tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"The",
"spreading",
"method",
"of",
"a",
"fake",
"antivirus",
"website",
"was",
"also",
"quite",
"confusing,",
"normally",
"I",
"see",
"these",
"things",
"dropping",
"FakeAV's",
"as",
"I've",
"written",
"on",
"in",
"the",
"past."
] | [
16,
16,
16,
16,
16,
1,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16
] |
[
"Some",
"of",
"Regin's",
"custom",
"payloads",
"point",
"to",
"a",
"high",
"level",
"of",
"specialist",
"knowledge",
"in",
"particular",
"sectors,",
"such",
"as",
"telecoms",
"infrastructure",
"software,",
"on",
"the",
"part",
"of",
"the",
"developers."
] | [
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Tagazie.Trojan",
"Trojan/W32.Small.36864.ACH",
"Trojan.Win32.Scar!O",
"TrojanDownloader.Bredolab.AJ2",
"Virus.Virut.Win32.1911",
"Trojan/Scar.eaml",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TROJ_SCAR_0000027.TOMA",
"Trojan.Win32.Scar.eaml",
"Trojan.Win32.Scar.djhme",
"Trojan.Win32.Scar.9216.A",
"Trojan.Win32.Scar.eaml",
"Trojan.Proxy.19837",
"BehavesLike.Win32.PWSZbot.nc",
"Trojan/Scar.airi",
"Trojan/Win32.Scar",
"Trojan:Win32/Hioles.D",
"Troj.W32.Scar.lrnw",
"Trojan.Win32.Scar.eaml",
"Trojan/Win32.Scar.R7877",
"Worm.Fakeupdate.2821",
"Win32.Magistr",
"Trojan.Scar!QrzKm85lu1k",
"Trojan.Win32.Comame"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Script.634117",
"Trojan.Win32.Miner!O",
"Win32.Trojan.WisdomEyes.16070401.9500.9944",
"PUA.Deminnix",
"Trojan.Win32.Miner.aau",
"Trojan.Script.634117",
"Riskware.Win32.BitCoinMiner.csteyy",
"Trojan.Script.634117",
"Tool.BtcMine.83",
"Trojan.Miner.Win32.426",
"W32/Trojan.IJIB-0603",
"Trojan/Miner.dc",
"Trojan.Graftor.D194A6",
"Trojan.Win32.Miner.aau",
"Trojan.BitMiner",
"Win32/CoinMiner.EC",
"Riskware.BitCoinMiner!FKk5sgQEcRQ",
"Trojan.Win32.Deminnix"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"ee",
",",
"is",
"the",
"same",
"one",
"used",
"in",
"the",
"Android",
"version",
"of",
"Project",
"Spy",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
5,
13,
16
] |
[
"The",
"investigations",
"showed",
"that",
"the",
"attacks",
"shared",
"a",
"number",
"of",
"common",
"features,",
"such",
"as",
"involving",
"large",
"amount",
"of",
"monetary",
"loss",
"originating",
"from",
"what",
"initially",
"appeared",
"to",
"be",
"legitimate",
"bank",
"customer",
"accounts."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.eHeur.Malware03",
"Trojan.Kimad.19394",
"Trojan/Downloader.Stantinko.o",
"TROJ_KIMAD_EK04051A.UVPM",
"Win32.Trojan-Downloader.Stantinko.a",
"TROJ_KIMAD_EK04051A.UVPM",
"Win.Trojan.12288703-1",
"Trojan.Kbdmai.14",
"Downloader.Stantinko.Win32.10",
"Trojan-Downloader.Win32.Stantinko",
"Variant.Graftor.eb",
"Trojan.Graftor.D2AB64",
"Trojan/Win32.Kimad.R138166",
"Trojan.DL.Stantinko!",
"Win32/Trojan.Stantinko.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"DarkKomet",
"is",
"a",
"freeware",
"remote",
"access",
"trojan",
"that",
"was",
"released",
"by",
"an",
"independent",
"software",
"developer."
] | [
3,
16,
16,
3,
11,
11,
11,
16,
16,
16,
16,
16,
6,
14,
14
] |
[
"For",
"example",
",",
"Svpeng",
"uses",
"a",
"previously",
"unknown",
"vulnerability",
"to",
"protect",
"itself",
"from",
"being",
"removed",
"manually",
"or",
"by",
"the",
"antivirus",
"program",
"."
] | [
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DownloadGelodeA.Trojan",
"Adware.WSearch.Win32.494",
"TROJ_RUGO.SM",
"Win32.Trojan.WisdomEyes.16070401.9500.9989",
"TROJ_RUGO.SM",
"Trojan.Win32.Dwn.vrhnq",
"Trojan.DownLoader5.16461",
"TR/Graftor.16274.28",
"Trojan/Win32.Unknown",
"TrojanDownloader:Win32/Nekotimed.A",
"Trojan.Graftor.D3F92",
"Downloader/Win32.Nekill.R1661",
"Adware.WSearch!QcX4Awfq1EM",
"Trojan-Downloader.Win32.Adnur"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"VB:Trojan.Valyria.163",
"Trojan.FTKN-6",
"Doc.Macro.Injection-6355574-0",
"VB:Trojan.Valyria.163",
"Troj.Downloader.Script!c",
"VB:Trojan.Valyria.163",
"W97M.DownLoader.631",
"VB:Trojan.Valyria.163",
"VB:Trojan.Valyria.163",
"Win32.Outbreak",
"VB:Trojan.Valyria.163",
"virus.office.qexvmc.1070"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"effectiveness",
"of",
"a",
"zero-day",
"quickly",
"deteriorates",
"as",
"an",
"attack",
"tool",
"after",
"it",
"gets",
"discovered",
"and",
"patched",
"by",
"the",
"affected",
"software",
"vendors."
