Android
Android malware galaxy based on multiple open sources.
Authors
Authors and/or Contributors |
---|
Unknown |
CopyCat
CopyCat is a fully developed malware with vast capabilities, including rooting devices, establishing persistency, and injecting code into Zygote – a daemon responsible for launching apps in the Android operating system – that allows the malware to control any activity on the device.
Internal MISP references
UUID 40aa797a-ee87-43a1-8755-04d040dbea28
which can be used as unique global reference for CopyCat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Andr/Dropr-FH
Andr/Dropr-FH can silently record audio and video, monitor texts and calls, modify files, and ultimately spawn ransomware.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Andr/Dropr-FH.
Known Synonyms |
---|
GhostCtrl |
Internal MISP references
UUID a01e1d0b-5303-4d11-94dc-7db74f3d599d
which can be used as unique global reference for Andr/Dropr-FH
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
Judy
The malware, dubbed Judy, is an auto-clicking adware which was found on 41 apps developed by a Korean company. The malware uses infected devices to generate large amounts of fraudulent clicks on advertisements, generating revenues for the perpetrators behind it.
Internal MISP references
UUID 1a73ceaf-7054-4882-be82-8994805676fc
which can be used as unique global reference for Judy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
RedAlert2
The trojan waits in hiding until the user opens a banking or social media app. When this happens, the trojan shows an HTML-based overlay on top of the original app, alerting the user of an error, and asking to reauthenticate. Red Alert then collects the user's credentials and sends them to its C&C server.
Internal MISP references
UUID d10f8cd5-0077-4d8f-9145-03815a68dd33
which can be used as unique global reference for RedAlert2
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
Tizi
Tizi is a fully featured backdoor that installs spyware to steal sensitive data from popular social media applications. The Google Play Protect security team discovered this family in September 2017 when device scans found an app with rooting capabilities that exploited old vulnerabilities. The team used this app to find more applications in the Tizi family, the oldest of which is from October 2015. The Tizi app developer also created a website and used social media to encourage more app installs from Google Play and third-party websites.
Internal MISP references
UUID 8f374460-aa58-4a31-98cb-58db42d0902a
which can be used as unique global reference for Tizi
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
DoubleLocker
DoubleLocker can change the device’s PIN, preventing victims from accessing their devices, and also encrypts the data requesting a ransom. It will misuse accessibility services after being installed by impersonating the Adobe Flash player - similar to BankBot.
Internal MISP references
UUID 6671bb0b-4fab-44a7-92f9-f641a887a0aa
which can be used as unique global reference for DoubleLocker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
Svpeng
Svpeng is a Banking trojan which acts as a keylogger. If the Android device is not Russian, Svpeng will ask for permission to use accessibility services. In abusing this service it will gain administrator rights allowing it to draw over other apps, send and receive SMS and take screenshots when keys are pressed.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Svpeng.
Known Synonyms |
---|
Invisble Man |
Internal MISP references
UUID 426ead34-b3e6-45c7-ba22-5b8f3b8214bd
which can be used as unique global reference for Svpeng
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
LokiBot
LokiBot is a banking trojan for Android 4.0 and higher. It can steal the information and send SMS messages. It has the ability to start web browsers, and banking applications, along with showing notifications impersonating other apps. Upon attempt to remove it will encrypt the devices' external storage requiring Bitcoins to decrypt files.
Internal MISP references
UUID fbda9705-677b-4c5b-9b0b-13b52eff587c
which can be used as unique global reference for LokiBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
BankBot
The main goal of this malware is to steal banking credentials from the victim’s device. It usually impersonates flash player updaters, android system tools, or other legitimate applications.
Internal MISP references
UUID 4ed03b03-a34f-4583-9db1-6c58a4bd952b
which can be used as unique global reference for BankBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
Viking Horde
In rooted devices, Viking Horde installs software and executes code remotely to get access to the mobile data.
Internal MISP references
UUID c62a6121-2ebc-4bee-a25a-5285bf33328a
which can be used as unique global reference for Viking Horde
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
HummingBad
A Chinese advertising company has developed this malware. The malware has the power to take control of devices; it forces users to click advertisements and download apps. The malware uses a multistage attack chain.
Internal MISP references
UUID f5cacc72-f02a-42d1-a020-7a59650086bb
which can be used as unique global reference for HummingBad
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
Ackposts
Ackposts is a Trojan horse for Android devices that steals the Contacts information from the compromised device and sends it to a predetermined location.
Internal MISP references
UUID 8261493f-c9a3-4946-874f-fe8445aa7691
which can be used as unique global reference for Ackposts
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Wirex
Wirex is a Trojan horse for Android devices that opens a backdoor on the compromised device which then joins a botnet for conducting click fraud.
Internal MISP references
UUID 0b4f1af0-e0fb-4148-b08c-f6782757752a
which can be used as unique global reference for Wirex
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
WannaLocker
WannaLocker is a strain of ransomware for Android devices that encrypts files on the device's external storage and demands a payment to decrypt them.
Internal MISP references
UUID db4ddfc4-4f39-4e0b-905f-4703ed6b39b6
which can be used as unique global reference for WannaLocker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Switcher
Switcher is a Trojan horse for Android devices that modifies Wi-Fi router DNS settings. Swticher attempts to infiltrate a router's admin interface on the devices' WIFI network by using brute force techniques. If the attack succeeds, Switcher alters the DNS settings of the router, making it possible to reroute DNS queries to a network controlled by the malicious actors.
Internal MISP references
UUID 60857664-0671-4b12-ade9-86ee6ecb026a
which can be used as unique global reference for Switcher
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
Vibleaker
Vibleaker was an app available on the Google Play Store named Beaver Gang Counter that contained malicious code that after specific orders from its maker would scan the user's phone for the Viber app, and then steal photos and videos recorded or sent through the app.
Internal MISP references
UUID 27354d65-ca90-4f73-b942-13046e61700c
which can be used as unique global reference for Vibleaker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
ExpensiveWall
ExpensiveWall is Android malware that sends fraudulent premium SMS messages and charges users accounts for fake services without their knowledge
Internal MISP references
UUID 1484d72b-54d0-41b7-a9fa-18db9e9e5c69
which can be used as unique global reference for ExpensiveWall
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Cepsohord
Cepsohord is a Trojan horse for Android devices that uses compromised devices to commit click fraud, modify DNS settings, randomly delete essential files, and download additional malware such as ransomware.
Internal MISP references
UUID 05b0c492-e1ef-4352-a714-b813e54b9032
which can be used as unique global reference for Cepsohord
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakem Rat
Fakem RAT makes their network traffic look like well-known protocols (e.g. Messenger traffic, HTML pages).
Internal MISP references
UUID c657075e-3ffb-4748-bfe2-f40c3527739f
which can be used as unique global reference for Fakem Rat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
GM Bot
GM Bot – also known as Acecard, SlemBunk, or Bankosy – scams people into giving up their banking log-in credentials and other personal data by displaying overlays that look nearly identical to banking apps log-in pages. Subsequently, the malware intercepts SMS to obtain two-factor authentication PINs, giving cybercriminals full access to bank accounts.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular GM Bot.
Known Synonyms |
---|
Acecard |
Bankosy |
SlemBunk |
Internal MISP references
UUID 3d3aa832-8847-47c5-9e31-ef13ab7ab6fb
which can be used as unique global reference for GM Bot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
Moplus
The Wormhole vulnerability in the Moplus SDK could be exploited by hackers to open an unsecured and unauthenticated HTTP server connection on the user’s device, and this connection is established in the background without the user’s knowledge.
Internal MISP references
UUID d3f2ec07-4af3-4b3b-9cf0-2dba08bf5e68
which can be used as unique global reference for Moplus
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Adwind
Adwind is a backdoor written purely in Java that targets system supporting the Java runtime environment. Commands that can be used, among other things, to display messages on the system, open URLs, update the malware, download/execute files, and download/load plugins. According to the author, the backdoor component can run on Windows, Mac OS, Linux and Android platforms providing rich capabilities for remote control, data gathering, data exfiltration and lateral movement.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Adwind.
Known Synonyms |
---|
AlienSpy |
Backdoor:Java/Adwind |
Frutas |
Jsocket |
Sockrat |
Unrecom |
jRat |
Internal MISP references
UUID ce1a9641-5bb8-4a61-990a-870e9ef36ac1
which can be used as unique global reference for Adwind
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
AdSms
Adsms is a Trojan horse that may send SMS messages from Android devices.
Internal MISP references
UUID 55b6621f-f928-4530-8271-5150e5f39211
which can be used as unique global reference for AdSms
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Airpush
Airpush is a very aggresive Ad - Network
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Airpush.
Known Synonyms |
---|
StopSMS |
Internal MISP references
UUID 1393cccf-19c0-4cc8-8488-8156672d87ba
which can be used as unique global reference for Airpush
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
BeanBot
BeanBot forwards device's data to a remote server and sends out premium-rate SMS messages from the infected device.
Internal MISP references
UUID 8dbacb31-2ae9-4c0a-bf62-d017b802d345
which can be used as unique global reference for BeanBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Kemoge
Kemoge is adware that disguises itself as popular apps via repackaging, then allows for a complete takeover of the users Android device.
Internal MISP references
UUID 0c769e82-df28-4f65-97f5-7f3d88488f2e
which can be used as unique global reference for Kemoge
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
Ghost Push
Ghost Push is a family of malware that infects the Android OS by automatically gaining root access, downloading malicious software, masquerading as a system app, and then losing root access, which then makes it virtually impossible to remove the infection even by factory reset unless the firmware is reflashed.
Internal MISP references
UUID c878cdfc-ab8b-40f1-9173-e62a51e6f804
which can be used as unique global reference for Ghost Push
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
BeNews
The BeNews app is a backdoor app that uses the name of defunct news site BeNews to appear legitimate. After installation it bypasses restrictions and downloads additional threats to the compromised device.
Internal MISP references
UUID 281cf173-d547-4b37-a372-447caab577be
which can be used as unique global reference for BeNews
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Accstealer
Accstealer is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID cbc1c053-5ee8-40c9-96c2-431ac6852fe1
which can be used as unique global reference for Accstealer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Acnetdoor
Acnetdoor is a detection for Trojan horses on the Android platform that open a back door on the compromised device.
Internal MISP references
UUID b36f7ce2-e208-4879-9a3f-58623727f887
which can be used as unique global reference for Acnetdoor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Acnetsteal
Acnetsteal is a detection for Trojan horses on the Android platform that steal information from the compromised device.
Internal MISP references
UUID dbbc6b6f-fa87-4fdc-880d-7c22c2723c58
which can be used as unique global reference for Acnetsteal
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Actech
Actech is a Trojan horse for Android devices that steals information and sends it to a remote location.
Internal MISP references
UUID 0bf67f5b-0bcc-41e0-8db9-2b8df8cf1d03
which can be used as unique global reference for Actech
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
AdChina
AdChina is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 33a06139-1c18-4a9a-b86b-440c43266b15
which can be used as unique global reference for AdChina
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Adfonic
Adfonic is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID a02b2327-525a-4343-9c76-64f2c984c536
which can be used as unique global reference for Adfonic
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
AdInfo
AdInfo is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID a1737465-7af6-4362-b938-3a3fa737ebb7
which can be used as unique global reference for AdInfo
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Adknowledge
Adknowledge is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID dd626b23-173c-4737-b9d7-c44571c1abb3
which can be used as unique global reference for Adknowledge
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
AdMarvel
AdMarvel is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 6eb47eef-898e-4d74-9f85-ac9c99250e9b
which can be used as unique global reference for AdMarvel
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
AdMob
AdMob is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 932d18c5-6332-4334-83fc-4af3c46a4992
which can be used as unique global reference for AdMob
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Adrd
Adrd is a Trojan horse that steals information from Android devices.
Internal MISP references
UUID 121b8084-fdfd-4746-9675-cf8a191bf6d9
which can be used as unique global reference for Adrd
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Aduru
Aduru is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 3476c6dd-3cb0-443d-8668-0f731616b068
which can be used as unique global reference for Aduru
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Adwhirl
Adwhirl is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 6fe8fd1b-a7d9-4ece-95f5-fdaaa0acd797
which can be used as unique global reference for Adwhirl
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Adwlauncher
Adwlauncher is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 8ee649b6-8379-4b01-8997-dc7c82e22bb5
which can be used as unique global reference for Adwlauncher
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Adwo
Adwo is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 5c979585-51c3-427c-a23d-cbe43083ce2d
which can be used as unique global reference for Adwo
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Airad
Airad is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 5824688f-e91c-44ab-ae2e-392299e9d071
which can be used as unique global reference for Airad
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Alienspy
Alienspy is a Trojan horse for Android devices that steals information from the compromised device. It may also download potentially malicious files.
Internal MISP references
UUID 680a1677-9bff-4285-9394-62b1ce096c84
which can be used as unique global reference for Alienspy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
AmazonAds
AmazonAds is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 3a94a731-4566-4cc5-8c01-d651dc11b8a5
which can be used as unique global reference for AmazonAds
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Answerbot
Answerbot is a Trojan horse that opens a back door on Android devices.
