tokens
sequencelengths
2
296
ner_tags
sequencelengths
2
296
[ "This", "ransomware", "family", "’", "s", "long", "history", "tells", "us", "that", "its", "evolution", "is", "far", "from", "over", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dropper.GreenStuff.1.7", "Win32.Trojan.WisdomEyes.16070401.9500.9688", "Trojan.Dropper", "Win32/Pasorot.D", "Win.Trojan.Greenstuff-3", "Trojan.Dropper.GreenStuff.1.7", "Trojan-Dropper.Win32.GreenStuff.17", "Trojan.Dropper.GreenStuff.1.7", "Troj.Dropper.W32.GreenStuff.17!c", "Win32.Trojan-dropper.Greenstuff.Ebgv", "Trojan.Dropper.GreenStuff.1.7", "TrojWare.Win32.TrojanDropper.GreenStuff.17", "Trojan.Dropper.GreenStuff.1.7", "Trojan.MulDrop.365", "Dropper.GreenStuff.Win32.14", "BehavesLike.Win32.Trojan.dc", "W32/Trojan.KLUP-2808", "TrojanDropper.Exebinder", "TR/Pasorot.g", "Trojan[PSW]/Win32.Pasorot", "Trojan.Dropper.GreenStuff.1.7", "Trojan-Dropper.Win32.GreenStuff.17", "TrojanDropper:Win32/GreenStuff.1_7", "Trojan/Win32.Downloader.C112567", "TScope.Malware-Cryptor.SB", "Trj/Dropper.WF", "Win32/TrojanDropper.GreenStuff.17", "W32/GreenSt.B!tr.dr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "MemScan:Trojan.Downloader.Modgof.A", "MemScan:Trojan.Downloader.Modgof.A", "Trojan.Scar.daok", "Trojan.Win32.Scar.tlmwj", "TROJ_AZAH.A", "Trojan.Win32.Scar.daok", "MemScan:Trojan.Downloader.Modgof.A", "Trojan.Scar!ZI1ghG8RGXc", "MemScan:Trojan.Downloader.Modgof.A", "Trojan.MulDrop1.43719", "TROJ_AZAH.A", "Win32.Troj.Scar.kcloud", "Trojan.Win32.A.Downloader.120320.DL", "MemScan:Trojan.Downloader.Modgof.A", "Worm.Win32.FakeFolder.b", "W32/AZAH.A!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "The", "first", "function", "is", "used", "for", "contact", "information", "stealing", ":", "the", "function", "upCon", "steals", "all", "contacts", "in", "the", "contact", "list", "and", "their", "information", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.FakeGina.X", "Trojan.Fakegina", "Trojan.FakeGina.X", "Trojan/FakeGina.b", "TROJ_FAKEGINA.AA", "Win32.Trojan.FakeGina.b", "W32/Risk.LOJP-2889", "Trojan.Fakegina", "TROJ_FAKEGINA.AA", "Trojan.FakeGina.X", "Trojan.FakeGina.X", "Trojan.FakeGina.X", "TrojWare.Win32.FakeGina.~B", "Trojan.FakeGina.X", "Trojan.FakeGina.Win32.121", "Trojan.Win32.FakeGina", "W32/MalwareF.NCOX", "Trojan/Win32.FakeGina", "Trojan.FakeGina.X", "Trojan:Win32/Fakegina.T", "Trojan/Win32.FakeGina.R77324", "Win32/FakeGina.B", "Win32.Trojan.Fakegina.Wmst", "W32/FakeGina.AA!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "While", "doing", "so", ",", "it", "will", "reach", "a", "service", "exported", "by", "β€œ", "Agent", "Smith", "”", ",", "and", "sends", "out", "an", "authentication", "request", "that", "would", "lead", "to", "a", "call", "to", "the", "β€˜", "addAccount", "’", "method", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "campaign", "targeted", "Japanese", "organizations", "by", "using", "at", "least", "two", "legitimate", "Japanese", "websites", "to", "host", "a", "strategic", "web", "compromise", "SWC,", "where", "victims", "ultimately", "downloaded", "a", "variant", "of", "the", "SOGU", "malware." ]
[ 16, 3, 16, 4, 12, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 1, 9, 9, 9, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "It", "connects", "to", "a", "certain", "URL,", "likely", "controlled", "by", "the", "attacker,", "using", "a", "specific", "Go", "user-agent:" ]
[ 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 1, 16, 16, 16, 5, 13 ]
[ "The", "first", "phase", "is", "receiving", "malspam", "from", "a", "botnet." ]
