id
int64 1
14.4k
| text
stringlengths 3
5.01k
| entities
list | relations
list | Comments
list |
---|---|---|---|---|
23 | Please mark, I'm not a robot! | [] | [] | [] |
3,518 | The trigger format is: %system32/rundll32.exe <PROTUX file name> <export name>. | [
{
"id": 49303,
"label": "FILEPATH",
"start_offset": 23,
"end_offset": 45
}
] | [] | [] |
9,530 | Gh0st RAT | [
{
"id": 29237,
"label": "malware",
"start_offset": 0,
"end_offset": 9
}
] | [] | [] |
14,112 | Other public references also used the compiled binary time of samples attributed to APT37. | [
{
"id": 48180,
"label": "threat-actor",
"start_offset": 84,
"end_offset": 89
}
] | [] | [] |
4,542 | In the modern world, we must be able to trust the devices we use every day and ensure that foreign adversaries do not have access to sophisticated exploits. | [] | [] | [] |
4,818 | Consistent with CERT-UA reporting, TAG observed multiple Russian GRU actors - APT28 and Sandworm - conduct campaigns exploiting the Follina vulnerability. | [
{
"id": 50750,
"label": "identity",
"start_offset": 35,
"end_offset": 38
},
{
"id": 50751,
"label": "identity",
"start_offset": 57,
"end_offset": 75
},
{
"id": 50752,
"label": "threat-actor",
"start_offset": 78,
"end_offset": 83
},
{
"id": 50753,
"label": "threat-actor",
"start_offset": 88,
"end_offset": 96
},
{
"id": 50749,
"label": "identity",
"start_offset": 16,
"end_offset": 23
},
{
"id": 50754,
"label": "vulnerability",
"start_offset": 132,
"end_offset": 153
}
] | [
{
"id": 1006,
"from_id": 50753,
"to_id": 50754,
"type": "exploits"
},
{
"id": 1007,
"from_id": 50752,
"to_id": 50754,
"type": "exploits"
}
] | [] |
1,470 | For security reasons we are not posting the names of any of these apps. | [] | [] | [] |
2,737 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |
9,054 | RATANKBA host manipulation console RATANKBA’s controllers use the “Nimo Software HTTP Retriever 1.0” user-agent string for its communication. | [
{
"id": 27961,
"label": "malware",
"start_offset": 0,
"end_offset": 8
},
{
"id": 27962,
"label": "location",
"start_offset": 9,
"end_offset": 13
},
{
"id": 27963,
"label": "malware",
"start_offset": 35,
"end_offset": 43
}
] | [] | [] |
234 | We monitored a list of 50 legitimate Ukraine-related domains (e.g., popular news and donation websites) and keywords (e.g., Ukraine, refugee) as targets for cybersquatting. | [
{
"id": 45781,
"label": "location",
"start_offset": 125,
"end_offset": 132
},
{
"id": 45934,
"label": "location",
"start_offset": 38,
"end_offset": 45
},
{
"id": 44651,
"label": "attack-pattern",
"start_offset": 158,
"end_offset": 172
}
] | [
{
"id": 137,
"from_id": 44651,
"to_id": 45781,
"type": "targets"
}
] | [] |
4,474 | Other reporting from Microsoft has linked this spyware to the compromise of dozens of victims, including political dissidents, human rights activists, journalists, and academics. | [
{
"id": 50270,
"label": "identity",
"start_offset": 21,
"end_offset": 30
}
] | [] | [] |
5,706 | Figure 2. Fake installation pop-up The third attack vector used by Earth Lusca is the exploitation of vulnerabilities that exist in the public-facing applications — such as Microsoft Exchange ProxyShell and Oracle GlassFish — of its targets. | [
{
"id": 17601,
"label": "location",
"start_offset": 33,
"end_offset": 36
},
{
"id": 17603,
"label": "tools",
"start_offset": 61,
"end_offset": 67
},
{
"id": 17604,
"label": "threat-actor",
"start_offset": 76,
