Skip to content

Files

Latest commit

Sep 19, 2022
e08f09e · Sep 19, 2022

History

History
98 lines (98 loc) · 136 KB

android-os-malware-samples.csv

File metadata and controls

98 lines (98 loc) · 136 KB
1
idaliasdescriptionapp_programming_languagesnumber_of_langsyearin_the_wildmalware_typemalware_tagsmalware_familycapabilitiespermissionspackage_namefolder_hashvirustotal_detectionsvirustotal_vendorsvirustotal_scoretotal_filesprogramm_filestotal_functionsavg_functions_per_filetotal_blankstotal_commentscomment_ratioSLOCSeffortestimated_development_timeteam_sizeavg_cyclomatic_complexity_per_functionmantainability_indexmantainability_index_rangedurl
2
Backdoor:AndroidOS/Bootloader-backdoorBootloader backdoor, Magisk backdoorInstalls a persistent backdoor binary on android devices with unlocked bootloader via TWRP that runs as system daemon with root permissions and without SELinux restrictions. Based on Magisk source code to inject the magiskinit binary into the boot partition.Kotlin, Java512021?BackdoorBackdoor, Elevated-Privilege-Abuse, RootingMagiskRooting, Privilege Escalation, Root Check, Reverse Shell, SELinux Policies Injection, Persistance, Access Network State, Foreground Service, Internet, Request Install Packages, Use Biometric, Use Fingerprint, Vibrate, Write External Storage, Rebootandroid.permission.ACCESS_NETWORK_STATE, android.permission.FOREGROUND_SERVICE, android.permission.INTERNET, android.permission.REQUEST_INSTALL_PACKAGES, android.permission.USE_BIOMETRIC, android.permission.USE_FINGERPRINT, android.permission.VIBRATE, android.permission.WRITE_EXTERNAL_STORAGEcom.topjohnwu.magiskeee15cf498c6e5969025b23104838ed643ccd4eab9bc4820520de94e5c3d27e00500.0003,700???253,961276,76826.6751,037,5613,523.9255.6963.27???https://github.com/LuigiVampa92/unlocked-bootloader-backdoor-demo
3
Downloader:AndroidOS/KevDownloaderKevDownloaderThis app downloads and installs a malicious Android app.Java72018?DownloaderDownloader, Loader, BackdoorKevDroidDownload Files, Install Apps, Create Files, Delete Files, Internet, Write External Storageandroid.permission.INTERNET, android.permission.WRITE_EXTERNAL_STORAGEcom.fs0c131y.kevdownloader2a9a448aaaf7ba1aebff7881fb8279b6dcbb2f5e86b2a21807e74095af962bd90510.000195214.20897512.1956151.442.870.501.7690.43452.885https://github.com/jay-tang111/KevDownloader
4
Dropper:AndroidOS/AndroidTrojanStarterAndroidTrojanStarterStarts another application's service and installs busybox and simple suid shell to /system/bin.Java62016?DropperDropper, Loader, Rooting, Elevated-Privilege-Abuse, Billing-Fraud?Start Another Apps Service, Persistance, Mount Filesystems, Uninstall Itself, Install Apps, Rooting, Root Check, Access Network State, Call Phone, Send SMSandroid.permission.ACCESS_NETWORK_STATE, android.permission.CALL_PHONE, android.permission.SEND_SMScom.example.starterf9a3c590bf42d54ba6b6c3ef6c171e8cc2aeab1e6a6f6c8e0dcfe6de287e53164626.45210188.0055130.8491,5323.764.130.912.380.6570.384https://github.com/androidtrojan1/android-trojan-starter-
5
Dropper:AndroidOS/Msf-PayloadMsf-PayloadConnects using SSL to a server and checks if trusted using X509Certificate. It then downloads a metasploit payload and runs it.Java32021?DropperDropper, Downloader, Billing-Fraud?Run at Startup, Run in Background, Execute Payload, Periodical Connection With Server, Persistance, Create Files, Write Files, Delete Files, Data Encoding, SSL Connection, X509Certificate, Variable Names Obfuscation, Function Names Obfuscation, Camera, Microphone, Access Coarse Location, Access Fine Location, Access Network State, Access Wifi State, Change Wifi State, Call Phone, Internet, Read Call Log, Write Call Log, Read Contacts, Write Contacts, Read Phone State, Read SMS, Receive SMS, Send SMS, Receive Boot Completed, Record Audio, Set Wallpaper, Wake Lock, Write External Storage, Write Settingsandroid.hardware.camera, android.hardware.camera.autofocus, android.hardware.microphone, android.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.ACCESS_WIFI_STATE, android.permission.CALL_PHONE, android.permission.CAMERA, android.permission.CHANGE_WIFI_STATE, android.permission.INTERNET, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.RECORD_AUDIO, android.permission.SEND_SMS, android.permission.SET_WALLPAPER, android.permission.WAKE_LOCK, android.permission.WRITE_CALL_LOG, android.permission.WRITE_CONTACTS, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.WRITE_SETTINGScom.metasploit.stageb9c73f0f316a6d5ccd2465dcbe51492b5a056221442d07d611f83eb0295e671b0620.0001310313.104710.1955141.192.670.452.61106.48362.271https://github.com/Black-Hell-Team/sppen/tree/main/Mobile/Msf-Payload
6
Keylogger:AndroidOS/Android-KeyloggerAndroid-KeyloggerAn app that collets all the typed data of the victim and sends it through an open socket.Java52021YesKeyloggerKeylogger, Spyware?Remote Data Exfiltration, Keystrokes Monitoring, Input Capture, Access Network State, Bind Accessibility Service, Internetandroid.permission.ACCESS_NETWORK_STATE, android.permission.BIND_ACCESSIBILITY_SERVICE, android.permission.INTERNETcom.mycompany.try2, com.keylogger0f9026e8fb7718323839e25e09b67e06ab59a11331d0723e8e93e1e84eb6d132125920.339184133.251078018.3914351.002.500.402.3178.83246.101https://github.com/shivamsuyal/Android-Keylogger
7
Keylogger:AndroidOS/AndroidKeyLoggerAndroidKeyLoggerLogs everything typed on the device and stores it locally.Java92022?KeyloggerKeylogger?Local Data Exfiltration, Logging, Keystrokes Monitoring, Input Capture, Bind Accessibility Serviceandroid.permission.BIND_ACCESSIBILITY_SERVICEcom.gpow.androidkeyloggerefc6064be537be88dc2c84572190c8e4157efd1a15e3dc03ddb32a0433c941e10600.000247547.7117820721.3409702.323.440.671.4398.15557.401https://github.com/gokulrajanpillai/AndroidKeyLogger
8
Keylogger:AndroidOS/Apps_KeyloggerApps_Keylogger, Shotdroid, DroidKeyloggerLogs everything typed on the device and stores it locally.Java82021?KeyloggerKeylogger, SpywareLokiBoardLocal Data Exfiltration, Multiple Languages, Keystrokes Monitoring, Input Capture, Bind Input Method, Vibrateandroid.permission.BIND_INPUT_METHOD, android.permission.VIBRATEcom.DroidKeylogger.mainad44169f824bdea6ae6ffb0ee5c250f32ac3e999e420e37c64052da5a3c66e020600.0006861031,28312.463,07319,36755.44734,929100.1314.396.962.1772.05642.138https://github.com/kp300/shotdroid/tree/master/Apps_Keylogger
9
Keylogger:AndroidOS/hackit-keyloggerhackit-keylogger, Hackers KeyloggerLogs everything typed on the device and stores it locally.Java32021?KeyloggerKeylogger?Local Data Exfiltration, Keystrokes Monitoring, Input Capture, Bind Input Method, Get Tasks Informationandroid.permission.BIND_INPUT_METHOD, android.permission.GET_TASKShack.hackit.pankaj.keyboardlistend93ac708a90fc5d00d4472b91341000804ce6145d6f044581939ac79dc3c76950600.0001062324210.52257180.4364,13210.656.141.731.8388.90551.991https://github.com/Black-Hell-Team/sppen/tree/main/Mobile/hackit-keylogger
10
