tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"T1444",
"Masquerade",
"as",
"Legitimate",
"Application",
"Impersonates",
"legitimate",
"GAS",
"Tecnologia",
"application",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16
] |
[
"]",
"208",
"attiva.exodus.esurv",
"[",
"."
] | [
9,
9,
1,
9,
9
] |
[
"Most",
"recently,",
"we",
"have",
"observed",
"the",
"same",
"group",
"targeting",
"military",
"and",
"aerospace",
"interests",
"in",
"Russia",
"and",
"Belarus."
] | [
16,
16,
16,
16,
16,
6,
14,
14,
16,
4,
16,
4,
16,
16,
2,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Meciv",
"Win32/Pucedoor.A",
"Trojan.Enfal-11",
"Application.Win32.BlkIC.IMG",
"Trojan.MulDrop1.40578",
"TR/Spy.174210",
"Trojan.Heur.E0B301",
"Backdoor:Win32/Meciv.A",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"current",
"variant",
"includes",
"a",
"link",
"to",
"the",
"following",
"payment",
"onion",
"website:",
"http://zvnvp2rhe3ljwf2m[.]onion."
] | [
16,
16,
16,
16,
16,
1,
16,
16,
16,
1,
9,
9,
9
] |
[
"TV5Monde",
"was",
"taken",
"off",
"air",
"in",
"April",
"2015."
] | [
4,
16,
16,
16,
16,
16,
0,
8
] |
[
"Kaspersky",
"Some",
"time",
"ago",
"while",
"tracking",
"Winnti",
"group",
"activity",
"we",
"came",
"across",
"a",
"suspicious",
"64-bit",
"sample."
] | [
4,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
1,
9
] |
[
"I",
"hope",
"that",
"by",
"uncovering",
"this",
"malware",
"at",
"such",
"an",
"early",
"stage",
",",
"we",
"will",
"be",
"able",
"to",
"prevent",
"a",
"massive",
"and",
"dangerous",
"attack",
"when",
"the",
"attackers",
"are",
"ready",
"to",
"actively",
"use",
"their",
"methods",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"group",
"discussed",
"in",
"this",
"white",
"paper",
"is",
"part",
"of",
"this",
"new",
"trend."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.3E85",
"Backdoor.Win32.Nepoe!O",
"Dropper.Paradrop.Win32.108",
"W32/Korgo.worm",
"PE_AGOBOT.AQM",
"Win32.Trojan.WisdomEyes.16070401.9500.9889",
"W32/Bobax.AO",
"W32.Bleshare",
"PE_AGOBOT.AQM",
"Win.Trojan.Poebot-45",
"Trojan-Dropper.Win32.Paradrop.a",
"Trojan.Win32.Paradrop.xhlx",
"Dropper.Paradrop.180736",
"Troj.Dropper.W32.Paradrop.kYTK",
"TrojWare.Win32.TrojanDropper.Paradrop.a0",
"Trojan.MulDrop.2267",
"BehavesLike.Win32.Conficker.cc",
"Backdoor.Win32.PoeBot.C",
"W32/Bobax.LVYX-1108",
"TrojanDropper.Paradrop",
"TR/Drop.Paradro.a.3",
"Trojan[Backdoor]/Win32.Agobot",
"TrojanDropper:Win32/Paradrop.J",
"Trojan-Dropper.Win32.Paradrop.a",
"W32/Polybot.dr",
"Backdoor.PoeBot",
"Trj/Droppofonic.A",
"Win32/TrojanDropper.Paradrop.A",
"Worm.PoeBot.S",
"W32/Paradrop.B!tr.dr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"databit",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"]",
"204",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"This",
"blog",
"will",
"provide",
"an",
"analysis",
"of",
"the",
"Bookworm",
"Trojan",
"and",
"known",
"indicators",
"of",
"compromise."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
1,
9,
9
] |
[
"The",
"beaconing",
"is",
"sent",
"to",
"the",
"URL",
"http",
":",
"//",
"/api/v2/get.php",
"with",
"an",
"interval",
"of",
"60",
"seconds",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16
] |
[
"Copy",
"the",
"stage",
"5",
"DLL",
"into",
"winlogon.exe",
"Allocate",
"a",
"chunk",
"of",
"memory",
"in",
"winlogon.exe",
"process",
"and",
"copy",
"the",
"same",
"APC",
"routine",
"seen",
"previously",
"Read",
"and",
"save",
"the",
"original",
"pointer",
"of",
"the",
"__fnDWORD",
"internal",
"User32",
"routine",
"(",
"located",
"at",
"offset",
"+0x10",
"of",
"the",
"KernelCallbackTable",
")",
"and",
"replace",
"this",
"pointer",
"with",
"the",
"address",
"of",
"the",
"APC",
"stub",
"routine",
"After",
"this",
"function",
"pointer",
"hijacking",
",",
"when",
"winlogon.exe",
"makes",
"any",
"graphical",
"call",
"(",
"GDI",
")",
",",
"the",
"malicious",
"code",
"can",
"execute",
"without",
"using",
"CreateRemoteThread",
"or",
"similar",
"triggers",
"that",
"are",
"easily",
"detectable",
"."
] | [
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"SentinelLabs",
"analyzed",
"several",
"iterations",
"of",
"AlienFox,",
"a",
"comprehensive",
"toolset",
"for",
"harvesting",
"credentials",
"for",
"multiple",
"cloud",
"service",
"providers."