"end_offset": 87
},
{
"id": 17605,
"label": "location",
"start_offset": 145,
"end_offset": 151
},
{
"id": 17607,
"label": "location",
"start_offset": 192,
"end_offset": 200
},
{
"id": 17609,
"label": "location",
"start_offset": 212,
"end_offset": 215
}
] | [] | [] |
5,148 | I need a loaf of bread. | [] | [] | [] |
3,367 | Python.BIOPASS.A | [
{
"id": 48985,
"label": "malware",
"start_offset": 0,
"end_offset": 16
}
] | [] | [] |
5,360 | The content of /proc/mtd for an Asus RT-AC68U device is as follows: Figure 7. | [
{
"id": 51364,
"label": "FILEPATH",
"start_offset": 15,
"end_offset": 24
}
] | [] | [] |
10,303 | Troj.Win32.TRX.XXPE50FFF039 50b000a7d61885591ba4ec9df1a0a223dbceb1ac2facafcef3d65c8cbbd64d46 email.exe | [
{
"id": 31452,
"label": "SHA2",
"start_offset": 29,
"end_offset": 93
}
] | [] | [] |
3,578 | The watermarking technique is implemented through the module attributes of the assembly. | [] | [] | [] |
5,065 | Once a user provides credentials in the dialog, they are posted to an attacker controlled domain. | [] | [] | [] |
11,128 | For example in 2017, our Security Reliability Engineering team measured a record-breaking UDP amplification attack sourced out of several Chinese ISPs (ASNs 4134, 4837, 58453, and 9394), which remains the largest bandwidth attack of which we are aware. | [
{
"id": 34002,
"label": "attack-pattern",
"start_offset": 94,
"end_offset": 107
},
{
"id": 34005,
"label": "location",
"start_offset": 163,
"end_offset": 167
},
{
"id": 34007,
"label": "location",
"start_offset": 176,
"end_offset": 179
},
{
"id": 34008,
"label": "location",
"start_offset": 242,
"end_offset": 245
}
] | [] | [] |
11,504 | In addition to including phishing links directly in the email, the attackers also link to PDFs and/or DOCs, hosted on Google Drive and Microsoft One Drive, that contain a link to an attacker-controlled phishing domain. | [
{
"id": 35193,
"label": "attack-pattern",
"start_offset": 25,
"end_offset": 33
},
{
"id": 35195,
"label": "location",
"start_offset": 131,
"end_offset": 134
},
{
"id": 35197,
"label": "attack-pattern",
"start_offset": 202,
"end_offset": 210
}
] | [] | [] |
14,375 | One messy reality is that enterprises don’t manage all their endpoints. | [] | [] | [] |
13,713 | Indicators of compromise (IOCs) Threat actor-managed C&C URLs: https://highstreetmuch[.]xyz/hug/gate[.]php https://takeusall[.]online/benzz/gate[.]PHP MITRE ATT&CK® Matrix Tags Cloud | APT & Targeted Attacks | Research | Phishing | Articles, News, Reports | [
{
"id": 51760,
"label": "URL",
"start_offset": 64,
"end_offset": 107
},
{
"id": 51761,
"label": "URL",
"start_offset": 108,
"end_offset": 151
}
] | [] | [] |
1,821 | We noted that it can disable a number of antivirus products, previously identified by Aon’s researchers. | [
{
"id": 45143,
"label": "identity",
"start_offset": 86,
"end_offset": 103
}
] | [] | [] |
11,724 | Trojan.W97M.SIDEWINDER.A AB7C1967BF1FEFDFFDE93626B78EB30994655AB02F59E0ADB0935E3E599A953F RTF file Trojan.W97M.SIDEWINDER.A 2548A819E4C597BA5958D2D18BAA544452948E5B00271570192CCD79ABE88E8D 1.a JS file Trojan.JS.SIDEWINDER.A Downloader. | [
{
"id": 36129,
"label": "SHA2",
"start_offset": 29,
"end_offset": 93
},
{
"id": 36130,
"label": "SHA2",
"start_offset": 134,
"end_offset": 198
}
] | [] | [] |
9,375 | Figure 7. gooogle[.]press registration info | [] | [] | [] |
5,468 | However, we construe them to be different groups, possibly within the same community, with different objectives and modi operandi. | [] | [] | [] |