Keylogger:AndroidOS/HakistanKeyLoggerHakistanKeyLoggerA Full featured Android keylogger that stores Touches, Notifications, accounts, and device information and reports its handler via Gmail.Java92020YesKeyloggerBotnet, Keylogger, Spyware, Mailfinder?Remote Data Exfiltration, Run at Startup, Run in Background, Send Email, Connectivity Check, Root Check, Device Information, List Installed Apps, Keystrokes Monitoring, Input Capture, Make Toasts, Bind Notification Listener Service, Access Network State, Get Accounts, Internet, Read Contacts, Receive Boot Completed, Write External Storageandroid.permission.ACCESS_NETWORK_STATE, android.permission.BIND_ACCESSIBILITY_SERVICE, android.permission.BIND_NOTIFICATION_LISTENER_SERVICE, android.permission.GET_ACCOUNTS, android.permission.INTERNET, android.permission.READ_CONTACTS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.WRITE_EXTERNAL_STORAGEcom.hak15tan.hakistankeylogger9d0a3ba6cc16bc609ec274e858e93c0cfcba193f6c3bc57d0590d8a27b2c03a8216134.4263713886.7760127914.0061,9924.954.591.081.8970.51041.234https://github.com/hakistan/HakistanKeylogger
11
Keylogger:AndroidOS/KeylogappAndroid Keylogger, keylogappBasic keylogger that logs keystrokes and sends them to a remote server.Java122021?KeyloggerBotnet, Keylogger, Spyware?Remote Data Exfiltration, Logging, Keystrokes Monitoring, Input Capture, Bind Accessibility Service, Internetandroid.permission.BIND_ACCESSIBILITY_SERVICE, android.permission.INTERNETcom.maemresen.infsec.keylogapp7c84d229f567792aa0a49beb247a151c0614c233f1a162f807f30f34d16f2c0b0600.0004216955.9432625418.6631,3613.323.940.841.4191.97253.785https://github.com/maemresen/android-keylogger
12
Keylogger:AndroidOS/LokiboardLokiboardLogs everything typed on the device and stores it locally.Java102020?KeyloggerKeylogger, SpywareLokiBoardLocal Data Exfiltration, Keystrokes Monitoring, Input Capture, Multiple Languages, Bind Input Method, Vibrateandroid.permission.BIND_INPUT_METHOD, android.permission.VIBRATEcom.abifog.lokiboardc6ff617b813196edf51f90ab575afc69a44f33b7d97775e969271c9078314ae13614.9186561031,28312.463,08819,38956.13334,54198.9614.336.912.1771.45841.788https://github.com/IceWreck/LokiBoard-Android-Keylogger
13
Keylogger:AndroidOS/Lokiboard-modLokiboard-mod, LokiboardModded Keylogger with remote reporting via Gmail.Java102020?KeyloggerBotnet, Keylogger, Spyware, MailfinderLokiBoardRemote Data Exfiltration, Run at Startup, Send Email, Logging, Keystrokes Monitoring, Input Capture, Device Information, Multiple Languages, Access Network State, Bind Input Method, Foreground Service, Get Accounts, Internet, Receive Boot Completed, Vibrate, Wake Lockandroid.permission.ACCESS_NETWORK_STATE, android.permission.BIND_INPUT_METHOD, android.permission.FOREGROUND_SERVICE, android.permission.GET_ACCOUNTS, android.permission.INTERNET, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.VIBRATE, android.permission.WAKE_LOCKcom.abifog.lokiboardb52da0349acf7a15716349cda43296a82c3a2877d0df2d714fa5ac0ec4b372400610.0006531091,35012.393,72019,78755.88035,410101.5814.477.022.1669.61940.713https://github.com/hakistan/Lokiboard-Mod
14
Locker:AndroidOS/andr0id_l0cker.MXandroid_locker, andr0id_l0cker, testlockLocks the device and asks for a key to unlock the device. The key is sent to a C2 server, which is compared to the following user inputted tries.Java82021YesLockerLocker, C2, Elevated-Privilege-Abuseandr0id_l0ckerLock Device, Check Screen Locked, Activate Admin, Privilege Escalation, Persist on Screen, Uninstall Itself, Create Files, Write Files, Connectivity Check, Run at Startup, Device Information, Media Player, Access Network State, Bind Device Admin, Disable Keyguard, Get Tasks, Internet, Kill Background Process, Read Phone State, Receive Boot Completed, System Alert Window, Wake Lock, Write External Storageandroid.permission.ACCESS_NETWORK_STATE, android.permission.BIND_DEVICE_ADMIN, android.permission.DISABLE_KEYGUARD, android.permission.GET_TASKS, android.permission.INTERNET, android.permission.KILL_BACKGROUND_PROCESSES, android.permission.READ_PHONE_STATE, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.SYSTEM_ALERT_WINDOW, android.permission.WAKE_LOCK, android.permission.WRITE_EXTERNAL_STORAGEcom.example.testlock8ff18d55ba3b254a83ad118a68db9000c70bdcb21ff0b12c9088fd9af221f244336154.0984746215.5057153521.1462,5306.365.051.261.6686.52450.599https://github.com/ytisf/theZoo/tree/master/malware/Source/Original/andr0id_l0cker
15
Locker:AndroidOS/andr0id_l0cker.USandroid_locker, andr0id_l0cker, testlockLocks the device and asks for a key to unlock the device. The key is sent to a C2 server, which is compared to the following user inputted tries.Java82021YesLockerLocker, C2, Elevated-Privilege-Abuseandr0id_l0ckerLock Device, Check Screen Locked, Activate Admin, Privilege Escalation, Persist on Screen, Uninstall Itself, Create Files, Write Files, Connectivity Check, Run at Startup, Device Information, Media Player, Access Network State, Bind Device Admin, Disable Keyguard, Get Tasks, Internet, Kill Background Process, Read Phone State, Receive Boot Completed, System Alert Window, Wake Lock, Write External Storageandroid.permission.ACCESS_NETWORK_STATE, android.permission.BIND_DEVICE_ADMIN, android.permission.DISABLE_KEYGUARD, android.permission.GET_TASKS, android.permission.INTERNET, android.permission.KILL_BACKGROUND_PROCESSES, android.permission.READ_PHONE_STATE, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.SYSTEM_ALERT_WINDOW, android.permission.WAKE_LOCK, android.permission.WRITE_EXTERNAL_STORAGEcom.example.testlock8201ed6d0199829a468bb344849f246cec33d85e17267625528e116c297b497a326152.4594846215.5065253514.9073,5899.185.811.581.6585.22049.836https://github.com/ytisf/theZoo/tree/master/malware/Source/Original/andr0id_l0cker
16
Locker:AndroidOS/EvilScreenEvilScreenAn app which attempts to prevent the victim from using the device.Kotlin92021?LockerLocker?Lock Device, Check Screen Locked, Persist on Screen, Overlay, Draw Over Other Apps, Schedule Tasks, Icon Hiding, Stealth, System Alert Windowandroid.permission.SYSTEM_ALERT_WINDOWcom.evilthreads786bfe38a5a43bd1fddd01345a39a3b2eb444cbb39c3b29eb442b61b353383b80610.00035???18351551.1421,0072.423.500.69???https://github.com/evilthreads669966/EvilScreen
17
Locker:AndroidOS/Lockscreenandroid_locker, lockscreenLocks the device during a specified time. It can be unlocked with a password.Java102018?LockerLocker, Overlay, Elevated-Privilege-Abuse?Lock Device, Check Admin, Activate Admin, Privilege Escalation, Schedule Tasks, Overlay, Draw Over Other Apps, Persist on Screen, Create Files, Alarm, Make Toasts, Run at Startup, Access Network State, Bind Device Admin, Disable Keyguard, Get Tasks, Internet, Read Phone State, Receive Boot Completed, System Alert Window, System Overlay Window, Wake Lock, Write External Storageandroid.permission.ACCESS_NETWORK_STATE, android.permission.BIND_DEVICE_ADMIN, android.permission.DISABLE_KEYGUARD, android.permission.GET_TASKS, android.permission.INTERNET, android.permission.PHONE_STATE_STATE, android.permission.READ_PHONE_STATE, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.SYSTEM_ALERT_WINDOW, android.permission.SYSTEM_OVERLAY_WINDOW, android.permission.WAKE_LOCK, android.permission.WRITE_EXTERNAL_STORAGEcom.dev.joks.lockscreen3367195a01b9011c5fa4c45ba83502b42e9c1f32908dad39278f452d70b3b1f90610.0008513856.543101382.4195,70614.946.992.141.7983.06748.577https://github.com/ProvisionLab/Android_Locker
18