] | [
4,
16,
16,
16,
16,
4,
16,
16,
3,
16,
1,
9,
16,
16,
5,
13,
13
] |
[
"Many",
"of",
"these",
"samples",
"appear",
"to",
"be",
"designed",
"specifically",
"to",
"attempt",
"to",
"slip",
"into",
"the",
"Play",
"Store",
"undetected",
"and",
"are",
"not",
"seen",
"elsewhere",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16
] |
[
"While",
"not",
"too",
"seriously",
",",
"these",
"elements",
"made",
"us",
"restrict",
"our",
"research",
"into",
"surveillance",
"companies",
"from",
"the",
"region",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"app",
"ties",
"together",
"two",
"malware",
"families",
"-",
"Desert",
"Scorpion",
"and",
"another",
"targeted",
"surveillanceware",
"family",
"named",
"FrozenCell",
"-",
"that",
"we",
"believe",
"are",
"being",
"developed",
"by",
"a",
"single",
",",
"evolving",
"surveillanceware",
"actor",
"called",
"APT-C-23",
"targeting",
"individuals",
"in",
"the",
"Middle",
"East",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.OnGamesLTPGOWF.Trojan",
"Trojan/W32.Small.35840.NP",
"Backdoor.Win32.Floder!O",
"Backdoor/Floder.rlw",
"Win32/Tnega.ANRP",
"Backdoor.Win32.A.Floder.37376[UPX]",
"Trojan.MulDrop1.37252",
"Backdoor/Floder.age",
"Trojan[Backdoor]/Win32.Floder",
"Backdoor:Win32/RDPopen.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"remaining",
"99",
"C",
"C",
"servers",
"were",
"duplicated",
"configurations",
"from",
"different",
"APKs.",
"This",
"is",
"likely",
"due",
"to",
"configuration",
"files",
"being",
"hardcoded",
"within",
"the",
"APK,",
"and",
"old",
"spam",
"campaigns",
"infecting",
"different",
"users,",
"thus,",
"old",
"configurations",
"still",
"being",
"detected",
"in",
"the",
"wild."
] | [
16,
16,
1,
9,
9,
9,
16,
16,
1,
16,
16,
5,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
5,
16,
6,
14,
14,
16,
16,
4,
16,
16,
1,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Android",
"banking",
"Trojan",
"rental",
"business",
"Rental",
"of",
"banking",
"Trojans",
"is",
"not",
"new",
"."
] | [
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom_Ciluf.R002C0DL517",
"Win32.Trojan.WisdomEyes.16070401.9500.9967",
"Ransom_Ciluf.R002C0DL517",
"BehavesLike.Win32.Backdoor.ct",
"W32/Trojan.QHYA-4995",
"Ransom:Win32/Ciluf.A",
"Ransom.Lucifer",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/W32.Tiny.3072",
"Backdoor.Win32.Tiny!O",
"Backdoor.Tiny",
"BackDoor-IQ.b",
"Troj.Dropper.W32.Small.l6P3",
"Backdoor/Tiny.c",
"Win32.Trojan.WisdomEyes.16070401.9500.9646",
"Backdoor.Trojan",
"BKDR_IQ.B",
"Backdoor.Win32.Tiny.c",
"Backdoor.Win32.Tiny.6144",
"BackDoor.Tiny.40",
"BKDR_IQ.B",
"BackDoor-IQ.b",
"Backdoor/Tiny.aw",
"TR/Tiny.nmclh",
"Trojan[Backdoor]/Win32.Tiny.c",
"Trojan.Zusy.Elzob.804",
"Backdoor.Win32.Tiny.c",
"Backdoor:Win32/Tiny.FBC",
"Win-Trojan/IQ.B",
"Backdoor.Win32.Small.Epi",
"Bck/Tiny.B",
"Win32.Backdoor.Tiny.Pcsz",
"Backdoor.Win32.Tiny",
"BDoor.IQ!tr.bdr",
"Win32/Trojan.d37"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Nofear.C",
"W32.W.Fearso.kYUv",
"W32/Fearso.c",
"Win32.Worm.Farex.a",
"W32/Worm.AEST",
"W32.Nofer.A@mm",
"win32/Nofear.A",
"Win.Worm.Fearso-2",
"Email-Worm.Win32.Fearso.c",
"Trojan.Win32.Fearso.cssoyh",
"I-Worm.Win32.A.Fearso.86541",
"Worm.Win32.Fearso.~BAAA",
"Trojan.AVKill.9837",
"Worm.Fearso.Win32.9",
"BehavesLike.Win32.Nofear.mh",
"Backdoor.Win32.Gobot",
"W32/Worm.ENOQ-1581",
"I-Worm/Fearso.c",
"Worm:Win32/Nofear.C@mm",
"Worm[Email]/Win32.Fearso",
"Worm:Win32/Nofear.C@mm",
"Worm.Fearo",
"Email-Worm.Win32.Fearso.c",
"Worm.Fearso",
"W32/Fearso.V.worm",
"I-Worm.Farex.Y",
"Win32/Farex.Y",
"Trojan.Win32.Fearso.c",
"I-Worm.Fearso!qiaAnheOcEc",
"Worm.Win32.Nofear.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9925",
"Trojan.Win32.Yakes.vpge",
"TR/Crypt.ZPACK.jrfyx",
"Trojan:Win64/Carberp.A!bit",
"Trojan.Win32.Yakes.vpge"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"A",
"worm",
"that",
"spreads",
"by",
"copying",
"itself",
"to",
"file",
"shares",
"and",
"removable",
"drives."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
1,
9,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.MSIL",
"Win32.Trojan.WisdomEyes.16070401.9500.9554",
"Trojan.Win32.Mlw.eugajo",
"Trojan.Win32.Z.Firsot.3520512",
"W32/Trojan.KPJB-2397",
"Backdoor:MSIL/Firsot.A",
"Trj/CI.A",
"Backdoor.MSIL.Firsot",
"Win32/Trojan.289"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"EVENTBOT",
"VERSION",
"0.0.0.2",
"Dynamic",
"Library",
"Loading",
"As",
"of",
"Version",
"0.0.0.2",
",",
"EventBot",
"attempts",
"to",
"hide",
"its",
"main",
"functionality",
"from",
"static",
"analysis",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Kazy.D1D724",
"W32/Trojan.PVRS-3848",
"Trojan.Win32.PcClient.eptxte",
"Trojan.Win32.Z.Pcclient.356864",
"BackDoor.PcClient.6543",
"Trojan.Reconyc.Win32.20285",
"BehavesLike.Win32.Dropper.fc",
"Trojan.Win32.Krypt",
"Trojan.Reconyc.gyp",
"TR/Crypt.ZPACK.igurt",
"Trojan[DDoS]/Win32.Macri",
"TrojanDownloader:Win32/Redosdru.F!bit",
"Trojan/Win32.Infostealer.R206663",
"TrojanDDoS.Macri",
"Trj/CI.A",
"W32/Kryptik.FQKI!tr",
"Win32/Trojan.443"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"One",
"interesting",
"new",
"fact",
"about",
"Gaza",
"cybergang",
"activities",
"is",
"that",
"they",
"are",
"actively",
"sending",
"malware",
"files",
"to",
"IT",
"Information",
"Technology",
"and",
"IR",
"Incident",
"Response",
"staff;",
"this",
"is",
"also",
"obvious",
"from",
"the",
"file",
"names",
"they",
"are",
"sending",
"to",
"victims,",
"which",
"reflect",
"the",
"IT",
"functions",
"or",
"IR",
"tools",
"used",
"in",
"cyber",
"attack",
"investigations."