1,011 | Figure 4: | [] | [] | [] |
6,567 | A rough translation of this message is as follows: “Fxxk, when I am released, the server is offline, I can’t find the machine, the domain is expired, it is so bad. | [] | [] | [] |
4,496 | Last year, TAG identified an ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations. | [
{
"id": 50298,
"label": "identity",
"start_offset": 11,
"end_offset": 14
}
] | [] | [] |
376 | Palo Alto Networks strongly advises organizations to patch immediately. | [
{
"id": 46073,
"label": "identity",
"start_offset": 0,
"end_offset": 18
}
] | [] | [] |
5,344 | Finally, a variable containg the next time a packet should be sent is updated and all of the parameters are sent to the modules again. | [] | [] | [] |
3,305 | If the value of the “type” argument is “Chrome”, it will use the AES secret key or DPAPI (for Chrome versions before 80) to decrypt the cookie file. | [
{
"id": 48388,
"label": "SOFTWARE",
"start_offset": 94,
"end_offset": 100
}
] | [] | [] |
1,070 | The particular vulnerability in question affects an Android feature known as “Toast.” “Toast” is a type of notification window that “pops” (like toast) on the screen. | [
{
"id": 46555,
"label": "SOFTWARE",
"start_offset": 53,
"end_offset": 60
}
] | [] | [] |
5,541 | In a separate attack, 962 online stores were hit in just 24 hours. | [] | [] | [] |
13,051 | In this blog, Trend Micro shares security recommendations for organizations to ensure stable security practices in a cloud-first world. | [] | [] | [] |
2,974 | For most, it’s something they set up once and forget about. | [] | [] | [] |
13,154 | We found the group was focused on stealing defense-, ocean-, and ship-related documents from target networks, which led us to believe that Tropic Trooper’s main purpose is to exfiltrate confidential information or intelligence. | [
{
"id": 48938,
"label": "threat-actor",
"start_offset": 139,
"end_offset": 152
}
] | [] | [] |
4,301 | Trend Micro Solutions Patchwork uses email as an entry point, which is why securing the email gateway is important. | [
{
"id": 50095,
"label": "identity",
"start_offset": 0,
"end_offset": 11
},
{
"id": 50096,
"label": "threat-actor",
"start_offset": 22,
"end_offset": 31
}
] | [] | [] |
3,830 | If Koadic finds that the system is conducive to the attacker’s interests, it downloads a base64-encrypted version of the ANEL malware from the Command-and-Control (C&C) server and executes it. Encrypted ANEL is decrypted using the “certutil -docode” command. | [
{
"id": 11615,
"label": "malware",
"start_offset": 121,
"end_offset": 125
},
{
"id": 11618,
"label": "malware",
"start_offset": 204,
"end_offset": 208
},
{
"id": 49688,
"label": "malware",
"start_offset": 3,
"end_offset": 9
}
] | [
{
"id": 859,
"from_id": 49688,
"to_id": 11615,
"type": "downloads"
}
] | [] |
928 | While ransomware is a large problem for users, it’s important to realize that not all malware families are created equal. | [] | [] | [] |
1,229 | This separation of functions may be intended to avoid detection by security products. | [] | [] | [] |
10,152 | In the week of the 2017 presidential elections in Iran, Pawn Storm set up a phishing site targeting chmail.ir webmail users. | [
{
"id": 30971,
"label": "attack-pattern",
"start_offset": 76,
"end_offset": 84
}
] | [] | [] |