] | [
16,
16,
16,
16,
7,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12
] |
[
"Small",
"businesses",
"are",
"generally",
"more",
"likely",
"to",
"use",
"remote",
"administration",
"software",
"for",
"their",
"POS",
"terminals",
"so",
"that",
"3rd",
"parties",
"can",
"manage",
"the",
"terminals."
] | [
4,
12,
16,
16,
16,
16,
16,
16,
5,
13,
13,
11,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"HenBox",
"can",
"also",
"access",
"sensors",
"such",
"as",
"the",
"device",
"camera",
"(",
"s",
")",
"and",
"the",
"microphone",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Nurjax",
"TROJ_GE.273CBA41",
"Trojan.Win32.Nurjax.ufm",
"Trojan.Win32.Nurjax.dxmzxe",
"Trojan.Win32.Z.Nurjax.10297344",
"Troj.W32.Nurjax!c",
"BehavesLike.Win32.Dropper.tc",
"W32/Trojan.TKWG-0004",
"Trojan.Nurjax.a",
"Trojan/Win32.Nurjax",
"TrojanDownloader:Win32/Lentrigy.A",
"Trojan.Win32.Nurjax.ufm",
"Trj/CI.A",
"Win32.Trojan.Nurjax.Ajbs",
"Trojan.Nurjax!",
"W32/Nurjax.BQZ!tr",
"Win32/Trojan.e9c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"Fidelis",
"Threat",
"Research",
"team",
"recently",
"analyzed",
"a",
"new",
"variant",
"to",
"Vawtrak",
"using",
"HTTPS",
"for",
"C2",
"communications."
] | [
4,
12,
12,
12,
12,
16,
16,
16,
16,
3,
16,
3,
16,
1,
9,
9,
9
] |
[
"]",
"com/gate_cb8a5aea1ab302f0_c",
"offline",
"31.214.157",
"[",
"."
] | [
9,
9,
16,
1,
9,
9
] |
[
"It",
"sends",
"β",
"home",
"β",
"key",
"data",
"about",
"the",
"affected",
"device",
":",
"device",
"type",
",",
"OS",
"version",
",",
"language",
",",
"number",
"of",
"installed",
"apps",
",",
"free",
"storage",
"space",
",",
"battery",
"status",
",",
"whether",
"the",
"device",
"is",
"rooted",
"and",
"Developer",
"mode",
"enabled",
",",
"and",
"whether",
"Facebook",
"and",
"FB",
"Messenger",
"are",
"installed",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
5,
16,
16,
16
] |
[
"These",
"thefts",
"targeted",
"banks",
"in",
"Vietnam,",
"Bangladesh,",
"Taiwan,",
"and",
"Mexico",
"between",
"2016",
"and",
"2017."
] | [
16,
16,
16,
4,
16,
2,
10,
10,
16,
2,
0,
8,
8,
8
] |
[
"North",
"Korea",
"conducted",
"a",
"test",
"missile",
"launch",
"on",
"3rd",
"July."
] | [
2,
10,
16,
16,
16,
16,
16,
16,
0,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Hacktool.BruteForce.mp",
"Win32.Trojan.WisdomEyes.16070401.9500.9985",
"Win.Trojan.Hacktool-315",
"Trojan.Win32.BruteForce.recrn",
"Tool.Bruteforce.84",
"Tool.BruteForce.Win32.143",
"HTool.BruteForce.g"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"approach",
"allows",
"the",
"authors",
"to",
"combine",
"ads",
"from",
"third-party",
"advertising",
"networks",
"with",
"ads",
"they",
"created",
"for",
"their",
"own",
"apps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"order",
"to",
"ensure",
"we",
"have",
"the",
"most",
"effective",
"detection",
"possible,",
"Talos",
"reverse",
"engineered",
"CryptoWall",
"4",
"to",
"better",
"understand",
"its",
"execution,",
"behavior,",
"deltas",
"from",
"previous",
"versions",
"and",
"share",
"our",
"research",
"and",
"findings",
"with",
"the",
"community."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
3,
11,
16,
16,
16,
16,
1,
9,
16,
16,
16,
15,
16,
16,
16,
16,
16,
16,
16,
16,
4
] |
[
"We",
"collaborated",
"with",
"Dropbox",
"to",
"investigate",
"the",
"threat,",
"and",
"our",
"cooperation",
"revealed",
"what",
"may",
"be",
"a",
"second,",
"similar",
"operation."
