instruction
stringclasses
4 values
input
stringlengths
47
5.51k
output
stringclasses
833 values
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Anubis ### Target Entity: Android ### Text Passage: Anubis is Android malware that was originally used for cyber espionage, and has been retooled as a banking trojan.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: InvisiMole ### Target Entity: InvisiMole ### Text Passage: InvisiMole is a modular spyware program that has been used by the InvisiMole Group since at least 2013. InvisiMole has two backdoor modules called RC2FM and RC2CL that are used to perform post-exploitation activities. It has been discovered on compromised victims in the Ukraine and Russia. Gamaredon Group infrastructure has been used to download and execute InvisiMole against a small number of victims.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: InvisiMole ### Target Entity: Ukraine ### Text Passage: InvisiMole is a modular spyware program that has been used by the InvisiMole Group since at least 2013. InvisiMole has two backdoor modules called RC2FM and RC2CL that are used to perform post-exploitation activities. It has been discovered on compromised victims in the Ukraine and Russia. Gamaredon Group infrastructure has been used to download and execute InvisiMole against a small number of victims.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: InvisiMole ### Target Entity: Russia ### Text Passage: InvisiMole is a modular spyware program that has been used by the InvisiMole Group since at least 2013. InvisiMole has two backdoor modules called RC2FM and RC2CL that are used to perform post-exploitation activities. It has been discovered on compromised victims in the Ukraine and Russia. Gamaredon Group infrastructure has been used to download and execute InvisiMole against a small number of victims.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Gamaredon ### Target Entity: InvisiMole ### Text Passage: InvisiMole is a modular spyware program that has been used by the InvisiMole Group since at least 2013. InvisiMole has two backdoor modules called RC2FM and RC2CL that are used to perform post-exploitation activities. It has been discovered on compromised victims in the Ukraine and Russia. Gamaredon Group infrastructure has been used to download and execute InvisiMole against a small number of victims.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: HKU\SOFTWARE\Microsoft\CTF ### Target Entity: Microsoft ### Text Passage: TEARDROP checked that HKU\SOFTWARE\Microsoft\CTF existed before decoding its embedded payload.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: AsyncRAT ### Target Entity: Snip3 ### Text Passage: Snip3 is a sophisticated crypter-as-a-service that has been used since at least 2021 to obfuscate and load numerous strains of malware including AsyncRAT, Revenge RAT, Agent Tesla, and NETWIRE.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Revenge RAT ### Target Entity: Snip3 ### Text Passage: Snip3 is a sophisticated crypter-as-a-service that has been used since at least 2021 to obfuscate and load numerous strains of malware including AsyncRAT, Revenge RAT, Agent Tesla, and NETWIRE.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Agent Tesla ### Target Entity: Snip3 ### Text Passage: Snip3 is a sophisticated crypter-as-a-service that has been used since at least 2021 to obfuscate and load numerous strains of malware including AsyncRAT, Revenge RAT, Agent Tesla, and NETWIRE.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: NETWIRE ### Target Entity: Snip3 ### Text Passage: Snip3 is a sophisticated crypter-as-a-service that has been used since at least 2021 to obfuscate and load numerous strains of malware including AsyncRAT, Revenge RAT, Agent Tesla, and NETWIRE.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Revenge RAT ### Target Entity: AsyncRAT ### Text Passage: Snip3 is a sophisticated crypter-as-a-service that has been used since at least 2021 to obfuscate and load numerous strains of malware including AsyncRAT, Revenge RAT, Agent Tesla, and NETWIRE.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Pegasus ### Target Entity: Android ### Text Passage: Pegasus for Android is the Android version of malware that has reportedly been linked to the NSO Group.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Pegasus ### Target Entity: NSO Group ### Text Passage: Pegasus for Android is the Android version of malware that has reportedly been linked to the NSO Group.