id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
7,037 | The launcher’s behavior changes depending on the number of arguments passed to the executable. | [] | [] | [] |
1,909 | Instead of stealing documents or images, it works on top of a modified version of the legitimate Threema, an end-to-end encrypted messaging application, to steal screenshots of messages. | [
{
"id": 47032,
"label": "SOFTWARE",
"start_offset": 97,
"end_offset": 104
}
] | [] | [] |
10,140 | The logo of the target organization has been removed from the screenshot and the color was changed as not to reveal the source. | [
{
"id": 30924,
"label": "location",
"start_offset": 16,
"end_offset": 22
},
{
"id": 30925,
"label": "location",
"start_offset": 73,
"end_offset": 76
},
{
"id": 30926,
"label": "attack-pattern",
"start_offset": 120,
"end_offset": 126
}
] | [] | [] |
1,182 | don't stop me! | [] | [] | [] |
6,718 | This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q1 of 2020. | [] | [] | [] |
6,174 | The email leverages the webmail system’s search suggestion function to trigger the webpage to execute their script instead of directly running the malicious script. | [] | [] | [] |
2,080 | Taking a closer look at x4k’s main OS, we believe it to be a customized Kali Linux instance, tailored to his needs. | [
{
"id": 47207,
"label": "threat-actor",
"start_offset": 25,
"end_offset": 29
},
{
"id": 47208,
"label": "SOFTWARE",
"start_offset": 73,
"end_offset": 83
}
] | [] | [] |
12,561 | It then elevated privileges to install the payload. | [] | [] | [] |
4,439 | We hope doing so will improve understanding of tactics and techniques that will enhance threat hunting capabilities and lead to stronger protections across the industry. | [] | [] | [] |
8,162 | C&C Servers ms-ethics.net | [] | [] | [] |
13,535 | They must also be nominated by their organization's leadership and commit to the requirements imposed by the program. | [] | [] | [] |
4,328 | It downloads an ASCII file from the same domain and converts it into binary before loading it on to the memory and jump to a dynamic function. | [] | [] | [] |
11,611 | This has happened to multiple spyware vendors over the past ten years, raising the specter that their stockpiles can be released publicly without warning. | [
{
"id": 35592,
"label": "malware",
"start_offset": 83,
"end_offset": 90
},
{
"id": 35593,
"label": "location",
"start_offset": 113,
"end_offset": 116
}
] | [] | [] |
1,081 | By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
1,311 | These results are encrypted using the same technique mentioned previously. | [] | [] | [] |
1,496 | Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
8,151 | Google Play URL of FileManager app found in one of the C&C servers. | [] | [] | [] |
449 | This is a case where forewarned is forearmed, and that forearming can result in effective prevention. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |
2,340 | It needed the address of dlopen and dlsym patched after the binary was loaded into memory. | [] | [] | [] |
9,114 | Figure 1. Exploit loading sequence in ria[.]ru (February 2012) Figure 2. [bg].ru (February 2012) found redirecting victims to Lurk’s exploit kit Figure 3. Redirects to the Lurk landing page from adfox[.]ru banner network Figure 4. Malicious iframe content served by tks[.]ru (August 2013) | [
{
"id": 28138,
"label": "threat-actor",
"start_offset": 126,
"end_offset": 130
},
{
"id": 28140,
"label": "malware",
"start_offset": 172,
"end_offset": 176
},
{
"id": 28141,
"label": "location",
"start_offset": 177,
"end_offset": 184
},
{
"id": 28142,
"label": "location",
"start_offset": 185,
"end_offset": 189
},
{
"id": 28143,
"label": "location",
"start_offset": 206,
"end_offset": 212
},
{
"id": 28145,
"label": "location",
"start_offset": 248,
"end_offset": 255
}
] | [] | [] |
2,600 | To this end, we are aware of this actor’s involvement in vishing, SIM-swapping and soliciting third parties at providers for insider access. | [] | [] | [] |
2,187 | In this attack, attackers embedded the TDrop2 malware inside a legitimate video software package hosted on the software distributor’s website. | [
{
"id": 45419,
"label": "malware",
"start_offset": 39,
"end_offset": 45
}
] | [] | [] |
11,704 | Non-malicious applications “My First APP” and “Opinion Poll” Another two applications were built from JavaPayload for Metasploit that will load extra code from the remote server configured in the sample. | [
{
"id": 36069,
"label": "location",
"start_offset": 42,
"end_offset": 45
},
{
"id": 36072,
"label": "malware",
"start_offset": 122,
"end_offset": 132
},
{
"id": 36073,
"label": "location",
"start_offset": 138,
"end_offset": 142
},
{
"id": 36074,
"label": "location",
"start_offset": 143,
"end_offset": 147
},
{
"id": 36075,
"label": "location",
"start_offset": 168,
"end_offset": 174
},
{
"id": 36076,
"label": "location",
"start_offset": 200,
"end_offset": 206
}
] | [] | [] |
5,088 | In other cases, we observed fake websites — already set up to distribute trojanized cryptocurrency applications — hosting iframes and pointing their visitors to the exploit kit. | [] | [] | [] |
5,356 | The MTD provides an abstraction layer to access the device's flash memory. | [] | [] | [] |
779 | From a researchers' point of view, deferred free created a few problems, one of the major ones being that the page heap feature may not work correctly. | [] | [] | [] |
5,335 | 10 bytes are then written to the core component pipe. | [] | [] | [] |
4,768 | We ensure appropriate controls are built into the architecture of the system. | [] | [] | [] |
13,783 | An unusual Waterbear infection chain | [] | [] | [] |
8,876 | If the creation of the tool, batch file, and scheduled task is disregarded, it would seem that there is no connection between PlugX and the execution of the auxiliary tool. | [
{
"id": 27454,
"label": "location",
"start_offset": 23,
"end_offset": 27
},
{
"id": 27455,
"label": "location",
"start_offset": 41,
"end_offset": 44
},
{
"id": 27456,
"label": "attack-pattern",
"start_offset": 45,
"end_offset": 59
},
{
"id": 27457,
"label": "location",
"start_offset": 118,
"end_offset": 125
},
{
"id": 27458,
"label": "malware",
"start_offset": 126,
"end_offset": 131
},
{
"id": 27459,
"label": "location",
"start_offset": 132,
"end_offset": 135
},
{
"id": 27460,
"label": "location",
"start_offset": 167,
"end_offset": 171
}
] | [] | [] |
9,430 | This is done by hooking NTDLL APIs such as NtQueryAttributesFile, NtOpenFile, NtCreateSection, NtMapViewOfSection, NtQuerySection and ZwClose. | [
{
"id": 29017,
"label": "attack-pattern",
"start_offset": 16,
"end_offset": 23
},
{
"id": 29018,
"label": "location",
"start_offset": 130,
"end_offset": 133
}
] | [] | [] |
5,486 | He claimed that he wasn’t able to install the app. | [] | [] | [] |
13,662 | How accounts are targeted for phishing attacks | [
{
"id": 42527,
"label": "attack-pattern",
"start_offset": 30,
"end_offset": 38
}
] | [] | [] |
5,555 | It goes without saying that you should keep a close eye on your card statements/bank account at all times – watching out even for small amounts that hackers may be making to test if your card is still active. | [] | [] | [] |
352 | Yesterday, TrustedSec, a security consultancy based on Ohio, wrote that the recent breach at Community Health Systems (CHS) was the result of exploitation of the Heartbleed OpenSSL vulnerability (CVE-2014-0160). | [
{
"id": 46042,
"label": "TIME",
"start_offset": 0,
"end_offset": 9
},
{
"id": 46043,
"label": "identity",
"start_offset": 11,
"end_offset": 21
},
{
"id": 46044,
"label": "location",
"start_offset": 55,
"end_offset": 59
},
{
"id": 46045,
"label": "identity",
"start_offset": 93,
"end_offset": 123
},
{
"id": 46047,
"label": "vulnerability",
"start_offset": 196,
"end_offset": 209
},
{
"id": 46046,
"label": "vulnerability",
"start_offset": 162,
"end_offset": 194
}
] | [] | [] |
5,821 | Ed: | [] | [] | [] |
6,628 | A recent report uncovered this threat group’s attack infrastructure, which leveraged commercial VPN providers in addition to compromised systems to use as proxies to further mask their origins. | [
