mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-12-11 16:17:19 +00:00
4304 lines
167 KiB
JSON
4304 lines
167 KiB
JSON
{
|
||
"values": [
|
||
{
|
||
"value": "CopyCat",
|
||
"description": "CopyCat is a fully developed malware with vast capabilities, including rooting devices, establishing persistency, and injecting code into Zygote – a daemon responsible for launching apps in the Android operating system – that allows the malware to control any activity on the device.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://blog.checkpoint.com/2017/07/06/how-the-copycat-malware-infected-android-devices-around-the-world/"
|
||
]
|
||
},
|
||
"uuid": "40aa797a-ee87-43a1-8755-04d040dbea28"
|
||
},
|
||
{
|
||
"value": "Andr/Dropr-FH",
|
||
"description": "Andr/Dropr-FH can silently record audio and video, monitor texts and calls, modify files, and ultimately spawn ransomware.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://nakedsecurity.sophos.com/2017/07/21/watch-out-for-the-android-malware-that-snoops-on-your-phone/",
|
||
"https://www.neowin.net/news/the-ghostctrl-android-malware-can-silently-record-your-audio-and-steal-sensitive-data"
|
||
],
|
||
"synonyms": [
|
||
"GhostCtrl"
|
||
]
|
||
},
|
||
"uuid": "a01e1d0b-5303-4d11-94dc-7db74f3d599d"
|
||
},
|
||
{
|
||
"value": "Judy",
|
||
"description": "The malware, dubbed Judy, is an auto-clicking adware which was found on 41 apps developed by a Korean company. The malware uses infected devices to generate large amounts of fraudulent clicks on advertisements, generating revenues for the perpetrators behind it.",
|
||
"meta": {
|
||
"refs": [
|
||
"http://fortune.com/2017/05/28/android-malware-judy/",
|
||
"https://blog.checkpoint.com/2017/05/25/judy-malware-possibly-largest-malware-campaign-found-google-play/"
|
||
]
|
||
},
|
||
"uuid": "1a73ceaf-7054-4882-be82-8994805676fc"
|
||
},
|
||
{
|
||
"value": "RedAlert2",
|
||
"description": "The trojan waits in hiding until the user opens a banking or social media app. When this happens, the trojan shows an HTML-based overlay on top of the original app, alerting the user of an error, and asking to reauthenticate. Red Alert then collects the user's credentials and sends them to its C&C server.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.bleepingcomputer.com/news/security/researchers-discover-new-android-banking-trojan/"
|
||
]
|
||
},
|
||
"uuid": "d10f8cd5-0077-4d8f-9145-03815a68dd33"
|
||
},
|
||
{
|
||
"value": "Tizi",
|
||
"description": "Tizi is a fully featured backdoor that installs spyware to steal sensitive data from popular social media applications. The Google Play Protect security team discovered this family in September 2017 when device scans found an app with rooting capabilities that exploited old vulnerabilities. The team used this app to find more applications in the Tizi family, the oldest of which is from October 2015. The Tizi app developer also created a website and used social media to encourage more app installs from Google Play and third-party websites.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://security.googleblog.com/2017/11/tizi-detecting-and-blocking-socially.html"
|
||
]
|
||
},
|
||
"uuid": "8f374460-aa58-4a31-98cb-58db42d0902a"
|
||
},
|
||
{
|
||
"value": "DoubleLocker",
|
||
"description": "DoubleLocker can change the device’s PIN, preventing victims from accessing their devices, and also encrypts the data requesting a ransom. It will misuse accessibility services after being installed by impersonating the Adobe Flash player - similar to BankBot.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.welivesecurity.com/2017/10/13/doublelocker-innovative-android-malware/"
|
||
]
|
||
},
|
||
"uuid": "6671bb0b-4fab-44a7-92f9-f641a887a0aa"
|
||
},
|
||
{
|
||
"value": "Svpeng",
|
||
"description": "Svpeng is a Banking trojan which acts as a keylogger. If the Android device is not Russian, Svpeng will ask for permission to use accessibility services. In abusing this service it will gain administrator rights allowing it to draw over other apps, send and receive SMS and take screenshots when keys are pressed. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://securelist.com/a-new-era-in-mobile-banking-trojans/79198/",
|
||
"https://www.theregister.co.uk/2017/08/02/banking_android_malware_in_uk/"
|
||
],
|
||
"synonyms": [
|
||
"Invisble Man"
|
||
]
|
||
},
|
||
"uuid": "426ead34-b3e6-45c7-ba22-5b8f3b8214bd"
|
||
},
|
||
{
|
||
"value": "LokiBot",
|
||
"description": "LokiBot is a banking trojan for Android 4.0 and higher. It can steal the information and send SMS messages. It has the ability to start web browsers, and banking applications, along with showing notifications impersonating other apps. Upon attempt to remove it will encrypt the devices' external storage requiring Bitcoins to decrypt files.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://clientsidedetection.com/lokibot___the_first_hybrid_android_malware.html"
|
||
]
|
||
},
|
||
"uuid": "fbda9705-677b-4c5b-9b0b-13b52eff587c"
|
||
},
|
||
{
|
||
"value": "BankBot",
|
||
"description": "The main goal of this malware is to steal banking credentials from the victim’s device. It usually impersonates flash player updaters, android system tools, or other legitimate applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://blog.fortinet.com/2017/09/19/a-look-into-the-new-strain-of-bankbot",
|
||
"https://forensics.spreitzenbarth.de/android-malware/",
|
||
"https://blog.avast.com/mobile-banking-trojan-sneaks-into-google-play-targeting-wells-fargo-chase-and-citibank-customers"
|
||
]
|
||
},
|
||
"uuid": "4ed03b03-a34f-4583-9db1-6c58a4bd952b"
|
||
},
|
||
{
|
||
"value": "Viking Horde",
|
||
"description": "In rooted devices, Viking Horde installs software and executes code remotely to get access to the mobile data.",
|
||
"meta": {
|
||
"refs": [
|
||
"http://www.alwayson-network.com/worst-types-android-malware-2016/"
|
||
]
|
||
},
|
||
"uuid": "c62a6121-2ebc-4bee-a25a-5285bf33328a"
|
||
},
|
||
{
|
||
"value": "HummingBad",
|
||
"description": "A Chinese advertising company has developed this malware. The malware has the power to take control of devices; it forces users to click advertisements and download apps. The malware uses a multistage attack chain.",
|
||
"meta": {
|
||
"refs": [
|
||
"http://www.alwayson-network.com/worst-types-android-malware-2016/",
|
||
"http://blog.checkpoint.com/wp-content/uploads/2016/07/HummingBad-Research-report_FINAL-62916.pdf"
|
||
]
|
||
},
|
||
"uuid": "f5cacc72-f02a-42d1-a020-7a59650086bb"
|
||
},
|
||
{
|
||
"value": "Ackposts",
|
||
"description": "Ackposts is a Trojan horse for Android devices that steals the Contacts information from the compromised device and sends it to a predetermined location.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-072302-3943-99"
|
||
]
|
||
},
|
||
"uuid": "8261493f-c9a3-4946-874f-fe8445aa7691"
|
||
},
|
||
{
|
||
"value": "Wirex",
|
||
"description": "Wirex is a Trojan horse for Android devices that opens a backdoor on the compromised device which then joins a botnet for conducting click fraud.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://krebsonsecurity.com/2017/08/tech-firms-team-up-to-take-down-wirex-android-ddos-botnet/",
|
||
"http://www.zdnet.com/article/wirex-ddos-malware-given-udp-flood-capabilities/"
|
||
]
|
||
},
|
||
"uuid": "0b4f1af0-e0fb-4148-b08c-f6782757752a"
|
||
},
|
||
{
|
||
"value": "WannaLocker",
|
||
"description": "WannaLocker is a strain of ransomware for Android devices that encrypts files on the device's external storage and demands a payment to decrypt them.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://fossbytes.com/wannalocker-ransomware-wannacry-android/"
|
||
]
|
||
},
|
||
"uuid": "db4ddfc4-4f39-4e0b-905f-4703ed6b39b6"
|
||
},
|
||
{
|
||
"value": "Switcher",
|
||
"description": "Switcher is a Trojan horse for Android devices that modifies Wi-Fi router DNS settings. Swticher attempts to infiltrate a router's admin interface on the devices' WIFI network by using brute force techniques. If the attack succeeds, Switcher alters the DNS settings of the router, making it possible to reroute DNS queries to a network controlled by the malicious actors.",
|
||
"meta": {
|
||
"refs": [
|
||
"http://www.zdnet.com/article/this-android-infecting-trojan-malware-uses-your-phone-to-attack-your-router/",
|
||
"https://www.theregister.co.uk/2017/01/03/android_trojan_targets_routers/",
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2017-090410-0547-99"
|
||
]
|
||
},
|
||
"uuid": "60857664-0671-4b12-ade9-86ee6ecb026a"
|
||
},
|
||
{
|
||
"value": "Vibleaker",
|
||
"description": "Vibleaker was an app available on the Google Play Store named Beaver Gang Counter that contained malicious code that after specific orders from its maker would scan the user's phone for the Viber app, and then steal photos and videos recorded or sent through the app.",
|
||
"meta": {
|
||
"refs": [
|
||
"http://news.softpedia.com/news/malicious-android-app-steals-viber-photos-and-videos-505758.shtml"
|
||
]
|
||
},
|
||
"uuid": "27354d65-ca90-4f73-b942-13046e61700c"
|
||
},
|
||
{
|
||
"value": "ExpensiveWall",
|
||
"description": "ExpensiveWall is Android malware that sends fraudulent premium SMS messages and charges users accounts for fake services without their knowledge",
|
||
"meta": {
|
||
"refs": [
|
||
"https://blog.checkpoint.com/2017/09/14/expensivewall-dangerous-packed-malware-google-play-will-hit-wallet/",
|
||
"http://fortune.com/2017/09/14/google-play-android-malware/"
|
||
]
|
||
},
|
||
"uuid": "1484d72b-54d0-41b7-a9fa-18db9e9e5c69"
|
||
},
|
||
{
|
||
"value": "Cepsohord",
|
||
"description": "Cepsohord is a Trojan horse for Android devices that uses compromised devices to commit click fraud, modify DNS settings, randomly delete essential files, and download additional malware such as ransomware.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.cyber.nj.gov/threat-profiles/android-malware-variants/cepsohord"
|
||
]
|
||
},
|
||
"uuid": "05b0c492-e1ef-4352-a714-b813e54b9032"
|
||
},
|
||
{
|
||
"value": "Fakem Rat",
|
||
"description": "Fakem RAT makes their network traffic look like well-known protocols (e.g. Messenger traffic, HTML pages).",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp-fakem-rat.pdf",
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2016-012608-1538-99"
|
||
]
|
||
},
|
||
"uuid": "c657075e-3ffb-4748-bfe2-f40c3527739f"
|
||
},
|
||
{
|
||
"value": "GM Bot",
|
||
"description": "GM Bot – also known as Acecard, SlemBunk, or Bankosy – scams people into giving up their banking log-in credentials and other personal data by displaying overlays that look nearly identical to banking apps log-in pages. Subsequently, the malware intercepts SMS to obtain two-factor authentication PINs, giving cybercriminals full access to bank accounts.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://blog.avast.com/android-trojan-gm-bot-is-evolving-and-targeting-more-than-50-banks-worldwide"
|
||
],
|
||
"synonyms": [
|
||
"Acecard",
|
||
"SlemBunk",
|
||
"Bankosy"
|
||
]
|
||
},
|
||
"uuid": "3d3aa832-8847-47c5-9e31-ef13ab7ab6fb"
|
||
},
|
||
{
|
||
"value": "Moplus",
|
||
"description": "The Wormhole vulnerability in the Moplus SDK could be exploited by hackers to open an unsecured and unauthenticated HTTP server connection on the user’s device, and this connection is established in the background without the user’s knowledge.",
|
||
"meta": {
|
||
"refs": [
|
||
"http://securityaffairs.co/wordpress/41681/hacking/100m-android-device-baidu-moplus-sdk.html"
|
||
]
|
||
},
|
||
"uuid": "d3f2ec07-4af3-4b3b-9cf0-2dba08bf5e68"
|
||
},
|
||
{
|
||
"value": "Adwind",
|
||
"description": "Adwind is a backdoor written purely in Java that targets system supporting the Java runtime environment. Commands that can be used, among other things, to display messages on the system, open URLs, update the malware, download/execute files, and download/load plugins. According to the author, the backdoor component can run on Windows, Mac OS, Linux and Android platforms providing rich capabilities for remote control, data gathering, data exfiltration and lateral movement.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://securelist.com/adwind-faq/73660/"
|
||
],
|
||
"synonyms": [
|
||
"AlienSpy",
|
||
"Frutas",
|
||
"Unrecom",
|
||
"Sockrat",
|
||
"Jsocket",
|
||
"jRat",
|
||
"Backdoor:Java/Adwind"
|
||
]
|
||
},
|
||
"uuid": "ce1a9641-5bb8-4a61-990a-870e9ef36ac1"
|
||
},
|
||
{
|
||
"value": "AdSms",
|
||
"description": "Adsms is a Trojan horse that may send SMS messages from Android devices.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.fortiguard.com/encyclopedia/virus/7389670",
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-051313-4039-99"
|
||
]
|
||
},
|
||
"uuid": "55b6621f-f928-4530-8271-5150e5f39211"
|
||
},
|
||
{
|
||
"value": "Airpush",
|
||
"description": "Airpush is a very aggresive Ad - Network",
|
||
"meta": {
|
||
"refs": [
|
||
"https://crypto.stanford.edu/cs155old/cs155-spring16/lectures/18-mobile-malware.pdf"
|
||
],
|
||
"synonyms": [
|
||
"StopSMS"
|
||
]
|
||
},
|
||
"uuid": "1393cccf-19c0-4cc8-8488-8156672d87ba"
|
||
},
|
||
{
|
||
"value": "BeanBot",
|
||
"description": "BeanBot forwards device's data to a remote server and sends out premium-rate SMS messages from the infected device.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.f-secure.com/v-descs/trojan_android_beanbot.shtml"
|
||
]
|
||
},
|
||
"uuid": "8dbacb31-2ae9-4c0a-bf62-d017b802d345"
|
||
},
|
||
{
|
||
"value": "Kemoge",
|
||
"description": "Kemoge is adware that disguises itself as popular apps via repackaging, then allows for a complete takeover of the users Android device.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.fireeye.com/blog/threat-research/2015/10/kemoge_another_mobi.html",
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-101207-3555-99"
|
||
]
|
||
},
|
||
"uuid": "0c769e82-df28-4f65-97f5-7f3d88488f2e"
|
||
},
|
||
{
|
||
"value": "Ghost Push",
|
||
"description": "Ghost Push is a family of malware that infects the Android OS by automatically gaining root access, downloading malicious software, masquerading as a system app, and then losing root access, which then makes it virtually impossible to remove the infection even by factory reset unless the firmware is reflashed.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://en.wikipedia.org/wiki/Ghost_Push",
|
||
"https://blog.avast.com/how-to-protect-your-android-device-from-ghost-push"
|
||
]
|
||
},
|
||
"uuid": "c878cdfc-ab8b-40f1-9173-e62a51e6f804"
|
||
},
|
||
{
|
||
"value": "BeNews",
|
||
"description": "The BeNews app is a backdoor app that uses the name of defunct news site BeNews to appear legitimate. After installation it bypasses restrictions and downloads additional threats to the compromised device.",
|
||
"meta": {
|
||
"refs": [
|
||
"http://blog.trendmicro.com/trendlabs-security-intelligence/fake-news-app-in-hacking-team-dump-designed-to-bypass-google-play/"
|
||
]
|
||
},
|
||
"uuid": "281cf173-d547-4b37-a372-447caab577be"
|
||
},
|
||
{
|
||
"value": "Accstealer",
|
||
"description": "Accstealer is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-012711-1159-99"
|
||
]
|
||
},
|
||
"uuid": "cbc1c053-5ee8-40c9-96c2-431ac6852fe1"
|
||
},
|
||
{
|
||
"value": "Acnetdoor",
|
||
"description": "Acnetdoor is a detection for Trojan horses on the Android platform that open a back door on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-051611-4258-99"
|
||
]
|
||
},
|
||
"uuid": "b36f7ce2-e208-4879-9a3f-58623727f887"
|
||
},
|
||
{
|
||
"value": "Acnetsteal",
|
||
"description": "Acnetsteal is a detection for Trojan horses on the Android platform that steal information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-051612-0505-99"
|
||
]
|
||
},
|
||
"uuid": "dbbc6b6f-fa87-4fdc-880d-7c22c2723c58"
|
||
},
|
||
{
|
||
"value": "Actech",
|
||
"description": "Actech is a Trojan horse for Android devices that steals information and sends it to a remote location. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-080111-3948-99"
|
||
]
|
||
},
|
||
"uuid": "0bf67f5b-0bcc-41e0-8db9-2b8df8cf1d03"
|
||
},
|
||
{
|
||
"value": "AdChina",
|
||
"description": "AdChina is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-032814-2947-99"
|
||
]
|
||
},
|
||
"uuid": "33a06139-1c18-4a9a-b86b-440c43266b15"
|
||
},
|
||
{
|
||
"value": "Adfonic",
|
||
"description": "Adfonic is an advertisement library that is bundled with certain Android applications. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052615-0024-99"
