Keyword: androidos_usbattack.a
99402 Total Search   |   Showing Results : 101 - 120
This Android malware acts as an SMS relay. It uses the infected device as proxy for sending and receiving SMS messages. As a result, affected users may be charged for sending SMS without their
It attempts to send text messages to premium numbers 7132 and 4161 that contain specific strings. As a result, affected users may be charged according to the respective number's rate. Based on the
This Trojan is an Android application that may be downloaded manually from third party Android markets. It is a modified version of the application Walk and Text . It gathers specific information
mobile devices compromised. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This malware leverages the TOR network to connect with a remote
This detection is a proof of concept (PoC) malware related to the Android vulnerability CVE-2015-3840. To get a one-glance comprehensive view of the behavior of this Others, refer to the Threat
This potentially unwanted application may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It may be downloaded from app stores/third
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Android malware arrives as a fan-made application that tricks users into thinking that it is the same as the original. It displays advertisements upon installation. To get a one-glance
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Arrival Details This Trojan may be unknowingly downloaded by a user while visiting malicious websites. Infection
This malware gathers sensitive information about the affected phone and sends the stolen data to a malicious URL. This spyware may be unknowingly downloaded by a user while visiting malicious
a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This malware arrives on a system as a file dropped by other
This backdoor may be manually installed by a user. It runs certain commands that it receives remotely from a malicious user. Doing this puts the affected computer and information found on the
This malware contains a malicious library file that when executed, turns the infected device into a zombie device. It also hides its routines in the dynamic library, which makes it hard to analyze.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Android malware poses as the Farm Frenzy game to lure users into downloading its copy on their Android-based phones. To get a one-glance comprehensive view of the behavior of this Trojan, refer
This Android malware is said to record actual phone conversations. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This Android
This malware can be downloaded from fake site that imitates Google Play, formerly known as the Android Market. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This detection is a proof of concept (PoC) malware related to the Android vulnerability CVE-2015-3839. To get a one-glance comprehensive view of the behavior of this Others, refer to the Threat