tokens
sequencelengths 2
296
| ner_tags
sequencelengths 2
296
|
---|---|
[
"This",
"ransomware",
"family",
"β",
"s",
"long",
"history",
"tells",
"us",
"that",
"its",
"evolution",
"is",
"far",
"from",
"over",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dropper.GreenStuff.1.7",
"Win32.Trojan.WisdomEyes.16070401.9500.9688",
"Trojan.Dropper",
"Win32/Pasorot.D",
"Win.Trojan.Greenstuff-3",
"Trojan.Dropper.GreenStuff.1.7",
"Trojan-Dropper.Win32.GreenStuff.17",
"Trojan.Dropper.GreenStuff.1.7",
"Troj.Dropper.W32.GreenStuff.17!c",
"Win32.Trojan-dropper.Greenstuff.Ebgv",
"Trojan.Dropper.GreenStuff.1.7",
"TrojWare.Win32.TrojanDropper.GreenStuff.17",
"Trojan.Dropper.GreenStuff.1.7",
"Trojan.MulDrop.365",
"Dropper.GreenStuff.Win32.14",
"BehavesLike.Win32.Trojan.dc",
"W32/Trojan.KLUP-2808",
"TrojanDropper.Exebinder",
"TR/Pasorot.g",
"Trojan[PSW]/Win32.Pasorot",
"Trojan.Dropper.GreenStuff.1.7",
"Trojan-Dropper.Win32.GreenStuff.17",
"TrojanDropper:Win32/GreenStuff.1_7",
"Trojan/Win32.Downloader.C112567",
"TScope.Malware-Cryptor.SB",
"Trj/Dropper.WF",
"Win32/TrojanDropper.GreenStuff.17",
"W32/GreenSt.B!tr.dr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"MemScan:Trojan.Downloader.Modgof.A",
"MemScan:Trojan.Downloader.Modgof.A",
"Trojan.Scar.daok",
"Trojan.Win32.Scar.tlmwj",
"TROJ_AZAH.A",
"Trojan.Win32.Scar.daok",
"MemScan:Trojan.Downloader.Modgof.A",
"Trojan.Scar!ZI1ghG8RGXc",
"MemScan:Trojan.Downloader.Modgof.A",
"Trojan.MulDrop1.43719",
"TROJ_AZAH.A",
"Win32.Troj.Scar.kcloud",
"Trojan.Win32.A.Downloader.120320.DL",
"MemScan:Trojan.Downloader.Modgof.A",
"Worm.Win32.FakeFolder.b",
"W32/AZAH.A!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"The",
"first",
"function",
"is",
"used",
"for",
"contact",
"information",
"stealing",
":",
"the",
"function",
"upCon",
"steals",
"all",
"contacts",
"in",
"the",
"contact",
"list",
"and",
"their",
"information",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.FakeGina.X",
"Trojan.Fakegina",
"Trojan.FakeGina.X",
"Trojan/FakeGina.b",
"TROJ_FAKEGINA.AA",
"Win32.Trojan.FakeGina.b",
"W32/Risk.LOJP-2889",
"Trojan.Fakegina",
"TROJ_FAKEGINA.AA",
"Trojan.FakeGina.X",
"Trojan.FakeGina.X",
"Trojan.FakeGina.X",
"TrojWare.Win32.FakeGina.~B",
"Trojan.FakeGina.X",
"Trojan.FakeGina.Win32.121",
"Trojan.Win32.FakeGina",
"W32/MalwareF.NCOX",
"Trojan/Win32.FakeGina",
"Trojan.FakeGina.X",
"Trojan:Win32/Fakegina.T",
"Trojan/Win32.FakeGina.R77324",
"Win32/FakeGina.B",
"Win32.Trojan.Fakegina.Wmst",
"W32/FakeGina.AA!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"While",
"doing",
"so",
",",
"it",
"will",
"reach",
"a",
"service",
"exported",
"by",
"β",
"Agent",
"Smith",
"β",
",",
"and",
"sends",
"out",
"an",
"authentication",
"request",
"that",
"would",
"lead",
"to",
"a",
"call",
"to",
"the",
"β",
"addAccount",
"β",
"method",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"campaign",
"targeted",
"Japanese",
"organizations",
"by",
"using",
"at",
"least",
"two",
"legitimate",
"Japanese",
"websites",
"to",
"host",
"a",
"strategic",
"web",
"compromise",
"SWC,",
"where",
"victims",
"ultimately",
"downloaded",
"a",
"variant",
"of",
"the",
"SOGU",
"malware."
] | [
16,
3,
16,
4,
12,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
1,
9,
9,
9,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"It",
"connects",
"to",
"a",
"certain",
"URL,",
"likely",
"controlled",
"by",
"the",
"attacker,",
"using",
"a",
"specific",
"Go",
"user-agent:"
] | [
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
1,
16,
16,
16,
5,
13
] |
[
"The",
"first",
"phase",
"is",
"receiving",
"malspam",
"from",
"a",
"botnet."
