Keyword: androidos_tcent.a
99463 Total Search   |   Showing Results : 121 - 140
This Android malware arrives as a fan-made application that tricks users into thinking that it is the same as the original. It displays advertisements upon installation. To get a one-glance
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Infection
This backdoor may be manually installed by a user. It runs certain commands that it receives remotely from a malicious user. Doing this puts the affected computer and information found on the
This malware gathers sensitive information about the affected phone and sends the stolen data to a malicious URL. This spyware may be unknowingly downloaded by a user while visiting malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Android malware masquerades as Adobe Flash Player with a legitimate-looking icon. It gathers the package names of installed applications including mobile banking apps and sends them to the
This detection is a proof of concept (PoC) malware related to the Android vulnerability CVE-2015-3839. To get a one-glance comprehensive view of the behavior of this Others, refer to the Threat
This is Trend Micro's detection for Android applications that have been trojanized to steal confidential information. It also connects to a remote server to send and receive commands. Once a command
This Android spyware records phone calls and answer calls automatically. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This Android
This backdoor may be manually installed by a user. It connects to a website to send and receive information. Arrival Details This backdoor may be manually installed by a user. Installation This
This Android malware is designed to steal users' SMS, contact list, call log, location information, and other phone informatio. It sends all gathered information to a remote server via an active
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It uses a file name that tricks a user into thinking that it contains adult-related
This malware imitates popular games for Android-based devices to redirect users to advertisement sites. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat
unrestricted access. It arrives with Trojanized applications. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. It steals information. It can also
This Trojan dials a premium-rate number via an affected system's modem. The dialed number depends upon the user's location, which the user is asked to specify during the installation. As a result,
Users are lead to this malware via the following: via URL from email or SMS via download in app store such as Google Play When a user clicks on the URL from the email or SMS, it leads to vulnerabilities
Market and infected almost a hundred users before it was pulled out. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. The malware service
This adware may be manually installed by a user. It displays pop-up advertisements. Arrival Details This adware may be manually installed by a user. Adware Routine This adware displays pop-up
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It steals certain information from the system and/or the user. Arrival Details This Trojan may be unknowingly
This mobile malware presents itself as a fake copy of certain game apps. It displays advertisements. It can also navigate the app store to install other unrelated apps. Mobile Malware Routine Upon