Keyword: androidos_tcent.a3
100577 Total Search   |   Showing Results : 1 - 20
   Next  
This malware is noteworthy as it is an Android malware that specifically targets China Mobile subscribers. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat
ANDROIDOS_TCENT.A connects to this website to send and receive information.
This URL downloads an updated copy of the malware ANDROIDOS_TCENT.A.
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It displays pop-up advertisements. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This adware arrives as a component bundled with malware/grayware/spyware packages. Arrival Details This adware arrives as a component bundled with malware/grayware/spyware packages. NOTES: It loads
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
Installation This Exploit takes advantage of the following vulnerability/vulnerabilities to elevate privileges: CVE-2015-1538: Integer overflow in libstagefright parsing crafted MP4 video
This malicious application GingerBreak targets the Android platform and exploits a vulnerability presented on Android OS version 2.3 (code name: Gingerbread). After the exploit, the device is "rooted
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/09720123053.png 2012 has been great year for the popular photo–sharing app Instagram . Its Android version has been a resounding success with 5M
The malware exploits the Android Master Key vulnerability to install a backdoor. This Trojan may be manually installed by a user. Arrival Details This Trojan may be manually installed by a user.
Other Details This Potentially Unwanted Application does the following: The label "Stockspot" features an icon closely resembling that of the legitimate Stockspot application, yet it has a different
This Android OS backdoor has the increased potential for damage, propagation, or both, that it possesses. Specifically, it is a Trojanized version of the official Android Market Security Tool for
This Android malware poses as the Farm Frenzy game to lure users into downloading its copy on their Android-based phones. To get a one-glance comprehensive view of the behavior of this Trojan, refer
This is the first mobile ransomware that uses Tor, a legitimate service that allows for concealed server connections. Users with mobile devices affected by this malware may find the files stored in
This adware is embedded in an application that unlocks levels of the popular game "Angry Birds." Upon execution the adware will run in the background as a service with the name AndroidMDKProvider. It
as a legitimate wallpaper application. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. This malware conceals itself as a legitimate
This is the Trend Micro detection for an Android malware that disguises itself as a legitimate application. This malicious APK file is a repackaged version of a legimate program used in China to
conceals itself as a legitimate wallpaper. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. Based on its behavior, the purpose of this Trojan is
This application steals information and may be used to track the device's location without the knowledge of the user. This spyware may be manually installed by a user. Arrival Details This spyware