WAKE_LOCK",
"(",
"prevent",
"the",
"phone",
"from",
"going",
"to",
"sleep",
")",
"β",
"android.permission.GET_TASKS",
"(",
"retrieve",
"running",
"applications",
")",
"β",
"android.permission.CALL_PHONE",
"(",
"call",
"phone",
"numbers",
")",
"β",
"android.permission.WRITE_SETTINGS",
"(",
"read/write",
"global",
"system",
"settings",
")",
"β",
"android.permission.RECEIVE_SMS",
"(",
"intercept",
"SMS",
"messages",
")",
"β",
"android.permission.READ_PHONE_STATE",
"(",
"read",
"phone",
"details",
"of",
"the",
"device",
"such",
"as",
"phone",
"number",
"and",
"serial",
"number",
")",
"β",
"android.permission.CHANGE_WIFI_STATE",
"(",
"connect",
"to",
"and",
"disconnect",
"from",
"Wi-Fi",
"networks",
"and",
"make",
"changes",
"to",
"configured",
"networks",
")",
"β",
"android.permission.READ_CONTACTS",
"(",
"read",
"all",
"contact",
"data",
")",
"*",
"android.permission.READ_SMS",
"(",
"read",
"SMS",
"messages",
")",
"Obviously",
"a",
"fairly",
"significant",
"list",
"of",
"permissions",
"of",
"which",
"many",
"are",
"suspicious",
",",
"especially",
"when",
"combined",
"."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"December",
"2015,",
"Chinese",
"users",
"reported",
"they",
"were",
"infected",
"by",
"this",
"malware."
] | [
16,
0,
8,
4,
12,
16,
16,
16,
16,
16,
16,
3
] |
[
"We",
"took",
"a",
"look",
"at",
"the",
"malware",
"specifically",
"in",
"the",
"INOCNATION",
"campaign",
"to",
"analyze",
"what",
"was",
"new",
"and",
"different",
"about",
"the",
"techniques",
"used",
"by",
"the",
"threat",
"actor."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14
] |
[
"New",
"nodes",
"are",
"continually",
"added",
"as",
"new",
"victims",
"are",
"enlisted,",
"and",
"they",
"are",
"unpublished",
"outside",
"of",
"the",
"Terracotta",
"user-base."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
5
] |
[
"With",
"the",
"prevalence",
"of",
"Google",
"Android",
"smartphones",
"and",
"the",
"popularity",
"of",
"feature-rich",
"apps,",
"more",
"and",
"more",
"people",
"rely",
"on",
"smartphones",
"to",
"store",
"and",
"handle",
"kinds",
"of",
"personal",
"and",
"business",
"information",
"which",
"attracts",
"adversaries",
"who",
"want",
"to",
"steal",
"that",
"information."
] | [
16,
16,
16,
16,
4,
5,
13,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
6,
16,
16,
16,
1,
9,
9
] |
[
"July",
"28",
"A",
"recent",
"campaign",
"compromised",
"Taiwan",
"and",
"Hong",
"Kong",
"sites",
"to",
"deliver",
"Flash",
"exploits",
"related",
"to",
"Hacking",
"Team",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
4,
12,
16
] |
[
"Zen",
"apps",
"gain",
"access",
"to",
"root",
"permissions",
"from",
"a",
"rooting",
"trojan",
"in",
"its",
"infection",
"chain",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanPWS.Zbot.VA3",
"Trojan.Tofsee",
"Trojan/Injector.ccfi",
"TROJ_HPVB.SM6",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Ransom.Kovter",
"TROJ_HPVB.SM6",
"Trojan.Win32.Inject.wlzt",
"Trojan.Win32.Inject.dwzyvq",
"Troj.W32.Inject.tnFQ",
"Trojan.Kovter.69",
"Trojan.Inject.Win32.168460",
"Trojan.Win32.Injector",
"Trojan/Inject.baac",
"Trojan/Win32.Inject",
"Trojan.Symmi.DCC5C",
"Trojan.Win32.Inject.wlzt",
"Trojan/Win32.Kovter.R153629",
"Trojan.Inject",
"Trojan.Inject!3ypDMCpDv7Y",
"W32/Injector.CEEO!tr",
"Win32/Trojan.Dropper.43b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Mytob",
"Win32.Trojan.WisdomEyes.16070401.9500.9860",
"W32/Trojan.DMPW-1529",
"Net-Worm.Win32.Mytob.lsk",
"Trojan.Win32.Win32.dchvpv",
"Trojan.Win32.Z.Mytob.27648",
"Net.Worm.W32.Mytob!c",
"Trojan.Win32.Clicker!BT",
"Worm/Mytob.als",
"TR/Clicker.ofeiu",
"Worm[Net]/Win32.Mytob",
"Net-Worm.Win32.Mytob.lsk",
"TrojanClicker:MSIL/Doviali.A",
"Worm/Win32.Mytob.C84872",
"Trojan.Win32.Clicker!BT",
"Net-Worm.Mytob",
"Trojan.MSIL.TrojanClicker",
"W32/MyTob.A!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"After",
"the",
"profile",
"is",
"downloaded",
",",
"the",
"iOS",
"system",
"will",
"first",
"ask",
"users",
"to",
"review",
"the",
"profile",
"in",
"their",
"settings",
"if",
"they",
"want",
"to",
"install",
"it",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Top",
"20",
"countries",
"targeted",
"by",
"Hummingbad/Shedun",
"."
