Keyword: androidos_usbattack.a
99327 Total Search   |   Showing Results : 61 - 80
to the following website(s) to download and execute a malicious file: http://{BLOCKED}e.net/?u=www.{BLOCKED}4free.ru%2Fgames%2Fextreme_formula%2FExtreme_Formula_v1.1.4.apk%3Fdl Via app stores,
This mobile malware is capable of mining specific cryptocurrencies via mobile. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This
different contacts in the contact list of the affected mobile device. It uses the contact's saved name in the sent message as a greeting.
NOTES: This Android malware is a joke malware that locks user's device screen and restricts any kind of user activity. When the code is sold in underground forums, more than 1200 variants emerged.
This backdoor is a Trojanized copy of a legitimate gaming application for Android OS smartphones. It steals sensitive information of the affected phone's SMS and calls functions, compromising the
obtains data needed to execute its payload. It installs a receiver called SMSReceiver which is executed each time a text message is received. It gathers certain information from the affected device. It
This malware is a backdoor that is part of a remote administration tool used for malware distribution discovered in March 2014. It records and steals information from affected devices. Users with
as a legitimate wallpaper application. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. This malware conceals itself as a legitimate
This malware employs a new method to abuse premium service. It logs in to a third party app store and downloads paid apps and media in the background without the user's consent or knowledge. This
When installed, this malware creates no icon. It creates a backdoor to the device to allow remote access and control to the device. This Trojan arrives on a system as a file dropped by other malware
This is the Trend Micro detection for an Android malware that disguises itself as a legitimate application. This malicious APK file is a repackaged version of a legimate program used in China to
This Trojan lets the user access text messages and call logs from their phone from another phone or from the Internet. The user may choose to login using an email address and a password or using a
applications, adding bookmarks, and visiting URLs. It also gathers certain device information and sends it to a remote URL. It saves a log of its activities in a file. It sends device information to a certain
This Trojan displays the contents of a web-based tool used to perform a Denial of Service attack to a specific website. This Trojan may be unknowingly downloaded by a user while visiting malicious
This application is installed manually by a user into a target device. The application then secretly forwards all its incoming SMS messages to another number. The application has no icon and no
This malware arrives via a Trojanized Android game. It is installed together with a normal app called Steamy Window by Swiss code monkeys. It adds its malicious code as a service so that the user
This malware pretends to be either an Instagram or Angry Birds Space application for Android phones. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram
This malware disguises itself as an app named Find and Call. It is a malicious app that uploads a user's phone book to a remote server and sends spammed SMS to the user's contact list. To get a
This adware is found in application stores. To get a one-glance comprehensive view of the behavior of this Adware, refer to the Threat Diagram shown below. This adware displays unsolicited
system. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This malware works alongside GPS Spy. It disguises as an Android game application. A