Advertisement
Guest User

Untitled

a guest
Feb 6th, 2017
468
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.00 KB | None | 0 0
  1. forensic blog
  2. mobile phone forensics and mobile malware
  3. Current Android Malware
  4. Here is the full list of Android-Malware-Families with their main capabilities. We will try to keep this table up-to-date. We took one sample of each family for the data within this table.
  5.  
  6. Description Capabilities
  7.  
  8. AccuTrack
  9. This application turns an Android smartphone into a GPS tracker.
  10.  
  11. Ackposts
  12. This Trojan steals contact information from the compromised device and uploads them to a remote server.
  13.  
  14. Acnetdoor
  15. This Trojan opens a backdoor on the infected device and sends the IP address to a remote server.
  16.  
  17. Adsms
  18. This is a Trojan which is allowed to send SMS messages. The distribution channel of this malware is through a SMS message containing the download link.
  19.  
  20. Airpush/StopSMS
  21. Airpush is a very aggresive Ad-Network.
  22.  
  23. AnServer/Answerbot
  24. Opens a backdoor in Android devices and is able to steal personal information which will be uploaded to a remote server afterwards.
  25.  
  26. Antares/Antammi
  27. This is a Trojan which steals personal information from the infected device.
  28.  
  29. Arspam
  30. This malware represent the first stage of politically-motivated hacking (hacktivism) on mobile platforms.
  31.  
  32. AVPass
  33. This malware family tries to detect and circumvent Android security tools (like AntiVirus apps) installed on the infected device. Afterwards, the app tries to steal sensitive data and receives additional comands via SMS.
  34.  
  35. BackFlash/Crosate
  36. This malicious app installs a fake Flash plugin that registeres itself as device administrator and leaks sensitive information.
  37.  
  38. Badaccents
  39. This malware claims to download a copy of “The Interview” but instead installs a two-stage banking Trojan onto victims’ devices.
  40.  
  41. Badnews
  42. Once activated, BadNews polls its C&C-Server every four hours for new instructions while pushing several pieces of sensitive information including the device’s phone number and IMEI up to the server.
  43.  
  44. BankBot
  45. This malware tries to steal users’ confidential information and money from bank and mobile accounts associated with infected devices.
  46.  
  47. Basebridge
  48. Forwards confidential details (SMS, IMSI, IMEI) to a remote server.
  49.  
  50. BeanBot
  51. This is a Trojan which is allowed to send SMS messages and which is controlled by a C&C-Server.
  52.  
  53. Beita
  54. A simple info stealer.
  55.  
  56. Binv
  57. This malware is a classical Banking-Trojan that is targeting Brazilian users of Android devices.
  58.  
  59. BgServ
  60. Obtains the user’s phone information (IMEI, phone number, etc.). The information is then uploaded to a specific URL.
  61.  
  62. Biige
  63. This spyware records SMS messages, calls, location, etc. and uploads these data to a remote server.
  64.  
  65. Booster
  66. This application steals personal information and uploads these data to a remote server.
  67.  
  68. Boxer
  69. This trojan sends SMS messages to premium rated numbers.
  70.  
  71. Cajino
  72. This malware is a classical RAT that tries to exfiltrate sensitive information. What makes this sample special is that it is using Baidu Cloud Push service for communication.
  73.  
  74. Carberp
  75. Tries to steal confidential banking authentication codes (mTAN messages) sent to the infected device.
  76.  
  77. Cawitt
  78. This application steals personal information and uploads these data to a remote server.
  79.  
  80. Cellspy
  81. This application is a smartphone tracker.
  82.  
  83. Chulli
  84. This malware family was used within in targeted attack. The e-mail account of a high-profile Tibetan activist was hacked and used to send targeted attacks to other activists and human rights advocates. After a mobile device gets infected, it connects to a C&C-Server and waits for SMS commands to leak sensitive data to this server.
  85.  
  86. Code4hk/xRAT
  87. This malware has been used within targeted attacks in Asia and tries to exfiltrate the geolocation of the victim as well as voice recordings. The malicious sample is spreading through WhatsApp messages.
  88.  
  89. Coogos
  90. Backdoor Trojan which has the capability to receive a remote connection from a malicious hacker and perform actions against the compromised system.
  91.  
  92. CopyCat
  93. Is a aggressive and malicious ad network. The main goal is to generate revenue.
  94.  
  95. Cosha
  96. This applications monitor the infected device and send perso
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement