Keyword: androidos_tcent.a122
99469 Total Search   |   Showing Results : 1 - 20
   Next  
This malware is noteworthy as it is an Android malware that specifically targets China Mobile subscribers. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat
ANDROIDOS_TCENT.A connects to this website to send and receive information.
This URL downloads an updated copy of the malware ANDROIDOS_TCENT.A.
This malicious app received widespread media attention in Japan. It steals affected users' contacts information and sends the stolen data to a server. To get a one-glance comprehensive view of the
This backdoor may be manually installed by a user. It connects to a website to send and receive information. Arrival Details This backdoor may be manually installed by a user. Installation This
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It displays pop-up advertisements. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This adware arrives as a component bundled with malware/grayware/spyware packages. Arrival Details This adware arrives as a component bundled with malware/grayware/spyware packages. NOTES: It loads
and impressive Web connectivity these offer, consumers and organizations alike are availing of mobile devices for both personal and business use. In 2010, Gartner noted a 31.8 percent increase in the
programs we download onto our mobile devices. It's a shift in platform but with the same threat scenario. Users who download from app stores may end up downloading malware instead. Because of this, mobile
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
decryption key, "Fuck_sExy-aLl!Pw." It uses its root privilege to install a malicious package named LEGACY found in its assets folder. This is installed on the system folder as a specific file. This is done so
This is the latest variant of DroidKungFu. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This spyware arrives via a Trojanized
unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This backdoor may be unknowingly downloaded by a user while visiting malicious
This malicious app is known as Brightest Flashlight Free . It gathers various information on the affected device. It may connect to a C&C server to send information gathered. It is capable of setting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file