] | [
16,
16,
16,
16,
16,
3,
16
] |
[
"We",
"encourage",
"Android",
"users",
"to",
"validate",
"whether",
"their",
"accounts",
"have",
"been",
"breached",
"."
] | [
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Trend",
"Micro",
"detects",
"this",
"as",
"ANDROIDOS_SOCKSBOT.A",
"and",
"has",
"found",
"at",
"least",
"3,000",
"Trojanized",
"apps."
] | [
4,
12,
16,
16,
16,
1,
16,
16,
16,
16,
16,
3,
11,
11
] |
[
"Communication",
"between",
"both",
"Trojans",
"and",
"their",
"C",
"&",
"C",
"servers",
"is",
"based",
"on",
"the",
"same",
"principle",
",",
"the",
"relative",
"addresses",
"to",
"which",
"Trojans",
"send",
"network",
"requests",
"are",
"generated",
"in",
"a",
"similar",
"manner",
",",
"and",
"the",
"set",
"of",
"possible",
"commands",
"that",
"the",
"two",
"Trojans",
"can",
"perform",
"also",
"overlaps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"post",
"analyzes",
"targeted",
"malware",
"attacks",
"against",
"groups",
"in",
"the",
"Tibetan",
"diaspora",
"and",
"pro-democracy",
"groups",
"in",
"Hong",
"Kong."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
2,
10,
16,
2,
10,
10,
10,
10
] |
[
"We",
"believe",
"that",
",",
"when",
"it",
"is",
"officially",
"released",
",",
"it",
"will",
"most",
"likely",
"be",
"uploaded",
"to",
"rogue",
"APK",
"stores",
"and",
"other",
"shady",
"websites",
",",
"while",
"masquerading",
"as",
"real",
"applications",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"particular",
"strain",
"of",
"Adware",
"was",
"found",
"in",
"206",
"applications",
",",
"and",
"the",
"combined",
"download",
"count",
"has",
"reached",
"almost",
"150",
"million",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"com",
"overlaps",
"with",
"PlugX",
",",
"Zupdax",
",",
"and",
"Poison",
"Ivy",
"malware",
"families",
"discussed",
"in",
"more",
"detail",
"later",
"."
] | [
9,
9,
16,
16,
3,
16,
3,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"October",
"2015",
"the",
"Callisto",
"Group",
"targeted",
"a",
"handful",
"of",
"individuals",
"with",
"phishing",
"emails",
"that",
"attempted",
"to",
"obtain",
"the",
"target's",
"webmail",
"credentials."
] | [
16,
0,
8,
6,
14,
14,
16,
16,
16,
16,
4,
16,
1,
9,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"On",
"January",
"27,",
"2016",
"Cyphort",
"Labs",
"discovered",
"a",
"site",
"infected",
"with",
"Angler",
"EK",
"leading",
"to",
"a",
"fileless",
"Gootkit",
"a.k.a.",
"XswKit",
"malware."
] | [
16,
0,
8,
8,
4,
12,
16,
16,
1,
16,
16,
3,
11,
16,
16,
16,
1,
3,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Foosace",
"Trojan.Sofacy.C",
"TSPY_SEDNIT.A",
"Trojan.Win32.Z.Graftor.81408.L",
"TSPY_SEDNIT.A",
"W32/Trojan.GBLK-5942",
"Trojan:Win32/Foosace.K!dha",
"Trojan/Win32.Sednit.R155481",
"Win32/Sednit.C",
"Win32/Trojan.e6d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Two",
"prominent",
"lawyers",
"representing",
"the",
"families",
"of",
"three",
"slain",
"Mexican",
"women",
"were",
"sent",
"infection",
"attempts",
"with",
"NSO",
"Group's",
"Pegasus",
"spyware"
] | [
16,
16,
4,
16,
16,
4,
16,
4,
12,
12,
12,
16,
16,
1,
9,
16,
6,
14,
3,
11
] |
[
"htpRAT,",
"uncovered",
"by",
"RiskIQ",
"cyber",
"investigators,",
"is",
"the",
"newest",
"weapon",
"in",
"Chinese",
"cyberattackers'",
"campaign",
"against",
"Association",
"of",
"Southeast",
"Asian",
"Nations",
"ASEAN."