{
"id": 20569,
"label": "threat-actor",
"start_offset": 174,
"end_offset": 178
}
] | [] | [] |
6,398 | Examining additional connections to port 443 on 159.65.186[.]50, we identified several suspected victims including an Argentinian organization, an IP television provider providing North and South American content, and a major textile manufacturer in Mexico. | [
{
"id": 19849,
"label": "IPV4",
"start_offset": 49,
"end_offset": 64
},
{
"id": 19852,
"label": "location",
"start_offset": 206,
"end_offset": 213
},
{
"id": 19853,
"label": "location",
"start_offset": 215,
"end_offset": 218
},
{
"id": 19854,
"label": "location",
"start_offset": 221,
"end_offset": 226
}
] | [] | [] |
8,801 | In one example, attackers impersonated McAfee. | [] | [] | [] |
459 | Attackers use DGA so that they can quickly switch the domains that they’re using for the malware attacks. | [] | [] | [] |
13,112 | Tags APT & Targeted Attacks | IoT | Expert Perspective | Articles, News, Reports | [] | [] | [] |
14,043 | There seems to be a neat way to do it, but I seek advice from experienced people.” | [] | [] | [] |
13,119 | Marketplace Vendor Insights takes the pain out of due diligence by delivering the information prospective customers need—reducing friction and accelerating the journey to cloud security. | [] | [] | [] |
279 | Unlike a new malware family or vulnerability in the wild, the attacks we expect could come in many forms. | [] | [] | [] |
7,715 | Figure 11. .LNK embedded in the .ISO file | [] | [] | [] |
4,583 | More startling is the fact that 18.6% of all disclosures were published without a fix from the vendor—another record-breaking stat. | [] | [] | [] |
874 | The following sample is used for analysis: Figure 1. | [] | [] | [] |
5,726 | Spear phishing, like the name implies, is a more targeted form of phishing which incorporates a theme directly related to the target. | [
{
"id": 17696,
"label": "attack-pattern",
"start_offset": 1,
"end_offset": 15
},
{
"id": 17697,
"label": "attack-pattern",
"start_offset": 67,
"end_offset": 75
},
{
"id": 17698,
"label": "location",
"start_offset": 127,
"end_offset": 133
}
] | [] | [] |
1,133 | With over hundreds of thousands of malware associations, this specific mutex is associated exclusively with the Net-worm:W32/Allaple malware family which has been around since 2006 but continues to propagate and reinvent itself through the years. | [
{
"id": 46569,
"label": "malware",
"start_offset": 113,
"end_offset": 133
},
{
"id": 46570,
"label": "TIME",
"start_offset": 177,
"end_offset": 181
}
] | [] | [] |
1,096 | This is because IE will completely destroy your edits when it writes its new version of the file over yours. | [
{
"id": 46567,
"label": "SOFTWARE",
"start_offset": 16,
"end_offset": 18
}
] | [] | [] |
882 | All data sent via HTTP POST requests is sent in the clear. | [] | [] | [] |
8,163 | deb-cn.net ap1-acl.net m s-db.net | [] | [] | [] |
13,972 | Further complicating the issue is the growing scope and scale of attacks today that are successfully targeting the seams between these layers. | [] | [] | [] |
14,412 | An XDR that supports advanced detection capabilities can identify correlate data across areas to identify events that would otherwise go unnoticed. | [
{
"id": 47170,
"label": "SOFTWARE",
"start_offset": 3,
"end_offset": 7
}
] | [] | [] |
10,504 | Last month, we sent 1,755 warnings to users whose accounts were targets of government-backed attackers. | [] | [] | [] |
3,751 | In most cases, the exploit was only used to drop the payload, however the payloads themself did not contain CVE-2022-22954 exploits for further propagation. | [
{
"id": 49579,
"label": "vulnerability",
"start_offset": 108,
"end_offset": 122
}
] | [] | [] |
8,488 | Pay close attention to unrecognized network traffic (both inbound and outbound) and watch for sophisticated new phishing attacks. | [
{
"id": 26173,
"label": "location",
"start_offset": 66,
"end_offset": 69
},
{
"id": 26174,
"label": "location",
"start_offset": 80,
"end_offset": 83
},
{
"id": 26175,
"label": "attack-pattern",
