instruction
stringclasses 4
values | input
stringlengths 47
5.51k
| output
stringclasses 833
values |
---|---|---|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Android
### Target Entity: Australia
### Text Passage:
Chameleon is an Android banking trojan that can leverage Android’s Accessibility Services to perform malicious activities. Believed to have been first active in January 2023, Chameleon has been observed targeting users in Australia and Poland by masquerading as official apps.
|
<related>NO</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
OBAD
### Target Entity: Android
### Text Passage:
OBAD is an Android malware family.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
SNUGRIDE
### Target Entity: C2
### Text Passage:
SNUGRIDE communicates-with its C2 server over HTTP.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Rancor
### Target Entity: PLAINTEE
### Text Passage:
PLAINTEE is a malware sample that has been used by Rancor in targeted attacks in Singapore and Cambodia.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
PLAINTEE
### Target Entity: Singapore
### Text Passage:
PLAINTEE is a malware sample that has been used by Rancor in targeted attacks in Singapore and Cambodia.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
PLAINTEE
### Target Entity: Cambodia
### Text Passage:
PLAINTEE is a malware sample that has been used by Rancor in targeted attacks in Singapore and Cambodia.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Pony
### Target Entity: Hancitor
### Text Passage:
Hancitor is a downloader that has been used by Pony and other information stealing malware.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
SMOKEDHAM
### Target Entity: Powershell
### Text Passage:
SMOKEDHAM has used Powershell to download UltraVNC and Ngrok from third-party file sharing sites.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
SMOKEDHAM
### Target Entity: UltraVNC
### Text Passage:
SMOKEDHAM has used Powershell to download UltraVNC and Ngrok from third-party file sharing sites.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
SMOKEDHAM
### Target Entity: Ngrok
### Text Passage:
SMOKEDHAM has used Powershell to download UltraVNC and Ngrok from third-party file sharing sites.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
PLATINUM
### Target Entity: adbupd
### Text Passage:
adbupd is a backdoor used by PLATINUM that is similar to Dipsind.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
adbupd
### Target Entity: PLATINUM
### Text Passage:
adbupd is a backdoor used by PLATINUM that is similar to Dipsind.
|
<related>NO</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Chinoxy
### Target Entity: Chinese
### Text Passage:
Chinoxy is a backdoor that has been used since at least November 2018, during the FunnyDream campaign, to gain persistence and drop additional payloads. According to security researchers, Chinoxy has been used by Chinese-speaking threat actors.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Chinese
### Target Entity: Chinoxy
### Text Passage:
Chinoxy is a backdoor that has been used since at least November 2018, during the FunnyDream campaign, to gain persistence and drop additional payloads. According to security researchers, Chinoxy has been used by Chinese-speaking threat actors.
|
<related>NO</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Wolf Research
### Target Entity: WolfRAT
### Text Passage:
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
WolfRAT
### Target Entity: Dendroid
### Text Passage:
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
WolfRAT
### Target Entity: Thai
### Text Passage:
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Dendroid
### Target Entity: Thai
### Text Passage:
WolfRAT is malware based on a leaked version of Dendroid that has primarily targeted Thai users. WolfRAT has most likely been operated by the now defunct organization Wolf Research.
|
<related>NO</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
WIREFIRE
### Target Entity: Python
### Text Passage:
WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
WIREFIRE
### Target Entity: Ivanti Connect Secure VPN
### Text Passage:
WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
visits.py
### Target Entity: Ivanti Connect Secure VPN
### Text Passage:
WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Ivanti Connect Secure VPN
### Target Entity: WIREFIRE
### Text Passage:
WIREFIRE is a web shell written in Python that exists as trojanized logic to the visits.py component of Ivanti Connect Secure VPN appliances. WIREFIRE was used during Cutting Edge for downloading files and command execution.
