tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"FakeSpy",
"uses",
"an",
"anti-debugging",
"technique",
"by",
"creating",
"another",
"child",
"process",
"of",
"itself",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"core",
"malware",
"is",
"usually",
"disguised",
"as",
"Google",
"Updater",
",",
"Google",
"Update",
"for",
"U",
"or",
"β",
"com.google.vending",
"β",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
4,
16,
16,
16,
16,
16,
1,
16,
16
] |
[
"The",
"service",
"connects",
"back",
"to",
"the",
"attacker",
"machine",
"and",
"waits",
"for",
"commands",
"which",
"will",
"be",
"given",
"by",
"the",
"attacker."
] | [
16,
1,
16,
16,
16,
16,
6,
5,
16,
16,
16,
1,
16,
16,
16,
16,
16,
6,
14
] |
[
"Crooks",
"behind",
"MajikPOS",
"have",
"various",
"tricks",
"up",
"their",
"sleeves."
] | [
6,
16,
3,
16,
16,
16,
16,
16,
16
] |
[
"TA473",
"has",
"continuously",
"leveraged",
"an",
"unpatched",
"Zimbra",
"vulnerability",
"in",
"publicly",
"facing",
"webmail",
"portals",
"that",
"allows",
"them",
"to",
"gain",
"access",
"to",
"the",
"email",
"mailboxes",
"of",
"government",
"entities",
"in",
"Europe."
] | [
6,
16,
16,
16,
16,
7,
15,
15,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
13,
16,
4,
12,
16,
2
] |
[
"Unlike",
"previously",
"seen",
"non-GP",
"(",
"Google",
"Play",
")",
"centric",
"malware",
"campaigns",
",",
"β",
"Agent",
"Smith",
"β",
"has",
"a",
"significant",
"impact",
"upon",
"not",
"only",
"developing",
"countries",
"but",
"also",
"some",
"developed",
"countries",
"where",
"GP",
"is",
"readily",
"available",
"."
] | [
16,
16,
16,
16,
16,
5,
13,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Presumably",
"from",
"the",
"same",
"author",
"of",
"Petya,",
"which",
"was",
"first",
"seen",
"in",
"December",
"2016,",
"and",
"the",
"Petya-Mischa",
"combo,",
"which",
"hit",
"users",
"back",
"in",
"July",
"2016,",
"Janus",
"Cybercrime",
"Solution's",
"latest",
"creation",
"is",
"another",
"step",
"in",
"the",
"evolution",
"of",
"their",
"ransomware-as-a-service",
"expansion."
] | [
16,
16,
16,
6,
14,
16,
3,
16,
16,
16,
16,
16,
0,
8,
16,
16,
3,
16,
16,
16,
4,
16,
16,
0,
8,
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16
] |
[
"Our",
"research",
"indicates",
"that",
"the",
"group",
"has",
"sufficient",
"financial",
"resources",
"to",
"purchase",
"the",
"source",
"code",
"of",
"a",
"widely",
"available",
"malware",
"tool,",
"and",
"the",
"human",
"resources",
"to",
"design",
"improved",
"versions",
"of",
"its",
"own",
"backdoors",
"based",
"on",
"this."
] | [
4,
12,
16,
15,
16,
12,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
15,
16,
16,
16,
3,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Downloader.JRQH",
"Trojan.Downloader.JRQH",
"Win32.Trojan.WisdomEyes.16070401.9500.9945",
"Win32.Trojan-Downloader.Banload.J",
"Trojan-Downloader.MSIL.Banload.bgr",
"Trojan.Downloader.JRQH",
"Trojan.Win32.Banload.dzssxt",
"Trojan.Downloader.JRQH",
"Trojan.Downloader.JRQH",
"Trojan-Downloader.MSIL.Banload.bgr",
"TrojanDownloader:MSIL/Banload.T",
"Trojan/Win32.Banload.C829219",
"Trojan.Banker.ABR",
"Trj/GdSda.A",
"Msil.Trojan-downloader.Banload.Efkz",
"Trojan-Downloader.MSIL.Banload"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Trigona",
"ransomware",
"is",
"a",
"relatively",
"new",
"strain",
"that",
"security",
"researchers",
"first",
"discovered",
"in",
"late",
"October",
"2022."
] | [
3,
11,
16,
16,
16,
16,
16,
16,
4,
12,
16,
16,
16,
0,
8,
8
] |
[
"update.exe",
"module",
"and",
"Xenotix",
"Python",
"Keylogger",
"code",
"comparison",
"β",
"addStartup",
"β",
"method",
"from",
"msconf.exe",
"module",
"β",
"addStartup",
"β",
"method",
"from",
"Xenotix",
"Python",
"Keylogger",
"Distribution",
"We",
"found",
"several",
"landing",
"pages",
"that",
"spread",
"the",
"Android",
"implants",
"."