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Aoqin Dragon ### Target Entity: Heyoka Backdoor ### Text Passage: Heyoka Backdoor is a custom backdoor--based on the Heyoka open source exfiltration tool--that has been used by Aoqin Dragon since at least 2013.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Heyoka Backdoor ### Target Entity: Heyoka ### Text Passage: Heyoka Backdoor is a custom backdoor--based on the Heyoka open source exfiltration tool--that has been used by Aoqin Dragon since at least 2013.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Heyoka Backdoor ### Target Entity: Aoqin Dragon ### Text Passage: Heyoka Backdoor is a custom backdoor--based on the Heyoka open source exfiltration tool--that has been used by Aoqin Dragon since at least 2013.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: KeyRaider ### Target Entity: iOS ### Text Passage: KeyRaider is malware that steals Apple account credentials and other data from jailbroken iOS devices. It also has ransomware functionality.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: KillDisk ### Target Entity: VMProtect ### Text Passage: KillDisk uses VMProtect to make reverse engineering the malware more difficult.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Carbanak ### Target Entity: Carberp ### Text Passage: Carberp is a credential and information stealing malware that has been active since at least 2009. Carberp's source code was leaked online in 2013, and subsequently used as the foundation for the Carbanak backdoor.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Goopy ### Target Entity: Windows ### Text Passage: Goopy is a Windows backdoor and Trojan used by APT32 and shares several similarities to another backdoor used by the group (Denis). Goopy is named for its impersonation of the legitimate Google Updater executable.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: APT32 ### Target Entity: Goopy ### Text Passage: Goopy is a Windows backdoor and Trojan used by APT32 and shares several similarities to another backdoor used by the group (Denis). Goopy is named for its impersonation of the legitimate Google Updater executable.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Goopy ### Target Entity: Google ### Text Passage: Goopy is a Windows backdoor and Trojan used by APT32 and shares several similarities to another backdoor used by the group (Denis). Goopy is named for its impersonation of the legitimate Google Updater executable.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Windows ### Target Entity: APT32 ### Text Passage: Goopy is a Windows backdoor and Trojan used by APT32 and shares several similarities to another backdoor used by the group (Denis). Goopy is named for its impersonation of the legitimate Google Updater executable.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: BRONZE BUTLER ### Target Entity: ABK ### Text Passage: ABK is a downloader that has been used by BRONZE BUTLER since at least 2019.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: TRITON ### Target Entity: Middle East ### Text Passage: This entry was deprecated as it was inadvertently added to Enterprise; a similar Software entry was created for ATT&CK for ICS. TRITON is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers. TRITON was deployed against at least one target in the Middle East.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: TRITON ### Target Entity: Triconex Safety Instrumented System ### Text Passage: This entry was deprecated as it was inadvertently added to Enterprise; a similar Software entry was created for ATT&CK for ICS. TRITON is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers. TRITON was deployed against at least one target in the Middle East.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Triconex Safety Instrumented System ### Target Entity: TRITON ### Text Passage: This entry was deprecated as it was inadvertently added to Enterprise; a similar Software entry was created for ATT&CK for ICS. TRITON is an attack framework built to interact with Triconex Safety Instrumented System (SIS) controllers. TRITON was deployed against at least one target in the Middle East.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: MacMa ### Target Entity: macOS ### Text Passage: MacMa is a macOS-based backdoor with a large set of functionalities to control and exfiltrate files from a compromised computer. MacMa has been observed in the wild since November 2021.