4,703 | Our Threat Analysis Group, or TAG, is dedicated to protecting users from threats posed by state-sponsored malware attacks and other advanced persistent threats. | [
{
"id": 50590,
"label": "identity",
"start_offset": 4,
"end_offset": 25
},
{
"id": 50591,
"label": "identity",
"start_offset": 30,
"end_offset": 33
}
] | [] | [] |
2,062 | A further account, l4cky-control, was also discovered. | [
{
"id": 47154,
"label": "identity",
"start_offset": 19,
"end_offset": 32
}
] | [] | [] |
10,068 | We also noticed the presence of an APK file hosted in one of the servers, suggesting that if the cybercriminals decide to go further than just infecting servers, they may decide to attack Android-based devices. | [
{
"id": 30709,
"label": "identity",
"start_offset": 138,
"end_offset": 142
},
{
"id": 30710,
"label": "location",
"start_offset": 167,
"end_offset": 170
}
] | [] | [] |
8,660 | Related IOCs | [] | [] | [] |
10,557 | We’ve also seen attackers try to trick people into downloading malware by impersonating health organizations: Generally, we’re not seeing an overall rise in phishing attacks by government-backed groups; this is just a change in tactics. | [
{
"id": 32188,
"label": "location",
"start_offset": 141,
"end_offset": 148
},
{
"id": 32189,
"label": "attack-pattern",
"start_offset": 157,
"end_offset": 165
},
{
"id": 32190,
"label": "identity",
"start_offset": 211,
"end_offset": 215
}
] | [] | [] |
1,600 | Based on the reviews, the application does not function very well as a remote, but in reality it doesn’t contain remote control capability. | [] | [] | [] |
9,728 | Enterprises can benefit from Trend Micro’s Smart Protection Suites with XGen™ security, which infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint. Indicators of Compromise (IoCs) C&C servers Ssl[.]arkouthrie[.]com s3[.]hiahornber[.]com widget[.]shoreoa[.]com SHA256 Delivery document (W2KM_OCEANLOTUS.A): 2bb855dc5d845eb5f2466d7186f150c172da737bfd9c7f6bc1804e0b8d20f22a Dropper (OSX_OCEANLOTUS.D): 4da8365241c6b028a13b82d852c4f0155eb3d902782c6a538ac007a44a7d61b4 Backdoor (OSX_OCEANLOTUS.D): 673ee7a57ba3c5a2384aeb17a66058e59f0a4d0cddc4f01fe32f369f6a845c8f Tags Malware | APT & Targeted Attacks | Endpoints | Research | Network | [
{
"id": 29662,
"label": "location",
"start_offset": 13,
"end_offset": 16
},
{
"id": 29666,
"label": "location",
"start_offset": 79,
"end_offset": 87
},
{
"id": 29667,
"label": "location",
"start_offset": 108,
"end_offset": 116
},
{
"id": 29668,
"label": "location",
"start_offset": 157,
"end_offset": 167
},
{
"id": 29669,
"label": "location",
"start_offset": 192,
"end_offset": 200
},
{
"id": 29670,
"label": "location",
"start_offset": 231,
"end_offset": 234
},
{
"id": 29671,
"label": "SHA2",
"start_offset": 414,
"end_offset": 478
},
{
"id": 29672,
"label": "tools",
"start_offset": 488,
"end_offset": 504
},
{
"id": 29673,
"label": "SHA1",
"start_offset": 507,
"end_offset": 571
},
{
"id": 29674,
"label": "tools",
"start_offset": 582,
"end_offset": 598
},
{
"id": 29675,
"label": "SHA1",
"start_offset": 601,
"end_offset": 665
},
{
"id": 29676,
"label": "location",
"start_offset": 693,
"end_offset": 696
}
] | [] | [] |
8,823 | In the threat actor toolkit, different types of attacks are used for different purposes: Phishing campaigns can be used like a scalpel—targeting specific groups or individuals with personalized lures that are more likely to trick them into taking action (like clicking on a malware link), while DDoS attacks are more like a hatchet—disrupting or blocking a site or a service entirely. | [
