Keyword: androidos_tcent.a1
100507 Total Search   |   Showing Results : 1 - 20
   Next  
This malware is noteworthy as it is an Android malware that specifically targets China Mobile subscribers. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat
This URL downloads an updated copy of the malware ANDROIDOS_TCENT.A.
ANDROIDOS_TCENT.A connects to this website to send and receive information.
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It displays pop-up advertisements. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This adware arrives as a component bundled with malware/grayware/spyware packages. Arrival Details This adware arrives as a component bundled with malware/grayware/spyware packages. NOTES: It loads
and impressive Web connectivity these offer, consumers and organizations alike are availing of mobile devices for both personal and business use. In 2010, Gartner noted a 31.8 percent increase in the
programs we download onto our mobile devices. It's a shift in platform but with the same threat scenario. Users who download from app stores may end up downloading malware instead. Because of this, mobile
the gathered information to specific URLs. It also sends a malware specific string to a specific number, which is probably its version number. It also sets the value of root to 1 if the device has
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/09720123053.png 2012 has been great year for the popular photo–sharing app Instagram . Its Android version has been a resounding success with 5M
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This Android OS backdoor has the increased potential for damage, propagation, or both, that it possesses. Specifically, it is a Trojanized version of the official Android Market Security Tool for
}h.gongfu-android.com:8511/search/sayhi.php It also sends a malware specific string, sp051 , which is probably its version number. It also sets the value of root to 1 if the device has successfully been rooted or 0 if it is not. This status
This malware is able to send an SMS to a Chinese premium number. As a result, affected users are charged without their knowledge. To get a one-glance comprehensive view of the behavior of this
to the following website(s) to download and execute a malicious file: http://{BLOCKED}e.net/?u=www.{BLOCKED}4free.ru%2Fgames%2Fextreme_formula%2FExtreme_Formula_v1.1.4.apk%3Fdl Via app stores,
This malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it disguises as a
This is the first mobile ransomware that uses Tor, a legitimate service that allows for concealed server connections. Users with mobile devices affected by this malware may find the files stored in
It accesses the following site: http://{BLOCKED}com.com/send.php?a_id={device id}&telno={line 1 number}&m_addr={account name}&usr_id={value from http post} where: {device id} = a unique device ID such
This adware is embedded in an application that unlocks levels of the popular game "Angry Birds." Upon execution the adware will run in the background as a service with the name AndroidMDKProvider. It
NOTES: When the user installs this malware, it creates an icon like Google Play. It contains the following malware APKs in its assets folder: 1.apk 2.apk 3.apk 4.apk 5.apk 6.apk 7.apk 8.apk Once