] | [
16,
16,
16,
16,
16,
1,
16,
16,
3
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Graftor.D49E51",
"W32/Trojan.ULWD-7621",
"Trojan.Win32.Drop.elkhrw",
"BehavesLike.Win32.Sivis.kh",
"Trojan-Dropper.Win32.Rubat",
"W32/Win.G",
"Trojan.SchoolGirl.er",
"TR/Drop.Rubat.qlzld",
"TrojanDropper:Win32/Rubat.A!bit",
"Trojan.SchoolGirl"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Unfortunately",
",",
"for",
"now",
"we",
"can",
"β",
"t",
"say",
"in",
"what",
"environment",
"these",
"landing",
"pages",
"were",
"used",
"in",
"the",
"wild",
",",
"but",
"according",
"to",
"all",
"the",
"information",
"at",
"our",
"dsiposal",
",",
"we",
"can",
"assume",
"that",
"they",
"are",
"perfect",
"for",
"exploitation",
"using",
"malicious",
"redirects",
"or",
"man-in-the-middle",
"attacks",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"If",
"the",
"threat",
"reappears",
"on",
"the",
"device",
"after",
"the",
"first",
"installation",
",",
"it",
"means",
"that",
"the",
"malware",
"managed",
"to",
"install",
"the",
"persistency",
"module",
"in",
"the",
"System",
"directory",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.CominateU.Adware",
"Trojan-GameThief.Win32.OnLineGames!O",
"TrojanGameThief.OnLineGames",
"Trojan.OnLineGames.Win32.78851",
"Trojan/OnLineGames.boaj",
"Trojan.Zusy.Elzob.D484",
"W32/Risk.ADYI-1535",
"TSPY_ONLIN.SMUM",
"Win.Spyware.82985-2",
"Trojan-GameThief.Win32.OnLineGames.boaj",
"Trojan.Win32.OnLineGames.cptyo",
"BackDoor.Sturf.170",
"TSPY_ONLIN.SMUM",
"W32/MalwareF.AEIUQ",
"Trojan/PSW.OnLineGames.cedq",
"TR/Spy.671314",
"Trojan[GameThief]/Win32.OnLineGames",
"Trojan-GameThief.Win32.OnLineGames.boaj",
"Trojan/Win32.OnlineGameHack.R11892",
"TrojanPSW.OnLineGames.bo",
"Win32/PSW.OnLineGames.QDP",
"Trojan.PWS.OnLineGames!mLCnhslfoqM",
"Trojan-GameThief.Win32.OnLineGames",
"W32/Onlinegames.BOJI!tr.pws"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/W32.Timer.55808.B",
"Trojan-Ransom.Win32.Timer!O",
"Trojan/Kryptik.sot",
"Trojan.Boigy.4",
"TROJ_RANSOM.SMMJ",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"Win32/Ransom.GED",
"TROJ_RANSOM.SMMJ",
"Trojan-Ransom.Win32.Timer.icg",
"Trojan.Win32.Timer.dqvge",
"Trojan.Win32.A.Timer.55808",
"Trojan.Winlock.4005",
"Trojan/Timer.cnd",
"TR/Ramson.TR",
"TrojanDropper:Win32/Dinome.A",
"Trojan-Ransom.Win32.Timer.icg",
"Trojan/Win32.Ransomlock.R11433",
"BScope.Trojan.Winlock.01505",
"Trj/Hexas.HEU",
"Trojan-Downloader.Win32.Karagany"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Given",
"previous",
"operational",
"security",
"errors",
"from",
"this",
"actor",
"in",
"the",
"past",
"which",
"resulted",
"in",
"exfiltrated",
"content",
"being",
"publicly",
"accessible",
"Lookout",
"Threat",
"Intelligence",
"is",
"continuing",
"to",
"map",
"out",
"infrastructure",
"and",
"closely",
"monitor",
"their",
"continued",
"evolution",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"makes",
"the",
"taking",
"down",
"and",
"recovery",
"of",
"the",
"network",
"much",
"harder",
"and",
"poses",
"a",
"considerable",
"challenge",
"for",
"defenders",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"nampriknum",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"Aside",
"from",
"the",
"natural",
"value",
"of",
"phone",
"numbers",
"associated",
"with",
"the",
"names",
"of",
"their",
"owners",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Ransom/W32.Foreign.409600.C",
"Trojan.Foreign",
"Ransom_Foreign.R002C0DB418",
"Trojan-Ransom.Win32.Foreign.nxzy",
"Trojan.Win32.Spambot.exqsne",
"Trojan.Win32.Z.Trubsil.409600",
"Troj.Ransom.W32.Foreign!c",
"Trojan.Spambot.15075",
"Ransom_Foreign.R002C0DB418",
"BehavesLike.Win32.Ransom.gc",
"TR/Crypt.ZPACK.lpngp",
"Backdoor:Win32/Trubsil.C",
"Trojan-Ransom.Win32.Foreign.nxzy",
"Trojan/Win32.Foreign.C2394896",
"TrojanRansom.Foreign",
"Trj/GdSda.A",
"W32/Kryptik.FRKA!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Due",
"to",
"the",
"specific",
"nature",
"of",
"its",
"activity",
",",
"Perkele",
"is",
"distributed",
"in",
"a",
"rather",
"unusual",
"way",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"link",
"points",
"to",
"a",
"web",
"page",
"with",
"a",
"similar",
"sentence",
"and",
"a",
"button",
"for",
"downloading",
"the",
"APK",
"file",
"of",
"the",
"Trojan",
"to",
"the",
"device",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DakusarDRAX.Trojan",
"Trojan.Floxif",
"Win32.Trojan.WisdomEyes.16070401.9500.9948",
"Win32/Flofix.D",
"TROJ_FLOXIF_EK040354.UVPM",
"Trojan.Win32.Floxif.cqjmcu",
"Win32.FloodFix",
"Trojan.Floxif.Win32.2",
"TROJ_FLOXIF_EK040354.UVPM",
"TR/Spy.69337",
"Trojan:Win32/Floxif.E",
"Virus/Win32.Fixflo.R204310",
"Trojan.Sly",
"Win32/Floxif.E",
"W32/Floxif.E"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"com",
"Malicious",
"Twitter",
"accounts",
":",
"https",
":",
"//twitter.com/lucky88755",
"https",
":",
"//twitter.com/lucky98745",
"https",
":",
"//twitter.com/lucky876543",
"https",
":",
"//twitter.com/luckyone1232",
"https",
":",
"//twitter.com/sadwqewqeqw",
"https",
":",
"//twitter.com/gyugyu87418490",
"https",
":",
"//twitter.com/fdgoer343",
"https",
":",
"//twitter.com/sdfghuio342",
"https",
":",
"//twitter.com/asdqweqweqeqw",
"https",
":",
"//twitter.com/ukenivor3",
"Malicious",
"Instagram",
"account",
":",
"https",
":",
"//www.instagram.com/freedomguidepeople1830/",
"Malicious",
"Tumblr",
"accounts",
":",
"https",
":",
"//mainsheetgyam.tumblr.com/",
"https",
":",
"//hormonaljgrj.tumblr.com/",
"https",
":",
"//globalanab.tumblr.com/",
"C",
"&",
"C",
"addresses",
":",
"104",
"[",
"."