{
"id": 27325,
"label": "location",
"start_offset": 56,
"end_offset": 59
},
{
"id": 27326,
"label": "attack-pattern",
"start_offset": 89,
"end_offset": 97
},
{
"id": 27327,
"label": "location",
"start_offset": 108,
"end_offset": 111
},
{
"id": 27328,
"label": "location",
"start_offset": 205,
"end_offset": 208
},
{
"id": 27329,
"label": "location",
"start_offset": 214,
"end_offset": 220
},
{
"id": 27330,
"label": "location",
"start_offset": 230,
"end_offset": 234
},
{
"id": 27331,
"label": "location",
"start_offset": 247,
"end_offset": 253
},
{
"id": 27332,
"label": "location",
"start_offset": 308,
"end_offset": 311
}
] | [] | [] |
11,497 | TAG has also observed an increasing number of financially motivated actors targeting Ukraine. | [] | [] | [] |
9,407 | Collection Data from Local System T1533 Used to collect files from the device, including documents, photos, and media files | [
{
"id": 28956,
"label": "attack-pattern",
"start_offset": 11,
"end_offset": 33
},
{
"id": 28957,
"label": "location",
"start_offset": 108,
"end_offset": 111
},
{
"id": 28958,
"label": "location",
"start_offset": 113,
"end_offset": 118
}
] | [] | [] |
2,365 | For those interested in following our in-the-wild work, we will soon publish details surrounding another, unrelated campaign we discovered using two Chrome 0-days (CVE-2021-37973 and CVE-2021-37976). | [
{
"id": 47418,
"label": "vulnerability",
"start_offset": 183,
"end_offset": 197
},
{
"id": 47419,
"label": "SOFTWARE",
"start_offset": 149,
"end_offset": 155
},
{
"id": 47417,
"label": "vulnerability",
"start_offset": 164,
"end_offset": 178
}
] | [
{
"id": 319,
"from_id": 47419,
"to_id": 47417,
"type": "has"
},
{
"id": 320,
"from_id": 47419,
"to_id": 47418,
"type": "has"
}
] | [] |
1,718 | These many C2 mechanisms make Dyre much more difficult to fully take down than a simple single (or small group) of C2s. | [
{
"id": 46893,
"label": "malware",
"start_offset": 30,
"end_offset": 34
}
] | [] | [] |
316 | If your administrators and help desk are the only ones who need RDP access to your systems, disable RDP for the rest of your users. | [
{
"id": 46013,
"label": "SOFTWARE",
"start_offset": 100,
"end_offset": 103
},
{
"id": 46012,
"label": "SOFTWARE",
"start_offset": 64,
"end_offset": 67
}
] | [] | [] |
1,510 | This is an ELF file and there are various encrypted portions within it. | [] | [] | [] |
9,795 | Indicators of Compromise SHA256 Type Detection Name 41ee0ab77b474b0c84a1c25591029533f058e4454d9f83ba30159cc6309c65d1 | [
{
"id": 29845,
"label": "location",
"start_offset": 33,
"end_offset": 37
},
{
"id": 29846,
"label": "SHA2",
"start_offset": 53,
"end_offset": 117
}
] | [] | [] |
9,583 | The browser then navigates to Gmail to begin the data collection. | [] | [] | [] |
13,590 | Note that the PHP code below is obfuscated. | [] | [] | [] |
1,646 | Many of the users who downloaded the tool may not be using one of the targeted Spanish or Australian networks. | [] | [] | [] |
510 | This demonstrates the diversity of ransomware and emphasizes how difficult it is to expand ransomware detection coverage with static profiling. | [] | [] | [] |
6,803 | If, however, these lines do not pass through this IF statement, an error would occur. | [] | [] | [] |
