Keyword: androidos_tcent.a
99457 Total Search   |   Showing Results : 101 - 120
This malware is said to be related to the crimeware SpyEye. It drops intercepted SMS to command and control servers that are related to SpyEye. To get a one-glance comprehensive view of the behavior
This application steals information and may be used to track the device's location without the knowledge of the user. This spyware may be manually installed by a user. Arrival Details This spyware
This Android malware acts as an SMS relay. It uses the infected device as proxy for sending and receiving SMS messages. As a result, affected users may be charged for sending SMS without their
This malware poses as a security app or battery app. However, it steals email addresses from the user's contact list, which may be used for malicious purposes such as spamming. To get a one-glance
This rogue app pretends to be an Android version of the popular iOS game, Temple Run. To get a one-glance comprehensive view of the behavior of this Adware, refer to the Threat Diagram shown below.
This malware is used to leverage one-click billing fraud attacks targeted at Android users. Said attacks could result in loss of funds on the users' part. To get a one-glance comprehensive view of
This malicious app received widespread media attention in Japan. It steals affected users' contacts information and sends the stolen data to a server. To get a one-glance comprehensive view of the
This Trojan is an Android application that may be downloaded manually from third party Android markets. It is a modified version of the application Walk and Text . It gathers specific information
It attempts to send text messages to premium numbers 7132 and 4161 that contain specific strings. As a result, affected users may be charged according to the respective number's rate. Based on the
mobile devices compromised. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This malware leverages the TOR network to connect with a remote
This potentially unwanted application may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It may be downloaded from app stores/third
This detection is a proof of concept (PoC) malware related to the Android vulnerability CVE-2015-3840. To get a one-glance comprehensive view of the behavior of this Others, refer to the Threat
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This malware contains a malicious library file that when executed, turns the infected device into a zombie device. It also hides its routines in the dynamic library, which makes it hard to analyze.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This malware arrives on a system as a file dropped by other
This Android malware is said to record actual phone conversations. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This Android
This Android malware poses as the Farm Frenzy game to lure users into downloading its copy on their Android-based phones. To get a one-glance comprehensive view of the behavior of this Trojan, refer
This malware can be downloaded from fake site that imitates Google Play, formerly known as the Android Market. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a