Type stringclasses 13 values | Text stringlengths 1 72 | Score float64 0.16 1 | Original Sentence stringlengths 0 829 |
|---|---|---|---|
Filename | rundll32.exe | 1 | |
Filename | rundll32.exe | 1 | |
Filename | rundll32.exe | 1 | |
Filename | rundll32.exe | 1 | |
Filename | rundll32.exe | 1 | |
Filename | rundll32.exe | 1 | |
Filename | sysprep.exe | 1 | |
Filename | regsvr32.exe | 1 | |
Filename | Update.exe | 1 | |
Filename | regsvr32.exe | 1 | |
Filename | cmd.exe | 1 | |
Filename | nsi.dll | 1 | |
Filename | netstat.exe | 1 | |
Filename | iphlpapi.dll | 1 | |
Filename | viewthread.php | 1 | |
Filename | ZhuDongFangYu.exe | 1 | |
Filename | showthread.php | 1 | |
Filename | HookSSDT.c.htm | 1 | |
Filename | netstat.exe | 1 | |
Filename | Iphlpapi.dll | 1 | |
Filename | nsi.dll | 1 | |
Filename | nsi.dll | 1 | |
Filename | NSI--nsiproxy.sys | 1 | |
Filename | nsiproxy.sys | 1 | |
Filename | netio.sys | 1 | |
Filename | netio.sys | 1 | |
Filename | nsiproxy.sys | 1 | |
Filepath | /Power, | 1 | |
Filepath | /Heavy | 1 | |
Filepath | /Federal | 1 | |
Filepath | /remediation/mitigation | 1 | |
Filepath | /ADD | 1 | |
Filepath | /keepalive | 1 | |
Filepath | /GS | 1 | |
Filepath | /s | 1 | |
Filepath | /u | 1 | |
Filepath | /u | 1 | |
Filepath | /encrypted | 1 | |
Filepath | /forum/login.cgi" | 1 | |
Filepath | /1.0 | 1 | |
Filepath | /1.1 | 1 | |
Filepath | /Photos/Query.cgi? | 1 | |
Filepath | /Catelog/login1.cgi". | 1 | |
Filepath | /IP | 1 | |
Filepath | /IP | 1 | |
Filepath | /IP | 1 | |
Filepath | //www.linkedin.com/profile/view? | 1 | |
Filepath | /value | 1 | |
Filepath | //www.360.cn/ | 1 | |
Filepath | //read.pudn.com/downloads197/sourcecode/windows/sys- | 1 | |
Filepath | //user.qzone.qq.com/50543533) | 1 | |
Filepath | //www.likego.com/en/about.asp), | 1 | |
Filepath | /video | 1 | |
Filepath | /obfuscation | 1 | |
Filepath | /k/a | 1 | |
Filepath | /k/a | 1 | |
Domain | sina.com | 1 | |
Domain | hotmail.com | 1 | |
Domain | mail.ustc.edu.cn | 1 | |
Domain | //forum.eviloctal.com | 1 | |
Domain | KeServiceDescriptorTable.Base | 1 | |
Domain | 126.com | 1 | |
Protocol | HTTP | 1 | |
Protocol | HTTP | 1 | |
Protocol | HTTP | 1 | |
Protocol | HTTP | 1 | |
Protocol | HTTP | 1 | |
Protocol | HTTP | 1 | |
Protocol | HTTP | 1 | |
Protocol | HTTP | 1 | |
Protocol | HTTP | 1 | |
Protocol | HTTP | 1 | |
Protocol | HTTP | 1 | |
Protocol | HTTP | 1 | |
Protocol | HTTP | 1 | |
Protocol | HTTP | 1 | |
Protocol | HTTP | 1 | |
Protocol | AES | 1 | |
Protocol | AES | 1 | |
Organization | CrowdStrike, Inc | 0.931062 | In late December 2011, CrowdStrike, Inc. |
Organization | Fortune 500 | 0.716294 | received three binary executable files that were suspected of having been involved in a sophisticted attack against a large Fortune 500 company . |
Malware | Derusbi | 0.808774 | Some AV engines occasionally identify this sample as Derusbi Trojan . |
Organization | CrowdStrike Intelligence | 0.981075 | CrowdStrike Intelligence Team has seen Trojans from 8 different builder variants of this RAT, including 64-bit versions, used in targeted attacks in 2011 against Defense, Energy/Power, and Chemical Industries in US and Japan . |
Organization | Defense | 0.961649 | CrowdStrike Intelligence Team has seen Trojans from 8 different builder variants of this RAT, including 64-bit versions, used in targeted attacks in 2011 against Defense, Energy/Power, and Chemical Industries in US and Japan . |
