The most sophisticated Android trojan

From Botnets.fr
Revision as of 16:16, 31 August 2014 by Eric.freyssinet (talk | contribs) (Remplacement de texte — « Kaspersky lab lab » par « Kaspersky lab »)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Publication) Google search: [1]

The most sophisticated Android trojan
Botnet Obad
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2013 / 2013-06-06
Editor/Conference Kaspersky lab
Link http://www.securelist.com/en/blog/8106/The most sophisticated Android Trojan www.securelist.com (www.securelist.com Archive copy)
Author Roman Unuchek
Type Blogpost

Abstract

Recently, an Android application came to us for analysis. At a glance, we knew this one was special. All strings in the DEX file were encrypted, and the code was obfuscated.

The file turned out to be a multi-functional Trojan, capable of the following: sending SMS to premium-rate numbers; downloading other malware programs, installing them on the infected device and/or sending them further via Bluetooth; and remotely performing commands in the console. Now, Kaspersky Lab’s products detect this malicious program as Backdoor.AndroidOS.Obad.a.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2013BFR1338,
   editor = {Kaspersky lab},
   author = {Roman Unuchek},
   title = {The most sophisticated Android trojan},
   date = {06},
   month = Jun,
   year = {2013},
   howpublished = {\url{http://www.securelist.com/en/blog/8106/The_most_sophisticated_Android_Trojan www.securelist.com}},
 }