] | [
16,
16,
16,
4,
16,
16,
16,
3,
16,
16,
4,
16,
16,
0,
16,
16,
16,
16,
16
] |
[
"This",
"gives",
"JavaScript",
"run",
"in",
"the",
"WebView",
"access",
"to",
"this",
"method",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"most",
"common",
"way",
"to",
"achieve",
"this",
"is",
"by",
"creating",
"a",
"broadcast",
"receiver",
"that",
"is",
"registered",
"to",
"the",
"β",
"android.intent.action.BOOT_COMPLETED",
"β",
"broadcast",
"action",
"and",
"adding",
"code",
"that",
"boots",
"the",
"application",
"when",
"the",
"broadcast",
"is",
"fired",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"While",
"details",
"would",
"vary",
",",
"all",
"of",
"the",
"identified",
"copies",
"of",
"this",
"spyware",
"shared",
"a",
"similar",
"disguise",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"the",
"observed",
"version",
"of",
"the",
"implant",
"it",
"doesn",
"β",
"t",
"have",
"an",
"interface",
"to",
"work",
"with",
"the",
"skype_sync2.exe",
"module",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16
] |
[
"When",
"we",
"published",
"that",
"blog",
"Unit",
"42",
"hadn",
"β",
"t",
"seen",
"any",
"of",
"the",
"three",
"registrants",
"overlap",
"domains",
"used",
"in",
"malicious",
"activity",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Further",
"analysis",
"Upon",
"further",
"research",
",",
"we",
"found",
"this",
"spyware",
"to",
"be",
"developed",
"by",
"a",
"framework",
"similar",
"to",
"Spynote",
"and",
"Spymax",
",",
"meaning",
"this",
"could",
"be",
"an",
"updated",
"version",
"of",
"these",
"Trojan",
"builders",
",",
"which",
"allow",
"anyone",
",",
"even",
"with",
"limited",
"knowledge",
",",
"to",
"develop",
"full-fledged",
"spyware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"PluginPhantom",
"implements",
"each",
"element",
"of",
"malicious",
"functionality",
"as",
"a",
"plugin,",
"and",
"utilizes",
"a",
"host",
"app",
"to",
"control",
"the",
"plugins."
] | [
3,
16,
16,
16,
16,
3,
11,
16,
16,
5,
16,
16,
16,
5,
13,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Downloader/W32.Byterage.8193",
"Trojan/Downloader.Byterage",
"Trojan.Win32.Byterage.hipq",
"W32/Downloader.HPW",
"Byterage.C",
"TROJ_EXCEPTION.F",
"Trojan-Downloader.Win32.Byterage",
"Trojan.Byterage.A",
"Trojan.Win32.Downloader.8193",
"Virus.Win32.Part.k",
"TrojWare.Win32.TrojanDownloader.Byterage",
"Trojan.Duho",
"TR/Byterage.Dldr",
"TROJ_EXCEPTION.F",
"TrojanDownloader.Win32.Byterage",
"Trojan/Win32.Byterage",
"Win32.Troj.DownByteage.kcloud",
"W32/Downloader.KOEY-6366",
"Win-Trojan/Byterage.8193",
"Malware-Cryptor.InstallCore.1",
"Win32/TrojanDownloader.Byterage",
"Trojan.DL.Byterage",
"Trojan-Downloader.Win32.Small",
"W32/Dloader.AW!tr",
"Downloader.Byterage"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"addition,",
"thanks",
"to",
"a",
"coding",
"mistake",
"by",
"the",
"attackers,",
"this",
"particular",
"backdoor",
"does",
"not",
"always",
"run",
"the",
"right",
"commands."
] | [
16,
16,
16,
16,
16,
7,
15,
16,
16,
6,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"snapshot",
"of",
"the",
"code",
"that",
"processes",
"each",
"VM",
"opcode",
"and",
"the",
"associate",
"interpreter",
"The",
"presence",
"of",
"a",
"VM",
"and",
"virtualized",
"instruction",
"blocks",
"can",
"be",
"described",
"in",
"simpler",
"terms",
":",
"Essentially",
",",
"the",
"creators",
"of",
"FinFisher",
"interposed",
"a",
"layer",
"of",
"dynamic",
"code",
"translation",
"(",
"the",
"virtual",
"machine",
")",
"that",
"makes",
"analysis",
"using",
"regular",
"tools",
"practically",
"impossible",
"."
] | [
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"gopuram",
"backdoor",
"might",
"be",
"the",
"main",
"implant",
"and",
"the",
"final",
"payload",
"in",
"the",
"attack",
"chain."
] | [
3,
11,
3,
16,
16,
16,
16,
3,
16,
16,
3,
11,
16,
1,
9,
9
] |
[
"We",
"also",
"observed",
"that",
"the",
"threat",
"actors",
"were",
"actively",
"changing",
"their",
"tools,",
"tactics,",
"and",
"procedures",
"TTPs",
"to",
"bypass",
"security",
"solutions."
] | [
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
7,
15,
15
] |
[
"]",
"ee",
"Backend",
"server",
"ftp",
"[",
"."
] | [
9,
9,
16,
1,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Java.Exploit.CVE-2012-0507.K",
"Exp.JAVA.CVE-2012-0507",
"Trojan.Inject.GE",
"Exploit.CVE.JS.1533",
"Exploit.Java.Cve!c",
"Java.Exploit.CVE-2012-0507.K",
"Trojan.Maljava",
"Java/Exploit.CVE-2012-0507.AJ",
"JAVA_EXPLOIT.KRZ",
"Exploit.Java.CVE-2012-0507.gd",
"Exploit.Java.CVE20120507.cqxpdq",
"Java.S.CVE-2012-0507.141383[h]",
"Java.Exploit.CVE-2012-0507.K",
"Java.Exploit.CVE-2012-0507.K",
"Exploit.CVE2012-0507.13",
"JAVA_EXPLOIT.KRZ",
"BehavesLike.Downloader.cz",
"Exploit.CVE-2012-0507.d",
"JAVA/Adwind.sagg.26",
"Java.Exploit.CVE-2012-0507.K",
"Exploit.Java.CVE-2012-0507.eg",
"Java.Exploit.Cve-2012-0507.Akpd",
"Exploit.Java.CVE-2012-0507",
"Java.Exploit.CVE-2012-0507.K",
"Java/Exploit.AZT"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"final",
"stage",
"is",
"an",
"ARMEB",
"version",
"from",
"the",
"LuaBot",
"Malware."