[ 16, 16, 16, 16, 16, 1, 16, 16, 3 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Graftor.D49E51", "W32/Trojan.ULWD-7621", "Trojan.Win32.Drop.elkhrw", "BehavesLike.Win32.Sivis.kh", "Trojan-Dropper.Win32.Rubat", "W32/Win.G", "Trojan.SchoolGirl.er", "TR/Drop.Rubat.qlzld", "TrojanDropper:Win32/Rubat.A!bit", "Trojan.SchoolGirl" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Unfortunately", ",", "for", "now", "we", "can", "’", "t", "say", "in", "what", "environment", "these", "landing", "pages", "were", "used", "in", "the", "wild", ",", "but", "according", "to", "all", "the", "information", "at", "our", "dsiposal", ",", "we", "can", "assume", "that", "they", "are", "perfect", "for", "exploitation", "using", "malicious", "redirects", "or", "man-in-the-middle", "attacks", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "If", "the", "threat", "reappears", "on", "the", "device", "after", "the", "first", "installation", ",", "it", "means", "that", "the", "malware", "managed", "to", "install", "the", "persistency", "module", "in", "the", "System", "directory", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.CominateU.Adware", "Trojan-GameThief.Win32.OnLineGames!O", "TrojanGameThief.OnLineGames", "Trojan.OnLineGames.Win32.78851", "Trojan/OnLineGames.boaj", "Trojan.Zusy.Elzob.D484", "W32/Risk.ADYI-1535", "TSPY_ONLIN.SMUM", "Win.Spyware.82985-2", "Trojan-GameThief.Win32.OnLineGames.boaj", "Trojan.Win32.OnLineGames.cptyo", "BackDoor.Sturf.170", "TSPY_ONLIN.SMUM", "W32/MalwareF.AEIUQ", "Trojan/PSW.OnLineGames.cedq", "TR/Spy.671314", "Trojan[GameThief]/Win32.OnLineGames", "Trojan-GameThief.Win32.OnLineGames.boaj", "Trojan/Win32.OnlineGameHack.R11892", "TrojanPSW.OnLineGames.bo", "Win32/PSW.OnLineGames.QDP", "Trojan.PWS.OnLineGames!mLCnhslfoqM", "Trojan-GameThief.Win32.OnLineGames", "W32/Onlinegames.BOJI!tr.pws" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/W32.Timer.55808.B", "Trojan-Ransom.Win32.Timer!O", "Trojan/Kryptik.sot", "Trojan.Boigy.4", "TROJ_RANSOM.SMMJ", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "Win32/Ransom.GED", "TROJ_RANSOM.SMMJ", "Trojan-Ransom.Win32.Timer.icg", "Trojan.Win32.Timer.dqvge", "Trojan.Win32.A.Timer.55808", "Trojan.Winlock.4005", "Trojan/Timer.cnd", "TR/Ramson.TR", "TrojanDropper:Win32/Dinome.A", "Trojan-Ransom.Win32.Timer.icg", "Trojan/Win32.Ransomlock.R11433", "BScope.Trojan.Winlock.01505", "Trj/Hexas.HEU", "Trojan-Downloader.Win32.Karagany" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Given", "previous", "operational", "security", "errors", "from", "this", "actor", "in", "the", "past", "which", "resulted", "in", "exfiltrated", "content", "being", "publicly", "accessible", "Lookout", "Threat", "Intelligence", "is", "continuing", "to", "map", "out", "infrastructure", "and", "closely", "monitor", "their", "continued", "evolution", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "makes", "the", "taking", "down", "and", "recovery", "of", "the", "network", "much", "harder", "and", "poses", "a", "considerable", "challenge", "for", "defenders", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "nampriknum", "[", "." ]
[ 9, 9, 9, 9 ]
[ "Aside", "from", "the", "natural", "value", "of", "phone", "numbers", "associated", "with", "the", "names", "of", "their", "owners", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Ransom/W32.Foreign.409600.C", "Trojan.Foreign", "Ransom_Foreign.R002C0DB418", "Trojan-Ransom.Win32.Foreign.nxzy", "Trojan.Win32.Spambot.exqsne", "Trojan.Win32.Z.Trubsil.409600", "Troj.Ransom.W32.Foreign!c", "Trojan.Spambot.15075", "Ransom_Foreign.R002C0DB418", "BehavesLike.Win32.Ransom.gc", "TR/Crypt.ZPACK.lpngp", "Backdoor:Win32/Trubsil.C", "Trojan-Ransom.Win32.Foreign.nxzy", "Trojan/Win32.Foreign.C2394896", "TrojanRansom.Foreign", "Trj/GdSda.A", "W32/Kryptik.FRKA!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Due", "to", "the", "specific", "nature", "of", "its", "activity", ",", "Perkele", "is", "distributed", "in", "a", "rather", "unusual", "way", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "link", "points", "to", "a", "web", "page", "with", "a", "similar", "sentence", "and", "a", "button", "for", "downloading", "the", "APK", "file", "of", "the", "Trojan", "to", "the", "device", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DakusarDRAX.Trojan", "Trojan.Floxif", "Win32.Trojan.WisdomEyes.16070401.9500.9948", "Win32/Flofix.D", "TROJ_FLOXIF_EK040354.UVPM", "Trojan.Win32.Floxif.cqjmcu", "Win32.FloodFix", "Trojan.Floxif.Win32.2", "TROJ_FLOXIF_EK040354.UVPM", "TR/Spy.69337", "Trojan:Win32/Floxif.E", "Virus/Win32.Fixflo.R204310", "Trojan.Sly", "Win32/Floxif.E", "W32/Floxif.E" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "com", "Malicious", "Twitter", "accounts", ":", "https", ":", "//twitter.com/lucky88755", "https", ":", "//twitter.com/lucky98745", "https", ":", "//twitter.com/lucky876543", "https", ":", "//twitter.com/luckyone1232", "https", ":", "//twitter.com/sadwqewqeqw", "https", ":", "//twitter.com/gyugyu87418490", "https", ":", "//twitter.com/fdgoer343", "https", ":", "//twitter.com/sdfghuio342", "https", ":", "//twitter.com/asdqweqweqeqw", "https", ":", "//twitter.com/ukenivor3", "Malicious", "Instagram", "account", ":", "https", ":", "//www.instagram.com/freedomguidepeople1830/", "Malicious", "Tumblr", "accounts", ":", "https", ":", "//mainsheetgyam.tumblr.com/", "https", ":", "//hormonaljgrj.tumblr.com/", "https", ":", "//globalanab.tumblr.com/", "C", "&", "C", "addresses", ":", "104", "[", "." ]
[ 9, 9, 16, 4, 16, 16, 1, 9, 9, 1, 9, 9, 1, 9, 9, 1, 9, 9, 1, 9, 9, 1, 9, 9, 1, 9, 9, 1, 9, 9, 1, 9, 9, 1, 9, 9, 16, 4, 16, 16, 1, 9, 9, 16, 4, 16, 16, 1, 9, 9, 1, 9, 9, 1, 9, 9, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "Unit", "42", "discovered", "new", "activity", "that", "appears", "related", "to", "an", "adversary", "group", "previously", "called", "C0d0so0", "or", "Codoso" ]
[ 4, 12, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 16, 16, 6, 16, 6 ]
[ "As", "a", "result", ",", "no", "new", "instances", "of", "this", "app", "can", "be", "installed", "on", "iOS", "devices", "and", "existing", "installations", "can", "no", "longer", "be", "run", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "We", "have", "observed", "download", "attempts", "from", "the", "following", "domains:" ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "In", "2022,", "they", "updated", "SysUpdate,", "one", "of", "their", "custom", "malware", "families,", "to", "include", "new", "features", "and", "add", "malware", "infection", "support", "for", "the", "Linux", "platform." ]
[ 16, 0, 16, 16, 3, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "HW32.Packed.3797", "JS.Nemucod.LK", "VBS/DropExe.A!Camelot", "Trojan.Script.MLW.eafugn", "VBS.Dropper.102", "TrojanDropper.VBS.aq", "TrojanDropper:VBS/Twexag.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "East", "Asian", "government", "agencies", "came", "under", "siege", "when", "attackers", "targeted", "several", "servers", "within", "their", "networks." ]
[ 4, 12, 12, 12, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5 ]
[ "Similar", "to", "other", "malware", "seen", "in", "the", "past", ",", "Charger", "checks", "the", "local", "settings", "of", "the", "device", "and", "does", "not", "run", "its", "malicious", "logic", "if", "the", "device", "is", "located", "in", "Ukraine", ",", "Russia", ",", "or", "Belarus", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32/AutoRun.autv", "W32/Sohanad.G", "WORM_SOHANAD.DX", "Virus.Worm.AutoRun!IK", "Win32.HLLW.Autoruner.8327", "WORM_SOHANAD.DX", "W32/Sohanad.G", "Worm/AutoRun.mky", "Malware.Imaut", "Virus.Worm.AutoRun", "SHeur.CIAA", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.RansomKD.6014218", "Ransom.Chicrypt", "Ransom.Chimera", "Trojan/Kryptik.edes", "Trojan.RansomKD.D5BC50A", "Ransom_Chicrypt.R002C0DIL17", "W32/Ransom.IF", "Trojan-Ransom.Win32.Chimera.q", "Trojan.RansomKD.6014218", "Trojan.Win32.Encoder.esuyoq", "Troj.Ransom.W32!c", "Win32.Trojan.Chimera.Edei", "Trojan.RansomKD.6014218", "Trojan.RansomKD.6014218", "Trojan.Encoder.2774", "W32/Ransom.KXVS-1328", "W32.Ransom.Chimera", "Trojan[Ransom]/Win32.Chimera", "Ransom:Win32/Chicrypt.A", "Trojan.Win32.Z.Ransom.647242", "Trojan-Ransom.Win32.Chimera.q", "Win32.Trojan-Ransom.Chimera.D", "Trojan/Win32.Chimera.C1182585", "Trojan.RansomKD.6014218", "Hoax.Chimera", "Trojan.Kryptik!1o3s7Z7mkiE", "W32/Chimera.EDES!tr", "Win32/Trojan.37c" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.ClickerAybn.Trojan", "Trojan-Spy.Win32.VB!O", "Trojan.Puzlice.A3", "Win32.Trojan-Clicker.VB.c", "Win32/TrojanClicker.VB.NUE", "Win.Trojan.7640471-1", "Worm.Win32.Autorun.gxay", "Trojan.Win32.VB2.cnioik", "Trojan.Win32.A.VB.55040", "W32.Virut.lQTU", "TrojWare.Win32.Spy.VB.FRG", "Trojan.VbCrypt.68", "Trojan.VB.Win32.83289", "BehavesLike.Win32.Malware.nc", "Virus.Win32.Virut", "TrojanSpy.VB.cxx", "Trojan[Spy]/Win32.VB", "Worm.Win32.Autorun.gxay", "Trojan:Win32/Puzlice.A", "Win32/VB.BXL", "TScope.Trojan.VB", "Trojan.Vilsel", "TrojanSpy.VB!jmRymi1V2Tw", "W32/VBClicker.NUE!tr" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Some", "of", "them", "like", "takephoto", ",", "takevideo", ",", "recordaudio", ",", "getsentsms", "and", "uploadpictures", "are", "focused", "on", "espionage", "activities", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "pro-democracy", "reform", "took", "place", "in", "2011", "which", "has", "helped", "the", "government", "create", "an", "atmopshere", "conducive", "to", "investor", "interest." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Backdoor.Turla.B5", "BKDR64_TURLA.NUS", "Trojan.Turla", "BKDR64_TURLA.NUS", "Win64.Rootkit.Uroburos.A", "Backdoor.Win64.Turla.c", "Trojan.Win64.Turla.dflvhj", "BackDoor.Turla.17", "Trojan.Turla.Win64.1", "BDS/Turla.fech", "Backdoor.Win64.Turla.c", "Backdoor:Win64/Turla.B!dha", "Trojan/Win64.Turla.C560438", "Backdoor.Turla", "Trj/CI.A", "Win64/Turla.A", "Win32.Trojan.Url.Fdjm", "Trojan.Turla!2u6AW7YKCfw" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "So", "far", "we", "have", "identified", "the", "following", "behaviors", ":", "Sending", "device", "information", "to", "a", "remote", "command", "and", "control", "(", "C2", ")", "server", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Figure", "6", "." ]
[ 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Japik.6", "TROJ_IKYTOK.SMI", "Win32.Trojan.WisdomEyes.16070401.9500.9979", "Trojan.Ransomlock", "TROJ_IKYTOK.SMI", "Trojan.Packed.2232", "Trojan.Kryptik.Win32.166130", "BehavesLike.Win32.VTFlooder.fc", "Trojan-Downloader.Win32.Karagany", "TrojanDropper.Mudrop.cmh", "TrojanDropper:Win32/Sinmis.B", "Trojan/Win32.Menti.R9584", "BScope.Malware-Cryptor.Tip" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Dynamer.S23079", "Win32.Trojan.Kryptik.bil", "Win.Malware.Zusy-5689799-0", "Trojan.Inject2.38898", "Trojan.Kryptik.Win32.992532", "BehavesLike.Win32.PWSZbot.cm", "Trojan.Win32.Extenbro", "Backdoor.Androm.mnb", "TR/Crypt.ZPACK.pwvcr", "Trojan.Symmi.D10FCD", "Trojan/Win32.Androm.R192120" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "PDF/Phish.ECM", "Win32.Exploit.Pidief.Aexw", "PDF/Phish.ECM", "EXP/Pidief.EB.494", "Exp.Pidief.Eb!c", "Trojan.PDF.Phishing", "Win32/Trojan.Exploit.ec6" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "'ve", "seen", "that", "this", "has", "been", "the", "case", "for", "many", "years", "with", "spear-phishing", "campaigns", "on", "desktop", "and", "mobile", "platforms", ",", "so", ",", "unfortunately", ",", "it", "does", "n't", "seem", "that", "this", "will", "change", "any", "time", "soon", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "HenBox", "checks", "whether", "this", "execution", "is", "its", "first", "by", "using", "Android", "’", "s", "shared", "preferences", "feature", "to", "persist", "XML", "key-value", "pair", "data", "." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "MESSAGE", "–", "send", "SMS", "containing", "specified", "text", "to", "a", "specified", "number", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "HackTool.TSGrinder", "Trojan/Hacktool.TSGrinder.a", "W32/Tool.JPZP-4469", "Crackin.0AC64262", "HackTool.Win32.TSGrinder.a", "Trojan.Win32.TSGrinder.scgl", "HackTool.TSGrinder.192570", "Hacktool.W32.Tsgrinder!c", "ApplicUnsaf.Win32.HackTool.TSGrinder.a", "Tool.TSGrinder", "W32/VirTool.AYV", "W32.Hack.Tool", "HackTool/Win32.TSGrinder", "HackTool.Win32.TSGrinder.a", "HackTool:Win32/Tsgrinder.A", "Win32.Hacktool.Tsgrinder.Stkm", "HackTool.TSGrinder!LpD0k7ExEpE", "HackTool.Win32.TSGrinder.a