] | [
9,
9,
16,
4,
16,
16,
1,
9,
9,
1,
9,
9,
1,
9,
9,
1,
9,
9,
1,
9,
9,
1,
9,
9,
1,
9,
9,
1,
9,
9,
1,
9,
9,
1,
9,
9,
16,
4,
16,
16,
1,
9,
9,
16,
4,
16,
16,
1,
9,
9,
1,
9,
9,
1,
9,
9,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"Unit",
"42",
"discovered",
"new",
"activity",
"that",
"appears",
"related",
"to",
"an",
"adversary",
"group",
"previously",
"called",
"C0d0so0",
"or",
"Codoso"
] | [
4,
12,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
16,
16,
6,
16,
6
] |
[
"As",
"a",
"result",
",",
"no",
"new",
"instances",
"of",
"this",
"app",
"can",
"be",
"installed",
"on",
"iOS",
"devices",
"and",
"existing",
"installations",
"can",
"no",
"longer",
"be",
"run",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"We",
"have",
"observed",
"download",
"attempts",
"from",
"the",
"following",
"domains:"
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"In",
"2022,",
"they",
"updated",
"SysUpdate,",
"one",
"of",
"their",
"custom",
"malware",
"families,",
"to",
"include",
"new",
"features",
"and",
"add",
"malware",
"infection",
"support",
"for",
"the",
"Linux",
"platform."
] | [
16,
0,
16,
16,
3,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HW32.Packed.3797",
"JS.Nemucod.LK",
"VBS/DropExe.A!Camelot",
"Trojan.Script.MLW.eafugn",
"VBS.Dropper.102",
"TrojanDropper.VBS.aq",
"TrojanDropper:VBS/Twexag.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"East",
"Asian",
"government",
"agencies",
"came",
"under",
"siege",
"when",
"attackers",
"targeted",
"several",
"servers",
"within",
"their",
"networks."
] | [
4,
12,
12,
12,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5
] |
[
"Similar",
"to",
"other",
"malware",
"seen",
"in",
"the",
"past",
",",
"Charger",
"checks",
"the",
"local",
"settings",
"of",
"the",
"device",
"and",
"does",
"not",
"run",
"its",
"malicious",
"logic",
"if",
"the",
"device",
"is",
"located",
"in",
"Ukraine",
",",
"Russia",
",",
"or",
"Belarus",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/AutoRun.autv",
"W32/Sohanad.G",
"WORM_SOHANAD.DX",
"Virus.Worm.AutoRun!IK",
"Win32.HLLW.Autoruner.8327",
"WORM_SOHANAD.DX",
"W32/Sohanad.G",
"Worm/AutoRun.mky",
"Malware.Imaut",
"Virus.Worm.AutoRun",
"SHeur.CIAA",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.RansomKD.6014218",
"Ransom.Chicrypt",
"Ransom.Chimera",
"Trojan/Kryptik.edes",
"Trojan.RansomKD.D5BC50A",
"Ransom_Chicrypt.R002C0DIL17",
"W32/Ransom.IF",
"Trojan-Ransom.Win32.Chimera.q",
"Trojan.RansomKD.6014218",
"Trojan.Win32.Encoder.esuyoq",
"Troj.Ransom.W32!c",
"Win32.Trojan.Chimera.Edei",
"Trojan.RansomKD.6014218",
"Trojan.RansomKD.6014218",
"Trojan.Encoder.2774",
"W32/Ransom.KXVS-1328",
"W32.Ransom.Chimera",
"Trojan[Ransom]/Win32.Chimera",
"Ransom:Win32/Chicrypt.A",
"Trojan.Win32.Z.Ransom.647242",
"Trojan-Ransom.Win32.Chimera.q",
"Win32.Trojan-Ransom.Chimera.D",
"Trojan/Win32.Chimera.C1182585",
"Trojan.RansomKD.6014218",
"Hoax.Chimera",
"Trojan.Kryptik!1o3s7Z7mkiE",
"W32/Chimera.EDES!tr",
"Win32/Trojan.37c"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.ClickerAybn.Trojan",
"Trojan-Spy.Win32.VB!O",
"Trojan.Puzlice.A3",
"Win32.Trojan-Clicker.VB.c",
"Win32/TrojanClicker.VB.NUE",
"Win.Trojan.7640471-1",
"Worm.Win32.Autorun.gxay",
"Trojan.Win32.VB2.cnioik",
"Trojan.Win32.A.VB.55040",
"W32.Virut.lQTU",
"TrojWare.Win32.Spy.VB.FRG",
"Trojan.VbCrypt.68",
"Trojan.VB.Win32.83289",
"BehavesLike.Win32.Malware.nc",
"Virus.Win32.Virut",
"TrojanSpy.VB.cxx",
"Trojan[Spy]/Win32.VB",
"Worm.Win32.Autorun.gxay",
"Trojan:Win32/Puzlice.A",
"Win32/VB.BXL",
"TScope.Trojan.VB",
"Trojan.Vilsel",
"TrojanSpy.VB!jmRymi1V2Tw",
"W32/VBClicker.NUE!tr"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Some",
"of",
"them",
"like",
"takephoto",
",",
"takevideo",
",",
"recordaudio",
",",
"getsentsms",
"and",
"uploadpictures",
"are",
"focused",
"on",
"espionage",