|
||
]
|
||
},
|
||
"uuid": "a02b2327-525a-4343-9c76-64f2c984c536"
|
||
},
|
||
{
|
||
"value": "AdInfo",
|
||
"description": "AdInfo is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040416-2433-99"
|
||
]
|
||
},
|
||
"uuid": "a1737465-7af6-4362-b938-3a3fa737ebb7"
|
||
},
|
||
{
|
||
"value": "Adknowledge",
|
||
"description": "Adknowledge is an advertisement library that is bundled with certain Android applications. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052822-1033-99"
|
||
]
|
||
},
|
||
"uuid": "dd626b23-173c-4737-b9d7-c44571c1abb3"
|
||
},
|
||
{
|
||
"value": "AdMarvel",
|
||
"description": "AdMarvel is an advertisement library that is bundled with certain Android applications. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-060621-2450-99"
|
||
]
|
||
},
|
||
"uuid": "6eb47eef-898e-4d74-9f85-ac9c99250e9b"
|
||
},
|
||
{
|
||
"value": "AdMob",
|
||
"description": "AdMob is an advertisement library that is bundled with certain Android applications. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052822-3437-99"
|
||
]
|
||
},
|
||
"uuid": "932d18c5-6332-4334-83fc-4af3c46a4992"
|
||
},
|
||
{
|
||
"value": "Adrd",
|
||
"description": "Adrd is a Trojan horse that steals information from Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-021514-4954-99"
|
||
]
|
||
},
|
||
"uuid": "121b8084-fdfd-4746-9675-cf8a191bf6d9"
|
||
},
|
||
{
|
||
"value": "Aduru",
|
||
"description": "Aduru is an advertisement library that is bundled with certain Android applications. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052618-2419-99"
|
||
]
|
||
},
|
||
"uuid": "3476c6dd-3cb0-443d-8668-0f731616b068"
|
||
},
|
||
{
|
||
"value": "Adwhirl",
|
||
"description": "Adwhirl is an advertisement library that is bundled with certain Android applications. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052918-1414-99"
|
||
]
|
||
},
|
||
"uuid": "6fe8fd1b-a7d9-4ece-95f5-fdaaa0acd797"
|
||
},
|
||
{
|
||
"value": "Adwlauncher",
|
||
"description": "Adwlauncher is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-082308-1823-99"
|
||
]
|
||
},
|
||
"uuid": "8ee649b6-8379-4b01-8997-dc7c82e22bb5"
|
||
},
|
||
{
|
||
"value": "Adwo",
|
||
"description": "Adwo is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-032814-5806-99"
|
||
]
|
||
},
|
||
"uuid": "5c979585-51c3-427c-a23d-cbe43083ce2d"
|
||
},
|
||
{
|
||
"value": "Airad",
|
||
"description": "Airad is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-032815-1704-99"
|
||
]
|
||
},
|
||
"uuid": "5824688f-e91c-44ab-ae2e-392299e9d071"
|
||
},
|
||
{
|
||
"value": "Alienspy",
|
||
"description": "Alienspy is a Trojan horse for Android devices that steals information from the compromised device. It may also download potentially malicious files. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-042714-5942-99"
|
||
]
|
||
},
|
||
"uuid": "680a1677-9bff-4285-9394-62b1ce096c84"
|
||
},
|
||
{
|
||
"value": "AmazonAds",
|
||
"description": "AmazonAds is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052618-5002-99"
|
||
]
|
||
},
|
||
"uuid": "3a94a731-4566-4cc5-8c01-d651dc11b8a5"
|
||
},
|
||
{
|
||
"value": "Answerbot",
|
||
"description": "Answerbot is a Trojan horse that opens a back door on Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-100711-2129-99"
|
||
]
|
||
},
|
||
"uuid": "b8f8d1c1-5f33-4b13-8ecf-2383e3213713"
|
||
},
|
||
{
|
||
"value": "Antammi",
|
||
"description": "Antammi is a Trojan horse that steals information from Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-032106-5211-99"
|
||
]
|
||
},
|
||
"uuid": "bbc13ff1-0cee-4c30-a864-2c6a341ac365"
|
||
},
|
||
{
|
||
"value": "Apkmore",
|
||
"description": "Apkmore is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040113-4813-99"
|
||
]
|
||
},
|
||
"uuid": "f45b87cf-6811-427c-84ff-027898b0592a"
|
||
},
|
||
{
|
||
"value": "Aplog",
|
||
"description": "Aplog is a Trojan horse for Android devices that steals information from the device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-100911-1023-99"
|
||
]
|
||
},
|
||
"uuid": "600da14d-a959-4a06-9a13-85ff50cb05b4"
|
||
},
|
||
{
|
||
"value": "Appenda",
|
||
"description": "Appenda is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-062812-0516-99"
|
||
]
|
||
},
|
||
"uuid": "1840c69b-f340-444e-a4e5-ac324c8214eb"
|
||
},
|
||
{
|
||
"value": "Apperhand",
|
||
"description": "Apperhand is an advertisement library that is bundled with certain Android applications. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-032815-5637-99"
|
||
]
|
||
},
|
||
"uuid": "2c199154-888b-4444-8d21-622ed62e6e63"
|
||
},
|
||
{
|
||
"value": "Appleservice",
|
||
"description": "Appleservice is a Trojan horse for Android devices that may steal information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-031011-4321-99"
|
||
]
|
||
},
|
||
"uuid": "920b0561-abc9-409e-92b1-3b13b7d21a06"
|
||
},
|
||
{
|
||
"value": "AppLovin",
|
||
"description": "AppLovin is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040112-1739-99"
|
||
]
|
||
},
|
||
"uuid": "e212433e-6dac-40ab-8793-8dcfe4a1538f"
|
||
},
|
||
{
|
||
"value": "Arspam",
|
||
"description": "Arspam is a Trojan horse for Android devices that sends spam SMS messages to contacts on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-121915-3251-99"
|
||
]
|
||
},
|
||
"uuid": "e565a78c-8fa8-419b-b235-1fafa500686c"
|
||
},
|
||
{
|
||
"value": "Aurecord",
|
||
"description": "Aurecord is a spyware application for Android devices that allows the device it is installed on to be monitored. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-031914-2310-99"
|
||
]
|
||
},
|
||
"uuid": "80a800a7-01ec-4712-9d2b-2382f7bf9201"
|
||
},
|
||
{
|
||
"value": "Backapp",
|
||
"description": "Backapp is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-092708-5017-99"
|
||
]
|
||
},
|
||
"uuid": "a4100d65-78d0-47ec-b939-709447641bab"
|
||
},
|
||
{
|
||
"value": "Backdexer",
|
||
"description": "Backdexer is a Trojan horse for Android devices that may send premium-rate SMS messages from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-121812-2502-99"
|
||
]
|
||
},
|
||
"uuid": "27c289c7-a661-4322-9c21-8053f347e457"
|
||
},
|
||
{
|
||
"value": "Backflash",
|
||
"description": "Backflash is a Trojan horse for Android devices that opens a back door and steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-091714-0427-99"
|
||
]
|
||
},
|
||
"uuid": "da8cc77b-a26d-43da-a47a-a50892c08edd"
|
||
},
|
||
{
|
||
"value": "Backscript",
|
||
"description": "Backscript is a Trojan horse for Android devices that downloads files onto the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-090704-3639-99"
|
||
]
|
||
},
|
||
"uuid": "d9f11a96-5f9a-48b6-9dac-735ca4fca4d2"
|
||
},
|
||
{
|
||
"value": "Badaccents",
|
||
"description": "Badaccents is a Trojan horse for Android devices that may download apps on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-123015-3618-99"
|
||
]
|
||
},
|
||
"uuid": "1442e5a8-d2cf-48cd-86e5-276a9dfc0bae"
|
||
},
|
||
{
|
||
"value": "Badpush",
|
||
"description": "Badpush is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040311-4133-99"
|
||
]
|
||
},
|
||
"uuid": "ceacaa80-471e-4e38-b648-78b000771076"
|
||
},
|
||
{
|
||
"value": "Ballonpop",
|
||
"description": "Ballonpop is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-120911-1731-99"
|
||
]
|
||
},
|
||
"uuid": "6f957cc5-467b-4465-b14d-ccc6f2206543"
|
||
},
|
||
{
|
||
"value": "Bankosy",
|
||
"description": "Bankosy is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-072316-5249-99"
|
||
]
|
||
},
|
||
"uuid": "620981e8-49c8-486a-b30c-359702c8ffbc"
|
||
},
|
||
{
|
||
"value": "Bankun",
|
||
"description": "Bankun is a Trojan horse for Android devices that replaces certain banking applications on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-072318-4143-99"
|
||
]
|
||
},
|
||
"uuid": "bc45ca3c-a6fa-408d-bfab-cc845ffde1e2"
|
||
},
|
||
{
|
||
"value": "Basebridge",
|
||
"description": "Basebridge is a Trojan horse that attempts to send premium-rate SMS messages to predetermined numbers. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-060915-4938-99"
|
||
]
|
||
},
|
||
"uuid": "9ae60aaa-bcdb-46a1-a1da-d779cb13cb2b"
|
||
},
|
||
{
|
||
"value": "Basedao",
|
||
"description": "Basedao is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-061715-3303-99"
|
||
]
|
||
},
|
||
"uuid": "9d625454-80a7-4c56-bb90-c0a678c6dec1"
|
||
},
|
||
{
|
||
"value": "Batterydoctor",
|
||
"description": "Batterydoctor is Trojan that makes exaggerated claims about the device's ability to recharge the battery, as well as steal information. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-101916-0847-99"
|
||
]
|
||
},
|
||
"uuid": "5bd321b1-afef-482f-b160-2e209dffb390"
|
||
},
|
||
{
|
||
"value": "Beaglespy",
|
||
"description": "Beaglespy is an Android mobile detection for the Beagle spyware program as well as its associated client application.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-091010-0627-99"
|
||
]
|
||
},
|
||
"uuid": "2e3ad1af-e24c-4b1c-87cb-360dab4d90a9"
|
||
},
|
||
{
|
||
"value": "Becuro",
|
||
"description": "Becuro is a Trojan horse for Android devices that downloads potentially malicious files onto the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-051410-3348-99"
|
||
]
|
||
},
|
||
"uuid": "dd83dbc7-9ffa-4ca7-a8c3-6b27bde4c3bd"
|
||
},
|
||
{
|
||
"value": "Beita",
|
||
"description": "Beita is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-110111-1829-99"
|
||
]
|
||
},
|
||
"uuid": "4baa74be-682f-4a38-b4b1-aceba8f48009"
|
||
},
|
||
{
|
||
"value": "Bgserv",
|
||
"description": "Bgserv is a Trojan that opens a back door and transmits information from the device to a remote location. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-031005-2918-99"
|
||
]
|
||
},
|
||
"uuid": "e4a18a09-09ed-4ca8-93b8-be946e9f560c"
|
||
},
|
||
{
|
||
"value": "Biigespy",
|
||
"description": "Biigespy is an Android mobile detection for the Biige spyware program as well as its associated client application. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-091012-0526-99"
|
||
]
|
||
},
|
||
"uuid": "7a46c9c6-9af5-41e6-a625-aa14009c528e"
|
||
},
|
||
{
|
||
"value": "Bmaster",
|
||
"description": "Bmaster is a Trojan horse on the Android platform that opens a back door, downloads files and steals potentially confidential information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-020609-3003-99"
|
||
]
|
||
},
|
||
"uuid": "9ac3232d-b533-44d6-9b73-4341e2cba4b4"
|
||
},
|
||
{
|
||
"value": "Bossefiv",
|
||
"description": "Bossefiv is a Trojan horse for Android devices that steals information. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-061520-4322-99"
|
||
]
|
||
},
|
||
"uuid": "45d85c09-8bed-4c4e-b1d1-4784737734a5"
|
||
},
|
||
{
|
||
"value": "Boxpush",
|
||
"description": "Boxpush is an advertisement library that is bundled with certain Android applications. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040207-4613-99"
|
||
]
|
||
},
|
||
"uuid": "412bb5c6-a5fd-4f36-939e-47f87cc3edae"
|
||
},
|
||
{
|
||
"value": "Burstly",
|
||
"description": "Burstly is an advertisement library that is bundled with certain Android applications. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052918-1443-99"
|
||
]
|
||
},
|
||
"uuid": "74053925-b076-47b0-8c23-bb90ff89653c"
|
||
},
|
||
{
|
||
"value": "Buzzcity",
|
||
"description": "Buzzcity is an advertisement library that is bundled with certain Android applications. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052918-1454-99"
|
||
]
|
||
},
|
||
"uuid": "604430f2-8109-40a6-8224-39d2790914e5"
|
||
},
|
||
{
|
||
"value": "ByPush",
|
||
"description": "ByPush is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040315-4708-99"
|
||
]
|
||
},
|
||
"uuid": "7c373640-5830-4f23-b122-3fb4f7af0b64"
|
||
},
|
||
{
|
||
"value": "Cajino",
|
||
"description": "Cajino is a Trojan horse for Android devices that opens a back door on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-040210-3746-99"
|
||
]
|
||
},
|
||
"uuid": "388ed802-54bc-4cf0-899e-92fed27df5e1"
|
||
},
|
||
{
|
||
"value": "Casee",
|
||
"description": "Casee is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052919-3501-99"
|
||
]
|
||
},
|
||
"uuid": "f48a667a-a74d-4c04-80a2-a257cd8e29cc"
|
||
},
|
||
{
|
||
"value": "Catchtoken",
|
||
"description": "Catchtoken is a Trojan horse for Android devices that intercepts SMS messages and opens a back door on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-121619-0548-99"
|
||
]
|
||
},
|
||
"uuid": "ec37c5db-0497-440b-a7bc-4e28dc5c95f4"
|
||
},
|
||
{
|
||
"value": "Cauly",
|
||
"description": "Cauly is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052919-3454-99"
|
||
]
|
||
},
|
||
"uuid": "b5db1360-91fc-4dc3-8520-d00f9f3601ce"
|
||
},
|
||
{
|
||
"value": "Cellshark",
|
||
"description": "Cellshark is a spyware application for Android devices that periodically gathers information from the device and uploads it to a predetermined location.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-111611-0914-99"
|
||
]
|
||
},
|
||
"uuid": "471e6971-ab43-4b59-917c-5cdd5b8fd531"
|
||
},
|
||
{
|
||
"value": "Centero",
|
||
"description": "Centero is a Trojan horse for Android devices that displays advertisements on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-053006-2502-99"
|
||
]
|
||
},
|
||
"uuid": "a9595906-adcf-4a08-9f71-f2eb2199cb87"
|
||
},
|
||
{
|
||
"value": "Chuli",
|
||
"description": "Chuli is a Trojan horse for Android devices that opens a back door and may steal information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-032617-1604-99"
|
||
]
|
||
},
|
||
"uuid": "f2f3e65a-5e46-45e9-aa23-addd841ba3c6"
|
||
},
|
||
{
|
||
"value": "Citmo",
|
||
"description": "Citmo is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-030715-5012-99"
|
||
]
|
||
},
|
||
"uuid": "e271a188-fc07-4f03-a047-d96ea64ee1e5"
|
||
},
|
||
{
|
||
"value": "Claco",
|
||
"description": "Claco is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-020415-5600-99"
|
||
]
|
||
},
|
||
"uuid": "2a7c2aff-9e7f-4358-9196-477042fc2f5b"
|
||
},
|
||
{
|
||
"value": "Clevernet",
|
||
"description": "Clevernet is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040107-5257-99"
|
||
]
|
||
},
|
||
"uuid": "76090f4b-eb03-42c0-90bb-9337d1a20d74"
|
||
},
|
||
{
|
||
"value": "Cnappbox",
|
||
"description": "Cnappbox is an advertisement library that is bundled with certain Android applications. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040215-1141-99"
|
||
]
|
||
},
|
||
"uuid": "d343483b-909c-490a-827e-3a2c9d6ad033"
|
||
},
|
||
{
|
||
"value": "Cobblerone",
|
||
"description": "Cobblerone is a spyware application for Android devices that can track the phone's location and remotely erase the device.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-111514-3846-99"
|
||
]
|
||
},
|
||
"uuid": "4863856a-9899-42a2-b02c-449aaa5a8258"
|
||
},
|
||
{
|
||
"value": "Coolpaperleak",
|
||
"description": "Coolpaperleak is a Trojan horse for Android devices that steals information and sends it to a remote location. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-080211-5757-99"
|
||
]
|
||
},
|
||
"uuid": "272b75a0-a77f-44eb-ba7f-b68804d3506d"
|
||
},
|
||
{
|
||
"value": "Coolreaper",
|
||
"description": "Coolreaper is a Trojan horse for Android devices that opens a back door on the compromised device. It may also steal information and download potentially malicious files. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-011220-3211-99"
|
||
]
|
||
},
|
||
"uuid": "f2646118-fa1d-4e6a-9115-033ba1e05b21"
|
||
},
|
||
{
|
||
"value": "Cosha",
|
||
"description": "Cosha is a spyware program for Android devices that monitors and sends certain information to a remote location.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-081712-5231-99"
|
||
]
|
||
},
|
||
"uuid": "045d0e45-ce4d-4b51-92c8-111013b3b972"
|
||
},
|
||
{
|
||
"value": "Counterclank",
|
||
"description": "Counterclank is a Trojan horse for Android devices that steals information. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-012709-4046-99"
|
||
]
|
||
},
|
||
"uuid": "95b527d5-d90c-4c37-973f-1dc83da6511e"
|
||
},
|
||
{
|
||
"value": "Crazymedia",
|
||
"description": "Crazymedia is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040312-2547-99"
|
||
]
|
||
},
|
||
"uuid": "a08d4206-92b7-4b0e-9267-24eb4acf737f"
|
||
},
|
||
{
|
||
"value": "Crisis",
|
||
"description": "Crisis is a Trojan horse for Android devices that opens a back door and steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-071409-0636-99"