] | [
1,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
5,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"THE",
"CAMPAIGN",
"The",
"malware",
"'s",
"primary",
"infection",
"vector",
"is",
"SMS",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.A537",
"Packed.Win32.TDSS!O",
"RiskWare.Tool.CK",
"BehavesLike.Win32.Downloader.dc",
"TR/Bumat.A.2896",
"Win32.Troj.Undef.kcloud",
"Win-Trojan/Xema.variant",
"PE:Malware.XPACK-HIE/Heur!1.9C48",
"Trojan.Crypt",
"W32/Malware_fam.NB",
"Win32/Trojan.648"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"observed",
"legitimate",
"exfiltrated",
"files",
"of",
"the",
"following",
"types",
"of",
"data",
":",
"Contact",
"information",
"Compressed",
"recorded",
"audio",
"in",
"the",
"Adaptive",
"Multi-Rate",
"(",
"amr",
")",
"file",
"format",
"Images",
"captured",
"from",
"the",
"device",
"camera",
"Images",
"stored",
"on",
"both",
"internal",
"device",
"and",
"SDCard",
"storage",
"that",
"are",
"listed",
"in",
"the",
"MediaStore",
"Device",
"geolocation",
"information",
"SMS",
"content",
"Chrome",
"browser",
"search",
"history",
"and",
"bookmarks",
"Call",
"log",
"information",
"Cell",
"tower",
"information",
"Device",
"network",
"metadata",
";",
"such",
"as",
"phone",
"number",
",",
"device",
"software",
"version",
",",
"network",
"country",
",",
"network",
"operator",
",",
"SIM",
"country",
",",
"SIM",
"operator",
",",
"SIM",
"serial",
",",
"IMSI",
",",
"voice",
"mail",
"number",
",",
"phone",
"type",
",",
"network",
"type",
",",
"data",
"state",
",",
"data",
"activity",
",",
"call",
"state",
",",
"SIM",
"state",
",",
"whether",
"device",
"is",
"roaming",
",",
"and",
"if",
"SMS",
"is",
"supported",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"post",
"describes",
"the",
"new",
"campaign."
] | [
16,
16,
16,
6,
14,
14
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.2431",
"Trojan.MSIL.FKV",
"WS.Reputation.1",
"Stimilik.S",
"Trojan.Win32.Confuser.dkqarl",
"BehavesLike.Win32.Kudj.gc",
"Trojan/Win32.Stealer",
"PUA.MSIL.Confuser"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Attackers",
"also",
"used",
"the",
"name",
"of",
"the",
"top",
"NIC",
"official",
"in",
"the",
"signature",
"of",
"the",
"email,",
"this",
"is",
"to",
"make",
"it",
"look",
"like",
"the",
"email",
"was",
"sent",
"by",
"a",
"high",
"ranking",
"Government",
"official",
"working",
"at",
"NIC",
"National",
"Informatics",
"Centre."
] | [
6,
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
1,
9,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
4,
12,
12,
12
] |
[
"PaloAlto",
"observed",
"a",
"targeted",
"attack",
"in",
"November",
"directed",
"at",
"an",
"individual",
"working",
"for",
"the",
"French",
"Ministry",
"of",
"Foreign",
"Affairs."
] | [
4,
16,
16,
1,
9,
16,
0,
16,
3,
16,
4,
16,
11,
16,
4,
12,
12,
12,
12
] |
[
"Red",
"Alert",
"Plays",
"Dress-Up",
"In",
"the",
"wild",
",",
"we",
"found",
"Web",
"pages",
"designed",
"to",
"(",
"vaguely",
")",
"resemble",
"legitimate",
"app",
"market",
"pages",
",",
"hosting",
"files",
"for",
"download",
"that",
"have",
"been",
"disguised",
"as",
"a",
"legitimate",
"mobile",
"application",
"of",
"moderately",
"broad",
"appeal",
",",
"such",
"as",
"a",
"media",
"player",
"or",
"social",
"media",
"app",
"."
] | [
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"HMRC",
"taxes",
"application",
"with",
"reference",
"L4TI",
"2A0A",
"UWSV",
"WASP",
"received"
] | [
4,
1,
9,
16,
16,
1,
9,
9,
9,
16
] |
[
"The",
"infection",
"attempts",
"occurred",
"in",
"September",
"and",
"October",
"of",
"2015",
"as",
"public",
"frustration",
"grew",
"at",
"the",
"Mexican",
"government's",
"seemingly",
"contradictory",
"statements",
"about",
"the",
"Narvarte",
"case"
] | [
16,
3,
16,
16,
16,
0,
16,
0,
8,
8,
16,
16,
16,
16,
3,
4,
12,
12,
16,
16,
16,
16,
4,
12,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Worm/W32.Mydoom.28864",
"W32.Mydoom.M",
"W32/Mydoom.o@MM",
"W32/Mydoom.m",
"I-Worm.Mydoom!qBn5HU3v+Lw",
"W32/Mydoom.O@mm",
"W32.Mydoom.M@mm",
"MyDoom.L@mm",
"Win32/Mydoom.O",
"Win32.Mydoom.m",
"Worm.Mydoom-27",
"Email-Worm.Win32.Mydoom.m",
"I-Worm.Win32.Mydoom.28864.A",
"Email-Worm.Win32.Mydoom!IK",
"Worm.Win32.Mydoom.R",
"Win32.HLLM.MyDoom.54464",
"Worm/Mydoom.O.1",
"W32/Mydoom.o@MM",
"Worm/Sramota.bef",
"Worm/Win32.Mydoom",
"Worm:Win32/Mydoom.O@mm",
"W32/Mydoom.O@mm",
"Win32/Mydoom.worm.49344.B",
"Email-Worm.Win32.Mydoom.m",
"Win32/Mydoom.R",
"Worm.Mail.Mydoom.dh",
"Email-Worm.Win32.Mydoom",
"W32/Mydoom.M!dam",
"I-Worm/Mydoom.O",
"W32/Mydoom.N.worm"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"news",
"organization",
"provides",
"reporting",
"on",
"its",
"website",
"in",
"English,",
"Georgian,",
"and",
"Russian."
] | [
16,
4,
12,
16,
16,
16,
16,
1,
16,
2,
10,
16,
2
] |
[
"Lookout",
"researchers",
"have",
"identified",
"a",
"new",
",",
"highly",
"targeted",
"surveillanceware",
"family",
"known",
"as",
"Desert",
"Scorpion",
"in",
"the",
"Google",
"Play",
"Store",
"."
] | [
4,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
5,
13,
13,
16
] |
[
"Mandiant",
"suspects",
"UNC2970",
"specifically",
"targeted",
"security",
"researchers",
"in",
"this",
"operation."
] | [
4,
16,
6,
16,
16,
4,
12,
16,
16,
16
] |
[
"It",
"is",
"also",
"much",
"harder",
"for",
"network",
"defenders",
"or",
"researchers",
"to",
"track",
"a",
"campaign",
"where",
"the",
"infrastructure",
"is",
"a",
"moving",
"target",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"jhfrte.jar",
":",
"This",
"is",
"a",
"java",
"archive",
"file",
"downloaded",
"from",
"server",
"."
] | [
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.LoringK.Trojan",
"Backdoor.Bot.158614",
"Trojan-Dropper.Win32!O",
"TrojanDropper.Loring.A11",
"Backdoor.Bot.158614",
"Backdoor.IRCBot",
"Trojan/IRCBot.ov",
"WORM_KWBOT.AR",
"W32/Risk.VXNU-4867",
"W32.Kwbot.Worm",
"Win32/Loring.A",
"WORM_KWBOT.AR",
"Win.Trojan.Obfuscated-1662",
"Backdoor.Bot.158614",
"Trojan.Win32.Reconyc.gunk",
"Backdoor.Bot.158614",
"Trojan.Win32.IRCBot.dmigck",
"Dropper.Loring.291411",
"Backdoor.Bot.158614",
"Backdoor.Bot.158614",
"Trojan.MulDrop5.7150",
"Trojan.Reconyc.Win32.6040",
"WORM/IrcBot.86875",
"Trojan[Backdoor]/Win32.IRCBot",
"Win32.Troj.Loring.EA.kcloud",
"Backdoor.Bot.D26B96",
"Troj.Dropper.W32.Loring.l8Ew",
"Worm/Win32.IRCBot.R3593",
"TScope.Trojan.Delf",
"Trojan.IRCBot.OV",
"Win32/IRCBot.OV",
"Trojan.DR.Loring!O3IAMVgzzx8",
"Trojan-Dropper.Win32.Loring"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Injector.iuc",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win32/Pushbot.AJZ",
"WORM_PALEVO.SMA",
"Win.Trojan.Ircbrute-54",
"Trojan.Win32.Ircbrute.eqsrw",
"Trojan.Spambot.9818",
"Trojan.Injector.Win32.53831",
"WORM_PALEVO.SMA",
"BehavesLike.Win32.PWSZbot.lh",
"Backdoor.Win32.IRCBot",
"Trojan/Win32.Unknown",
"Trojan:Win32/Ircbrute.B",
"Trojan.Graftor.DCFC",
"Worm/Win32.Ckbface.R16129",
"Trojan.Injector!aNdlYeuOVuU"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"While",
"the",
"malware",
"was",
"not",
"detectable",
"by",
"endpoint",
"antivirus",
"products,",
"RSA",
"Security",
"Analytics",
"was",
"able",
"to",
"identify",
"and",
"alert",
"on",
"its",
"network",
"traffic,",
"and",
"RSA",
"ECAT",
"subsequently",
"identified",
"the",
"malware."
] | [
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
16,
16,
16,
16,
11,
16,
16,
1,
9,
16,
4,
12,
16,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Script.400873",
"Exploit/PDF-URI2.AS",
"Exploit-PDF.f",
"Exploit.W32.Pidief!c",
"PDF.Exploit.Pidief.an",
"Bloodhound.PDF.9",
"Trojan.Script.400873",
"Exploit.Win32.Pidief.asz",
"Trojan.Script.400873",
"Exploit.Script.Pidief.ibwe",
"PDF.S.Exploit.10714",
"Win32.Exploit.Pidief.Anfp",
"Trojan.Script.400873",
"Exploit.JS.Pdfka.MJ",
"Trojan.Script.400873",
"Exploit.PDF.303",
"HEUR_PDFEXP.B",
"BehavesLike.PDF.Trojan.lr",
"Exploit:Win32/Pdffir.A",
"Trojan.Script.D61DE9",
"Exploit.Win32.Pidief.asz",
"PDF/Pidief.EI",
"Trojan.Script.400873",
"Exploit.Win32.Pidief.asz",
"JS.Crypt.BSP",
"Exploit.JS.Pdfka",
"JS/Pdfka.BSP!exploit",
"virus.pdf.20090837.1"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DropperZbotS.Trojan",
"Trojan-Spy.Win32.Zbot!O",
"Trojan.AutoIt.Pik.A",
"Backdoor/Poison.evja",
"Trojan.Zbot",
"Trojan.Win32.Autoit.pik",
"Trojan.Win32.Autoit.exoora",
"Trojan.Win32.Z.Autoit.955563",
"Troj.W32.Autoit!c",
"BehavesLike.Win32.Dropper.dc",
"Trojan.Win32.Injector",
"Trojan.Autoit.kzp",
"TR/AD.Zbot.cgaww",
"Trojan.Win32.Autoit.pik",
"Trojan:Win32/Krilog.A",
"Trojan.Autoit.F",
"Win32/Injector.Autoit.AOI",
"Win32.Trojan.Autoit.Edne",
"W32/Autoit.NWS!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Several",
"hardcoded",
"applications",
"targeted",
"by",
"the",
"MDM-grabbing",
"command",
"β",
"wifi",
"β",
"β",
"this",
"command",
"creates",
"a",
"new",
"Wi-Fi",
"connection",
"with",
"specified",
"configurations",
"from",
"the",
"command",
"and",
"enable",
"Wi-Fi",
"if",
"it",
"is",
"disabled",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DakusarDRW.Trojan",
"Trojan.Blocker.Win32.34866",
"Trojan.DownLoader24.32105",
"BehavesLike.Win32.Shodi.tc",
"Worm:Win32/Icorimg.A",
"Trojan.Strictor.D1C7BA",
"HEUR/Fakon.mwf",
"Trojan.Worm!33g50yRKTx8",
"Trojan.FLCM!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"First",
",",
"an",
"activity",
"named",
"MainActivity",
"fires",
"up",
",",
"taking",
"care",
"of",
"hiding",
"the",
"icon",
"and",
"showing",
"the",
"fake",
"notification",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Upon",
"further",
"inspection,",
"the",
"RAT",
"appeared",
"to",
"share",
"many",
"similarities",
"with",
"an",
"old",
"Chinese",
"backdoor",
"known",
"as",
"Hacker's",
"Door",
"first",
"released",
"publicly",
"in",
"2004",
"and",
"updated",
"in",
"2005."