] | [
16,
16,
16,
16,
16,
6,
14,
16,
16,
15,
16,
16,
16,
16,
1,
9,
16,
4,
12,
12,
16,
4,
12,
12,
12,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
1,
9,
16,
16,
1,
9,
16
] |
[
"Once",
"delivered,",
"Escelar",
"has",
"multiple",
"installation",
"stages",
"where",
"malware",
"is",
"downloaded",
"using",
"direct",
"connections",
"to",
"multiple",
"Microsoft",
"SQL",
"servers."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
3,
16,
16,
16,
1,
9,
16,
5,
13,
13,
13
] |
[
"However,",
"unlike",
"Dyre",
"which",
"was",
"designed",
"to",
"target",
"banking",
"information,",
"Rombertik",
"collects",
"information",
"from",
"all",
"websites",
"in",
"an",
"indiscriminate",
"manner."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
4,
12,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Heur.DP.E18DA6",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32.W.Dorifel.moev",
"TrojWare.Win32.Delf.OSP1",
"Trojan.DownLoad1.16614",
"Trojan-Downloader.Win32.Rochap",
"TR/Dldr.Rochap.J",
"Trojan/Win32.Unknown",
"TrojanDropper:Win32/Rochap.H",
"Win32/Delf.OSP",
"W32/Dropper.VFR!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Downloader.Harnig.al",
"Trojan-Downloader.Win32.Harnig!O",
"Downloader.Small.28090",
"Trojan/Downloader.Harnig.al",
"Win32.Trojan.WisdomEyes.16070401.9500.9939",
"Downloader.Trojan",
"Win.Downloader.Small-579",
"Trojan.Downloader.Harnig.al",
"Trojan-Downloader.Win32.Harnig.al",
"Trojan.Downloader.Harnig.al",
"Trojan.Win32.Harnig.voqq",
"Trojan.Win32.A.Downloader.10240.FS",
"Troj.Downloader.W32.Harnig.al!c",
"Trojan.Downloader.Harnig.al",
"TrojWare.Win32.TrojanDownloader.Harnig.AL",
"Trojan.Downloader.Harnig.al",
"Trojan.DownLoader.919",
"Downloader.Harnig.Win32.353",
"BehavesLike.Win32.Cutwail.lt",
"Trojan-Downloader.Win32.Harnig",
"Trojan/Startpage.nv",
"W32.Trojan.Downloader.Harnig",
"Trojan[Downloader]/Win32.Harnig",
"Trojan.Downloader.Harnig.al",
"Trojan-Downloader.Win32.Harnig.al",
"Trojan/Win32.Downloader.R39433",
"Trojan.Downloader.Harnig.al",
"OScope.Downloader.GCLA",
"Trj/Harnig.AD",
"Win32/TrojanDownloader.Harnig.AL",
"Win32.Trojan-downloader.Harnig.Sxyp",
"Trojan.QHost.L",
"W32/Harnig.AI!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"campaign",
"involved",
"five",
"separate",
"phishing",
"attacks,",
"each",
"carrying",
"a",
"different",
"variant",
"of",
"Sysget",
"malware,",
"also",
"known",
"as",
"HelloBridge."
] | [
16,
6,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.SkipnetA.Trojan",
"Trojan.VB",
"W32/Bybz.ehk",
"Trojan.IPZ.3",
"Win32.Trojan.WisdomEyes.16070401.9500.9995",
"TROJ_VB_GA2509B6.UVPM",
"Win.Trojan.Injector-397",
"Trojan.Win32.AutoRun.thcnx",
"Worm.Win32.AutoRun.dck",
"Trojan.MulDrop2.2467",
"Worm.Bybz.Win32.935",
"TROJ_VB_GA2509B6.UVPM",
"BehavesLike.Win32.VBobfus.dc",
"Trojan/Cosmu.gzo",
"W32/Llac.PMC!tr",
"Worm/Win32.Bybz",
"Worm.Win32.A.AutoRun.206367",
"Worm/Win32.AutoRun.C11891",
"PWS-Spyeye.ai",
"OScope.Worm.Bybz.31321",
"Worm.Bybz!gMC6zzOscGs",
"Backdoor.Win32.Poison"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"These",
"tools",
"included",
"utilities",
"from",
"Microsoft",
"Sysinternals",
"and",
"parts",
"of",
"open-source",
"projects."
] | [
16,
3,
16,
16,
16,
5,
13,
16,
16,
16,
5,
13
] |
[
"Once",
"opened",
",",
"HenBox",
"runs",
"the",
"following",
"query",
"to",
"gather",
"message",
"information",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"To",
"distribute",
"the",
"malicious",
"excel",
"file,",
"the",
"attackers",
"registered",
"a",
"domain",
"which",
"impersonated",
"the",
"identity",
"of",
"most",
"influential",
"Indian",
"think",
"tank",
"IDSA",
"Institute",
"for",
"Defence",
"Studies",
"and",
"Analyses",
"and",
"used",
"the",
"email",
"id",
"from",
"the",
"impersonating",
"domain",
"to",
"send",
"out",
"the",
"spear-phishing",
"emails",
"to",
"the",
"victims."