3,826 | Variable}.registry.HKCU Set HKEY_CURRENT_USER {Variable}.registry.HKLM Set HKEY_LOCAL_MACHINE {Variable}.registry.STRING Set String Value {Variable}.registry.BINARY Set Binary Value {Variable}.registry.DWORD Set DWORD Value {Variable}.registry.QWORD | [] | [] | [] |
14,071 | Figure 9 shows that SLUB used “Windows-RT-KB-2937636.dll,” while Freenki used “Windows-KB275122-x86.exe.” Figure 9 Naming convention for persistence. | [
{
"id": 47392,
"label": "FILEPATH",
"start_offset": 79,
"end_offset": 103
},
{
"id": 47389,
"label": "FILEPATH",
"start_offset": 31,
"end_offset": 56
},
{
"id": 47395,
"label": "malware",
"start_offset": 65,
"end_offset": 73
},
{
"id": 43549,
"label": "malware",
"start_offset": 20,
"end_offset": 24
}
] | [
{
"id": 316,
"from_id": 43549,
"to_id": 47389,
"type": "uses"
},
{
"id": 317,
"from_id": 47395,
"to_id": 47392,
"type": "uses"
}
] | [] |
7,502 | The configuration portion of the PowerShell script | [
{
"id": 23343,
"label": "attack-pattern",
"start_offset": 33,
"end_offset": 43
}
] | [] | [] |
9,306 | Credit card CVN number cc_first_name ff First name of cardholder cc_last_name gg Last name of cardholder bill_to_phone hh Phone number for billing bill_to_country ii | [] | [] | [] |
8,109 | Figure 4. Two-stage payload deployment Figure 5. Code showing how the dropper invokes extra DEX code To deploy the payload app callCam on the device without the user’s awareness | [
{
"id": 25125,
"label": "malware",
"start_offset": 129,
"end_offset": 136
}
] | [] | [] |
13,101 | That resulted in our collaboration to develop secure network guidelines for industrial robots using ROS. | [] | [] | [] |
3,376 | BIOPASS RAT Loader Backdoor. | [
{
"id": 10222,
"label": "malware",
"start_offset": 0,
"end_offset": 11
}
] | [] | [] |
4,089 | Furthermore, when Lilith RAT is terminated, it will try to clean itself to prevent being found by investigators. | [
{
"id": 49923,
"label": "malware",
"start_offset": 18,
"end_offset": 28
}
] | [] | [] |
11,313 | Like much of their tooling, HYPERSCRAPE is not notable for its technical sophistication, but rather its effectiveness in accomplishing Charming Kitten’s objectives. | [
{
"id": 34577,
"label": "location",
"start_offset": 5,
"end_offset": 9
},
{
"id": 34579,
"label": "threat-actor",
"start_offset": 135,
"end_offset": 150
}
] | [] | [] |
3,801 | It also abuses three legitimate MS Office functions: | [
{
"id": 49673,
"label": "SOFTWARE",
"start_offset": 32,
"end_offset": 41
}
] | [] | [] |
12,088 | Android App: https://www.virustotal.com/gui/file/5d3ff202f20af915863eee45916412a271bae1ea3a0e20988309c16723ce4da5/detection Android App C2: communication-shield[.]site cdsa[.]xyz | [] | [] | [] |
14,087 | Even when the threat actor was not using the “JSON” format, the commands embedded in the various samples show a surprising amount of similarities. | [] | [] | [] |
11,264 | Collect files Collects the specified file from an endpoint during an investigation Submit a file for sandbox analysis Submits a file to the Trend Micro Vision One sandbox for automated analysis Retrieve sandbox analysis report Retrieves the analysis report, IOCs, or artifacts available after automated analysis Quarantine email message | [] | [] | [] |
7,118 | We provided a detailed analysis of this new HyperBro version in our research. | [
{
"id": 22273,
"label": "malware",
"start_offset": 44,
"end_offset": 52
}
] | [] | [] |
1,741 | Attackers send emails that appear to be from a person or company that you trust. | [] | [] | [] |
8,270 | The payload was still njRAT. | [
{
"id": 25528,
"label": "malware",
"start_offset": 22,
"end_offset": 27
}
] | [] | [] |
6,525 | مکتبة إلکترونیة.pdf 70cab18770795ea23e15851fa49be03314dc081fc44cdf76e8f0c9b889515c1b Trojan. | [
{
"id": 20233,
"label": "SHA1",
"start_offset": 20,
"end_offset": 84
}
] | [] | [] |
3,866 | Figure 15. Koadic’s communication traffic Medium- to long-term mitigation | [
{
"id": 49726,
"label": "malware",
"start_offset": 12,
"end_offset": 18
}
] | [] | [] |
727 | The open-source OMI package is designed to provide a portable infrastructure backbone for web-based management tools, such as diagnostic monitoring, log analytic services and automation functionality within UNIX and Linux systems. | [
{
"id": 46299,
"label": "SOFTWARE",
"start_offset": 207,
"end_offset": 211
},
{
"id": 46301,
"label": "SOFTWARE",
"start_offset": 16,
"end_offset": 27
},
{
"id": 46300,
"label": "SOFTWARE",
"start_offset": 216,
"end_offset": 221
}
] | [] | [] |
4,732 | TAG also recently released information on a segment of attackers we call “hack-for-hire” that focuses on compromising accounts and exfiltrating data as a service. | [
{
"id": 50640,
"label": "attack-pattern",
"start_offset": 74,
"end_offset": 87
},
{
"id": 50641,
"label": "attack-pattern",
"start_offset": 131,
"end_offset": 161
},
{
"id": 50639,
"label": "identity",
"start_offset": 0,
"end_offset": 3
}
] | [] | [] |
3,229 | The third scheduled task —is called “big.txt”— is responsible for implementing the BIOPASS RAT malware. | [
{
"id": 48350,
"label": "FILEPATH",
"start_offset": 37,
"end_offset": 44
},
{
"id": 9841,
"label": "attack-pattern",
"start_offset": 10,
"end_offset": 24
},
{
"id": 9842,
"label": "malware",
"start_offset": 83,
"end_offset": 94
}
] | [] | [] |
3,258 | Encoded “join” event sent to the C&C server Figure 19. | [] | [] | [] |
6,220 | The email exfiltration flow with WebSocket backdoor Figure 14. | [] | [] | [] |
9,097 | Lurk compromised systems by exploiting web browser vulnerabilities via drive-by download attacks. | [
{
"id": 28092,
"label": "malware",
"start_offset": 0,
"end_offset": 4
}
] | [] | [] |
14,010 | When determining attribution, the most interesting leads are the ones that can deduce information about the malware author’s working environment. | [] | [] | [] |
12 | If you re-test these hashes again from last week you can see an average of 49/57 engines that detect last week’s threat – but that’s too little, too late for anyone who already lost data. | [] | [] | [] |
2,018 | There are also no magic bytes within the packed payload, unlike UPX-packed binaries, which contain the magic bytes UPX!. | [
{
"id": 47116,
"label": "tools",
"start_offset": 64,
"end_offset": 67
}
] | [] | [] |
9,800 | Given their targets, we have named this campaign “Operation ENDTRADE,” and identified some of the findings in our research “Operation ENDTRADE: TICK’s Multi-Stage Backdoors for Attacking Industries and Stealing Classified Data”. | [
{
"id": 29868,
"label": "location",
"start_offset": 0,
"end_offset": 5
},
{
"id": 29869,
"label": "location",
"start_offset": 40,
"end_offset": 48
},
{
"id": 29870,
"label": "location",
"start_offset": 71,
"end_offset": 74
},
{
"id": 29871,
"label": "threat-actor",
"start_offset": 144,
"end_offset": 148
},
{
"id": 29872,
"label": "location",
"start_offset": 198,
"end_offset": 201
}
] | [] | [] |