] | [
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
3,
11,
11,
11,
16,
16,
3,
11,
16,
16,
16,
16,
0,
16,
0,
8,
8
] |
[
"Due",
"to",
"the",
"current",
"absence",
"of",
"maintained",
"and",
"supported",
"Android",
"banking",
"Malware-as-a-Service",
"in",
"the",
"underground",
"community",
",",
"there",
"is",
"a",
"certainly",
"demand",
"for",
"a",
"new",
"service",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"BackDoor-CMQ.dldr",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"TROJ_HORST.SMPE",
"Monitor.W32.WebWatcher.lt5Y",
"TROJ_HORST.SMPE",
"BackDoor-CMQ.dldr",
"Trojan.Graftor.D476C",
"BScope.Malware-Cryptor.Win32.313",
"Trojan.Win32.Cosmu",
"W32/Dloader.BOW!tr.dldr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"campaign",
"was",
"active",
"between",
"November",
"2016",
"and",
"January",
"2017,",
"targeting",
"a",
"limited",
"number",
"of",
"people."
] | [
16,
6,
16,
16,
16,
0,
8,
16,
0,
8,
16,
16,
4,
12,
12,
12
] |
[
"In",
"this",
"particular",
"case",
",",
"the",
"bot",
"abuses",
"the",
"accessibility",
"service",
"privilege",
"to",
"obtain",
"the",
"package",
"name",
"of",
"the",
"foreground",
"application",
"and",
"determine",
"whether",
"or",
"not",
"to",
"show",
"a",
"phishing",
"overlay",
"window",
",",
"as",
"shown",
"in",
"the",
"following",
"code",
"snippet",
":",
"Targets",
"Some",
"examples",
"of",
"phishing",
"overlays",
"are",
"shown",
"below",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Quasar",
"is",
"a",
".NET",
"Framework-based",
"open-source",
"RAT."
] | [
3,
16,
16,
5,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Z.Delf.2373896",
"Troj.Spy.W32.Zbot.lw7D",
"Win32.Trojan-downloader.Rakhni.Html",
"Trojan-Downloader.Win32.Delf",
"W32/Application.AJYX-3726",
"TrojanDownloader.Rakhni.ec",
"TR/Dldr.Delf.tbxxd",
"W32/Dloader.CDW!tr",
"Trojan[Downloader]/Win32.Rakhni",
"Trojan.Application.Bundler.InstallMonster.392",
"Trojan-Downloader.Win32.Rakhni.jqc",
"Trj/CI.A",
"Win32/Trojan.036"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
")",
"If",
"the",
"application",
"hasn",
"β",
"t",
"received",
"instructions",
"about",
"the",
"rules",
"for",
"processing",
"incoming",
"SMSs",
",",
"it",
"simply",
"saves",
"all",
"SMSs",
"to",
"a",
"local",
"database",
"and",
"uploads",
"them",
"to",
"the",
"C",
"&",
"C",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"While",
"it",
"is",
"not",
"clear",
"whether",
"the",
"primary",
"goal",
"of",
"the",
"attack",
"was",
"delivering",
"the",
"malicious",
"payload",
"or",
"capturing",
"the",
"targets",
"OWA",
"credentials,",
"this",
"attack",
"uses",
"an",
"OWA",
"phish",
"to",
"additionally",
"pushes",
"a",
"malicious",
"document",
"with",
"a",
"Veil-Framework",
"payload",
"capable",
"of",
"downloading",
"further",
"malware."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
16,
16,
3,
11,
16,
16,
16,
16,
4,
16,
16,
3,
16,
16,
7,
1,
16,
16,
16,
16,
1,
9,
16,
16,
3,
11,
16,
16,
16,
16,
3
] |
[
"The",
"second",
"Project",
"Spy",
"version",
"has",
"similar",
"capabilities",
"to",
"the",
"first",
"version",
",",
"with",
"the",
"addition",
"of",
"the",
"following",
":",
"Stealing",
"notification",
"messages",
"sent",
"from",
"WhatsApp",
",",
"Facebook",
",",
"and",
"Telegram",
"Abandoning",
"the",
"FTP",
"mode",
"of",
"uploading",
"the",
"recorded",
"images",
"Aside",
"from",
"changing",
"the",
"app",
"β",
"s",
"supposed",
"function",
"and",
"look",
",",
"the",
"second",
"and",
"third",
"versions",
"β",
"codes",
"had",
"little",
"differences",
"."
] | [
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
5,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Installed",
"with",
"backdoored",
"software,",
"for",
"example:-",
"Telegram.exe",
"-",
"mech_korolya_artura_2017.HDRip.exe"
] | [
16,
16,
3,
11,
11,
16,
1,
16,
1
] |
[
"Founded",
"in",
"2013,",
"the",
"Android",
"Marcher",
"mobile",
"malware",
"has",
"widely",
"been",
"targeting",
"Google",
"Play",
"--",
"harvesting",
"user",
"credentials",
"and",
"credit",
"card",
"data."
] | [
16,
16,
0,
16,
3,
11,
11,
11,
16,
16,
16,
16,
5,
13,
16,
16,
16,
1,
9,
9,
9,
9
] |
[
"Ransomware",
"persists",
"as",
"one",
"of",
"the",
"top",
"crimeware",
"threats",
"thus",
"far",
"into",
"2016."