] | [
3,
16,
16,
4,
12,
12,
16,
16,
16,
3,
16,
6,
14,
14,
16,
4,
12,
12,
12,
12,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"PWS:MSIL/Logbro.A",
"Trojan/Win32.Skeeyah.R207512",
"MSIL.Backdoor.SRat.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Heur.DP.ED408E",
"Ransom_Delcryset.R055C0DAF18",
"Trojan-Ransom.Win32.Matrix.qt",
"Trojan.Win32.Matrix.ewhoom",
"Trojan.DownLoader26.4261",
"Ransom_Delcryset.R055C0DAF18",
"BehavesLike.Win32.BadFile.dh",
"W32/Trojan.YJSB-6810",
"TR/AD.RansomHeur.ulxhr",
"Ransom:Win32/Delcryset.A",
"Trojan-Ransom.Win32.Matrix.qt",
"Trj/GdSda.A",
"W32/Filecoder_LockedFile.D!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Allows",
"an",
"application",
"to",
"read",
"the",
"user",
"'s",
"contacts",
"data",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Trend",
"Micro",
"detects",
"these",
"as",
"ANDROIDOS_XLOADER.HRX",
"."
] | [
4,
12,
16,
16,
16,
1,
16
] |
[
"As",
"we",
"'ve",
"seen",
"with",
"actors",
"like",
"Dark",
"Caracal",
",",
"this",
"low",
"cost",
",",
"low",
"sophistication",
"approach",
"that",
"relies",
"heavily",
"upon",
"social",
"engineering",
"has",
"still",
"been",
"shown",
"to",
"be",
"highly",
"successful",
"for",
"those",
"operating",
"such",
"campaigns",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"These",
"tools",
"include:",
"HKTL_MIMIKATZ,",
"HKTL_FGDUMP,",
"and",
"HKTL_VNCPASSVIEW."
] | [
16,
3,
16,
1,
9,
16,
1
] |
[
"FIN7",
"is",
"a",
"financially-motivated",
"threat",
"actor",
"targeting",
"large",
"organizations",
"that",
"process",
"payment",
"card",
"data",
"or",
"have",
"a",
"significant",
"point",
"of",
"sale",
"environment."
] | [
6,
16,
16,
16,
6,
14,
16,
16,
4,
16,
1,
9,
9,
9,
16,
16,
16,
16,
5,
13,
13,
13
] |
[
"This",
"dissimilarity",
"only",
"grew",
"with",
"the",
"further",
"enumeration",
"of",
"other",
"targets,",
"describing",
"a",
"broad",
"targeting",
"across",
"the",
"Middle",
"East",
"without",
"wholly",
"implicating",
"any",
"particular",
"interest,",
"despite",
"clear",
"political",
"intent."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Early",
"versions",
"of",
"the",
"Android",
"application",
"used",
"infrastructure",
"which",
"belonged",
"to",
"a",
"company",
"named",
"Connexxa",
"S.R.L",
"."
] | [
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.B82E",
"Trojan.Nsis.Dwn.ewrrol",
"BehavesLike.Win32.Vopak.cc",
"Trojan.Inject.acan",
"TrojanDownloader:Win32/Tanske.A!bit"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"The",
"malware",
"is",
"responsible",
"for",
"encrypting",
"files",
"on",
"a",
"victim's",
"machine",
"and",
"demanding",
"a",
"ransom",
"via",
"the",
"Bitcoin",
"cryptocurrency."
] | [
16,
3,
16,
16,
11,
1,
9,
16,
16,
5,
13,
16,
16,
16,
1,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Ekidoa.FC.2847",
"Trojan.MSILPerseus.D1EE89",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"TrojWare.MSIL.Ekidoa.A",
"BackDoor.Bladabindi.13678",
"Trojan.MSIL.Crypt",
"TR/Dropper.MSIL.hoclc",
"MSIL/Kryptik.FDF!tr",
"Trojan:MSIL/Ekidoa.A!bit",
"Trojan/Win32.Skeeyah.R194563",
"Backdoor.MSIL.SpyGate",
"Backdoor.Bladabindi",
"Backdoor.SpyGate!"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/FlyStudio.atk",
"Win.Trojan.7691310-1",
"Trojan-Dropper.Win32.Dinwod.vqz",
"Trojan.Win32.FlyStudio.zlxrd",
"Trojan.PWS.Wsgame.36294",
"BehavesLike.Win32.Ipamor.fc",
"Trojan/FlyStudio.dpn",
"Trojan/Win32.FlyStudio",
"Trojan:Win32/Derunsex.A",
"Troj.W32.FlyStudio.atk!c",
"Trojan-Dropper.Win32.Dinwod.vqz",
"Trj/CI.A",
"Win32.Trojan.Flystudio.dbsu",
"Trojan.Crypt",
"W32/FlyStudio.ATK!tr",
"Win32/Trojan.0e3"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"On",
"March",
"29,",
"2023,",
"reports",
"circulating",
"about",
"a",
"potential",
"supply",
"chain",
"compromise",
"for",
"3CXDesktopApp",
"β",
"a",
"softphone",
"application",
"from",
"3CX."