Internal MISP references
UUID b8f8d1c1-5f33-4b13-8ecf-2383e3213713
which can be used as unique global reference for Answerbot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Antammi
Antammi is a Trojan horse that steals information from Android devices.
Internal MISP references
UUID bbc13ff1-0cee-4c30-a864-2c6a341ac365
which can be used as unique global reference for Antammi
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Apkmore
Apkmore is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID f45b87cf-6811-427c-84ff-027898b0592a
which can be used as unique global reference for Apkmore
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Aplog
Aplog is a Trojan horse for Android devices that steals information from the device.
Internal MISP references
UUID 600da14d-a959-4a06-9a13-85ff50cb05b4
which can be used as unique global reference for Aplog
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Appenda
Appenda is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 1840c69b-f340-444e-a4e5-ac324c8214eb
which can be used as unique global reference for Appenda
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Apperhand
Apperhand is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 2c199154-888b-4444-8d21-622ed62e6e63
which can be used as unique global reference for Apperhand
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Appleservice
Appleservice is a Trojan horse for Android devices that may steal information from the compromised device.
Internal MISP references
UUID 920b0561-abc9-409e-92b1-3b13b7d21a06
which can be used as unique global reference for Appleservice
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
AppLovin
AppLovin is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID e212433e-6dac-40ab-8793-8dcfe4a1538f
which can be used as unique global reference for AppLovin
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Arspam
Arspam is a Trojan horse for Android devices that sends spam SMS messages to contacts on the compromised device.
Internal MISP references
UUID e565a78c-8fa8-419b-b235-1fafa500686c
which can be used as unique global reference for Arspam
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Aurecord
Aurecord is a spyware application for Android devices that allows the device it is installed on to be monitored.
Internal MISP references
UUID 80a800a7-01ec-4712-9d2b-2382f7bf9201
which can be used as unique global reference for Aurecord
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Backapp
Backapp is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID a4100d65-78d0-47ec-b939-709447641bab
which can be used as unique global reference for Backapp
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Backdexer
Backdexer is a Trojan horse for Android devices that may send premium-rate SMS messages from the compromised device.
Internal MISP references
UUID 27c289c7-a661-4322-9c21-8053f347e457
which can be used as unique global reference for Backdexer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Backflash
Backflash is a Trojan horse for Android devices that opens a back door and steals information from the compromised device.
Internal MISP references
UUID da8cc77b-a26d-43da-a47a-a50892c08edd
which can be used as unique global reference for Backflash
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Backscript
Backscript is a Trojan horse for Android devices that downloads files onto the compromised device.
Internal MISP references
UUID d9f11a96-5f9a-48b6-9dac-735ca4fca4d2
which can be used as unique global reference for Backscript
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Badaccents
Badaccents is a Trojan horse for Android devices that may download apps on the compromised device.
Internal MISP references
UUID 1442e5a8-d2cf-48cd-86e5-276a9dfc0bae
which can be used as unique global reference for Badaccents
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Badpush
Badpush is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID ceacaa80-471e-4e38-b648-78b000771076
which can be used as unique global reference for Badpush
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Ballonpop
Ballonpop is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 6f957cc5-467b-4465-b14d-ccc6f2206543
which can be used as unique global reference for Ballonpop
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Bankosy
Bankosy is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 620981e8-49c8-486a-b30c-359702c8ffbc
which can be used as unique global reference for Bankosy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
Bankun
Bankun is a Trojan horse for Android devices that replaces certain banking applications on the compromised device.
Internal MISP references
UUID bc45ca3c-a6fa-408d-bfab-cc845ffde1e2
which can be used as unique global reference for Bankun
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Basebridge
Basebridge is a Trojan horse that attempts to send premium-rate SMS messages to predetermined numbers.
Internal MISP references
UUID 9ae60aaa-bcdb-46a1-a1da-d779cb13cb2b
which can be used as unique global reference for Basebridge
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Basedao
Basedao is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 9d625454-80a7-4c56-bb90-c0a678c6dec1
which can be used as unique global reference for Basedao
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Batterydoctor
Batterydoctor is Trojan that makes exaggerated claims about the device's ability to recharge the battery, as well as steal information.
Internal MISP references
UUID 5bd321b1-afef-482f-b160-2e209dffb390
which can be used as unique global reference for Batterydoctor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Beaglespy
Beaglespy is an Android mobile detection for the Beagle spyware program as well as its associated client application.
Internal MISP references
UUID 2e3ad1af-e24c-4b1c-87cb-360dab4d90a9
which can be used as unique global reference for Beaglespy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Becuro
Becuro is a Trojan horse for Android devices that downloads potentially malicious files onto the compromised device.
Internal MISP references
UUID dd83dbc7-9ffa-4ca7-a8c3-6b27bde4c3bd
which can be used as unique global reference for Becuro
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Beita
Beita is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 4baa74be-682f-4a38-b4b1-aceba8f48009
which can be used as unique global reference for Beita
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Bgserv
Bgserv is a Trojan that opens a back door and transmits information from the device to a remote location.
Internal MISP references
UUID e4a18a09-09ed-4ca8-93b8-be946e9f560c
which can be used as unique global reference for Bgserv
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Biigespy
Biigespy is an Android mobile detection for the Biige spyware program as well as its associated client application.
Internal MISP references
UUID 7a46c9c6-9af5-41e6-a625-aa14009c528e
which can be used as unique global reference for Biigespy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Bmaster
Bmaster is a Trojan horse on the Android platform that opens a back door, downloads files and steals potentially confidential information from the compromised device.
Internal MISP references
UUID 9ac3232d-b533-44d6-9b73-4341e2cba4b4
which can be used as unique global reference for Bmaster
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Bossefiv
Bossefiv is a Trojan horse for Android devices that steals information.
Internal MISP references
UUID 45d85c09-8bed-4c4e-b1d1-4784737734a5
which can be used as unique global reference for Bossefiv
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Boxpush
Boxpush is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 412bb5c6-a5fd-4f36-939e-47f87cc3edae
which can be used as unique global reference for Boxpush
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Burstly
Burstly is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 74053925-b076-47b0-8c23-bb90ff89653c
which can be used as unique global reference for Burstly
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Buzzcity
Buzzcity is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 604430f2-8109-40a6-8224-39d2790914e5
which can be used as unique global reference for Buzzcity
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
ByPush
ByPush is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 7c373640-5830-4f23-b122-3fb4f7af0b64
which can be used as unique global reference for ByPush
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Cajino
Cajino is a Trojan horse for Android devices that opens a back door on the compromised device.
Internal MISP references
UUID 388ed802-54bc-4cf0-899e-92fed27df5e1
which can be used as unique global reference for Cajino
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Casee
Casee is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID f48a667a-a74d-4c04-80a2-a257cd8e29cc
which can be used as unique global reference for Casee
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Catchtoken
Catchtoken is a Trojan horse for Android devices that intercepts SMS messages and opens a back door on the compromised device.
Internal MISP references
UUID ec37c5db-0497-440b-a7bc-4e28dc5c95f4
which can be used as unique global reference for Catchtoken
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Cauly
Cauly is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID b5db1360-91fc-4dc3-8520-d00f9f3601ce
which can be used as unique global reference for Cauly
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Cellshark
Cellshark is a spyware application for Android devices that periodically gathers information from the device and uploads it to a predetermined location.
Internal MISP references
UUID 471e6971-ab43-4b59-917c-5cdd5b8fd531
which can be used as unique global reference for Cellshark
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Centero
Centero is a Trojan horse for Android devices that displays advertisements on the compromised device.
Internal MISP references
UUID a9595906-adcf-4a08-9f71-f2eb2199cb87
which can be used as unique global reference for Centero
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Chuli
Chuli is a Trojan horse for Android devices that opens a back door and may steal information from the compromised device.
Internal MISP references
UUID f2f3e65a-5e46-45e9-aa23-addd841ba3c6
which can be used as unique global reference for Chuli
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Citmo
Citmo is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID e271a188-fc07-4f03-a047-d96ea64ee1e5
which can be used as unique global reference for Citmo
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Claco
Claco is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 2a7c2aff-9e7f-4358-9196-477042fc2f5b
which can be used as unique global reference for Claco
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Clevernet
Clevernet is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 76090f4b-eb03-42c0-90bb-9337d1a20d74
which can be used as unique global reference for Clevernet
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Cnappbox
Cnappbox is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID d343483b-909c-490a-827e-3a2c9d6ad033
which can be used as unique global reference for Cnappbox
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Cobblerone
Cobblerone is a spyware application for Android devices that can track the phone's location and remotely erase the device.
Internal MISP references
UUID 4863856a-9899-42a2-b02c-449aaa5a8258
which can be used as unique global reference for Cobblerone
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Coolpaperleak
Coolpaperleak is a Trojan horse for Android devices that steals information and sends it to a remote location.
Internal MISP references
UUID 272b75a0-a77f-44eb-ba7f-b68804d3506d
which can be used as unique global reference for Coolpaperleak
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Coolreaper
Coolreaper is a Trojan horse for Android devices that opens a back door on the compromised device. It may also steal information and download potentially malicious files.
Internal MISP references
UUID f2646118-fa1d-4e6a-9115-033ba1e05b21
which can be used as unique global reference for Coolreaper
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Cosha
Cosha is a spyware program for Android devices that monitors and sends certain information to a remote location.
Internal MISP references
UUID 045d0e45-ce4d-4b51-92c8-111013b3b972
which can be used as unique global reference for Cosha
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Counterclank
Counterclank is a Trojan horse for Android devices that steals information.
Internal MISP references
UUID 95b527d5-d90c-4c37-973f-1dc83da6511e
which can be used as unique global reference for Counterclank
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Crazymedia
Crazymedia is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID a08d4206-92b7-4b0e-9267-24eb4acf737f
which can be used as unique global reference for Crazymedia
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Crisis
Crisis is a Trojan horse for Android devices that opens a back door and steals information from the compromised device.
Internal MISP references
UUID c17f6e4b-70c5-42f8-a91b-19d73485bd04
which can be used as unique global reference for Crisis
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
Crusewind
Crusewind is a Trojan horse for Android devices that sends SMS messages to a premium-rate number.
Internal MISP references
UUID 67c624e1-89a0-4581-9fa3-de4864a03aab
which can be used as unique global reference for Crusewind
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Dandro
Dandro is a Trojan horse for Android devices that allows a remote attacker to gain control over the device and steal information from it.
Internal MISP references
UUID a5bff39e-804e-4c62-b5fb-7a7e32069a7d
which can be used as unique global reference for Dandro
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Daoyoudao
Daoyoudao is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 939f5057-635a-46e7-b15a-fb301258d0f9
which can be used as unique global reference for Daoyoudao
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Deathring
Deathring is a Trojan horse for Android devices that may perform malicious activities on the compromised device.
Internal MISP references
UUID 07ca0660-3391-4cb1-900c-a1ad38980b06
which can be used as unique global reference for Deathring
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Deeveemap
Deeveemap is a Trojan horse for Android devices that downloads potentially malicious files onto the compromised device.
Internal MISP references
UUID a23a5f71-affe-4f0e-aa8f-39a3967210ae
which can be used as unique global reference for Deeveemap
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Dendoroid
Dendoroid is a Trojan horse for Android devices that opens a back door, steals information, and may perform other malicious activities on the compromised device.
Internal MISP references
UUID f1a4a027-bb70-4279-9c59-c271ac264cbf
which can be used as unique global reference for Dendoroid
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Dengaru
Dengaru is a Trojan horse for Android devices that performs click-fraud from the compromised device.
Internal MISP references
UUID 2788d128-4c7a-4ed2-93c1-03125579251c
which can be used as unique global reference for Dengaru
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Diandong
Diandong is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 4fc012cf-dbbf-4200-af95-879eb668eb66
which can be used as unique global reference for Diandong
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Dianjin
Dianjin is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID bb9ff44c-eb04-4df3-8e17-967f59fee4f5
which can be used as unique global reference for Dianjin
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Dogowar
Dogowar is a Trojan horse on the Android platform that sends SMS texts to all contacts on the device. It is a repackaged version of a game application called Dog Wars, which can be downloaded from a third party market and must be manually installed.
Internal MISP references
UUID 397ed797-e2a9-423a-a485-e06b4633b37a
which can be used as unique global reference for Dogowar
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Domob
Domob is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID e99fe1de-4f88-4c69-95bc-87df65dc73ca
which can be used as unique global reference for Domob
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Dougalek
Dougalek is a Trojan horse for Android devices that steals information from the compromised device. The threat is typically disguised to display a video.
Internal MISP references
UUID d06b78de-b9f1-474a-b243-c975bd55baed
which can be used as unique global reference for Dougalek
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Dowgin
Dowgin is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 8635a12e-4fa4-495e-b3c9-de4a01c1bc59
which can be used as unique global reference for Dowgin
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Droidsheep
Droidsheep is a hacktool for Android devices that hijacks social networking accounts on compromised devices.