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Every", "once", "in", "a", "while", ",", "authors", "leave", "behind", "a", "trace", "that", "allows", "us", "to", "attribute", "not", "only", "similar", "apps", ",", "but", "also", "multiple", "different", "PHA", "families", "to", "the", "same", "group", "or", "person", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "TrojanDownloader.Lorozoad.A3", "Trojan.Razy.D2614", "Win32.Trojan.WisdomEyes.16070401.9500.9997", "Win.Trojan.Lorozoad-1", "Trojan.MSIL.Disfa.mcnf", "Trojan.Win32.Tiny.etgbky", "Trojan.Win32.Z.Razy.4608.CD", "Troj.Msil.Disfa!c", "TrojWare.MSIL.TrojanDownloader.Tiny.MXA", "BehavesLike.Win32.Trojan.xz", "TR/Dropper.MSIL.nsnpx", "Trojan.MSIL.Disfa.mcnf", "Trj/GdSda.A", "Msil.Trojan.Disfa.Pctb", "Trojan.Disfa!3Wzl0Mq4C1c", "Trojan-Downloader.MSIL.Tiny", "MSIL/Tiny.MX!tr.dldr", "Win32/Trojan.85b" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32.DownloadPdzLnrA.Trojan", "Worm.Win32.WBNA!O", "W32/WBNA.asj", "Win32.Trojan.WisdomEyes.16070401.9500.9988", "Win.Trojan.Wbna-299", "Worm.WBNA.Win32.2209", "BehavesLike.Win32.VBObfus.qt", "W32/VB.PID!tr.dldr", "Worm/Win32.WBNA", "Worm.WBNA", "Win32/TrojanDownloader.VB.PID", "Trojan-Downloader.Win32.VB", "Win32/Trojan.c6e" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "W32/Trojan.LNJS-3256", "Trojan.Win32.Mazel.dsuwke", "BehavesLike.Win32.Sytro.lc", "TR/AD.Lentrigy.ejnsf", "RiskWare[Downloader]/NSIS.Mazel", "Trojan.Jaiko.851", "TrojanDownloader:Win32/Rolkator.A", "Trj/CI.A", "Trojan.Win32.IRCBot", "Win32/Trojan.698" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "We", "have", "not", "identified", "any", "other", "public", "names", "for", "this", "malware,", "so", "rather", "than", "introduce", "a", "new", "name", "to", "the", "industry", "we'll", "refer", "to", "this", "family", "as", "Sarvdap." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16, 16, 16, 16, 3, 16, 3 ]
[ "Notification", "handling", "method", "The", "class", "is", "only", "implemented", "in", "debug", "mode", ",", "pushing", "all", "captured", "information", "into", "the", "log", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "information", "may", "be", "useful", "to", "any", "incident", "responder", "or", "blue", "team", "looking", "to", "defend", "an", "organisation." ]
[ 16, 16, 16, 16, 16, 16, 16, 4, 12, 16, 4, 12, 16, 16, 16, 16, 16 ]
[ "In", "addition", ",", "at", "this", "stage", "the", "app", "can", "process", "one", "of", "these", "commands", ":", "β€’", "Collect", "device", "info", "β€’", "Install", "app", "β€’", "Is", "online", "?", "β€’", "Change", "server", "domain", "Out", "of", "these", ",", "the", "most", "interesting", "command", "is", "the", "β€œ", "install", "app", "”", "command", "that", "downloads", "an", "encrypted", "zip", "file", "containing", "the", "second", "phase", "dex", "file", ",", "unpacks", "and", "loads", "it", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "String", "Resources", "Used", "to", "Store", "App", "Data", "Red", "Alert", "2.0", "stores", "its", "data", "in", "an", "atypical", "location", "(", "inside", "the", "Strings.xml", "file", "embedded", "in", "the", "app", ")", "to", "fetch", "its", "critical", "data", ",", "such", "as", "the", "C2", "address", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Infostealer.Banprox.B", "is", "a", "Trojan", "horse", "that", "may", "steal", "information", "from", "the", "compromised", "computer." ]
[ 1, 16, 16, 3, 11, 16, 16, 1, 9, 16, 16, 5, 13 ]
[ "The", "incident", "used", "a", "Microsoft", "Excel", "file", "containing", "malicious", "macros", "which", "wrote", "a", "malicious", "executable", "and", "associated", "files", "to", "the", "victim", "machine." ]
[ 16, 16, 16, 1, 9, 9, 9, 16, 3, 11, 16, 16, 16, 3, 11, 16, 1, 9, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Ransom.Locky.20", "Win32.Trojan.WisdomEyes.16070401.9500.9879", "Ransom_Falock.R002C0DAI18", "Trojan.Win32.Z.Ransom.1819072", "Ransom_Falock.R002C0DAI18", "BehavesLike.Win32.Trojan.th", "W32/Trojan.CXBD-0386", "Ransom:MSIL/Falock.A", "Trj/GdSda.A", "Trojan.MSIL.Crypt", "Win32/Trojan.Ransom.d73" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "In", "addition,", "unlike", "many", "cyber", "attacks,", "an", "actual", "physical", "person", "was", "present", "money", "mule", "to", "pick", "up", "the", "money", "from", "affected", "ATM", "machines." ]
