id
stringlengths 1
4
| tokens
sequencelengths 3
478
| ner_tags
sequencelengths 3
478
|
---|---|---|
800 | [
"It",
"then",
"calls",
"a",
"routine",
"that",
"adds",
"a",
"code",
"section",
"to",
"a",
"target",
"module",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
801 | [
"This",
"section",
"will",
"contain",
"a",
"fake",
"export",
"table",
"mimicking",
"the",
"same",
"export",
"table",
"of",
"the",
"original",
"system",
"DLL",
"chosen",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
802 | [
"At",
"the",
"time",
"of",
"writing",
",",
"the",
"dropper",
"supports",
"aepic.dll",
",",
"sspisrv.dll",
",",
"ftllib.dll",
",",
"and",
"userenv.dll",
"to",
"host",
"the",
"malicious",
"FinFisher",
"payload",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
0,
10,
0,
10,
0,
10,
10,
0,
10,
10,
10,
10,
1,
10,
10
] |
803 | [
"Finally",
",",
"a",
"new",
"Windows",
"service",
"is",
"created",
"with",
"the",
"service",
"path",
"pointing",
"to",
"the",
"candidate",
".exe",
"located",
"in",
"this",
"new",
"directory",
"together",
"with",
"the",
"freshly",
"created",
",",
"benign-looking",
"DLL",
"."
] | [
10,
10,
10,
10,
3,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
804 | [
"In",
"this",
"way",
",",
"when",
"the",
"service",
"runs",
"during",
"boot",
",",
"the",
"original",
"Windows",
"executable",
"is",
"executed",
"from",
"a",
"different",
"location",
"and",
"it",
"will",
"automatically",
"load",
"and",
"map",
"the",
"malicious",
"DLL",
"inside",
"its",
"address",
"space",
",",
"instead",
"of",
"using",
"the",
"genuine",
"system",
"library",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
3,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
805 | [
"This",
"routine",
"is",
"a",
"form",
"of",
"generic",
"and",
"variable",
"generator",
"of",
"DLL",
"side-loading",
"combinations",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
806 | [
"Figure",
"10",
"."
] | [
10,
10,
10
] |
807 | [
"Windows",
"Defender",
"ATP",
"timeline",
"can",
"pinpoint",
"the",
"service",
"DLL",
"side-loading",
"trick",
"(",
"in",
"this",
"example",
",",
"using",
"fltlib.dll",
")",
"."
] | [
3,
8,
8,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
0,
10,
10
] |
808 | [
"In",
"the",
"past",
",",
"we",
"have",
"seen",
"other",
"activity",
"groups",
"like",
"LEAD",
"employ",
"a",
"similar",
"attacker",
"technique",
"named",
"β",
"proxy-library",
"β",
"to",
"achieve",
"persistence",
",",
"but",
"not",
"with",
"this",
"professionalism",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
809 | [
"The",
"said",
"technique",
"brings",
"the",
"advantage",
"of",
"avoiding",
"auto-start",
"extensibility",
"points",
"(",
"ASEP",
")",
"scanners",
"and",
"programs",
"that",
"checks",
"for",
"binaries",
"installed",
"as",
"service",
"(",
"for",
"the",
"latter",
",",
"the",
"service",
"chosen",
"by",
"FinFisher",
"will",
"show",
"up",
"as",
"a",
"clean",
"Windows",
"signed",
"binary",
")",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
1,
10,
10,
10,
10,
10,
10,
3,
10,
10,
10,
10
] |
810 | [
"The",
"malware",
"cleans",
"the",
"system",
"event",
"logs",
"using",
"OpenEventLog/ClearEventLog",
"APIs",
",",
"and",
"then",
"terminates",
"the",
"setup",
"procedure",
"with",
"a",
"call",
"to",
"StartService",
"to",
"run",
"the",
"stage",
"4",
"malware",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
811 | [
"Figure",
"11",
"."
