The most sophisticated Android trojan
Jump to navigation
Jump to search
(Publication) Google search: [1]
The most sophisticated Android trojan | |
---|---|
Botnet | Obad |
Malware | |
Botnet/malware group | |
Exploit kits | |
Services | |
Feature | |
Distribution vector | |
Target | |
Origin | |
Campaign | |
Operation/Working group | |
Vulnerability | |
CCProtocol | |
Date | 2013 / 2013-06-06 |
Editor/Conference | Kaspersky lab |
Link | http://www.securelist.com/en/blog/8106/The most sophisticated Android Trojan (Archive copy) |
Author | Roman Unuchek |
Type | Blogpost |
Abstract
“ Recently, an Android application came to us for analysis. At a glance, we knew this one was special. All strings in the DEX file were encrypted, and the code was obfuscated.
The file turned out to be a multi-functional Trojan, capable of the following: sending SMS to premium-rate numbers; downloading other malware programs, installing them on the infected device and/or sending them further via Bluetooth; and remotely performing commands in the console. Now, Kaspersky Lab’s products detect this malicious program as Backdoor.AndroidOS.Obad.a.
Bibtex
@misc{Unuchek2013BFR1338,
editor = {Kaspersky lab},
author = {Roman Unuchek},
title = {The most sophisticated Android trojan},
date = {06},
month = Jun,
year = {2013},
howpublished = {\url{http://www.securelist.com/en/blog/8106/The_most_sophisticated_Android_Trojan}},
}