] | [
16,
16,
16,
16,
16,
3,
11,
16,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.5441",
"Win32.Trojan.WisdomEyes.16070401.9500.9941",
"TROJ_INJECT.AUSPTO",
"Trojan.Win32.Phpw.gez",
"Trojan.Win32.Phpw.expttn",
"TROJ_INJECT.AUSPTO",
"BehavesLike.Win32.Trojan.cc",
"Trojan.Win32.Themida",
"W32/Trojan.JODZ-3607",
"Trojan.Win32.Phpw.gez",
"Backdoor:MSIL/Zqorat.A",
"Trojan/Win32.Phpw.C2403487",
"TScope.Malware-Cryptor.SB",
"Trj/CI.A",
"Win32.Trojan.Phpw.Ahym"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Stage",
"5",
":",
"The",
"final",
"loader",
"takes",
"control",
"The",
"stage",
"5",
"malware",
"is",
"needed",
"only",
"to",
"provide",
"one",
"more",
"layer",
"of",
"obfuscation",
",",
"through",
"the",
"VM",
",",
"of",
"the",
"final",
"malware",
"payload",
"and",
"to",
"set",
"up",
"a",
"special",
"Structured",
"Exception",
"Hander",
"routine",
",",
"which",
"is",
"inserted",
"as",
"Wow64PrepareForException",
"in",
"Ntdll",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"first",
"example",
"of",
"this",
"is",
"in",
"the",
"onStart",
"function",
",",
"where",
"the",
"malware",
"looks",
"for",
"the",
"string",
"β",
"Emulator",
"β",
"and",
"a",
"x86",
"processor",
"model",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"this",
"case",
",",
"the",
"attackers",
"hacked",
"a",
"Tibetan",
"activist",
"β",
"s",
"account",
"and",
"used",
"it",
"to",
"attack",
"Uyghur",
"activists",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.VBS.Downloader.ADR",
"JS.Ransom.R",
"VBS/Downldr.HM",
"VBS.Downloader.B",
"Vbs.Downloader.Locky-6348805-0",
"Trojan.VBS.Downloader.ADR",
"Trojan.VBS.Downloader.ADR",
"Trojan.Script.Vbs-heuristic.druvzi",
"VBS.Downloader.11760",
"Troj.Downloader.Script!c",
"Trojan.VBS.Downloader.ADR",
"Trojan.VBS.Downloader.ADR",
"VBS.DownLoader.957",
"VBS/Downloader.ea",
"VBS/Downldr.HM",
"Trojan.VBS.Downloader.ADR",
"VBS/Obfus.S4",
"VBS/Downloader.ea",
"Js.Trojan.Raas.Auto",
"Trojan-Downloader.JS.Nemucod"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.eHeur.Malware14",
"Trojan/W32.Nymaim.478544",
"Trojan.Win32.Shiz.3!O",
"Trojan.Kryptik.Win32.905858",
"Trojan.Inject2.25223",
"Trojan:Win32/Pennelas.A!gfc",
"Trojan/Win32.Silcon.R186780",
"Trojan.Nymaim!w9Ehxpvgr9U",
"Trj/GdSda.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"cashnow",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Application.Htool.WIP",
"Trojan.Mauvaise.SL1",
"HackTool.BruteForce",
"Trojan/Hacktool.BruteForce.ze",
"Application.Htool.WIP",
"Win32.Trojan.WisdomEyes.16070401.9500.9930",
"Win32/Tnega.dRWGBOC",
"HV_BRUTEFORCE_CG153BD9.RDXN",
"Win.Trojan.Bruteforce-13",
"Application.Htool.WIP",
"Application.Htool.WIP",
"Trojan.Win32.BruteForce.srzyv",
"Application.Htool.WIP",
"Tool.Bruteforce.185",
"Tool.BruteForce.Win32.254",
"HackTool.Win32.BruteForce",
"HTool.BruteForce.f",
"SPR/DUBrute.owoan",
"HackTool/Win32.BruteForce",
"HackTool:Win32/DUBrute.A",
"HackTool.BruteForce",
"Trojan/Win32.Bruteforce.R23399",
"HackTool.BruteForce!jw9TQR6yLS4"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"is",
"worm-like",
"ransomware",
"based",
"on",
"Petya."
] | [
16,
16,
3,
11,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.ExpiroPC.PE",
"W32.Francette.M",
"W32.Francette.Worm",
"Heur.Corrupt.PE",
"Backdoor.Win32.RedSpy",
"Worm:Win32/Francette.M.dam#2"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"IOCS",
"Hashes",
"139edb1bc033725539b117f50786f3d3362ed45845c57fe1f82e7ed72b044367",
"e19823a1ba4a0e40cf459f4a0489fc257720cc0d71ecfb7ad94b3ca86fbd85d1",
"e19823a1ba4a0e40cf459f4a0489fc257720cc0d71ecfb7ad94b3ca86fbd85d1",
"e5f346d8f312cc1f93c2c6af611e2f50805c528934786ea173cabc6a39b14cda",
"1849a50a6ac9b3eec51492745eeb14765fe2e78488d476b0336d8e41c2c581d4",
"d328fca14c4340fcd4a15e47562a436085e6b1bb5376b5ebd83d3e7218db64e7",
"59b9809dba857c5969f23f460a2bf0a337a71622a79671066675ec0acf89c810",
"120474682ea439eb0b28274c495d9610a73d892a4b8feeff268c670570db97e2",
"ed234e61849dcb95223676abe2312e1378d6130c0b00851d82cda545b946ec83",
"27410d4019251a70d38f0635277f931fb73f67ac9f2e1f3b475ce680ebfde12a",
"6e6c210535b414c5aa2dd9e67f5153feeb43a8ac8126d8e249e768f501323a3e",
"4a32ced20df7001da7d29edc31ca76e13eef0c9b355f62c44888853435e9794f",
"ac5abaebd9f516b8b389450f7d27649801d746fb14963b848f9d6dad0a505e66",
"3a45d7a16937d4108b5b48f44d72bb319be645cbe15f003dc9e77fd52f45c065",
"Domains",
"cvcws",
"[",
"."