Password-Stealing-Ware:AndroidOS/Password_SnifferPassword_SnifferAndroid hacking widget which runs in the background to demonstrate credential sniffing on a primitive android login app. Java82017?Password-Stealing-WareSpyware, Password-Stealing-Ware?Local Data Exfiltration, Credential Theft, Run in Background-com.example.hackapp09700e16935f0696ca0f688821a26fb19fefb4a1904013d0b85c7c7ecba692000590.000419232.5611112017.3666911.633.010.541.52113.45566.348https://github.com/shivenchawla/Password_Sniffer
19
Phishing:AndroidOS/AndroidMalwareDemoAndroidMalwareDemoAndroid phishing app which injects a fake login view into a target application when opened and steals user credentials.Java92020?PhishingPhishing, Trojan, Password-Stealing-Ware?Local Data Exfiltration, Credential Theft, Draw Over other Apps, Run at Startup, Run in Background, Get Tasks, Package Usage Stats, Receive Boot Completed, System Alert Windowandroid.permission.GET_TASKS, android.permission.PACKAGE_USAGE_STATS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.SYSTEM_ALERT_WINDOWapp.mordred.androidmalwaredemo63b347fe9168056847ee37f633609d4c390d372e33b406351efc9a6882252b8a0600.000297466.57150807.3331,0912.633.610.731.7285.82350.189https://github.com/sirmordred/AndroidMalwareDemo
20
Phishing:AndroidOS/InstaBrowserInstaBrowserAndroid phishing app emulating a legitimate app that sends user credentials via mail.Java102021?PhishingPhishing, Trojan, Spyware, Password-Stealing-Ware?Remote Data Exfiiltration, Credential Theft, Send Email, Device Information, Internetandroid.permission.INTERNETcom.ariashirazi.instabrowseraee7db7ff9a9a15bd7c72b86180ba47202a58ab7af8d59d77457101bc39745a90600.000314194.75202708.2068532.033.270.621.7999.89458.418https://github.com/ariashirazi/InstaBrowser
21
Phishing:AndroidOS/PhishingAppPhishing mobile appPhishing app that sends user email, password and device information.Java162021?PhishingPhishing, Spyware, Password-Stealing-Ware?Remote Data Exfiiltration, Credential Theft, Device Information, Internet, Access Network State, Access Wifi State, System Alert Windowandroid.permission.ACCESS_NETWORK_STATE, android.permission.ACCESS_WIFI_STATE, android.permission.INTERNET, android.permission.SYSTEM_ALERT_WINDOWcom.phishingappf2fb0b869019c3148a900dea17fcf686bd1768273171f8803a72d0aebcf23b440610.000658344.252152901.66017,47548.3910.924.431.6857.82933.818https://github.com/ivan-sincek/phishing-mobile-app
22
Ransomware:AndroidOS/AndroMalwareAndroMalware RansomwareRansomware able to encrypt and decrypt files using AES and exfiltrate Device Information, SMS and location via SMS.Java22014YesRansomwareEncryption-Ransomware, Trojan, Billing-Fraud, Spyware?Sandbox Aware, File Encryption, File Decryption, Remote Data Exfiltration, Device Information, Access Coarse Location, Access Fine Location, Broadcast SMS, Internet, Read External Storage, Write External Storage, Read Phone State, Read SMS, Receive SMS, Send SMSandroid.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.BROADCAST_SMS, android.permission.INTERNET, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_SMS, android.permission.SEND_SMS, android.permission.WRITE_EXTERNAL_STORAGEandroid.malware.ransonwared2089b6f255c73c8131e647e36b4dc1d25d3ce56ceb2d94fef917473f1322f98176127.8692114402.86131244.0895871.372.820.491.58102.79560.114https://github.com/CCrashBandicot/AndroMalware
23
Ransomware:AndroidOS/Covid19_RansomwareCovid19_RansomwareFake Coronavirus Tracking app that locks the device with a Ransomware note.Java42021YesRansomwareScreen-Locking-Ransomware, Locker, Trojan, Elevated-Privilege-AbuseCoronaLockerLock Device, Activate Admin, Privilege Escalation, Persist on Screen, Run at Startup, Run in Background, Icon Hiding, Stealth, Variable Names Obfuscation, Function Names Obfuscation, Enforce Password Policy, Creates New Admin, Bind Accessibility Service, Bind Device Admin, Foreground Service, Receive Boot Completed, Request Ignore Battery Optimizationandroid.permission.BIND_ACCESSIBILITY_SERVICE, android.permission.BIND_DEVICE_ADMIN, android.permission.FOREGROUND_SERVICE, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONScom.device.security553c9f12a4e4df2f35d198b6f1c055bf4afec9d9b15c02fe6eac7cfe462b0a3d0590.00040302117.03291411.0863,7779.695.931.631.6492.75354.242https://github.com/Black-Hell-Team/sppen/tree/main/Mobile/Covid19_Ransomware
24
Ransomware:AndroidOS/Covid-LockerCovid-Locker, CoronaLocker, AppLocker, CovidLock, Coronavirus Tracker, CoronavirusappFake Coronavirus Tracking app that locks the device with a Ransomware note.Java32021YesRansomwareScreen-Locking-Ransomware, Locker, Trojan, Elevated-Privilege-AbuseCoronaLockerLock Device, Activate Admin, Privilege Escalation, Persist on Screen, Run at Startup, Run in Background, Icon Hiding, Stealth, Variable Names Obfuscation, Function Names Obfuscation, Enforce Password Policy, Creates New Admin, Bind Accessibility Service, Bind Device Admin, Foreground Service, Receive Boot Completed, Request Ignore Battery Optimizationandroid.permission.BIND_ACCESSIBILITY_SERVICE, android.permission.BIND_DEVICE_ADMIN, android.permission.FOREGROUND_SERVICE, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONScom.device.securitya393a4af91168d9f20950930462286538203e518ef731682a9b3cdb1236dd503166126.2309926375,8469.189,2414,0876.32064,668191.1818.4010.391.87106.61162.346https://github.com/Black-Hell-Team/sppen/tree/main/Mobile/Covid-Locker
25
Ransomware:AndroidOS/SARASARA, S4R4Framework for building custom Ransomware apps.Python32022YesRansomwareScreen-Locking-Ransomware, Locker, Trojan?Lock Device, Persist on Screen, Run at Startup, System Alert Window, Receive Boot Completed, Read External Storage, Write External Storage, Read Contacts, Read SMS, Access Fine Location, Wake Lock, Internet, Request Install Package, Cameraandroid.permission.SYSTEM_ALERT_WINDOW, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.SET_WALLPAPER, android.permission.READ_EXTERNAL_STORAGE, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.READ_CONTACTS, android.permission.READ_SMS, android.permission.ACCESS_FINE_LOCATION, android.permission.WAKE_LOCK, android.permission.INTERNET, android.permission.REQUEST_INSTALL_PACKAGE, android.permission.CAMERAcom.termuxhackers.id1a28f2f10fc856b42581c95caf35ac2e33383e4e8c3d9a7b8b771443dace3027236137.7053144.001541.9512050.451.850.256.00??https://github.com/termuxhackers-id/SARA
26
RAT:AndroidOS/AdobotAdobotSpyware app that connects to a C2 and receives commands to monitor and retrieve information from the device, such as SMS, location, contacts...Java92019YesRATSpyware, Botnet, C2, RAT, Backdoor, Billing-FraudAdoBotRemote Data Exfiltration, Icon Hiding, Stealth, Update App, Install Apps, Run in Background, Bot, Run at Startup, Device Information, Bind Job Service, Access Coarse Location, Access Fine Location, Access Network State, Internet, Process Outgoing Calls, Read Call Log, Write Call Log, Read Contacts, Write Contacts, Read Phone State, Read SMS, Receive SMS, Send SMS, Receive Boot Completed, Write External Storageandroid.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.BIND_JOB_SERVICE, android.permission.INTERNET, android.permission.PROCESS_OUTGOING_CALLS, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.SEND_SMS, android.permission.WRITE_CALL_LOG, android.permission.WRITE_CONTACTS, android.permission.WRITE_EXTERNAL_STORAGEcom.android.adobot7b88e7c32f9f14d7de3ab8d2a50905584779bc535ced3899252c7a23918e19bd0590.00052232008.7070729910.1562,9447.465.361.391.6874.43543.529https://github.com/adonespitogo/AdoBot
