Keyword: androidos_tcent.a
99645 Total Search   |   Showing Results : 201 - 220
NOTES: These malicious applications use icons similar with some popular apps, such as Adobe Flash . Furthermore, these have names indicating that they are a downloader for popular applications. When
NOTES: The rooting tool TowelRoot is made by GeoHot that targets CVE-2014-3153 local privilege escalation vulnerability. It affects Linux Kernel 3.14.5 and consequently, most of Android versions. It
This malware leverages Moplus SDK to automatically and periodically deploy unwanted applications onto Android devices. Moplus SDK has been found out to include backdoor capabilities. To get a
Mobile Malware Routine This Others collects the following device information: mac address imei iccid android id
NOTES: This malware connects to a remote server to download other malicious payloads to the device and installs them without the user's consent. Once the app is installed, the malicious code can be
shows a user interface about activation. After the user clicks on the supposed activation, it shows another interface indicating supposed activation: Based on its code, there are other features named
This is the Trend Micro detection for malware that sends sensitive information to remote servers. NOTES: This malware is an adware toolkit that sends sensitive information to a remote server.
NOTES: This family is from a scam campaign named as Emmental. It spoofs many banks including ZKB, CreditSuisse, LUKB, BankAustria, Raiffeisen, and Sparkasse among others. Users are tricked into using
NOTES: Once installed, this malware executes and sends the user's contact list and sends it to certain malicious sites. Analysis of its code reveals a malicious SDK file named zoo.tiger.sdk inserted
prevent uninstallation. It registers itself as a device administrator: It asks the user to give it device administrator privileges. With administrator privileges as well as the same icon and description as
NOTES: This application contains the vulnerable Moplus SDK from Baidu. The said SDK has the following routines similar to a backdoor: getting the location and package information pushing phishing
This Trojan forwards any received SMS to a specific number and sends SMS by keywords. It is controlled remotely via SMS to send SMS or write SMS to Inbox. It leverages a vulnerability in the China
This Spyware may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It receives commands from a server that may be controlled by a bot or a
This Trojan may be manually installed by a user. It uses a file name similar to a legitimate file to pass as a legitimate file. It uses a convincing Graphical User Interface to make the users think
This malware masquerades as popular apps like MMS, whatsapp, and Pokemon Go. It is capable of hijacking a phone and is capable of many actions including calling a number or sending an SMS indicated
This file contains a URL where it connects to possibly download other files. Other Details This Trojan drops the following file(s)/component(s): fdda100c6eb75ebe48fca33cfa3b01dc91506dfa
This hacking tool is a component file that can be used to root Android devices. Rooting enables the user to have elevated rights and permissions to access Android's software. This hacking tool may
device. It displays pop-up advertisements. It uses common file icons to trick a user into thinking that the files are legitimate. This is the Trend Micro detection for Android applications bundled with
This is the Trend Micro detection for malicious apps that can be used to steal or intercept SMS messages from the affected device. NOTES: This malware may be downloaded and install by a user
This malicious app usually poses as a porn video player or system update to entice users to download and install on mobile devices. Once installed, it requests device admin privileges to prevent