] | [
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
16,
1,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm.Win32.AutoRun!O",
"Worm.Emudbot.S15201",
"Worm.AutoRun.Win32.57341",
"W32/AutoRun.diqe",
"Win32.Trojan.WisdomEyes.16070401.9500.9953",
"Win.Worm.Autorun-9966",
"Worm.AutoRun",
"Trojan.Win32.Emud.reytg",
"Win32.HLLW.EmudBot.12",
"BehavesLike.Win32.BadFile.kh",
"Worm/AutoRun.agrm",
"W32.Worm.Autorun",
"Worm.Autorun.kcloud",
"Worm:Win32/Emudbot.A",
"Trojan.Graftor.Elzob.D3011",
"Worm/Win32.AutoRun.C69047",
"Win32/AutoRun.Delf.MI",
"Worm.AutoRun!NSqws7tLdQs",
"Worm.Win32.Emudbot",
"W32/Autorun.BGT!tr",
"Win32/Trojan.Dropper.65e"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"software",
"generated",
"2FA",
"code",
"as",
"it",
"appeared",
"on",
"the",
"device",
"β",
"s",
"display",
"(",
"left",
")",
"and",
"as",
"available",
"in",
"the",
"database",
"(",
"right",
")",
"Along",
"with",
"the",
"malicious",
"DEFENSOR",
"ID",
"app",
",",
"another",
"malicious",
"app",
"named",
"Defensor",
"Digital",
"was",
"discovered",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16
] |
[
"We",
"Kaspersky",
"have",
"already",
"seen",
"some",
"cryptor",
"attacks",
"where",
"malicious",
"programs",
"with",
"different",
"functions",
"have",
"been",
"used",
"in",
"combination."
] | [
16,
4,
16,
16,
16,
16,
1,
9,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"If",
"the",
"original",
"SMS",
"app",
"has",
"been",
"restored",
",",
"it",
"will",
"send",
"β",
"the",
"app",
"returned",
"to",
"its",
"original",
"place.",
"β",
"Controlling",
"TrickMo",
"TrickMo",
"β",
"s",
"operators",
"can",
"control",
"the",
"malware",
"via",
"two",
"channels",
":",
"Through",
"its",
"C",
"&",
"C",
"via",
"a",
"plaintext",
"HTTP",
"protocol",
"using",
"JSON",
"objects",
"Through",
"encrypted",
"SMS",
"messages",
"There",
"are",
"predefined",
"commands",
"to",
"change",
"the",
"malware",
"β",
"s",
"configuration",
"and",
"make",
"it",
"execute",
"certain",
"tasks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"iSIGHT",
"Partners",
"has",
"dubbed",
"the",
"intrusion",
"operators",
"who",
"leverage",
"the",
"CVE-2014-4114",
"zero-day",
"Sandworm",
"Team.",
"The",
"name",
"was",
"chosen",
"due",
"to",
"unique",
"references",
"to",
"the",
"classic",
"science",
"fiction",
"series",
"Dune,",
"which",
"are",
"characterized",
"by",
"the",
"use",
"of",
"multiple",
"BlackEnergy",
"malware",
"variants."
] | [
4,
12,
16,
16,
16,
6,
14,
16,
16,
16,
7,
15,
6,
14,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Teper",
"Trojan/AutoRun.Delf.lv",
"Trojan.MSIL.Krypt.11",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TROJ_INJECTOR_FA250012.UVPM",
"Trojan.Win32.DarkKomet.dkhkpy",
"TrojWare.MSIL.Teper.A",
"Trojan.PWS.Stealer.13025",
"TROJ_INJECTOR_FA250012.UVPM",
"BehavesLike.Win32.Trojan.dc",
"Backdoor/Androm.dvy",
"TR/Inject.xbbeiet",
"W32/Vobfus.GEP.worm",
"Win32/AutoRun.Delf.LV",
"Win32.Worm.Autorun.Suxp",
"Win32/Trojan.d74"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Note",
"that",
"inside",
"this",
"single",
"response",
",",
"there",
"is",
"one",
"β",
"install_true",
"β",
"command",
",",
"one",
"β",
"sms_grab",
"β",
"command",
"and",
"four",
"β",
"sms_send",
"β",
"commands",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"Apple",
"Developer",
"Enterprise",
"program",
"is",
"intended",
"to",
"allow",
"organizations",
"to",
"distribute",
"proprietary",
",",
"in-house",
"apps",
"to",
"their",
"employees",
"without",
"needing",
"to",
"use",
"the",
"iOS",
"App",
"Store",
"."
] | [
16,
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
5,
13,
16
] |
[
"They",
"are",
"using",
"the",
"RockLoader",
"malware",
"to",
"download",
"Bart",
"over",
"HTTPS."