27
RAT:AndroidOS/AhMythAhMythConnects to the server in time intervals and reads call logs, contacts, location, records audio, takes pictures, gets and sends SMS, lists files and uploads files to server.Java292020YesRATSpyware, C2, RAT, Botnet, Billing-Fraud, BackdoorAhMythRemote Data Exfiltration, Run at Startup, Run in Background, Periodical Connection With Server, Bot, Icon Hiding, Stealth, Create Files, Upload Files, List Files, Device Information, Camera, Access Fine Location, Access Network State, Internet, Modify Audio Settings, Read Call Log, Read Contacts, Read External Storage, Write External Storage, Read Phone State, Read SMS, Send SMS, Receive Boot Completed, Record Audio, Wake Lockandroid.hardware.camera, android.hardware.camera.autofocus, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.CAMERA, android.permission.INTERNET, android.permission.MODIFY_AUDIO_SETTINGS, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECORD_AUDIO, android.permission.SEND_SMS, android.permission.WAKE_LOCK, android.permission.WRITE_EXTERNAL_STORAGEahmyth.mine.king.ahmyth3e5c7c3ce0a1d1f6475dc9b2fd60c769ad798880b1c40bd3e6fe7cb610418d331323.1256,02417714.18110,972119,57515.700761,6102,547.0149.2351.742.2090.04452.657https://github.com/AhMyth/AhMyth-Android-RAT
28
RAT:AndroidOS/AndroidClientAndroidClientA client-based remote administration tool to be used for communication via SSL with a server web-interface to send call logs, SMS, location, contacts, audio, camera, image files, browser bookmarks, open a URL, etc. through commands.Java102018?RATRAT, Backdoor, Spyware, Botnet, C2, Downloader, Wiper, Billing-Fraud?Remote Data Exfiltration, Bot, Run in Background, Run at Startup, Data Encryption, Data Decryption, Compress Files, Decompress Files, Uninstall Itself, File Integrity Check, Root Check, List Installed Apps, Clipboard, List Files, Upload Files, Delete Files, Download Files, Open URL, Browser Bookmarks, Device Information, Access Coarse Location, Access Fine Location, Access Network State, Access Wifi State, Camera, Capture Voice Call, Change Wifi State, Delete Packages, Internet, Read Call Log, Read Contacts, Read External Storage, Write External Storage, Read Phone State, Read SMS, Send SMS, Write SMS, Receive Boot Completed, Record Audio, Storage, Write Call Logandroid.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.ACCESS_WIFI_STATE, android.permission.CAMERA, android.permission.CAPTURE_VOICE_CALL, android.permission.CHANGE_WIFI_STATE, android.permission.DELETE_PACKAGES , android.permission.INTERNET, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECORD_AUDIO, android.permission.SEND_SMS, android.permission.STORAGE, android.permission.WRITE_CALL_LOG, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.WRITE_SMScom.revcode.client53041af121900889a6c0af0b41e4a7d521c0cf308fecf192483f42efafc1cf241601.667241231657.179594,97624.97119,92755.5411.514.833.0463.51137.141https://github.com/rev-code/androidclient
29
RAT:AndroidOS/AndroidMalwareExampleAndroid Malware ExampleConnects to a C2 Server through SSL and receives commands to execute several features, like Ransomware, Data Exfiltration (Network/Device/Bluettoth inforamtion, Accounts, Contacts, Call Logs, SMS, System Logs, GPS, Audio, Files, Browser History, etc.), Send SMS, Configure a delay to check back with the server.Java92016?RATSpyware, C2, Botnet, Encryption-Ransomware, RAT, Backdoor, Downloader, Mailfinder, Elevated-Privilege-Abuse, Billing-Fraud?Remote Data Exfiltration, Activate Admin, Privilege Escalation, Periodical Connection With Server, List Installed Apps, Remote Key, File Encryption, File Decryption, Compress Files , Decompress Files, Download Files, List Files, Upload Files, Copy Files, SSL Communication, Run at Startup, Run in Background, Access Coarse Location, Access Fine Location, Access Network State, Access Wifi State, Access Change Wifi State, Bluetooth, Bluetooth Admin, Camera, Get Accounts, Internet, Read Call Log, Read Contacts, Read External Storage, Write External Storage, Read History Bookmarks, Read Phone State, Read SMS, Receive SMS, Send SMS, Receive Boot Completed, Record Audio, SMS Receivedandroid.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.ACCESS_WIFI_STATE, android.permission.BLUETOOTH, android.permission.BLUETOOTH_ADMIN, android.permission.CAMERA, android.permission.CHANGE_WIFI_STATE, android.permission.GET_ACCOUNTS, android.permission.INTERNET, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_HISTORY_BOOKMARKS, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.RECORD_AUDIO, android.permission.SEND_SMS, android.permission.SMS_RECEIVED, android.permission.WRITE_EXTERNAL_STORAGEcom.burke_consulting.malwareexample6925cfdaf20a81be7ea864aff87c16ac9a823e02f5e653ad4af321ac75d432a10600.00058352326.631,1431,24430.3644,09710.556.121.722.8196.56056.468https://github.com/darrylburke/AndroidMalwareExample
30
RAT:AndroidOS/AndroidR.A.TAndroid R.A.T ClientApp that connects to a server and receives commands to exfiltrates audio, location coordinates, call log, battery information, list of installed apps, contacts (can also add new ones), calendar events (can also add new ones, delete and modify existing ones), takes pictures and videos, get and send SMS, perform operations on files (upload, download, move, copy, delete...)Java52017?RATSpyware, C2, Botnet, Downloader, RAT, Billing-Fraud, Backdoor?Remote Data Exfiltration, Bot, List Files, Copy Files, Move Files, Delete Files, Rename Files, Paste Files, Download Files, Upload Files, List Installed Apps, Icon Hiding, Stealth, Device Information, Access Coarse Location, Access Fine Location, Access Network State, Camera, Change Network State, Internet, Read Calendar, Write Calendar, Read Call Log, Read Contacts, Write Contacts, Read External Storage, Write External Storage, Read SMS, Send SMS, Record Audioandroid.hardware.camera, android.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.CAMERA, android.permission.CHANGE_NETWORK_STATE, android.permission.INTERNET, android.permission.READ_CALENDAR, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_SMS, android.permission.RECORD_AUDIO, android.permission.SEND_SMS, android.permission.WRITE_CALENDAR, android.permission.WRITE_CONTACTS, android.permission.WRITE_EXTERNAL_STORAGEcom.dev.ah10.androidratclient04d1cddd5ceb8dc3446d11042707767625d5c7eadb8396661702263aec46256f0330.0002615906.00328964.9561,9374.814.541.062.9654.48631.863https://github.com/AdvancedHacker101/android-R.A.T-Client
31