] | [
3,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
0
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.AxVDb.Trojan",
"Trojan.Rincux.AW",
"Trojan.Injector.26488",
"Trojan.Rincux.AW",
"Trojan.Injector",
"Tool.StormAttack.Win32.10",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Backdoor.Trojan",
"Win.Trojan.Rincux-6417593-0",
"Trojan-DDoS.Win32.StormAttack.c",
"Trojan.Rincux.AW",
"Trojan.Win32.Tdss.bziyas",
"Trojan.Rincux.AW",
"TrojWare.Win32.Magania.~AAC",
"DDoS.Storm.156",
"BehavesLike.Win32.Backdoor.km",
"TrojanDDoS.StormAttack.a",
"Trojan[Rootkit]/Win32.TDSS",
"DDoS:Win32/Stormser.A",
"Trojan.Rincux.AW",
"Trojan-DDoS.Win32.StormAttack.c",
"BScope.Trojan.Win32.Inject.2",
"Trojan-Downloader.Win32.Pangu",
"W32/ServStart.AS!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"That",
"version",
"flags",
"messages",
"\"",
"containing",
"certain",
"language",
"associated",
"with",
"junk",
"texts",
"and",
"flags",
"numbers",
"associated",
"with",
"junk",
"calls",
"and",
"not",
"in",
"a",
"user",
"'s",
"contacts",
",",
"''",
"the",
"company",
"says",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"com",
"Given",
"that",
"there",
"is",
"some",
"overlap",
"in",
"the",
"previous",
"two",
"versions",
",",
"it",
"came",
"as",
"no",
"surprise",
"to",
"us",
"that",
"we",
"finally",
"identified",
"a",
"sample",
"which",
"is",
"an",
"evolution",
"based",
"on",
"both",
"previous",
"versions",
"."
] | [
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Daserf's",
"main",
"purpose",
"is",
"information",
"stealing",
"and",
"the",
"Trojan",
"is",
"capable",
"of",
"gathering",
"information",
"from",
"infected",
"computers",
"and",
"relaying",
"it",
"back",
"to",
"attacker-controlled",
"servers."
] | [
3,
16,
16,
16,
1,
9,
16,
16,
3,
16,
16,
16,
1,
9,
16,
5,
13,
16,
16,
16,
16,
16,
5,
13
] |
[
"Due",
"to",
"new",
"EU",
"money",
"laundering",
"guidelines",
",",
"the",
"new",
"Bank",
"Austria",
"security",
"app",
"is",
"mandatory",
"for",
"all",
"customers",
"who",
"have",
"a",
"mobile",
"phone",
"number",
"in",
"our",
"system",
"."
] | [
16,
16,
16,
4,
16,
16,
16,
16,
16,
16,
5,
13,
13,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Dropper.Win32.Flystud!O",
"Trojan.Hookmoot.S217748",
"Trojan.Symmi.D7D5",
"Win32.Worm.FlyStudio.mc",
"Trojan.Dropper",
"Win32/SillyAutorun.ALB",
"Win.Trojan.Rootkit-7763",
"Win32.Trojan.FlyStudio.A",
"Trojan-GameThief.Win32.OnLineGames.boif",
"Trojan.Win32.QQPass.esaped",
"Troj.Dropper.W32.Flystud.lBWL",
"Trojan.MulDrop5.5320",
"Dropper.Flystud.Win32.139",
"BehavesLike.Win32.Autorun.vc",
"Trojan/PSW.OnLineGames.cvvq",
"RKIT/Tiny.BK.2",
"Trojan:Win32/Englov.A",
"Trojan-GameThief.Win32.OnLineGames.boif",
"HEUR/Fakon.mwf",
"Rootkit.Tiny",
"Trojan.AutoRun",
"Win32/FlyStudio.A",
"Trojan.TenThief.QQPsw.tss",
"Worm.Autorun!1DOkY6YfgQ8",
"Rootkit.Win32.Tiny",
"W32/BDoor.DRV!tr",
"Win32/Trojan.dd5"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"attack",
",",
"however",
",",
"seems",
"exclusive",
"to",
"Android",
"users",
",",
"as",
"it",
"does",
"not",
"have",
"the",
"code",
"to",
"attack",
"iOS",
"devices",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16
] |
[
"The",
"code",
"implementation",
"again",
"seems",
"that",
"it",
"has",
"been",
"added",
"for",
"testing",
"purposes",
"only",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"But",
"we",
"recently",
"identified",
"an",
"app",
"that",
"demonstrated",
"new",
"ways",
"of",
"successfully",
"evading",
"Apple's",
"code",
"review."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16
] |
[
"The",
"stolen",
"credentials",
"may",
"be",
"used",
"for",
"remote",
"access",
"into",
"the",
"victim",
"network",
"if",
"applicable."
] | [
16,
1,
16,
16,
16,
16,
16,
1,
9,
16,
5,
13,
13,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Darkshell",
"BehavesLike.Win32.Ipamor.nm",
"Trojan[Downloader]/Win32.Delf",
"Trojan:WinNT/Darkshell.C",
"Trojan/Win32.CSon.R1800",
"Trojan.Win32.Scar.mg"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.B01D",
"Troj.Crypt.Tpm!c",
"BehavesLike.Win32.PWSQQPass.vc",
"Trojan:Win32/Valan.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"It",
"can",
"also",
"imitate",
"a",
"legitimate",
"website",
"to",
"lure",
"you",
"into",
"revealing",
"your",
"sensitive",
"information."
] | [
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
1,
9
] |
[
"Dyreza",
"originally",
"focused",
"on",
"intercepting",
"end-user",
"bank",
"logins,",
"and",
"later",
"expanded",
"to",
"job",
"hunting,",
"file",
"hosting,",
"domain",
"registration,",
"website",
"hosting,",
"file",
"hosting,",
"tax",
"services,",
"and",
"online",
"retail",
"categories"
] | [
3,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
16,
4,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12
] |
[
"Brain",
"Test",
"has",
"been",
"removed",
"from",
"Google",
"Play",
"since",
"September",
"24."