] | [
10,
10,
10
] |
812 | [
"The",
"DLL",
"side-loaded",
"stage",
"4",
"malware",
"mimicking",
"a",
"real",
"export",
"table",
"to",
"avoid",
"detection",
"Stage",
"4",
":",
"The",
"memory",
"loader",
"β",
"Fun",
"injection",
"with",
"GDI",
"function",
"hijacking",
"Depending",
"on",
"how",
"stage",
"4",
"was",
"launched",
",",
"two",
"different",
"things",
"may",
"happen",
":",
"In",
"the",
"low-integrity",
"case",
"(",
"under",
"UAC",
")",
"the",
"installer",
"simply",
"injects",
"the",
"stage",
"5",
"malware",
"into",
"the",
"bogus",
"explorer.exe",
"process",
"started",
"earlier",
"and",
"terminates",
"In",
"the",
"high-integrity",
"case",
"(",
"with",
"administrative",
"privileges",
"or",
"after",
"UAC",
"bypass",
")",
",",
"the",
"code",
"searches",
"for",
"the",
"process",
"hosting",
"the",
"Plug",
"and",
"Play",
"service",
"(",
"usually",
"svchost.exe",
")",
"loaded",
"in",
"memory",
"and",
"injects",
"itself",
"into",
"it",
"For",
"the",
"second",
"scenario",
",",
"the",
"injection",
"process",
"works",
"like",
"this",
":",
"The",
"malware",
"opens",
"the",
"target",
"service",
"process",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
0,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
0,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
813 | [
"It",
"allocates",
"and",
"fills",
"four",
"chunks",
"of",
"memory",
"inside",
"the",
"service",
"process",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
814 | [
"One",
"chunk",
"contains",
"the",
"entire",
"malware",
"DLL",
"code",
"(",
"without",
"PE",
"headers",
")",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
815 | [
"Another",
"chunk",
"is",
"used",
"to",
"copy",
"a",
"basic",
"Ntdll",
"and",
"Kernel32",
"import",
"address",
"table",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
816 | [
"Two",
"chunks",
"are",
"filled",
"with",
"an",
"asynchronous",
"procedure",
"call",
"(",
"APC",
")",
"routine",
"code",
"and",
"a",
"stub",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
817 | [
"It",
"opens",
"the",
"service",
"thread",
"of",
"the",
"service",
"process",
"and",
"uses",
"the",
"ZwQueueApcThread",
"native",
"API",
"to",
"inject",
"an",
"APC",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
0,
10,
10,
10,
10,
10,
10,
10
] |
818 | [
"The",
"APC",
"routine",
"creates",
"a",
"thread",
"in",
"the",
"context",
"of",
"the",
"svchost.exe",
"process",
"that",
"will",
"map",
"and",
"execute",
"the",
"stage",
"5",
"malware",
"into",
"the",
"winlogon.exe",
"process",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
0,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
0,
10,
10
] |
819 | [
"The",
"injection",
"method",
"used",
"for",
"winlogon.exe",
"is",
"also",
"interesting",
"and",
"quite",
"unusual",
"."
] | [
10,
10,
10,
10,
10,
0,
10,
10,
10,
10,
10,
10,
10
] |
820 | [
"We",
"believe",
"that",
"this",
"method",
"is",
"engineered",
"to",
"avoid",
"trivial",
"detection",
"of",
"process",
"injection",
"using",
"the",
"well-detected",
"CreateRemoteThread",
"or",
"ZwQueueApcThread",
"API",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
0,
10,
0,
10,
10
] |
821 | [
"The",
"malware",
"takes",
"these",
"steps",
":",
"Check",
"if",
"the",
"system",
"master",
"boot",
"record",
"(",
"MBR",
")",
"contains",
"an",
"infection",
"marker",
"(",
"0xD289C989C089",
"8-bytes",
"value",
"at",
"offset",
"0x2C",
")",
",",
"and",
",",
"if",
"so",
",",
"terminate",
"itself",
"Check",
"again",
"if",
"the",
"process",
"is",
"attached",
"to",
"a",
"debugger",
"(",
"using",
"the",
"techniques",
"described",
"previously",
")",
"Read",
",",
"decrypt",
",",
"and",
"map",
"the",
"stage",
"5",
"malware",
"(",
"written",
"in",
"the",
"previous",