] | [
16,
16,
16,
16,
3,
11,
16,
16,
3,
16,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Worm.Autorun.MK",
"Win32.Worm.Autorun.MK",
"Win32.Worm.Autorun.MK",
"Win32.Trojan.WisdomEyes.16070401.9500.9996",
"W32.SillyFDC",
"Win32/Auraax.W",
"Win.Trojan.Zbot-1219",
"Win32.Worm.Autorun.MK",
"Win32.Worm.Autorun.MK",
"Win32.Worm.Autorun.MK",
"Win32.Worm.Autorun.MK",
"Trojan.DownLoad.5092",
"Worm.AutoRun.Win32.24333",
"Backdoor.W32.Bifrose.kZn8",
"Win32/AutoRun.YM",
"Trojan-Spy.Win32.Zbot",
"W32/Autorun.MFA!worm",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"threat",
"posed",
"by",
"custom",
"malware",
"such",
"as",
"Dripion",
"illustrates",
"the",
"value",
"of",
"multilayered",
"security."
] | [
16,
3,
16,
16,
3,
11,
16,
16,
3,
16,
16,
16,
16,
16,
16
] |
[
"However,",
"it",
"doesn't",
"stop",
"there:",
"some",
"versions",
"of",
"RAA",
"also",
"include",
"a",
"Pony",
"Trojan",
"file,",
"which",
"steals",
"confidential",
"information",
"from",
"the",
"infected",
"computer."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
3,
11,
11,
16,
1,
9,
9,
16,
5,
13,
13
] |
[
"Due",
"to",
"this",
"feature",
",",
"it",
"is",
"clear",
"that",
"the",
"developers",
"paid",
"special",
"attention",
"to",
"the",
"work",
"of",
"the",
"implant",
"on",
"Huawei",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16
] |
[
"The",
"attack",
"was",
"initially",
"thought",
"to",
"be",
"attributed",
"to",
"North",
"Korea,",
"by",
"way",
"of",
"a",
"Chinese",
"IP",
"found",
"during",
"the",
"attack,",
"but",
"no",
"other",
"strong",
"evidence",
"of",
"North",
"Korea's",
"involvement",
"has",
"been",
"produced",
"since",
"then."
] | [
16,
1,
16,
16,
16,
16,
16,
16,
16,
2,
10,
16,
16,
16,
16,
1,
9,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
2,
10,
16,
16,
16,
16,
16,
16
] |
[
"After",
"the",
"modules",
"are",
"installed",
"they",
"are",
"deployed",
"to",
"the",
"short",
"term",
"memory",
"and",
"deleted",
"from",
"the",
"device",
"storage",
",",
"which",
"makes",
"the",
"Trojan",
"a",
"lot",
"harder",
"to",
"catch",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.PPDropper.F",
"PPT97/PPDropper.C",
"TROJ_PPDROPPER.L",
"TROJ_PPDROPPER.L",
"Exploit-PPT.d",
"Exploit:Win32/Nappto.A",
"Exploit-PPT.d",
"PP97M/TrojanDropper.PPDrop.F",
"Trojan-Dropper.PP97M.Ppdrop",
"Exploit/PPT.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Nevertheless",
",",
"users",
"should",
"practice",
"proper",
"security",
"hygiene",
"to",
"mitigate",
"threats",
"that",
"may",
"take",
"advantage",
"of",
"a",
"home",
"or",
"business",
"router",
"β",
"s",
"security",
"gaps",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"is",
"the",
"same",
"behaviour",
"we",
"have",
"been",
"seeing",
"with",
"the",
"recent",
"UPS",
"failed",
"to",
"deliver",
"nemucod",
"ransomware",
"versions"
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
3,
11,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom.Ryzerlo.S4",
"Trojan.Ransom.HiddenTear",
"Trojan.Ransom.HiddenTears.1",
"Win32.Trojan.WisdomEyes.16070401.9500.9717",
"Ransom.HiddenTear!g1",
"Ransom_CRYPTEAR.SMI1",
"Trojan.Win32.Encoder.ewzwkj",
"Trojan.Win32.Z.Ransom.174592.P",
"Trojan.Encoder.10598",
"Ransom_CRYPTEAR.SMI1",
"Trojan-Ransom.HiddenTear",
"W32/Ransom.EJHW-4383",
"TR/Downloader.fuswg",
"Ransom:MSIL/Flyterper.A",
"Trj/GdSda.A",
"Win32/Trojan.Ransom.786"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"β",
"Agent",
"Smith",
"β",
"itself",
",",
"though",
",",
"seems",
"to",
"target",
"mainly",
"India",
"users",
"."
] | [
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Although",
"this",
"malware",
"'s",
"credential-harvest",
"mechanism",
"is",
"not",
"particularly",
"sophisticated",
",",
"it",
"does",
"have",
"an",
"advanced",
"self-preservation",
"mechanism",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Several",
"indicators",
"inside",
"the",
"samples",
"we",
"have",
"analysed",
"point",
"to",
"a",
"new",
"major",
"version",
"of",
"the",
"malware."