] | [
16,
16,
16,
1,
9,
9,
16,
6,
16,
16,
1,
16,
16,
16,
1,
9,
9,
9,
9,
4,
12,
12,
12,
12,
12,
12,
12,
12,
16,
16,
16,
1,
11,
16,
16,
1,
9,
16,
16,
16,
16,
1,
9,
16,
16,
4
] |
[
"For",
"example",
",",
"the",
"Ztorg",
"Trojan",
"has",
"been",
"uploaded",
"to",
"Google",
"Play",
"almost",
"100",
"times",
"since",
"September",
"2016",
"."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16
] |
[
"YouTube",
"channel",
"of",
"the",
"malicious",
"developer",
"His",
"YouTube",
"channel",
"provided",
"us",
"with",
"another",
"valuable",
"piece",
"of",
"information",
":",
"he",
"himself",
"features",
"in",
"a",
"video",
"tutorial",
"for",
"one",
"of",
"his",
"other",
"projects",
"."
] | [
5,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"malware",
"appears",
"to",
"have",
"been",
"named",
"Hinata",
"by",
"the",
"malware",
"author",
"after",
"a",
"character",
"from",
"the",
"popular",
"anime",
"series,",
"Naruto."
] | [
16,
3,
16,
16,
16,
16,
16,
6,
16,
6,
14,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Screen",
"capture",
"and",
"audio",
"recording",
"SpyNote",
"RAT",
"was",
"able",
"to",
"take",
"screen",
"captures",
"and",
",",
"using",
"the",
"device",
"’",
"s",
"microphone",
",",
"listen",
"to",
"audio",
"conversations",
"."
] | [
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9964",
"Infostealer.Gampass",
"Trojan-GameThief.Win32.OnLineGames.jez",
"Trojan.Win32.OnLineGames.csyqf",
"Trojan.PWS.Gamania.6047",
"BehavesLike.Win32.BadFile.lc",
"Trojan-PWS.OnlineGames",
"Trojan/PSW.OnLineGames.cqju",
"Win32.PSWTroj.OnLineGames.kcloud",
"Trojan-GameThief.Win32.OnLineGames.jez",
"Trojan/Win32.OnlineGameHack.R6228",
"TScope.Malware-Cryptor.SB",
"Win32/PSW.OnLineGames.HCV"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Bck/DSNX.05",
"Bloodhound.Morphine",
"Trojan.Packed-86",
"Backdoor.Win32.DSNX.05.a",
"Backdoor.Dsnx.05.A",
"Backdoor.Win32.DSNX.05.a",
"Backdoor:Win32/DSNX.E",
"Backdoor.DSNX.05.a",
"BackDoor.Dsnx",
"Backdoor.DSNX.05",
"Bck/DSNX.05",
"Trojan.Dsnx",
"Trojan-Spy.Win32.Flux.a",
"Win32/DSNX.05",
"Bck/DSNX.05"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"For",
"exploiting",
"this",
"issue",
",",
"any",
"process",
"running",
"with",
"any",
"UID",
"can",
"be",
"converted",
"into",
"root",
"easily",
"by",
"simply",
"using",
"the",
"following",
"command",
":",
"echo",
"\"",
"rootmydevice",
"''",
">",
"/proc/sunxi_debug/sunxi_debug",
"The",
"Linux",
"3.4-sunxi",
"kernel",
"was",
"originally",
"designed",
"to",
"support",
"the",
"Android",
"operating",
"system",
"on",
"Allwinner",
"ARM",
"for",
"tablets",
",",
"but",
"later",
"it",
"was",
"used",
"to",
"port",
"Linux",
"to",
"many",
"Allwinner",
"processors",
"on",
"boards",
"like",
"Banana",
"Pi",
"micro-PCs",
",",
"Orange",
"Pi",
",",
"and",
"other",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
9,
9,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
4,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
4,
16,
16,
16,
16,
5,
13,
13,
16,
5,
13,
16,
16,
16,
16,
16
] |
[
"In",
"July",
"2014,",
"Trend",
"Micro",
"published",
"a",
"report",
"about",
"a",
"threat",
"called",
"Retefe,",
"an",
"ebanking",
"Trojan",
"that",
"is",
"targeting",
"financial",
"institutions",
"in",
"Switzerland,",
"Austria,",
"Sweden",
"and",
"Japan."
] | [
16,
0,
8,
4,
12,
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
11,
16,
16,
16,
4,
12,
16,
2,
10,
10,
16,
2
] |
[
"Based",
"on",
"other",
"public",
"reports,",
"SANs",
"saw",
"the",
"expected",
"Qakbot",
"activity."