|
<related>NO</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
CHEMISTGAMES
### Target Entity: Sandworm Team
### Text Passage:
CHEMISTGAMES is a modular backdoor that has been deployed by Sandworm Team.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
FLIPSIDE
### Target Entity: RDP
### Text Passage:
FLIPSIDE uses RDP to tunnel traffic from a victim environment.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
BlackMould
### Target Entity: China Chopper
### Text Passage:
BlackMould is a web shell based on China Chopper for servers running Microsoft IIS. First reported in December 2019, it has been used in malicious campaigns by GALLIUM against telecommunication providers.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
BlackMould
### Target Entity: Microsoft IIS
### Text Passage:
BlackMould is a web shell based on China Chopper for servers running Microsoft IIS. First reported in December 2019, it has been used in malicious campaigns by GALLIUM against telecommunication providers.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
GALLIUM
### Target Entity: BlackMould
### Text Passage:
BlackMould is a web shell based on China Chopper for servers running Microsoft IIS. First reported in December 2019, it has been used in malicious campaigns by GALLIUM against telecommunication providers.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Dust Storm
### Target Entity: Mis-Type
### Text Passage:
Mis-Type is a backdoor hybrid that was used by Dust Storm in 2012.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
P8RAT
### Target Entity: VMware
### Text Passage:
P8RAT can check the compromised host for processes associated with VMware or VirtualBox environments.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
P8RAT
### Target Entity: VirtualBox
### Text Passage:
P8RAT can check the compromised host for processes associated with VMware or VirtualBox environments.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
VMware
### Target Entity: VirtualBox
### Text Passage:
P8RAT can check the compromised host for processes associated with VMware or VirtualBox environments.
|
<related>NO</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
ANDROMEDA
### Target Entity: C2
### Text Passage:
ANDROMEDA is commodity malware that was widespread in the early 2010's and continues to be observed in infections across a wide variety of industries. During the 2022 C0026 campaign, threat actors re-registered expired ANDROMEDA C2 domains to spread malware to select targets in Ukraine.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
ANDROMEDA
### Target Entity: Ukraine
### Text Passage:
ANDROMEDA is commodity malware that was widespread in the early 2010's and continues to be observed in infections across a wide variety of industries. During the 2022 C0026 campaign, threat actors re-registered expired ANDROMEDA C2 domains to spread malware to select targets in Ukraine.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Flagpro
### Target Entity: Windows
### Text Passage:
Flagpro is a Windows-based, first-stage downloader that has been used by BlackTech since at least October 2020. It has primarily been used against defense, media, and communications companies in Japan.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
BlackTech
### Target Entity: Flagpro
### Text Passage:
Flagpro is a Windows-based, first-stage downloader that has been used by BlackTech since at least October 2020. It has primarily been used against defense, media, and communications companies in Japan.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Flagpro
### Target Entity: Japan
### Text Passage:
Flagpro is a Windows-based, first-stage downloader that has been used by BlackTech since at least October 2020. It has primarily been used against defense, media, and communications companies in Japan.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Japan
### Target Entity: Flagpro
### Text Passage:
Flagpro is a Windows-based, first-stage downloader that has been used by BlackTech since at least October 2020. It has primarily been used against defense, media, and communications companies in Japan.
|
<related>NO</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
APT29
### Target Entity: WellMail
### Text Passage:
WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
WellMail
### Target Entity: Golang
### Text Passage:
WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
WellMail
### Target Entity: WellMess
### Text Passage:
WellMail is a lightweight malware written in Golang used by APT29, similar in design and structure to WellMess.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
HUI Loader
### Target Entity: China
### Text Passage:
HUI Loader is a custom DLL loader that has been used since at least 2015 by China-based threat groups including Cinnamon Tempest and menuPass to deploy malware on compromised hosts. HUI Loader has been observed in campaigns loading SodaMaster, PlugX, Cobalt Strike, Komplex, and several strains of ransomware.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Cinnamon Tempest
### Target Entity: HUI Loader
### Text Passage:
HUI Loader is a custom DLL loader that has been used since at least 2015 by China-based threat groups including Cinnamon Tempest and menuPass to deploy malware on compromised hosts. HUI Loader has been observed in campaigns loading SodaMaster, PlugX, Cobalt Strike, Komplex, and several strains of ransomware.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
menuPass
### Target Entity: HUI Loader
### Text Passage:
HUI Loader is a custom DLL loader that has been used since at least 2015 by China-based threat groups including Cinnamon Tempest and menuPass to deploy malware on compromised hosts. HUI Loader has been observed in campaigns loading SodaMaster, PlugX, Cobalt Strike, Komplex, and several strains of ransomware.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
HUI Loader
### Target Entity: SodaMaster
### Text Passage:
HUI Loader is a custom DLL loader that has been used since at least 2015 by China-based threat groups including Cinnamon Tempest and menuPass to deploy malware on compromised hosts. HUI Loader has been observed in campaigns loading SodaMaster, PlugX, Cobalt Strike, Komplex, and several strains of ransomware.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
HUI Loader
### Target Entity: PlugX
### Text Passage:
HUI Loader is a custom DLL loader that has been used since at least 2015 by China-based threat groups including Cinnamon Tempest and menuPass to deploy malware on compromised hosts. HUI Loader has been observed in campaigns loading SodaMaster, PlugX, Cobalt Strike, Komplex, and several strains of ransomware.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
HUI Loader
### Target Entity: Cobalt Strike
### Text Passage:
HUI Loader is a custom DLL loader that has been used since at least 2015 by China-based threat groups including Cinnamon Tempest and menuPass to deploy malware on compromised hosts. HUI Loader has been observed in campaigns loading SodaMaster, PlugX, Cobalt Strike, Komplex, and several strains of ransomware.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
HUI Loader
### Target Entity: Komplex
### Text Passage:
HUI Loader is a custom DLL loader that has been used since at least 2015 by China-based threat groups including Cinnamon Tempest and menuPass to deploy malware on compromised hosts. HUI Loader has been observed in campaigns loading SodaMaster, PlugX, Cobalt Strike, Komplex, and several strains of ransomware.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
SodaMaster
### Target Entity: China
### Text Passage:
HUI Loader is a custom DLL loader that has been used since at least 2015 by China-based threat groups including Cinnamon Tempest and menuPass to deploy malware on compromised hosts. HUI Loader has been observed in campaigns loading SodaMaster, PlugX, Cobalt Strike, Komplex, and several strains of ransomware.