"start_offset": 112,
"end_offset": 120
}
] | [] | [] |
11,078 | We terminated 1 blog as part of our investigation into coordinated influence operations linked to Argentina. | [] | [] | [] |
5,327 | Data transferring | [] | [] | [] |
3,446 | We were able to analyze 2,151 packets that triggered the signature and observed both vulnerability scanning activity and active exploitation attempts. | [] | [] | [] |
5,359 | The mtd_data_t structure The data is read to this structure. | [] | [] | [] |
6,119 | The registrant information associated with the website hosting the malware is a domain reseller. | [] | [] | [] |
828 | As a member of the Microsoft Active Protections Program (MAPP) program, Palo Alto Networks received early details of the vulnerability, providing greater understanding of the threat, which helps us implement strong product coverage. | [
{
"id": 46378,
"label": "identity",
"start_offset": 19,
"end_offset": 62
},
{
"id": 44876,
"label": "identity",
"start_offset": 72,
"end_offset": 90
}
] | [] | [] |
4,517 | For users, Android provides safety and control over how apps and third parties can access the data from their devices. | [
{
"id": 50316,
"label": "SOFTWARE",
"start_offset": 11,
"end_offset": 18
}
] | [] | [] |
7,271 | It uses the icon for a Word document file as a disguise, attempting to pass itself off as a legitimate document file. | [] | [] | [] |
3,283 | The malicious actor can connect to the relevant RTMP address to watch the streaming. | [] | [] | [] |
13,095 | Robots are a particular risk—not only because so much of modern manufacturing relies on them, but also because many of these machines rely on legacy technology dating back decades. | [] | [] | [] |
1,755 | However, he had to heavily redact this information due to an agreement between himself and Microsoft. | [
{
"id": 45122,
"label": "identity",
"start_offset": 91,
"end_offset": 100
}
] | [] | [] |
730 | The four critical vulnerabilities discovered by security researchers from Wiz include one unauthenticated remote code execution (RCE) and three privilege escalation vulnerabilities. Dubbed OMIGOD, the four vulnerabilities were found to directly affect Azure cloud instances using the following Azure services: Prisma Cloud Compute Defender agents can detect whether any Azure system is vulnerable to any of the four CVEs. | [
{
"id": 46306,
"label": "attack-pattern",
"start_offset": 91,
"end_offset": 135
},
{
"id": 46311,
"label": "SOFTWARE",
"start_offset": 313,
"end_offset": 342
},
{
"id": 46307,
"label": "attack-pattern",
"start_offset": 145,
"end_offset": 165
},
{
"id": 46309,
"label": "SOFTWARE",
"start_offset": 254,
"end_offset": 265
},
{
"id": 46310,
"label": "SOFTWARE",
"start_offset": 296,
"end_offset": 310
},
{
"id": 46313,
"label": "SOFTWARE",
"start_offset": 373,
"end_offset": 378
},
{
"id": 46308,
"label": "vulnerability",
"start_offset": 191,
"end_offset": 197
}
] | [] | [] |
13,629 | A packetFlag “xy” was found inside this Gh0st RAT variant This Gh0st RAT variant implements additional features for stealing QQ messenger user information, for example, a list of users on a given machine and their QQ messenger numbers. | [
{
"id": 51715,
"label": "malware",
"start_offset": 67,
"end_offset": 76
},
{
"id": 51714,
"label": "malware",
"start_offset": 40,
"end_offset": 49
}
] | [] | [] |
3,030 | Make sure you only give fobs to people that you trust. | [] | [] | [] |
3,583 | Figure 6. | [] | [] | [] |
14,309 | Like the Android Maikspy, it first sends a notification to its C&C server to register the device. | [
{
"id": 48530,
"label": "SOFTWARE",
"start_offset": 9,
"end_offset": 17
},
{
"id": 48531,
"label": "malware",
"start_offset": 17,
"end_offset": 24
},
{
"id": 48532,
"label": "Infrastucture",
"start_offset": 63,
"end_offset": 73
}
] | [
{
"id": 445,
"from_id": 48531,
"to_id": 48532,
"type": "beacons-to"
}
] | [] |
748 | They followed that up In July by implementing a deferred free method to solve the freeing issue of use-after-free bugs. | [
{
"id": 46342,
"label": "TIME",
"start_offset": 25,
