Difference between revisions of "The most sophisticated Android trojan"
Jump to navigation
Jump to search
m (1 revision imported) |
m (Text replacement - " www.securelist.com" to "") |
||
Line 1: | Line 1: | ||
{{Publication | {{Publication | ||
|Type=Blogpost | |Type=Blogpost | ||
|Link=http://www.securelist.com/en/blog/8106/The_most_sophisticated_Android_Trojan | |Link=http://www.securelist.com/en/blog/8106/The_most_sophisticated_Android_Trojan | ||
|Author=Roman Unuchek | |Author=Roman Unuchek | ||
|NomRevue=Securelist | |NomRevue=Securelist |
Latest revision as of 18:58, 7 February 2015
(Publication) Google search: [1]
The most sophisticated Android trojan | |
---|---|
Botnet | Obad |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2013 / 2013-06-06 |
Editor/Conference | Kaspersky lab |
Link | http://www.securelist.com/en/blog/8106/The most sophisticated Android Trojan (Archive copy) |
Author | Roman Unuchek |
Type | Blogpost |
Abstract
“ Recently, an Android application came to us for analysis. At a glance, we knew this one was special. All strings in the DEX file were encrypted, and the code was obfuscated.
The file turned out to be a multi-functional Trojan, capable of the following: sending SMS to premium-rate numbers; downloading other malware programs, installing them on the infected device and/or sending them further via Bluetooth; and remotely performing commands in the console. Now, Kaspersky Lab’s products detect this malicious program as Backdoor.AndroidOS.Obad.a.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1338, editor = {Kaspersky lab}, author = {Roman Unuchek}, title = {The most sophisticated Android trojan}, date = {06}, month = Jun, year = {2013}, howpublished = {\url{http://www.securelist.com/en/blog/8106/The_most_sophisticated_Android_Trojan}}, }