Internal MISP references
UUID 0ac34775-2323-4866-a540-913043aec431
which can be used as unique global reference for Droidsheep
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Dropdialer
Dropdialer is a Trojan horse for Android devices that sends SMS messages to a premium-rate phone number.
Internal MISP references
UUID d3aeb67a-6247-4a90-b7c2-971ced9dc7ef
which can be used as unique global reference for Dropdialer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Dupvert
Dupvert is a Trojan horse for Android devices that opens a back door and steals information from the compromised device. It may also perform other malicious activities.
Internal MISP references
UUID f8c910ed-6047-4628-a21a-2d5bf6895fd4
which can be used as unique global reference for Dupvert
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Dynamicit
Dynamicit is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID e9df4254-31d9-45c3-80df-f6da15549ebb
which can be used as unique global reference for Dynamicit
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Ecardgrabber
Ecardgrabber is an application that attempts to read details from NFC enabled credit cards. It attempts to read information from NFC enabled credit cards that are in close proximity.
Internal MISP references
UUID 70570b6a-7236-48cb-9b0d-e8495779f51d
which can be used as unique global reference for Ecardgrabber
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Ecobatry
Ecobatry is a Trojan horse for Android devices that steals information and sends it to a remote location.
Internal MISP references
UUID d8f4b1c3-7234-40ec-b944-8b22d2ba1fe7
which can be used as unique global reference for Ecobatry
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Enesoluty
Enesoluty is a Trojan horse for Android devices that steals information and sends it to a remote location.
Internal MISP references
UUID 6d5be115-6245-456b-929c-3077987e65d4
which can be used as unique global reference for Enesoluty
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Everbadge
Everbadge is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 36a6af63-035c-43ef-b534-0fe2f16462eb
which can be used as unique global reference for Everbadge
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Ewalls
Ewalls is a Trojan horse for the Android operating system that steals information from the mobile device.
Internal MISP references
UUID ef424b45-fb8a-4e81-9b9e-5ebb8d9219ed
which can be used as unique global reference for Ewalls
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Exprespam
Exprespam is a Trojan horse for Android devices that displays a fake message and steals personal information stored on the compromised device.
Internal MISP references
UUID 043ee6fa-37de-4a2d-a888-95febf8a243c
which can be used as unique global reference for Exprespam
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakealbums
Fakealbums is a Trojan horse for Android devices that monitors and forwards received messages from the compromised device.
Internal MISP references
UUID 0399e18a-e047-4507-a66c-2503b00cd727
which can be used as unique global reference for Fakealbums
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakeangry
Fakeangry is a Trojan horse on the Android platform that opens a back door, downloads files, and steals potentially confidential information from the compromised device.
Internal MISP references
UUID 6032b79e-68e7-4a9f-b913-8cb62e7c28e8
which can be used as unique global reference for Fakeangry
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakeapp
Fakeapp is a Trojan horse for Android devices that downloads configuration files to display advertisements and collects information from the compromised device.
Internal MISP references
UUID 493c97f8-db6c-40ae-a06e-fa2a9d84d660
which can be used as unique global reference for Fakeapp
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakebanco
Fakebanco is a Trojan horse for Android devices that redirects users to a phishing page in order to steal their information.
Internal MISP references
UUID 7714a6ee-3a75-42b2-ad4b-ec21da4259fd
which can be used as unique global reference for Fakebanco
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakebank
Fakebank is a Trojan horse that steals information from the compromised device.
Internal MISP references
UUID 4fba0b79-0be2-4471-9c1a-5a0295130ac2
which can be used as unique global reference for Fakebank
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakebank.B
Fakebank.B is a Trojan horse for Android devices that opens a back door and steals information from the compromised device.
Internal MISP references
UUID fb3083ad-5342-4913-9d48-f3abaf613878
which can be used as unique global reference for Fakebank.B
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakebok
Fakebok is a Trojan horse for Android devices that sends SMS messages to premium phone numbers.
Internal MISP references
UUID 84318a88-5ed5-43e9-ae8d-143e7373a46d
which can be used as unique global reference for Fakebok
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakedaum
Fakedaum is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID b91c1aaf-4a06-40ec-b4b9-59e9da882697
which can be used as unique global reference for Fakedaum
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakedefender
Fakedefender is a Trojan horse for Android devices that displays fake security alerts in an attempt to convince the user to purchase an app in order to remove non-existent malware or security risks from the device.
Internal MISP references
UUID 79a6bf32-d063-4b7c-a891-3dda49e31582
which can be used as unique global reference for Fakedefender
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakedefender.B
Fakedefender.B is a Trojan horse for Android devices that displays fake security alerts in an attempt to convince the user to purchase an app in order to remove non-existent malware or security risks from the device.
Internal MISP references
UUID 26f660c5-c04b-4bb2-8169-5dc2dfe1c835
which can be used as unique global reference for Fakedefender.B
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakedown
Fakedown is a Trojan horse for Android devices that downloads more malicious apps onto the compromised device.
Internal MISP references
UUID f43ef200-e9d8-4cca-bb63-ac3d70465fed
which can be used as unique global reference for Fakedown
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakeflash
Fakeflash is a Trojan horse for Android devices that installs a fake Flash application in order to direct users to a website.
Internal MISP references
UUID d2fe043a-8b6c-4aa2-8527-c51b7b44f9df
which can be used as unique global reference for Fakeflash
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakegame
Fakegame is a Trojan horse for Android devices that displays advertisements and steals information from the compromised device.
Internal MISP references
UUID 250a3e30-2025-486d-98fe-2fe1cf817451
which can be used as unique global reference for Fakegame
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakeguard
Fakeguard is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 2c5798aa-e68c-4158-ba04-1db39512451f
which can be used as unique global reference for Fakeguard
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakejob
Fakejob is a Trojan horse for Android devices that redirects users to scam websites.
Internal MISP references
UUID ba8bf35c-187f-4acb-8b44-5ee288535679
which can be used as unique global reference for Fakejob
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakekakao
Fakekakao is a Trojan horse for Android devices sends SMS messages to contacts stored on the compromised device.
Internal MISP references
UUID f0915277-0156-4832-b282-4447f4d06449
which can be used as unique global reference for Fakekakao
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakelemon
Fakelemon is a Trojan horse for Android devices that blocks certain SMS messages and may subscribe to services without the user's consent.
Internal MISP references
UUID 398bd8d6-a7ee-4f51-a8ff-96d8b4ae93a5
which can be used as unique global reference for Fakelemon
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakelicense
Fakelicense is a Trojan horse that displays advertisements on the compromised device.
Internal MISP references
UUID 21e5a963-ad8a-479b-b33e-35deb75f846d
which can be used as unique global reference for Fakelicense
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakelogin
Fakelogin is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 6bd49caa-59a2-4abf-86ea-7a2ebc7ed324
which can be used as unique global reference for Fakelogin
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
FakeLookout
FakeLookout is a Trojan horse for Android devices that opens a back door and steals information on the compromised device.
Internal MISP references
UUID caffc461-7415-4017-82bf-195df5d7791f
which can be used as unique global reference for FakeLookout
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
FakeMart
FakeMart is a Trojan horse for Android devices that may send SMS messages to premium rate numbers. It may also block incoming messages and steal information from the compromised device.
Internal MISP references
UUID 6816561e-203f-4f6c-b85b-e4f51148e9e7
which can be used as unique global reference for FakeMart
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakemini
Fakemini is a Trojan horse for Android devices that disguises itself as an installation for the Opera Mini browser and sends premium-rate SMS messages to a predetermined number.
Internal MISP references
UUID b40b23aa-5b2a-46bf-94ab-0bd0f9a896c9
which can be used as unique global reference for Fakemini
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakemrat
Fakemrat is a Trojan horse for Android devices that opens a back door and steals information from the compromised device.
Internal MISP references
UUID b61b0ca5-fd3c-4e65-af3f-7d4e9bc75e62
which can be used as unique global reference for Fakemrat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakeneflic
Fakeneflic is a Trojan horse that steals information from Android devices.
Internal MISP references
UUID 58113e57-f6df-45f0-a058-b08a892c3903
which can be used as unique global reference for Fakeneflic
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakenotify
Fakenotify is a Trojan horse for Android devices that sends SMS messages to premium-rate phone numbers, collects and sends information, and periodically displays Web pages. It also downloads legitimate apps onto the compromised device.
Internal MISP references
UUID 9dbfc63d-2b0d-406d-95cf-f87494bd588a
which can be used as unique global reference for Fakenotify
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakepatch
Fakepatch is a Trojan horse for Android devices that downloads more files on to the device.
Internal MISP references
UUID 981938f8-7820-4b15-ab96-f4923280253c
which can be used as unique global reference for Fakepatch
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakeplay
Fakeplay is a Trojan horse for Android devices that steals information from the compromised device and sends it to a predetermined email address.
Internal MISP references
UUID 4ac0574f-8faa-463f-a493-b245f2c76d2c
which can be used as unique global reference for Fakeplay
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakescarav
Fakescarav is a Trojan horse for Android devices that displays fake security alerts in an attempt to convince the user to pay in order to remove non-existent malware or security risks from the device.
Internal MISP references
UUID d52ff282-7b5c-427d-bc79-fbd686fb9ba3
which can be used as unique global reference for Fakescarav
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakesecsuit
Fakesecsuit is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID c23a04d3-5c38-4edc-b082-84c8997405ab
which can be used as unique global reference for Fakesecsuit
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakesucon
Fakesucon is a Trojan horse program for Android devices that sends SMS messages to premium-rate phone numbers.
Internal MISP references
UUID 942a4a67-875a-4273-845f-3d6845738283
which can be used as unique global reference for Fakesucon
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Faketaobao
Faketaobao is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID ee83a04a-5ce2-41f9-b232-c274c25acd7e
which can be used as unique global reference for Faketaobao
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Faketaobao.B
Faketaobao.B is a Trojan horse for Android devices that intercepts and and sends incoming SMS messages to a remote attacker.
Internal MISP references
UUID 2d4899d5-d566-4058-b216-a5c37f601417
which can be used as unique global reference for Faketaobao.B
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Faketoken
Faketoken is a Trojan horse that opens a back door on the compromised device.
Internal MISP references
UUID 25feca2d-6867-4390-9d60-100b47d9d81a
which can be used as unique global reference for Faketoken
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakeupdate
Fakeupdate is a Trojan horse for Android devices that downloads other applications onto the compromised device.
Internal MISP references
UUID e3eab046-a427-4132-99e7-f69598abcfd4
which can be used as unique global reference for Fakeupdate
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fakevoice
Fakevoice is a Trojan horse for Android devices that dials a premium-rate phone number.
Internal MISP references
UUID aab42c7b-fe4e-483c-9db5-146f449c0937
which can be used as unique global reference for Fakevoice
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Farmbaby
Farmbaby is a spyware application for Android devices that logs certain information and sends SMS messages to a predetermined phone number.
Internal MISP references
UUID 97973daa-ece5-46ef-ac5b-a6ead8bddb97
which can be used as unique global reference for Farmbaby
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fauxtocopy
Fauxtocopy is a spyware application for Android devices that gathers photos from the device and sends them to a predetermined email address.
Internal MISP references
UUID 1b316569-88c5-4f5a-874c-b3eb7f5a229d
which can be used as unique global reference for Fauxtocopy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Feiwo
Feiwo is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 0e5a7148-d5ab-4428-bbec-55780a4fcdad
which can be used as unique global reference for Feiwo
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
FindAndCall
FindAndCall is a Potentially Unwanted Application for Android devices that may leak information.
Internal MISP references
UUID d49baeba-0982-4815-a30a-c6520424a44d
which can be used as unique global reference for FindAndCall
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Finfish
Finfish is a Trojan horse for Android devices that opens a back door and steals information from the compromised device.
Internal MISP references
UUID b17a7d6f-8a48-408d-9362-3be6fab1d464
which can be used as unique global reference for Finfish
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fireleaker
Fireleaker is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID c8202616-804d-48c6-b104-466b3584f511
which can be used as unique global reference for Fireleaker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fitikser
Fitikser is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 10ac6220-2f49-4b25-9024-15f83f18033e
which can be used as unique global reference for Fitikser
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Flexispy
Flexispy is a Spyware application for Android devices that logs the device's activity and sends it to a predetermined website.
Internal MISP references
UUID a24e855e-cd0c-4abd-b2d8-0eaec87bcae5
which can be used as unique global reference for Flexispy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Fokonge
Fokonge is a Trojan horse that steals information from Android devices.
Internal MISP references
UUID 819bf929-01f0-447e-994c-e0e2f5a145c9
which can be used as unique global reference for Fokonge
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
FoncySMS
FoncySMS is a Trojan horse for Android devices that sends SMS messages to premium-rate phone numbers. It may also connect to an IRC server and execute any received shell commands.
Internal MISP references
UUID 917270d8-d7f3-432a-8c5c-28e7ea842f3e
which can be used as unique global reference for FoncySMS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Frogonal
Frogonal is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID c0c69286-1448-4a37-b047-7518d45a0b80
which can be used as unique global reference for Frogonal
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Ftad
Ftad is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 4295a452-f24d-4a95-be3c-dc5f17606669
which can be used as unique global reference for Ftad
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Funtasy
Funtasy is a Trojan horse for Android devices that subscribes the user to premium SMS services.