"end_offset": 29
},
{
"id": 46343,
"label": "attack-pattern",
"start_offset": 99,
"end_offset": 113
}
] | [] | [] |
1,784 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |
3,224 | Figure 13. | [] | [] | [] |
4,197 | Indicator Removal on Host: Timestomp Credential Access T1003.001 OS Credential Dumping: LSASS Memory T1552.002 | [
{
"id": 50001,
"label": "attack-pattern",
"start_offset": 27,
"end_offset": 64
},
{
"id": 50002,
"label": "attack-pattern",
"start_offset": 65,
"end_offset": 110
}
] | [] | [] |
11,220 | The language is returned to its original setting when the run is finished. | [] | [] | [] |
2,449 | Table 1 shows the parameters that the webshell saved to the server would use for authentication and command and how many times we saw them. | [] | [] | [] |
2,623 | Palo Alto Networks will update this Threat Brief with new information and recommendations as they become available. DEV-0537 criminal actor targeting organizations for data exfiltration and destruction A Closer Look | [
{
"id": 47799,
"label": "identity",
"start_offset": 1,
"end_offset": 19
},
{
"id": 47800,
"label": "threat-actor",
"start_offset": 118,
"end_offset": 126
}
] | [] | [] |
12,370 | In the threat actor toolkit, different types of attacks are used for different purposes: Phishing campaigns can be used like a scalpel—targeting specific groups or individuals with personalized lures that are more likely to trick them into taking action (like clicking on a malware link), while DDoS attacks are more like a hatchet—disrupting or blocking a site or a service entirely. | [
{
"id": 38428,
"label": "location",
"start_offset": 56,
"end_offset": 59
},
{
"id": 38429,
"label": "attack-pattern",
"start_offset": 89,
"end_offset": 97
},
{
"id": 38430,
"label": "location",
"start_offset": 108,
"end_offset": 111
},
{
"id": 38431,
"label": "location",
"start_offset": 205,
"end_offset": 208
},
{
"id": 38432,
"label": "location",
"start_offset": 214,
"end_offset": 220
},
{
"id": 38433,
"label": "location",
"start_offset": 230,
"end_offset": 234
},
{
"id": 38434,
"label": "location",
"start_offset": 247,
"end_offset": 253
},
{
"id": 38435,
"label": "location",
"start_offset": 308,
"end_offset": 311
}
] | [] | [] |
14,060 | Both use different samples for the multiple malware downloaded. | [] | [] | [] |
9,968 | Malicious update files are prepared, signed with the stolen certificate, and uploaded to the attacker’s server (207[.]148[.]94[.]157). | [
{
"id": 30441,
"label": "location",
"start_offset": 23,
"end_offset": 26
},
{
"id": 30442,
"label": "location",
"start_offset": 73,
"end_offset": 76
},
{
"id": 30443,
"label": "IPV4",
"start_offset": 112,
"end_offset": 132
}
] | [] | [] |
13,181 | The encrypted USBferry malware is embedded in the loader resource section, and the loader drops it into the C:\Users\Public\Documents\Flash folder and names it flash.dat | [
{
"id": 41131,
"label": "malware",
"start_offset": 14,
"end_offset": 22
},
{
"id": 41132,
"label": "location",
"start_offset": 66,
"end_offset": 73
},
{
"id": 41133,
"label": "location",
"start_offset": 75,
"end_offset": 78
},
{
"id": 41134,
"label": "location",
"start_offset": 147,
"end_offset": 150
}
] | [] | [] |
12,280 | If you have communicated with any of these accounts or visited the actors’ blog, we suggest you review your systems for the IOCs provided below. | [] | [] | [] |
3,579 | The following source code screenshot shows how this is implemented. | [] | [] | [] |
2,141 | As always, we are monitoring the situation closely and will provide additional details as they become available. Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! Please mark, I'm not a robot! By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. | [] | [] | [] |
5,172 | This technology is situated at the beginning of the supply chain as a layer that connects, controls, and monitors applications, sensors, and actuators, aimed at maintaining interoperability and fault tolerance. | [] | [] | [] |