[ 16, 16, 16, 16, 1, 9, 16, 16, 16, 16, 16, 16, 3, 11, 16, 16, 16, 16, 16, 16, 16, 5, 13 ]
[ "EventBot", "C2", "URLs", "C2", "URLs", "and", "other", "settings", "in", "a", "nested", "class", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Trojan", "details", "Upon", "boot", ",", "the", "trojan", "will", "start", "by", "populating", "a", "shared", "preferences", "file", "with", "the", "configuration", "it", "has", "on", "its", "internal", "structures", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Spammer.Mail.Norin.A", "Trojan/W32.Spammer.606720", "Email-Flooder.W32.Norin.30!c", "TROJ_NORIN.30", "Hacktool.Spammer", "TROJ_NORIN.30", "Trojan.Spammer.Mail.Norin.A", "Email-Flooder.Win32.Norin.30", "Trojan.Spammer.Mail.Norin.A", "Trojan.Win32.Norin.dkrt", "Spyware.Email-Flooder.Norin.606720", "Trojan.Spammer.Mail.Norin.A", "Win32.Spammer.Mail.Norin.30", "Trojan.Spammer.Mail.Norin.A", "Trojan.PWS.Wmhack", "Tool.Norin.Win32.1", "Virus.Win32.Spammer", "W32/Risk.SGYO-3478", "Spammer.Mail.Norin.30", "TR/Flood.Norin.30", "HackTool[Flooder]/Win32.Norin", "Win32.Hack.Norin.kcloud", "Trojan.Spammer.Mail.Norin.A", "Email-Flooder.Win32.Norin.30", "Trojan.Spammer.Mail.Norin.A", "EmailFlooder.Norin", "Win32/Spammer.Mail.Norin.30", "Win32.Virus.Spammer.Syhs", "Flooder.Norin!cC98wqxpE9A", "W32/Spam_Norin.30!tr", "Win32/Trojan.Flooder.81a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "This", "attack", "might", "also", "originate", "from", "China." ]
[ 16, 1, 16, 16, 16, 16, 2 ]
[ "A", "backdoor", "also", "known", "as:", "W32.HfsAutoB.186B", "Worm.Dorkbot.A", "Backdoor.W32.Padodor.kZnr", "Trojan/Spy.qukart", "Win32.Trojan-Spy.Quart.a", "Backdoor.Berbew!g1", "Win32/Webber.W", "Win32.Qukart", "BKDR_BERBEW.SMA", "Win.Trojan.Crypted-36", "Trojan-Proxy.Win32.Qukart.vjh", "Trojan.Win32.Qukart.etuxeg", "Worm.Win32.Qukart.K", "BackDoor.HangUp.43784", "BKDR_BERBEW.SMA", "BehavesLike.Win32.Backdoor.cc", "Trojan.Win32.Senta", "TrojanProxy.Qukart.tsk", "Trojan-Proxy.Win32.Qukart.vjh", "Win-Trojan/Berbew.51712", "TrojanProxy.Qukart", "Trojan-Ransom.Win32.Pornoasset.a" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "]", "download", "." ]
[ 9, 9, 16 ]
[ "A", "backdoor", "also", "known", "as:", "W32.FamVT.ExpiroPC.PE", "Heur.Corrupt.PE", "Tool.BtcMine.30", "Backdoor.Win32.Cycbot" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1 ]
[ "Equipped", "reverse", "shell", "payload", "with", "specific", "string", "After", "an", "in-depth", "look", ",", "we", "found", "that", "some", "versions", "of", "the", "reverse", "shell", "payload", "code", "share", "similarities", "with", "PRISM", "–", "a", "stealth", "reverse", "shell", "backdoor", "that", "is", "available", "on", "Github", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 16 ]
[ "The", "server", "’", "s", "response", "is", "a", "json", ",", "containing", "a", "link", "to", "a", ".jar", "file", ",", "class", "name", "and", "method", "name", "to", "be", "executed", "with", "reflection", "API", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "Using", "this", "SSH", "brute-forcing", "network,", "it", "took", "the", "attackers", "only", "a", "few", "days", "to", "gain", "root", "access", "and", "full", "control", "of", "the", "targeted", "server." ]
[ 16, 16, 1, 9, 9, 16, 16, 16, 6, 16, 16, 16, 16, 16, 1, 9, 9, 9, 9, 9, 16, 16, 5, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan/Cosmu.ajmd", "Trojan.Win32.Cosmu.cptjv", "Trojan.Win32.Cosmu.ajmd", "Win32.HLLW.Zebra.2", "TR/PSW.Facepass.oina", "Trojan/Cosmu.fqh", "PWS:Win32/Facepass.B", "Trojan.Win32.A.Cosmu.436714", "Trojan.Cosmu", "W32/Cosmu.AJMD!tr", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "When", "we", "first", "discovered", "the", "OilRig", "attack", "campaign", "in", "May", "2016,", "we", "believed", "at", "the", "time", "it", "was", "a", "unique", "attack", "campaign", "likely", "operated", "by", "a", "known,", "existing", "threat", "group." ]