|
||
]
|
||
},
|
||
"uuid": "c17f6e4b-70c5-42f8-a91b-19d73485bd04"
|
||
},
|
||
{
|
||
"value": "Crusewind",
|
||
"description": "Crusewind is a Trojan horse for Android devices that sends SMS messages to a premium-rate number. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-070301-5702-99"
|
||
]
|
||
},
|
||
"uuid": "67c624e1-89a0-4581-9fa3-de4864a03aab"
|
||
},
|
||
{
|
||
"value": "Dandro",
|
||
"description": "Dandro is a Trojan horse for Android devices that allows a remote attacker to gain control over the device and steal information from it. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-012916-2128-99"
|
||
]
|
||
},
|
||
"uuid": "a5bff39e-804e-4c62-b5fb-7a7e32069a7d"
|
||
},
|
||
{
|
||
"value": "Daoyoudao",
|
||
"description": "Daoyoudao is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040214-5018-99"
|
||
]
|
||
},
|
||
"uuid": "939f5057-635a-46e7-b15a-fb301258d0f9"
|
||
},
|
||
{
|
||
"value": "Deathring",
|
||
"description": "Deathring is a Trojan horse for Android devices that may perform malicious activities on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-121116-4547-99"
|
||
]
|
||
},
|
||
"uuid": "07ca0660-3391-4cb1-900c-a1ad38980b06"
|
||
},
|
||
{
|
||
"value": "Deeveemap",
|
||
"description": "Deeveemap is a Trojan horse for Android devices that downloads potentially malicious files onto the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2017-060907-5221-99"
|
||
]
|
||
},
|
||
"uuid": "a23a5f71-affe-4f0e-aa8f-39a3967210ae"
|
||
},
|
||
{
|
||
"value": "Dendoroid",
|
||
"description": "Dendoroid is a Trojan horse for Android devices that opens a back door, steals information, and may perform other malicious activities on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-030418-2633-99"
|
||
]
|
||
},
|
||
"uuid": "f1a4a027-bb70-4279-9c59-c271ac264cbf"
|
||
},
|
||
{
|
||
"value": "Dengaru",
|
||
"description": "Dengaru is a Trojan horse for Android devices that performs click-fraud from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-051113-4819-99"
|
||
]
|
||
},
|
||
"uuid": "2788d128-4c7a-4ed2-93c1-03125579251c"
|
||
},
|
||
{
|
||
"value": "Diandong",
|
||
"description": "Diandong is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040207-2453-99"
|
||
]
|
||
},
|
||
"uuid": "4fc012cf-dbbf-4200-af95-879eb668eb66"
|
||
},
|
||
{
|
||
"value": "Dianjin",
|
||
"description": "Dianjin is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040107-0313-99"
|
||
]
|
||
},
|
||
"uuid": "bb9ff44c-eb04-4df3-8e17-967f59fee4f5"
|
||
},
|
||
{
|
||
"value": "Dogowar",
|
||
"description": "Dogowar is a Trojan horse on the Android platform that sends SMS texts to all contacts on the device. It is a repackaged version of a game application called Dog Wars, which can be downloaded from a third party market and must be manually installed. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-081510-4323-99"
|
||
]
|
||
},
|
||
"uuid": "397ed797-e2a9-423a-a485-e06b4633b37a"
|
||
},
|
||
{
|
||
"value": "Domob",
|
||
"description": "Domob is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040416-4235-99"
|
||
]
|
||
},
|
||
"uuid": "e99fe1de-4f88-4c69-95bc-87df65dc73ca"
|
||
},
|
||
{
|
||
"value": "Dougalek",
|
||
"description": "Dougalek is a Trojan horse for Android devices that steals information from the compromised device. The threat is typically disguised to display a video. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-041601-3400-99"
|
||
]
|
||
},
|
||
"uuid": "d06b78de-b9f1-474a-b243-c975bd55baed"
|
||
},
|
||
{
|
||
"value": "Dowgin",
|
||
"description": "Dowgin is an advertisement library that is bundled with certain Android applications. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-033108-4723-99"
|
||
]
|
||
},
|
||
"uuid": "8635a12e-4fa4-495e-b3c9-de4a01c1bc59"
|
||
},
|
||
{
|
||
"value": "Droidsheep",
|
||
"description": "Droidsheep is a hacktool for Android devices that hijacks social networking accounts on compromised devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-031014-3628-99"
|
||
]
|
||
},
|
||
"uuid": "0ac34775-2323-4866-a540-913043aec431"
|
||
},
|
||
{
|
||
"value": "Dropdialer",
|
||
"description": "Dropdialer is a Trojan horse for Android devices that sends SMS messages to a premium-rate phone number. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-070909-0726-99"
|
||
]
|
||
},
|
||
"uuid": "d3aeb67a-6247-4a90-b7c2-971ced9dc7ef"
|
||
},
|
||
{
|
||
"value": "Dupvert",
|
||
"description": "Dupvert is a Trojan horse for Android devices that opens a back door and steals information from the compromised device. It may also perform other malicious activities. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-072313-1959-99"
|
||
]
|
||
},
|
||
"uuid": "f8c910ed-6047-4628-a21a-2d5bf6895fd4"
|
||
},
|
||
{
|
||
"value": "Dynamicit",
|
||
"description": "Dynamicit is an advertisement library that is bundled with certain Android applications. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040407-1346-99"
|
||
]
|
||
},
|
||
"uuid": "e9df4254-31d9-45c3-80df-f6da15549ebb"
|
||
},
|
||
{
|
||
"value": "Ecardgrabber",
|
||
"description": "Ecardgrabber is an application that attempts to read details from NFC enabled credit cards. It attempts to read information from NFC enabled credit cards that are in close proximity.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-062215-0939-99"
|
||
]
|
||
},
|
||
"uuid": "70570b6a-7236-48cb-9b0d-e8495779f51d"
|
||
},
|
||
{
|
||
"value": "Ecobatry",
|
||
"description": "Ecobatry is a Trojan horse for Android devices that steals information and sends it to a remote location. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-080606-4102-99"
|
||
]
|
||
},
|
||
"uuid": "d8f4b1c3-7234-40ec-b944-8b22d2ba1fe7"
|
||
},
|
||
{
|
||
"value": "Enesoluty",
|
||
"description": "Enesoluty is a Trojan horse for Android devices that steals information and sends it to a remote location. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-090607-0807-99"
|
||
]
|
||
},
|
||
"uuid": "6d5be115-6245-456b-929c-3077987e65d4"
|
||
},
|
||
{
|
||
"value": "Everbadge",
|
||
"description": "Everbadge is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040416-3736-99"
|
||
]
|
||
},
|
||
"uuid": "36a6af63-035c-43ef-b534-0fe2f16462eb"
|
||
},
|
||
{
|
||
"value": "Ewalls",
|
||
"description": "Ewalls is a Trojan horse for the Android operating system that steals information from the mobile device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2010-073014-0854-99"
|
||
]
|
||
},
|
||
"uuid": "ef424b45-fb8a-4e81-9b9e-5ebb8d9219ed"
|
||
},
|
||
{
|
||
"value": "Exprespam",
|
||
"description": "Exprespam is a Trojan horse for Android devices that displays a fake message and steals personal information stored on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-010705-2324-99"
|
||
]
|
||
},
|
||
"uuid": "043ee6fa-37de-4a2d-a888-95febf8a243c"
|
||
},
|
||
{
|
||
"value": "Fakealbums",
|
||
"description": "Fakealbums is a Trojan horse for Android devices that monitors and forwards received messages from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-071819-0636-99"
|
||
]
|
||
},
|
||
"uuid": "0399e18a-e047-4507-a66c-2503b00cd727"
|
||
},
|
||
{
|
||
"value": "Fakeangry",
|
||
"description": "Fakeangry is a Trojan horse on the Android platform that opens a back door, downloads files, and steals potentially confidential information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-022823-4233-99"
|
||
]
|
||
},
|
||
"uuid": "6032b79e-68e7-4a9f-b913-8cb62e7c28e8"
|
||
},
|
||
{
|
||
"value": "Fakeapp",
|
||
"description": "Fakeapp is a Trojan horse for Android devices that downloads configuration files to display advertisements and collects information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-022805-4318-99"
|
||
]
|
||
},
|
||
"uuid": "493c97f8-db6c-40ae-a06e-fa2a9d84d660"
|
||
},
|
||
{
|
||
"value": "Fakebanco",
|
||
"description": "Fakebanco is a Trojan horse for Android devices that redirects users to a phishing page in order to steal their information. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-112109-5329-99"
|
||
]
|
||
},
|
||
"uuid": "7714a6ee-3a75-42b2-ad4b-ec21da4259fd"
|
||
},
|
||
{
|
||
"value": "Fakebank",
|
||
"description": "Fakebank is a Trojan horse that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-071813-2448-99"
|
||
]
|
||
},
|
||
"uuid": "4fba0b79-0be2-4471-9c1a-5a0295130ac2"
|
||
},
|
||
{
|
||
"value": "Fakebank.B",
|
||
"description": "Fakebank.B is a Trojan horse for Android devices that opens a back door and steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-101114-5645-99"
|
||
]
|
||
},
|
||
"uuid": "fb3083ad-5342-4913-9d48-f3abaf613878"
|
||
},
|
||
{
|
||
"value": "Fakebok",
|
||
"description": "Fakebok is a Trojan horse for Android devices that sends SMS messages to premium phone numbers. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-021115-5153-99"
|
||
]
|
||
},
|
||
"uuid": "84318a88-5ed5-43e9-ae8d-143e7373a46d"
|
||
},
|
||
{
|
||
"value": "Fakedaum",
|
||
"description": "Fakedaum is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-061813-3630-99"
|
||
]
|
||
},
|
||
"uuid": "b91c1aaf-4a06-40ec-b4b9-59e9da882697"
|
||
},
|
||
{
|
||
"value": "Fakedefender",
|
||
"description": "Fakedefender is a Trojan horse for Android devices that displays fake security alerts in an attempt to convince the user to purchase an app in order to remove non-existent malware or security risks from the device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-060301-4418-99"
|
||
]
|
||
},
|
||
"uuid": "79a6bf32-d063-4b7c-a891-3dda49e31582"
|
||
},
|
||
{
|
||
"value": "Fakedefender.B",
|
||
"description": "Fakedefender.B is a Trojan horse for Android devices that displays fake security alerts in an attempt to convince the user to purchase an app in order to remove non-existent malware or security risks from the device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-091013-3953-99"
|
||
]
|
||
},
|
||
"uuid": "26f660c5-c04b-4bb2-8169-5dc2dfe1c835"
|
||
},
|
||
{
|
||
"value": "Fakedown",
|
||
"description": "Fakedown is a Trojan horse for Android devices that downloads more malicious apps onto the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-041803-5918-99"
|
||
]
|
||
},
|
||
"uuid": "f43ef200-e9d8-4cca-bb63-ac3d70465fed"
|
||
},
|
||
{
|
||
"value": "Fakeflash",
|
||
"description": "Fakeflash is a Trojan horse for Android devices that installs a fake Flash application in order to direct users to a website. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-070318-2122-99"
|
||
]
|
||
},
|
||
"uuid": "d2fe043a-8b6c-4aa2-8527-c51b7b44f9df"
|
||
},
|
||
{
|
||
"value": "Fakegame",
|
||
"description": "Fakegame is a Trojan horse for Android devices that displays advertisements and steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-040808-2922-99"
|
||
]
|
||
},
|
||
"uuid": "250a3e30-2025-486d-98fe-2fe1cf817451"
|
||
},
|
||
{
|
||
"value": "Fakeguard",
|
||
"description": "Fakeguard is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-102908-3526-99"
|
||
]
|
||
},
|
||
"uuid": "2c5798aa-e68c-4158-ba04-1db39512451f"
|
||
},
|
||
{
|
||
"value": "Fakejob",
|
||
"description": "Fakejob is a Trojan horse for Android devices that redirects users to scam websites. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-030721-3048-99"
|
||
]
|
||
},
|
||
"uuid": "ba8bf35c-187f-4acb-8b44-5ee288535679"
|
||
},
|
||
{
|
||
"value": "Fakekakao",
|
||
"description": "Fakekakao is a Trojan horse for Android devices sends SMS messages to contacts stored on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-071617-2031-99"
|
||
]
|
||
},
|
||
"uuid": "f0915277-0156-4832-b282-4447f4d06449"
|
||
},
|
||
{
|
||
"value": "Fakelemon",
|
||
"description": "Fakelemon is a Trojan horse for Android devices that blocks certain SMS messages and may subscribe to services without the user's consent. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-120609-3608-99"
|
||
]
|
||
},
|
||
"uuid": "398bd8d6-a7ee-4f51-a8ff-96d8b4ae93a5"
|
||
},
|
||
{
|
||
"value": "Fakelicense",
|
||
"description": "Fakelicense is a Trojan horse that displays advertisements on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-062709-1437-99"
|
||
]
|
||
},
|
||
"uuid": "21e5a963-ad8a-479b-b33e-35deb75f846d"
|
||
},
|
||
{
|
||
"value": "Fakelogin",
|
||
"description": "Fakelogin is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-102108-5457-99"
|
||
]
|
||
},
|
||
"uuid": "6bd49caa-59a2-4abf-86ea-7a2ebc7ed324"
|
||
},
|
||
{
|
||
"value": "FakeLookout",
|
||
"description": "FakeLookout is a Trojan horse for Android devices that opens a back door and steals information on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-101919-2128-99"
|
||
]
|
||
},
|
||
"uuid": "caffc461-7415-4017-82bf-195df5d7791f"
|
||
},
|
||
{
|
||
"value": "FakeMart",
|
||
"description": "FakeMart is a Trojan horse for Android devices that may send SMS messages to premium rate numbers. It may also block incoming messages and steal information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-081217-1428-99"
|
||
]
|
||
},
|
||
"uuid": "6816561e-203f-4f6c-b85b-e4f51148e9e7"
|
||
},
|
||
{
|
||
"value": "Fakemini",
|
||
"description": "Fakemini is a Trojan horse for Android devices that disguises itself as an installation for the Opera Mini browser and sends premium-rate SMS messages to a predetermined number. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-110410-5958-99"
|
||
]
|
||
},
|
||
"uuid": "b40b23aa-5b2a-46bf-94ab-0bd0f9a896c9"
|
||
},
|
||
{
|
||
"value": "Fakemrat",
|
||
"description": "Fakemrat is a Trojan horse for Android devices that opens a back door and steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2016-012608-1538-99"
|
||
]
|
||
},
|
||
"uuid": "b61b0ca5-fd3c-4e65-af3f-7d4e9bc75e62"
|
||
},
|
||
{
|
||
"value": "Fakeneflic",
|
||
"description": "Fakeneflic is a Trojan horse that steals information from Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-101105-0518-99"
|
||
]
|
||
},
|
||
"uuid": "58113e57-f6df-45f0-a058-b08a892c3903"
|
||
},
|
||
{
|
||
"value": "Fakenotify",
|
||
"description": "Fakenotify is a Trojan horse for Android devices that sends SMS messages to premium-rate phone numbers, collects and sends information, and periodically displays Web pages. It also downloads legitimate apps onto the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-011302-3052-99"
|
||
]
|
||
},
|
||
"uuid": "9dbfc63d-2b0d-406d-95cf-f87494bd588a"
|
||
},
|
||
{
|
||
"value": "Fakepatch",
|
||
"description": "Fakepatch is a Trojan horse for Android devices that downloads more files on to the device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-062811-2820-99"
|
||
]
|
||
},
|
||
"uuid": "981938f8-7820-4b15-ab96-f4923280253c"
|
||
},
|
||
{
|
||
"value": "Fakeplay",
|
||
"description": "Fakeplay is a Trojan horse for Android devices that steals information from the compromised device and sends it to a predetermined email address. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-100917-3825-99"
|
||
]
|
||
},
|
||
"uuid": "4ac0574f-8faa-463f-a493-b245f2c76d2c"
|
||
},
|
||
{
|
||
"value": "Fakescarav",
|
||
"description": "Fakescarav is a Trojan horse for Android devices that displays fake security alerts in an attempt to convince the user to pay in order to remove non-existent malware or security risks from the device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-012809-1901-99"
|
||
]
|
||
},
|
||
"uuid": "d52ff282-7b5c-427d-bc79-fbd686fb9ba3"
|
||
},
|
||
{
|
||
"value": "Fakesecsuit",
|
||
"description": "Fakesecsuit is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-060514-1301-99"
|
||
]
|
||
},
|
||
"uuid": "c23a04d3-5c38-4edc-b082-84c8997405ab"
|
||
},
|
||
{
|
||
"value": "Fakesucon",
|
||
"description": "Fakesucon is a Trojan horse program for Android devices that sends SMS messages to premium-rate phone numbers. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-120915-2524-99"
|
||
]
|
||
},
|
||
"uuid": "942a4a67-875a-4273-845f-3d6845738283"
|
||
},
|
||
{
|
||
"value": "Faketaobao",
|
||
"description": "Faketaobao is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-062518-4057-99"
|
||
]
|
||
},
|
||
"uuid": "ee83a04a-5ce2-41f9-b232-c274c25acd7e"
|
||
},
|
||
{
|
||
"value": "Faketaobao.B",
|
||
"description": "Faketaobao.B is a Trojan horse for Android devices that intercepts and and sends incoming SMS messages to a remote attacker. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-012106-4013-99"
|
||
]