] | [
16,
0,
8,
8,
16,
16,
16,
16,
16,
16,
16,
7,
16,
5,
16,
16,
5,
13,
16,
4
] |
[
"Distribution",
"via",
"trojanized",
"updates",
"to",
"MeDoc",
"users"
] | [
1,
16,
3,
11,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Ransom.Crypren.11",
"Ransom_Denisca.R011C0DLD17",
"Ransom_Denisca.R011C0DLD17",
"Trojan.Win32.Crypren.emfrxs",
"Trojan.MulDrop7.20062",
"BehavesLike.Win32.PWSZbot.dc",
"Trojan.Win32.Crypt",
"W32/Trojan.HSTQ-8964",
"TR/AD.Ergop.ipwuu",
"Trj/CI.A",
"Trojan.Crypren!pGn+9M0dsUI",
"W32/Kryptik.FPNC!tr",
"Win32/Trojan.Ransom.a8a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Enable",
"a",
"secure",
"lock",
"screen",
":",
"Pick",
"a",
"PIN",
",",
"pattern",
",",
"or",
"password",
"that",
"is",
"easy",
"for",
"you",
"to",
"remember",
"and",
"hard",
"for",
"others",
"to",
"guess",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"included",
"altering",
"the",
"icon",
"of",
"the",
"executable",
"to",
"appear",
"as",
"other",
"file",
"types",
"as",
"well",
"as",
"decoy",
"documents",
"to",
"trick",
"users",
"into",
"thinking",
"they",
"had",
"opened",
"a",
"legitimate",
"file."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"What",
"do",
"I",
"need",
"to",
"do",
"?",
"It",
"is",
"extremely",
"unlikely",
"you",
"or",
"someone",
"you",
"know",
"was",
"affected",
"by",
"Chrysaor",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16
] |
[
"It",
"shows",
"that",
"the",
"malware",
"can",
"detect",
"whether",
"it",
"β",
"s",
"running",
"in",
"an",
"emulated",
"environment",
"or",
"a",
"real",
"mobile",
"device",
",",
"and",
"can",
"change",
"its",
"code",
"pattern",
"accordingly",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"What",
"it",
"does",
"FrozenCell",
"masquerades",
"as",
"fake",
"updates",
"to",
"chat",
"applications",
"like",
"Facebook",
",",
"WhatsApp",
",",
"Messenger",
",",
"LINE",
",",
"and",
"LoveChat",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
16,
5,
16,
5,
16,
16,
5,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Risk.Deceptor.Lmla",
"Program.Unwanted.2594",
"Trojan:Win32/Spideepri.A",
"PUP/Win32.SpeedItUpFree.R211310",
"Trojan.Spideepri"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Mimikatz.Win32.268",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Hacktool.Mimikatz",
"Trojan.Win32.Mimikatz.ergkpd",
"Application.Win32.HackTool.Mimikatz.DC",
"Tool.PassView.1872",
"HackTool.Inject.ew",
"Trojan[PSW]/Win32.Mimikatz",
"Trojan/Win32.Mimikatz.R202679",
"TrojanPSW.Mimikatz",
"HackTool.Mimikatz",
"Trj/CI.A",
"Trojan.Application.Hacktool.Mimikatz.1",
"Win32.Trojan-qqpass.Qqrob.Tclv",
"HackTool.Mimikatz",
"hacktool.mimikatz",
"Win32/Trojan.PSW.c71"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Olufus.A3",
"WORM_VB_FB25010D.UVPM",
"Win32.Worm.VB.rb",
"WORM_VB_FB25010D.UVPM",
"Trojan.Win32.Cosmu.dipp",
"Trojan.Win32.Crypt.dsqpuq",
"Trojan.MulDrop5.34309",
"Net-Worm.Win32.Cynic",
"Worm:Win32/Olufus.A",
"Trojan.Heur.E2E727",
"W32.Virut.low6",
"Trojan.Win32.Cosmu.dipp",
"Trojan/Win32.Bredolab.R151314",
"TScope.Trojan.VB",
"Win32/VB.OKI"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.KlassTT.Trojan",
"Backdoor.Sdbot.6331",
"Troj.Dropper.W32.Sysn!c",
"Win32.Trojan.WisdomEyes.16070401.9500.9991",
"Backdoor.Trojan",
"Trojan-Dropper.Win32.Sysn.brns",
"Backdoor.Win32.IRCBot.60928.J",
"BackDoor.IRC.Huxor.59",
"BehavesLike.Win32.Backdoor.qh",
"Backdoor.Win32.SdBot",
"Trojan[Backdoor]/Win32.IRCBot",
"Trojan.Kazy.D14BCA",
"Trojan-Dropper.Win32.Sysn.brns",
"Backdoor:Win32/Arwobot.B",
"Worm/Win32.IRCBot.R4516",
"Win32.Trojan-dropper.Sysn.Lmuh",
"Win32/Trojan.8b1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"These",
"embedded",
"OLE",
"Word",
"documents",
"then",
"contain",
"embedded",
"Adobe",
"Flash",
".SWF",
"files",
"that",
"are",
"designed",
"to",
"exploit",
"Abode",
"Flash",
"vulnerabilities."
] | [
16,
1,
9,
9,
9,
16,
16,
1,
9,
9,
9,
9,
15,
16,
16,
16,
7,
15,
15,
15
] |
[
"Iranian",
"threat",
"agent",
"OilRig",
"has",
"been",
"targeting",
"multiple",
"organisations",
"in",
"Israel",
"and",
"other",
"countries",
"in",
"the",
"Middle",
"East",
"since",
"the",
"end",
"of",
"2015."