Internal MISP references
UUID 8e11e4fa-e8d5-485d-8ee8-61bf52bcde27
which can be used as unique global reference for Funtasy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
GallMe
GallMe is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 2086ef12-5578-496c-b140-433836b643ef
which can be used as unique global reference for GallMe
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Gamex
Gamex is a Trojan horse for Android devices that downloads further threats.
Internal MISP references
UUID fb63ab80-c198-48a8-a2f3-5fee516d8277
which can be used as unique global reference for Gamex
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Gappusin
Gappusin is a Trojan horse for Android devices that downloads applications and disguises them as system updates.
Internal MISP references
UUID 65a95075-b79d-42ea-8a62-8390994fbed4
which can be used as unique global reference for Gappusin
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Gazon
Gazon is a worm for Android devices that spreads through SMS messages.
Internal MISP references
UUID 77ea250b-d8aa-4477-8c74-93af056d8eee
which can be used as unique global reference for Gazon
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Geinimi
Geinimi is a Trojan that opens a back door and transmits information from the device to a remote location.
Internal MISP references
UUID da751d6f-779e-4d87-99ad-9393cb72607d
which can be used as unique global reference for Geinimi
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Generisk
Generisk is a generic detection for Android applications that may pose a privacy, security, or stability risk to the user or user's Android device.
Internal MISP references
UUID 1f8573ad-c3ff-4268-83a5-c0a71f7b7944
which can be used as unique global reference for Generisk
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Genheur
Genheur is a generic detection for many individual but varied Trojans for Android devices for which specific definitions have not been created. A generic detection is used because it protects against many Trojans that share similar characteristics.
Internal MISP references
UUID 5bcc7083-006b-428a-8952-aa34354e011e
which can be used as unique global reference for Genheur
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Genpush
Genpush is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 1854c808-f818-416c-961a-ba582bf5f27c
which can be used as unique global reference for Genpush
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
GeoFake
GeoFake is a Trojan horse for Android devices that sends SMS messages to premium-rate numbers.
Internal MISP references
UUID 4fa4e576-369a-4211-a1ea-4896aacfe4a7
which can be used as unique global reference for GeoFake
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Geplook
Geplook is a Trojan horse for Android devices that downloads additional apps onto the compromised device.
Internal MISP references
UUID ead163e7-c5b5-486f-b27d-629b26f6abdc
which can be used as unique global reference for Geplook
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Getadpush
Getadpush is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID f41a08e2-5fc4-48ca-9cbc-9c7f0bce9b1f
which can be used as unique global reference for Getadpush
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Ggtracker
Ggtracker is a Trojan horse for Android devices that sends SMS messages to a premium-rate number. It may also steal information from the device.
Internal MISP references
UUID d4aed5c2-4011-4b62-80c1-8cdc6e5b2fc5
which can be used as unique global reference for Ggtracker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Ghostpush
Ghostpush is a Trojan horse for Android devices that roots the compromised device. It may then perform malicious activities on the compromised device.
Internal MISP references
UUID 9423457b-4660-4d27-916f-b6fd39628e17
which can be used as unique global reference for Ghostpush
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Gmaster
Gmaster is a Trojan horse on the Android platform that steals potentially confidential information from the compromised device.
Internal MISP references
UUID 92955169-4734-47d5-adfe-e01003dc0768
which can be used as unique global reference for Gmaster
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Godwon
Godwon is a Trojan horse for Android devices that steals information.
Internal MISP references
UUID 3787e5cf-49af-4105-a775-241c40aec377
which can be used as unique global reference for Godwon
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Golddream
Golddream is a Trojan horse that steals information from Android devices.
Internal MISP references
UUID fa2fe25b-247a-4675-ab85-a040200ff9a7
which can be used as unique global reference for Golddream
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Goldeneagle
Goldeneagle is a Trojan horse that steals information from Android devices.
Internal MISP references
UUID c0836a8b-b104-42e5-ba0c-261ae2f65c50
which can be used as unique global reference for Goldeneagle
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Golocker
Golocker is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 28171041-ed65-4545-9e21-e6f925fd1688
which can be used as unique global reference for Golocker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Gomal
Gomal is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 666b5326-8552-481a-85ee-37cea031de9d
which can be used as unique global reference for Gomal
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Gonesixty
Gonesixty is a Trojan horse that steals information from Android devices.
Internal MISP references
UUID b153de8e-1096-4ff3-8c00-0dffe77574eb
which can be used as unique global reference for Gonesixty
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Gonfu
Gonfu is a Trojan horse that steals information from Android devices.
Internal MISP references
UUID b10ae730-e9d8-42f7-8970-77fde44733c2
which can be used as unique global reference for Gonfu
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Gonfu.B
Gonfu.B is a Trojan horse that steals information from Android devices.
Internal MISP references
UUID 0caf0b55-e4ee-4971-86f0-8968ecbec5cf
which can be used as unique global reference for Gonfu.B
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Gonfu.C
Gonfu.C is a Trojan horse for Android devices that may download additional threats on the compromised device.
Internal MISP references
UUID faf9c1dc-4efd-4e16-abf9-135839126b58
which can be used as unique global reference for Gonfu.C
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Gonfu.D
Gonfu.D is a Trojan horse that opens a back door on Android devices.
Internal MISP references
UUID 7ee57b0f-fc7c-424a-b3c7-e1a5a028ed8e
which can be used as unique global reference for Gonfu.D
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Gooboot
Gooboot is a Trojan horse for Android devices that may send text messages to premium rate numbers.
Internal MISP references
UUID dedde091-a167-42bd-b47c-710381a5fc4f
which can be used as unique global reference for Gooboot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Goodadpush
Goodadpush is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 24d9abb7-67e6-4cd5-8f34-6fae58293134
which can be used as unique global reference for Goodadpush
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Greystripe
Greystripe is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 4e9b59a3-1b0b-4c94-bac2-22a9730cc1a0
which can be used as unique global reference for Greystripe
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Gugespy
Gugespy is a spyware program for Android devices that logs the device's activity and sends it to a predetermined email address.
Internal MISP references
UUID 1d9c433a-9b8c-4ad7-b4b3-5a29137aca3b
which can be used as unique global reference for Gugespy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Gugespy.B
Gugespy.B is a spyware program for Android devices that monitors and sends certain information to a remote location.
Internal MISP references
UUID 3869692a-e24c-44ad-8f46-a0bd38c5bc5e
which can be used as unique global reference for Gugespy.B
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Gupno
Gupno is a Trojan horse for Android devices that poses as a legitimate app and attempts to charge users for features that are normally free. It may also display advertisements on the compromised device.
Internal MISP references
UUID 2434d65f-7a96-4cf3-b3c7-d93d70be8907
which can be used as unique global reference for Gupno
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Habey
Habey is a Trojan horse for Android devices that may attempt to delete files and send SMS messages from the compromised device.
Internal MISP references
UUID 15109175-300b-42b1-bc59-2ad305cb2338
which can be used as unique global reference for Habey
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Handyclient
Handyclient is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID dc37a1f9-dec0-4ea0-94c6-450b26272e3d
which can be used as unique global reference for Handyclient
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Hehe
Hehe is a Trojan horse for Android devices that blocks incoming calls and SMS messages from specific numbers. The Trojan also steals information from the compromised device.
Internal MISP references
UUID c9538896-1dd4-4d87-b89c-a0a019996b27
which can be used as unique global reference for Hehe
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Hesperbot
Hesperbot is a Trojan horse for Android devices that opens a back door on the compromised device and may steal information.
Internal MISP references
UUID a642266c-b729-4009-8bd5-9cb06857cda7
which can be used as unique global reference for Hesperbot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Hippo
Hippo is a Trojan horse that sends SMS messages to premium-rate phone numbers.
Internal MISP references
UUID bdf5533f-f05d-44cf-ad0c-c1db9689961f
which can be used as unique global reference for Hippo
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Hippo.B
Hippo.B is a Trojan horse that sends SMS messages to premium-rate phone numbers.
Internal MISP references
UUID 04d2d441-1a18-4921-96f1-56fc938e01ea
which can be used as unique global reference for Hippo.B
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
IadPush
IadPush is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID d8dd9f88-4acf-4bbf-886b-6c48f2463109
which can be used as unique global reference for IadPush
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
iBanking
iBanking is a Trojan horse for Android devices that opens a back door on the compromised device and may steal information.
Internal MISP references
UUID 531f750f-fe86-4548-a2e5-540fda864860
which can be used as unique global reference for iBanking
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Iconosis
Iconosis is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 71e19f13-ef09-44f2-a71b-ef39b2f02dbf
which can be used as unique global reference for Iconosis
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Iconosys
Iconosys is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 84480513-a52a-4de2-9869-1c886a6e8365
which can be used as unique global reference for Iconosys
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Igexin
Igexin is an advertisement library that is bundled with certain Android applications. Igexin has the capability of spying on victims through otherwise benign apps by downloading malicious plugins,
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular Igexin.
Known Synonyms |
---|
IcicleGum |
Internal MISP references
UUID 52c5f9b3-e9ed-4c86-b4a8-d4ebc68a4d7b
which can be used as unique global reference for Igexin
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
ImAdPush
ImAdPush is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 847d6c0e-d92e-4466-91b8-6fe2718c6031
which can be used as unique global reference for ImAdPush
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
InMobi
InMobi is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 65e35c22-4a55-44ad-bd09-43f8a18d7e93
which can be used as unique global reference for InMobi
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Jifake
Jifake is a Trojan horse for Android devices that sends SMS messages to premium-rate phone numbers.
Internal MISP references
UUID d32149d8-a20c-40eb-b486-7c3b3369bb9a
which can be used as unique global reference for Jifake
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Jollyserv
Jollyserv is a Trojan horse for Android devices that sends SMS messages and steals information from the compromised device.
Internal MISP references
UUID ee7faba5-6d35-49ff-af50-1ded1e42cc0b
which can be used as unique global reference for Jollyserv
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Jsmshider
Jsmshider is a Trojan horse that opens a back door on Android devices.
Internal MISP references
UUID 5390586b-a224-4006-ab43-73ecdebe7892
which can be used as unique global reference for Jsmshider
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Ju6
Ju6 is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 7886d5bb-8318-427a-a5df-9dc2122d8f05
which can be used as unique global reference for Ju6
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Jumptap
Jumptap is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID ab353e23-22ef-44a8-80de-fe0ae609e571
which can be used as unique global reference for Jumptap
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Jzmob
Jzmob is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 941608bc-1fd5-473a-b4f7-a7f9763a4276
which can be used as unique global reference for Jzmob
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Kabstamper
Kabstamper is a Trojan horse for Android devices that corrupts images found on the compromised device.
Internal MISP references
UUID ff8e4fe3-12b3-4c3b-959e-82971821d8e9
which can be used as unique global reference for Kabstamper
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Kidlogger
Kidlogger is a Spyware application for Android devices that logs the device's activity and sends it to a predetermined website.
Internal MISP references
UUID 89c13c33-8ec2-4bbe-9867-02ac9f0a7dad
which can be used as unique global reference for Kidlogger
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Kielog
Kielog is a Trojan horse for Android devices that logs keystrokes and sends the stolen information to the remote attacker.
Internal MISP references
UUID 324a5388-63f9-4ba8-aa5f-6a803be5e903
which can be used as unique global reference for Kielog
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Kituri
Kituri is a Trojan horse for Android devices that blocks certain SMS messages from being received by the device. It may also send SMS messages to a premium-rate number.
Internal MISP references
UUID d1c6c267-4c59-4cf9-a540-13d38b20d360
which can be used as unique global reference for Kituri
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Kranxpay
Kranxpay is a Trojan horse for Android devices that downloads other apps onto the device.
Internal MISP references
UUID 67f27518-6ec3-4723-8b4d-34d91a4d3a3e
which can be used as unique global reference for Kranxpay
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Krysanec
Krysanec is a Trojan horse for Android devices that opens a back door on the compromised device.
Internal MISP references
UUID 736ebf9f-1868-45ea-94a5-d389f2d11588
which can be used as unique global reference for Krysanec
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Kuaidian360
Kuaidian360 is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 0ec6ad4a-77ce-4c68-a349-1973bdc328f6
which can be used as unique global reference for Kuaidian360
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Kuguo
Kuguo is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 9fa68491-57fc-4d85-a063-0b822286c25f
which can be used as unique global reference for Kuguo
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Lastacloud
Lastacloud is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 3bbf47e9-57b1-4bd1-9dc3-34d59e203771
which can be used as unique global reference for Lastacloud
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Laucassspy
Laucassspy is a spyware program for Android devices that steals information and sends it to a remote location.
Internal MISP references
UUID 3b3956a8-a1cb-4839-8731-08295c2b88d6
which can be used as unique global reference for Laucassspy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Lifemonspy
Lifemonspy is a spyware application for Android devices that can track the phone's location, download SMS messages, and erase certain data from the device.