|
||
},
|
||
"uuid": "2d4899d5-d566-4058-b216-a5c37f601417"
|
||
},
|
||
{
|
||
"value": "Faketoken",
|
||
"description": "Faketoken is a Trojan horse that opens a back door on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-032211-2048-99",
|
||
"http://bgr.com/2017/08/18/android-malware-faketoken-steal-credit-card-info/"
|
||
]
|
||
},
|
||
"uuid": "25feca2d-6867-4390-9d60-100b47d9d81a"
|
||
},
|
||
{
|
||
"value": "Fakeupdate",
|
||
"description": "Fakeupdate is a Trojan horse for Android devices that downloads other applications onto the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-081914-5637-99"
|
||
]
|
||
},
|
||
"uuid": "e3eab046-a427-4132-99e7-f69598abcfd4"
|
||
},
|
||
{
|
||
"value": "Fakevoice",
|
||
"description": "Fakevoice is a Trojan horse for Android devices that dials a premium-rate phone number. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-040510-3249-99"
|
||
]
|
||
},
|
||
"uuid": "aab42c7b-fe4e-483c-9db5-146f449c0937"
|
||
},
|
||
{
|
||
"value": "Farmbaby",
|
||
"description": "Farmbaby is a spyware application for Android devices that logs certain information and sends SMS messages to a predetermined phone number.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-090715-3641-99"
|
||
]
|
||
},
|
||
"uuid": "97973daa-ece5-46ef-ac5b-a6ead8bddb97"
|
||
},
|
||
{
|
||
"value": "Fauxtocopy",
|
||
"description": "Fauxtocopy is a spyware application for Android devices that gathers photos from the device and sends them to a predetermined email address.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-111515-3940-99"
|
||
]
|
||
},
|
||
"uuid": "1b316569-88c5-4f5a-874c-b3eb7f5a229d"
|
||
},
|
||
{
|
||
"value": "Feiwo",
|
||
"description": "Feiwo is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040107-4038-99"
|
||
]
|
||
},
|
||
"uuid": "0e5a7148-d5ab-4428-bbec-55780a4fcdad"
|
||
},
|
||
{
|
||
"value": "FindAndCall",
|
||
"description": "FindAndCall is a Potentially Unwanted Application for Android devices that may leak information.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-031020-2906-99"
|
||
]
|
||
},
|
||
"uuid": "d49baeba-0982-4815-a30a-c6520424a44d"
|
||
},
|
||
{
|
||
"value": "Finfish",
|
||
"description": "Finfish is a Trojan horse for Android devices that opens a back door and steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-083016-0032-99"
|
||
]
|
||
},
|
||
"uuid": "b17a7d6f-8a48-408d-9362-3be6fab1d464"
|
||
},
|
||
{
|
||
"value": "Fireleaker",
|
||
"description": "Fireleaker is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-031814-5207-99"
|
||
]
|
||
},
|
||
"uuid": "c8202616-804d-48c6-b104-466b3584f511"
|
||
},
|
||
{
|
||
"value": "Fitikser",
|
||
"description": "Fitikser is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-093015-2830-99"
|
||
]
|
||
},
|
||
"uuid": "10ac6220-2f49-4b25-9024-15f83f18033e"
|
||
},
|
||
{
|
||
"value": "Flexispy",
|
||
"description": "Flexispy is a Spyware application for Android devices that logs the device's activity and sends it to a predetermined website. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-122006-4805-99"
|
||
]
|
||
},
|
||
"uuid": "a24e855e-cd0c-4abd-b2d8-0eaec87bcae5"
|
||
},
|
||
{
|
||
"value": "Fokonge",
|
||
"description": "Fokonge is a Trojan horse that steals information from Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-071802-0727-99"
|
||
]
|
||
},
|
||
"uuid": "819bf929-01f0-447e-994c-e0e2f5a145c9"
|
||
},
|
||
{
|
||
"value": "FoncySMS",
|
||
"description": "FoncySMS is a Trojan horse for Android devices that sends SMS messages to premium-rate phone numbers. It may also connect to an IRC server and execute any received shell commands. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-011502-2651-99"
|
||
]
|
||
},
|
||
"uuid": "917270d8-d7f3-432a-8c5c-28e7ea842f3e"
|
||
},
|
||
{
|
||
"value": "Frogonal",
|
||
"description": "Frogonal is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-062205-2312-99"
|
||
]
|
||
},
|
||
"uuid": "c0c69286-1448-4a37-b047-7518d45a0b80"
|
||
},
|
||
{
|
||
"value": "Ftad",
|
||
"description": "Ftad is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040114-2020-99"
|
||
]
|
||
},
|
||
"uuid": "4295a452-f24d-4a95-be3c-dc5f17606669"
|
||
},
|
||
{
|
||
"value": "Funtasy",
|
||
"description": "Funtasy is a Trojan horse for Android devices that subscribes the user to premium SMS services. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-092519-5811-99"
|
||
]
|
||
},
|
||
"uuid": "8e11e4fa-e8d5-485d-8ee8-61bf52bcde27"
|
||
},
|
||
{
|
||
"value": "GallMe",
|
||
"description": "GallMe is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040312-1336-99"
|
||
]
|
||
},
|
||
"uuid": "2086ef12-5578-496c-b140-433836b643ef"
|
||
},
|
||
{
|
||
"value": "Gamex",
|
||
"description": "Gamex is a Trojan horse for Android devices that downloads further threats. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-051015-1808-99"
|
||
]
|
||
},
|
||
"uuid": "fb63ab80-c198-48a8-a2f3-5fee516d8277"
|
||
},
|
||
{
|
||
"value": "Gappusin",
|
||
"description": "Gappusin is a Trojan horse for Android devices that downloads applications and disguises them as system updates. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-022007-2013-99"
|
||
]
|
||
},
|
||
"uuid": "65a95075-b79d-42ea-8a62-8390994fbed4"
|
||
},
|
||
{
|
||
"value": "Gazon",
|
||
"description": "Gazon is a worm for Android devices that spreads through SMS messages. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-030320-1436-99"
|
||
]
|
||
},
|
||
"uuid": "77ea250b-d8aa-4477-8c74-93af056d8eee"
|
||
},
|
||
{
|
||
"value": "Geinimi",
|
||
"description": "Geinimi is a Trojan that opens a back door and transmits information from the device to a remote location. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-010111-5403-99"
|
||
]
|
||
},
|
||
"uuid": "da751d6f-779e-4d87-99ad-9393cb72607d"
|
||
},
|
||
{
|
||
"value": "Generisk",
|
||
"description": "Generisk is a generic detection for Android applications that may pose a privacy, security, or stability risk to the user or user's Android device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-062622-1559-99"
|
||
]
|
||
},
|
||
"uuid": "1f8573ad-c3ff-4268-83a5-c0a71f7b7944"
|
||
},
|
||
{
|
||
"value": "Genheur",
|
||
"description": "Genheur is a generic detection for many individual but varied Trojans for Android devices for which specific definitions have not been created. A generic detection is used because it protects against many Trojans that share similar characteristics. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-032613-0848-99"
|
||
]
|
||
},
|
||
"uuid": "5bcc7083-006b-428a-8952-aa34354e011e"
|
||
},
|
||
{
|
||
"value": "Genpush",
|
||
"description": "Genpush is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-033109-0426-99"
|
||
]
|
||
},
|
||
"uuid": "1854c808-f818-416c-961a-ba582bf5f27c"
|
||
},
|
||
{
|
||
"value": "GeoFake",
|
||
"description": "GeoFake is a Trojan horse for Android devices that sends SMS messages to premium-rate numbers. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-040217-3232-99"
|
||
]
|
||
},
|
||
"uuid": "4fa4e576-369a-4211-a1ea-4896aacfe4a7"
|
||
},
|
||
{
|
||
"value": "Geplook",
|
||
"description": "Geplook is a Trojan horse for Android devices that downloads additional apps onto the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-121814-0917-99"
|
||
]
|
||
},
|
||
"uuid": "ead163e7-c5b5-486f-b27d-629b26f6abdc"
|
||
},
|
||
{
|
||
"value": "Getadpush",
|
||
"description": "Getadpush is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040112-0957-99"
|
||
]
|
||
},
|
||
"uuid": "f41a08e2-5fc4-48ca-9cbc-9c7f0bce9b1f"
|
||
},
|
||
{
|
||
"value": "Ggtracker",
|
||
"description": "Ggtracker is a Trojan horse for Android devices that sends SMS messages to a premium-rate number. It may also steal information from the device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-062208-5013-99"
|
||
]
|
||
},
|
||
"uuid": "d4aed5c2-4011-4b62-80c1-8cdc6e5b2fc5"
|
||
},
|
||
{
|
||
"value": "Ghostpush",
|
||
"description": "Ghostpush is a Trojan horse for Android devices that roots the compromised device. It may then perform malicious activities on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-100215-3718-99"
|
||
]
|
||
},
|
||
"uuid": "9423457b-4660-4d27-916f-b6fd39628e17"
|
||
},
|
||
{
|
||
"value": "Gmaster",
|
||
"description": "Gmaster is a Trojan horse on the Android platform that steals potentially confidential information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-082404-5049-99"
|
||
]
|
||
},
|
||
"uuid": "92955169-4734-47d5-adfe-e01003dc0768"
|
||
},
|
||
{
|
||
"value": "Godwon",
|
||
"description": "Godwon is a Trojan horse for Android devices that steals information. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-091017-1833-99"
|
||
]
|
||
},
|
||
"uuid": "3787e5cf-49af-4105-a775-241c40aec377"
|
||
},
|
||
{
|
||
"value": "Golddream",
|
||
"description": "Golddream is a Trojan horse that steals information from Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-070608-4139-99"
|
||
]
|
||
},
|
||
"uuid": "fa2fe25b-247a-4675-ab85-a040200ff9a7"
|
||
},
|
||
{
|
||
"value": "Goldeneagle",
|
||
"description": "Goldeneagle is a Trojan horse that steals information from Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-090110-3712-99"
|
||
]
|
||
},
|
||
"uuid": "c0836a8b-b104-42e5-ba0c-261ae2f65c50"
|
||
},
|
||
{
|
||
"value": "Golocker",
|
||
"description": "Golocker is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-062003-3214-99"
|
||
]
|
||
},
|
||
"uuid": "28171041-ed65-4545-9e21-e6f925fd1688"
|
||
},
|
||
{
|
||
"value": "Gomal",
|
||
"description": "Gomal is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-101312-1047-99"
|
||
]
|
||
},
|
||
"uuid": "666b5326-8552-481a-85ee-37cea031de9d"
|
||
},
|
||
{
|
||
"value": "Gonesixty",
|
||
"description": "Gonesixty is a Trojan horse that steals information from Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-093001-2649-99"
|
||
]
|
||
},
|
||
"uuid": "b153de8e-1096-4ff3-8c00-0dffe77574eb"
|
||
},
|
||
{
|
||
"value": "Gonfu",
|
||
"description": "Gonfu is a Trojan horse that steals information from Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-060610-3953-99"
|
||
]
|
||
},
|
||
"uuid": "b10ae730-e9d8-42f7-8970-77fde44733c2"
|
||
},
|
||
{
|
||
"value": "Gonfu.B",
|
||
"description": "Gonfu.B is a Trojan horse that steals information from Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-030811-5215-99"
|
||
]
|
||
},
|
||
"uuid": "0caf0b55-e4ee-4971-86f0-8968ecbec5cf"
|
||
},
|
||
{
|
||
"value": "Gonfu.C",
|
||
"description": "Gonfu.C is a Trojan horse for Android devices that may download additional threats on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-031817-3639-99"
|
||
]
|
||
},
|
||
"uuid": "faf9c1dc-4efd-4e16-abf9-135839126b58"
|
||
},
|
||
{
|
||
"value": "Gonfu.D",
|
||
"description": "Gonfu.D is a Trojan horse that opens a back door on Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-040414-1158-99"
|
||
]
|
||
},
|
||
"uuid": "7ee57b0f-fc7c-424a-b3c7-e1a5a028ed8e"
|
||
},
|
||
{
|
||
"value": "Gooboot",
|
||
"description": "Gooboot is a Trojan horse for Android devices that may send text messages to premium rate numbers. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-031818-3034-99"
|
||
]
|
||
},
|
||
"uuid": "dedde091-a167-42bd-b47c-710381a5fc4f"
|
||
},
|
||
{
|
||
"value": "Goodadpush",
|
||
"description": "Goodadpush is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040108-0913-99"
|
||
]
|
||
},
|
||
"uuid": "24d9abb7-67e6-4cd5-8f34-6fae58293134"
|
||
},
|
||
{
|
||
"value": "Greystripe",
|
||
"description": "Greystripe is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052919-2643-99"
|
||
]
|
||
},
|
||
"uuid": "4e9b59a3-1b0b-4c94-bac2-22a9730cc1a0"
|
||
},
|
||
{
|
||
"value": "Gugespy",
|
||
"description": "Gugespy is a spyware program for Android devices that logs the device's activity and sends it to a predetermined email address.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-071822-2515-99"
|
||
]
|
||
},
|
||
"uuid": "1d9c433a-9b8c-4ad7-b4b3-5a29137aca3b"
|
||
},
|
||
{
|
||
"value": "Gugespy.B",
|
||
"description": "Gugespy.B is a spyware program for Android devices that monitors and sends certain information to a remote location.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-070511-5038-99"
|
||
]
|
||
},
|
||
"uuid": "3869692a-e24c-44ad-8f46-a0bd38c5bc5e"
|
||
},
|
||
{
|
||
"value": "Gupno",
|
||
"description": "Gupno is a Trojan horse for Android devices that poses as a legitimate app and attempts to charge users for features that are normally free. It may also display advertisements on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-072211-5533-99"
|
||
]
|
||
},
|
||
"uuid": "2434d65f-7a96-4cf3-b3c7-d93d70be8907"
|
||
},
|
||
{
|
||
"value": "Habey",
|
||
"description": "Habey is a Trojan horse for Android devices that may attempt to delete files and send SMS messages from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-100608-4512-99"
|
||
]
|
||
},
|
||
"uuid": "15109175-300b-42b1-bc59-2ad305cb2338"
|
||
},
|
||
{
|
||
"value": "Handyclient",
|
||
"description": "Handyclient is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040307-5027-99"
|
||
]
|
||
},
|
||
"uuid": "dc37a1f9-dec0-4ea0-94c6-450b26272e3d"
|
||
},
|
||
{
|
||
"value": "Hehe",
|
||
"description": "Hehe is a Trojan horse for Android devices that blocks incoming calls and SMS messages from specific numbers. The Trojan also steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-012211-0020-99"
|
||
]
|
||
},
|
||
"uuid": "c9538896-1dd4-4d87-b89c-a0a019996b27"
|
||
},
|
||
{
|
||
"value": "Hesperbot",
|
||
"description": "Hesperbot is a Trojan horse for Android devices that opens a back door on the compromised device and may steal information. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-121010-1120-99"
|
||
]
|
||
},
|
||
"uuid": "a642266c-b729-4009-8bd5-9cb06857cda7"
|
||
},
|
||
{
|
||
"value": "Hippo",
|
||
"description": "Hippo is a Trojan horse that sends SMS messages to premium-rate phone numbers. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-071215-3547-99"
|
||
]
|
||
},
|
||
"uuid": "bdf5533f-f05d-44cf-ad0c-c1db9689961f"
|
||
},
|
||
{
|
||
"value": "Hippo.B",
|
||
"description": "Hippo.B is a Trojan horse that sends SMS messages to premium-rate phone numbers. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-031915-0151-99"
|
||
]
|
||
},
|
||
"uuid": "04d2d441-1a18-4921-96f1-56fc938e01ea"
|
||
},
|
||
{
|
||
"value": "IadPush",
|
||
"description": "IadPush is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040315-4104-99"
|
||
]
|
||
},
|
||
"uuid": "d8dd9f88-4acf-4bbf-886b-6c48f2463109"
|
||
},
|
||
{
|
||
"value": "iBanking",
|
||
"description": "iBanking is a Trojan horse for Android devices that opens a back door on the compromised device and may steal information. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-030713-0559-99"
|
||
]
|
||
},
|
||
"uuid": "531f750f-fe86-4548-a2e5-540fda864860"
|
||
},
|
||
{
|
||
"value": "Iconosis",
|
||
"description": "Iconosis is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-062107-3327-99"
|
||
]
|
||
},
|
||
"uuid": "71e19f13-ef09-44f2-a71b-ef39b2f02dbf"
|
||
},
|
||
{
|
||
"value": "Iconosys",
|
||
"description": "Iconosys is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-081309-0341-99"
|
||
]
|
||
},
|
||
"uuid": "84480513-a52a-4de2-9869-1c886a6e8365"
|
||
},
|
||
{
|
||
"value": "Igexin",
|
||
"description": "Igexin is an advertisement library that is bundled with certain Android applications. Igexin has the capability of spying on victims through otherwise benign apps by downloading malicious plugins,",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-032606-5519-99",
|
||
"https://source.android.com/security/reports/Google_Android_Security_2017_Report_Final.pdf",
|
||
"https://blog.lookout.com/igexin-malicious-sdk"
|
||
],
|
||
"synonyms": [
|
||
"IcicleGum"
|
||
]
|
||
},
|
||
"uuid": "52c5f9b3-e9ed-4c86-b4a8-d4ebc68a4d7b"
|
||
},
|
||
{
|
||
"value": "ImAdPush",
|
||
"description": "ImAdPush is an advertisement library that is bundled with certain Android applications. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040323-0218-99"
|
||
]
|
||
},
|
||
"uuid": "847d6c0e-d92e-4466-91b8-6fe2718c6031"
|
||
},
|
||
{
|
||
"value": "InMobi",
|
||
"description": "InMobi is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052713-1527-99"
|
||
]
|
||
},
|
||
"uuid": "65e35c22-4a55-44ad-bd09-43f8a18d7e93"
|
||
},
|
||
{
|
||
"value": "Jifake",
|
||