[ 16, 16, 16, 16, 6, 14, 14, 14, 16, 0, 8, 16, 16, 16, 16, 16, 16, 16, 16, 6, 14, 14, 16, 16, 16, 16, 16, 16, 6, 14 ]
[ "An", "attacker", "is", "paid", "by", "the", "network", "when", "one", "of", "these", "apps", "is", "installed", "successfully", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "To", "date", ",", "Unit", "42", "has", "seen", "four", "of", "the", "seven", "(", "the", "first", "three", "in", "the", "list", "below", ",", "along", "with", "cdncool", "[", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 1, 9, 9 ]
[ "Sundown", "is", "something", "of", "an", "outlier", "from", "typical", "exploit", "kits." ]
[ 3, 16, 16, 16, 16, 16, 16, 16, 3, 11 ]
[ "The", "failure", "of", "Silicon", "Valley", "Bank", "SVB", "is", "a", "good", "opportunity", "for", "scammers", "to", "make", "a", "buck", "out", "of", "the", "crisis,", "warns", "the", "SANSβ„’", "Internet", "Storm", "Center", "ISS", "in", "Washington", "DC." ]
[ 16, 16, 16, 4, 12, 12, 12, 16, 16, 16, 16, 16, 1, 16, 16, 16, 16, 16, 16, 16, 16, 16, 4, 12, 12, 12, 12, 12, 16, 2, 10 ]
[ "We", "have", "examined", "all", "the", "detected", "versions", ",", "including", "the", "latest", "one", "that", "is", "signed", "by", "a", "certificate", "valid", "from", "September", "14", ",", "2017", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "For", "example,", "one", "version", "of", "the", "Shade", "cryptor", "checks", "victim", "computers", "for", "signs", "of", "accounting", "activity;", "if", "it", "finds", "any,", "it", "doesn't", "encrypt", "the", "files,", "but", "instead", "installs", "remote", "control", "tools", "in", "the", "infected", "system." ]
[ 16, 16, 3, 11, 16, 16, 3, 11, 16, 5, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 11, 11, 16, 16, 5, 13 ]
[ "This", "post", "intends", "to", "share", "the", "results", "of", "our", "research." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan-Spy/W32.KeyLogger.464896.C", "TrojanSpy.KeyLogger!s9RPvqhksKk", "Infostealer.Gampass", "Win32.BDSBackdoor", "Trojan-Spy.Win32.KeyLogger.gds", "BackDoor.Cyber", "Virus.Win32.Delf.DTW!IK", "TrojanSpy.KeyLogger.cquv", "Win-Trojan/Keylogger.464896.G", "Trojan.Win32.Scar.cmim", "Trojan-PSW.Gampass", "Virus.Win32.Delf.DTW", "W32/KeyLogger.GDS!tr", "PSW.Keylog.AE", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "All", "that", "is", "needed", "is", "to", "get", "the", "original", "size", "of", "the", "DEX", "file", "and", "read", "everything", "that", "comes", "after", "this", "offset", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "The", "appearance", "of", "such", "forms", "is", "generated", "on", "cybercriminals'", "command." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 6, 16 ]
[ "Recommendations", "Popular", "mobile", "platforms", "like", "Android", "are", "common", "targets", "for", "organized", "or", "commercialized", "monitoring", "operations", "." ]
[ 16, 16, 16, 16, 16, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "CVE-2017-11882", "Exploit", "8b212ee2d65c4da033c39aebaf59cc51ade45f32f4d91d1daa0bd367889f934d", "is", "a", "Microsoft", "Word", "RTF", "document", "that", "exploits", "`CVE-2017-11882`", "stack", "buffer", "overflow", "vulnerability", "in", "the", "Microsoft", "Equation", "Editor`EQNEDT32.EXE`." ]
[ 1, 7, 1, 16, 16, 1, 9, 9, 9, 16, 7, 1, 7, 15, 15, 15, 16, 5, 13, 13, 13 ]
[ "This", "IOC", "contains", "indicators", "for", "the", "BLACKCOFFEE", "malware", "family", "that", "is", "attributed", "to", "APT17." ]
[ 16, 16, 16, 16, 16, 16, 3, 11, 16, 15, 16, 16, 16, 6 ]