Internal MISP references
UUID 063abe8e-3688-48af-848e-132d636b4ecc
which can be used as unique global reference for Lifemonspy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Lightdd
Lightdd is a Trojan horse that steals information from Android devices.
Internal MISP references
UUID 47aec378-9c9c-432c-9cd5-ddaa7942c6f4
which can be used as unique global reference for Lightdd
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Loaderpush
Loaderpush is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 5b137010-c01c-4811-b93f-e1de1c986563
which can be used as unique global reference for Loaderpush
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Locaspy
Locaspy is a Potentially Unwanted Application for Android devices that tracks the location of the compromised device.
Internal MISP references
UUID 75e2f27a-cdeb-4768-808e-469d99a581d1
which can be used as unique global reference for Locaspy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Lockdroid.E
Lockdroid.E is a Trojan horse for Android devices that locks the screen and displays a ransom demand on the compromised device.
Internal MISP references
UUID 04fc65b7-47a1-4eac-b485-ea8a6933613c
which can be used as unique global reference for Lockdroid.E
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Lockdroid.F
Lockdroid.F is a Trojan horse for Android devices that locks the screen and displays a ransom demand on the compromised device.
Internal MISP references
UUID a98bb328-2a25-4733-b1d2-688abf25784d
which can be used as unique global reference for Lockdroid.F
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Lockdroid.G
Lockdroid.G is a Trojan horse for Android devices that may display a ransom demand on the compromised device.
Internal MISP references
UUID 0e4f2334-889f-4438-bdfb-b4287397fc43
which can be used as unique global reference for Lockdroid.G
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Lockdroid.H
Lockdroid.H is a Trojan horse for Android devices that locks the screen and displays a ransom demand on the compromised device.
Internal MISP references
UUID f453d127-48ae-4422-9e79-fb138f26de83
which can be used as unique global reference for Lockdroid.H
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Lockscreen
Lockscreen is a Trojan horse for Android devices that locks the compromised device from use.
Internal MISP references
UUID 370237dc-95f4-47a0-9985-2ec8151f7e3a
which can be used as unique global reference for Lockscreen
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
LogiaAd
LogiaAd is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 8a065cda-da87-46b6-960a-2bcc74e92fd1
which can be used as unique global reference for LogiaAd
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Loicdos
Loicdos is an Android application that provides an interface to a website in order to perform a denial of service (DoS) attack against a computer.
Internal MISP references
UUID 32ec05c2-a360-49b1-8863-166fd0011460
which can be used as unique global reference for Loicdos
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Loozfon
Loozfon is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 983458be-99a4-460a-be5d-c8b284468a61
which can be used as unique global reference for Loozfon
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Lotoor
Lotoor is a generic detection for hack tools that exploit vulnerabilities in order to gain root privileges on compromised Android devices.
Internal MISP references
UUID f459ff4a-3015-458f-8402-9981b6164f17
which can be used as unique global reference for Lotoor
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Lovespy
Lovespy is a Trojan horse for Android devices that steals information from the device.
Internal MISP references
UUID 508ab8e3-c950-4adf-b87a-90f86423fa4d
which can be used as unique global reference for Lovespy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Lovetrap
Lovetrap is a Trojan horse that sends SMS messages to premium-rate phone numbers.
Internal MISP references
UUID ab2b8596-4304-4682-a324-6a9ddd9a9c31
which can be used as unique global reference for Lovetrap
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Luckycat
Luckycat is a Trojan horse for Android devices that opens a back door and steals information on the compromised device.
Internal MISP references
UUID 5429dd64-74f5-4370-85f0-2654c067dfc5
which can be used as unique global reference for Luckycat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Machinleak
Machinleak is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 68c21410-a32c-4151-9e3e-bd3070937bfd
which can be used as unique global reference for Machinleak
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Maistealer
Maistealer is a Trojan that steals information from Android devices.
Internal MISP references
UUID 88521447-177a-4024-b336-0a065e6d7f16
which can be used as unique global reference for Maistealer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Malapp
Malapp is a generic detection for many individual but varied threats on Android devices that share similar characteristics.
Internal MISP references
UUID 4b2483e7-acc2-4eec-bd7f-a8ac45e403b4
which can be used as unique global reference for Malapp
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Malebook
Malebook is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 93177c2f-79fa-4b3e-8312-994306bac870
which can be used as unique global reference for Malebook
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Malhome
Malhome is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 6178421f-b4d9-4307-b9ac-f75139651adf
which can be used as unique global reference for Malhome
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Malminer
Malminer is a Trojan horse for Android devices that mines cryptocurrencies on the compromised device.
Internal MISP references
UUID 1e7e1c16-f241-41ea-ab12-f3c3f72f0931
which can be used as unique global reference for Malminer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Mania
Mania is a Trojan horse for Android devices that sends SMS messages to a premium-rate phone number.
Internal MISP references
UUID dd97858e-001b-4ac4-9947-fcfdf24e12f7
which can be used as unique global reference for Mania
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Maxit
Maxit is a Trojan horse for Android devices that opens a back door on the compromised device. It also steals certain information and uploads it to a remote location.
Internal MISP references
UUID 0687203f-8f57-4de3-86f5-ceb3f151151c
which can be used as unique global reference for Maxit
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
MdotM
MdotM is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID aa94146b-6901-4c6c-8669-d64b4eb70594
which can be used as unique global reference for MdotM
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Medialets
Medialets is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 3bd73087-fdf8-426a-84b9-50f308a05c53
which can be used as unique global reference for Medialets
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Meshidden
Meshidden is a spyware application for Android devices that allows the device it is installed on to be monitored.
Internal MISP references
UUID 35ec0f9f-4516-45ed-b101-6829bd99ce86
which can be used as unique global reference for Meshidden
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Mesploit
Mesploit is a tool for Android devices used to create applications that exploit the Android Fake ID vulnerability.
Internal MISP references
UUID bed7e358-3b69-4944-898f-aabf32e1af3d
which can be used as unique global reference for Mesploit
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Mesprank
Mesprank is a Trojan horse for Android devices that opens a back door on the compromised device.
Internal MISP references
UUID 989b1801-a3a9-4671-b161-d7b07cbbae32
which can be used as unique global reference for Mesprank
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Meswatcherbox
Meswatcherbox is a spyware application for Android devices that forwards SMS messages without the user knowing.
Internal MISP references
UUID d4a7f045-7e1c-4467-8eb7-7dc3ce3c04dd
which can be used as unique global reference for Meswatcherbox
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Miji
Miji is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID c5fa5347-0338-43f1-813b-b11ce13a44e5
which can be used as unique global reference for Miji
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Milipnot
Milipnot is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 44ab46dd-7027-4f66-a716-d59db5cf5e73
which can be used as unique global reference for Milipnot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
MillennialMedia
MillennialMedia is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 549a3d4e-d8f8-48b5-9b4b-659646640f85
which can be used as unique global reference for MillennialMedia
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Mitcad
Mitcad is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 03d069bd-53f5-4d62-82af-2461b8b501f7
which can be used as unique global reference for Mitcad
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
MobClix
MobClix is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 9688b924-811f-4315-ba42-2ee1e9e52b55
which can be used as unique global reference for MobClix
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
MobFox
MobFox is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID ee248082-86b3-48ce-9500-47ccd471edec
which can be used as unique global reference for MobFox
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Mobidisplay
Mobidisplay is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID d2a7cd95-3a32-4da4-97fb-a0982c2eaf60
which can be used as unique global reference for Mobidisplay
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Mobigapp
Mobigapp is a Trojan horse for Android devices that downloads applications disguised as system updates.
Internal MISP references
UUID f35969cc-13d8-46cf-a4cc-ff2f15844205
which can be used as unique global reference for Mobigapp
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
MobileBackup
MobileBackup is a spyware application for Android devices that monitors the affected device.
Internal MISP references
UUID caea6805-dad0-44b7-a0f2-3f41c227698c
which can be used as unique global reference for MobileBackup
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Mobilespy
Mobilespy is a Trojan horse that steals information from Android devices.
Internal MISP references
UUID a6acb97a-359a-4fdc-9f27-2190dbe66c02
which can be used as unique global reference for Mobilespy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Mobiletx
Mobiletx is a Trojan horse for Android devices that steals information from the compromised device. It may also send SMS messages to a premium-rate number.
Internal MISP references
UUID 3752d35b-0cbf-41ee-a057-6252342d94a7
which can be used as unique global reference for Mobiletx
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Mobinaspy
Mobinaspy is a spyware application for Android devices that can track the device's location.
Internal MISP references
UUID dda43d3d-5852-4957-834a-a711bbfa3e4a
which can be used as unique global reference for Mobinaspy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Mobus
Mobus is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 95272c25-5df1-47ef-af3d-88e7b7492d45
which can be used as unique global reference for Mobus
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
MobWin
MobWin is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 960804ae-0c6a-42de-9f0c-2b20a56c2c32
which can be used as unique global reference for MobWin
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Mocore
Mocore is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID be1c2349-1864-4164-905b-cd971454448d
which can be used as unique global reference for Mocore
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Moghava
Moghava is a Trojan horse for Android devices that modifies images that are stored on the device.
Internal MISP references
UUID 671a2ca3-fa4f-4bfb-95d0-ac9c2479edff
which can be used as unique global reference for Moghava
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Momark
Momark is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID f68ccede-1c5a-4d27-8d5f-2e68ebbbfcd7
which can be used as unique global reference for Momark
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Monitorello
Monitorello is a spyware application for Android devices that allows the device it is installed on to be monitored.
Internal MISP references
UUID 5b89b17f-d569-4c7d-9990-c8054d506e02
which can be used as unique global reference for Monitorello
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Moolah
Moolah is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID c630be3f-709c-42e7-8523-905ca6896066
which can be used as unique global reference for Moolah
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
MoPub
MoPub is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 1243bbc1-32a5-4034-a68b-fe67472469af
which can be used as unique global reference for MoPub
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Morepaks
Morepaks is a Trojan horse for Android devices that downloads remote files and may display advertisements on the compromised device.
Internal MISP references
UUID 20ca85ec-bb04-47b1-9179-aa3871724cc4
which can be used as unique global reference for Morepaks
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Nandrobox
Nandrobox is a Trojan horse for Android devices that steals information from the compromised device. It also deletes certain SMS messages from the device.
Internal MISP references
UUID 32ebe3f6-4a19-4e95-b06b-18663f4f0b43
which can be used as unique global reference for Nandrobox
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Netisend
Netisend is a Trojan horse that steals information from Android devices.
Internal MISP references
UUID deef380d-8e63-4669-9f5b-0cbf50c57070
which can be used as unique global reference for Netisend
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Nickispy
Nickispy is a Trojan horse that steals information from Android devices.
Internal MISP references
UUID 7bdcf5c4-4c1d-4f37-8811-58f60c07dc51
which can be used as unique global reference for Nickispy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Notcompatible
Notcompatible is a Trojan horse for Android devices that acts as a proxy.
Internal MISP references
UUID c18d1cdc-855a-47b0-93f6-9d8795c9121d
which can be used as unique global reference for Notcompatible
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Nuhaz
Nuhaz is a Trojan horse for Android devices that may intercept text messages on the compromised device.
Internal MISP references
UUID ea8ff12e-fdd1-425d-bb4e-39374040b290
which can be used as unique global reference for Nuhaz
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Nyearleaker
Nyearleaker is a Trojan horse program for Android devices that steals information.
Internal MISP references
UUID 08381c6b-5c92-4e14-8ad5-52954b101907
which can be used as unique global reference for Nyearleaker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Obad
Obad is a Trojan horse for Android devices that opens a back door, steals information, and downloads files. It also sends SMS messages to premium-rate numbers and spreads malware to Bluetooth-enabled devices.
Internal MISP references
UUID f59181e2-6214-4ff7-842e-916d124b3535
which can be used as unique global reference for Obad
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Oneclickfraud
Oneclickfraud is a Trojan horse for Android devices that attempts to coerce a user into paying for a pornographic service.
Internal MISP references
UUID 99ebc7b4-dbba-4c1c-a991-3c75d69007f6
which can be used as unique global reference for Oneclickfraud
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Opfake
Opfake is a detection for Trojan horses on the Android platform that send SMS texts to premium-rate numbers.
Internal MISP references
UUID 9017bea0-d29e-4a2d-bda5-03ca6d0c7bc0
which can be used as unique global reference for Opfake
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Opfake.B
Opfake.B is a Trojan horse for the Android platform that may receive commands from a remote attacker to perform various functions.
Internal MISP references
UUID 40115080-242e-4278-97b6-77171aa6ec47
which can be used as unique global reference for Opfake.B
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Ozotshielder
Ozotshielder is a Trojan horse that steals information from Android devices.
Internal MISP references
UUID b6e17717-a860-412b-a223-8fb0a7f5fe26
which can be used as unique global reference for Ozotshielder
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Pafloat
Pafloat is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 4fa40665-8a2a-4b01-bda7-5860497a46cc
which can be used as unique global reference for Pafloat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
PandaAds
PandaAds is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID fd4d373a-dc7a-4ed0-8880-3f4d46ab4541
which can be used as unique global reference for PandaAds
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Pandbot
Pandbot is a Trojan horse for Android devices that may download more files onto the device.