RAT:AndroidOS/AndroidSpyAppAdroid Spy App, HawkshawAndroid spy app, which uploads user data such as contacts, messages, call log, send messages, photos, videos, files, open a browser link, lock the device, encrypt/decrypt files, etc.Kotlin, Java102020YesRATSpyware, Botnet, C2, RAT, Trojan, Downloader, Keylogger, Locker, Wiper, Backdoor, Encryption-Ransomware, Billing-FraudHawkshawRemote Data Exfiltration, Icon Hiding, Stealth, Run in Background, Run at Startup, Bot, Install Apps, List Files, Upload Files, Download Files, Open Apps, Open URLs, Remote Shell, File Encryption, File Decryption, Change Password, Lock Device, Force Reboot, Wipe Data, Instagram, WhatsApp, Tinder, Snapchat, Device Information, Keystrokes Monitoring, Input Capture, Record Screen, Set Alarm, Browser History, Camera, Access Coarse Location, Access Fine Location, Access Network State, Bind Notification Listener Service, Call Phone, Flashlight, Internet, Read Call Log, Write Call Log, Read Contacts, Write Contacts, Read External Storage, Write External Storage, Read Phone State, Read SMS, Send SMS, Receive Boot Completed, Record Audio, System Alert Window, Wake Lockandroid.hardware.camera2.full, android.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.BIND_NOTIFICATION_LISTENER_SERVICE, android.permission.CALL_PHONE, android.permission.CAMERA, android.permission.FLASHLIGHT, android.permission.INTERNET, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECORD_AUDIO, android.permission.SEND_SMS, android.permission.SYSTEM_ALERT_WINDOW, android.permission.WAKE_LOCK, android.permission.WRITE_CALL_LOG, android.permission.WRITE_CONTACTS, android.permission.WRITE_EXTERNAL_STORAGEme.hawkshaw779f5133861f67249f09e7ba6c46604a939c9a829b1255782e72239d08a958da0620.00054???69031311.2872,7737.005.241.34???https://github.com/abhinavsuthar/Android_Spy_App
32
RAT:AndroidOS/AndroidSurveilanceAndroidSurveilanceAndroid Surveilance Tool, which works like an HTTP Shell to receive and execute commands (lock the device, wipe data, open a root shell, etc.) and send data to the server (including files, screenshots, installled apps, audio, photos, etc.)Java92013?RATSpyware, Botnet, C2, Rooting, RAT, Backdoor, Downloader, Dropper, Locker, Wiper, Backdoor, Mailfinder, Elevated-Privilege-Abuse?Rooting, Activate Admin, Privilege Escalation, Root Check, Remote Data Exfiltration, Bot, Install Apps, Run in Background, Run at Startup, Root Shell, Lock Device, List Files, Upload Files, Download Files, Wipe Data, Delete Keys, Mount Filesystems, Unmount Filesystems, ADB Enabled, Compress Files, Decompress Files, Device Information, Screenshot, Access Coarse Location, Access Fine Location, Access Network State, Access Wifi State, Access Superuser, Bind Device Admin, Bind Input Method, Camera, Diagnostic, Get Accounts, Internet, Persistent Activity, Read Call Log, Read Contacts, Read External Storage, Write External Storage, Read Phone State, Read SMS, Receive SMS, Receive Boot Completed, Record Audio, Write Secure Settings, Write Settings, Read History Bookmarksandroid.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.ACCESS_SUPERUSER, android.permission.ACCESS_WIFI_STATE, android.permission.BIND_DEVICE_ADMIN, android.permission.BIND_INPUT_METHOD, android.permission.CAMERA, android.permission.DIAGNOSTIC, android.permission.GET_ACCOUNTS, android.permission.INTERNET, android.permission.PERSISTENT_ACTIVITY, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.RECORD_AUDIO, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.WRITE_SECURE_SETTINGS, android.permission.WRITE_SETTINGS, com.android.browser.permission.READ_HISTORY_BOOKMARKScom.android.classice5b823be2600bd192a3dad3639f987535f53ef3fc5a86f3fb8a25dc3007995a70610.000207251787.128,17320,71172.19428,68881.4313.316.122.6288.19251.574https://github.com/amartinz/AndroidSurveilance
33
RAT:AndroidOS/Android_TrojanAndroid_TrojanPeriodically connects to the server, syncs files and can perform many operations: track location, change wifi state, make calls, check connection, receive and execute commands, record audio, record and register calls, upload pictures taken, list and upload files, execute a remote and root shell, check if online, read and send SMS, take pictures, read call logs, download files, get device information, get bookmarks and history, get contacts, take screenshotJava42016?RATSpyware, C2, Botnet, Backdoor, Downloader, RAT, Elevated-Privilege-Abuse, Billing-FraudAndroidTrojanRemote Data Exfiltration, Run at Startup, Run in Background, Open URL, Stealth, Check Screen Locked, Periodical Connection With Server, Bot, Remote Shell, Root Shell, Create Files, Delete Files, Upload Files, Download Files, List Files, Icon Hiding, Change Wifi State, Persistance, Device Information, Screenshot, Access Fine Location, Access Network State, Call Phone, Camera, Internet, Process Outgoing Calls, Read Call Log, Read Contacts, Read External Storage, Write External Storage, Read Phone State, Read SMS, Receive SMS, Send SMS, Receive Boot Completed, Record Audio, Wake Lock, Write Secure Settings, Write Settings, Read History Bookmarksandroid.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.CALL_PHONE, android.permission.CAMERA, android.permission.INTERNET, android.permission.PROCESS_OUTGOING_CALLS, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.RECORD_AUDIO, android.permission.SEND_SMS, android.permission.WAKE_LOCK, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.WRITE_SECURE_SETTINGS, android.permission.WRITE_SETTINGS, com.android.browser.permission.READ_HISTORY_BOOKMARKScom.example.trojan2268eec422718a5caac769a51cf1fcb0536729d7aaa0607570a590937d101f610600.0001512867.173941075.7841,8504.584.461.033.3653.44431.254https://github.com/androidtrojan1/android_trojan
34
RAT:AndroidOS/AndroidTrojan-JAVAAndroidTrojan-JAVARecords all phone calls and uploads them every 3 hours, sends a copy of incoming SMS, periodically checks for commands, download files, open a shell (root shell if available), forces reboot, takes a photo, gets location, device information, call logs, bookmarks, browser history, etc.Java42016?RATSpyware, Trojan, Botnet, RAT, C2, Backdoor, Downloader, Wiper, Elevated-Privilege-Abuse, Billing-FraudAndroidTrojanRemote Data Exfiltration, Force Reboot, Remote Shell, Root Shell, Periodical Connection With Server, Upload Files, Download Files, Delete Files, Bot, Icon Hiding, Stealth, Screenshot, Persistance, Install as Root, Root Check, Run at Startup, Run in Background, Device Information, Access Fine Location, Access Coarse Location, Access Network State, Call Phone, Camera, Internet, Process Outgoing calls, Read Call Log, Read Contacts, Read External Storage, Write External Storage, Read Phone State, Read SMS, Receive SMS, Send SMS, Receive Boot Completed, Record Audio, Wake Lock, Write Secure Settings, Write Settings, Read History Bookmarksandroid.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.CALL_PHONE, android.permission.CAMERA, android.permission.INTERNET, android.permission.PROCESS_OUTGOING_CALLS, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.RECORD_AUDIO, android.permission.SEND_SMS, android.permission.WAKE_LOCK, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.WRITE_SECURE_SETTINGS, android.permission.WRITE_SETTINGS, com.android.browser.permission.READ_HISTORY_BOOKMARKScom.example.trojan65cb2bce9fbe5c65f1c1a565a041347377efe961fad0c75273f5f61ccfcb25950500.0001512867.173941075.7841,8504.584.461.033.3653.44431.254https://github.com/Soldie/android_trojan-JAVA
35
