Keyword: androidos_tcent.a
99645 Total Search   |   Showing Results : 221 - 240
gather certain information. It then sends these information to certain remote websites. This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed
This Trojan may be manually installed by a user. Arrival Details This Trojan may be downloaded from the following remote sites: {BLOCKED}giesthegame.ru {BLOCKED}giessymbian.ru {BLOCKED}giessamsung.ru
This malware poses as a free Flash player installer. It sends SMS based on different country code and operation code thus users are charged. This Trojan may be downloaded unknowingly by a user when
This is the Trend Micro detection for the SDK found in possibly thousands of apps once hosted in Google Play. Most of these apps have been since removed. To get a one-glance comprehensive view of the
This Backdoor drops and runs other files on the device. It uses common file icons to trick a user into thinking that the files are legitimate. Mobile Malware Routine This Backdoor is a file that
This malware arrives when users accessed a compromised website. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. Once installed, it
This Android malware is able to evade Google’s Bouncer. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This Trojan sends out text
This hacking tool may be manually installed by a user. Arrival Details This hacking tool may be manually installed by a user. NOTES: This malware is part of a tool used for rooting Android devices.
This hacking tool may be manually installed by a user. Arrival Details This hacking tool may be manually installed by a user. NOTES: After installation, it displays an icon named Penetrate Pro .
spotted a fake news application that has capability to circumvent the filtering of Google Play. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown
This malware uses common file icons to trick a user into thinking that the files are legitimate. Mobile Malware Routine This malware displays the following: 有什么不懂加qq:390870570 Once the app is used,
This hacking tool may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This hacking tool may be unknowingly downloaded by a
This malware is installed as com.android.providers.downloadsmanager . It silently executes when the affected device is booted or when it receives or makes a call. It then gathers certain information
PLANKTON is a family of malware that has backdoor capabilities. It runs on Android operating systems, arriving as repackaged normal Android apps. Apart from its backdoor capabilities, it steals
This adware may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This adware may be unknowingly downloaded by a user
NOTES: This adware can make clicks automatically in the background. Once the adware running on the device, it can do any of the following. Establish a connection with the C&C server silently. C&C
Rapid spreading Miner botnet This Coinminer arrives as a component bundled with malware/grayware packages. It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU)
This Virus may be manually installed by a user. Arrival Details This Virus may be manually installed by a user. Mobile Malware Routine This Virus acts as an SMS relay which receives SMS to be
NOTES: The app generally disguises as games and themes coming from mobile markets including Google Play. It will build a network tunnel in the background service if it is able to receive a command
This spyware may be downloaded by other malware/grayware/spyware from remote sites. It may be manually installed by a user. It may be downloaded from app stores/third party app stores. Arrival