] | [
3,
11,
16,
16,
16,
16,
5,
13,
16,
0,
8
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.DinwoodAATTC.Worm",
"Trojan.Zenshirsh.SL7",
"TSPY_EYDROP.SMA",
"Win32/Oflwr.A!crypt",
"TSPY_EYDROP.SMA",
"Win.Worm.Allaple-5",
"Trojan-Dropper.Win32.Dinwod.acqn",
"Trojan.Win32.Dinwod.ejafor",
"Troj.Dropper.W32.Dinwod.toVw",
"TrojWare.Win32.TrojanDropper.Dinwod.A",
"Trojan.Inject1.58305",
"BehavesLike.Win32.Dropper.wh",
"TrojanDropper.Dinwod.ale",
"Worm[NET]/Win32.Nimda.gic",
"Trojan-Dropper.Win32.Dinwod.acqn",
"Trojan/Win32.OnlineGameHack.C33730",
"TrojanDropper.Dinwod",
"Trojan.Dropper",
"Trojan.DR.Dinwod!dCCk6/8cSJk"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Finally",
",",
"the",
"specific",
"overlays",
"are",
"designed",
"for",
"Australian",
"financial",
"institutions",
",",
"and",
"Australia",
"is",
"one",
"of",
"the",
"geographic",
"regions",
"that",
"is",
"accepted",
"by",
"the",
"C2",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Symmi!O",
"WS.Reputation.1",
"OnLineGames.IRMW",
"Win32/Oflwr.A!crypt",
"Riskware.Win32.FakeLPK.cwuava",
"BackDoor.BlackHole.21297",
"TR/Obfuscated.XZ.937",
"HackTool.Sniffer.WpePro",
"PSW.OnlineGames4.BEIZ"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Connapts",
"Trojan/Small.ndx",
"Trojan.Heur.LP.EDC094",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Trojan.Win32.MLW.dylhy",
"W32/Trojan.CISW-8628",
"Backdoor.Bot/Variant",
"Trojan/Win32.Xema.C93063",
"W32/Small.NDX!tr",
"Win32/Backdoor.796"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"spring,",
"the",
"author",
"of",
"the",
"NukeBot",
"banking",
"Trojan",
"published",
"the",
"source",
"code",
"of",
"his",
"creation."
] | [
16,
0,
6,
14,
16,
16,
3,
11,
11,
16,
1,
9,
9,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Adware.ELEXCRTD.Win32.5604",
"Trojan.Johnnie.D709",
"not-a-virus:AdWare.Win32.Elex.sgn",
"Adware.Mutabaha.1819",
"RiskTool.Uncheckit.l",
"TR/Chuckenit.dglxl",
"Trojan:Win32/Chuckenit.A",
"not-a-virus:AdWare.Win32.Elex.sgn"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"blog",
"post",
"highlights",
"the",
"technical",
"innovations",
"that",
"we",
"found",
"in",
"the",
"latest",
"versions",
"of",
"Carbon",
"we",
"have",
"discovered."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Slingup",
"BKDR_SLINGUP.M",
"W32/Zbot.AAJD",
"Backdoor.Trojan",
"BKDR_SLINGUP.M",
"Trojan.Win32.Yakes.pqep",
"Trojan.Win32.Inject.ecmohu",
"Trojan.Win32.Z.Yakes.672768",
"Troj.W32.Yakes.tn6w",
"BackDoor.Tordev.8",
"Trojan.Win32.Injector",
"W32/Zbot.EUMY-8878",
"TR/Injector.juol",
"Trojan/Win32.Yakes",
"Trojan:Win32/Casidel.A",
"Trojan.Win32.Yakes.pqep",
"Trojan.Yakes",
"Trojan.Yakes",
"Trj/CI.A",
"Win32/Injector.CXUT",
"Win32.Trojan.Yakes.Ehid",
"Trojan.Yakes!YuLYvE8ikp0",
"W32/Injector.CGQK!tr",
"Win32/Trojan.621"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"do",
"not",
"know",
"exactly",
"how",
"many",
"people",
"have",
"been",
"infected",
"with",
"RuMMS",
"malware",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.Vetor.PE",
"Virus.Win32.Virut.1!O",
"W32.Virut.G",
"Virus.Virut.Win32.27",
"W32/Virut.AI",
"W32.Virut.CF",
"Win32/Virut.17408",
"PE_VIRUX.A-1",
"Virus.Win32.Virut.ce",
"Virus.Win32.Virut.hpeg",
"Virus.Win32.Virut.tt",
"Virus.Win32.Virut.CE",
"Trojan.MulDrop1.57199",
"PE_VIRUX.A-1",
"BehavesLike.Win32.Virut.dc",
"W32/Virut.AI",
"Win32/Virut.bn",
"Trojan[Dropper]/Win32.Injector",
"Win32.Virut.nc.53248",
"Virus.Win32.Virut.ce",
"Win32/Virut.F",
"Virus.Virut.06",
"Win32.Virut.E",
"Win32/Virut.NBP",
"IM-Worm.Win32.Zeroll",
"W32/Sality.AO",
"Virus.Win32.VirutChangeEntry.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Spreads",
"via",
"password",
"guessing",
"over",
"networks"
] | [
16,
16,
16,
16,
16,
12
] |
[
"The",
"malware",
"samples",
"were",
"mainly",
"distributed",
"through",
"a",
"series",
"of",
"malicious",
"subdomains",
"registered",
"under",
"a",
"legitimate",
"domain",
"belonging",
"to",
"a",
"well-known",
"shared",
"hosting",
"service",
"provider",
"in",
"Russia",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Kitoles",
"Trojan.Ransom.Scarab",
"Win32.Trojan.WisdomEyes.16070401.9500.9547",
"W32/Trojan.LUOM-4097",
"Ransom.CryptXXX",
"Win.Ransomware.Scarab-6336012-1",
"Win32.Trojan-Ransom.Amnesia.J52DUW",
"Trojan.Win32.Encoder.ewdzie",
"Trojan.Win32.Z.Securityshield.193058",
"Trojan.Encoder.23898",
"Trojan-Ransom.FileCoder",
"Trojan.Purga.w",
"Trojan.Ransom.Scarab.3",
"Ransom:Win32/Kitoles.A",
"Trojan/Win32.Scarab.R213792",
"Trojan-Ransom.Purga",
"Win32.Trojan.Filecoder.Phqc",
"Win32/Trojan.Ransom.089"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"specific",
"downloader,",
"Cmstar,",
"is",
"associated",
"with",
"the",
"Lurid",
"downloader",
"also",
"known",
"as",
"Enfal'."