14,249 | Here is a timeline of when the C&C server’s IP addresses were first used, based on our monitoring: Figure 6: Timeline of the C&C server’s IP addresses C&C Servers | [] | [] | [] |
3,108 | This has more in common with the Heartbleed event of 2014. | [
{
"id": 48254,
"label": "vulnerability",
"start_offset": 33,
"end_offset": 43
},
{
"id": 48255,
"label": "TIME",
"start_offset": 53,
"end_offset": 57
}
] | [] | [] |
14,248 | The earliest activity we tracked on the GitHub account was from August 17, 2016, with the most recent in March 12, 2017. | [
{
"id": 48442,
"label": "TIME",
"start_offset": 64,
"end_offset": 79
},
{
"id": 48443,
"label": "TIME",
"start_offset": 105,
"end_offset": 119
},
{
"id": 48441,
"label": "SOFTWARE",
"start_offset": 40,
"end_offset": 47
}
] | [] | [] |
1,760 | Yu Yang then pasted his shellcode that used similar methods to run arbitrary code, showing that the method Yuki Chen used is exactly the one that won Yu the $100,000 award. | [
{
"id": 46910,
"label": "identity",
"start_offset": 0,
"end_offset": 7
},
{
"id": 46911,
"label": "identity",
"start_offset": 107,
"end_offset": 116
},
{
"id": 46912,
"label": "identity",
"start_offset": 150,
"end_offset": 152
}
] | [] | [] |
13,849 | Side-Loading T1073 Uses modified legitimate DLL to load the malicious DLL Process Injection T1055 Injects the decrypted payload into svchost.exe process Exfiltration Exfiltration Over Command and Control Channel T1041 | [
{
"id": 42934,
"label": "location",
"start_offset": 53,
"end_offset": 57
},
{
"id": 42935,
"label": "attack-pattern",
"start_offset": 76,
"end_offset": 93
},
{
"id": 42936,
"label": "attack-pattern",
"start_offset": 168,
"end_offset": 213
}
] | [] | [] |
253 | Our teams at Palo Alto Networks will continue monitoring domain squatting attacks and work to protect customers against them. | [
{
"id": 45949,
"label": "identity",
"start_offset": 13,
"end_offset": 31
},
{
"id": 45950,
"label": "attack-pattern",
"start_offset": 57,
"end_offset": 81
}
] | [] | [] |
9,757 | But the last layer is the main backdoor body. | [] | [] | [] |
2,746 | Normal PAN-OS maintenance release updates will provide a fix for the vulnerability. | [
{
"id": 47992,
"label": "SOFTWARE",
"start_offset": 7,
"end_offset": 13
}
] | [] | [] |
13,964 | Detailed solutions can be found in our knowledge base article on DarkSide ransomware. | [
{
"id": 43290,
"label": "malware",
"start_offset": 65,
"end_offset": 73
}
] | [] | [] |
13,996 | While analyzing the technical details of this malware, which includes two new espionage backdoors, we noticed striking similarities to other malware attributed to the threat actor known as APT37, also known as Reaper or Group 123. | [
{
"id": 48781,
"label": "threat-actor",
"start_offset": 188,
"end_offset": 194
},
{
"id": 48782,
"label": "threat-actor",
"start_offset": 210,
"end_offset": 217
},
{
"id": 48783,
"label": "threat-actor",
"start_offset": 220,
"end_offset": 229
}
] | [
{
"id": 461,
"from_id": 48781,
"to_id": 48782,
"type": "duplicate-of"
},
{
"id": 462,
"from_id": 48781,
"to_id": 48783,
"type": "duplicate-of"
}
] | [] |
2,383 | Both StealthMutant and StealthVector contain a payload of either the Cobalt Strike beacon or ScrambleCross, a newly discovered backdoor. | [
{
"id": 47445,
"label": "malware",
"start_offset": 5,
"end_offset": 18
},
{
"id": 47448,
"label": "malware",
"start_offset": 93,
"end_offset": 106
},
{
"id": 47446,
"label": "malware",
"start_offset": 23,
"end_offset": 36
},
{
"id": 47447,
"label": "tools",
"start_offset": 69,
"end_offset": 82
}
] | [
{
"id": 326,
"from_id": 47446,
"to_id": 47447,
"type": "uses"
},
{
"id": 327,
"from_id": 47446,
"to_id": 47448,
"type": "uses"
},
{
"id": 328,
"from_id": 47445,
"to_id": 47447,
"type": "uses"
},
{
"id": 329,
"from_id": 47445,
"to_id": 47448,
"type": "uses"
}
] | [] |
513 | Virlock has the largest number of variants due to its file-infector-like behavior. | [
{
"id": 46145,
"label": "attack-pattern",
"start_offset": 54,
"end_offset": 81
},
{
"id": 44760,
"label": "malware",
"start_offset": 0,
"end_offset": 7
}
] | [
{
"id": 159,
"from_id": 44760,
"to_id": 46145,
"type": "uses"
}
] | [] |