"description": "Jifake is a Trojan horse for Android devices that sends SMS messages to premium-rate phone numbers. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-073021-4247-99"
|
||
]
|
||
},
|
||
"uuid": "d32149d8-a20c-40eb-b486-7c3b3369bb9a"
|
||
},
|
||
{
|
||
"value": "Jollyserv",
|
||
"description": "Jollyserv is a Trojan horse for Android devices that sends SMS messages and steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-090311-4533-99"
|
||
]
|
||
},
|
||
"uuid": "ee7faba5-6d35-49ff-af50-1ded1e42cc0b"
|
||
},
|
||
{
|
||
"value": "Jsmshider",
|
||
"description": "Jsmshider is a Trojan horse that opens a back door on Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-062114-0857-99"
|
||
]
|
||
},
|
||
"uuid": "5390586b-a224-4006-ab43-73ecdebe7892"
|
||
},
|
||
{
|
||
"value": "Ju6",
|
||
"description": "Ju6 is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040416-2428-99"
|
||
]
|
||
},
|
||
"uuid": "7886d5bb-8318-427a-a5df-9dc2122d8f05"
|
||
},
|
||
{
|
||
"value": "Jumptap",
|
||
"description": "Jumptap is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052713-0859-99"
|
||
]
|
||
},
|
||
"uuid": "ab353e23-22ef-44a8-80de-fe0ae609e571"
|
||
},
|
||
{
|
||
"value": "Jzmob",
|
||
"description": "Jzmob is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040207-1703-99"
|
||
]
|
||
},
|
||
"uuid": "941608bc-1fd5-473a-b4f7-a7f9763a4276"
|
||
},
|
||
{
|
||
"value": "Kabstamper",
|
||
"description": "Kabstamper is a Trojan horse for Android devices that corrupts images found on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-060706-2305-99"
|
||
]
|
||
},
|
||
"uuid": "ff8e4fe3-12b3-4c3b-959e-82971821d8e9"
|
||
},
|
||
{
|
||
"value": "Kidlogger",
|
||
"description": "Kidlogger is a Spyware application for Android devices that logs the device's activity and sends it to a predetermined website.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-122014-1927-99"
|
||
]
|
||
},
|
||
"uuid": "89c13c33-8ec2-4bbe-9867-02ac9f0a7dad"
|
||
},
|
||
{
|
||
"value": "Kielog",
|
||
"description": "Kielog is a Trojan horse for Android devices that logs keystrokes and sends the stolen information to the remote attacker. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-040205-4035-99"
|
||
]
|
||
},
|
||
"uuid": "324a5388-63f9-4ba8-aa5f-6a803be5e903"
|
||
},
|
||
{
|
||
"value": "Kituri",
|
||
"description": "Kituri is a Trojan horse for Android devices that blocks certain SMS messages from being received by the device. It may also send SMS messages to a premium-rate number. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-061111-5350-99"
|
||
]
|
||
},
|
||
"uuid": "d1c6c267-4c59-4cf9-a540-13d38b20d360"
|
||
},
|
||
{
|
||
"value": "Kranxpay",
|
||
"description": "Kranxpay is a Trojan horse for Android devices that downloads other apps onto the device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-071009-0809-99"
|
||
]
|
||
},
|
||
"uuid": "67f27518-6ec3-4723-8b4d-34d91a4d3a3e"
|
||
},
|
||
{
|
||
"value": "Krysanec",
|
||
"description": "Krysanec is a Trojan horse for Android devices that opens a back door on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-090113-4128-99"
|
||
]
|
||
},
|
||
"uuid": "736ebf9f-1868-45ea-94a5-d389f2d11588"
|
||
},
|
||
{
|
||
"value": "Kuaidian360",
|
||
"description": "Kuaidian360 is an advertisement library that is bundled with certain Android applications. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040109-2415-99"
|
||
]
|
||
},
|
||
"uuid": "0ec6ad4a-77ce-4c68-a349-1973bdc328f6"
|
||
},
|
||
{
|
||
"value": "Kuguo",
|
||
"description": "Kuguo is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040315-5215-99"
|
||
]
|
||
},
|
||
"uuid": "9fa68491-57fc-4d85-a063-0b822286c25f"
|
||
},
|
||
{
|
||
"value": "Lastacloud",
|
||
"description": "Lastacloud is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-121216-4334-99"
|
||
]
|
||
},
|
||
"uuid": "3bbf47e9-57b1-4bd1-9dc3-34d59e203771"
|
||
},
|
||
{
|
||
"value": "Laucassspy",
|
||
"description": "Laucassspy is a spyware program for Android devices that steals information and sends it to a remote location.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-092409-1822-99"
|
||
]
|
||
},
|
||
"uuid": "3b3956a8-a1cb-4839-8731-08295c2b88d6"
|
||
},
|
||
{
|
||
"value": "Lifemonspy",
|
||
"description": "Lifemonspy is a spyware application for Android devices that can track the phone's location, download SMS messages, and erase certain data from the device.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-111516-5540-99"
|
||
]
|
||
},
|
||
"uuid": "063abe8e-3688-48af-848e-132d636b4ecc"
|
||
},
|
||
{
|
||
"value": "Lightdd",
|
||
"description": "Lightdd is a Trojan horse that steals information from Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-053114-2342-99"
|
||
]
|
||
},
|
||
"uuid": "47aec378-9c9c-432c-9cd5-ddaa7942c6f4"
|
||
},
|
||
{
|
||
"value": "Loaderpush",
|
||
"description": "Loaderpush is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040108-0244-99"
|
||
]
|
||
},
|
||
"uuid": "5b137010-c01c-4811-b93f-e1de1c986563"
|
||
},
|
||
{
|
||
"value": "Locaspy",
|
||
"description": "Locaspy is a Potentially Unwanted Application for Android devices that tracks the location of the compromised device.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-030720-3500-99"
|
||
]
|
||
},
|
||
"uuid": "75e2f27a-cdeb-4768-808e-469d99a581d1"
|
||
},
|
||
{
|
||
"value": "Lockdroid.E",
|
||
"description": "Lockdroid.E is a Trojan horse for Android devices that locks the screen and displays a ransom demand on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-103005-2209-99"
|
||
]
|
||
},
|
||
"uuid": "04fc65b7-47a1-4eac-b485-ea8a6933613c"
|
||
},
|
||
{
|
||
"value": "Lockdroid.F",
|
||
"description": "Lockdroid.F is a Trojan horse for Android devices that locks the screen and displays a ransom demand on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-102215-4346-99"
|
||
]
|
||
},
|
||
"uuid": "a98bb328-2a25-4733-b1d2-688abf25784d"
|
||
},
|
||
{
|
||
"value": "Lockdroid.G",
|
||
"description": "Lockdroid.G is a Trojan horse for Android devices that may display a ransom demand on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-050610-2450-99"
|
||
]
|
||
},
|
||
"uuid": "0e4f2334-889f-4438-bdfb-b4287397fc43"
|
||
},
|
||
{
|
||
"value": "Lockdroid.H",
|
||
"description": "Lockdroid.H is a Trojan horse for Android devices that locks the screen and displays a ransom demand on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2016-031621-1349-99"
|
||
]
|
||
},
|
||
"uuid": "f453d127-48ae-4422-9e79-fb138f26de83"
|
||
},
|
||
{
|
||
"value": "Lockscreen",
|
||
"description": "Lockscreen is a Trojan horse for Android devices that locks the compromised device from use. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-032409-0743-99"
|
||
]
|
||
},
|
||
"uuid": "370237dc-95f4-47a0-9985-2ec8151f7e3a"
|
||
},
|
||
{
|
||
"value": "LogiaAd",
|
||
"description": "LogiaAd is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052713-0348-99"
|
||
]
|
||
},
|
||
"uuid": "8a065cda-da87-46b6-960a-2bcc74e92fd1"
|
||
},
|
||
{
|
||
"value": "Loicdos",
|
||
"description": "Loicdos is an Android application that provides an interface to a website in order to perform a denial of service (DoS) attack against a computer. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-022002-2431-99"
|
||
]
|
||
},
|
||
"uuid": "32ec05c2-a360-49b1-8863-166fd0011460"
|
||
},
|
||
{
|
||
"value": "Loozfon",
|
||
"description": "Loozfon is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-082005-5451-99"
|
||
]
|
||
},
|
||
"uuid": "983458be-99a4-460a-be5d-c8b284468a61"
|
||
},
|
||
{
|
||
"value": "Lotoor",
|
||
"description": "Lotoor is a generic detection for hack tools that exploit vulnerabilities in order to gain root privileges on compromised Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-091922-4449-99"
|
||
]
|
||
},
|
||
"uuid": "f459ff4a-3015-458f-8402-9981b6164f17"
|
||
},
|
||
{
|
||
"value": "Lovespy",
|
||
"description": "Lovespy is a Trojan horse for Android devices that steals information from the device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-071814-3805-99"
|
||
]
|
||
},
|
||
"uuid": "508ab8e3-c950-4adf-b87a-90f86423fa4d"
|
||
},
|
||
{
|
||
"value": "Lovetrap",
|
||
"description": "Lovetrap is a Trojan horse that sends SMS messages to premium-rate phone numbers. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-072806-2905-99"
|
||
]
|
||
},
|
||
"uuid": "ab2b8596-4304-4682-a324-6a9ddd9a9c31"
|
||
},
|
||
{
|
||
"value": "Luckycat",
|
||
"description": "Luckycat is a Trojan horse for Android devices that opens a back door and steals information on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-080617-5343-99"
|
||
]
|
||
},
|
||
"uuid": "5429dd64-74f5-4370-85f0-2654c067dfc5"
|
||
},
|
||
{
|
||
"value": "Machinleak",
|
||
"description": "Machinleak is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-120311-2440-99"
|
||
]
|
||
},
|
||
"uuid": "68c21410-a32c-4151-9e3e-bd3070937bfd"
|
||
},
|
||
{
|
||
"value": "Maistealer",
|
||
"description": "Maistealer is a Trojan that steals information from Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-072411-4350-99"
|
||
]
|
||
},
|
||
"uuid": "88521447-177a-4024-b336-0a065e6d7f16"
|
||
},
|
||
{
|
||
"value": "Malapp",
|
||
"description": "Malapp is a generic detection for many individual but varied threats on Android devices that share similar characteristics. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-073014-3354-99"
|
||
]
|
||
},
|
||
"uuid": "4b2483e7-acc2-4eec-bd7f-a8ac45e403b4"
|
||
},
|
||
{
|
||
"value": "Malebook",
|
||
"description": "Malebook is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-071206-3403-99"
|
||
]
|
||
},
|
||
"uuid": "93177c2f-79fa-4b3e-8312-994306bac870"
|
||
},
|
||
{
|
||
"value": "Malhome",
|
||
"description": "Malhome is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-071118-0441-99"
|
||
]
|
||
},
|
||
"uuid": "6178421f-b4d9-4307-b9ac-f75139651adf"
|
||
},
|
||
{
|
||
"value": "Malminer",
|
||
"description": "Malminer is a Trojan horse for Android devices that mines cryptocurrencies on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-032712-3709-99"
|
||
]
|
||
},
|
||
"uuid": "1e7e1c16-f241-41ea-ab12-f3c3f72f0931"
|
||
},
|
||
{
|
||
"value": "Mania",
|
||
"description": "Mania is a Trojan horse for Android devices that sends SMS messages to a premium-rate phone number. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-070623-1520-99"
|
||
]
|
||
},
|
||
"uuid": "dd97858e-001b-4ac4-9947-fcfdf24e12f7"
|
||
},
|
||
{
|
||
"value": "Maxit",
|
||
"description": "Maxit is a Trojan horse for Android devices that opens a back door on the compromised device. It also steals certain information and uploads it to a remote location. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-120411-2511-99"
|
||
]
|
||
},
|
||
"uuid": "0687203f-8f57-4de3-86f5-ceb3f151151c"
|
||
},
|
||
{
|
||
"value": "MdotM",
|
||
"description": "MdotM is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052712-5824-99"
|
||
]
|
||
},
|
||
"uuid": "aa94146b-6901-4c6c-8669-d64b4eb70594"
|
||
},
|
||
{
|
||
"value": "Medialets",
|
||
"description": "Medialets is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052712-5222-99"
|
||
]
|
||
},
|
||
"uuid": "3bd73087-fdf8-426a-84b9-50f308a05c53"
|
||
},
|
||
{
|
||
"value": "Meshidden",
|
||
"description": "Meshidden is a spyware application for Android devices that allows the device it is installed on to be monitored.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-031913-5257-99"
|
||
]
|
||
},
|
||
"uuid": "35ec0f9f-4516-45ed-b101-6829bd99ce86"
|
||
},
|
||
{
|
||
"value": "Mesploit",
|
||
"description": "Mesploit is a tool for Android devices used to create applications that exploit the Android Fake ID vulnerability.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-032014-2847-99"
|
||
]
|
||
},
|
||
"uuid": "bed7e358-3b69-4944-898f-aabf32e1af3d"
|
||
},
|
||
{
|
||
"value": "Mesprank",
|
||
"description": "Mesprank is a Trojan horse for Android devices that opens a back door on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-030717-1933-99"
|
||
]
|
||
},
|
||
"uuid": "989b1801-a3a9-4671-b161-d7b07cbbae32"
|
||
},
|
||
{
|
||
"value": "Meswatcherbox",
|
||
"description": "Meswatcherbox is a spyware application for Android devices that forwards SMS messages without the user knowing.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-111612-2736-99"
|
||
]
|
||
},
|
||
"uuid": "d4a7f045-7e1c-4467-8eb7-7dc3ce3c04dd"
|
||
},
|
||
{
|
||
"value": "Miji",
|
||
"description": "Miji is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-032815-4720-99"
|
||
]
|
||
},
|
||
"uuid": "c5fa5347-0338-43f1-813b-b11ce13a44e5"
|
||
},
|
||
{
|
||
"value": "Milipnot",
|
||
"description": "Milipnot is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-070414-0941-99"
|
||
]
|
||
},
|
||
"uuid": "44ab46dd-7027-4f66-a716-d59db5cf5e73"
|
||
},
|
||
{
|
||
"value": "MillennialMedia",
|
||
"description": "MillennialMedia is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052712-4602-99"
|
||
]
|
||
},
|
||
"uuid": "549a3d4e-d8f8-48b5-9b4b-659646640f85"
|
||
},
|
||
{
|
||
"value": "Mitcad",
|
||
"description": "Mitcad is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040212-0528-99"
|
||
]
|
||
},
|
||
"uuid": "03d069bd-53f5-4d62-82af-2461b8b501f7"
|
||
},
|
||
{
|
||
"value": "MobClix",
|
||
"description": "MobClix is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052712-4011-99"
|
||
]
|
||
},
|
||
"uuid": "9688b924-811f-4315-ba42-2ee1e9e52b55"
|
||
},
|
||
{
|
||
"value": "MobFox",
|
||
"description": "MobFox is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052712-3050-99"
|
||
]
|
||
},
|
||
"uuid": "ee248082-86b3-48ce-9500-47ccd471edec"
|
||
},
|
||
{
|
||
"value": "Mobidisplay",
|
||
"description": "Mobidisplay is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040312-0435-99"
|
||
]
|
||
},
|
||
"uuid": "d2a7cd95-3a32-4da4-97fb-a0982c2eaf60"
|
||
},
|
||
{
|
||
"value": "Mobigapp",
|
||
"description": "Mobigapp is a Trojan horse for Android devices that downloads applications disguised as system updates. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-062520-5802-99"
|
||
]
|
||
},
|
||
"uuid": "f35969cc-13d8-46cf-a4cc-ff2f15844205"
|
||
},
|
||
{
|
||
"value": "MobileBackup",
|
||
"description": "MobileBackup is a spyware application for Android devices that monitors the affected device.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-031020-0040-99"
|
||
]
|
||
},
|
||
"uuid": "caea6805-dad0-44b7-a0f2-3f41c227698c"
|
||
},
|
||
{
|
||
"value": "Mobilespy",
|
||
"description": "Mobilespy is a Trojan horse that steals information from Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-071512-0653-99"
|
||
]
|
||
},
|
||
"uuid": "a6acb97a-359a-4fdc-9f27-2190dbe66c02"
|
||
},
|
||
{
|
||
"value": "Mobiletx",
|
||
"description": "Mobiletx is a Trojan horse for Android devices that steals information from the compromised device. It may also send SMS messages to a premium-rate number. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-052807-4439-99"
|
||
]
|
||
},
|
||
"uuid": "3752d35b-0cbf-41ee-a057-6252342d94a7"
|
||
},
|
||
{
|
||
"value": "Mobinaspy",
|
||
"description": "Mobinaspy is a spyware application for Android devices that can track the device's location.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-111516-0511-99"
|
||
]
|
||
},
|
||
"uuid": "dda43d3d-5852-4957-834a-a711bbfa3e4a"
|
||
},
|
||
{
|
||
"value": "Mobus",
|
||
"description": "Mobus is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040416-2006-99"
|
||
]
|
||
},
|
||
"uuid": "95272c25-5df1-47ef-af3d-88e7b7492d45"
|
||
},
|
||
{
|
||
"value": "MobWin",
|
||
"description": "MobWin is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040416-1522-99"
|
||
]
|
||
},
|
||
"uuid": "960804ae-0c6a-42de-9f0c-2b20a56c2c32"
|
||
},
|
||
{
|
||
"value": "Mocore",
|
||
"description": "Mocore is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-092112-4603-99"
|
||
]
|
||
},
|
||
"uuid": "be1c2349-1864-4164-905b-cd971454448d"
|
||
},
|
||
{
|
||
"value": "Moghava",
|
||
"description": "Moghava is a Trojan horse for Android devices that modifies images that are stored on the device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-022712-2822-99"
|
||
]
|
||
},
|
||
"uuid": "671a2ca3-fa4f-4bfb-95d0-ac9c2479edff"
|
||
},
|
||
{
|
||
"value": "Momark",
|
||
"description": "Momark is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040113-5529-99"
|
||
]
|
||
},
|
||
"uuid": "f68ccede-1c5a-4d27-8d5f-2e68ebbbfcd7"
|
||
},
|
||
{
|
||
"value": "Monitorello",
|
||
"description": "Monitorello is a spyware application for Android devices that allows the device it is installed on to be monitored.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-031914-4737-99"
|
||
]
|
||
},
|
||
"uuid": "5b89b17f-d569-4c7d-9990-c8054d506e02"
|
||
},
|
||
{
|
||
"value": "Moolah",
|
||
"description": "Moolah is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040416-1007-99"
|
||
]
|
||
},
|
||
"uuid": "c630be3f-709c-42e7-8523-905ca6896066"
|
||
},
|
||
{
|
||
"value": "MoPub",
|
||
"description": "MoPub is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052712-2456-99"
|
||
]
|
||
},
|
||
"uuid": "1243bbc1-32a5-4034-a68b-fe67472469af"
|
||
},
|
||
{
|
||
"value": "Morepaks",
|
||
"description": "Morepaks is a Trojan horse for Android devices that downloads remote files and may display advertisements on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-071204-1130-99"
|
||
]
|
||
},
|
||
"uuid": "20ca85ec-bb04-47b1-9179-aa3871724cc4"
|
||
},
|
||
{
|
||
"value": "Nandrobox",
|
||
"description": "Nandrobox is a Trojan horse for Android devices that steals information from the compromised device. It also deletes certain SMS messages from the device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-070212-2132-99"
|
||
]
|
||
},
|
||
"uuid": "32ebe3f6-4a19-4e95-b06b-18663f4f0b43"
|
||
},
|
||
{
|
||
"value": "Netisend",
|
||
"description": "Netisend is a Trojan horse that steals information from Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-080207-1139-99"
|
||
]
|
||
},
|
||
"uuid": "deef380d-8e63-4669-9f5b-0cbf50c57070"
|
||
},
|
||
{
|
||
"value": "Nickispy",
|
||
"description": "Nickispy is a Trojan horse that steals information from Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-072714-3613-99"
|
||
]
|
||
},
|
||
"uuid": "7bdcf5c4-4c1d-4f37-8811-58f60c07dc51"
|
||
},
|
||
{
|
||
"value": "Notcompatible",
|
||
"description": "Notcompatible is a Trojan horse for Android devices that acts as a proxy. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-050307-2712-99"
|
||
]
|
||
},
|
||
"uuid": "c18d1cdc-855a-47b0-93f6-9d8795c9121d"
|
||
},
|
||
{
|
||
"value": "Nuhaz",
|
||
"description": "Nuhaz is a Trojan horse for Android devices that may intercept text messages on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-031814-3416-99"
|
||
]
|
||
},
|
||
"uuid": "ea8ff12e-fdd1-425d-bb4e-39374040b290"
|
||
},
|
||
{
|
||
"value": "Nyearleaker",
|
||
"description": "Nyearleaker is a Trojan horse program for Android devices that steals information. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-010514-0844-99"
|
||
]
|
||
},
|
||
"uuid": "08381c6b-5c92-4e14-8ad5-52954b101907"
|
||
},
|
||
{
|
||
"value": "Obad",
|
||
"description": "Obad is a Trojan horse for Android devices that opens a back door, steals information, and downloads files. It also sends SMS messages to premium-rate numbers and spreads malware to Bluetooth-enabled devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-060411-4146-99"
|
||
]
|
||
},
|
||
"uuid": "f59181e2-6214-4ff7-842e-916d124b3535"
|
||
},
|
||
{
|
||
"value": "Oneclickfraud",
|
||
"description": "Oneclickfraud is a Trojan horse for Android devices that attempts to coerce a user into paying for a pornographic service. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-011205-4412-99"
|
||
]
|
||
},
|
||
"uuid": "99ebc7b4-dbba-4c1c-a991-3c75d69007f6"
|
||
},
|
||
{
|
||
"value": "Opfake",
|
||
"description": "Opfake is a detection for Trojan horses on the Android platform that send SMS texts to premium-rate numbers. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-012709-2732-99"
|
||
]
|
||
},
|
||
"uuid": "9017bea0-d29e-4a2d-bda5-03ca6d0c7bc0"
|
||
},
|
||
{
|
||
"value": "Opfake.B",
|
||
"description": "Opfake.B is a Trojan horse for the Android platform that may receive commands from a remote attacker to perform various functions. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-022406-1309-99"
|
||
]
|
||
},
|
||
"uuid": "40115080-242e-4278-97b6-77171aa6ec47"
|
||
},
|
||
{
|
||
"value": "Ozotshielder",
|
||
"description": "Ozotshielder is a Trojan horse that steals information from Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-091505-3230-99"
|
||
]
|
||
},
|
||
"uuid": "b6e17717-a860-412b-a223-8fb0a7f5fe26"
|
||
},
|
||
{
|
||
"value": "Pafloat",
|
||
"description": "Pafloat is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040215-2015-99"
|
||
]
|
||
},
|
||
"uuid": "4fa40665-8a2a-4b01-bda7-5860497a46cc"
|
||
},
|
||
{
|
||
"value": "PandaAds",
|
||
"description": "PandaAds is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040312-1959-99"
|
||
]
|
||
},
|
||
"uuid": "fd4d373a-dc7a-4ed0-8880-3f4d46ab4541"
|
||
},
|
||
{
|
||
"value": "Pandbot",
|
||
"description": "Pandbot is a Trojan horse for Android devices that may download more files onto the device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-071215-1454-99"
|
||
]
|
||
},
|
||
"uuid": "aaa14125-c4eb-49b1-a397-6eb23e9ca8bf"
|
||
},
|
||
{
|
||
"value": "Pdaspy",
|
||
"description": "Pdaspy is a spyware application for Android devices that periodically gathers information from the device and uploads it to a predetermined location.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-111612-0749-99"
|
||
]
|
||
},
|
||
"uuid": "d206b674-2c8b-4165-955f-c7b3747f881e"
|
||
},
|
||
{
|
||
"value": "Penetho",
|
||
"description": "Penetho is a hacktool for Android devices that can be used to crack the WiFi password of the router that the device is using.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-100110-3614-99"
|
||
]
|
||
},
|
||
"uuid": "a032b966-7274-4963-82e3-4d6ea805db91"
|
||
},
|
||
{
|
||
"value": "Perkel",
|
||
"description": "Perkel is a Trojan horse for Android devices that may steal information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-082811-4213-99"
|
||
]
|
||
},
|
||
"uuid": "c076d45a-d4f8-4e6b-9f69-71687b5670f7"
|
||
},
|
||
{
|
||
"value": "Phimdropper",
|
||
"description": "Phimdropper is a Trojan horse for Android devices that sends and intercepts incoming SMS messages. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-021002-2943-99"
|
||
]
|
||
},
|
||
"uuid": "12801a82-add4-48f4-957a-5e7b09f2d0e3"
|
||
},
|
||
{
|
||
"value": "Phospy",
|
||
"description": "Phospy is a Trojan horse for Android devices that steals confidential information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-060706-4803-99"
|
||
]
|
||
},
|
||
"uuid": "058809da-b25d-429b-8773-e2b2f820d5ef"
|
||
},
|
||
{
|
||
"value": "Piddialer",
|
||
"description": "Piddialer is a Trojan horse for Android devices that dials premium-rate numbers from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-111020-2247-99"
|
||
]
|
||
},
|
||
"uuid": "c561faeb-2b49-413c-90fa-879fed864e76"
|
||
},
|
||
{
|
||
"value": "Pikspam",
|
||
"description": "Pikspam is a Trojan horse for Android devices that sends spam SMS messages from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-121815-0336-99"
|
||
]
|
||
},
|
||
"uuid": "da914e7e-8cd2-49d2-9e6c-ce7f5174f3e1"
|
||
},
|
||
{
|
||
"value": "Pincer",
|
||
"description": "Pincer is a Trojan horse for Android devices that steals confidential information and opens a back door on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-052307-3530-99"
|
||
]
|
||
},
|
||
"uuid": "4ef79875-3b57-4025-8a2a-07cdb078064f"
|
||
},
|
||
{
|
||
"value": "Pirator",
|
||
"description": "Pirator is a Trojan horse on the Android platform that downloads files and steals potentially confidential information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-021609-5740-99"
|
||
]
|
||
},
|
||
"uuid": "42b22f4f-c4ca-49a7-8ef2-4f470a611d87"
|
||
},
|
||
{
|
||
"value": "Pjapps",
|
||
"description": "Pjapps is a Trojan horse that has been embedded on third party applications and opens a back door on the compromised device. It retrieves commands from a remote command and control server. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-022303-3344-99"
|
||
]
|
||
},
|
||
"uuid": "5ad131de-ee9b-4815-9779-dd41bbc691ac"
|
||
},
|
||
{
|
||
"value": "Pjapps.B",
|
||
"description": "Pjapps.B is a Trojan horse for Android devices that opens a back door on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-032014-1624-99"
|
||
]
|
||
},
|
||
"uuid": "337a4e0f-3ba7-4b3e-8ee8-6dec28efa367"
|
||
},
|
||
{
|
||
"value": "Pletora",
|
||
"description": "Pletora is a is a Trojan horse for Android devices that may lock the compromised device. It then asks the user to pay in order to unlock the device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-061217-4345-99"
|
||
]
|
||
},
|
||
"uuid": "e7fcea42-c041-4650-8a74-980e2580f707"
|
||
},
|
||
{
|
||
"value": "Poisoncake",
|
||
"description": "Poisoncake is a Trojan horse for Android devices that opens a back door on the compromised device. It may also download potentially malicious files and steal information. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-010610-0726-99"
|
||
]
|
||
},
|
||
"uuid": "f3fa28df-2f61-4391-921d-0df12015406a"
|
||
},
|
||
{
|
||
"value": "Pontiflex",
|
||
"description": "Pontiflex is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052618-0946-99"
|
||
]
|
||
},
|
||
"uuid": "a69028fd-345c-46c1-a8e4-5344edf4a83b"
|
||
},
|
||
{
|
||
"value": "Positmob",
|
||
"description": "Positmob is a Trojan horse program for Android devices that sends SMS messages to premium rate phone numbers. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-111409-1556-99"
|
||
]
|
||
},
|
||
"uuid": "55014563-84cd-42bd-a4d0-9cb59fed0954"
|
||
},
|
||
{
|
||
"value": "Premiumtext",
|
||
"description": "Premiumtext is a detection for Trojan horses on the Android platform that send SMS texts to premium-rate numbers. These Trojans will often be repackaged versions of genuine Android software packages, often distributed outside the Android Marketplace. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-080213-5308-99"
|
||
]
|
||
},
|
||
"uuid": "aafa218b-681d-4fa9-bbe0-3e5e1655e379"
|
||
},
|
||
{
|
||
"value": "Pris",
|
||
"description": "Pris is a Trojan horse for Android devices that silently downloads a malicious application and attempts to open a back door on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-061820-5638-99"
|
||
]
|
||
},
|
||
"uuid": "84c24979-1f6b-4fb6-9783-b0262002f27c"
|
||
},
|
||
{
|
||
"value": "Qdplugin",
|
||
"description": "Qdplugin is a Trojan horse for Android devices that opens a back door and steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-102510-3330-99"
|
||
]
|
||
},
|
||
"uuid": "104be155-2e71-46bf-90a4-c2b27c6b6825"
|
||
},
|
||
{
|
||
"value": "Qicsomos",
|
||
"description": "Qicsomos is a Trojan horse for Android devices that sends SMS messages to a premium-rate phone number. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-011007-2223-99"
|
||
]
|
||
},
|
||
"uuid": "ef0a5556-2328-47f2-9703-bd8001639afe"
|
||
},
|
||
{
|
||
"value": "Qitmo",
|
||
"description": "Qitmo is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-030716-4923-99"
|
||
]
|
||
},
|
||
"uuid": "0d2c5dd9-8300-4570-a49e-971ac90efdec"
|
||
},
|
||
{
|
||
"value": "Rabbhome",
|
||
"description": "Rabbhome is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-053007-3750-99"
|
||
]
|
||
},
|
||
"uuid": "4c15d120-70c8-4d9f-b001-bf6c218a991a"
|
||
},
|
||
{
|
||
"value": "Repane",
|
||
"description": "Repane is a Trojan horse for Android devices that steals information and sends SMS messages from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-090411-5052-99"
|
||
]
|
||
},
|
||
"uuid": "4f07cf74-9b9b-479d-859e-67a2a13ca5de"
|
||
},
|
||
{
|
||
"value": "Reputation.1",
|
||
"description": "Reputation.1 is a detection for Android files based on analysis performed by Norton Mobile Insight. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-022612-2619-99"
|
||
]
|
||
},
|
||
"uuid": "d1ef2846-24cc-48a7-9bf2-c739eed7d25a"
|
||
},
|
||
{
|
||
"value": "Reputation.2",
|
||
"description": "Reputation.2 is a detection for Android files based on analysis performed by Norton Mobile Insight. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-022613-2629-99"
|
||
]
|
||
},
|
||
"uuid": "522a2325-290b-45ac-9eab-ffdf3898dbee"
|
||
},
|
||
{
|
||
"value": "Reputation.3",
|
||
"description": "Reputation.3 is a detection for Android files based on analysis performed by Norton Mobile Insight. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-022613-3126-99"
|
||
]
|
||
},
|
||
"uuid": "095a898a-301a-49f1-9bc6-c43425d17c8e"
|
||
},
|
||
{
|
||
"value": "RevMob",
|
||
"description": "RevMob is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040308-0502-99"
|
||
]
|
||
},
|
||
"uuid": "6469a63e-5c6b-4517-9540-eb16488ad67a"
|
||
},
|
||
{
|
||
"value": "Roidsec",
|
||
"description": "Roidsec is a Trojan horse for Android devices that steals confidential information. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-052022-1227-99"
|
||
]
|
||
},
|
||
"uuid": "06ae93ed-13ba-4200-9c91-8901f08a4fae"
|
||
},
|
||
{
|
||
"value": "Rootcager",
|
||
"description": "Rootcager is a Trojan horse that steals information from Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-030212-1438-99"
|
||
]
|
||
},
|
||
"uuid": "25f0c7d4-f961-4cd1-ac70-90242506200d"
|
||
},
|
||
{
|
||
"value": "Rootnik",
|
||
"description": "Rootnik is a Trojan horse for Android devices that steals information and downloads additional apps. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2016-062710-0328-99"
|
||
]
|
||
},
|
||
"uuid": "05f5a051-d7a2-4757-a2f0-d685334d9374"
|
||
},
|
||
{
|
||
"value": "Rufraud",
|
||
"description": "Rufraud is a Trojan horse for Android devices that sends SMS messages to premium-rate phone numbers. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-121306-2304-99"
|
||
]
|
||
},
|
||
"uuid": "99064315-2097-4c2e-8f92-a34ab9422441"
|
||
},
|
||
{
|
||
"value": "Rusms",
|
||
"description": "Rusms is a Trojan horse for Android devices that sends SMS messages and steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-061711-5009-99"
|
||
]
|
||
},
|
||
"uuid": "77ba4823-2d71-4ead-aba8-71a15a2a7c99"
|
||
},
|
||
{
|
||
"value": "Samsapo",
|
||
"description": "Samsapo is a worm for Android devices that spreads by sending SMS messages to all contacts stored on the compromised device. It also opens a back door and downloads files. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-050111-1908-99"
|
||
]
|
||
},
|
||
"uuid": "d266a784-3ce7-40f2-b710-0d758700276b"
|
||
},
|
||
{
|
||
"value": "Sandorat",
|
||
"description": "Sandorat is a Trojan horse for Android devices that opens a back door on the compromised device. It also steals information. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-110720-2146-99"
|
||
]
|
||
},
|
||
"uuid": "f0baccdc-d38f-4bb1-ab42-319b69be6322"
|
||
},
|
||
{
|
||
"value": "Sberick",
|
||
"description": "Sberick is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-071014-2146-99"
|
||
]
|
||
},
|
||
"uuid": "bd781792-dd1f-4fa9-a523-53f578b8f52c"
|
||
},
|
||
{
|
||
"value": "Scartibro",
|
||
"description": "Scartibro is a Trojan horse for Android devices that locks the compromised device and asks the user to pay in order to unlock it. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-080718-2038-99"
|
||
]
|
||
},
|
||
"uuid": "0c7bac44-c062-4dd6-824d-79f3c225d3e5"
|
||
},
|
||
{
|
||
"value": "Scipiex",
|
||
"description": "Scipiex is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-100814-4702-99"
|
||
]
|
||
},
|
||
"uuid": "e658c4ff-a749-44d1-9c7c-d8782cecbb05"
|
||
},
|
||
{
|
||
"value": "Selfmite",
|
||
"description": "Selfmite is a worm for Android devices that spreads through SMS messages. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-070111-5857-99"
|
||
]
|
||
},
|
||
"uuid": "666eb607-971e-4a90-92df-2b1903eb5c29"
|
||
},
|
||
{
|
||
"value": "Selfmite.B",
|
||
"description": "Selfmite.B is a worm for Android devices that displays ads on the compromised device. It spreads through SMS messages. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-101013-4717-99"
|
||
]
|
||
},
|
||
"uuid": "1031ff29-419d-450e-a1d3-d203db10b7df"
|
||
},
|
||
{
|
||
"value": "SellARing",
|
||
"description": "SellARing is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040407-3157-99"
|
||
]
|
||
},
|
||
"uuid": "875a58aa-f155-48d5-86a7-b18bf711a211"
|
||
},
|
||
{
|
||
"value": "SendDroid",
|
||
"description": "SendDroid is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040311-2111-99"
|
||
]
|