] | [
16,
16,
3,
11,
16,
16,
16,
16,
3,
11,
16,
16,
16,
3
] |
[
"We",
"assume",
"it",
"was",
"rushed",
"because",
",",
"unlike",
"GlanceLove",
",",
"it",
"lacked",
"any",
"real",
"obfuscation",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16
] |
[
"Recently",
"Malwarebytes",
"got",
"access",
"to",
"several",
"elements",
"of",
"the",
"espionage",
"toolkit",
"that",
"has",
"been",
"captured",
"attacking",
"Vietnamese",
"institutions."
] | [
16,
4,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
1,
4,
12
] |
[
"I",
"am",
"not",
"entirely",
"sure",
"what",
"it",
"is",
"but",
"it",
"has",
"some",
"indications",
"of",
"fareit",
"Trojan."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
16,
3,
11
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dos.Bonk.C",
"DoS.Win32.Bonk!O",
"Dos.Bonk",
"Win32.Trojan.Bonk.Tcwa",
"W32/Tool.FPXO-2436",
"DoS.Win32.Bonk.c",
"Trojan.Dos.Bonk.C",
"Trojan.Win32.Bonk.ddda",
"TrojWare.Win32.DoS.Bonk.C",
"Trojan.Dos.Bonk.C",
"Trojan.Inject.654",
"BehavesLike.Win32.ExploitMydoom.mm",
"Backdoor.Win32.HacDef",
"W32/VirTool.RO",
"TR/RedCap.kudtu",
"DoS:Win32/Bonk.C",
"Trojan.Dos.Bonk.C",
"DoS.Win32.Bonk.c",
"Trojan.Dos.Bonk.C",
"Trojan.Asthma.23305",
"Trojan.Dos.Bonk.C",
"Trojan.Dos.Bonk.C",
"Win32/DoS.Bonk.C",
"DoS.Bonk!CFlP7tiJI8A",
"DoS/Bonk.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Duqu",
"Trojan.Duqu.Win32.13",
"TROJ_DUQU.DEC",
"Win32.Trojan.WisdomEyes.16070401.9500.9587",
"Win32/Duqu.A",
"TROJ_DUQU.DEC",
"Win.Trojan.Duqu-14",
"Trojan.Win32.Duqu.evvbpp",
"Trojan.Duqu.2",
"W32/Trojan.CVVB-9378",
"TR/Offend.6750706",
"W32/Duqu.A!tr",
"Trojan:Win32/Duqu.C",
"Worm/Win32.Stuxnet.R608",
"Trojan.Duqu!ZB0mf9vKpU8",
"Trojan.Win32.Urelas",
"Win32/Trojan.d72"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"r1-r4",
":",
"This",
"is",
"a",
"local",
"privilege",
"escalation",
"(",
"root",
")",
"exploit",
",",
"which",
"includes",
":",
"CVE-2013-6282",
",",
"camerageroot",
"(",
"http",
":",
"//www.77169.org/exploits/2013/20130414031700",
")",
",",
"a",
"rooting",
"tool",
"for",
"mtk6592",
"and",
"addtional",
"exploit",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
7,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.10E5",
"Trojan-Dropper.Win32.Decay!O",
"Troj.Dropper.W32.Decay.fvr!c",
"Trojan/Dropper.Decay.dst",
"Trojan.Razy.DD584",
"W32/Dropper.ANEZ",
"TROJ_DECAY.SM",
"Trojan-Dropper.Win32.Decay.fvr",
"Trojan.Win32.Decay.biarma",
"TrojWare.Win32.TrojanDropper.Decay.ghu",
"Trojan.MulDrop6.60922",
"TROJ_DECAY.SM",
"BehavesLike.Win32.Virut.lc",
"W32/Risk.RTXX-1196",
"TrojanDropper.Decay.bo",
"TR/Drop.Decay.ayb",
"Trojan[Dropper]/Win32.Decay",
"TrojanDropper:Win32/Decay.A",
"Dropper.Decay.47104.B",
"Trojan-Dropper.Win32.Decay.fvr",
"Win32.Trojan.Yoybot.A",
"Dropper/Win32.Decay.R2060",
"TrojanDropper.Decay",
"Backdoor.Win32.Poison",
"W32/Decay.FVR!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"An",
"example",
"SMS",
"message",
"is",
"shown",
"in",
"Figure",
"1",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"was",
"an",
"existing",
"business",
"model",
"when",
"computer-based",
"banking",
"malware",
"was",
"the",
"only",
"form",
"of",
"banking",
"malware",
"and",
"has",
"shifted",
"to",
"the",
"Android",
"equivalent",
"a",
"few",
"years",
"later",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16
] |
[
"Uptycs",
"research",
"team",
"has",
"discovered",
"a",
"malware",
"family",
"that",
"controls",
"its",
"operations",
"over",
"the",
"messaging",
"service",
"Telegram."
