The most sophisticated Android trojan
Revision as of 18:58, 7 February 2015 by Eric.freyssinet (talk | contribs) (Text replacement - " www.securelist.com" to "")
(Publication) Google search: [1]
The most sophisticated Android trojan | |
---|---|
Botnet | Obad |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2013 / 2013-06-06 |
Editor/Conference | Kaspersky lab |
Link | http://www.securelist.com/en/blog/8106/The most sophisticated Android Trojan (Archive copy) |
Author | Roman Unuchek |
Type | Blogpost |
Abstract
“ Recently, an Android application came to us for analysis. At a glance, we knew this one was special. All strings in the DEX file were encrypted, and the code was obfuscated.
The file turned out to be a multi-functional Trojan, capable of the following: sending SMS to premium-rate numbers; downloading other malware programs, installing them on the infected device and/or sending them further via Bluetooth; and remotely performing commands in the console. Now, Kaspersky Lab’s products detect this malicious program as Backdoor.AndroidOS.Obad.a.
Bibtex
@misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1338, editor = {Kaspersky lab}, author = {Roman Unuchek}, title = {The most sophisticated Android trojan}, date = {06}, month = Jun, year = {2013}, howpublished = {\url{http://www.securelist.com/en/blog/8106/The_most_sophisticated_Android_Trojan}}, }