] | [
6,
14,
14,
14,
16,
16,
16,
4,
12,
16,
2,
16,
16,
2,
16,
2,
10,
10,
16,
16,
0,
8,
8
] |
[
"In",
"the",
"course",
"of",
"this",
"tactical",
"hunt",
"for",
"unidentified",
"code,",
"RSA",
"discovered",
"a",
"sophisticated",
"attack",
"on",
"a",
"software",
"supply-chain",
"involving",
"a",
"Trojan",
"inserted",
"in",
"otherwise",
"legitimate",
"software;",
"software",
"that",
"is",
"typically",
"used",
"by",
"enterprise",
"system",
"administrators."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
1,
9,
16,
16,
4,
12,
16,
16,
3,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
5,
13,
13
] |
[
"Neuron",
"and",
"Nautilus",
"are",
"malicious",
"tools",
"designed",
"to",
"operate",
"on",
"Microsoft",
"Windows",
"platforms,",
"primarily",
"targeting",
"mail",
"servers",
"and",
"web",
"servers."
] | [
3,
16,
3,
16,
3,
11,
16,
16,
16,
16,
5,
13,
13,
16,
16,
4,
12,
16,
4,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.MambaAHQc.Trojan",
"Trojan.Python.Win32.34",
"Trojan/Mamba.g",
"Win32.Trojan.WisdomEyes.16070401.9500.9555",
"BehavesLike.Win32.Trojan.vh",
"Python/Blakamba.A!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"In",
"our",
"tests",
",",
"the",
"malware",
"sample",
"was",
"able",
"to",
"easily",
"detect",
"both",
"VMWare",
"and",
"Hyper-V",
"environments",
"through",
"the",
"detection",
"of",
"the",
"virtualized",
"peripherals",
"(",
"for",
"example",
",",
"Vmware",
"has",
"VEN_15AD",
"as",
"vendor",
"ID",
",",
"HyperV",
"has",
"VMBus",
"as",
"bus",
"name",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"attack",
"compromised",
"their",
"devices",
"and",
"exfiltrated",
"data",
"to",
"the",
"attackers'",
"command",
"and",
"control",
"server."
] | [
16,
1,
9,
16,
5,
16,
1,
9,
16,
16,
6,
1,
9,
9,
9
] |
[
"Infrastructure",
"At",
"the",
"time",
"of",
"writing",
"the",
"following",
"domains",
"have",
"either",
"been",
"used",
"by",
"this",
"family",
"or",
"are",
"currently",
"active",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Overview",
"The",
"malware",
"was",
"first",
"detected",
"on",
"a",
"Nexus",
"5",
"smartphone",
",",
"and",
"although",
"the",
"user",
"attempted",
"to",
"remove",
"the",
"infected",
"app",
",",
"the",
"malware",
"reappeared",
"on",
"the",
"same",
"device",
"shortly",
"thereafter",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"earliest",
"we",
"observed",
"this",
"spreader",
"variant",
"pushing",
"Mirai",
"downloaders",
"was",
"January",
"2017."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
0,
8
] |
[
"In",
"late",
"2013ΒΒΒβearly",
"2014,",
"a",
"compromised",
"FTP",
"client",
"dubbed",
"StealZilla,",
"based",
"off",
"the",
"open",
"source",
"FileZilla",
"FTP",
"client",
"was",
"discovered."
] | [
16,
16,
0,
8,
16,
1,
9,
16,
16,
3,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16
] |
[
"This",
"particular",
"APT",
"is",
"targeting",
"organizations",
"that",
"include",
"weapons",
"manufacturers,",
"human",
"rights",
"activists,",
"and",
"pro-democracy",
"groups,",
"among",
"others."
] | [
16,
16,
6,
16,
16,
4,
15,
16,
4,
12,
12,
12,
12,
16,
4,
12,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Danmec.E.iw5",
"Trojan.Asprox",
"W32/Danmec.R",
"TROJ_DANMEC.SM",
"Trojan.Win32.Danmec!IK",
"TrojWare.Win32.Kryptik.CG",
"Trojan.DownLoad2.37322",
"TR/Spy.Web.H",
"TROJ_DANMEC.SM",
"Worm/Aspxor.ey",
"Trojan/Win32.Danmec",
"Trojan.Danmec",
"Trojan.Asprox!rem",
"Trojan.Win32.Danmec",
"W32/Danmec.C!tr",
"Trj/Damnec.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"As",
"a",
"result",
",",
"it",
"may",
"be",
"that",
"are",
"looking",
"into",
"a",
"compromised",
",",
"parked",
"domain",
"that",
"was",
"initially",
"used",
"legitimately",
",",
"but",
"is",
"now",
"participating",
"in",
"malicious",
"activities",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"ART",
"team",
"at",
"Fortinet",
"has",
"discovered",
"a",
"new",
"malware",
"named",
"Proteus,",
"a",
"multifunctional",
"botnet",
"written",
"in",
".NET",
"that",
"appears",
"to",
"be",
"a",
"proxy,",
"coin",
"miner,",
"e-commerce",
"merchant",
"account",
"checker,",
"and",
"keylogger."