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: ISMInjector ### Target Entity: SmartAssembly ### Text Passage: ISMInjector is obfuscated with the off-the-shelf SmartAssembly .NET obfuscator created by red-gate.com.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: red-gate.com ### Target Entity: ISMInjector ### Text Passage: ISMInjector is obfuscated with the off-the-shelf SmartAssembly .NET obfuscator created by red-gate.com.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: LiteDuke ### Target Entity: Firefox ### Text Passage: LiteDuke has the ability to discover the proxy configuration of Firefox and/or Opera.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: LiteDuke ### Target Entity: Opera ### Text Passage: LiteDuke has the ability to discover the proxy configuration of Firefox and/or Opera.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Firefox ### Target Entity: Opera ### Text Passage: LiteDuke has the ability to discover the proxy configuration of Firefox and/or Opera.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: AndroidOS/MalLocker.B ### Target Entity: Android ### Text Passage: AndroidOS/MalLocker.B is a variant of a ransomware family targeting Android devices. It prevents the user from interacting with the UI by displaying a screen containing a ransom note over all other windows.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: HilalRAT ### Target Entity: Android ### Text Passage: HilalRAT is a remote access-capable Android malware, developed and used by UNC788.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: UNC788 ### Target Entity: HilalRAT ### Text Passage: HilalRAT is a remote access-capable Android malware, developed and used by UNC788.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: UNC788 ### Target Entity: Android ### Text Passage: HilalRAT is a remote access-capable Android malware, developed and used by UNC788.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: CarbonSteal ### Target Entity: C2 ### Text Passage: CarbonSteal is one of a family of four surveillanceware tools that share a common C2 infrastructure. CarbonSteal primarily deals with audio surveillance.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: CSPY Downloader ### Target Entity: schtasks ### Text Passage: CSPY Downloader can use the schtasks utility to bypass UAC.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: APT-C-23 ### Target Entity: Phenakite ### Text Passage: Phenakite is a mobile malware that is used by APT-C-23 to target iOS devices. According to several reports, Phenakite was developed to fill a tooling gap and to target those who owned iPhones instead of Windows desktops or Android phones.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Phenakite ### Target Entity: iOS ### Text Passage: Phenakite is a mobile malware that is used by APT-C-23 to target iOS devices. According to several reports, Phenakite was developed to fill a tooling gap and to target those who owned iPhones instead of Windows desktops or Android phones.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Android ### Target Entity: APT-C-23 ### Text Passage: Phenakite is a mobile malware that is used by APT-C-23 to target iOS devices. According to several reports, Phenakite was developed to fill a tooling gap and to target those who owned iPhones instead of Windows desktops or Android phones.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: RCSession ### Target Entity: C++ ### Text Passage: RCSession is a backdoor written in C++ that has been in use since at least 2018 by Mustang Panda and by Threat Group-3390 (Type II Backdoor).
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Mustang Panda ### Target Entity: RCSession ### Text Passage: RCSession is a backdoor written in C++ that has been in use since at least 2018 by Mustang Panda and by Threat Group-3390 (Type II Backdoor).
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Threat Group-3390 ### Target Entity: RCSession ### Text Passage: RCSession is a backdoor written in C++ that has been in use since at least 2018 by Mustang Panda and by Threat Group-3390 (Type II Backdoor).
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Threat Group-3390 ### Target Entity: C++ ### Text Passage: RCSession is a backdoor written in C++ that has been in use since at least 2018 by Mustang Panda and by Threat Group-3390 (Type II Backdoor).