RAT:AndroidOS/AndroidTrojanServiceAndroidTrojanServiceRecords all phone calls and uploads them every 3 hours, sends a copy of incoming SMS, periodically checks for commands, download files, open a shell (root shell if available), forces reboot, forces full factory format, alerts via telegram, takes a photo, gets location, device information, call logs, bookmarks, browser history, etc.Java52016YesRATSpyware, Trojan, Botnet, RAT, C2, Backdoor, Downloader, Wiper, Elevated-Privilege-Abuse, Billing-Fraud?Remote Data Exfiltration, Telegram Alerts, Factory Format, Force Reboot, Remote Shell, Root Shell, Periodical Connection With Server, Upload Files, Download Files, Delete Files, Bot, Icon Hiding, Stealth, Screenshot, Persistance, Install as Root, Root Check, Run at Startup, Run in Background, Device Information, Access Fine Location, Access Network State, Call Phone, Camera, Internet, Process Outgoing Calls, Read Call Log, Read Contacts, Read External Storage, Write External Storage, Read Phone State, Read SMS, Receive SMS, Send SMS, Receive Boot Completed, Record Audio, Wake Lock, Write Secure Settings, Write Settings, Read History Bookmarksandroid.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.CALL_PHONE, android.permission.CAMERA, android.permission.INTERNET, android.permission.PROCESS_OUTGOING_CALLS, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.RECORD_AUDIO, android.permission.SEND_SMS, android.permission.WAKE_LOCK, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.WRITE_SECURE_SETTINGS, android.permission.WRITE_SETTINGS, com.android.browser.permission.READ_HISTORY_BOOKMARKScom.example.testda0e5b4f9f47f6c6272b2600bf0196c6d2d425adae4d574b191a653930442368136121.3111811676.09343442.5031,7584.344.370.993.9647.70127.895https://github.com/androidtrojan1/android-trojan-service-
36
RAT:AndroidOS/AndroRATAndroRatApplication that receives commands from a server to get live GPS coordinates, audio stream, call logs, contacts, device information, video stream, files, take pictures, list directories, monitor live calls, perform toasts, send and get SMS, monitor SMS, make calls, set preferences, download files, open browser, vibrate and disconnect. The connection can be started when a specific SMS or call is received.Java62012YesRATSpyware, C2, Botnet, RAT, Downloader, Billing-Fraud, BackdoorAndroRATRemote Data Exfiltration, Run at Startup, Run in Background, Bot, Connectivity Check, List Files, Upload Files, Download Files, Open URLs, Make Toasts, Device Information, Access Fine Location, Access Network State, Call Phone, Camera, Internet, Process Outgoing Calls, Read Contacts, Read Phone State, Read SMS, Receive SMS, Send SMS, Receive Boot Completed, Record Audio, Vibrate, Write External Storageandroid.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.CALL_PHONE, android.permission.CAMERA, android.permission.INTERNET, android.permission.PROCESS_OUTGOING_CALLS, android.permission.READ_CONTACTS, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.RECORD_AUDIO, android.permission.SEND_SMS, android.permission.VIBRATE, android.permission.WRITE_EXTERNAL_STORAGEmy.app.client5595cd67fd6987951ea054ce8be0fb5528e328755b85457e938cb2a2cd003399336253.226122978909.182,5209588.75810,93829.599.063.271.7778.95746.174https://github.com/DesignativeDave/androrat
37
RAT:AndroidOS/AndroSpyAndroSpy, VadisiIt binds as admin and sends information to a server through a socket connection. It streams audio, calls and video, screen stream, takes pictures, interact with files (upload, download, move, write, check, copy, read, create, lists, rename and delete), opens apps, uninstalls apps, lists installed apps, gets and sets clipboard, monitors keystrokes, executes shell commands (as root if needed), installs app shortcut, opens a URL, sends device information, enable/disable bluetooth, enable/disable wifi, sends GPS coordinates, gets, intercepts and sends SMS, gets and modifies call log, makes call, sends and modifies (add and delete) contacts, etc.C#82021?RATSpyware, C2, Botnet, RAT, Backdoor, Downloader, Keylogger, Elevated-Privilege-Abuse, Billing-Fraud?Remote Data Exfiltration, Run at Startup, Run in Background, Bot, Read Files, Create Files, Check Files, Rename Files, Move Files, Copy Files, Write Files, Delete Files, List Files, Upload Files, Download Files, Keystrokes Monitoring, Input Capture, Icon Hiding, Stealth, List Installed Apps, Open Apps, Activate Admin, Privilege Escalation, Doze Mode, Media Player, Remote Shell, Root Shell, Root Check, Open URL, Connectivity Check, Uninstall Apps, Set Alarm, Check Screen Locked, Clipboard, Periodical Connection With Server, Persistance, Screen Stream, Data Encoding, Data Decoding, Compress Files, Decompress Files, Make Notifications, Make Toasts, Device Information, Volume, Brightness, Access Coarse Location, Access Fine Location, Access Location Extra Commands, Access Mock Location, Access Network State, Access Wifi State, Battery Stats, Bind Device Admin, Bluetooth, Bluetooth Admin, Call Phone, Camera, Capture Audio Output, Change Wifi State, Delete Packages, Flashlight, Foreground Service, Internet, Modify Audio Settings, Process Outgoing Calls, Read Call Log, Write Call Log, Read Contacts, Write Contacts, Read External Storage, Write External Storage, Read Phone State, Broadcast SMS, Read SMS, Receive SMS, Send SMS, Write SMS, Receive Boot Completed, Record Audio, Request Delete Packages, Request Ignore Battery Optimizations, Set Wallpaper, System Alert Windows, Vibrate, Wake Lock, Write Secure Settings, Write Settings, Install Shortcutandroid.accessibilityservice.AccessibilityService, android.hardware.camera, android.hardware.camera.autofocus, android.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_LOCATION_EXTRA_COMMANDS, android.permission.ACCESS_MOCK_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.ACCESS_WIFI_STATE, android.permission.BATTERY_STATS, android.permission.BIND_DEVICE_ADMIN, android.permission.BLUETOOTH, android.permission.BLUETOOTH_ADMIN, android.permission.BROADCAST_SMS, android.permission.CALL_PHONE, android.permission.CAMERA, android.permission.CAPTURE_AUDIO_OUTPUT, android.permission.CHANGE_WIFI_STATE, android.permission.DELETE_PACKAGES, android.permission.FLASHLIGHT, android.permission.FOREGROUND_SERVICE, android.permission.INTERNET, android.permission.MODIFY_AUDIO_SETTINGS, android.permission.PROCESS_OUTGOING_CALLS, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.RECORD_AUDIO, android.permission.REQUEST_DELETE_PACKAGES, android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS, android.permission.SEND_SMS, android.permission.SET_WALLPAPER, android.permission.SYSTEM_ALERT_WINDOW, android.permission.VIBRATE, android.permission.WAKE_LOCK, android.permission.WRITE_CALL_LOG, android.permission.WRITE_CONTACTS, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.WRITE_SECURE_SETTINGS, android.permission.WRITE_SETTINGS, android.permission.WRITE_SMS, android.provider.Telephony.READ_SMS, com.android.launcher.permission.INSTALL_SHORTCUTcom.kurtlar.vadisi41ead5b14170415af357df08550857e828cbd36d8c0f52ce702033b834aed4442623.226150966616.896,3466,1245.348114,505348.3223.1115.073.97??https://github.com/qH0sT/AndroSpy
38