"stage",
"in",
"msvcr90.dll",
")",
"Open",
"winlogon.exe",
"process",
"Load",
"user32.dll",
"system",
"library",
"and",
"read",
"the",
"KernelCallbackTable",
"pointer",
"from",
"its",
"own",
"process",
"environment",
"block",
"(",
"PEB",
")",
"(",
"Note",
":",
"The",
"KernelCallbackTable",
"points",
"to",
"an",
"array",
"of",
"graphic",
"functions",
"used",
"by",
"Win32",
"kernel",
"subsystem",
"module",
"win32k.sys",
"as",
"call-back",
"into",
"user-mode",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
0,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
0,
10,
10,
0,
10,
10,
0,
10,
10,
10,
10,
10,
0,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
0,
10,
10,
10,
10,
10
] |
822 | [
")",
"Calculate",
"the",
"difference",
"between",
"this",
"pointer",
"and",
"the",
"User32",
"base",
"address",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
823 | [
"Copy",
"the",
"stage",
"5",
"DLL",
"into",
"winlogon.exe",
"Allocate",
"a",
"chunk",
"of",
"memory",
"in",
"winlogon.exe",
"process",
"and",
"copy",
"the",
"same",
"APC",
"routine",
"seen",
"previously",
"Read",
"and",
"save",
"the",
"original",
"pointer",
"of",
"the",
"__fnDWORD",
"internal",
"User32",
"routine",
"(",
"located",
"at",
"offset",
"+0x10",
"of",
"the",
"KernelCallbackTable",
")",
"and",
"replace",
"this",
"pointer",
"with",
"the",
"address",
"of",
"the",
"APC",
"stub",
"routine",
"After",
"this",
"function",
"pointer",
"hijacking",
",",
"when",
"winlogon.exe",
"makes",
"any",
"graphical",
"call",
"(",
"GDI",
")",
",",
"the",
"malicious",
"code",
"can",
"execute",
"without",
"using",
"CreateRemoteThread",
"or",
"similar",
"triggers",
"that",
"are",
"easily",
"detectable",
"."
] | [
10,
10,
10,
10,
10,
10,
0,
10,
10,
10,
10,
10,
10,
0,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
0,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
824 | [
"After",
"execution",
"it",
"takes",
"care",
"of",
"restoring",
"the",
"original",
"KernelCallbackTable",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
825 | [
"Stage",
"5",
":",
"The",
"final",
"loader",
"takes",
"control",
"The",
"stage",
"5",
"malware",
"is",
"needed",
"only",
"to",
"provide",
"one",
"more",
"layer",
"of",
"obfuscation",
",",
"through",
"the",
"VM",
",",
"of",
"the",
"final",
"malware",
"payload",
"and",
"to",
"set",
"up",
"a",
"special",
"Structured",
"Exception",
"Hander",
"routine",
",",
"which",
"is",
"inserted",
"as",
"Wow64PrepareForException",
"in",
"Ntdll",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
826 | [
"This",
"special",
"exception",
"handler",
"is",
"needed",
"to",
"manage",
"some",
"memory",
"buffers",
"protection",
"and",
"special",
"exceptions",
"that",
"are",
"used",
"to",
"provide",
"more",
"stealthy",
"execution",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
827 | [
"After",
"the",
"VM",
"code",
"has",
"checked",
"again",
"the",
"user",
"environment",
",",
"it",
"proceeds",
"to",
"extract",
"and",
"execute",
"the",
"final",
"un-obfuscated",
"payload",
"sample",
"directly",
"into",
"winlogon.exe",
"(",
"alternatively",
",",
"into",
"explorer.exe",
")",
"process",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
0,
10,
10,
10,
10,
0,
10,
10,
10
] |
828 | [
"After",
"the",
"payload",
"is",
"extracted",
",",
"decrypted",
",",
"and",
"mapped",
"in",
"the",
"process",
"memory",
",",
"the",
"malware",
"calls",
"the",
"new",
"DLL",
"entry",
"point",
",",
"and",
"then",
"the",
"RunDll",
"exported",
"function",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
829 | [
"The",
"latter",
"implements",
"the",
"entire",
"spyware",
"program",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10
] |
830 | [
"Stage",
"6",
":",
"The",
