Keyword: androidos_tcent.a
99645 Total Search   |   Showing Results : 241 - 260
apps are only downloaded via HTTP and not HTTPS. As a result, a second attacker capable of carrying out man-in-the-middle attacks could change the downloaded apps, in effect overriding the payload of the
NOTES: Based on analysis of the codes, this Android malware has the following capabilities: Loads a local html page in 1 pixel iframe. The said html tries to open the following malicious URLs: www.
This is the Trend Micro detection for mobile apps that are able to exploit a vulnerability in certain Android operating systems. When exploited, the said vulnerability can allow malicious users to
This Adware drops and runs other files on the device. It displays pop-up advertisements. Mobile Malware Routine This Adware is a file that collects the following information on an affected mobile
After being launched, it checks the root status of device first. If the device is not rooted, a notification of current root status and a button named “一键获取Root权限”(get the root privilege) appears on the
advertisements it displays per day. NOTES: The app pretends to be Angry Birds and leads users to downloading and installing other applications. . Once user launch this app, a dialog pops and tells user to fill a
This spyware monitors all incoming and outgoing calls. It uses common file icons to trick a user into thinking that the files are legitimate. Mobile Malware Routine This spyware is a file that
crash via an attack. Here’s an example of a fatal bug: if the code uses getExtra(), getBundleExtra(), getCharExtra(), etc. to get an incoming intent’s parameter, one must check whether the return value is
their signature. This would allow an attacker to remotely gain access to the affected device. NOTES: A malware can abuse this vulnerability in two ways. 1. It can be used to hide a payload. Malware may
following C&C server(s): bweri6.]cc Based on analysis of the codes, it has the following capabilities: Record screen Set volmue of phone ring Send sms Display a dialog mimic the given bank UI Launch a
This hacking tool is used to root Android devices. Rooting enables the users to have elevated rights and permissions to access Android 's software. This hacking tool may be manually installed by a
This Android malware collects certain device information. This Trojan may be manually installed by a user. Arrival Details This Trojan may be manually installed by a user. NOTES: This Android malware
premium SMS without the affected mobile user's knowledge. As a result, the user is charged or billed a premium rate. Via app stores Sends SMS to premium service
Information Theft Upon execution of the affected application, it gathers the following information: Fine Location Phone Number Text messages Contact list NOTES: This is a generic detection for
detection for Android applications bundled with malicious code. It is capable of doing the following: download unwanted apps push adult ads register as device admin NOTES: The app installs itself as a call
as recording data, stealing information, sending information to C&C servers, and a self-destruct mechanism to cover its tracks. NOTES: This malware purports itself as a normal communication app in
This spyware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It uses a convincing Graphical User Interface to make the users think that the software
NOTES: It accesses use's private information such as phone number, device’s unique identification number, and text message among others. It then sends the information through text message.
Adware Routine This adware connects to the following URLs to download and display ads: http://ads.{BLOCKED}p.com/in_game_api/ads/register_click http://ads.{BLOCKED
other malware on the affected computer. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Rootkit Capabilities This Trojan