"activities",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"pro-democracy",
"reform",
"took",
"place",
"in",
"2011",
"which",
"has",
"helped",
"the",
"government",
"create",
"an",
"atmopshere",
"conducive",
"to",
"investor",
"interest."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Backdoor.Turla.B5",
"BKDR64_TURLA.NUS",
"Trojan.Turla",
"BKDR64_TURLA.NUS",
"Win64.Rootkit.Uroburos.A",
"Backdoor.Win64.Turla.c",
"Trojan.Win64.Turla.dflvhj",
"BackDoor.Turla.17",
"Trojan.Turla.Win64.1",
"BDS/Turla.fech",
"Backdoor.Win64.Turla.c",
"Backdoor:Win64/Turla.B!dha",
"Trojan/Win64.Turla.C560438",
"Backdoor.Turla",
"Trj/CI.A",
"Win64/Turla.A",
"Win32.Trojan.Url.Fdjm",
"Trojan.Turla!2u6AW7YKCfw"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"So",
"far",
"we",
"have",
"identified",
"the",
"following",
"behaviors",
":",
"Sending",
"device",
"information",
"to",
"a",
"remote",
"command",
"and",
"control",
"(",
"C2",
")",
"server",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Figure",
"6",
"."
] | [
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Japik.6",
"TROJ_IKYTOK.SMI",
"Win32.Trojan.WisdomEyes.16070401.9500.9979",
"Trojan.Ransomlock",
"TROJ_IKYTOK.SMI",
"Trojan.Packed.2232",
"Trojan.Kryptik.Win32.166130",
"BehavesLike.Win32.VTFlooder.fc",
"Trojan-Downloader.Win32.Karagany",
"TrojanDropper.Mudrop.cmh",
"TrojanDropper:Win32/Sinmis.B",
"Trojan/Win32.Menti.R9584",
"BScope.Malware-Cryptor.Tip"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Dynamer.S23079",
"Win32.Trojan.Kryptik.bil",
"Win.Malware.Zusy-5689799-0",
"Trojan.Inject2.38898",
"Trojan.Kryptik.Win32.992532",
"BehavesLike.Win32.PWSZbot.cm",
"Trojan.Win32.Extenbro",
"Backdoor.Androm.mnb",
"TR/Crypt.ZPACK.pwvcr",
"Trojan.Symmi.D10FCD",
"Trojan/Win32.Androm.R192120"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"PDF/Phish.ECM",
"Win32.Exploit.Pidief.Aexw",
"PDF/Phish.ECM",
"EXP/Pidief.EB.494",
"Exp.Pidief.Eb!c",
"Trojan.PDF.Phishing",
"Win32/Trojan.Exploit.ec6"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"'ve",
"seen",
"that",
"this",
"has",
"been",
"the",
"case",
"for",
"many",
"years",
"with",
"spear-phishing",
"campaigns",
"on",
"desktop",
"and",
"mobile",
"platforms",
",",
"so",
",",
"unfortunately",
",",
"it",
"does",
"n't",
"seem",
"that",
"this",
"will",
"change",
"any",
"time",
"soon",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"HenBox",
"checks",
"whether",
"this",
"execution",
"is",
"its",
"first",
"by",
"using",
"Android",
"β",
"s",
"shared",
"preferences",
"feature",
"to",
"persist",
"XML",
"key-value",
"pair",
"data",
"."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"MESSAGE",
"β",
"send",
"SMS",
"containing",
"specified",
"text",
"to",
"a",
"specified",
"number",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"HackTool.TSGrinder",
"Trojan/Hacktool.TSGrinder.a",
"W32/Tool.JPZP-4469",
"Crackin.0AC64262",
"HackTool.Win32.TSGrinder.a",
"Trojan.Win32.TSGrinder.scgl",
"HackTool.TSGrinder.192570",
"Hacktool.W32.Tsgrinder!c",
"ApplicUnsaf.Win32.HackTool.TSGrinder.a",
"Tool.TSGrinder",
"W32/VirTool.AYV",
"W32.Hack.Tool",
"HackTool/Win32.TSGrinder",
"HackTool.Win32.TSGrinder.a",
"HackTool:Win32/Tsgrinder.A",
"Win32.Hacktool.Tsgrinder.Stkm",
"HackTool.TSGrinder!LpD0k7ExEpE",
"HackTool.Win32.TSGrinder.a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Every",
"once",
"in",
"a",
"while",
",",
"authors",
"leave",
"behind",
"a",
"trace",
"that",
"allows",
"us",
"to",
"attribute",
"not",
"only",
"similar",
"apps",
",",
"but",
"also",
"multiple",
"different",
"PHA",
"families",
"to",
"the",
"same",
"group",
"or",
"person",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"TrojanDownloader.Lorozoad.A3",
"Trojan.Razy.D2614",
"Win32.Trojan.WisdomEyes.16070401.9500.9997",
"Win.Trojan.Lorozoad-1",
"Trojan.MSIL.Disfa.mcnf",
"Trojan.Win32.Tiny.etgbky",