"payload",
"is",
"a",
"modular",
"spyware",
"framework",
"for",
"further",
"analysis",
"Our",
"journey",
"to",
"deobfuscating",
"FinFisher",
"has",
"allowed",
"us",
"to",
"uncover",
"the",
"complex",
"anti-analysis",
"techniques",
"used",
"by",
"this",
"malware",
",",
"as",
"well",
"as",
"to",
"use",
"this",
"intel",
"to",
"protect",
"our",
"customers",
",",
"which",
"is",
"our",
"top",
"priority",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
1,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
831 | [
"Analysis",
"of",
"the",
"additional",
"spyware",
"modules",
"is",
"future",
"work",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
832 | [
"It",
"is",
"evident",
"that",
"the",
"ultimate",
"goal",
"of",
"this",
"program",
"is",
"to",
"steal",
"information",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
833 | [
"The",
"malware",
"architecture",
"is",
"modular",
",",
"which",
"means",
"that",
"it",
"can",
"execute",
"plugins",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
834 | [
"The",
"plugins",
"are",
"stored",
"in",
"its",
"resource",
"section",
"and",
"can",
"be",
"protected",
"by",
"the",
"same",
"VM",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
835 | [
"The",
"sample",
"we",
"analyzed",
"in",
"October",
",",
"for",
"example",
",",
"contains",
"a",
"plugin",
"that",
"is",
"able",
"to",
"spy",
"on",
"internet",
"connections",
",",
"and",
"can",
"even",
"divert",
"some",
"SSL",
"connections",
"and",
"steal",
"data",
"from",
"encrypted",
"traffic",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
836 | [
"Some",
"FinFisher",
"variants",
"incorporate",
"an",
"MBR",
"rootkit",
",",
"the",
"exact",
"purpose",
"of",
"which",
"is",
"not",
"clear",
"."
] | [
10,
1,
10,
10,
10,
0,
5,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
837 | [
"Quite",
"possibly",
",",
"this",
"routine",
"targets",
"older",
"platforms",
"like",
"Windows",
"7",
"and",
"machines",
"not",
"taking",
"advantage",
"of",
"hardware",
"protections",
"like",
"UEFI",
"and",
"SecureBoot",
",",
"available",
"on",
"Windows",
"10",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
3,
8,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
3,
8,
10
] |
838 | [
"Describing",
"this",
"additional",
"piece",
"of",
"code",
"in",
"detail",
"is",
"outside",
"the",
"scope",
"of",
"this",
"analysis",
"and",
"may",
"require",
"a",
"new",
"dedicated",
"blog",
"post",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
3,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
839 | [
"Defense",
"against",
"FinFisher",
"Exposing",
"as",
"much",
"of",
"FinFisher",
"β",
"s",
"riddles",
"as",
"possible",
"during",
"this",
"painstaking",
"analysis",
"has",
"allowed",
"us",
"to",
"ensure",
"our",
"customers",
"are",
"protected",
"against",
"this",
"advanced",
"piece",
"of",
"malware",
"."
] | [
10,
10,
1,
10,
10,
10,
10,
1,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
840 | [
"Windows",
"10",
"S",
"devices",
"are",
"naturally",
"protected",
"against",
"FinFisher",
"and",
"other",
"threats",
"thanks",
"to",
"the",
"strong",
"code",
"integrity",
"policies",
"that",
"don",
"β",
"t",
"allow",
"unknown",
"unsigned",
"binaries",
"to",
"run",
"(",
"thus",
"stopping",
"FinFisher",
"β",
"s",
"PE",
"installer",
")",
"or",
"loaded",
"(",
"blocking",
"FinFisher",
"β",
"s",
"DLL",
"persistence",
")",
"."
] | [
3,
8,
10,
10,
10,
10,
10,
10,
1,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
1,
10,
10,
10,
10,
10,
10,
10,
10,
10,
1,
10,
10,
10,
10,
10,
10
] |
841 | [
"On",
"Windows",
"10",
",",
"similar",
"code",
"integrity",
"policies",
"can",
"be",
"configured",
"using",
"Windows",
"Defender",
"Application",
"Control",
"."
