Search
Keyword: androidos_tcent.a
This malware arrives as a Trojanized application named Jimm Application (an instant messaging client for ICQ network). It sends SMS messages to premium-rate numbers thus the user is billed for these
This Android malware may be downloaded in Google Play assuming several app names. It checks if an SMS message is sent from a number listed in a reference text file. If the number is included in the
This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It uses common file icons to trick a user into thinking that the files are legitimate. Arrival Details This
This Android backdoor can be controlled via SMS or phone calls. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This application is
This malicious app is known as Brightest Flashlight Free . It gathers various information on the affected device. It may connect to a C&C server to send information gathered. It is capable of setting
The malware exploits the Android Master Key vulnerability to install a backdoor. This Trojan may be manually installed by a user. Arrival Details This Trojan may be manually installed by a user.
This malware is a variant of a VMAP, a mobile component of targeted attacks which affected various sectors in the Middle East. It is capable of searching and extracting information from affected
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This Trojan appeared on the Google Play app market. Once this Trojan is installed on the affected device and the application is used, it creates a shortcut that looks like it is the game, Legend of
This malicious app is known as Brightest Flashlight Free . It gathers various information on the affected device. It may connect to a C&C server to send information gathered. It is capable of setting
This is the first mobile ransomware that uses Tor, a legitimate service that allows for concealed server connections. Users with mobile devices affected by this malware may find the files stored in
This is the Trend Micro detection for malicious apps that steal information by redirecting incoming SMS messages received on the affected device to malicious users. NOTES: This malware poses as a
This malware is downloaded from a site that mimics Google Play . The app names it uses copy legitimate app names and uses legitimate apps' descriptions to further trick users into downloading and
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. Arrival Details This Trojan may be unknowingly downloaded by a user
This adware is embedded in an application that unlocks levels of the popular game "Angry Birds." Upon execution the adware will run in the background as a service with the name AndroidMDKProvider. It
This Trojan may be manually installed by a user. It may be downloaded from app stores/third party app stores. Arrival Details This Trojan may be manually installed by a user. It may be downloaded
It forwards all incoming SMS messages received on the phone to a C&C number. This may result in a breach of privacy for the user, and may cause their personal information and/or correspondence to be
This Android malware, known as DroidDreamLight, steals mobile-specific data. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This is
are the said remote commands: Creates an icon on home screen Pushes artibitary notification, which can potentially bring more threats on the affected device Opens a certain URL Sends SMS to received
infected device into dead rebooting loop. Cybercriminals can hide the exploit by creating a time triggered event. When the exploit runs, the system server crashes. It also stops all functionality of the said