"Trojan.Win32.Z.Razy.4608.CD",
"Troj.Msil.Disfa!c",
"TrojWare.MSIL.TrojanDownloader.Tiny.MXA",
"BehavesLike.Win32.Trojan.xz",
"TR/Dropper.MSIL.nsnpx",
"Trojan.MSIL.Disfa.mcnf",
"Trj/GdSda.A",
"Msil.Trojan.Disfa.Pctb",
"Trojan.Disfa!3Wzl0Mq4C1c",
"Trojan-Downloader.MSIL.Tiny",
"MSIL/Tiny.MX!tr.dldr",
"Win32/Trojan.85b"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.DownloadPdzLnrA.Trojan",
"Worm.Win32.WBNA!O",
"W32/WBNA.asj",
"Win32.Trojan.WisdomEyes.16070401.9500.9988",
"Win.Trojan.Wbna-299",
"Worm.WBNA.Win32.2209",
"BehavesLike.Win32.VBObfus.qt",
"W32/VB.PID!tr.dldr",
"Worm/Win32.WBNA",
"Worm.WBNA",
"Win32/TrojanDownloader.VB.PID",
"Trojan-Downloader.Win32.VB",
"Win32/Trojan.c6e"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32/Trojan.LNJS-3256",
"Trojan.Win32.Mazel.dsuwke",
"BehavesLike.Win32.Sytro.lc",
"TR/AD.Lentrigy.ejnsf",
"RiskWare[Downloader]/NSIS.Mazel",
"Trojan.Jaiko.851",
"TrojanDownloader:Win32/Rolkator.A",
"Trj/CI.A",
"Trojan.Win32.IRCBot",
"Win32/Trojan.698"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"We",
"have",
"not",
"identified",
"any",
"other",
"public",
"names",
"for",
"this",
"malware,",
"so",
"rather",
"than",
"introduce",
"a",
"new",
"name",
"to",
"the",
"industry",
"we'll",
"refer",
"to",
"this",
"family",
"as",
"Sarvdap."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16,
16,
16,
16,
3,
16,
3
] |
[
"Notification",
"handling",
"method",
"The",
"class",
"is",
"only",
"implemented",
"in",
"debug",
"mode",
",",
"pushing",
"all",
"captured",
"information",
"into",
"the",
"log",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"information",
"may",
"be",
"useful",
"to",
"any",
"incident",
"responder",
"or",
"blue",
"team",
"looking",
"to",
"defend",
"an",
"organisation."
] | [
16,
16,
16,
16,
16,
16,
16,
4,
12,
16,
4,
12,
16,
16,
16,
16,
16
] |
[
"In",
"addition",
",",
"at",
"this",
"stage",
"the",
"app",
"can",
"process",
"one",
"of",
"these",
"commands",
":",
"β’",
"Collect",
"device",
"info",
"β’",
"Install",
"app",
"β’",
"Is",
"online",
"?",
"β’",
"Change",
"server",
"domain",
"Out",
"of",
"these",
",",
"the",
"most",
"interesting",
"command",
"is",
"the",
"β",
"install",
"app",
"β",
"command",
"that",
"downloads",
"an",
"encrypted",
"zip",
"file",
"containing",
"the",
"second",
"phase",
"dex",
"file",
",",
"unpacks",
"and",
"loads",
"it",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"String",
"Resources",
"Used",
"to",
"Store",
"App",
"Data",
"Red",
"Alert",
"2.0",
"stores",
"its",
"data",
"in",
"an",
"atypical",
"location",
"(",
"inside",
"the",
"Strings.xml",
"file",
"embedded",
"in",
"the",
"app",
")",
"to",
"fetch",
"its",
"critical",
"data",
",",
"such",
"as",
"the",
"C2",
"address",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Infostealer.Banprox.B",
"is",
"a",
"Trojan",
"horse",
"that",
"may",
"steal",
"information",
"from",
"the",
"compromised",
"computer."
] | [
1,
16,
16,
3,
11,
16,
16,
1,
9,
16,
16,
5,
13
] |
[
"The",
"incident",
"used",
"a",
"Microsoft",
"Excel",
"file",
"containing",
"malicious",
"macros",
"which",
"wrote",
"a",
"malicious",
"executable",
"and",
"associated",
"files",
"to",
"the",
"victim",
"machine."
] | [
16,
16,
16,
1,
9,
9,
9,
16,
3,
11,
16,
16,
16,
3,
11,
16,
1,
9,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Ransom.Locky.20",
"Win32.Trojan.WisdomEyes.16070401.9500.9879",
"Ransom_Falock.R002C0DAI18",
"Trojan.Win32.Z.Ransom.1819072",
"Ransom_Falock.R002C0DAI18",
"BehavesLike.Win32.Trojan.th",
"W32/Trojan.CXBD-0386",
"Ransom:MSIL/Falock.A",
"Trj/GdSda.A",
"Trojan.MSIL.Crypt",
"Win32/Trojan.Ransom.d73"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"In",
"addition,",
"unlike",
"many",
"cyber",
"attacks,",
"an",
"actual",
"physical",
"person",
"was",
"present",
"money",
"mule",
"to",
"pick",
"up",
"the",
"money",
"from",
"affected",
"ATM",
"machines."