] | [
16,
16,
16,
16,
16,
4,
16,
16,
16,
3,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Regin.A",
"Trojan.Regin",
"Backdoor.Regin.A",
"Trojan/Downloader.Tiny.br",
"Backdoor.Regin.A",
"W32/Backdoor.NAZD-1177",
"Backdoor.Regin",
"Backdoor.Regin.A",
"Backdoor.Regin.A",
"Backdoor.Regin.A",
"Heur.Packed.Unknown",
"Backdoor.Regin.A",
"Virus.Win32.Dion.b",
"TR/Regin.qzqib",
"Trojan:WinNT/Regin.A!dha",
"Trj/CI.A",
"Win32/Trojan.2d3"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Hacktool.Paycrack",
"Trojan/Hacktool.PayCrack.a",
"W32/Trojan.TVD",
"Win32/HackTool.PayCrack.A",
"HackTool.Win32.PayCrack.a",
"Riskware.Win32.PayCrack.hsmb",
"Win32.Hacktool.Paycrack.Amwe",
"Application.Win32.HackTool.PayCrack.A",
"Tool.PayCrack.Win32.1",
"W32/Trojan.IFEJ-8553",
"HackTool.PayCrack.a",
"Malware_fam.gw",
"HackTool/Win32.PayCrack",
"Win32.HackTool.PayCrack.a.kcloud",
"Trojan.Kazy.D2127B",
"HackTool.W32.PayCrack.a!c",
"HackTool.Win32.PayCrack.a",
"HackTool:Win32/Paycrack.A",
"Trojan.VBRA.03914",
"HackTool.PayCrack!/HSSYr26Jv4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Rootkit.13224.C",
"Win32.Trojan.KillAV.aa",
"Trojan.Win32.NtRootKit.crkykj",
"Trojan.NtRootKit.12298",
"Trojan.Zusy.75",
"Trojan:WinNT/Kernelpatch.A",
"Trojan.Win32.KillAV"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader.Mariofev",
"Dropper.Drooptroop.Win32.3960",
"Trojan/Dropper.Drooptroop.jqh",
"Trojan.TDss.50",
"Win32.Trojan.WisdomEyes.16070401.9500.9998",
"W32/MalwareF.QVRD",
"TROJ_DROPPER.OFB",
"Trojan.Win32.Drooptroop.cphrc",
"Backdoor.Win32.Shiz.A",
"Trojan.DownLoader1.42134",
"TROJ_DROPPER.OFB",
"BehavesLike.Win32.Ramnit.mc",
"W32/Risk.VWDX-4897",
"TrojanDropper.Drooptroop.cvo",
"W32.Malware.Downloader",
"TrojanDownloader:Win32/Mariofev.B",
"Win-Trojan/Drooptroop.29184",
"Trojan.SB.01742",
"Trj/Sinowal.WXO",
"Win32.Trojan-dropper.Drooptroop.Suxo",
"Trojan.DR.Drooptroop!YuxRFC8vqfA",
"Win32/Trojan.Downloader.5d7"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.6E94",
"Dropped:Backdoor.Hupigon.AACP",
"Backdoor.Delf.13917",
"Backdoor.Delf.Win32.18733",
"Trojan/Ceckno.nag",
"Backdoor.Hupigon.AACP",
"Win32.Trojan.Hupigon.b",
"Win.Trojan.Crypted-5",
"Backdoor.Win32.Delf.cxe",
"Dropped:Backdoor.Hupigon.AACP",
"Trojan.Win32.Delf.ivaq",
"Backdoor.W32.Delf.lqj!c",
"Win32.Backdoor.Delf.Lkxm",
"Dropped:Backdoor.Hupigon.AACP",
"Packed.Win32.Klone.~KE",
"Dropped:Backdoor.Hupigon.AACP",
"BackDoor.Beizhu.origin",
"Trojan.Win32.Cosmu",
"VirTool.MaskPE.f",
"Trojan[Backdoor]/Win32.Delf",
"PWS:Win32/Populf.E!dll",
"Dropped:Backdoor.Hupigon.AACP",
"Backdoor/Win32.Delf.C195770",
"Dropped:Backdoor.Hupigon.AACP",
"TScope.Trojan.Delf",
"Backdoor.Delf!JSU0HMDt5JA",
"W32/PEMask.A!tr",
"Win32/Backdoor.Hupigon.88a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Tosct",
"BKDR_WEBRV.A",
"Win32.Trojan.WisdomEyes.16070401.9500.9995",
"BKDR_WEBRV.A",
"W32/Trojan.FUQN-2612",
"W32.Trojan.Downloader",
"Trojan.Heur.RP.EBE28B",
"Backdoor:Win32/Tosct.A",
"W32/Dloader.GQ!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"spam",
"messages",
"we",
"observed",
"used",
"several",
"different",
"tactics",
"to",
"deliver",
"malicious",
"payloads",
"to",
"users,",
"including",
"macros,",
"packager",
"shell",
"objects",
"aka",
"OLE",
"objects,",
"and",
"links."
] | [
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
3,
11,
11,
11,
16,
1,
9,
16,
1
] |
[
"In",
"this",
"blog",
"we",
"begin",
"with",
"data",
"from",
"a",
"real",
"attack",
"in",
"the",
"wild,",
"and",
"use",
"the",
"evidence",
"from",
"that",
"attack",
"to",
"make",
"a",
"connection",
"back",
"to",
"underground",
"forums",
"and",
"the",
"actors",
"who",
"are",
"using",
"them."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
6,
16,
16,
16,
16
] |
[
"Verification",
"that",
"the",
"request",
"is",
"coming",
"from",
"the",
"user",
"’",
"s",
"device",
"is",
"completed",
"using",
"two",
"possible",
"methods",
":",
"The",
"user",
"connects",
"to",
"the",
"site",
"over",
"mobile",
"data",
",",
"not",
"WiFi",
"(",
"so",
"the",
"service",
"provider",
"directly",
"handles",
"the",
"connection",
"and",
"can",
"validate",
"the",
"phone",
"number",
")",
";",
"or",
"The",
"user",
"must",
"retrieve",
"a",
"code",
"sent",
"to",
"them",
"via",
"SMS",
"and",
"enter",
"it",
"into",
"the",
"web",
"page",
"(",
"thereby",
"proving",
"access",
"to",
"the",
"provided",
"phone",
"number",
")",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Gatt.A",
"Backdoor.Small.oo",
"Backdoor/Small.oo",
"W32/Trojan.AVEH",
"Infostealer.Onlinegame",
"BKDR_SMALL.ALN",
"Trojan.Downloader-17400",
"Backdoor.Win32.Small.oo",
"Trojan.Gatt.A",
"Trojan.Win32.Veslorn!IK",
"Trojan.Gatt.A",
"DDoS.Bonke",
"BKDR_SMALL.ALN",
"W32/Trojan.AVEH",
"Trojan.Gatt.A",
"Win-Trojan/Xema.variant",
"Backdoor.Win32.Small.oo",
"Trojan-PSW.Onlinegame",
"Backdoor.Pina.k",
"Trojan.Win32.Veslorn"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Long",
"before",
"Kryptowire",
"'s",
"announcement",
",",
"Tim",
"Strazzere",
",",
"a",
"mobile",
"security",
"researcher",
"with",
"RedNaga",
"Security",
",",
"contacted",
"BLU",
"Products",
"in",
"March",
"2015",
"after",
"he",
"found",
"two",
"vulnerabilities",
"that",
"could",
"be",
"traced",
"to",
"Adup",
"'s",
"code",
"."
