Keyword: androidos_tcent.a
99645 Total Search   |   Showing Results : 181 - 200
remote servers and installing any applications to the Android devices without user’s authorization. When a user launches the application, Moplus SDK automatically sets up a local HTTP server on the device
This spyware displays pop-up advertisements. It uses common file icons to trick a user into thinking that the files are legitimate. This is the Trend Micro detection for Android applications bundled
android.permission.PROCESS_OUTGOING_CALLS intercept outgoing calls When the malware is executed, it configures the FTP server and the phone number. The phone number is a key in reopening the setting panel. By setting the phone number, the
NOTES: This malware disguises itself as a bank dynamic token generator, which may fraud bank customers. It is running another background service that monitors user's incoming SMS. Every incoming SMS
This malware is a generic Android device root tool. Rooting allows users the ability to change system settings, run apps, and perform other privileges that are often inaccessible to normal users.
NOTES: This malicious app can be downloaded from third-party app stores. It tries to entice the user into installing the app by offering a fetish video. The malicious routines of the malware are
This is the Trend Micro detection for malicious apps that have information theft routines. This adware may be manually installed by a user. It may be downloaded from app stores/third party app
This Trojan may be downloaded from app stores/third party app stores. Arrival Details This Trojan may be downloaded from app stores/third party app stores. NOTES: Once executed, this malicious app
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites. This
NOTES: This malware is distributed via social networking sites that leveraged the Umbrella Revolution protesters in Hong Kong. When users unknowingly install and open it, the malware is hidden from
This Trojan may be manually installed by a user. Arrival Details This Trojan may be manually installed by a user.
The first android application designed to attack NFC devices. This is sample aims to bypass and make users to have free rides in public transportation This malicious app is designed to attack
This Trojan may be downloaded from app stores/third party app stores. Arrival Details This Trojan may be downloaded from app stores/third party app stores. NOTES: This is a PUA (potential unwanted
NOTES: This is the Trend Micro detection for 3rd-party apps infected with malicious code known as KSAPP. Once executed, the app may download possibly malicious files from the following URLs: http://
A new variant of this mobile malware (ANDROIDOS_SLOCKER.OPST) is known to have the same GUI as WannaCry, and are capable of encrypting files. NOTES: This malware disguises itself as a system update.
This rootkit takes advantage of certain vulnerabilities. Download Routine After successfully exploiting the said vulnerability, this malware connects to the following URLs to possibly download other
This Trojan drops and runs other files on the device. This is the Trend Micro detection for Android applications bundled with malicious code. Mobile Malware Routine This Trojan is a file that
This mobile ransomware threatens to send personal data from a victim's phone to everyone in their contact list. It was carried by three apps found in Google Play: “Wallpapers Blur HD”, “Booster
information from the infected mobile device. Send the stolen information to a remote HTTP server. Mobile Malware Routine This Others is a file that collects the following information on an affected mobile
app on startup NOTES: Also known as Ghost Push , this malware are downloaded by unsuspecting users in third party app stores. The shell APK file decodes a DEX file in the assets folder. This file is