] | [
16,
16,
16,
16,
1,
9,
16,
16,
16,
16,
16,
16,
3,
11,
16,
16,
16,
16,
16,
16,
16,
5,
13
] |
[
"EventBot",
"C2",
"URLs",
"C2",
"URLs",
"and",
"other",
"settings",
"in",
"a",
"nested",
"class",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Trojan",
"details",
"Upon",
"boot",
",",
"the",
"trojan",
"will",
"start",
"by",
"populating",
"a",
"shared",
"preferences",
"file",
"with",
"the",
"configuration",
"it",
"has",
"on",
"its",
"internal",
"structures",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Spammer.Mail.Norin.A",
"Trojan/W32.Spammer.606720",
"Email-Flooder.W32.Norin.30!c",
"TROJ_NORIN.30",
"Hacktool.Spammer",
"TROJ_NORIN.30",
"Trojan.Spammer.Mail.Norin.A",
"Email-Flooder.Win32.Norin.30",
"Trojan.Spammer.Mail.Norin.A",
"Trojan.Win32.Norin.dkrt",
"Spyware.Email-Flooder.Norin.606720",
"Trojan.Spammer.Mail.Norin.A",
"Win32.Spammer.Mail.Norin.30",
"Trojan.Spammer.Mail.Norin.A",
"Trojan.PWS.Wmhack",
"Tool.Norin.Win32.1",
"Virus.Win32.Spammer",
"W32/Risk.SGYO-3478",
"Spammer.Mail.Norin.30",
"TR/Flood.Norin.30",
"HackTool[Flooder]/Win32.Norin",
"Win32.Hack.Norin.kcloud",
"Trojan.Spammer.Mail.Norin.A",
"Email-Flooder.Win32.Norin.30",
"Trojan.Spammer.Mail.Norin.A",
"EmailFlooder.Norin",
"Win32/Spammer.Mail.Norin.30",
"Win32.Virus.Spammer.Syhs",
"Flooder.Norin!cC98wqxpE9A",
"W32/Spam_Norin.30!tr",
"Win32/Trojan.Flooder.81a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"This",
"attack",
"might",
"also",
"originate",
"from",
"China."
] | [
16,
1,
16,
16,
16,
16,
2
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.HfsAutoB.186B",
"Worm.Dorkbot.A",
"Backdoor.W32.Padodor.kZnr",
"Trojan/Spy.qukart",
"Win32.Trojan-Spy.Quart.a",
"Backdoor.Berbew!g1",
"Win32/Webber.W",
"Win32.Qukart",
"BKDR_BERBEW.SMA",
"Win.Trojan.Crypted-36",
"Trojan-Proxy.Win32.Qukart.vjh",
"Trojan.Win32.Qukart.etuxeg",
"Worm.Win32.Qukart.K",
"BackDoor.HangUp.43784",
"BKDR_BERBEW.SMA",
"BehavesLike.Win32.Backdoor.cc",
"Trojan.Win32.Senta",
"TrojanProxy.Qukart.tsk",
"Trojan-Proxy.Win32.Qukart.vjh",
"Win-Trojan/Berbew.51712",
"TrojanProxy.Qukart",
"Trojan-Ransom.Win32.Pornoasset.a"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"]",
"download",
"."
] | [
9,
9,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"W32.FamVT.ExpiroPC.PE",
"Heur.Corrupt.PE",
"Tool.BtcMine.30",
"Backdoor.Win32.Cycbot"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1
] |
[
"Equipped",
"reverse",
"shell",
"payload",
"with",
"specific",
"string",
"After",
"an",
"in-depth",
"look",
",",
"we",
"found",
"that",
"some",
"versions",
"of",
"the",
"reverse",
"shell",
"payload",
"code",
"share",
"similarities",
"with",
"PRISM",
"β",
"a",
"stealth",
"reverse",
"shell",
"backdoor",
"that",
"is",
"available",
"on",
"Github",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
16
] |
[
"The",
"server",
"β",
"s",
"response",
"is",
"a",
"json",
",",
"containing",
"a",
"link",
"to",
"a",
".jar",
"file",
",",
"class",
"name",
"and",
"method",
"name",
"to",
"be",
"executed",
"with",
"reflection",
"API",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"Using",
"this",
"SSH",
"brute-forcing",
"network,",
"it",
"took",
"the",
"attackers",
"only",
"a",
"few",
"days",
"to",
"gain",
"root",
"access",
"and",
"full",
"control",
"of",
"the",
"targeted",
"server."
] | [
16,
16,
1,
9,
9,
16,
16,
16,
6,
16,
16,
16,
16,
16,
1,
9,
9,
9,
9,
9,
16,
16,
5,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan/Cosmu.ajmd",
"Trojan.Win32.Cosmu.cptjv",
"Trojan.Win32.Cosmu.ajmd",
"Win32.HLLW.Zebra.2",
"TR/PSW.Facepass.oina",
"Trojan/Cosmu.fqh",
"PWS:Win32/Facepass.B",
"Trojan.Win32.A.Cosmu.436714",
"Trojan.Cosmu",
"W32/Cosmu.AJMD!tr",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"When",
"we",
"first",
"discovered",
"the",
"OilRig",
"attack",
"campaign",
"in",
"May",
"2016,",
"we",
"believed",
"at",
"the",
"time",
"it",
"was",
"a",
"unique",
"attack",
"campaign",
"likely",
"operated",
"by",
"a",
"known,",
"existing",
"threat",
"group."