[ "More", "apps", "could", "be", "added", "to", "the", "grabber", "target", "list", "in", "the", "future", ",", "such", "as", "the", "ones", "that", "were", "targeted", "in", "older", "versions", ":", "Facebook", "WhatsApp", "Skype", "Twitter", "Chrome", "Instagram", "Snapchat", "Viber", "The", "following", "screenshot", "shows", "the", "generic", "card", "grabber", "overlay", "screen", ":", "Ginp", "generic", "grabber", "The", "current", "active", "target", "list", "is", "available", "in", "the", "appendix", ",", "containing", "a", "total", "of", "24", "unique", "targets", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 5, 5, 5, 5, 5, 5, 5, 5, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "]", "102", "2020-03-29", "http", ":", "//ora.blindsidefantasy", "[", "." ]
[ 9, 9, 16, 1, 9, 9, 9, 9 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Neloweg", "TR/Drop.Elms.A", "PWS:Win32/Reder.B", "Trojan.Neloweg", "Trj/CI.A" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Inject.cvmjon", "Trojan.Taidoor", "TROJ_DROPPE.FS", "Trojan-Dropper.Win32.Injector.jmli", "Virus.Win32.Part.a", "TROJ_DROPPE.FS", "BehavesLike.Win32.Downloader.qm", "TrojanDropper.Injector.bmtq", "Trojan[Dropper]/Win32.Injector", "Win32.Troj.Injector.JM.kcloud", "Dropper/Win32.Injector", "TrojanDropper.Injector", "W32/Injector.JMLI!tr", "Trojan.Win32.Injector.aJX" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "So", "we", "don't", "have", "a", "sensational", "hop", "from", "Linux", "Mirai", "to", "Windows", "Mirai", "just", "yet,", "that's", "just", "a", "silly", "statement." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 5, 3, 16, 5, 3, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "Trojan", "for", "Linux", "written", "in", "Go", "programming", "language." ]
[ 16, 3, 11, 5, 16, 16, 5, 13, 13 ]
[ "A", "backdoor", "also", "known", "as:", "Win32.Trojan.WisdomEyes.16070401.9500.9999", "W32/Dropper.ALCD", "Win32/Rimecud.CU", "TROJ_DROPPR.SMF", "Win32.Worm.Peerfrag.Aojj", "Win32.HLLW.Lime.18", "Worm.Palevo.Win32.18245", "TROJ_DROPPR.SMF", "BehavesLike.Win32.Madangel.cc", "W32/Risk.KNKR-8810", "Trojan.Zusy.D421A9", "Win32/Peerfrag.DI", "P2P-Worm.Win32.Palevo" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Figure", "10", "." ]
[ 16, 16, 16 ]
[ "(", "We", "named", "the", "spyware", "\"", "Exodus", "''", "after", "this", "Command", "&", "Control", "domain", "name", "." ]
[ 16, 13, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "This", "variant,", "which", "we", "call", "MULTIGRAIN", "consists", "largely", "of", "a", "subset", "of", "slightly", "modified", "code", "from", "NewPosThings." ]
[ 16, 3, 16, 16, 16, 3, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 3 ]
[ "Whether", "this", "is", "a", "permanent", "return", "to", "locky", "or", "a", "one", "off,", "I", "don't", "know", "at", "this", "stage,", "but", "Locky", "have", "vanished", "for", "while", "before", "returned." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "It", "may", "even", "allow", "them", "to", "sell", "ad", "space", "directly", "to", "application", "developers", "." ]
[ 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.SamDump.emgukv", "Uds.Dangerousobject.Multi!c", "Tool.SamDump.Win32.1", "W32/Trojan.PXMQ-2326", "TR/Rogue.9140774", "PUP/Win32.SamDump.C241237", "Riskware.HackTool!GhRtS0e2yEc", "Win32/Trojan.f29" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "A", "backdoor", "also", "known", "as:", "Trojan.Win32.Dwn.ewbodt", "Trojan.Win32.Z.Starter.4103380", "Trojan.DownLoader26.1573", "BehavesLike.Win32.Dropper.wc", "Trojan.Win32.Chifrax", "W32/Trojan.BMGR-3693", "Exploit:Win32/CplLnk.B", "Win32/Trojan.9b2" ]
[ 16, 3, 16, 16, 16, 1, 1, 1, 1, 1, 1, 1, 1 ]
[ "Because", "of", "the", "recent", "outbreak", "of", "the", "Locky", "ransomware,", "Dridex", "has", "become", "synonymous", "with", "the", "distribution", "of", "ransomware", "more", "generally." ]
[ 16, 16, 16, 16, 16, 16, 16, 3, 11, 6, 16, 16, 16, 16, 16, 16, 16, 3, 16, 16 ]
[ "]", "databit", "[", "." ]
[ 9, 9, 9, 9 ]
[ "PhotoMiner", "features", "a", "unique", "infection", "mechanism,", "reaching", "endpoints", "by", "infecting", "websites", "hosted", "on", "FTP", "servers", "while", "making", "money", "by", "mining", "Monero." ]
[ 3, 16, 16, 1, 9, 9, 9, 9, 9, 9, 9, 9, 16, 5, 13, 16, 16, 16, 16, 1, 9 ]