] | [
10,
3,
8,
10,
10,
10,
10,
10,
10,
10,
10,
10,
3,
8,
8,
8,
10
] |
842 | [
"Office",
"365",
"Advanced",
"Threat",
"Protection",
"secures",
"mailboxes",
"from",
"email",
"campaigns",
"that",
"use",
"zero-day",
"exploits",
"to",
"deliver",
"threats",
"like",
"FinFisher",
"."
] | [
3,
8,
8,
8,
8,
10,
10,
10,
10,
10,
10,
10,
4,
9,
10,
10,
10,
10,
1,
10
] |
843 | [
"Office",
"365",
"ATP",
"blocks",
"unsafe",
"attachments",
",",
"malicious",
"links",
",",
"and",
"linked-to",
"files",
"using",
"time-of-click",
"protection",
"."
] | [
3,
8,
8,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
844 | [
"Using",
"intel",
"from",
"this",
"research",
",",
"we",
"have",
"made",
"Office",
"365",
"ATP",
"more",
"resistant",
"to",
"FinFisher",
"β",
"s",
"anti-sandbox",
"checks",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
3,
8,
8,
10,
10,
10,
1,
10,
10,
10,
10,
10
] |
845 | [
"Generic",
"detections",
",",
"advanced",
"behavioral",
"analytics",
",",
"and",
"machine",
"learning",
"technologies",
"in",
"Windows",
"Defender",
"Advanced",
"Threat",
"Protection",
"detect",
"FinFisher",
"β",
"s",
"malicious",
"behavior",
"throughout",
"the",
"attack",
"kill",
"chain",
"and",
"alert",
"SecOps",
"personnel",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
3,
8,
8,
8,
8,
10,
1,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
846 | [
"Windows",
"Defender",
"ATP",
"also",
"integrates",
"with",
"the",
"Windows",
"protection",
"stack",
"so",
"that",
"protections",
"from",
"Windows",
"Defender",
"AV",
"and",
"Windows",
"Defender",
"Exploit",
"Guard",
"are",
"reported",
"in",
"Windows",
"Defender",
"ATP",
"portal",
",",
"enabling",
"SecOps",
"personnel",
"to",
"centrally",
"manage",
"security",
",",
"and",
"as",
"well",
"as",
"promptly",
"investigate",
"and",
"respond",
"to",
"hostile",
"activity",
"in",
"the",
"network",
"."
] | [
3,
8,
8,
10,
10,
10,
10,
3,
10,
10,
10,
10,
10,
10,
3,
8,
8,
10,
3,
8,
8,
8,
10,
10,
10,
3,
8,
8,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
847 | [
"We",
"hope",
"that",
"this",
"writeup",
"of",
"our",
"journey",
"through",
"all",
"the",
"multiple",
"layers",
"of",
"protection",
",",
"obfuscation",
",",
"and",
"anti-analysis",
"techniques",
"of",
"FinFisher",
"will",
"be",
"useful",
"to",
"other",
"researchers",
"studying",
"this",
"malware",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
1,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
848 | [
"We",
"believe",
"that",
"an",
"industry-wide",
"collaboration",
"and",
"information-sharing",
"is",
"important",
"in",
"defending",
"customers",
"against",
"this",
"complex",
"piece",
"of",
"malware",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
849 | [
"TUESDAY",
",",
"APRIL",
"9",
",",
"2019",
"Gustuff",
"banking",
"botnet",
"targets",
"Australia",
"EXECUTIVE",
"SUMMARY",
"Cisco",
"Talos",
"has",
"uncovered",
"a",
"new",
"Android-based",
"campaign",
"targeting",
"Australian",
"financial",
"institutions",
"."
] | [
10,
10,
10,
10,
10,
10,
1,
10,
10,
10,
10,
10,
10,
2,
7,
10,
10,
10,
10,
3,
10,
10,
10,
10,
10,
10
] |
850 | [
"As",
"the",
"investigation",
"progressed",
",",
"Talos",
"came",
"to",
"understand",
"that",
"this",
"campaign",
"was",
"associated",
"with",
"the",
"\"",
"ChristinaMorrow",
"''",
"text",
"message",
"spam",
"scam",
"previously",
"spotted",
"in",
"Australia",
"."