Internal MISP references
UUID aaa14125-c4eb-49b1-a397-6eb23e9ca8bf
which can be used as unique global reference for Pandbot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Pdaspy
Pdaspy is a spyware application for Android devices that periodically gathers information from the device and uploads it to a predetermined location.
Internal MISP references
UUID d206b674-2c8b-4165-955f-c7b3747f881e
which can be used as unique global reference for Pdaspy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Penetho
Penetho is a hacktool for Android devices that can be used to crack the WiFi password of the router that the device is using.
Internal MISP references
UUID a032b966-7274-4963-82e3-4d6ea805db91
which can be used as unique global reference for Penetho
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Perkel
Perkel is a Trojan horse for Android devices that may steal information from the compromised device.
Internal MISP references
UUID c076d45a-d4f8-4e6b-9f69-71687b5670f7
which can be used as unique global reference for Perkel
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Phimdropper
Phimdropper is a Trojan horse for Android devices that sends and intercepts incoming SMS messages.
Internal MISP references
UUID 12801a82-add4-48f4-957a-5e7b09f2d0e3
which can be used as unique global reference for Phimdropper
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Phospy
Phospy is a Trojan horse for Android devices that steals confidential information from the compromised device.
Internal MISP references
UUID 058809da-b25d-429b-8773-e2b2f820d5ef
which can be used as unique global reference for Phospy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Piddialer
Piddialer is a Trojan horse for Android devices that dials premium-rate numbers from the compromised device.
Internal MISP references
UUID c561faeb-2b49-413c-90fa-879fed864e76
which can be used as unique global reference for Piddialer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Pikspam
Pikspam is a Trojan horse for Android devices that sends spam SMS messages from the compromised device.
Internal MISP references
UUID da914e7e-8cd2-49d2-9e6c-ce7f5174f3e1
which can be used as unique global reference for Pikspam
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Pincer
Pincer is a Trojan horse for Android devices that steals confidential information and opens a back door on the compromised device.
Internal MISP references
UUID 4ef79875-3b57-4025-8a2a-07cdb078064f
which can be used as unique global reference for Pincer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Pirator
Pirator is a Trojan horse on the Android platform that downloads files and steals potentially confidential information from the compromised device.
Internal MISP references
UUID 42b22f4f-c4ca-49a7-8ef2-4f470a611d87
which can be used as unique global reference for Pirator
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Pjapps
Pjapps is a Trojan horse that has been embedded on third party applications and opens a back door on the compromised device. It retrieves commands from a remote command and control server.
Internal MISP references
UUID 5ad131de-ee9b-4815-9779-dd41bbc691ac
which can be used as unique global reference for Pjapps
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Pjapps.B
Pjapps.B is a Trojan horse for Android devices that opens a back door on the compromised device.
Internal MISP references
UUID 337a4e0f-3ba7-4b3e-8ee8-6dec28efa367
which can be used as unique global reference for Pjapps.B
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Pletora
Pletora is a is a Trojan horse for Android devices that may lock the compromised device. It then asks the user to pay in order to unlock the device.
Internal MISP references
UUID e7fcea42-c041-4650-8a74-980e2580f707
which can be used as unique global reference for Pletora
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Poisoncake
Poisoncake is a Trojan horse for Android devices that opens a back door on the compromised device. It may also download potentially malicious files and steal information.
Internal MISP references
UUID f3fa28df-2f61-4391-921d-0df12015406a
which can be used as unique global reference for Poisoncake
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Pontiflex
Pontiflex is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID a69028fd-345c-46c1-a8e4-5344edf4a83b
which can be used as unique global reference for Pontiflex
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Positmob
Positmob is a Trojan horse program for Android devices that sends SMS messages to premium rate phone numbers.
Internal MISP references
UUID 55014563-84cd-42bd-a4d0-9cb59fed0954
which can be used as unique global reference for Positmob
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Premiumtext
Premiumtext is a detection for Trojan horses on the Android platform that send SMS texts to premium-rate numbers. These Trojans will often be repackaged versions of genuine Android software packages, often distributed outside the Android Marketplace.
Internal MISP references
UUID aafa218b-681d-4fa9-bbe0-3e5e1655e379
which can be used as unique global reference for Premiumtext
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Pris
Pris is a Trojan horse for Android devices that silently downloads a malicious application and attempts to open a back door on the compromised device.
Internal MISP references
UUID 84c24979-1f6b-4fb6-9783-b0262002f27c
which can be used as unique global reference for Pris
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Qdplugin
Qdplugin is a Trojan horse for Android devices that opens a back door and steals information from the compromised device.
Internal MISP references
UUID 104be155-2e71-46bf-90a4-c2b27c6b6825
which can be used as unique global reference for Qdplugin
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Qicsomos
Qicsomos is a Trojan horse for Android devices that sends SMS messages to a premium-rate phone number.
Internal MISP references
UUID ef0a5556-2328-47f2-9703-bd8001639afe
which can be used as unique global reference for Qicsomos
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Qitmo
Qitmo is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 0d2c5dd9-8300-4570-a49e-971ac90efdec
which can be used as unique global reference for Qitmo
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Rabbhome
Rabbhome is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 4c15d120-70c8-4d9f-b001-bf6c218a991a
which can be used as unique global reference for Rabbhome
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Repane
Repane is a Trojan horse for Android devices that steals information and sends SMS messages from the compromised device.
Internal MISP references
UUID 4f07cf74-9b9b-479d-859e-67a2a13ca5de
which can be used as unique global reference for Repane
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Reputation.1
Reputation.1 is a detection for Android files based on analysis performed by Norton Mobile Insight.
Internal MISP references
UUID d1ef2846-24cc-48a7-9bf2-c739eed7d25a
which can be used as unique global reference for Reputation.1
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Reputation.2
Reputation.2 is a detection for Android files based on analysis performed by Norton Mobile Insight.
Internal MISP references
UUID 522a2325-290b-45ac-9eab-ffdf3898dbee
which can be used as unique global reference for Reputation.2
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Reputation.3
Reputation.3 is a detection for Android files based on analysis performed by Norton Mobile Insight.
Internal MISP references
UUID 095a898a-301a-49f1-9bc6-c43425d17c8e
which can be used as unique global reference for Reputation.3
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
RevMob
RevMob is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 6469a63e-5c6b-4517-9540-eb16488ad67a
which can be used as unique global reference for RevMob
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Roidsec
Roidsec is a Trojan horse for Android devices that steals confidential information.
Internal MISP references
UUID 06ae93ed-13ba-4200-9c91-8901f08a4fae
which can be used as unique global reference for Roidsec
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Rootcager
Rootcager is a Trojan horse that steals information from Android devices.
Internal MISP references
UUID 25f0c7d4-f961-4cd1-ac70-90242506200d
which can be used as unique global reference for Rootcager
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Rootnik
Rootnik is a Trojan horse for Android devices that steals information and downloads additional apps.
Internal MISP references
UUID 05f5a051-d7a2-4757-a2f0-d685334d9374
which can be used as unique global reference for Rootnik
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
Rufraud
Rufraud is a Trojan horse for Android devices that sends SMS messages to premium-rate phone numbers.
Internal MISP references
UUID 99064315-2097-4c2e-8f92-a34ab9422441
which can be used as unique global reference for Rufraud
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Rusms
Rusms is a Trojan horse for Android devices that sends SMS messages and steals information from the compromised device.
Internal MISP references
UUID 77ba4823-2d71-4ead-aba8-71a15a2a7c99
which can be used as unique global reference for Rusms
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Samsapo
Samsapo is a worm for Android devices that spreads by sending SMS messages to all contacts stored on the compromised device. It also opens a back door and downloads files.
Internal MISP references
UUID d266a784-3ce7-40f2-b710-0d758700276b
which can be used as unique global reference for Samsapo
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Sandorat
Sandorat is a Trojan horse for Android devices that opens a back door on the compromised device. It also steals information.
Internal MISP references
UUID f0baccdc-d38f-4bb1-ab42-319b69be6322
which can be used as unique global reference for Sandorat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Sberick
Sberick is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID bd781792-dd1f-4fa9-a523-53f578b8f52c
which can be used as unique global reference for Sberick
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Scartibro
Scartibro is a Trojan horse for Android devices that locks the compromised device and asks the user to pay in order to unlock it.
Internal MISP references
UUID 0c7bac44-c062-4dd6-824d-79f3c225d3e5
which can be used as unique global reference for Scartibro
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Scipiex
Scipiex is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID e658c4ff-a749-44d1-9c7c-d8782cecbb05
which can be used as unique global reference for Scipiex
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Selfmite
Selfmite is a worm for Android devices that spreads through SMS messages.
Internal MISP references
UUID 666eb607-971e-4a90-92df-2b1903eb5c29
which can be used as unique global reference for Selfmite
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Selfmite.B
Selfmite.B is a worm for Android devices that displays ads on the compromised device. It spreads through SMS messages.
Internal MISP references
UUID 1031ff29-419d-450e-a1d3-d203db10b7df
which can be used as unique global reference for Selfmite.B
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
SellARing
SellARing is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 875a58aa-f155-48d5-86a7-b18bf711a211
which can be used as unique global reference for SellARing
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
SendDroid
SendDroid is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 69ca9eb1-f19a-4442-8bfd-ac5f9a5387c2
which can be used as unique global reference for SendDroid
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Simhosy
Simhosy is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 96624486-651c-499d-a731-83e149e16ea4
which can be used as unique global reference for Simhosy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Simplocker
Simplocker is a Trojan horse for Android devices that may encrypt files on the compromised device. It then asks the user to pay in order to decrypt these files.
Internal MISP references
UUID 194d0629-9e26-4de4-8239-85b862aadc7f
which can be used as unique global reference for Simplocker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Simplocker.B
Simplocker.B is a Trojan horse for Android devices that may encrypt files on the compromised device. It then asks the user to pay in order to decrypt these files.
Internal MISP references
UUID 6cf6fdd1-acce-4498-afe9-bc9202235cfa
which can be used as unique global reference for Simplocker.B
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Skullkey
Skullkey is a Trojan horse for Android devices that gives the attacker remote control of the compromised device to perform malicious activity.
Internal MISP references
UUID 8f5e8349-14cb-4dc2-86dc-bcfe7360d4c7
which can be used as unique global reference for Skullkey
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Smaato
Smaato is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 5e02d505-59bf-493e-b9d8-29dffcc5045a
which can be used as unique global reference for Smaato
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Smbcheck
Smbcheck is a hacktool for Android devices that can trigger a Server Message Block version 2 (SMBv2) vulnerability and may cause the target computer to crash.
Internal MISP references
UUID 60be1539-2205-4865-87ab-318dcdb1873e
which can be used as unique global reference for Smbcheck
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Smsblocker
Smsblocker is a generic detection for threats on Android devices that block the transmission of SMS messages.
Internal MISP references
UUID 13b6f47b-12bd-4c0a-88d1-b6a627169266
which can be used as unique global reference for Smsblocker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Smsbomber
Smsbomber is a program that can be used to send messages to contacts on the device.
Internal MISP references
UUID 054789dc-6ffa-4a06-ace9-6fd7095c7504
which can be used as unique global reference for Smsbomber
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Smslink
Smslink is a Trojan horse for Android devices that may send malicious SMS messages from the compromised device. It may also display advertisements.
Internal MISP references
UUID 5d41547a-fc71-4e49-8dbf-59f15a58a74c
which can be used as unique global reference for Smslink
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Smspacem
Smspacem is a Trojan horse that may send SMS messages from Android devices.
Internal MISP references
UUID 3191e73e-72a4-4a05-9d5b-2da158822820
which can be used as unique global reference for Smspacem
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
SMSReplicator
SMSReplicator is a spying utility that will secretly transmit incoming SMS messages to another phone of the installer's choice.
Internal MISP references
UUID 8e638226-b772-492c-b0a3-3a77e5b08496
which can be used as unique global reference for SMSReplicator
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Smssniffer
Smssniffer is a Trojan horse that intercepts SMS messages on Android devices.
Internal MISP references
UUID 4d79cd58-217a-454a-991c-19219612580c
which can be used as unique global reference for Smssniffer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Smsstealer
Smsstealer is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID c502316f-f3bb-47a4-9198-d73426609429
which can be used as unique global reference for Smsstealer
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Smstibook
Smstibook is a Trojan horse that attempts to send premium-rate SMS messages to predetermined numbers.
Internal MISP references
UUID 312806f6-dc58-4b2b-b86e-1338626460ea
which can be used as unique global reference for Smstibook
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Smszombie
Smszombie is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 99884c3e-cc56-4099-a52b-136ae0078d61
which can be used as unique global reference for Smszombie
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Snadapps
Snadapps is a Trojan horse that steals information from Android devices.
Internal MISP references
UUID ac43bc86-59da-42ad-82d6-d0a17cc04a40
which can be used as unique global reference for Snadapps
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Sockbot
Sockbot is a Trojan horse for Android devices that creates a SOCKS proxy on the compromised device.