] | [
4,
12,
12,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
5
] |
[
"Dolkun",
"lsa",
"Chairman",
"of",
"the",
"Executive",
"Committee",
"Word",
"Uyghur",
"Congress",
"β",
"While",
"the",
"victim",
"reads",
"this",
"fake",
"message",
",",
"the",
"malware",
"secretly",
"reports",
"the",
"infection",
"to",
"a",
"command-and-control",
"server",
"."
] | [
16,
16,
16,
16,
16,
4,
12,
12,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"At",
"runtime",
",",
"the",
"apps",
"can",
"check",
"which",
"carrier",
"the",
"device",
"is",
"connected",
"to",
"and",
"fetch",
"a",
"configuration",
"object",
"from",
"the",
"command",
"and",
"control",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom_Blulock.R002C0CKC17",
"Trojan.Ransomlock.AI",
"Ransom_Blulock.R002C0CKC17",
"Win32.Worm.FlyStudio.C",
"not-a-virus:RiskTool.Win32.FlyStudio.awnz",
"Trojan.Win32.Z.Strictor.901632.H",
"TrojWare.Win32.FlyStudio.~UJ",
"Trojan.Winlock.11779",
"TR/Strictor.901632.1",
"Trojan.Strictor.DC183",
"not-a-virus:RiskTool.Win32.FlyStudio.awnz",
"Ransom:Win32/Blulock.A",
"Trojan/Win32.Ransomlock.R135596",
"Trojan.FlyStudio",
"Trj/CI.A",
"Trojan.Win32.Winlock.f",
"Ransom.FUL!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"SpyNote",
"RAT",
"builder",
"The",
"SpyNote",
"Remote",
"Access",
"Trojan",
"(",
"RAT",
")",
"builder",
"is",
"gaining",
"popularity",
"in",
"the",
"hacking",
"community",
",",
"so",
"we",
"decided",
"to",
"study",
"its",
"pervasiveness",
"."
] | [
3,
11,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Pucedoor.Win32.63",
"Troj.W32.Pucedoor!c",
"W32/Trojan.MNET-5041",
"Trojan.Pucedoor",
"Trojan.Win32.Pucedoor.aa",
"Trojan.Win32.AD.eoqlfa",
"Trojan.Win32.Z.Pucedoor.15360",
"Trojan.Pucedoor.d",
"TR/Pucedoor.hopld",
"Trojan/Win32.Pucedoor",
"Trojan:Win32/Mirsonk.A",
"Trojan.Mikey.D109B5",
"Trojan.Win32.Pucedoor.aa",
"Trojan/Win32.Pucedoor.R216811",
"Trj/CI.A",
"Win32.Trojan.Pucedoor.Sxxz",
"Win32/Trojan.Proxy.62e"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"extraction",
"method",
"is",
"the",
"same",
",",
"but",
"the",
"encryption",
"algorithm",
"(",
"also",
"XOR",
")",
"is",
"much",
"simpler",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/MSILPack.a",
"Trojan.MSIL.VB!/kGPqcrNINQ",
"TROJ_FAM_0000b54.TOMA",
"Packed.MSIL.MSILPack.a",
"Worm.Win32.Rebhip!IK",
"Packed:W32/DonutCrypt.A",
"Trojan.MulDrop1.40622",
"TROJ_FAM_0000b54.TOMA",
"Packed.MSIL.is",
"TrojanDropper:MSIL/VB.K",
"Packed/Win32.MSILPack",
"Worm.Win32.Rebhip",
"MSIL/AntiAV.NET!tr",
"Trj/Dropper.AJX"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Senna",
"KIT/SennaSpy.30",
"HackTool[Constructor]/Win32.SennaSpy",
"VTool.SennaSpy.30.kcloud",
"Constructor:Win32/Sennaspy.3_0",
"Constructor.Win32.SennaSpy",
"Win32/Constructor.Spy.58d"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"also",
"discovered,",
"based",
"on",
"the",
"samples",
"we",
"gathered,",
"that",
"the",
"malware,",
"which",
"we",
"call",
"CloudTap,",
"has",
"been",
"in",
"use",
"for",
"over",
"a",
"year."
] | [
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
3,
16,
16,
16,
3,
16,
16,
16,
16,
0,
8,
8,
8
] |
[
"Last",
"week",
"Forcepoint",
"tracked",
"an",
"interesting",
"e-mail",
"campaign",
"that",
"was",
"distributing",
"double",
"zipped",
"files",
"with",
"Windows",
"Script",
"Files",
"WSFs",
"inside."
] | [
16,
16,
4,
16,
16,
16,
6,
14,
15,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
16
] |
[
"Symantec",
"has",
"blocked",
"attempts",
"to",
"infect",
"customers",
"in",
"Poland,",
"Mexico",
"and",
"Uruguay",
"by",
"the",
"same",
"exploit",
"kit",
"that",
"infected",
"the",
"Polish",
"banks."
] | [
4,
16,
16,
16,
16,
16,
4,
16,
2,
10,
16,
2,
16,
16,
16,
3,
11,
16,
16,
4,
12,
12
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor/Small.acc",
"Backdoor.Trojan",
"Backdoor.Win32.Small.acc",
"Trojan.Win32.Small.gcwll",
"Backdoor.W32.Small.acc!c",
"Win32.Backdoor.Small.Egnw",
"Backdoor.Small.Win32.7271",
"Backdoor/Small.dwv",
"BDS/Dalbot.147456",
"Trojan[Backdoor]/Win32.Small",
"Backdoor.Win32.A.Small.147456",
"Backdoor.Win32.Small.acc",
"Trojan/Win32.Dalbot.C330242",
"Backdoor.Small",
"W32/Small.ACC!tr.dldr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"They",
"are",
"known",
"to",
"run",
"watering",
"hole",
"and",
"spearphishing",
"campaigns",
"to",
"better",
"pinpoint",
"their",
"targets."
] | [
16,
16,
16,
16,
16,
1,
9,
16,
6,
14,
16,
16,
16,
16,
16
] |
Subsets and Splits