] | [
10,
10,
10,
10,
10,
2,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
851 | [
"Although",
"this",
"malware",
"'s",
"credential-harvest",
"mechanism",
"is",
"not",
"particularly",
"sophisticated",
",",
"it",
"does",
"have",
"an",
"advanced",
"self-preservation",
"mechanism",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
852 | [
"Even",
"though",
"this",
"is",
"not",
"a",
"traditional",
"remote",
"access",
"tool",
"(",
"RAT",
")",
",",
"this",
"campaign",
"seems",
"to",
"target",
"mainly",
"private",
"users",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
853 | [
"Aside",
"from",
"the",
"credential",
"stealing",
",",
"this",
"malware",
"also",
"includes",
"features",
"like",
"the",
"theft",
"of",
"users",
"'",
"contact",
"list",
",",
"collecting",
"phone",
"numbers",
"associated",
"names",
",",
"and",
"files",
"and",
"photos",
"on",
"the",
"device",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
854 | [
"But",
"that",
"does",
"n't",
"mean",
"companies",
"and",
"organizations",
"are",
"out",
"of",
"the",
"woods",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
855 | [
"They",
"should",
"still",
"be",
"on",
"the",
"lookout",
"for",
"these",
"kinds",
"of",
"trojans",
",",
"as",
"the",
"attackers",
"could",
"target",
"corporate",
"accounts",
"that",
"contain",
"large",
"amounts",
"of",
"money",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
856 | [
"The",
"information",
"collected",
"by",
"the",
"malware",
"and",
"the",
"control",
"over",
"the",
"victim",
"'s",
"mobile",
"device",
"allows",
"their",
"operators",
"to",
"perform",
"more",
"complex",
"social",
"engineering",
"attacks",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
857 | [
"A",
"motivated",
"attacker",
"can",
"use",
"this",
"trojan",
"to",
"harvest",
"usernames",
"and",
"passwords",
"and",
"then",
"reuse",
"them",
"to",
"login",
"into",
"the",
"organization",
"'s",
"system",
"where",
"the",
"victim",
"works",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
858 | [
"This",
"is",
"a",
"good",
"example",
"where",
"two-factor",
"authentication",
"based",
"on",
"SMS",
"would",
"fail",
"since",
"the",
"attacker",
"can",
"read",
"the",
"SMS",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
859 | [
"Corporations",
"can",
"protect",
"themselves",
"from",
"these",
"side-channel",
"attacks",
"by",
"deploying",
"client-based",
"two-factor",
"authentication",
",",
"such",
"as",
"Duo",
"Security",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
3,
8,
10
] |
860 | [
"One",
"of",
"the",
"most",
"impressive",
"features",
"of",
"this",
"malware",
"is",
"its",
"resilience",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
861 | [
"If",
"the",
"command",
"and",
"control",
"(",
"C2",
")",
"server",
"is",
"taken",
"down",
",",
"the",
"malicious",
"operator",
"can",
"still",
"recover",
"the",
"malware",
"control",
"by",
"sending",
"SMS",
"messages",
"directly",
"to",
"the",
"infected",
"devices",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
862 | [
"This",
"makes",
"the",
"taking",
"down",
"and",
"recovery",
"of",
"the",
"network",
"much",
"harder",
"and",
"poses",
"a",
"considerable",
"challenge",
"for",
"defenders",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
863 | [
"THE",
"CAMPAIGN",
"The",
"malware",
"'s",
"primary",
"infection",
"vector",
"is",
"SMS",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
864 | [
"Just",
"like",
"the",
"old-school",
"mail",
"worms",
"that",
"used",
"the",
"victim",
"'s",
"address",
"book",
"to",
"select",
"the",
"next",
"victims",
",",
"this",
"banking",
"trojan",
"'s",
"activation",
"cycle",
"includes",
"the",
"exfiltration",
"of",
"the",
"victim",
"'s",
"address",
"book",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
3,
8,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
865 | [
"The",
"trojan",
"will",
"receive",
"instructions",
"from",
"the",
"C2",
"to",
"spread",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
866 | [
"Spread",
"command",
"from",
"C2",
"The",
"victim",
"receives",