|
<related>NO</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
ELMER
### Target Entity: Delphi
### Text Passage:
ELMER is a non-persistent, proxy-aware HTTP backdoor written in Delphi that has been used by APT16.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
APT16
### Target Entity: ELMER
### Text Passage:
ELMER is a non-persistent, proxy-aware HTTP backdoor written in Delphi that has been used by APT16.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
UNC3890
### Target Entity: SUGARDUMP
### Text Passage:
SUGARDUMP is a proprietary browser credential harvesting tool that was used by UNC3890 during the C0010 campaign. The first known SUGARDUMP version was used since at least early 2021, a second SMTP C2 version was used from late 2021-early 2022, and a third HTTP C2 variant was used since at least April 2022.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
C0010
### Target Entity: UNC3890
### Text Passage:
SUGARDUMP is a proprietary browser credential harvesting tool that was used by UNC3890 during the C0010 campaign. The first known SUGARDUMP version was used since at least early 2021, a second SMTP C2 version was used from late 2021-early 2022, and a third HTTP C2 variant was used since at least April 2022.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
SUGARDUMP
### Target Entity: C2
### Text Passage:
SUGARDUMP is a proprietary browser credential harvesting tool that was used by UNC3890 during the C0010 campaign. The first known SUGARDUMP version was used since at least early 2021, a second SMTP C2 version was used from late 2021-early 2022, and a third HTTP C2 variant was used since at least April 2022.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
AutoIt
### Target Entity: PowerShell
### Text Passage:
AutoIt backdoor downloads a PowerShell script that decodes to a typical shellcode loader.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
ZxxZ
### Target Entity: C++
### Text Passage:
ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
BITTER
### Target Entity: ZxxZ
### Text Passage:
ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
ZxxZ
### Target Entity: Bangladeshi
### Text Passage:
ZxxZ is a trojan written in Visual C++ that has been used by BITTER since at least August 2021, including against Bangladeshi government personnel.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Evil Eye
### Target Entity: INSOMNIA
### Text Passage:
INSOMNIA is spyware that has been used by the group Evil Eye.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
GPlayed
### Target Entity: Android
### Text Passage:
GPlayed is an Android trojan with a broad range of capabilities.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
EnvyScout
### Target Entity: Rundll32
### Text Passage:
EnvyScout has the ability to proxy execution of malicious files with Rundll32.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
RAPIDPULSE
### Target Entity: Pulse Secure
### Text Passage:
RAPIDPULSE is a web shell that exists as a modification to a legitimate Pulse Secure file that has been used by APT5 since at least 2021.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
APT5
### Target Entity: RAPIDPULSE
### Text Passage:
RAPIDPULSE is a web shell that exists as a modification to a legitimate Pulse Secure file that has been used by APT5 since at least 2021.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
TA505
### Target Entity: Get2
### Text Passage:
Get2 is a downloader written in C++ that has been used by TA505 to deliver FlawedGrace, FlawedAmmyy, Snatch and SDBbot.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Get2
### Target Entity: FlawedGrace
### Text Passage:
Get2 is a downloader written in C++ that has been used by TA505 to deliver FlawedGrace, FlawedAmmyy, Snatch and SDBbot.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Get2
### Target Entity: FlawedAmmyy
### Text Passage:
Get2 is a downloader written in C++ that has been used by TA505 to deliver FlawedGrace, FlawedAmmyy, Snatch and SDBbot.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Get2
### Target Entity: Snatch
### Text Passage:
Get2 is a downloader written in C++ that has been used by TA505 to deliver FlawedGrace, FlawedAmmyy, Snatch and SDBbot.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Get2
### Target Entity: SDBbot
### Text Passage:
Get2 is a downloader written in C++ that has been used by TA505 to deliver FlawedGrace, FlawedAmmyy, Snatch and SDBbot.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
FlawedAmmyy
### Target Entity: FlawedGrace
### Text Passage:
Get2 is a downloader written in C++ that has been used by TA505 to deliver FlawedGrace, FlawedAmmyy, Snatch and SDBbot.