||
},
|
||
"uuid": "69ca9eb1-f19a-4442-8bfd-ac5f9a5387c2"
|
||
},
|
||
{
|
||
"value": "Simhosy",
|
||
"description": "Simhosy is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-061013-3955-99"
|
||
]
|
||
},
|
||
"uuid": "96624486-651c-499d-a731-83e149e16ea4"
|
||
},
|
||
{
|
||
"value": "Simplocker",
|
||
"description": "Simplocker is a Trojan horse for Android devices that may encrypt files on the compromised device. It then asks the user to pay in order to decrypt these files. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-060610-5533-99"
|
||
]
|
||
},
|
||
"uuid": "194d0629-9e26-4de4-8239-85b862aadc7f"
|
||
},
|
||
{
|
||
"value": "Simplocker.B",
|
||
"description": "Simplocker.B is a Trojan horse for Android devices that may encrypt files on the compromised device. It then asks the user to pay in order to decrypt these files. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-072317-1950-99"
|
||
]
|
||
},
|
||
"uuid": "6cf6fdd1-acce-4498-afe9-bc9202235cfa"
|
||
},
|
||
{
|
||
"value": "Skullkey",
|
||
"description": "Skullkey is a Trojan horse for Android devices that gives the attacker remote control of the compromised device to perform malicious activity. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-072322-5422-99"
|
||
]
|
||
},
|
||
"uuid": "8f5e8349-14cb-4dc2-86dc-bcfe7360d4c7"
|
||
},
|
||
{
|
||
"value": "Smaato",
|
||
"description": "Smaato is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052622-1755-99"
|
||
]
|
||
},
|
||
"uuid": "5e02d505-59bf-493e-b9d8-29dffcc5045a"
|
||
},
|
||
{
|
||
"value": "Smbcheck",
|
||
"description": "Smbcheck is a hacktool for Android devices that can trigger a Server Message Block version 2 (SMBv2) vulnerability and may cause the target computer to crash.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-032613-5634-99"
|
||
]
|
||
},
|
||
"uuid": "60be1539-2205-4865-87ab-318dcdb1873e"
|
||
},
|
||
{
|
||
"value": "Smsblocker",
|
||
"description": "Smsblocker is a generic detection for threats on Android devices that block the transmission of SMS messages. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-081607-4001-99"
|
||
]
|
||
},
|
||
"uuid": "13b6f47b-12bd-4c0a-88d1-b6a627169266"
|
||
},
|
||
{
|
||
"value": "Smsbomber",
|
||
"description": "Smsbomber is a program that can be used to send messages to contacts on the device.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-112611-5837-99"
|
||
]
|
||
},
|
||
"uuid": "054789dc-6ffa-4a06-ace9-6fd7095c7504"
|
||
},
|
||
{
|
||
"value": "Smslink",
|
||
"description": "Smslink is a Trojan horse for Android devices that may send malicious SMS messages from the compromised device. It may also display advertisements. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-112600-3035-99"
|
||
]
|
||
},
|
||
"uuid": "5d41547a-fc71-4e49-8dbf-59f15a58a74c"
|
||
},
|
||
{
|
||
"value": "Smspacem",
|
||
"description": "Smspacem is a Trojan horse that may send SMS messages from Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-052310-1322-99"
|
||
]
|
||
},
|
||
"uuid": "3191e73e-72a4-4a05-9d5b-2da158822820"
|
||
},
|
||
{
|
||
"value": "SMSReplicator",
|
||
"description": "SMSReplicator is a spying utility that will secretly transmit incoming SMS messages to another phone of the installer's choice. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2010-110214-1252-99"
|
||
]
|
||
},
|
||
"uuid": "8e638226-b772-492c-b0a3-3a77e5b08496"
|
||
},
|
||
{
|
||
"value": "Smssniffer",
|
||
"description": "Smssniffer is a Trojan horse that intercepts SMS messages on Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-071108-3626-99"
|
||
]
|
||
},
|
||
"uuid": "4d79cd58-217a-454a-991c-19219612580c"
|
||
},
|
||
{
|
||
"value": "Smsstealer",
|
||
"description": "Smsstealer is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-121514-0214-99"
|
||
]
|
||
},
|
||
"uuid": "c502316f-f3bb-47a4-9198-d73426609429"
|
||
},
|
||
{
|
||
"value": "Smstibook",
|
||
"description": "Smstibook is a Trojan horse that attempts to send premium-rate SMS messages to predetermined numbers. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-051207-4833-99"
|
||
]
|
||
},
|
||
"uuid": "312806f6-dc58-4b2b-b86e-1338626460ea"
|
||
},
|
||
{
|
||
"value": "Smszombie",
|
||
"description": "Smszombie is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-082011-0922-99"
|
||
]
|
||
},
|
||
"uuid": "99884c3e-cc56-4099-a52b-136ae0078d61"
|
||
},
|
||
{
|
||
"value": "Snadapps",
|
||
"description": "Snadapps is a Trojan horse that steals information from Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-071807-3111-99"
|
||
]
|
||
},
|
||
"uuid": "ac43bc86-59da-42ad-82d6-d0a17cc04a40"
|
||
},
|
||
{
|
||
"value": "Sockbot",
|
||
"description": "Sockbot is a Trojan horse for Android devices that creates a SOCKS proxy on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2017-101314-1353-99"
|
||
]
|
||
},
|
||
"uuid": "e8096285-d437-4664-9125-d30cb19b84cb"
|
||
},
|
||
{
|
||
"value": "Sockrat",
|
||
"description": "Sockrat is a Trojan horse for Android devices that opens a back door and steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-110509-4646-99"
|
||
]
|
||
},
|
||
"uuid": "dadccdda-a4c2-4021-90b9-61a394e602be"
|
||
},
|
||
{
|
||
"value": "Sofacy",
|
||
"description": "Sofacy is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2017-010508-5201-99"
|
||
]
|
||
},
|
||
"uuid": "df36267b-7267-4c23-a7a1-cf94ef1b3729"
|
||
},
|
||
{
|
||
"value": "Sosceo",
|
||
"description": "Sosceo is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040408-0609-99"
|
||
]
|
||
},
|
||
"uuid": "f1118dcb-13a3-4021-8dee-22201ae9324a"
|
||
},
|
||
{
|
||
"value": "Spitmo",
|
||
"description": "Spitmo is a Trojan horse that steals information from Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-091407-1435-99"
|
||
]
|
||
},
|
||
"uuid": "98a51dbd-5fe4-44f1-8171-2f7bb5691ca8"
|
||
},
|
||
{
|
||
"value": "Spitmo.B",
|
||
"description": "Spitmo.B is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-030715-0445-99"
|
||
]
|
||
},
|
||
"uuid": "75ee2fc5-f412-42a3-b17b-be5b7c1b5172"
|
||
},
|
||
{
|
||
"value": "Spyagent",
|
||
"description": "Spyagent is a spyware application for Android devices that logs certain information and sends SMS messages to a predetermined phone number.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-090710-1836-99"
|
||
]
|
||
},
|
||
"uuid": "b399f848-032d-4e7b-8c53-1d61ef53ef73"
|
||
},
|
||
{
|
||
"value": "Spybubble",
|
||
"description": "Spybubble is a Spyware application for Android devices that logs the device's activity and sends it to a predetermined website.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-121917-0335-99"
|
||
]
|
||
},
|
||
"uuid": "ee87a204-a0d6-4e4b-ba05-85853df60857"
|
||
},
|
||
{
|
||
"value": "Spydafon",
|
||
"description": "Spydafon is a Potentially Unwanted Application for Android devices that monitors the affected device.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-030722-4740-99"
|
||
]
|
||
},
|
||
"uuid": "8e313409-bee2-4ea5-9dc5-062dde2d37a7"
|
||
},
|
||
{
|
||
"value": "Spymple",
|
||
"description": "Spymple is a spyware application for Android devices that allows the device it is installed on to be monitored.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-031914-5403-99"
|
||
]
|
||
},
|
||
"uuid": "d2f7d24a-5ad2-4cae-a600-9f9e0415e32f"
|
||
},
|
||
{
|
||
"value": "Spyoo",
|
||
"description": "Spyoo is a spyware program for Android devices that records and sends certain information to a remote location.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-081709-0457-99"
|
||
]
|
||
},
|
||
"uuid": "d3f5be8f-e1bd-45a7-b78e-1594884ed740"
|
||
},
|
||
{
|
||
"value": "Spytekcell",
|
||
"description": "Spytekcell is a spyware program for Android devices that monitors and sends certain information to a remote location.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-121021-0730-99"
|
||
]
|
||
},
|
||
"uuid": "7e83bb34-5b0a-4a04-9c33-45ccd62adb49"
|
||
},
|
||
{
|
||
"value": "Spytrack",
|
||
"description": "Spytrack is a spyware program for Android devices that periodically sends certain information to a remote location.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-080109-5710-99"
|
||
]
|
||
},
|
||
"uuid": "70ff60ea-2955-4ab0-ad7f-aa33e6bb0b9c"
|
||
},
|
||
{
|
||
"value": "Spywaller",
|
||
"description": "Spywaller is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2015-121807-0203-99"
|
||
]
|
||
},
|
||
"uuid": "eff7bcd4-a797-4a85-8db2-583b182c98e5"
|
||
},
|
||
{
|
||
"value": "Stealthgenie",
|
||
"description": "Stealthgenie is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-111416-1306-99"
|
||
]
|
||
},
|
||
"uuid": "3e90ee61-4377-473f-8469-7a91875b54f1"
|
||
},
|
||
{
|
||
"value": "Steek",
|
||
"description": "Steek is a potentially unwanted application that is placed on a download website for Android applications and disguised as popular applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-010911-3142-99"
|
||
]
|
||
},
|
||
"uuid": "31f0f24e-6807-4a1a-b14d-cb421b1aea12"
|
||
},
|
||
{
|
||
"value": "Stels",
|
||
"description": "Stels is a Trojan horse for Android devices that opens a back door and steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-032910-0254-99"
|
||
]
|
||
},
|
||
"uuid": "435cbdcd-4cab-4a2e-8e58-9094b6226f94"
|
||
},
|
||
{
|
||
"value": "Stiniter",
|
||
"description": "Stiniter is a Trojan horse for Android devices that sends SMS messages to a premium-rate phone number. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-030903-5228-99"
|
||
]
|
||
},
|
||
"uuid": "418dc95a-a638-4e85-b72d-0bf6b7cbda0c"
|
||
},
|
||
{
|
||
"value": "Sumzand",
|
||
"description": "Sumzand is a Trojan horse for Android devices that steals information and sends it to a remote location. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-080308-2851-99"
|
||
]
|
||
},
|
||
"uuid": "2799ad1e-b438-4da5-a489-6035643c71a8"
|
||
},
|
||
{
|
||
"value": "Sysecsms",
|
||
"description": "Sysecsms is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-122714-5228-99"
|
||
]
|
||
},
|
||
"uuid": "7f7611d7-0419-4d6c-8026-6d132912f297"
|
||
},
|
||
{
|
||
"value": "Tanci",
|
||
"description": "Tanci is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-032815-4108-99"
|
||
]
|
||
},
|
||
"uuid": "031cabf7-f43c-4de3-9cd7-2ee96a4a3696"
|
||
},
|
||
{
|
||
"value": "Tapjoy",
|
||
"description": "Tapjoy is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052619-4702-99"
|
||
]
|
||
},
|
||
"uuid": "e57f936d-0cf2-4f83-9daf-3d167de8fdfb"
|
||
},
|
||
{
|
||
"value": "Tapsnake",
|
||
"description": "Tapsnake is a Trojan horse for Android phones that is embedded into a game. It tracks the phone's location and posts it to a remote web service. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2010-081214-2657-99"
|
||
]
|
||
},
|
||
"uuid": "a5ff203d-3613-4b66-bdec-ef342e9c85c2"
|
||
},
|
||
{
|
||
"value": "Tascudap",
|
||
"description": "Tascudap is a Trojan horse for Android devices that uses the compromised device in denial of service attacks. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-121312-4547-99"
|
||
]
|
||
},
|
||
"uuid": "171cfcc4-171c-4f62-82c0-b1583937cd0d"
|
||
},
|
||
{
|
||
"value": "Teelog",
|
||
"description": "Teelog is a Trojan horse for Android devices that opens a back door and steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-040215-2736-99"
|
||
]
|
||
},
|
||
"uuid": "9de29650-4fca-40d1-8def-1fe39bde13a3"
|
||
},
|
||
{
|
||
"value": "Temai",
|
||
"description": "Temai is a Trojan horse for Android applications that opens a back door and downloads malicious files onto the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-091722-4052-99"
|
||
]
|
||
},
|
||
"uuid": "3b8479b5-1ea2-4a0d-a80d-4ab9f91b477a"
|
||
},
|
||
{
|
||
"value": "Tetus",
|
||
"description": "Tetus is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-012409-4705-99"
|
||
]
|
||
},
|
||
"uuid": "d706632e-0940-4ae0-9fc5-ed59b941828c"
|
||
},
|
||
{
|
||
"value": "Tgpush",
|
||
"description": "Tgpush is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-032816-0259-99"
|
||
]
|
||
},
|
||
"uuid": "c9e1c4d7-7082-45c3-8aae-4449d94639ef"
|
||
},
|
||
{
|
||
"value": "Tigerbot",
|
||
"description": "Tigerbot is a Trojan horse for Android devices that opens a back door on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-041010-2221-99"
|
||
]
|
||
},
|
||
"uuid": "7ae84b6b-79c0-4835-8ebe-f9da724cde3f"
|
||
},
|
||
{
|
||
"value": "Tonclank",
|
||
"description": "Tonclank is a Trojan horse that steals information and may open a back door on Android devices. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-061012-4545-99"
|
||
]
|
||
},
|
||
"uuid": "68c29f38-36a6-46c0-bef9-cd70de3d6497"
|
||
},
|
||
{
|
||
"value": "Trogle",
|
||
"description": "Trogle is a worm for Android devices that may steal information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-081213-5553-99"
|
||
]
|
||
},
|
||
"uuid": "fae64496-415e-49fa-94ed-519ef7a0fac9"
|
||
},
|
||
{
|
||
"value": "Twikabot",
|
||
"description": "Twikabot is a Trojan horse for Android devices that attempts to steal information. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-062614-5813-99"
|
||
]
|
||
},
|
||
"uuid": "301a279e-ea93-4857-b994-b846712b6fac"
|
||
},
|
||
{
|
||
"value": "Uapush",
|
||
"description": "Uapush is a Trojan horse for Android devices that steals information from the compromised device. It may also display advertisements and send SMS messages from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-040114-2910-99"
|
||
]
|
||
},
|
||
"uuid": "c7c3547b-513c-4f65-b896-77bcf2bbf3a9"
|
||
},
|
||
{
|
||
"value": "Umeng",
|
||
"description": "Umeng is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040307-5749-99"
|
||
]
|
||
},
|
||
"uuid": "bc21922b-50a2-49a2-8828-c032b75dd4d1"
|
||
},
|
||
{
|
||
"value": "Updtbot",
|
||
"description": "Updtbot is a Trojan horse for Android devices that may arrive through SMS messages. It may then open a back door on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-041611-4136-99"
|
||
]
|
||
},
|
||
"uuid": "572c7fc4-081b-4e13-a1c2-5c1b7c7288bf"
|
||
},
|
||
{
|
||
"value": "Upush",
|
||
"description": "Upush is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040207-0733-99"
|
||
]
|
||
},
|
||
"uuid": "6d386a6c-0cd2-47f9-891d-435e135bf005"
|
||
},
|
||
{
|
||
"value": "Uracto",
|
||
"description": "Uracto is a Trojan horse for Android devices that steals personal information and sends spam SMS messages to contacts found on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-031805-2722-99"
|
||
]
|
||
},
|
||
"uuid": "d94c59b1-165b-4f8c-ba96-16209a99bbd0"
|
||
},
|
||
{
|
||
"value": "Uranico",
|
||
"description": "Uranico is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-052803-3835-99"
|
||
]
|
||
},
|
||
"uuid": "6d50487d-ac9a-4369-9520-471b2c9d2413"
|
||
},
|
||
{
|
||
"value": "Usbcleaver",
|
||
"description": "Usbcleaver is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-062010-1818-99"
|
||
]
|
||
},
|
||
"uuid": "5110098d-d07d-4e85-bde5-2b2dcd844317"
|
||
},
|
||
{
|
||
"value": "Utchi",
|
||
"description": "Utchi is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040107-2536-99"
|
||
]
|
||
},
|
||
"uuid": "45633e6c-482b-40d8-aab6-5702ebfd1a25"
|
||
},
|
||
{
|
||
"value": "Uten",
|
||
"description": "Uten is a Trojan horse for Android devices that may send, block, and delete SMS messages on a compromised device. It may also download and install additional applications and attempt to gain root privileges. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-092316-4752-99"
|
||
]
|
||
},
|
||
"uuid": "a677735e-fc30-47ea-a679-3eae567a0c50"
|
||
},
|
||
{
|
||
"value": "Uupay",
|
||
"description": "Uupay is a Trojan horse for Android devices that steals information from the compromised device. It may also download additional malware. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-061714-1550-99"
|
||
]
|
||
},
|
||
"uuid": "0766d789-3c9b-4bad-bc2e-8bdeccdef2fa"
|
||
},
|
||
{
|
||
"value": "Uxipp",
|
||
"description": "Uxipp is a Trojan horse that attempts to send premium-rate SMS messages to predetermined numbers. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-060910-5804-99"
|
||
]
|
||
},
|
||
"uuid": "da60c9f2-5429-46f6-9482-6f406e56ba07"
|
||
},
|
||
{
|
||
"value": "Vdloader",
|
||
"description": "Vdloader is a Trojan horse for Android devices that opens a back door on the compromised device and steals confidential information. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-080209-1420-99"
|
||
]
|
