text
stringlengths 4
429
|
---|
reported
|
which
|
phishing
|
email
|
sent
|
from
|
Yahoo
|
account
|
defense
|
contractor
|
with
|
content
|
about
|
conference
|
malicious
|
attachment,
|
ISSNIP_2010.pdf
|
(MD5
|
hash:
|
3D966CD90D320EA4A319452D1CCB11AA):
|
Figure
|
Phish
|
Email
|
(9/23/2010)
|
From
|
analysis,
|
malicious
|
attachment
|
appeared
|
have
|
same
|
functionality
|
listed
|
previous
|
incident
|
include
|
unique
|
dropped
|
files
|
msupdater.exe
|
FAVORITES.DAT
|
http://www.bloomberg.com/news/2011-
|
24/exxon-
|
shell-
|
said-
|
have-
|
been-
|
hacked-
|
through-
|
chinese-
|
internet-
|
servers.html
|
2012
|
Zscaler
|
Inc.
|
Seculert
|
Ltd.
|
Rights
|
Reserved.
|
Related
|
Antivirus
|
Vendor
|
Family
|
Names
|
previously
|
identified
|
samples
|
have
|
pointed
|
that
|
certain
|
malware
|
family
|
names
|
used
|
identify
|
classify
|
fore-
|
mentioned
|
threat.
|
example,
|
DrWeb
|
uses
|
Backdoor.Calla
|
Microsoft
|
other
|
vendors
|
Backdoor.Matchaldru
|
Sophos
|
uses
|
Mal/
|
Ovoxual
|
Using
|
these
|
identifiers,
|
number
|
related
|
samples
|
found
|
open-
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.