|
<related>NO</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Skygofree
### Target Entity: Android
### Text Passage:
Skygofree is Android spyware that is believed to have been developed in 2014 and used through at least 2017.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Misdat
### Target Entity: Borland Delphi
### Text Passage:
Many Misdat samples were programmed using Borland Delphi, which will mangle the default PE compile timestamp of a file.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
BBSRAT
### Target Entity: Expand
### Text Passage:
BBSRAT uses Expand to decompress a CAB file into executable content.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
NGLite
### Target Entity: C2
### Text Passage:
NGLite is a backdoor Trojan that is only capable of running commands received through its C2 channel. While the capabilities are standard for a backdoor, NGLite uses a novel C2 channel that leverages a decentralized network based on the legitimate NKN to communicate between the backdoor and the actors.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Wingbird
### Target Entity: FinFisher
### Text Passage:
FinFisher is a government-grade commercial surveillance spyware reportedly sold exclusively to government agencies for use in targeted and lawful criminal investigations. It is heavily obfuscated and uses multiple anti-analysis techniques. It has other variants including Wingbird.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Evilnum
### Target Entity: EVILNUM
### Text Passage:
EVILNUM is fully capable backdoor that was first identified in 2018. EVILNUM is used by the APT group Evilnum which has the same name.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Group5
### Target Entity: Iranian
### Text Passage:
Group5 is a threat group with a suspected Iranian nexus, though this attribution is not definite. The group has targeted individuals connected to the Syrian opposition via spearphishing and watering holes, normally using Syrian and Iranian themes. Group5 has used two commonly available remote access tools (RATs), njRAT and NanoCore, as well as an Android RAT, DroidJack.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Group5
### Target Entity: Syrian
### Text Passage:
Group5 is a threat group with a suspected Iranian nexus, though this attribution is not definite. The group has targeted individuals connected to the Syrian opposition via spearphishing and watering holes, normally using Syrian and Iranian themes. Group5 has used two commonly available remote access tools (RATs), njRAT and NanoCore, as well as an Android RAT, DroidJack.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Group5
### Target Entity: njRAT
### Text Passage:
Group5 is a threat group with a suspected Iranian nexus, though this attribution is not definite. The group has targeted individuals connected to the Syrian opposition via spearphishing and watering holes, normally using Syrian and Iranian themes. Group5 has used two commonly available remote access tools (RATs), njRAT and NanoCore, as well as an Android RAT, DroidJack.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Group5
### Target Entity: NanoCore
### Text Passage:
Group5 is a threat group with a suspected Iranian nexus, though this attribution is not definite. The group has targeted individuals connected to the Syrian opposition via spearphishing and watering holes, normally using Syrian and Iranian themes. Group5 has used two commonly available remote access tools (RATs), njRAT and NanoCore, as well as an Android RAT, DroidJack.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Group5
### Target Entity: DroidJack
### Text Passage:
Group5 is a threat group with a suspected Iranian nexus, though this attribution is not definite. The group has targeted individuals connected to the Syrian opposition via spearphishing and watering holes, normally using Syrian and Iranian themes. Group5 has used two commonly available remote access tools (RATs), njRAT and NanoCore, as well as an Android RAT, DroidJack.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
DroidJack
### Target Entity: Android
### Text Passage:
Group5 is a threat group with a suspected Iranian nexus, though this attribution is not definite. The group has targeted individuals connected to the Syrian opposition via spearphishing and watering holes, normally using Syrian and Iranian themes. Group5 has used two commonly available remote access tools (RATs), njRAT and NanoCore, as well as an Android RAT, DroidJack.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Android
### Target Entity: Syrian
### Text Passage:
Group5 is a threat group with a suspected Iranian nexus, though this attribution is not definite. The group has targeted individuals connected to the Syrian opposition via spearphishing and watering holes, normally using Syrian and Iranian themes. Group5 has used two commonly available remote access tools (RATs), njRAT and NanoCore, as well as an Android RAT, DroidJack.