] | [
16,
16,
16,
16,
6,
14,
14,
14,
16,
0,
8,
16,
16,
16,
16,
16,
16,
16,
16,
6,
14,
14,
16,
16,
16,
16,
16,
16,
6,
14
] |
[
"An",
"attacker",
"is",
"paid",
"by",
"the",
"network",
"when",
"one",
"of",
"these",
"apps",
"is",
"installed",
"successfully",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"To",
"date",
",",
"Unit",
"42",
"has",
"seen",
"four",
"of",
"the",
"seven",
"(",
"the",
"first",
"three",
"in",
"the",
"list",
"below",
",",
"along",
"with",
"cdncool",
"[",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
1,
9,
9
] |
[
"Sundown",
"is",
"something",
"of",
"an",
"outlier",
"from",
"typical",
"exploit",
"kits."
] | [
3,
16,
16,
16,
16,
16,
16,
16,
3,
11
] |
[
"The",
"failure",
"of",
"Silicon",
"Valley",
"Bank",
"SVB",
"is",
"a",
"good",
"opportunity",
"for",
"scammers",
"to",
"make",
"a",
"buck",
"out",
"of",
"the",
"crisis,",
"warns",
"the",
"SANSβ’",
"Internet",
"Storm",
"Center",
"ISS",
"in",
"Washington",
"DC."
] | [
16,
16,
16,
4,
12,
12,
12,
16,
16,
16,
16,
16,
1,
16,
16,
16,
16,
16,
16,
16,
16,
16,
4,
12,
12,
12,
12,
12,
16,
2,
10
] |
[
"We",
"have",
"examined",
"all",
"the",
"detected",
"versions",
",",
"including",
"the",
"latest",
"one",
"that",
"is",
"signed",
"by",
"a",
"certificate",
"valid",
"from",
"September",
"14",
",",
"2017",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"For",
"example,",
"one",
"version",
"of",
"the",
"Shade",
"cryptor",
"checks",
"victim",
"computers",
"for",
"signs",
"of",
"accounting",
"activity;",
"if",
"it",
"finds",
"any,",
"it",
"doesn't",
"encrypt",
"the",
"files,",
"but",
"instead",
"installs",
"remote",
"control",
"tools",
"in",
"the",
"infected",
"system."
] | [
16,
16,
3,
11,
16,
16,
3,
11,
16,
5,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
11,
11,
16,
16,
5,
13
] |
[
"This",
"post",
"intends",
"to",
"share",
"the",
"results",
"of",
"our",
"research."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan-Spy/W32.KeyLogger.464896.C",
"TrojanSpy.KeyLogger!s9RPvqhksKk",
"Infostealer.Gampass",
"Win32.BDSBackdoor",
"Trojan-Spy.Win32.KeyLogger.gds",
"BackDoor.Cyber",
"Virus.Win32.Delf.DTW!IK",
"TrojanSpy.KeyLogger.cquv",
"Win-Trojan/Keylogger.464896.G",
"Trojan.Win32.Scar.cmim",
"Trojan-PSW.Gampass",
"Virus.Win32.Delf.DTW",
"W32/KeyLogger.GDS!tr",
"PSW.Keylog.AE",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"All",
"that",
"is",
"needed",
"is",
"to",
"get",
"the",
"original",
"size",
"of",
"the",
"DEX",
"file",
"and",
"read",
"everything",
"that",
"comes",
"after",
"this",
"offset",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"The",
"appearance",
"of",
"such",
"forms",
"is",
"generated",
"on",
"cybercriminals'",
"command."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
6,
16
] |
[
"Recommendations",
"Popular",
"mobile",
"platforms",
"like",
"Android",
"are",
"common",
"targets",
"for",
"organized",
"or",
"commercialized",
"monitoring",
"operations",
"."
] | [
16,
16,
16,
16,
16,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"CVE-2017-11882",
"Exploit",
"8b212ee2d65c4da033c39aebaf59cc51ade45f32f4d91d1daa0bd367889f934d",
"is",
"a",
"Microsoft",
"Word",
"RTF",
"document",
"that",
"exploits",
"`CVE-2017-11882`",
"stack",
"buffer",
"overflow",
"vulnerability",
"in",
"the",
"Microsoft",
"Equation",
"Editor`EQNEDT32.EXE`."
] | [
1,
7,
1,
16,
16,
1,
9,
9,
9,
16,
7,
1,
7,
15,
15,
15,
16,
5,
13,
13,
13
] |
[
"This",
"IOC",
"contains",
"indicators",
"for",
"the",
"BLACKCOFFEE",
"malware",
"family",
"that",
"is",
"attributed",
"to",
"APT17."