] | [
16,
16,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.KillProc.33379",
"Trojan.Foreign.Win32.54666",
"Trojan[Ransom]/Win32.Foreign",
"TrojanDropper:Win32/Rovnix.N",
"W32/Kryptik.DDLY!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"He",
"told",
"Amnesty",
"International:",
"one",
"of",
"my",
"colleagues",
"called",
"me…and",
"said",
"I",
"received",
"an",
"email",
"from",
"you",
"and",
"you're",
"mentioning",
"something",
"about",
"political",
"prisoners",
"and",
"there",
"is",
"an",
"attachment",
"there."
] | [
16,
16,
4,
12,
16,
16,
16,
4,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"As",
"mentioned",
"before",
",",
"our",
"test",
"device",
"was",
"automatically",
"from",
"stage",
"one",
"to",
"stage",
"two",
",",
"which",
"started",
"collecting",
"data",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"the",
"summer",
"of",
"2015,",
"Fidelis",
"Cybersecurity",
"had",
"the",
"opportunity",
"to",
"analyze",
"a",
"Derusbi",
"malware",
"sample",
"used",
"as",
"part"
] | [
16,
16,
0,
16,
0,
4,
12,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16
] |
[
"The",
"carrier",
"can",
"determine",
"that",
"the",
"request",
"originates",
"from",
"the",
"user",
"’",
"s",
"device",
",",
"but",
"does",
"not",
"require",
"any",
"interaction",
"from",
"the",
"user",
"that",
"can",
"not",
"be",
"automated",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Recent",
"samples",
"are",
"shown",
"to",
"infect",
"Windows",
"hosts",
"with",
"the",
"NetSupport",
"Manager",
"remote",
"access",
"tool",
"RAT."
] | [
16,
16,
16,
16,
16,
16,
5,
13,
16,
3,
11,
11,
11,
11,
11,
11
] |
[
"In",
"this",
"case",
",",
"a",
"threat",
"actor",
"has",
"been",
"targeting",
"customers",
"of",
"Bank",
"Austria",
",",
"Raiffeisen",
"Meine",
"Bank",
",",
"and",
"Sparkasse",
"since",
"at",
"least",
"January",
"2017",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"List",
"of",
"packages",
"received",
"from",
"the",
"C2",
"adminNumber",
":",
"Setup",
"of",
"the",
"admin",
"phone",
"number",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Tracking",
"Subaat:",
"Targeted",
"Phishing",
"Attacks",
"Point",
"Leader",
"to",
"Threat",
"Actor's",
"Repository"
] | [
16,
3,
16,
1,
9,
16,
16,
16,
6,
14,
1
] |
[
"Following",
"their",
"activities",
"and",
"evolving",
"tactics",
"and",
"techniques",
"helped",
"us",
"uncover",
"the",
"proverbial",
"red",
"string",
"of",
"fate",
"that",
"connected",
"three",
"seemingly",
"disparate",
"campaigns:",
"PLEAD,",
"Shrouded",
"Crossbow,",
"and",
"of",
"late,",
"Waterbear."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
14,
16,
16,
16,
6
] |
[
"Following",
"the",
"seemingly",
"quiet",
"state",
"of",
"point-of-sale",
"PoS",
"malware",
"these",
"past",
"few",
"months,",
"we",
"are",
"now",
"faced",
"with",
"two",
"new",
"PoS",
"malware",
"named",
"Katrina",
"and",
"CenterPoS",
"now",
"available",
"to",
"cybercriminals."
] | [
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
0,
8,
8,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
3,
16,
3,
16,
16,
16,
6
] |
[
"We",
"recently",
"wrote",
"about",
"the",
"KONNI",
"Remote",
"Access",
"Trojan",
"RAT",
"which",
"has",
"been",
"distributed",
"by",
"a",
"small",
"number",
"of",
"campaigns",
"over",
"the",
"past",
"3",
"years."
] | [
16,
16,
16,
16,
16,
3,
11,
11,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
0,
8,
8,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Virut.G",
"W32/Virut.CF_2",
"Win32/Virut.17408",
"PE_VIRUX.F-1",
"Virus.Win32.Virut.ce",
"Win32.Virut.AL",
"Virus.Win32.Virut.Ce",
"Win32.Virut.56",
"PE_VIRUX.F-1",
"Win32/Virut.bn",
"Trojan:Win32/Ertfor.A",
"Virus.Virut.06",
"HeurEngine.MaliciousPacker",
"Win32/Virut.NBP",
"W32/PackTDss.W!tr",
"W32/Sality.AO"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"During",
"our",
"research",
"into",
"a",
"widespread",
"spam",
"campaign,",
"we",
"discovered",
"yet",
"another",
"POS",
"malware",
"that",
"we've",
"named",
"NitlovePOS."
] | [
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
3,
11,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Win32.VB!O",
"W32/Autorun.worm.aba",
"Win32.Trojan.WisdomEyes.16070401.9500.9993",
"W32.SillyFDC",
"Trojan-Dropper.Win32.Dapato.ddfx",
"Trojan.Win32.Dapato.efldrk",
"Win32.HLLW.Autoruner.10315",
"Worm.VB.Win32.2517",
"W32/Autorun.worm.aba",
"Worm.Win32.VB",
"Worm/VB.pfc",
"W32.Worm.Sphr",
"Worm/Win32.VB",
"Worm.VB.kcloud",
"Worm:Win32/Dashvolex.A",
"Trojan.Strictor.DCDB",
"Trojan-Dropper.Win32.Dapato.ddfx",
"Worm/Win32.VB.C95007",
"Trojan.VBO.014708",
"Worm.VB!8247fVrcIiA",
"W32/VB.OAN!tr",
"Win32/Trojan.Dropper.d0e"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Carbanak",
"group",
"is",
"infamous",
"for",
"infiltrating",
"various",
"financial",
"institutions,",
"and",
"stealing",
"millions",
"of",
"dollars",
"by",
"learning",
"and",
"abusing",
"the",
"internals",
"of",
"victim",
"payment",
"processing",
"networks,",
"ATM",
"networks",
"and",
"transaction",
"systems."