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: WireLurker ### Target Entity: macOS ### Text Passage: WireLurker is a family of macOS malware that targets iOS devices connected over USB.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: WireLurker ### Target Entity: iOS ### Text Passage: WireLurker is a family of macOS malware that targets iOS devices connected over USB.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: macOS ### Target Entity: iOS ### Text Passage: WireLurker is a family of macOS malware that targets iOS devices connected over USB.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: TA551 ### Target Entity: Ursnif ### Text Passage: It is known by other security firms as Shathak. Proofpoint assesses with high confidence TA551 gains access to stolen messages or compromised email accounts – also known as thread hijacking – which it uses in email campaigns to distribute malware. TA551 has previously distributed malware payloads such as Ursnif, IcedID, Qbot, and Emotet.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: TA551 ### Target Entity: IcedID ### Text Passage: It is known by other security firms as Shathak. Proofpoint assesses with high confidence TA551 gains access to stolen messages or compromised email accounts – also known as thread hijacking – which it uses in email campaigns to distribute malware. TA551 has previously distributed malware payloads such as Ursnif, IcedID, Qbot, and Emotet.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: TA551 ### Target Entity: Qbot ### Text Passage: It is known by other security firms as Shathak. Proofpoint assesses with high confidence TA551 gains access to stolen messages or compromised email accounts – also known as thread hijacking – which it uses in email campaigns to distribute malware. TA551 has previously distributed malware payloads such as Ursnif, IcedID, Qbot, and Emotet.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: TA551 ### Target Entity: Emotet ### Text Passage: It is known by other security firms as Shathak. Proofpoint assesses with high confidence TA551 gains access to stolen messages or compromised email accounts – also known as thread hijacking – which it uses in email campaigns to distribute malware. TA551 has previously distributed malware payloads such as Ursnif, IcedID, Qbot, and Emotet.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Emotet ### Target Entity: Shathak ### Text Passage: It is known by other security firms as Shathak. Proofpoint assesses with high confidence TA551 gains access to stolen messages or compromised email accounts – also known as thread hijacking – which it uses in email campaigns to distribute malware. TA551 has previously distributed malware payloads such as Ursnif, IcedID, Qbot, and Emotet.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Corona Updates ### Target Entity: Android ### Text Passage: Corona Updates is Android spyware that took advantage of the Coronavirus pandemic. The campaign distributing this spyware is tracked as Project Spy. Multiple variants of this spyware have been discovered to have been hosted on the Google Play Store.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Project Spy ### Target Entity: Google Play ### Text Passage: Corona Updates is Android spyware that took advantage of the Coronavirus pandemic. The campaign distributing this spyware is tracked as Project Spy. Multiple variants of this spyware have been discovered to have been hosted on the Google Play Store.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Helminth ### Target Entity: C2 ### Text Passage: Helminth splits data into chunks up to 23 bytes and sends the data in DNS queries to its C2 server.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Daserf ### Target Entity: Mimikatz ### Text Passage: Daserf leverages Mimikatz and Windows Credential Editor to steal credentials.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Daserf ### Target Entity: Windows Credential Editor ### Text Passage: Daserf leverages Mimikatz and Windows Credential Editor to steal credentials.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Rover ### Target Entity: C2 ### Text Passage: Rover automatically searches for files on local drives based on a predefined list of file extensions and sends them to the command and control server every 60 minutes. Rover also automatically sends keylogger files and screenshots to the C2 server on a regular timeframe.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Wizard Spider ### Target Entity: Rubeus ### Text Passage: Wizard Spider has used Rubeus, MimiKatz Kerberos module, and the Invoke-Kerberoast cmdlet to steal AES hashes.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Wizard Spider ### Target Entity: MimiKatz Kerberos ### Text Passage: Wizard Spider has used Rubeus, MimiKatz Kerberos module, and the Invoke-Kerberoast cmdlet to steal AES hashes.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Wizard Spider ### Target Entity: nvoke-Kerberoast cmdlet ### Text Passage: Wizard Spider has used Rubeus, MimiKatz Kerberos module, and the Invoke-Kerberoast cmdlet to steal AES hashes.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Lizar ### Target Entity: .NET ### Text Passage: Lizar is a modular remote access tool written using the .NET Framework that shares structural similarities to Carbanak. It has likely been used by FIN7 since at least February 2021.