"the",
"command",
"sendSMSMass",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
867 | [
"Usually",
",",
"this",
"message",
"targets",
"four",
"or",
"five",
"people",
"at",
"a",
"time",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
868 | [
"The",
"body",
"contains",
"a",
"message",
"and",
"URL",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10
] |
869 | [
"Again",
",",
"the",
"concept",
"is",
"that",
"new",
"victims",
"are",
"more",
"likely",
"to",
"install",
"the",
"malware",
"if",
"the",
"SMS",
"comes",
"from",
"someone",
"they",
"know",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
870 | [
"When",
"a",
"victim",
"tries",
"to",
"access",
"the",
"URL",
"in",
"the",
"SMS",
"body",
",",
"the",
"C2",
"will",
"check",
"if",
"the",
"mobile",
"device",
"meets",
"the",
"criteria",
"to",
"receive",
"the",
"malware",
"(",
"see",
"infrastructure",
"section",
")",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
871 | [
"If",
"the",
"device",
"does",
"not",
"meet",
"the",
"criteria",
",",
"it",
"wo",
"n't",
"receive",
"any",
"data",
",",
"otherwise",
",",
"it",
"will",
"be",
"redirected",
"to",
"a",
"second",
"server",
"to",
"receive",
"a",
"copy",
"of",
"the",
"malware",
"to",
"install",
"on",
"their",
"device",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
872 | [
"The",
"domain",
"on",
"this",
"campaign",
"was",
"registered",
"on",
"Jan.",
"19",
",",
"2019",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
873 | [
"However",
",",
"Talos",
"has",
"identified",
"that",
"was",
"used",
"at",
"least",
"since",
"November",
"2018",
"."
] | [
10,
10,
2,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
874 | [
"During",
"the",
"investigation",
",",
"Talos",
"was",
"also",
"able",
"to",
"determine",
"that",
"the",
"same",
"infrastructure",
"has",
"been",
"used",
"to",
"deploy",
"similar",
"campaigns",
"using",
"different",
"versions",
"of",
"the",
"malware",
"."
] | [
10,
10,
10,
10,
2,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
875 | [
"Distribution",
"of",
"victims",
"."
] | [
10,
10,
10,
10
] |
876 | [
"Talos",
"assess",
"with",
"high",
"confidence",
"that",
"this",
"campaign",
"is",
"targeting",
"Australian",
"financial",
"institutions",
"based",
"on",
"several",
"factors",
"."
] | [
2,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
877 | [
"Our",
"Umbrella",
"telemetry",
"shows",
"that",
"the",
"majority",
"of",
"the",
"request",
"comes",
"from",
"Australia",
"and",
"the",
"majority",
"of",
"the",
"phone",
"numbers",
"infected",
"have",
"the",
"international",
"indicative",
"for",
"Australia",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
878 | [
"Finally",
",",
"the",
"specific",
"overlays",
"are",
"designed",
"for",
"Australian",
"financial",
"institutions",
",",
"and",
"Australia",
"is",
"one",
"of",
"the",
"geographic",
"regions",
"that",
"is",
"accepted",
"by",
"the",
"C2",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
879 | [
"DNS",
"queries",
"distribution",
"over",
"time",
"The",
"campaign",
"does",
"n't",
"seem",
"to",
"be",
"growing",
"at",
"a",
"fast",
"pace",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
880 | [
"Our",
"data",
"shows",
",",
"on",
"average",
",",
"about",
"three",
"requests",
"per",
"hour",
"to",
"the",
"drop",
"host",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
881 | [
"This",
"request",
"is",
"only",
"made",
"upon",
"installation",
",",
"but",
"there",
"is",
"no",
"guarantee",
"that",
"it",
"will",
"be",
"installed",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
882 | [
"This",
"data",
",",
"when",
"analyzed",
"with",
"the",
"number",
"of",
"commands",
"to",
"send",
"SMSs",
"that",
"Talos",
"received",
"during",
"the",
"investigation",
",",
"lead",
"us",
"to",
"conclude",
"that",
"the",
"malicious",
"operator",
"is",
"aggressively",
"spreading",
"the",
"malware",
",",
"but",
"that",
"does",
"n't",
"seem",
"to",
"result",
"in",
"the",
"same",
"number",
"of",
"new",
"infections",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
883 | [