] | [
6,
14,
14,
16,
16,
11,
1,
16,
4,
12,
16,
1,
9,
9,
9,
16,
16,
16,
1,
9,
9,
16,
1,
9,
9,
9,
5,
13,
16,
5,
13
] |
[
"This",
"blog",
"discusses",
"targeted",
"attacks",
"against",
"the",
"Middle",
"East",
"taking",
"place",
"between",
"February",
"and",
"October",
"2017",
"by",
"a",
"group",
"Unit",
"42",
"is",
"naming",
"MuddyWater"
] | [
16,
16,
16,
16,
1,
16,
2,
10,
10,
16,
16,
16,
0,
16,
0,
8,
16,
16,
6,
4,
12,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Dtr.1.4.4",
"Backdoor.DTR",
"BackDoor-WF.svr.rmv",
"Email-Worm.Win32.GOPworm.196",
"Backdoor.Dtr.1.4.4",
"W32/Risk.RVZV-3966",
"Backdoor.Trojan",
"Win32/DTR.14.rmvr",
"BKDR_WF.SVR",
"Backdoor.Dtr.1.4.4",
"Backdoor.Dtr.1.4.4",
"Trojan.Win32.Dtr.zmvuu",
"Backdoor.Dtr.1.4.4",
"Backdoor.Win32.DTR.14.rmvr",
"BackDoor.Dtr.143",
"Backdoor.Win32.C01A9ACD",
"BackDoor-WF.svr.rmv",
"W32.DTR.B",
"BDS/Dtr.1.4.4",
"Backdoor:Win32/DTR.B",
"Backdoor.Dtr.1.4.4",
"Email-Worm.Win32.GOPworm.196",
"Win32.Trojan.Wf.Pefg",
"Backdoor.WF!ynwdN87+ujc",
"Trojan.Win32.DTR",
"W32/Bdoor.WH!tr.bdr",
"Win32/Backdoor.9a4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"this",
"attack,",
"AutoIT",
"was",
"utilized",
"to",
"install",
"a",
"Remote",
"Access",
"Trojan",
"RAT",
"and",
"maintain",
"persistence",
"on",
"the",
"host",
"in",
"a",
"manner",
"that's",
"similar",
"to",
"normal",
"administration",
"activity."
] | [
16,
16,
1,
3,
16,
16,
16,
16,
3,
11,
11,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"report",
"contained",
"a",
"sentence",
"of",
"particular",
"interest",
"to",
"Cyber4Sight:",
"FIN7",
"is",
"referred",
"to",
"by",
"many",
"vendors",
"as",
"Carbanak",
"Group,'",
"although",
"we",
"do",
"not",
"equate",
"all",
"usage",
"of",
"the",
"Carbanak",
"backdoor",
"with",
"FIN7.",
"In",
"their",
"previous",
"report",
"on",
"this",
"threat",
"actor",
"group,",
"FireEye",
"stopped",
"short",
"of",
"making",
"this",
"direct",
"connection,",
"stating",
"instead",
"that",
"The",
"use",
"of",
"the",
"CARBANAK",
"malware",
"in",
"FIN7",
"operations",
"also",
"provides",
"limited",
"evidence",
"that",
"these",
"campaigns",
"are",
"linked",
"to",
"previously",
"observed",
"CARBANAK",
"operations",
"leading",
"to",
"fraudulent",
"banking",
"transactions,",
"ATM",
"compromise,",
"and",
"other",
"monetization",
"schemes."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
6,
16,
16,
16,
16,
16,
16,
6,
14,
14,
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
6,
14,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
6,
14,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9
] |
[
"UNIX-based",
"operating",
"systems",
"are",
"widely",
"used",
"in",
"servers,",
"workstations,",
"and",
"even",
"mobile",
"devices."
] | [
5,
13,
13,
16,
16,
16,
16,
5,
13,
16,
16,
5,
13
] |
[
"I.e.,",
"malicious",
"email",
"messages",
"are",
"sent",
"to",
"selected",
"targets",
"rather",
"than",
"random",
"mass",
"distribution,",
"but",
"are",
"not",
"tailored",
"specifically",
"to",
"each",
"and",
"every",
"target."
] | [
16,
1,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Win32.AutoDoor!O",
"Worm.AutoDoor",
"Trojan.Win32.Buzus",
"Win32.Trojan.WisdomEyes.16070401.9500.9827",
"W32/Trojan2.CWJR",
"W32.IRCBot",
"Win32/DfInject.CI",
"TROJ_BUZUS.JW",
"Win.Trojan.Buzus-2971",
"Worm.Win32.AutoDoor.fd",
"Trojan.Win32.Buzus.qvdn",
"Trojan.Win32.Buzus.48128",
"TrojWare.Win32.Buzus.~BAAM",
"Trojan.MulDrop.27694",
"Trojan.Buzus.Win32.5559",
"TROJ_BUZUS.JW",
"BehavesLike.Win32.Worm.cz",
"Trojan/Buzus.esq",
"Trojan/Win32.Buzus",
"Trojan:Win32/Buzus.A",
"Worm.Win32.AutoDoor.fd",
"Trojan/Win32.Buzus.C140550",
"Trojan.Win32.Buzus.ck",
"Trojan.Win32.Buzus",
"Trj/Buzus.ER",
"Virus.Win32.Virut.ue",
"Worm.Win32.AutoDoor",
"W32/Injector.fam!tr",
"Win32/Worm.07d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Click",
"fraud",
"PHAs",
"simulate",
"user",
"clicks",
"on",
"ads",
"instead",
"of",
"simply",
"displaying",
"ads",
"and",
"waiting",
"for",
"users",
"to",
"click",
"them",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"new_url",
":",
"to",
"change",
"the",
"URL",
"of",
"the",
"C2",
"server",
"in",
"the",
"app",
"preference",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Extract",
"messages",
"and",
"the",
"encryption",
"key",
"from",
"the",
"Telegram",
"app",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"In",
"particular",
",",
"EventBot",
"can",
"intercept",
"SMS",
"messages",
"and",
"bypass",
"two-factor",
"authentication",
"mechanisms",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanPWS.Mintluks.FC.1419",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win32.Inject.dhybnf",
"Trojan.DownLoader11.61306",
"PWS:MSIL/Mintluks.A",
"Trojan.Razy.D2D0CD",
"MSIL.Trojan.Injector.HD",
"Backdoor.Bot",
"Trojan.MSIL.Injector",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Patchwork",
"attack",
"group",
"has",
"been",
"targeting",
"more",
"than",
"just",
"government-associated",
"organizations."