|
<related>NO</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Chimera
### Target Entity: Windows admin shares
### Text Passage:
Chimera has used Windows admin shares to move laterally.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Chimera
### Target Entity: Windows
### Text Passage:
Chimera has used Windows admin shares to move laterally.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Chaes
### Target Entity: windows
### Text Passage:
Chaes has added persistence via the Registry key software\microsoft\windows\currentversion\run\microsoft windows html help.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
windows
### Target Entity: software\microsoft\windows\currentversion\run\microsoft windows html help
### Text Passage:
Chaes has added persistence via the Registry key software\microsoft\windows\currentversion\run\microsoft windows html help.
|
<related>NO</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
AbstractEmu
### Target Entity: Google Play
### Text Passage:
AbstractEmu is mobile malware that was first seen in Google Play and other third-party stores in October 2021. It was discovered in 19 Android applications, of which at least 7 abused known Android exploits for obtaining root permissions. AbstractEmu was observed primarily impacting users in the United States, however victims are believed to be across a total of 17 countries.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
AbstractEmu
### Target Entity: Android
### Text Passage:
AbstractEmu is mobile malware that was first seen in Google Play and other third-party stores in October 2021. It was discovered in 19 Android applications, of which at least 7 abused known Android exploits for obtaining root permissions. AbstractEmu was observed primarily impacting users in the United States, however victims are believed to be across a total of 17 countries.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
AbstractEmu
### Target Entity: United States
### Text Passage:
AbstractEmu is mobile malware that was first seen in Google Play and other third-party stores in October 2021. It was discovered in 19 Android applications, of which at least 7 abused known Android exploits for obtaining root permissions. AbstractEmu was observed primarily impacting users in the United States, however victims are believed to be across a total of 17 countries.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Android
### Target Entity: Google Play
### Text Passage:
AbstractEmu is mobile malware that was first seen in Google Play and other third-party stores in October 2021. It was discovered in 19 Android applications, of which at least 7 abused known Android exploits for obtaining root permissions. AbstractEmu was observed primarily impacting users in the United States, however victims are believed to be across a total of 17 countries.
|
<related>NO</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
OneDrive
### Target Entity: PowerStallion
### Text Passage:
PowerStallion uses a XOR cipher to encrypt command output written to its OneDrive C2 server.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
PowerStallion
### Target Entity: C2
### Text Passage:
PowerStallion uses a XOR cipher to encrypt command output written to its OneDrive C2 server.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
DnsSystem
### Target Entity: .NET
### Text Passage:
DnsSystem is a .NET based DNS backdoor, which is a customized version of the open source tool DIG.net, that has been used by HEXANE since at least June 2022.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
DnsSystem
### Target Entity: DIG.net
### Text Passage:
DnsSystem is a .NET based DNS backdoor, which is a customized version of the open source tool DIG.net, that has been used by HEXANE since at least June 2022.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
HEXANE
### Target Entity: DnsSystem
### Text Passage:
DnsSystem is a .NET based DNS backdoor, which is a customized version of the open source tool DIG.net, that has been used by HEXANE since at least June 2022.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
DIG.net
### Target Entity: .NET
### Text Passage:
DnsSystem is a .NET based DNS backdoor, which is a customized version of the open source tool DIG.net, that has been used by HEXANE since at least June 2022.
|
<related>NO</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Adups
### Target Entity: Android
### Text Passage:
Adups is software that was pre-installed onto Android devices, including those made by BLU Products. The software was reportedly designed to help a Chinese phone manufacturer monitor user behavior, transferring sensitive data to a Chinese server.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Adups
### Target Entity: Chinese
### Text Passage:
Adups is software that was pre-installed onto Android devices, including those made by BLU Products. The software was reportedly designed to help a Chinese phone manufacturer monitor user behavior, transferring sensitive data to a Chinese server.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Android
### Target Entity: BLU Products
### Text Passage:
Adups is software that was pre-installed onto Android devices, including those made by BLU Products. The software was reportedly designed to help a Chinese phone manufacturer monitor user behavior, transferring sensitive data to a Chinese server.
|
<related>NO</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
Aoqin Dragon
### Target Entity: Mongall
### Text Passage:
Mongall is a backdoor that has been used since at least 2013, including by Aoqin Dragon.
|
<related>YES</related>
|
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO.
Answer in the following format: <related>YES or NO</related>
|
### Source Entity:
NDiskMonitor
### Target Entity: C2
### Text Passage:
NDiskMonitor obtains the victim username and encrypts the information to send over its C2 channel.
|
<related>YES</related>
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.