2,188 | By doing this, they were able to target organizations that relied on the distributor’s security camera solution and infect their systems with malware. | [] | [] | [] |
2,181 | Sign up to receive the latest news, cyber threat intelligence and research from us Please enter your email address! | [] | [] | [] |
5,260 | The apps mainly used Middle East-based news and sociopolitical themes as social engineering hooks and abused social media to further proliferate. | [
{
"id": 51300,
"label": "attack-pattern",
"start_offset": 73,
"end_offset": 91
},
{
"id": 51301,
"label": "attack-pattern",
"start_offset": 102,
"end_offset": 121
}
] | [] | [] |
13,834 | In the end, it returns the modified table. | [] | [] | [] |
3,855 | It also downloads the following: Accevent.exe <-> Microsoft Accessible Event Watcher 7.2.0.0 event.dll <-> the loader of ssssss.ddd, (Detected as TROJ_ANELLDR) ssssss.ddd (lena_http.bin) <-> encrypted BKDR_ANEL (Detected as BKDR_ANELENC) | [
{
"id": 49708,
"label": "FILEPATH",
"start_offset": 161,
"end_offset": 171
},
{
"id": 49711,
"label": "malware",
"start_offset": 225,
"end_offset": 237
},
{
"id": 49705,
"label": "FILEPATH",
"start_offset": 34,
"end_offset": 46
},
{
"id": 49706,
"label": "FILEPATH",
"start_offset": 94,
"end_offset": 103
},
{
"id": 49707,
"label": "FILEPATH",
"start_offset": 122,
"end_offset": 132
},
{
"id": 49709,
"label": "FILEPATH",
"start_offset": 173,
"end_offset": 186
},
{
"id": 49710,
"label": "malware",
"start_offset": 202,
"end_offset": 211
},
{
"id": 49712,
"label": "malware",
"start_offset": 147,
"end_offset": 159
},
{
"id": 49713,
"label": "SOFTWARE",
"start_offset": 51,
"end_offset": 93
}
] | [] | [] |
12,283 | Host IOCs Registry Keys HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\KernelConfig HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DriverConfig HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SSL Update File Paths C:\Windows\System32\Nwsapagent.sys C:\Windows\System32\helpsvc.sys C:\ProgramData\USOShared\uso.bin C:\ProgramData\VMware\vmnat-update.bin C:\ProgramData\VirtualBox\update.bin | [
{
"id": 38092,
"label": "location",
"start_offset": 0,
"end_offset": 4
},
{
"id": 38093,
"label": "REGISTRYKEY",
"start_offset": 24,
"end_offset": 83
},
{
"id": 38094,
"label": "REGISTRYKEY",
"start_offset": 84,
"end_offset": 143
},
{
"id": 38095,
"label": "REGISTRYKEY",
"start_offset": 144,
"end_offset": 198
}
] | [] | [] |
10,222 | The RATs were also sent to a wider net of targets including various industries around the world. | [
{
"id": 31229,
"label": "malware",
"start_offset": 35,
"end_offset": 38
},
{
"id": 31230,
"label": "location",
"start_offset": 90,
"end_offset": 95
}
] | [] | [] |
10,767 | It provides a comprehensive defense tailored to protect organizations against targeted attacks and advanced threats through specialized engines, custom sandboxing, and seamless correlation across the entire attack lifecycle, allowing it to detect threats like REDBALDKNIGHT’s attacks even without any engine or pattern update. | [
{
"id": 32911,
"label": "location",
"start_offset": 95,
"end_offset": 98
},
{
"id": 32912,
"label": "location",
"start_offset": 164,
"end_offset": 167
},
{
"id": 32913,
"label": "threat-actor",
"start_offset": 260,
"end_offset": 273
}
] | [] | [] |
4,393 | In the version tested, the C2 was unobfuscated and stored as a hardcoded string. | [] | [] | [] |
4,120 | Opens command shell 0x5007 Unknown 0x5009 Closes command shell 0x500A | [] | [] | [] |