] | [
1,
9,
9,
9,
16,
16,
16,
16,
16,
16,
4,
12
] |
[
"It",
"is",
"usually",
"used",
"as",
"a",
"downloader",
"for",
"the",
"actual",
"binary",
"payload."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
3,
11,
11,
11
] |
[
"However,",
"over",
"a",
"period",
"of",
"just",
"over",
"two",
"weeks",
"June",
"10",
"to",
"June",
"28,",
"we",
"saw",
"a",
"recurrence",
"of",
"this",
"threat."
] | [
16,
16,
16,
16,
16,
16,
16,
0,
0,
0,
8,
16,
0,
8,
16,
16,
16,
16,
16,
16,
3
] |
[
"Hundreds",
"of",
"malware",
"samples",
"have",
"been",
"used,",
"most",
"are",
"Remote",
"Access",
"Trojans",
"and",
"keyloggers."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
3
] |
[
"The",
"attackers",
"initially",
"injected",
"a",
"malicious",
"user-defined",
"function",
"Downloader.Chikdos",
"into",
"servers",
"in",
"order",
"to",
"compromise",
"them",
"with",
"the",
"Trojan.Chikdos.A",
"DDoS",
"malware",
"According",
"to",
"Symantec",
"telemetry,",
"the",
"majority",
"of",
"the",
"compromised",
"servers",
"are",
"in",
"India,",
"followed",
"by",
"China,",
"Brazil",
"and",
"the",
"Netherlands."
] | [
16,
6,
16,
16,
16,
16,
16,
16,
1,
16,
5,
16,
16,
16,
16,
16,
16,
16,
1,
3,
11,
16,
16,
4,
12,
16,
16,
16,
16,
5,
13,
16,
16,
2,
16,
16,
2,
10,
16,
2,
10
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Retefe",
"W32/Trojan.IYLJ-0833",
"Ransom.Cry",
"Trojan.Win32.Banker1.euqajf",
"TrojWare.Win32.Amtar.TAW",
"Trojan.PWS.Banker1.23740",
"Trojan.Adware.a",
"Trojan/Win32.Injector.C2217431",
"Trj/CI.A",
"Win32.Trojan.Fakeversign.Vgov",
"Win32/Trojan.Adware.37e"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanProxy.Roficor",
"W32/Trojan.GIFJ-9110",
"Win32/Tnega.TOWATOC",
"TrojanProxy:Win32/Roficor.A",
"Win32.Trojan.Falsesign.Duco"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"Adwind",
"is",
"a",
"Java-based",
"remote",
"access",
"tool",
"RAT",
"used",
"by",
"malware",
"authors",
"to",
"infect",
"computers",
"with",
"backdoor",
"access."
] | [
3,
16,
16,
3,
11,
11,
11,
11,
16,
16,
6,
14,
16,
16,
5,
16,
3,
11
] |
[
"All",
"modules",
"set",
"hidden",
"attributes",
"to",
"their",
"files",
":",
"Module",
"Paths",
"Exfiltrated",
"data",
"format",
"msconf.exe",
"%",
"APPDATA",
"%",
"/myupd/gen/",
"%",
"Y",
"%",
"m",
"%",
"d-",
"%",
"H",
"%",
"M",
"%",
"S_filesystem.zip",
"(",
"file",
"structure",
"dump",
")",
"system.exe",
"%",
"APPDATA",
"%",
"/myupd/aud/",
"%",
"d",
"%",
"m",
"%",
"Y",
"%",
"H",
"%",
"M",
"%",
"S.wav",
"(",
"surrounding",
"sounds",
")",
"update.exe",
"%",
"APPDATA",
"%",
"/myupd_tmp/txt/",
"%",
"APPDATA",
"%",
"/myupd/txt/",
"%",
"Y",
"%",
"m",
"%",
"d-",
"%",
"H",
"%",
"M",
"%",
"S.txt",
"(",
"keylogging",
")",
"wow.exe",
"%",
"APPDATA",
"%",
"/myupd/scr/",
"%",
"Y",
"%",
"m",
"%",
"d-",
"%",
"H",
"%",
"M",
"%",
"S.jpg",
"(",
"screenshots",
")",
"skype_sync2.exe",
"%",
"APPDATA",
"%",
"/myupd_tmp/skype/",
"%",
"APPDATA",
"%",
"/myupd/skype/",
"yyyyMMddHHmmss_in.mp3",
"yyyyMMddHHmmss_out.mp3",
"(",
"skype",
"calls",
"records",
")",
"Moreover",
",",
"we",
"found",
"one",
"module",
"written",
"in",
".Net",
"–",
"skype_sync2.exe",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
1,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
9,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
1,
16
] |
[
"Removing",
"the",
"junk",
"instructions",
"revealed",
"a",
"readable",
"block",
"of",
"code",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Scar.995328.O",
"Trojan/Scar.dzrv",
"Win32.Trojan.WisdomEyes.16070401.9500.9996",
"Trojan.Bayrob",
"Trojan.Win32.Scar.cpddg",
"Troj.W32.Scar.dzrv!c",
"Trojan.Scar.Win32.50507",
"BehavesLike.Win32.GameVance.dt",
"Trojan/Scar.bagk",
"TR/Woripecs.A.48",
"Trojan.Heur.JP.EFC713",
"Backdoor:Win32/Nivdort.A!dll",
"Trojan/Win32.Bayrob.C236811",
"Trojan.Scar!yb6+goUnDvM",
"Trojan.Win32.Woripecs",
"W32/Scar.AT!tr",
"Win32/Trojan.Spy.84a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Stealing",
"SMS",
"Figure",
"10",
":",
"Stealing",
"SMS",
"messages",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
Subsets and Splits