"Examples",
"of",
"the",
"overlays",
"available",
"to",
"the",
"malware",
"Above",
",",
"you",
"can",
"see",
"examples",
"of",
"the",
"injections",
"that",
"distributed",
"to",
"the",
"malware",
"as",
"part",
"of",
"this",
"specific",
"campaign",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
884 | [
"While",
"doing",
"our",
"investigation",
"we",
"were",
"able",
"to",
"identify",
"other",
"malware",
"packages",
"with",
"different",
"names",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
885 | [
"Some",
"of",
"these",
"might",
"have",
"been",
"used",
"on",
"old",
"campaigns",
"or",
"were",
"already",
"prepared",
"for",
"new",
"campaigns",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
886 | [
"MALWARE",
"TECHNICAL",
"DETAILS",
"During",
"our",
"investigation",
",",
"researchers",
"uncovered",
"a",
"malware",
"known",
"as",
"\"",
"Gustuff.",
"''",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
1,
10,
10
] |
887 | [
"Given",
"the",
"lack",
"of",
"indicators",
"of",
"compromise",
",",
"we",
"decided",
"to",
"check",
"to",
"see",
"if",
"this",
"was",
"the",
"same",
"malware",
"we",
"had",
"been",
"researching",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
888 | [
"Our",
"Threat",
"Intelligence",
"and",
"Interdiction",
"team",
"found",
"the",
"Gustuff",
"malware",
"being",
"advertised",
"in",
"the",
"Exploit.in",
"forum",
"as",
"a",
"botnet",
"for",
"rent",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
1,
10,
10,
10,
10,
10,
0,
10,
10,
10,
10,
10,
10,
10
] |
889 | [
"The",
"seller",
",",
"known",
"as",
"\"",
"bestoffer",
",",
"''",
"was",
",",
"at",
"some",
"point",
",",
"expelled",
"from",
"the",
"forum",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
890 | [
"Gustuff",
"advertising",
"screenshot",
"The",
"companies",
"advertised",
"in",
"the",
"image",
"above",
"were",
"from",
"Australia",
",",
"which",
"matches",
"up",
"with",
"the",
"campaign",
"we",
"researched",
"."
] | [
1,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
891 | [
"The",
"screenshots",
"provided",
"by",
"the",
"author",
"align",
"with",
"the",
"advertised",
"features",
"and",
"the",
"features",
"that",
"we",
"discovered",
"while",
"doing",
"our",
"analysis",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
892 | [
"Admin",
"panel",
"The",
"administration",
"panel",
"shows",
"the",
"application",
"configuration",
",",
"which",
"matches",
"the",
"commands",
"from",
"the",
"C2",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
893 | [
"Country",
"selection",
"The",
"administration",
"console",
"screenshots",
"also",
"show",
"the",
"ability",
"to",
"filter",
"the",
"results",
"by",
"country",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
894 | [
"In",
"this",
"case",
",",
"\"",
"AU",
"''",
"is",
"the",
"code",
"shown",
",",
"which",
"is",
"Australia",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
7,
10,
10,
10,
10,
10,
10,
10,
10
] |
895 | [
"Based",
"on",
"this",
"information",
",",
"Talos",
"assesses",
"with",
"high",
"confidence",
"that",
"the",
"malware",
"is",
"the",
"same",
"and",
"this",
"is",
",",
"in",
"fact",
",",
"the",
"Gustuff",
"malware",
"."
] | [
10,
10,
10,
10,
10,
2,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
1,
10,
10
] |
896 | [
"Design",
"In",
"the",
"manifest",
",",
"the",
"malware",
"requests",
"a",
"large",
"number",
"of",
"permissions",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
897 | [
"However",
",",
"it",
"does",
"n't",
"request",
"permissions",
"like",
"BIND_ADMIN",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
898 | [
"To",
"perform",
"some",
"of",
"its",
"activities",
",",
"the",
"malware",
"does",
"not",
"need",
"high",
"privileges",
"inside",
"the",
"device",
",",
"as",
"we",
"will",
"explain",
"ahead",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |
899 | [
"Permissions",
"in",
"the",
"manifest",
"This",
"malware",
"is",
"designed",
"to",
"avoid",
"detection",
"and",
"analysis",
"."
] | [
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10,
10
] |