||
},
|
||
"uuid": "d0dbf62f-77fe-4051-a34a-67c843248357"
|
||
},
|
||
{
|
||
"value": "VDopia",
|
||
"description": "VDopia is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052712-1559-99"
|
||
]
|
||
},
|
||
"uuid": "17241b57-1b2f-4013-bc8b-f68e4e57e1a7"
|
||
},
|
||
{
|
||
"value": "Virusshield",
|
||
"description": "Virusshield is a Trojan horse for Android devices that claims to scan apps and protect personal information, but has no real functionality. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040810-5457-99"
|
||
]
|
||
},
|
||
"uuid": "dd1185c0-6456-4231-b39b-b127c2be88c5"
|
||
},
|
||
{
|
||
"value": "VServ",
|
||
"description": "VServ is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052619-3117-99"
|
||
]
|
||
},
|
||
"uuid": "e8d75cbf-aaed-4b9e-8599-36ee963f8439"
|
||
},
|
||
{
|
||
"value": "Walkinwat",
|
||
"description": "Walkinwat is a Trojan horse that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-033008-4831-99"
|
||
]
|
||
},
|
||
"uuid": "e2696142-5981-4055-874b-727eefda8c46"
|
||
},
|
||
{
|
||
"value": "Waps",
|
||
"description": "Waps is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040406-5437-99"
|
||
]
|
||
},
|
||
"uuid": "aa3cebc6-9083-42c4-8eae-e7662aa934a2"
|
||
},
|
||
{
|
||
"value": "Waren",
|
||
"description": "Waren is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-032815-5501-99"
|
||
]
|
||
},
|
||
"uuid": "164fb7dd-3fab-45fd-9d0a-4c2d61841059"
|
||
},
|
||
{
|
||
"value": "Windseeker",
|
||
"description": "Windseeker is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-101519-0720-99"
|
||
]
|
||
},
|
||
"uuid": "30b09d1a-2503-4481-a939-f6227fb2ead5"
|
||
},
|
||
{
|
||
"value": "Wiyun",
|
||
"description": "Wiyun is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040207-5646-99"
|
||
]
|
||
},
|
||
"uuid": "ced6bfb0-a4eb-460a-9594-185ddaaec5c6"
|
||
},
|
||
{
|
||
"value": "Wooboo",
|
||
"description": "Wooboo is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040407-5829-99"
|
||
]
|
||
},
|
||
"uuid": "0bd6959f-b764-431f-b75c-0cb4fe88f025"
|
||
},
|
||
{
|
||
"value": "Wqmobile",
|
||
"description": "Wqmobile is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040407-4926-99"
|
||
]
|
||
},
|
||
"uuid": "ce553391-48ef-4749-af44-ef899e710558"
|
||
},
|
||
{
|
||
"value": "YahooAds",
|
||
"description": "YahooAds is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-060621-3229-99"
|
||
]
|
||
},
|
||
"uuid": "8ff80176-7fb2-41ed-8b4c-5995d4f4bc9f"
|
||
},
|
||
{
|
||
"value": "Yatoot",
|
||
"description": "Yatoot is a Trojan horse for Android devices that steals information from the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-031408-4748-99"
|
||
]
|
||
},
|
||
"uuid": "ac66cb33-91a0-4777-a78d-8077089a7231"
|
||
},
|
||
{
|
||
"value": "Yinhan",
|
||
"description": "Yinhan is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040107-3350-99"
|
||
]
|
||
},
|
||
"uuid": "956d67a6-5e5f-48bf-b1c5-bc34536b8845"
|
||
},
|
||
{
|
||
"value": "Youmi",
|
||
"description": "Youmi is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-040407-4318-99"
|
||
]
|
||
},
|
||
"uuid": "805ea1fb-c6e3-47d9-9eb5-2d4b73e63f42"
|
||
},
|
||
{
|
||
"value": "YuMe",
|
||
"description": "YuMe is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-060621-0322-99"
|
||
]
|
||
},
|
||
"uuid": "e5a6a49e-92df-4e94-ac87-78d0f08c482e"
|
||
},
|
||
{
|
||
"value": "Zeahache",
|
||
"description": "Zeahache is a Trojan horse that elevates privileges on the compromised device. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2011-032309-5042-99"
|
||
]
|
||
},
|
||
"uuid": "78f04148-de99-4249-8057-ca610d6cab4e"
|
||
},
|
||
{
|
||
"value": "ZertSecurity",
|
||
"description": "ZertSecurity is a Trojan horse for Android devices that steals information and sends it to a remote attacker. ",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2013-050820-4100-99"
|
||
]
|
||
},
|
||
"uuid": "3f77d88c-b3a6-4cc8-bc09-40dca0f942c5"
|
||
},
|
||
{
|
||
"value": "ZestAdz",
|
||
"description": "ZestAdz is an advertisement library that is bundled with certain Android applications.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2014-052616-3821-99"
|
||
]
|
||
},
|
||
"uuid": "94572b76-b677-40da-8e92-db29ea1f0307"
|
||
},
|
||
{
|
||
"value": "Zeusmitmo",
|
||
"description": "Zeusmitmo is a Trojan horse for Android devices that opens a back door and steals information from the compromised device.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.symantec.com/security_response/writeup.jsp?docid=2012-080818-0448-99"
|
||
]
|
||
},
|
||
"uuid": "1bce8b50-16e8-4548-94c9-f82bdbc91053"
|
||
},
|
||
{
|
||
"value": "SLocker",
|
||
"description": "The SLocker family is one of the oldest mobile lock screen and file-encrypting ransomware and used to impersonate law enforcement agencies to convince victims to pay their ransom.",
|
||
"meta": {
|
||
"refs": [
|
||
"http://blog.trendmicro.com/trendlabs-security-intelligence/mobile-ransomware-pocket-sized-badness/",
|
||
"http://blog.trendmicro.com/trendlabs-security-intelligence/slocker-mobile-ransomware-starts-mimicking-wannacry/"
|
||
],
|
||
"synonyms": [
|
||
"SMSLocker"
|
||
]
|
||
},
|
||
"uuid": "e8bb68f2-d8ca-4576-b47b-8123aef6324b"
|
||
},
|
||
{
|
||
"value": "Loapi",
|
||
"description": "A malware strain known as Loapi will damage phones if users don't remove it from their devices. Left to its own means, this modular threat will download a Monero cryptocurrency miner that will overheat and overwork the phone's components, which will make the battery bulge, deform the phone's cover, or even worse. Discovered by Kaspersky Labs, researchers say Loapi appears to have evolved from Podec, a malware strain spotted in 2015.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.bleepingcomputer.com/news/security/android-malware-will-destroy-your-phone-no-ifs-and-buts-about-it/"
|
||
]
|
||
},
|
||
"uuid": "2620f8ce-a4a6-4ea2-a281-7f476ff114ed"
|
||
},
|
||
{
|
||
"value": "Podec",
|
||
"description": "Late last year, we encountered an SMS Trojan called Trojan-SMS.AndroidOS.Podec which used a very powerful legitimate system to protect itself against analysis and detection. After we removed the protection, we saw a small SMS Trojan with most of its malicious payload still in development. Before long, though, we intercepted a fully-fledged version of Trojan-SMS.AndroidOS.Podec in early 2015.\nThe updated version proved to be remarkable: it can send messages to premium-rate numbers employing tools that bypass the Advice of Charge system (which notifies users about the price of a service and requires authorization before making the payment). It can also subscribe users to premium-rate services while bypassing CAPTCHA. This is the first time Kaspersky Lab has encountered this kind of capability in any Android-Trojan.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://securelist.com/sms-trojan-bypasses-captcha/69169//"
|
||
]
|
||
},
|
||
"uuid": "e3cd1cf3-2f49-4adc-977f-d15a2b0b4c85"
|
||
},
|
||
{
|
||
"value": "Chamois",
|
||
"description": "Chamois is one of the largest PHA families in Android to date and is distributed through multiple channels. While much of the backdoor version of this family was cleaned up in 2016, a new variant emerged in 2017. To avoid detection, this version employs a number of techniques, such as implementing custom code obfuscation, preventing user notifications, and not appearing in the device’s app list. Chamois apps, which in many cases come preloaded with the system image, try to trick users into clicking ads by displaying deceptive graphics to commit WAP or SMS fraud.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://source.android.com/security/reports/Google_Android_Security_2017_Report_Final.pdf",
|
||
"https://android-developers.googleblog.com/2017/03/detecting-and-eliminating-chamois-fraud.html"
|
||
]
|
||
},
|
||
"uuid": "a53e93e6-2d17-11e8-a718-0bb6e34b87d0"
|
||
},
|
||
{
|
||
"value": "IcicleGum",
|
||
"description": "IcicleGum is a spyware PHA family whose apps rely on versions of the Igexin ads SDK that offer dynamic code-loading support. IcicleGum apps use this library's code-loading features to fetch encrypted DEX files over HTTP from command-and-control servers. The files are then decrypted and loaded via class reflection to read and send phone call logs and other data to remote locations.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://blog.lookout.com/igexin-malicious-sdk",
|
||
"https://source.android.com/security/reports/Google_Android_Security_2017_Report_Final.pdf"
|
||
]
|
||
},
|
||
"uuid": "a5be6094-2d17-11e8-a5b1-ff153ed7d9c3"
|
||
},
|
||
{
|
||
"value": "BreadSMS",
|
||
"description": "BreadSMS is a large SMS-fraud PHA family that we started tracking at the beginning of 2017. These apps compose and send text messages to premium numbers without the user’s consent. In some cases, BreadSMS apps also implement subscription-based SMS fraud and silently enroll users in services provided by their mobile carriers. These apps are linked to a group of command-and-control servers whose IP addresses change frequently and that are used to provide the apps with premium SMS numbers and message text.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://source.android.com/security/reports/Google_Android_Security_2017_Report_Final.pdf"
|
||
]
|
||
},
|
||
"uuid": "2c75b006-2d18-11e8-8f57-2714f7737ec5 "
|
||
},
|
||
{
|
||
"value": "JamSkunk",
|
||
"description": "JamSkunk is a toll-fraud PHA family composed of apps that subscribe users to services without their consent. These apps disable Wi-Fi to force traffic to go through users' mobile data connection and then contact command-and-control servers to dynamically fetch code that tries to bypass the network’s WAP service subscription verification steps. This type of PHA monetizes their abuse via WAP billing, a payment method that works through mobile data connections and allows users to easily sign up and pay for new services using their existing account (i.e., services are billed directly by the carrier, and not the service provider; the user does not need a new account or a different form of payment). Once authentication is bypassed, JamSkunk apps enroll the device in services that the user may not notice until they receive and read their next bill.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://blog.fosec.vn/malicious-applications-stayed-at-google-appstore-for-months-d8834ff4de59",
|
||
"https://source.android.com/security/reports/Google_Android_Security_2017_Report_Final.pdf"
|
||
]
|
||
},
|
||
"uuid": "1b5ff93c-2d1a-11e8-8559-07216a0f4416"
|
||
},
|
||
{
|
||
"value": "Expensive Wall",
|
||
"description": "Expensive Wall is a family of SMS-fraud apps that affected a large number of devices in 2017. Expensive Wall apps use code obfuscation to slow down analysis and evade detection, and rely on the JS2Java bridge to allow JavaScript code loaded inside a Webview to call Java methods the way Java apps directly do. Upon launch, Expensive Wall apps connect to command-and-control servers to fetch a domain name. This domain is then contacted via a Webview instance that loads a webpage and executes JavaScript code that calls Java methods to compose and send premium SMS messages or click ads without users' knowledge.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://source.android.com/security/reports/Google_Android_Security_2017_Report_Final.pdf",
|
||
"https://blog.checkpoint.com/2017/09/14/expensivewall-dangerous-packed-malware-google-play-will-hit-wallet/"
|
||
]
|
||
},
|
||
"uuid": "1c105534-2d1a-11e8-af59-f3a9d10da2ae"
|
||
},
|
||
{
|
||
"value": "BambaPurple",
|
||
"description": "BambaPurple is a two-stage toll-fraud PHA family that tries to trick users into installing it by disguising itself as a popular app. After install, the app disables Wi-Fi to force the device to use its 3G connection, then redirects to subscription pages without the user’s knowledge, clicks subscription buttons using downloaded JavaScript, and intercepts incoming subscription SMS messages to prevent the user from unsubscribing. In a second stage, BambaPurple installs a backdoor app that requests device admin privileges and drops a .dex file. This executable checks to make sure it is not being debugged, downloads even more apps without user consent, and displays ads.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://source.android.com/security/reports/Google_Android_Security_2017_Report_Final.pdf"
|
||
]
|
||
},
|
||
"uuid": "1c90db8c-2d1a-11e8-8855-8b52c54dc70c"
|
||
},
|
||
{
|
||
"value": "KoreFrog",
|
||
"description": "KoreFrog is a family of trojan apps that request permission to install packages and push other apps onto the device as system apps without the user’s authorization. System apps can be disabled by the user, but cannot be easily uninstalled. KoreFrog apps operate as daemons running in the background that try to impersonate Google and other system apps by using misleading names and icons to avoid detection. The KoreFrog PHA family has also been observed to serve ads, in addition to apps.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://source.android.com/security/reports/Google_Android_Security_2017_Report_Final.pdf"
|
||
]
|
||
},
|
||
"uuid": "1cd12f7a-2d1a-11e8-9d61-5f382712fa0a"
|
||
},
|
||
{
|
||
"value": "Gaiaphish",
|
||
"description": "Gaiaphish is a large family of trojan apps that target authentication tokens stored on the device to abuse the user’s privileges for various purposes. These apps use base64-encoded URL strings to avoid detection of the command-and-control servers they rely on to download APK files. These files contain phishing apps that try to steal GAIA authentication tokens that grant the user permissions to access Google services, such as Google Play, Google+, and YouTube. With these tokens, Gaiaphish apps are able to generate spam and automatically post content (for instance, fake app ratings and comments on Google Play app pages)",
|
||
"meta": {
|
||
"refs": [
|
||
"https://source.android.com/security/reports/Google_Android_Security_2017_Report_Final.pdf"
|
||
]
|
||
},
|
||
"uuid": "1dcd622c-2d1a-11e8-870e-9f50a5dd5a84"
|
||
},
|
||
{
|
||
"value": "RedDrop",
|
||
"description": "RedDrop can perform a vast array of malicious actions, including recording nearby audio and uploading the data to cloud-storage accounts on Dropbox and Google Drive.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://www.bleepingcomputer.com/news/security/new-reddrop-android-spyware-records-nearby-audio/"
|
||
]
|
||
},
|
||
"uuid": "3178ca72-2ded-11e8-846e-eb40889b4f9f"
|
||
},
|
||
{
|
||
"value": "HenBox",
|
||
"description": "HenBox apps masquerade as others such as VPN apps, and Android system apps; some apps carry legitimate versions of other apps which they drop and install as a decoy technique. While some of legitimate apps HenBox uses as decoys can be found on Google Play, HenBox apps themselves are found only on third-party (non-Google Play) app stores. HenBox apps appear to primarily target the Uyghurs – a Turkic ethnic group living mainly in the Xinjiang Uyghur Autonomous Region in North West China. HenBox has ties to infrastructure used in targeted attacks, with a focus on politics in South East Asia. These attackers have used additional malware families in previous activity dating to at least 2015 that include PlugX, Zupdax, 9002, and Poison Ivy. HexBox apps target devices made by Chinese consumer electronics manufacture, Xiaomi and those running MIUI, Xiaomi’s operating system based on Google Android. Furthermore, the malicious apps register their intent to process certain events broadcast on compromised devices in order to execute malicious code. This is common practice for many Android apps, however, HenBox sets itself up to trigger based on alerts from Xiaomi smart-home IoT devices, and once activated, proceeds in stealing information from a myriad of sources, including many mainstream chat, communication and social media apps. The stolen information includes personal and device information.",
|
||
"meta": {
|
||
"refs": [
|
||
"https://researchcenter.paloaltonetworks.com/2018/04/unit42-henbox-inside-coop/"
|
||
]
|
||
},
|
||
"uuid": "72c37e24-4ead-11e8-8f08-db3ec8f8db86§"
|
||
}
|
||
],
|
||
"version": 8,
|
||
"uuid": "84310ba3-fa6a-44aa-b378-b9e3271c58fa",
|
||
"description": "Android malware galaxy based on multiple open sources.",
|
||
"authors": [
|
||
"Unknown"
|
||
],
|
||
"source": "Open Sources",
|
||
"type": "android",
|
||
"name": "Android"
|
||
}
|