Organization | Energy | 0.805565 | CrowdStrike Intelligence Team has seen Trojans from 8 different builder variants of this RAT, including 64-bit versions, used in targeted attacks in 2011 against Defense, Energy/Power, and Chemical Industries in US and Japan . |
Organization | Defense Industrial Base (DIB | 0.973016 | All of these samples reflect common toolmarks and tradecraft consistent with Chinese based actors who target various strategic interests of the United States including High Tech/Heavy Industry, Non-Governmental Organizations (NGOs), State/Federal Government, Defense Industrial Base (DIB), and organizations with vast economic interests . |
Indicator | 14c04f88dc97aef3e9b516ef208a2bf5 | 0.724431 | The executable 14c04f88dc97aef3e9b516ef208a2bf5 is commonly referred to as a 'dropper', which is designed with the purpose of extracting from itself a malicious payload and to initialize and install it into a targeted system . |
Organization | Microsoft | 0.996499 | The sample first resolves several library functions provided by Microsoft using the LoadLibrary () and GetProcAddress () Application Programming Interfaces (APIs). |
Indicator | Library | 0.536606 | The sample first resolves several library functions provided by Microsoft using the LoadLibrary () and GetProcAddress () Application Programming Interfaces (APIs). |
Indicator | ProcAddress | 0.583226 | The sample first resolves several library functions provided by Microsoft using the LoadLibrary () and GetProcAddress () Application Programming Interfaces (APIs). |
Indicator | C | 0.733119 | A typical path is C: \Documents and Settings\All Users\Documents ." |
Indicator | \ | 0.750024 | A typical path is C: \Documents and Settings\All Users\Documents ." |
System | Google Chrome | 0.998665 | The dropper binary contains an icon resource that resembles the 'Google Chrome' browser icon, the re- source language is set to" Chinese (Simplified)", which is consistent with the builder of the tool systems language set to Chinese . |
System | Chrome | 0.997484 | The use of the Chrome icon may indicate a possible attempt to socially engineer the intended victim into thinking the dropper was a legitimate file associated with Google . |
Organization | Google | 0.996889 | The use of the Chrome icon may indicate a possible attempt to socially engineer the intended victim into thinking the dropper was a legitimate file associated with Google . |
Indicator | 14c04f88dc97aef3e9b516ef208a2bf | 0.73916 | This sample is a 'backdoor' which is the DLL dropped by the dropper sample file with an MD5 of 14c04f88dc97aef3e9b516ef208a2bf5 . |
System | Microsoft Windows | 0.989479 | This export first attempts to stop a service called" msupdate", which is not a known Microsoft Windows service despite the appearance . |
System | Windows | 0.996048 | During installation, the sample attempts to use documented APIs such as OpenSCManager () and CreateService () to initialize itself as a persistent Windows service . |
System | Windows Registr | 0.91419 | As a precaution, the sample writes settings directly to the Windows Registry to accomplish the same goal if installing the service with the documented APIs fails . |
Indicator | HKEYLOCALMACHINE\\SOFTWARE\\Microsoft\\ | 0.909728 | The next key to be changed is: HKEYLOCALMACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Svchost, which will have the 'msupdate' key set to 'msupdate' . |
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 7