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Lizar ### Target Entity: Carbanak ### Text Passage: Lizar is a modular remote access tool written using the .NET Framework that shares structural similarities to Carbanak. It has likely been used by FIN7 since at least February 2021.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: FIN7 ### Target Entity: Lizar ### Text Passage: Lizar is a modular remote access tool written using the .NET Framework that shares structural similarities to Carbanak. It has likely been used by FIN7 since at least February 2021.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: FIN7 ### Target Entity: .NET ### Text Passage: Lizar is a modular remote access tool written using the .NET Framework that shares structural similarities to Carbanak. It has likely been used by FIN7 since at least February 2021.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Peirates ### Target Entity: Kubernetes ### Text Passage: Peirates is a post-exploitation Kubernetes exploitation framework with a focus on gathering service account tokens for lateral movement and privilege escalation. The tool is written in GoLang and publicly available on GitHub.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Peirates ### Target Entity: GoLang ### Text Passage: Peirates is a post-exploitation Kubernetes exploitation framework with a focus on gathering service account tokens for lateral movement and privilege escalation. The tool is written in GoLang and publicly available on GitHub.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Peirates ### Target Entity: GitHub ### Text Passage: Peirates is a post-exploitation Kubernetes exploitation framework with a focus on gathering service account tokens for lateral movement and privilege escalation. The tool is written in GoLang and publicly available on GitHub.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Ramsay ### Target Entity: AppInit ### Text Passage: Ramsay can insert itself into the address space of other applications using the AppInit DLL Registry key.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: FakeSpy ### Target Entity: Android ### Text Passage: FakeSpy is Android spyware that has been operated by the Chinese threat actor behind the Roaming Mantis campaigns.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: FakeSpy ### Target Entity: Chinese ### Text Passage: FakeSpy is Android spyware that has been operated by the Chinese threat actor behind the Roaming Mantis campaigns.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Android ### Target Entity: Roaming Mantis ### Text Passage: FakeSpy is Android spyware that has been operated by the Chinese threat actor behind the Roaming Mantis campaigns.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Spark ### Target Entity: cmd.exe ### Text Passage: Spark can use cmd.exe to run commands.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Ruler ### Target Entity: Outlook ### Text Passage: Ruler can be used to automate the abuse of Outlook Home Pages to establish persistence.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: certutil ### Target Entity: KONNI ### Text Passage: KONNI has used certutil to download and decode base64 encoded strings.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Action RAT ### Target Entity: Delphi ### Text Passage: Action RAT is a remote access tool written in Delphi that has been used by SideCopy since at least December 2021 against Indian and Afghani government personnel.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: SideCopy ### Target Entity: Action RAT ### Text Passage: Action RAT is a remote access tool written in Delphi that has been used by SideCopy since at least December 2021 against Indian and Afghani government personnel.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Action RAT ### Target Entity: Indian ### Text Passage: Action RAT is a remote access tool written in Delphi that has been used by SideCopy since at least December 2021 against Indian and Afghani government personnel.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Action RAT ### Target Entity: Afghani ### Text Passage: Action RAT is a remote access tool written in Delphi that has been used by SideCopy since at least December 2021 against Indian and Afghani government personnel.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Rotexy ### Target Entity: Android ### Text Passage: Rotexy is an Android banking malware that has evolved over several years. It was originally an SMS spyware Trojan first spotted in October 2014, and since then has evolved to contain more features, including ransomware functionality.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: China ### Target Entity: Cuba ### Text Passage: The COVID-19 pandemic and consequent lockdowns has also interrupted global supply chains, highlighting global interdependencies and pushing states to enhance home-grown industries. For example, the Monetary Authority of Singapore (MAS) recently imposed measures which require all financial institutions to assess supplier third-party technology vendors, ranging from an evaluation of security measures to assuring safe programming practices. In addition, the US Department of Commerce issued an interim final ruling on the Information and Communications Technology and Services (ICTS) supply chain designed to prohibit certain ICTS Transactions from listed foreign adversaries including China, Russia, Iran, North Korea, Cuba, and Venezuela.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Zen ### Target Entity: Android ### Text Passage: Zen is Android malware that was first seen in 2013.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Oldsmar Treatment Plant Intrusion ### Target Entity: Florida ### Text Passage: Oldsmar Treatment Plant Intrusion was a cyber incident involving a water treatment facility in Florida. During this incident, unidentified threat actors leveraged features of the system to access and modify setpoints for a specific chemical required in the treatment process. The incident was detected immediately and prevented before it could cause any harm to the public.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Fakecalls ### Target Entity: Android ### Text Passage: Fakecalls is an Android trojan, first detected in January 2021, that masquerades as South Korean banking apps. It has capabilities to intercept calls to banking institutions and even maintain realistic dialogues with the victim using pre-recorded audio snippets.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Fakecalls ### Target Entity: South Korean ### Text Passage: Fakecalls is an Android trojan, first detected in January 2021, that masquerades as South Korean banking apps. It has capabilities to intercept calls to banking institutions and even maintain realistic dialogues with the victim using pre-recorded audio snippets.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: LaZagne ### Target Entity: macOS ### Text Passage: LaZagne can obtain credentials from macOS Keychains.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: OutSteel ### Target Entity: AutoIT ### Text Passage: OutSteel is a file uploader and document stealer developed with the scripting language AutoIT that has been used by Ember Bear since at least March 2021.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: Ember Bear ### Target Entity: OutSteel ### Text Passage: OutSteel is a file uploader and document stealer developed with the scripting language AutoIT that has been used by Ember Bear since at least March 2021.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: XLoader ### Target Entity: Android ### Text Passage: XLoader for Android is a malicious Android app first observed targeting Japan, Korea, China, Taiwan, and Hong Kong in 2018. It has more recently been observed targeting South Korean users as a pornography application.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: XLoader ### Target Entity: Japan ### Text Passage: XLoader for Android is a malicious Android app first observed targeting Japan, Korea, China, Taiwan, and Hong Kong in 2018. It has more recently been observed targeting South Korean users as a pornography application.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: XLoader ### Target Entity: Korea ### Text Passage: XLoader for Android is a malicious Android app first observed targeting Japan, Korea, China, Taiwan, and Hong Kong in 2018. It has more recently been observed targeting South Korean users as a pornography application.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: XLoader ### Target Entity: China ### Text Passage: XLoader for Android is a malicious Android app first observed targeting Japan, Korea, China, Taiwan, and Hong Kong in 2018. It has more recently been observed targeting South Korean users as a pornography application.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: XLoader ### Target Entity: Taiwan ### Text Passage: XLoader for Android is a malicious Android app first observed targeting Japan, Korea, China, Taiwan, and Hong Kong in 2018. It has more recently been observed targeting South Korean users as a pornography application.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: XLoader ### Target Entity: Hong Kong ### Text Passage: XLoader for Android is a malicious Android app first observed targeting Japan, Korea, China, Taiwan, and Hong Kong in 2018. It has more recently been observed targeting South Korean users as a pornography application.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: XLoader ### Target Entity: South Korean ### Text Passage: XLoader for Android is a malicious Android app first observed targeting Japan, Korea, China, Taiwan, and Hong Kong in 2018. It has more recently been observed targeting South Korean users as a pornography application.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: South Korean ### Target Entity: Taiwan ### Text Passage: XLoader for Android is a malicious Android app first observed targeting Japan, Korea, China, Taiwan, and Hong Kong in 2018. It has more recently been observed targeting South Korean users as a pornography application.
<related>NO</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: DualToy ### Target Entity: Windows ### Text Passage: DualToy is Windows malware that installs malicious applications onto Android and iOS devices connected over USB.
<related>YES</related>
You are a helpful threat intelligence analyst. Your task is to identify if the source entity and the target entity in the provided text passage are semantically related. To help you, we provide all the possible relationship labels between the source and target entities. If any label applies to the relationship, answer YES. Otherwise, answer NO. Answer in the following format: <related>YES or NO</related>
### Source Entity: DualToy ### Target Entity: Android ### Text Passage: DualToy is Windows malware that installs malicious applications onto Android and iOS devices connected over USB.
<related>YES</related>