Internal MISP references
UUID e8096285-d437-4664-9125-d30cb19b84cb
which can be used as unique global reference for Sockbot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Sockrat
Sockrat is a Trojan horse for Android devices that opens a back door and steals information from the compromised device.
Internal MISP references
UUID dadccdda-a4c2-4021-90b9-61a394e602be
which can be used as unique global reference for Sockrat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
Sofacy
Sofacy is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID df36267b-7267-4c23-a7a1-cf94ef1b3729
which can be used as unique global reference for Sofacy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
Sosceo
Sosceo is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID f1118dcb-13a3-4021-8dee-22201ae9324a
which can be used as unique global reference for Sosceo
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Spitmo
Spitmo is a Trojan horse that steals information from Android devices.
Internal MISP references
UUID 98a51dbd-5fe4-44f1-8171-2f7bb5691ca8
which can be used as unique global reference for Spitmo
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Spitmo.B
Spitmo.B is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 75ee2fc5-f412-42a3-b17b-be5b7c1b5172
which can be used as unique global reference for Spitmo.B
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Spyagent
Spyagent is a spyware application for Android devices that logs certain information and sends SMS messages to a predetermined phone number.
Internal MISP references
UUID b399f848-032d-4e7b-8c53-1d61ef53ef73
which can be used as unique global reference for Spyagent
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Spybubble
Spybubble is a Spyware application for Android devices that logs the device's activity and sends it to a predetermined website.
Internal MISP references
UUID ee87a204-a0d6-4e4b-ba05-85853df60857
which can be used as unique global reference for Spybubble
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Spydafon
Spydafon is a Potentially Unwanted Application for Android devices that monitors the affected device.
Internal MISP references
UUID 8e313409-bee2-4ea5-9dc5-062dde2d37a7
which can be used as unique global reference for Spydafon
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Spymple
Spymple is a spyware application for Android devices that allows the device it is installed on to be monitored.
Internal MISP references
UUID d2f7d24a-5ad2-4cae-a600-9f9e0415e32f
which can be used as unique global reference for Spymple
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Spyoo
Spyoo is a spyware program for Android devices that records and sends certain information to a remote location.
Internal MISP references
UUID d3f5be8f-e1bd-45a7-b78e-1594884ed740
which can be used as unique global reference for Spyoo
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Spytekcell
Spytekcell is a spyware program for Android devices that monitors and sends certain information to a remote location.
Internal MISP references
UUID 7e83bb34-5b0a-4a04-9c33-45ccd62adb49
which can be used as unique global reference for Spytekcell
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Spytrack
Spytrack is a spyware program for Android devices that periodically sends certain information to a remote location.
Internal MISP references
UUID 70ff60ea-2955-4ab0-ad7f-aa33e6bb0b9c
which can be used as unique global reference for Spytrack
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Spywaller
Spywaller is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID eff7bcd4-a797-4a85-8db2-583b182c98e5
which can be used as unique global reference for Spywaller
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Stealthgenie
Stealthgenie is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 3e90ee61-4377-473f-8469-7a91875b54f1
which can be used as unique global reference for Stealthgenie
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Steek
Steek is a potentially unwanted application that is placed on a download website for Android applications and disguised as popular applications.
Internal MISP references
UUID 31f0f24e-6807-4a1a-b14d-cb421b1aea12
which can be used as unique global reference for Steek
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Stels
Stels is a Trojan horse for Android devices that opens a back door and steals information from the compromised device.
Internal MISP references
UUID 435cbdcd-4cab-4a2e-8e58-9094b6226f94
which can be used as unique global reference for Stels
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Stiniter
Stiniter is a Trojan horse for Android devices that sends SMS messages to a premium-rate phone number.
Internal MISP references
UUID 418dc95a-a638-4e85-b72d-0bf6b7cbda0c
which can be used as unique global reference for Stiniter
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Sumzand
Sumzand is a Trojan horse for Android devices that steals information and sends it to a remote location.
Internal MISP references
UUID 2799ad1e-b438-4da5-a489-6035643c71a8
which can be used as unique global reference for Sumzand
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Sysecsms
Sysecsms is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 7f7611d7-0419-4d6c-8026-6d132912f297
which can be used as unique global reference for Sysecsms
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Tanci
Tanci is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 031cabf7-f43c-4de3-9cd7-2ee96a4a3696
which can be used as unique global reference for Tanci
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Tapjoy
Tapjoy is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID e57f936d-0cf2-4f83-9daf-3d167de8fdfb
which can be used as unique global reference for Tapjoy
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Tapsnake
Tapsnake is a Trojan horse for Android phones that is embedded into a game. It tracks the phone's location and posts it to a remote web service.
Internal MISP references
UUID a5ff203d-3613-4b66-bdec-ef342e9c85c2
which can be used as unique global reference for Tapsnake
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Tascudap
Tascudap is a Trojan horse for Android devices that uses the compromised device in denial of service attacks.
Internal MISP references
UUID 171cfcc4-171c-4f62-82c0-b1583937cd0d
which can be used as unique global reference for Tascudap
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Teelog
Teelog is a Trojan horse for Android devices that opens a back door and steals information from the compromised device.
Internal MISP references
UUID 9de29650-4fca-40d1-8def-1fe39bde13a3
which can be used as unique global reference for Teelog
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Temai
Temai is a Trojan horse for Android applications that opens a back door and downloads malicious files onto the compromised device.
Internal MISP references
UUID 3b8479b5-1ea2-4a0d-a80d-4ab9f91b477a
which can be used as unique global reference for Temai
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Tetus
Tetus is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID d706632e-0940-4ae0-9fc5-ed59b941828c
which can be used as unique global reference for Tetus
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Tgpush
Tgpush is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID c9e1c4d7-7082-45c3-8aae-4449d94639ef
which can be used as unique global reference for Tgpush
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Tigerbot
Tigerbot is a Trojan horse for Android devices that opens a back door on the compromised device.
Internal MISP references
UUID 7ae84b6b-79c0-4835-8ebe-f9da724cde3f
which can be used as unique global reference for Tigerbot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Tonclank
Tonclank is a Trojan horse that steals information and may open a back door on Android devices.
Internal MISP references
UUID 68c29f38-36a6-46c0-bef9-cd70de3d6497
which can be used as unique global reference for Tonclank
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Trogle
Trogle is a worm for Android devices that may steal information from the compromised device.
Internal MISP references
UUID fae64496-415e-49fa-94ed-519ef7a0fac9
which can be used as unique global reference for Trogle
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Twikabot
Twikabot is a Trojan horse for Android devices that attempts to steal information.
Internal MISP references
UUID 301a279e-ea93-4857-b994-b846712b6fac
which can be used as unique global reference for Twikabot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Uapush
Uapush is a Trojan horse for Android devices that steals information from the compromised device. It may also display advertisements and send SMS messages from the compromised device.
Internal MISP references
UUID c7c3547b-513c-4f65-b896-77bcf2bbf3a9
which can be used as unique global reference for Uapush
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Umeng
Umeng is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID bc21922b-50a2-49a2-8828-c032b75dd4d1
which can be used as unique global reference for Umeng
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Updtbot
Updtbot is a Trojan horse for Android devices that may arrive through SMS messages. It may then open a back door on the compromised device.
Internal MISP references
UUID 572c7fc4-081b-4e13-a1c2-5c1b7c7288bf
which can be used as unique global reference for Updtbot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Upush
Upush is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 6d386a6c-0cd2-47f9-891d-435e135bf005
which can be used as unique global reference for Upush
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Uracto
Uracto is a Trojan horse for Android devices that steals personal information and sends spam SMS messages to contacts found on the compromised device.
Internal MISP references
UUID d94c59b1-165b-4f8c-ba96-16209a99bbd0
which can be used as unique global reference for Uracto
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Uranico
Uranico is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 6d50487d-ac9a-4369-9520-471b2c9d2413
which can be used as unique global reference for Uranico
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Usbcleaver
Usbcleaver is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 5110098d-d07d-4e85-bde5-2b2dcd844317
which can be used as unique global reference for Usbcleaver
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Utchi
Utchi is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 45633e6c-482b-40d8-aab6-5702ebfd1a25
which can be used as unique global reference for Utchi
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Uten
Uten is a Trojan horse for Android devices that may send, block, and delete SMS messages on a compromised device. It may also download and install additional applications and attempt to gain root privileges.
Internal MISP references
UUID a677735e-fc30-47ea-a679-3eae567a0c50
which can be used as unique global reference for Uten
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Uupay
Uupay is a Trojan horse for Android devices that steals information from the compromised device. It may also download additional malware.
Internal MISP references
UUID 0766d789-3c9b-4bad-bc2e-8bdeccdef2fa
which can be used as unique global reference for Uupay
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Uxipp
Uxipp is a Trojan horse that attempts to send premium-rate SMS messages to predetermined numbers.
Internal MISP references
UUID da60c9f2-5429-46f6-9482-6f406e56ba07
which can be used as unique global reference for Uxipp
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Vdloader
Vdloader is a Trojan horse for Android devices that opens a back door on the compromised device and steals confidential information.
Internal MISP references
UUID d0dbf62f-77fe-4051-a34a-67c843248357
which can be used as unique global reference for Vdloader
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
VDopia
VDopia is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 17241b57-1b2f-4013-bc8b-f68e4e57e1a7
which can be used as unique global reference for VDopia
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Virusshield
Virusshield is a Trojan horse for Android devices that claims to scan apps and protect personal information, but has no real functionality.
Internal MISP references
UUID dd1185c0-6456-4231-b39b-b127c2be88c5
which can be used as unique global reference for Virusshield
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
VServ
VServ is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID e8d75cbf-aaed-4b9e-8599-36ee963f8439
which can be used as unique global reference for VServ
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Walkinwat
Walkinwat is a Trojan horse that steals information from the compromised device.
Internal MISP references
UUID e2696142-5981-4055-874b-727eefda8c46
which can be used as unique global reference for Walkinwat
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Waps
Waps is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID aa3cebc6-9083-42c4-8eae-e7662aa934a2
which can be used as unique global reference for Waps
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Waren
Waren is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 164fb7dd-3fab-45fd-9d0a-4c2d61841059
which can be used as unique global reference for Waren
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Windseeker
Windseeker is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID 30b09d1a-2503-4481-a939-f6227fb2ead5
which can be used as unique global reference for Windseeker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Wiyun
Wiyun is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID ced6bfb0-a4eb-460a-9594-185ddaaec5c6
which can be used as unique global reference for Wiyun
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Wooboo
Wooboo is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 0bd6959f-b764-431f-b75c-0cb4fe88f025
which can be used as unique global reference for Wooboo
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Wqmobile
Wqmobile is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID ce553391-48ef-4749-af44-ef899e710558
which can be used as unique global reference for Wqmobile
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
YahooAds
YahooAds is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 8ff80176-7fb2-41ed-8b4c-5995d4f4bc9f
which can be used as unique global reference for YahooAds
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Yatoot
Yatoot is a Trojan horse for Android devices that steals information from the compromised device.
Internal MISP references
UUID ac66cb33-91a0-4777-a78d-8077089a7231
which can be used as unique global reference for Yatoot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Yinhan
Yinhan is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 956d67a6-5e5f-48bf-b1c5-bc34536b8845
which can be used as unique global reference for Yinhan
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Youmi
Youmi is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 805ea1fb-c6e3-47d9-9eb5-2d4b73e63f42
which can be used as unique global reference for Youmi
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
YuMe
YuMe is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID e5a6a49e-92df-4e94-ac87-78d0f08c482e
which can be used as unique global reference for YuMe
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Zeahache
Zeahache is a Trojan horse that elevates privileges on the compromised device.
Internal MISP references
UUID 78f04148-de99-4249-8057-ca610d6cab4e
which can be used as unique global reference for Zeahache
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
ZertSecurity
ZertSecurity is a Trojan horse for Android devices that steals information and sends it to a remote attacker.
Internal MISP references
UUID 3f77d88c-b3a6-4cc8-bc09-40dca0f942c5
which can be used as unique global reference for ZertSecurity
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
ZestAdz
ZestAdz is an advertisement library that is bundled with certain Android applications.
Internal MISP references
UUID 94572b76-b677-40da-8e92-db29ea1f0307
which can be used as unique global reference for ZestAdz
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Zeusmitmo
Zeusmitmo is a Trojan horse for Android devices that opens a back door and steals information from the compromised device.
Internal MISP references
UUID 1bce8b50-16e8-4548-94c9-f82bdbc91053
which can be used as unique global reference for Zeusmitmo
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
SLocker
The SLocker family is one of the oldest mobile lock screen and file-encrypting ransomware and used to impersonate law enforcement agencies to convince victims to pay their ransom.
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular SLocker.