] | [
16,
1,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DroppenAS.Trojan",
"Worm.Nohad.A9",
"Trojan/AutoRun.Delf.qi",
"Win32.Worm.Delf.bw",
"W32/Trojan.KDXB-0268",
"Win32/Tnega.AUMK",
"WORM_SOHANAD.SM0",
"Win32.Worm.Autorun.T",
"Trojan.Win32.Special.dtabba",
"Trojan.Fakealert.51818",
"WORM_SOHANAD.SM0",
"W32/Trojan2.OEMC",
"TR/Dropper.pjrqu",
"Trojan.Zusy.D18D1A",
"HEUR/Fakon.mwf",
"Win32/AutoRun.Delf.QI",
"W32/AutoRun.QIAU!tr",
"VBS/Jenxcus.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"identified",
"over",
"two",
"hundred",
"samples",
"of",
"malware",
"generated",
"by",
"the",
"group",
"over",
"the",
"last",
"two",
"years."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
6,
14,
16,
0,
8,
8,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/AutoRun.bhyp",
"Trojan.Heur.E5CD44",
"Win32.Trojan.WisdomEyes.16070401.9500.9985",
"W32/MalwareF.IWEH",
"Win.Spyware.76175-2",
"Trojan.Win32.FrusEfas.iumlo",
"Worm.Win32.Autorun.2101887",
"Trojan.MulDrop1.52015",
"BehavesLike.Win32.BadFile.vc",
"W32/Risk.GYGM-4699",
"TrojanClicker.FrusEfas.a",
"Trojan:Win32/Tofe.A",
"Worm.AutoRun",
"Trojan-GameThief.Win32.Magania"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"HenBox",
"app",
"downloaded",
"in",
"May",
"2016",
",",
"as",
"described",
"in",
"Table",
"1",
"below",
",",
"masquerades",
"as",
"a",
"legitimate",
"version",
"of",
"the",
"DroidVPN",
"app",
"by",
"using",
"the",
"same",
"app",
"name",
"β",
"DroidVPN",
"β",
"and",
"the",
"same",
"iconography",
"used",
"when",
"displaying",
"the",
"app",
"in",
"Android",
"β",
"s",
"launcher",
"view",
",",
"as",
"highlighted",
"in",
"Figure",
"2",
"below",
"Table",
"1",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"To",
"that",
"end,",
"I",
"have",
"been",
"working",
"on",
"automating",
"ways",
"to",
"help",
"ASERT",
"better",
"understand",
"the",
"context",
"around",
"samples",
"so",
"we",
"can",
"answer",
"question",
"about",
"what",
"may",
"have",
"been",
"targeted,",
"why",
"it",
"was",
"targeted",
"and",
"when",
"it",
"was",
"targeted."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Simda.A",
"Trojan.Beaugrit.S714409",
"Backdoor.Simda.A",
"Trojan.Shiz.Win32.341",
"Trojan/Spy.Shiz.ncd",
"Win32.Trojan-Spy.Shiz.b",
"Backdoor.Trojan",
"TROJ_BEAUGRIT_GC3101D5.UVPM",
"Backdoor.Simda.A",
"Backdoor.Simda.A",
"TrojWare.Win32.Spy.Shiz.AB",
"Backdoor.Simda.A",
"Trojan.PWS.Ibank.300",
"TROJ_BEAUGRIT_GC3101D5.UVPM",
"BehavesLike.Win32.Backdoor.jh",
"Backdoor.Win32.Simda",
"Backdoor.Simda.A",
"Backdoor.Simda.A",
"Backdoor.Simda",
"TrojanSpy.Shiz!u9u05UapnAM",
"W32/Shiz.NBX!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.AutorunSevLnr.Worm",
"Worm.AutoRun.Win32.27239",
"WORM_VERST.SM",
"Win32.Worm.AutoRun.fp",
"W32/Trojan2.OAQT",
"WORM_VERST.SM",
"Trojan.Win32.AutoRun.bxdzl",
"W32.Virut.mDxm",
"BackDoor.Pushnik.16",
"BehavesLike.Win32.Autorun.jc",
"W32/Trojan.ORVC-8944",
"Worm/AutoRun.zqc",
"W32.Worm.Lj",
"Worm:Win32/Verst.A",
"Trojan.Rimecud.2",
"Worm.Win32.A.P2P-Palevo.649216",
"HEUR/Fakon.mwf",
"W32/Autorun.worm.bcf",
"Worm.AutoRun",
"Trojan.Dropper",
"Win32/AutoRun.Delf.DK",
"Trojan.Kryptik!Od8vCev28v4",
"Trojan.Win32.DNSChanger",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.FakeTool.eqvbgr",
"Trojan.Strictor.D13D9C",
"Riskware.HackTool!mJNDS6pSVDk",
"HackTool.Win32.FakeHack"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"Stolen",
"data",
"is",
"stored",
"in",
"external",
"storage",
"under",
"the",
"/DCIM/",
"directory",
"with",
"a",
"hidden",
"sub-directory",
"named",
"\"",
".dat",
"''",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"this",
"report,",
"Trend",
"Micro",
"and",
"ClearSky",
"expose",
"a",
"vast",
"espionage",
"apparatus",
"spanning",
"the",
"entire",
"time",
"the",
"group",
"has",
"been",
"active."
] | [
16,
16,
16,
4,
12,
16,
4,
16,
16,
16,
6,
14,
16,
16,
16,
16,
6,
14,
16,
16,
16
] |
[
"the",
"first",
"of",
"a",
"new",
"wave",
"of",
"malspam."
] | [
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"β",
"s",
"worth",
"noting",
",",
"newer",
"versions",
"of",
"the",
"DroidVPN",
"app",
"are",
"available",
"on",
"Google",
"Play",
",",
"as",
"well",
"as",
"in",
"some",
"other",
"third-party",
"app",
"stores",
",",
"which",
"could",
"indicate",
"uyghurapps",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"MacSpy",
"is",
"advertised",
"as",
"the",
"most",
"sophisticated",
"Mac",
"spyware",
"ever",
"with",
"the",
"low",
"starting",
"price",
"of",
"free."
] | [
3,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"However,",
"they",
"do",
"deploy",
"some",
"novel",
"tactics,",
"detailed",
"below,",
"and",
"the",
"implications",
"of",
"these",
"attacks",
"could",
"be",
"significant."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.RsRabND.Worm",
"Trojan.Ransom.BUY",
"Trojan.Ransom.BUY",
"Ransom.BadRabbit",
"Win32.Trojan.Ransom.b",
"Ransom_BADRABBIT.SM",
"Win.Ransomware.BadRabbit-6355462-2",
"Trojan.Ransom.BUY",
"Trojan-Ransom.Win32.BadRabbit.e",
"Trojan.Ransom.BUY",
"Trojan.Win32.BadRabbit.euhxbd",
"Trojan.Win32.Ransom.441899",
"Trojan.Ransom.BUY",
"Trojan.BadRabbit.2",
"Ransom_BADRABBIT.SM",
"BehavesLike.Win32.Malware.gc",
"Trojan.Win32.Diskcoder",
"Trojan.BadRabbit.d",
"TR/Dropper.uobxc",
"Trojan.Ransom.BUY",
"Trojan-Ransom.Win32.BadRabbit.e",
"Trojan/Win32.Diskcoder.R211512",
"Trojan-Ransom.BadRabbit",
"Trj/CI.A",
"Trojan.Badrabbit",
"Win32/Diskcoder.D",
"Trojan.Diskcoder!",
"ransom.BadRabbit",
"Win32/Trojan.RansomBadRabbit.E"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"actually",
"track",
"samples",
"of",
"Winnti",
"malware",
"all",
"the",
"time,",
"but",
"so",
"far",
"we",
"haven't",
"been",
"able",
"to",
"catch",
"one",
"with",
"solid",
"clues",
"indicating",
"other",
"targeted",
"industries."
] | [
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TR/Drop.Hirin.B",
"PWS:MSIL/Parple.B",
"PWS.MSIL",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"Google's",
"Threat",
"Analysis",
"Group",
"TAG",
"recently",
"discovered",
"usage",
"of",
"an",
"unpatched",
"security",
"bypass",
"in",
"Microsoft's",
"SmartScreen",
"security",
"feature,",
"which",
"financially",
"motivated",
"actors",
"are",
"using",
"to",
"deliver",
"the",
"Magniber",
"ransomware",
"without",
"any",
"security",
"warnings."
] | [
4,
12,
12,
12,
12,
16,
16,
16,
16,
16,
7,
15,
15,
16,
5,
13,
13,
13,
16,
6,
14,
14,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Hacktool.Gamehack",
"Trojan.Packed.Win32.57174",
"Win32.Packed.VMProtect.a",
"HT_GAMEHACK_GH01014A.UVPM",
"HT_GAMEHACK_GH01014A.UVPM",
"Trojan.VMProtect!"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"Few",
"details",
"were",
"given",
"and",
"no",
"hashes",
"were",
"available,",
"which",
"made",
"it",
"interesting",
"to",
"find",
"samples",
"and",
"conduct",
"an",
"initial",
"analysis."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"InterceptCall",
"receiver",
"is",
"triggered",
"whenever",
"there",
"is",
"an",
"incoming",
"or",
"outgoing",
"call",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Given",
"its",
"age,",
"it",
"might",
"seem",
"logical",
"that",
"security",
"controls",
"would",
"have",
"this",
"threat",
"on",
"lockdown."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Clicker!BT",
"Win32.Trojan.Wowlik.a",
"W32/Trojan.AKEF-2737",
"Trojan.Win32.Graftor.espyif",
"Win32.Trojan.Graftor.Llrb",
"TrojWare.Win32.Wowlik.BE",
"Trojan.DownLoader11.55853",
"Trojan.Graftor.D26FB7",
"TrojanClicker:Win32/Spackit.A",
"Trojan.Win32.Clicker!BT",
"Trj/CI.A",
"Win32/Trojan.55a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"By",
"proxying",
"all",
"requests",
"through",
"a",
"custom",
"server",
",",
"the",
"real",
"source",
"of",
"ads",
"is",
"opaque",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"What's",
"particularly",
"interesting",
"is",
"that",
"the",
"malware",
"that",
"was",
"used",
"this",
"time",
"is",
"not",
"BlackEnergy,",
"which",
"poses",
"further",
"questions",
"about",
"the",
"perpetrators",
"behind",
"the",
"ongoing",
"operation."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
6,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
6
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W97m.Downloader.EMU",
"W97M.Downloader.MF",
"W97M/Dropper.cp",
"Troj.Dropper.Msword!c",
"Trojan.Mdropper",
"W2KM_DROPPR.CSYH",
"W97m.Downloader.EMU",
"W97m.Downloader.EMU",
"W97m.Downloader.EMU",
"Trojan:W97M/Nastjencro.A",
"W97M.MulDrop.142",
"W2KM_DROPPR.CSYH",
"W97M/Dropper.cp",
"W97m.Downloader.EMU",
"W97m.Downloader.EMU",
"OLE.Win32.Macro.700400",
"virus.office.obfuscated.5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"choice",
"of",
"a",
"particular",
"payload",
"is",
"determined",
"by",
"the",
"implant",
"β",
"s",
"version",
",",
"and",
"it",
"can",
"be",
"downloaded",
"from",
"the",
"command",
"and",
"control",
"(",
"C",
"&",
"C",
")",
"server",
"soon",
"after",
"the",
"implant",
"starts",
",",
"or",
"after",
"a",
"specific",
"command",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"version",
"number",
"was",
"bumped",
"to",
"1.6.2a."
] | [
16,
16,
16,
16,
16,
16,
16
] |
Subsets and Splits