] | [
4,
12,
12,
16,
4,
16,
16,
16,
16,
3,
16,
3,
16,
16,
3,
16,
16,
5,
16,
16,
16,
16,
16,
3,
11,
11,
11,
11,
11,
11,
16,
3
] |
[
"CHANGE_GCM_ID",
"β",
"change",
"GCM",
"ID",
"."
] | [
16,
16,
16,
16,
16,
16
] |
[
"]",
"net",
",",
"is",
"now",
"a",
"legitimate",
"version",
"of",
"the",
"DroidVPN",
"app",
",",
"and",
"looks",
"as",
"shown",
"in",
"Figure",
"1",
"below",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"From",
"the",
"Nymaim",
"malware,",
"it",
"leverages",
"the",
"dropper's",
"stealth",
"and",
"persistence;",
"the",
"Gozi",
"ISFB",
"parts",
"add",
"the",
"banking",
"Trojan's",
"capabilities",
"to",
"facilitate",
"fraud",
"via",
"infected",
"Internet",
"browsers."
] | [
16,
16,
3,
11,
16,
16,
16,
1,
9,
16,
1,
16,
3,
11,
16,
16,
16,
3,
11,
1,
16,
16,
16,
16,
5,
13,
13
] |
[
"The",
"email",
"address",
"and",
"country",
"information",
"drove",
"us",
"to",
"a",
"list",
"of",
"students",
"attending",
"a",
"class",
"at",
"a",
"Vietnamese",
"university",
"β",
"corroborating",
"the",
"existence",
"of",
"the",
"person",
"under",
"whose",
"name",
"the",
"domain",
"was",
"registered",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Backdoor",
"that",
"installs",
"itself",
"at",
"%Application",
"Data%\\remcos"
] | [
3,
16,
16,
16,
16,
1,
9
] |
[
"]",
"122:28833",
"61",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"Based",
"on",
"strings",
"found",
"in",
"the",
"samples",
"we",
"analyzed,",
"we",
"have",
"named",
"this",
"backdoor",
"Gazer"
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
3
] |
[
"It",
"spreads",
"via",
"unusual",
"means,",
"including",
"the",
"hijacking",
"of",
"traffic",
"from",
"nationwide",
"ISPs,",
"an",
"SNS",
"worm",
"on",
"Windows,",
"and",
"an",
"offline",
"app",
"installation",
"and",
"community",
"promotion."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
3,
11,
16,
5,
16,
16,
5,
13,
16,
16,
16,
16
] |
[
"The",
"Zen",
"trojan",
"After",
"achieving",
"persistence",
",",
"the",
"trojan",
"downloads",
"additional",
"payloads",
",",
"including",
"another",
"trojan",
"called",
"Zen",
"."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dynamer",
"Win32.Trojan.WisdomEyes.16070401.9500.9986",
"Trojan.Win32.Dwn.efyiis",
"Trojan.DownLoader22.7328",
"BehavesLike.Win32.PUPXAA.kc",
"Trojan:MSIL/Watam.A",
"Trojan.MSIL.Spy"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"Our",
"analysis",
"shows",
"that",
"the",
"threat",
"actor",
"behind",
"the",
"FakeSpy",
"malware",
"is",
"a",
"Chinese-speaking",
"group",
",",
"commonly",
"referred",
"to",
"as",
"\"",
"Roaming",
"Mantis",
"''",
",",
"a",
"group",
"that",
"is",
"known",
"to",
"have",
"launched",
"similar",
"campaigns",
"in",
"the",
"past",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"payload",
"we",
"got",
"also",
"specifically",
"targets",
"Korean",
"banks",
"by",
"modifying",
"the",
"infected",
"systems",
"hosts",
"file",
"to",
"redirect",
"traffic",
"from",
"Korean",
"banks",
"to",
"its",
"controlled",
"server."
] | [
16,
3,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
5,
13,
1,
9,
9,
9,
9,
16,
4,
12,
16,
16,
1,
9
] |
[
"This",
"particular",
"peice",
"of",
"malware",
"uses",
"a",
"open",
"source",
"VB6",
"peice",
"of",
"malware",
"called",
"vnLoader'."
] | [
16,
16,
16,
16,
3,
16,
16,
1,
9,
9,
16,
16,
3,
16,
3
] |
[
"This",
"group",
"has",
"been",
"active",
"since",
"2010.",
"We",
"dub",
"this",
"operation",
"Shrouded",
"Crossbow,",
"after",
"a",
"mutex",
"in",
"a",
"backdoor",
"the",
"group",
"developed."