] | [
16,
16,
16,
16,
16,
16,
3,
11,
16,
15,
16,
16,
16,
6
] |
[
"More",
"apps",
"could",
"be",
"added",
"to",
"the",
"grabber",
"target",
"list",
"in",
"the",
"future",
",",
"such",
"as",
"the",
"ones",
"that",
"were",
"targeted",
"in",
"older",
"versions",
":",
"Facebook",
"WhatsApp",
"Skype",
"Twitter",
"Chrome",
"Instagram",
"Snapchat",
"Viber",
"The",
"following",
"screenshot",
"shows",
"the",
"generic",
"card",
"grabber",
"overlay",
"screen",
":",
"Ginp",
"generic",
"grabber",
"The",
"current",
"active",
"target",
"list",
"is",
"available",
"in",
"the",
"appendix",
",",
"containing",
"a",
"total",
"of",
"24",
"unique",
"targets",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
5,
5,
5,
5,
5,
5,
5,
5,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"]",
"102",
"2020-03-29",
"http",
":",
"//ora.blindsidefantasy",
"[",
"."
] | [
9,
9,
16,
1,
9,
9,
9,
9
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Neloweg",
"TR/Drop.Elms.A",
"PWS:Win32/Reder.B",
"Trojan.Neloweg",
"Trj/CI.A"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Inject.cvmjon",
"Trojan.Taidoor",
"TROJ_DROPPE.FS",
"Trojan-Dropper.Win32.Injector.jmli",
"Virus.Win32.Part.a",
"TROJ_DROPPE.FS",
"BehavesLike.Win32.Downloader.qm",
"TrojanDropper.Injector.bmtq",
"Trojan[Dropper]/Win32.Injector",
"Win32.Troj.Injector.JM.kcloud",
"Dropper/Win32.Injector",
"TrojanDropper.Injector",
"W32/Injector.JMLI!tr",
"Trojan.Win32.Injector.aJX"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"So",
"we",
"don't",
"have",
"a",
"sensational",
"hop",
"from",
"Linux",
"Mirai",
"to",
"Windows",
"Mirai",
"just",
"yet,",
"that's",
"just",
"a",
"silly",
"statement."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
5,
3,
16,
5,
3,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"Trojan",
"for",
"Linux",
"written",
"in",
"Go",
"programming",
"language."
] | [
16,
3,
11,
5,
16,
16,
5,
13,
13
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Win32.Trojan.WisdomEyes.16070401.9500.9999",
"W32/Dropper.ALCD",
"Win32/Rimecud.CU",
"TROJ_DROPPR.SMF",
"Win32.Worm.Peerfrag.Aojj",
"Win32.HLLW.Lime.18",
"Worm.Palevo.Win32.18245",
"TROJ_DROPPR.SMF",
"BehavesLike.Win32.Madangel.cc",
"W32/Risk.KNKR-8810",
"Trojan.Zusy.D421A9",
"Win32/Peerfrag.DI",
"P2P-Worm.Win32.Palevo"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Figure",
"10",
"."
] | [
16,
16,
16
] |
[
"(",
"We",
"named",
"the",
"spyware",
"\"",
"Exodus",
"''",
"after",
"this",
"Command",
"&",
"Control",
"domain",
"name",
"."
] | [
16,
13,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"This",
"variant,",
"which",
"we",
"call",
"MULTIGRAIN",
"consists",
"largely",
"of",
"a",
"subset",
"of",
"slightly",
"modified",
"code",
"from",
"NewPosThings."
] | [
16,
3,
16,
16,
16,
3,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
3
] |
[
"Whether",
"this",
"is",
"a",
"permanent",
"return",
"to",
"locky",
"or",
"a",
"one",
"off,",
"I",
"don't",
"know",
"at",
"this",
"stage,",
"but",
"Locky",
"have",
"vanished",
"for",
"while",
"before",
"returned."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"It",
"may",
"even",
"allow",
"them",
"to",
"sell",
"ad",
"space",
"directly",
"to",
"application",
"developers",
"."
] | [
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16,
16
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.SamDump.emgukv",
"Uds.Dangerousobject.Multi!c",
"Tool.SamDump.Win32.1",
"W32/Trojan.PXMQ-2326",
"TR/Rogue.9140774",
"PUP/Win32.SamDump.C241237",
"Riskware.HackTool!GhRtS0e2yEc",
"Win32/Trojan.f29"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"A",
"backdoor",
"also",
"known",
"as:",
"Trojan.Win32.Dwn.ewbodt",
"Trojan.Win32.Z.Starter.4103380",
"Trojan.DownLoader26.1573",
"BehavesLike.Win32.Dropper.wc",
"Trojan.Win32.Chifrax",
"W32/Trojan.BMGR-3693",
"Exploit:Win32/CplLnk.B",
"Win32/Trojan.9b2"
] | [
16,
3,
16,
16,
16,
1,
1,
1,
1,
1,
1,
1,
1
] |
[
"Because",
"of",
"the",
"recent",
"outbreak",
"of",
"the",
"Locky",
"ransomware,",
"Dridex",
"has",
"become",
"synonymous",
"with",
"the",
"distribution",
"of",
"ransomware",
"more",
"generally."
] | [
16,
16,
16,
16,
16,
16,
16,
3,
11,
6,
16,
16,
16,
16,
16,
16,
16,
3,
16,
16
] |
[
"]",
"databit",
"[",
"."
] | [
9,
9,
9,
9
] |
[
"PhotoMiner",
"features",
"a",
"unique",
"infection",
"mechanism,",
"reaching",
"endpoints",
"by",
"infecting",
"websites",
"hosted",
"on",
"FTP",
"servers",
"while",
"making",
"money",
"by",
"mining",
"Monero."
] | [
3,
16,
16,
1,
9,
9,
9,
9,
9,
9,
9,
9,
16,
5,
13,
16,
16,
16,
16,
1,
9
] |