Search
Keyword: androidos_tcent.a
99897 Total Search |
Showing Results : 1 - 20
ANDROIDOS_TCENT.A connects to this website to send and receive information.
This malware is noteworthy as it is an Android malware that specifically targets China Mobile subscribers. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat
This URL downloads an updated copy of the malware ANDROIDOS_TCENT.A.
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It displays pop-up advertisements. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This adware arrives as a component bundled with malware/grayware/spyware packages. Arrival Details This adware arrives as a component bundled with malware/grayware/spyware packages. NOTES: It loads
and impressive Web connectivity these offer, consumers and organizations alike are availing of mobile devices for both personal and business use. In 2010, Gartner noted a 31.8 percent increase in the
programs we download onto our mobile devices. It's a shift in platform but with the same threat scenario. Users who download from app stores may end up downloading malware instead. Because of this, mobile
decryption key, "Fuck_sExy-aLl!Pw." It uses its root privilege to install a malicious package named LEGACY found in its assets folder. This is installed on the system folder as a specific file. This is done so
This is the latest variant of DroidKungFu. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This spyware arrives via a Trojanized
unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This backdoor may be unknowingly downloaded by a user while visiting malicious
This malicious app is known as Brightest Flashlight Free . It gathers various information on the affected device. It may connect to a C&C server to send information gathered. It is capable of setting
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/09720123053.png 2012 has been great year for the popular photo–sharing app Instagram . Its Android version has been a resounding success with 5M
This malware is bundled with legitimate Android apps. It is a simplified and obfuscated version of ANDROIDOS_PJAPPS.D. It is a Trojanized version of TouchMix App, a normal gaming app, but the malware
This malware roots the device using components employed by ANDROIDOS_LOTOOR.A. However, the said components are encrypted with AES and are decrypted at the time that they are used by using a certain
This malware is able to send an SMS to a Chinese premium number. As a result, affected users are charged without their knowledge. To get a one-glance comprehensive view of the behavior of this
This malware abuses a premium service number as well as sends demeaning messages to the user's contact list, causing unauthorized charges as well as potential damage to the user's reputation. To get
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This Trojan may be unknowingly downloaded by a user
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This malicious app is known as Brightest Flashlight Free . It gathers various information on the affected device. It may connect to a C&C server to send information gathered. It is capable of setting