RAT:AndroidOS/ArbitriumArbitriumCordova developed app that turns a phone into a proxy, runs received commands in the background and sends their output to the server. It also allows downloading scripts for their execution.Java202021?RATSpyware, Proxy, Backdoor, Downloader, Botnet, RAT, Wiper?Remote Data Exfiltration, Bot, Remote Shell, HTTP forwarding, Reverse Connection, Unlock Device, Wake Up Device, Read Files, Upload Files, Create Files, List Files, Copy Files, Modify Files, Delete Files, Download Files, Recent Task List Hiding, Persistance, Run at Startup, Run in Background, Device Information, Foreground Service, Internet, Receive Boot Completed, Request Ignore Battery Optimizations, Wake Lock, Write External Storageandroid.permission.FOREGROUND_SERVICE, android.permission.INTERNET, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS, android.permission.WAKE_LOCK, android.permission.WRITE_EXTERNAL_STORAGEnet.orange.bolt578e0d47cf533b4f5f35d8b9f8c5cec48bce17cbc086759b6211449b93d4e5f30540.0002,467908759.7223,71343,77835.697122,639374.3423.7615.762.6576.92544.985https://github.com/amonsat/Arbitrium-Android
39
RAT:AndroidOS/BetterAndroRATBetterAndroRAT, AdobeFlash13App that decodes a URL to connect to the server and sends information. The service starts when the screen is off. It can take pictures, get location, device information, browser history and bookmarks, installed apps, call history, SMS, contacts, accounts, record audio and video. It can also download files, update itself, uninstall itself, delete files, call a phone number, delete a specific call logs, perform HTTP Flood, transfer the bot, open apps, intercept, delete and block SMS, etc. Java122016?RATSpyware, C2, Botnet, RAT, DoS, Downloader, Mailfinder, Billing-Fraud, BackdoorDendroidRemote Data Exfiltration, Run at Startup, Run in Background, Bot, Bot Transfer, Periodical Connection With Server, Stealth, HTTP Flood, Check Screen Locked, Turn Screen On, Obfuscation, Modify Volume, Data Decoding, Device Information, List Installed Apps, Alert, Open URL, Open Apps, Dialogs, Connectivity Check, Create Files, Delete Files, Download Files, Upload Files, Update App, Install Apps, Uninstall Itself, Camera, Microphone, Access Fine Location, Access Network State, Call Phone, Get Accounts, Get Tasks, Internet, Process Outgoing Calls, Quickboot Poweron, Read Contacts, Read Phone State, Read SMS, Receive SMS, Send SMS, Write SMS, Receive Boot Completed, Record Audio, Wake Lock, Write External Storage, Write Settings, Read History Bookmarksandroid.hardware.camera, android.hardware.camera.autofocus, android.hardware.camera.front, android.hardware.microphone, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.CALL_PHONE, android.permission.CAMERA, android.permission.GET_ACCOUNTS, android.permission.GET_TASKS, android.permission.INTERNET, android.permission.PROCESS_OUTGOING_CALLS, android.permission.QUICKBOOT_POWERON, android.permission.READ_CONTACTS, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.RECORD_AUDIO, android.permission.SEND_SMS, android.permission.WAKE_LOCK, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.WRITE_SETTINGS, android.permission.WRITE_SMS, com.android.browser.permission.READ_HISTORY_BOOKMARKScom.adobe.flash13da4e5ce66722f755ee8305fa3832b99e6efac1151b950ff3a8e7ae26f48969970590.000861026226.202,0561,2907.66616,82746.5110.754.322.5054.30631.758https://github.com/mwsrc/BetterAndroRAT
40
RAT:AndroidOS/ChatAppAdvanced-Android-Rat-Client, chatappAn Android app which runs in background and sends data (Device Info, SMS, Accounts, Contacts, Call logs, audio) to a RAT server and allows listing and uploading files through commands.Java82020?RATRAT, Backdoor, Trojan, Spyware, Botnet, C2, Mailfinder?Remote Data Exfiltration, Persistance, Bot, Icon Hiding, Stealth, Run at Startup, Run in Background, List Files, Upload Files, Device Information, Bind Job Service, Foreground Service, Get Accounts, Internet, Read Call Log, Read Contacts, Read External Storage, Read Profile, Read SMS, Receive Boot Completed, Receive Launch Broadcast, Record Audio, Wake Lockandroid.permission.BIND_JOB_SERVICE, android.permission.FOREGROUND_SERVICE, android.permission.GET_ACCOUNTS, android.permission.INTERNET, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PROFILE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_LAUNCH_BROADCASTS, android.permission.RECORD_AUDIO, android.permission.Tele, android.permission.WAKE_LOCKcom.example.chatappb48780baca111e5d0148095decb80675004ecf545578fdf2f57fd14e039c7a820600.00073321645.135392337.8352,9747.545.391.401.6488.01651.471https://github.com/diptomondal007/Advanced-Android-Rat-Client
41
RAT:AndroidOS/DendroidDendroid, Dendriod, DroidianApp that decodes a URL and password used to connect to the server and sends information: device information, installed apps, browser history and bookmarks, recorded calls, contacts, pictures, call history, SMS, accounts, GPS coordinates, and recorded audio and video. It also can download files and update itself by downloading and installing an updated APK, uninstall apps, modify volume, call, modify call log, turn screen on, open url, upload and delete files, delete SMS, change directory, http flood, open apps, transfer bot, and block or intercept SMS.Java112014YesRATSpyware, C2, Botnet, RAT, Backdoor, Downloader, DoS, Mailfinder, Billing-FraudDendroidRemote Data Exfiltration, Run at Startup, Run in Background, Bot, Bot Transfer, Turn Screen On, Volume, Periodical Connection With Server, Create Files, Delete Files, Download Files, Upload Files, List Installed Apps, Open Apps, Dialogs, Change Directory, Update App, Uninstall Apps, Open URL, Alert, Persistance, Check Screen Locked, HTTP Flood, Install Apps, Icon Hiding, Stealth, Data Encoding, Data Decoding, Connectivity Check, Device Information, Camera, Microphone, Access Fine Location, Access Network State, Call Phone, Get Accounts, Get Tasks, Internet, Process Outgoing Calls, Quickboot Poweron, Read Contacts, Read Phone State, Read SMS, Receive SMS, Send SMS, Write SMS, Receive Boot Completed, Record Audio, Wake Lock, Write External Storage, Write Settings, Read History Bookmarksandroid.hardware.camera, android.hardware.camera.autofocus, android.hardware.camera.front, android.hardware.microphone, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.CALL_PHONE, android.permission.CAMERA, android.permission.GET_ACCOUNTS, android.permission.GET_TASKS, android.permission.INTERNET, android.permission.PROCESS_OUTGOING_CALLS, android.permission.QUICKBOOT_POWERON, android.permission.READ_CONTACTS, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.RECORD_AUDIO, android.permission.SEND_SMS, android.permission.WAKE_LOCK, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.WRITE_SETTINGS, android.permission.WRITE_SMS, com.android.browser.permission.READ_HISTORY_BOOKMARKScom.hidden.droidianc82326cd20dd0ca40dbc0168f4bf3667b53d2cb68d5e394ef10ec2a787c9e3841611.639631126524.091,8251,2878.67314,84040.7610.233.982.4953.90631.524https://github.com/vxunderground/MalwareSourceCode/blob/main/Android/Android.Dendriod.7z
42