] | [
16,
6,
16,
16,
16,
16,
0,
16,
16,
16,
6,
14,
14,
16,
16,
3,
16,
16,
3,
16,
6,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Android.Trojan.Boxer.as",
"HEUR:Trojan-SMS.AndroidOS.FakeInst.a",
"HEUR:Trojan-SMS.AndroidOS.FakeInst.a"
] | [
16,
3,
16,
16,
16,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dynamer.FC.314",
"Win32.Trojan.WisdomEyes.16070401.9500.9959",
"Trojan.Win32.Inject.aexnv",
"Trojan.DownLoader24.51009",
"TR/AD.NETCryptor.dneew",
"Trojan/Win32.Inject",
"Backdoor:MSIL/Omaneat.B",
"Trojan.MSILPerseus.D17E4F",
"Trojan/Win32.Fsysna.C1935209",
"Trojan.Win32.Inject.aexnv",
"Trj/GdSda.A",
"Win32.Trojan.Inject.Fsc"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"FireEye",
"Labs",
"recently",
"discovered",
"a",
"previously",
"unknown",
"variant",
"of",
"the",
"APT",
"backdoor",
"XSLCmd",
"β",
"OSX.XSLCmd",
"β",
"which",
"is",
"designed",
"to",
"compromise",
"Apple",
"OS",
"X",
"systems."
] | [
4,
12,
16,
16,
16,
16,
3,
11,
16,
16,
14,
3,
11,
11,
11,
11,
16,
16,
16,
16,
16,
5,
13,
13,
13
] |
[
"It",
"is",
"safe",
"to",
"say",
"that",
"today",
"β",
"s",
"cybercriminal",
"is",
"no",
"longer",
"a",
"lone",
"hacker",
"but",
"part",
"of",
"a",
"serious",
"business",
"operation",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.PWS.Kukel.A",
"Trojan-PWS/W32.Kukel.14116",
"Trojan.PWS.Kukel.A",
"Trojan/PSW.Kukel",
"Trojan.PWS.Kukel.A",
"Win32.Trojan.WisdomEyes.16070401.9500.9985",
"TROJ_KUKEL.A",
"Trojan.PWS.Kukel.A",
"Trojan-PSW.Win32.Kukel",
"Trojan.PWS.Kukel.A",
"Trojan.Win32.Kukel.hjwe",
"Trojan.Win32.PSWKukel.14116",
"Troj.PSW32.W.Kukel!c",
"Trojan.PWS.Kukel.A",
"TrojWare.Win32.PSW.Kukel",
"Trojan.PWS.Kukel.A",
"Trojan.PWS.Kukel",
"Trojan.Kukel.Win32.4",
"TROJ_KUKEL.A",
"W32/Risk.QXSE-2226",
"Trojan/PSW.Kukel",
"TR/PSW.Kukel.1",
"Trojan-PSW.Win32.Kukel",
"TrojanPSW.Kukel",
"Win32/PSW.Kukel",
"Win32.Trojan-qqpass.Qqrob.Wsko",
"Trojan.PWS.Kukel!uom8kUpytHQ",
"W32/Kukel.A!tr.pws"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"entry",
"is",
"to",
"explain",
"features",
"of",
"Datper,",
"malware",
"used",
"for",
"targeted",
"attacks",
"against",
"Japanese",
"organisations",
"and",
"how",
"to",
"detect",
"it",
"from",
"the",
"logs."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
1,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Tvt",
"Trojan.Korplug.Win32.309",
"Trojan.Zusy.D41CD9",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win32.Tvt.ll",
"Trojan.KeyLogger.27522",
"Backdoor:Win32/Sogu.A!dha",
"Trojan.Win32.Tvt.ll",
"Backdoor/Win32.Etso.R17333",
"Trojan.Win32.Korplug"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Detected",
"as",
"ANDROIDOS_SLOCKER.OPSCB,",
"this",
"new",
"SLocker",
"mobile",
"ransomware",
"variant",
"features",
"new",
"routines",
"that",
"utilize",
"features",
"of",
"the",
"Chinese",
"social",
"network",
"QQ,",
"along",
"with",
"persistent",
"screen-locking",
"capabilities."
] | [
16,
16,
1,
16,
16,
3,
11,
11,
11,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
12,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9984",
"Trojan-Banker.Win32.Metel.cai",
"Trojan.Win32.Metel.edlvqj",
"Troj.Banker.W32.Metel!c",
"Trojan.Bayanker.42",
"BehavesLike.Win32.FakeAlertSecurityTool.dc",
"Trojan.Banker.Metel.ys",
"TR/Kryptik.rfzx",
"Trojan:Win32/Exgectow.A",
"Trojan-Banker.Win32.Metel.cai",
"Trojan/Win32.Dorv.R166106",
"Trj/CI.A",
"Win32/Corkow.AI",
"Win32.Outbreak",
"Win32/Trojan.9df"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Recent",
"new",
"reporting",
"was",
"released",
"on",
"the",
"DragonOK",
"group",
"which",
"unveiled",
"the",
"many",
"versions",
"of",
"the",
"Sysget",
"backdoor",
"as",
"well",
"as",
"the",
"IsSpace",
"backdoor."