Known Synonyms |
---|
SMSLocker |
Internal MISP references
UUID e8bb68f2-d8ca-4576-b47b-8123aef6324b
which can be used as unique global reference for SLocker
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Loapi
A malware strain known as Loapi will damage phones if users don't remove it from their devices. Left to its own means, this modular threat will download a Monero cryptocurrency miner that will overheat and overwork the phone's components, which will make the battery bulge, deform the phone's cover, or even worse. Discovered by Kaspersky Labs, researchers say Loapi appears to have evolved from Podec, a malware strain spotted in 2015.
Internal MISP references
UUID 2620f8ce-a4a6-4ea2-a281-7f476ff114ed
which can be used as unique global reference for Loapi
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Podec
Late last year, we encountered an SMS Trojan called Trojan-SMS.AndroidOS.Podec which used a very powerful legitimate system to protect itself against analysis and detection. After we removed the protection, we saw a small SMS Trojan with most of its malicious payload still in development. Before long, though, we intercepted a fully-fledged version of Trojan-SMS.AndroidOS.Podec in early 2015. The updated version proved to be remarkable: it can send messages to premium-rate numbers employing tools that bypass the Advice of Charge system (which notifies users about the price of a service and requires authorization before making the payment). It can also subscribe users to premium-rate services while bypassing CAPTCHA. This is the first time Kaspersky Lab has encountered this kind of capability in any Android-Trojan.
Internal MISP references
UUID e3cd1cf3-2f49-4adc-977f-d15a2b0b4c85
which can be used as unique global reference for Podec
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Chamois
Chamois is one of the largest PHA families in Android to date and is distributed through multiple channels. While much of the backdoor version of this family was cleaned up in 2016, a new variant emerged in 2017. To avoid detection, this version employs a number of techniques, such as implementing custom code obfuscation, preventing user notifications, and not appearing in the device’s app list. Chamois apps, which in many cases come preloaded with the system image, try to trick users into clicking ads by displaying deceptive graphics to commit WAP or SMS fraud.
Internal MISP references
UUID a53e93e6-2d17-11e8-a718-0bb6e34b87d0
which can be used as unique global reference for Chamois
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
IcicleGum
IcicleGum is a spyware PHA family whose apps rely on versions of the Igexin ads SDK that offer dynamic code-loading support. IcicleGum apps use this library's code-loading features to fetch encrypted DEX files over HTTP from command-and-control servers. The files are then decrypted and loaded via class reflection to read and send phone call logs and other data to remote locations.
Internal MISP references
UUID a5be6094-2d17-11e8-a5b1-ff153ed7d9c3
which can be used as unique global reference for IcicleGum
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
BreadSMS
BreadSMS is a large SMS-fraud PHA family that we started tracking at the beginning of 2017. These apps compose and send text messages to premium numbers without the user’s consent. In some cases, BreadSMS apps also implement subscription-based SMS fraud and silently enroll users in services provided by their mobile carriers. These apps are linked to a group of command-and-control servers whose IP addresses change frequently and that are used to provide the apps with premium SMS numbers and message text.
Internal MISP references
UUID 2c75b006-2d18-11e8-8f57-2714f7737ec5
which can be used as unique global reference for BreadSMS
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
JamSkunk
JamSkunk is a toll-fraud PHA family composed of apps that subscribe users to services without their consent. These apps disable Wi-Fi to force traffic to go through users' mobile data connection and then contact command-and-control servers to dynamically fetch code that tries to bypass the network’s WAP service subscription verification steps. This type of PHA monetizes their abuse via WAP billing, a payment method that works through mobile data connections and allows users to easily sign up and pay for new services using their existing account (i.e., services are billed directly by the carrier, and not the service provider; the user does not need a new account or a different form of payment). Once authentication is bypassed, JamSkunk apps enroll the device in services that the user may not notice until they receive and read their next bill.
Internal MISP references
UUID 1b5ff93c-2d1a-11e8-8559-07216a0f4416
which can be used as unique global reference for JamSkunk
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Expensive Wall
Expensive Wall is a family of SMS-fraud apps that affected a large number of devices in 2017. Expensive Wall apps use code obfuscation to slow down analysis and evade detection, and rely on the JS2Java bridge to allow JavaScript code loaded inside a Webview to call Java methods the way Java apps directly do. Upon launch, Expensive Wall apps connect to command-and-control servers to fetch a domain name. This domain is then contacted via a Webview instance that loads a webpage and executes JavaScript code that calls Java methods to compose and send premium SMS messages or click ads without users' knowledge.
Internal MISP references
UUID 1c105534-2d1a-11e8-af59-f3a9d10da2ae
which can be used as unique global reference for Expensive Wall
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
BambaPurple
BambaPurple is a two-stage toll-fraud PHA family that tries to trick users into installing it by disguising itself as a popular app. After install, the app disables Wi-Fi to force the device to use its 3G connection, then redirects to subscription pages without the user’s knowledge, clicks subscription buttons using downloaded JavaScript, and intercepts incoming subscription SMS messages to prevent the user from unsubscribing. In a second stage, BambaPurple installs a backdoor app that requests device admin privileges and drops a .dex file. This executable checks to make sure it is not being debugged, downloads even more apps without user consent, and displays ads.
Internal MISP references
UUID 1c90db8c-2d1a-11e8-8855-8b52c54dc70c
which can be used as unique global reference for BambaPurple
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
KoreFrog
KoreFrog is a family of trojan apps that request permission to install packages and push other apps onto the device as system apps without the user’s authorization. System apps can be disabled by the user, but cannot be easily uninstalled. KoreFrog apps operate as daemons running in the background that try to impersonate Google and other system apps by using misleading names and icons to avoid detection. The KoreFrog PHA family has also been observed to serve ads, in addition to apps.
Internal MISP references
UUID 1cd12f7a-2d1a-11e8-9d61-5f382712fa0a
which can be used as unique global reference for KoreFrog
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Gaiaphish
Gaiaphish is a large family of trojan apps that target authentication tokens stored on the device to abuse the user’s privileges for various purposes. These apps use base64-encoded URL strings to avoid detection of the command-and-control servers they rely on to download APK files. These files contain phishing apps that try to steal GAIA authentication tokens that grant the user permissions to access Google services, such as Google Play, Google+, and YouTube. With these tokens, Gaiaphish apps are able to generate spam and automatically post content (for instance, fake app ratings and comments on Google Play app pages)
Internal MISP references
UUID 1dcd622c-2d1a-11e8-870e-9f50a5dd5a84
which can be used as unique global reference for Gaiaphish
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
RedDrop
RedDrop can perform a vast array of malicious actions, including recording nearby audio and uploading the data to cloud-storage accounts on Dropbox and Google Drive.
Internal MISP references
UUID 3178ca72-2ded-11e8-846e-eb40889b4f9f
which can be used as unique global reference for RedDrop
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
HenBox
HenBox apps masquerade as others such as VPN apps, and Android system apps; some apps carry legitimate versions of other apps which they drop and install as a decoy technique. While some of legitimate apps HenBox uses as decoys can be found on Google Play, HenBox apps themselves are found only on third-party (non-Google Play) app stores. HenBox apps appear to primarily target the Uyghurs – a Turkic ethnic group living mainly in the Xinjiang Uyghur Autonomous Region in North West China. HenBox has ties to infrastructure used in targeted attacks, with a focus on politics in South East Asia. These attackers have used additional malware families in previous activity dating to at least 2015 that include PlugX, Zupdax, 9002, and Poison Ivy. HexBox apps target devices made by Chinese consumer electronics manufacture, Xiaomi and those running MIUI, Xiaomi’s operating system based on Google Android. Furthermore, the malicious apps register their intent to process certain events broadcast on compromised devices in order to execute malicious code. This is common practice for many Android apps, however, HenBox sets itself up to trigger based on alerts from Xiaomi smart-home IoT devices, and once activated, proceeds in stealing information from a myriad of sources, including many mainstream chat, communication and social media apps. The stolen information includes personal and device information.
Internal MISP references
UUID 72c37e24-4ead-11e8-8f08-db3ec8f8db86
which can be used as unique global reference for HenBox
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
MysteryBot
Cybercriminals are currently developing a new strain of malware targeting Android devices which blends the features of a banking trojan, keylogger, and mobile ransomware.
Internal MISP references
UUID 53e2e7e8-70a8-11e8-b0f8-33fcf651adaf
which can be used as unique global reference for MysteryBot
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
Skygofree
At the beginning of October 2017, we discovered new Android spyware with several features previously unseen in the wild. In the course of further research, we found a number of related samples that point to a long-term development process. We believe the initial versions of this malware were created at least three years ago – at the end of 2014. Since then, the implant’s functionality has been improving and remarkable new features implemented, such as the ability to record audio surroundings via the microphone when an infected device is in a specified location; the stealing of WhatsApp messages via Accessibility Services; and the ability to connect an infected device to Wi-Fi networks controlled by cybercriminals. We observed many web landing pages that mimic the sites of mobile operators and which are used to spread the Android implants. These domains have been registered by the attackers since 2015. According to our telemetry, that was the year the distribution campaign was at its most active. The activities continue: the most recently observed domain was registered on October 31, 2017. Based on our KSN statistics, there are several infected individuals, exclusively in Italy. Moreover, as we dived deeper into the investigation, we discovered several spyware tools for Windows that form an implant for exfiltrating sensitive data on a targeted machine. The version we found was built at the beginning of 2017, and at the moment we are not sure whether this implant has been used in the wild. We named the malware Skygofree, because we found the word in one of the domains.
Internal MISP references
UUID 3e19d162-9ee1-11e8-b8d7-d32141691f1f
which can be used as unique global reference for Skygofree
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.
BusyGasper
A new family of spyware for Android grabbed the attention of security researchers through its unusual set of features and their original implementation. Tagged BusyGasper by security experts at Kaspersky, the malware stands out through its ability to monitor the various sensors present on the targeted phone. Based on the motion detection logs, it can recognize the opportune time for running and stopping its activity.
Internal MISP references
UUID 1c8e8070-bfe2-11e8-8c3e-7f31c66687a2
which can be used as unique global reference for BusyGasper
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Triout
Bitdefender says Triout samples they discovered were masquerading in a clone of a legitimate application, but they were unable to discover where this malicious app was being distributed from. The obvious guess would be via third-party Android app stores, or app-sharing forums, popular in some areas of the globe.
Internal MISP references
UUID 08965226-c8a9-11e8-ad82-b3fe44882268
which can be used as unique global reference for Triout
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
AndroidOS_HidenAd
active adware family (detected by Trend Micro as AndroidOS_HidenAd) disguised as 85 game, TV, and remote control simulator apps on the Google Play store
Synonyms
"synonyms" in the meta part typically refer to alternate names or labels that are associated with a particular AndroidOS_HidenAd.
Known Synonyms |
---|
AndroidOS_HiddenAd |
Internal MISP references
UUID 64ee0ae8-2e78-43bf-b81b-e7e5c2e30cd0
which can be used as unique global reference for AndroidOS_HidenAd
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Razdel
The Banking Trojan found in Google Play is identified as Razdel, a variant of BankBot mobile banking Trojan. This newly observed variant has taken mobile threats to the next level incorporating: Remote access Trojan functions, SMS interception, UI (User Interface) Overlay with masqueraded pages etc.
Internal MISP references
UUID aef548fb-76f5-4eb9-9942-f189cb0d16f6
which can be used as unique global reference for Razdel
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Vulture
Vulture is an Android banking trojan found in Google Play by ThreatFabric. It uses screen recording and keylogging as main strategy to harvest login credentials.
Internal MISP references
UUID 66026639-132f-436e-8348-1219714e9f62
which can be used as unique global reference for Vulture
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Anubis
Starting in June 2018, a number of new malware downloader samples that infect users with BankBot Anubis (aka Go_P00t) was discovered. The campaign features at least 10 malicious downloaders disguised as various applications, all of which fetch mobile banking Trojans that run on Android-based devices. Anubis Masquerades as Google Protect.
Internal MISP references
UUID d21ab582-2286-4827-9710-0eb283244ff1
which can be used as unique global reference for Anubis
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
GodFather
The Android banking Trojan Godfather is currently being utilized by cybercriminals to attack users of popular financial services across the globe. Godfather is designed to allow threat actors to harvest login credentials for banking applications and other financial services, and drain the accounts. To date, its victims include users of over 400 international targets, including banking applications, cryptocurrency wallets, and crypto exchanges. Few people realize that hiding under Godfather’s hood is an old banking Trojan called Anubis, whose functionality has become outdated due to Android updates and the efforts of malware detection and prevention providers. Group-IB first detected Godfather, a mobile banking Trojan that steals the banking and cryptocurrency exchange credentials of users, in June 2021. Almost a year later, in March 2022, researchers at Threat Fabric were the first to mention the banking Trojan publicly. A few months later, in June, the Trojan stopped being circulated. One of the reasons, Group-IB analysts believe, why Godfather was taken out of use was for developers to update the Trojan further. Sure enough, Godfather reappeared in September 2022, now with slightly modified WebSocket functionality.
Internal MISP references
UUID dddfa582-3df3-4832-bffe-c38e70b710ac
which can be used as unique global reference for GodFather
in MISP communities and other software using the MISP galaxy
External references
Associated metadata
Metadata key | Value |
---|---|
Related clusters
To see the related clusters, click here.