Keyword: androidos_tcent.a
99451 Total Search   |   Showing Results : 61 - 80
This is the Trend Micro detection for the Superuser Android app, which manages what applications have access to the root user. This hacking tool may be manually installed by a user. Arrival Details
This Trojan may be downloaded from app stores/third party app stores. Arrival Details This Trojan may be downloaded from app stores/third party app stores. NOTES: It attempts to gather the following
This malware shows a fake infection on the affected user's mobile phone. Once the user clicks on the fake infection, it automatically downloads another app. The downloading uses network data and
*** 93.95.219.*** 106.187.96.*** 124.217.245.*** 23.92.30.*** 82.146.58.*** 93.95.219.*** 209.59.205.*** It acts as an SMS relay which receives SMS to be forwarded from a remote URL. As a result, affected users
NOTES: This malware is found repacked with a big number of apps from a third party app download website allegedly targeting Vietnamese users. It steals the following user information from the
Other Details This Trojan takes advantage of the following exploit(s): CVE-2015-1538 is the Stagefright library vulnerability which was reported at 2015-02-06. This is an integer overflow in the
to the following website(s) to download and execute a malicious file: http://{BLOCKED}e.net/?u=www.{BLOCKED}4free.ru%2Fgames%2Fextreme_formula%2FExtreme_Formula_v1.1.4.apk%3Fdl Via app stores,
different contacts in the contact list of the affected mobile device. It uses the contact's saved name in the sent message as a greeting.
This mobile malware is capable of mining specific cryptocurrencies via mobile. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This
NOTES: This Android malware is a joke malware that locks user's device screen and restricts any kind of user activity. When the code is sold in underground forums, more than 1200 variants emerged.
This backdoor is a Trojanized copy of a legitimate gaming application for Android OS smartphones. It steals sensitive information of the affected phone's SMS and calls functions, compromising the
obtains data needed to execute its payload. It installs a receiver called SMSReceiver which is executed each time a text message is received. It gathers certain information from the affected device. It
This malware is a backdoor that is part of a remote administration tool used for malware distribution discovered in March 2014. It records and steals information from affected devices. Users with
This malware employs a new method to abuse premium service. It logs in to a third party app store and downloads paid apps and media in the background without the user's consent or knowledge. This
as a legitimate wallpaper application. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. This malware conceals itself as a legitimate
When installed, this malware creates no icon. It creates a backdoor to the device to allow remote access and control to the device. This Trojan arrives on a system as a file dropped by other malware
This is the Trend Micro detection for an Android malware that disguises itself as a legitimate application. This malicious APK file is a repackaged version of a legimate program used in China to
applications, adding bookmarks, and visiting URLs. It also gathers certain device information and sends it to a remote URL. It saves a log of its activities in a file. It sends device information to a certain
This Trojan lets the user access text messages and call logs from their phone from another phone or from the Internet. The user may choose to login using an email address and a password or using a
This Trojan displays the contents of a web-based tool used to perform a Denial of Service attack to a specific website. This Trojan may be unknowingly downloaded by a user while visiting malicious