] | [
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
3,
16,
16,
3,
11,
16,
16,
16,
3,
11,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Vehidis",
"Trojan.Win32.Vehidis.wpm",
"Trojan.Win32.Crypted.dodbbd",
"Trojan.Win32.Z.Vehidis.24576.K",
"Troj.W32.Vehidis!c",
"Trojan.Vehidis.Win32.1902",
"Trojan.Vehidis.hd",
"BDS/Sakkair.ebcng",
"Backdoor:Win32/Sakkair.A",
"Trojan.Win32.Vehidis.wpm",
"Trojan/Win32.Farfli.R115053",
"Trojan.Vehidis",
"Trj/CI.A",
"Win32.Trojan.Vehidis.Hquw"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.MSIL",
"Win32.Trojan.WisdomEyes.16070401.9500.9655",
"Infostealer.Limitail",
"Trojan.Win32.Z.Limitail.303616",
"Trojan.DownLoader19.57204",
"BehavesLike.Win32.PUPXAG.dc",
"TR/Dropper.MSIL.lrzyl",
"Trojan.MSILPerseus.D234A0",
"TrojanSpy:MSIL/Plimrost.B",
"Trojan/Win32.Kryptik.C2400864",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Standing",
"out",
"because",
"of",
"its",
"prevalence",
"and",
"its",
"sophistication,",
"Stantinko",
"turned",
"out",
"to",
"be",
"quite",
"a",
"puzzle",
"to",
"solve."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"utility",
"does",
"several",
"interesting",
"things",
"to",
"evade",
"antivirus",
"detection."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Android.Adware.Airpush.55AE",
"Android.Adware.Plankton.A",
"Android.Adware.Plankton.A",
"Android.Trojan.Plankton.k",
"AndroidOS/Plankton.B",
"A.H.Pri.Afoynq.F",
"Trojan.Android.Airpush.djpqsd",
"Adware.MultiAds!1.9D9E",
"Android.Adware.Plankton.A",
"Android.Adware.Plankton",
"Adware.Airpush.3.origin",
"AndroidOS/Plankton.B",
"Android.Adware.Plankton.A",
"Android.Adware.Plankton!c",
"Android-PUP/Airpush.2ac1",
"Android.Adware.Plankton.A",
"Adware.AndroidOS.AirPush.a",
"AdWare.AndroidOS.Apperhand"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Successful",
"exploitation",
"seems",
"to",
"be",
"possible",
"on",
"all",
"currently",
"supported",
"versions",
"of",
"MS",
"Office",
"up",
"and",
"including",
"the",
"MS15-022",
"patch."
] | [
16,
7,
16,
16,
16,
16,
16,
16,
16,
16,
15,
16,
5,
13,
16,
16,
16,
16,
1,
9
] |
[
"Proofpoint",
"researchers",
"have",
"observed",
"a",
"well-known",
"Russian-speaking",
"APT",
"actor",
"usually",
"referred",
"to",
"as",
"Turla",
"using",
"a",
"new",
".NET/MSIL",
"dropper",
"for",
"an",
"existing",
"backdoor",
"called",
"JS/KopiLuwak."
] | [
4,
12,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
3,
16,
16,
16,
1,
9,
16,
16,
16,
3,
16,
1
] |
[
"]",
"com",
"ws.my-local-weather",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"Both",
"apps",
"shared",
"the",
"same",
"C",
"&",
"C",
"server",
",",
"but",
"we",
"couldn",
"β",
"t",
"investigate",
"the",
"latter",
"as",
"it",
"had",
"already",
"been",
"removed",
"from",
"the",
"Google",
"Play",
"store",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16
] |
[
"Once",
"installed",
",",
"HenBox",
"steals",
"information",
"from",
"the",
"devices",
"from",
"a",
"myriad",
"of",
"sources",
",",
"including",
"many",
"mainstream",
"chat",
",",
"communication",
",",
"and",
"social",
"media",
"apps",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"itself",
"is",
"a",
"fully",
"featured",
"RAT,",
"which",
"uses",
"a",
"compressed,",
"optionally",
"encrypted,",
"raw",
"TCP",
"socket",
"and",
"binary",
"message",
"protocol",
"for",
"command",
"and",
"control",
"communications."
] | [
16,
3,
16,
16,
16,
16,
16,
3,
16,
16,
16,
1,
16,
1,
9,
9,
9,
16,
1,
9,
9,
11,
1,
9,
9,
9
] |
[
"This",
"time,",
"however,",
"attackers",
"opportunistically",
"used",
"spear-phishing",
"emails",
"with",
"a",
"Microsoft",
"Word",
"attachment",
"exploiting",
"the",
"recently",
"patched",
"CVE-2017-0199",
"to",
"deploy",
"the",
"ZeroT",
"Trojan,",
"which",
"in",
"turn",
"downloaded",
"the",
"PlugX",
"Remote",
"Access",
"Trojan",
"RAT."
] | [
16,
16,
16,
6,
16,
16,
1,
9,
16,
16,
1,
9,
9,
7,
16,
16,
16,
1,
16,
16,
16,
3,
11,
16,
16,
16,
3,
16,
3,
11,
11,
11,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Banker.Win32.89325",
"Trojan/Spy.Banker.yss",
"Trojan.Win32.Z.Banker.5002130",
"Trojan.DownLoader13.22038",
"Trojan/Win32.Scar",
"Win32.Troj.Undef.kcloud",
"PWS:Win32/Mujormel.A",
"TScope.Trojan.Delf"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
Subsets and Splits