RAT:AndroidOS/DroidRAT_JEDroidRat_JEApp that connects to a server and receives commands for performing several actions, mainly gathering camera footage, device information, GPS, sensor data, call logs, performing phone calls, sending mails, launch specific apps, get and receive SMS, make toasts, vibrate, perform web searches, etc.Java142021?RATSpyware, RAT, Backdoor, C2, Botnet, Downloader, Billing-Fraud?Remote Data Exfiltration, Bot, Media Player, List Installed Apps, Open Apps, Open URLs, Make Toasts, Compress Files, Decompress Files, Create Files, Modify Files, Read Files, List Files, Search Files, Download Files, Upload Files, Run in Background, Device Information, Send Emails, Access Background Location, Access Coarse Location, Access Fine Location, Call Phone, Camera, Foreground Service, Internet, Read Call Log, Write Call Log, Read External Storage, Write External Storage, Read SMS, Receive SMS, Send SMS, Vibrateandroid.permission.ACCESS_BACKGROUND_LOCATION, android.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.CALL_PHONE, android.permission.CAMERA, android.permission.FOREGROUND_SERVICE, android.permission.INTERNET, android.permission.READ_CALL_LOG, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_SMS, android.permission.RECEIVE_SMS, android.permission.SEND_SMS, android.permission.VIBRATE, android.permission.WRITE_CALL_LOG, android.permission.WRITE_EXTERNAL_STORAGEcom.je_chen.droidrat_je869925e7f93d002259b800cb18bef3200cca4bd9354c412f5e21bb619780ccf61611.6393081866783.651,8385213.02717,21247.6210.854.391.5996.50656.436https://github.com/JE-Chen/DroidRat_JE
43
RAT:AndroidOS/EliteEliteApp that can activate and deactivate admin, lock the device, wipe data, get all SMS and send SMS to all phone contacts, and uninstall apps.Java32021?RATSpyware, Locker, Wiper, Spam, Elevated-Privilege-Abuse, RAT, Backdoor?Run at Startup, Run in Background, Activate Admin, Deactivate Admin, Check Admin, Persistance, Privilege Escalation, Icon Hiding, Stealth, Lock Device, Top App, Hardcoded List of Targeted Apps, Schedule Tasks, Uninstall Apps, Wipe Data, Delete Files, Periodical, Alarm, Bind Device Admin, Get Tasks, Read Contacts, Read External Storage, Write External Storage, Read Phone State, Read SMS, Receive SMS, Send SMS, Write SMS, Receive Boot Completed, Wake Lock, Write Settingsandroid.permission.BIND_DEVICE_ADMIN, android.permission.GET_TASKS, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.SEND_SMS, android.permission.WAKE_LOCK, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.WRITE_SETTINGS, android.permission.WRITE_SMScom.elite7cd7a7e8aac08798d566906bc1aaeab610333157702e2f84a7ea47b8c9d7b4100600.0002111494.457671.0576621.562.960.531.86103.64360.610https://github.com/Black-Hell-Team/sppen/tree/main/Mobile/elite
44
RAT:AndroidOS/GhostFrameworkGhostFramework, GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device through an encrypted connection using RSA keys. It maintains a list of connected devices and can interact with each of them. It allows to execute arbitrary commands, download, upload and list files, list running activities, inject keystrokes and button presses, disable and enable wifi, etc.Python32022?RATBackdoor, Spyware, RAT, C2, Botnet, Downloader, Elevated-Privilege-Abuse?Remote Data Exfiltration, Bot, List Files, Upload Files, Download Files, Root Check, Remote Shell, Root Shell, Open URL, Encrypted Traffic, Running Activities, Screenshot, Battery, Inject Keystrokes, Press Button, Sleep, Enable Wifi, Disable Wifi--cf71dd009d487a72234c4c91769723de2d834069b3494122a7b57021decb1e2f0610.0002824391.6320833242.7287771.843.150.582.77??https://github.com/EntySec/Ghost
45
RAT:AndroidOS/GypteSystem-Android-RAT-Trojan, Gypte, MultiverzeAndroid app which periodically connects to the server to retrieve and send device information. It has several capabilities: hide app icon, get device admin, execute commands with a remote shell (as root if possible), audio recording, screen recording, online audio streaming, get and modify contacts, get clipboard, get and modify call logs, get and send sms, get and modify blocklist, location, upload files encrypted with a password, download and delete files, wifi scan, factory format, etc.Java152022YesRATSpyware, Backdoor, Botnet, C2, RAT, Downloader, Elevated-Privilege-Abuse, Billing-FraudAndroidTrojanRemote Data Exfiltration, Run in Background, Activate Admin, Privilege Escalation, Factory Format, Check Screen Locked, Connectivity Check, Remote Shell, Periodical Connection With Server, Wifi Scan, Bot, Events, Volume, Brightness, Alert, Icon Hiding, Stealth, List Applications, Device Information, Run at Startup, Logging, Notifications, Lock Device, Clipboard, Screenshot, Data Encoding, List Files, Create Files, Write Files, Delete Files, Download Files, Upload Files, File Encryption, Camera, Access Coarse Location, Access Fine Location, Access Network State, Access Wifi State, Battery State, Bind Accessibility Service, Bind Device Admin, Bind Notification Listener Service, Call Phone, Capture Audio Output, Device Power, Flashlight, Foreground Service, Internet, Modify Audio Settings, Read Call Log, Write Call Log, Read Contacts, Write Contacts, Read External Storage, Write External Storage, Read Phone State, Read SMS, Receive SMS, Send SMS, Receive Boot Completed, Record Audio, Request Ignore Battery Optimization, Set Time, Set Time Zone, Set Wallpaper, System Alert Window, Vibrate, Wake Lock, Write Calendar, Write Secure Settings, Write Settings, Read History Bookmarksandroid.hardware.camera, android.hardware.camera.autofocus, android.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.ACCESS_WIFI_STATE, android.permission.BATTERY_STATS, android.permission.BIND_ACCESSIBILITY_SERVICE, android.permission.BIND_DEVICE_ADMIN, android.permission.BIND_NOTIFICATION_LISTENER_SERVICE, android.permission.CALL_PHONE, android.permission.CAMERA, android.permission.CAPTURE_AUDIO_OUTPUT, android.permission.DEVICE_POWER, android.permission.FLASHLIGHT, android.permission.FOREGROUND_SERVICE, android.permission.INTERNET, android.permission.MODIFY_AUDIO_SETTINGS, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.RECORD_AUDIO, android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS, android.permission.SEND_SMS, android.permission.SET_TIME, android.permission.SET_TIME_ZONE, android.permission.SET_WALLPAPER, android.permission.SYSTEM_ALERT_WINDOW, android.permission.VIBRATE, android.permission.WAKE_LOCK, android.permission.WRITE_CALENDAR, android.permission.WRITE_CALL_LOG, android.permission.WRITE_CONTACTS, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.WRITE_SECURE_SETTINGS, android.permission.WRITE_SETTINGS, com.android.browser.permission.READ_HISTORY_BOOKMARKSoom.android.system1d9996b522b004a2fc9ed2b4a5e7554732fc69748b375378ff363c9fd412ca1e136220.968144381864.892,9389,92165.26515,20141.8010.334.052.8378.66546.003https://github.com/ldzombie/-System-Android-RAT-Trojan
46
RAT:AndroidOS/HawkshawHawkshawMalicious app that opens a socket to the server and receives commands to dump logs, take screenshots, screen stream, device information, camera access, notifications, get, forward and send SMS, call logs, get and modify contacts, location, get images, upload files, open url in browser, open apps and make calls.Kotlin, Java92021?RATSpyware, Botnet, C2, RAT, Billing-Fraud, BackdoorHawkshawRemote Data Exfiltration, Run at Startup, Run in Background, Periodical Connection With Server, Dump Logs, Bot, Draw Over Other Apps, Make Toasts, Screenshot, Screen Stream, Get Images, Create Files, Upload Files, Notifications, Open URL, Open Apps, Data Encoding, Device Information, Camera, Access Coarse Location, Access Fine Location, Access Network State, Bind Notification Listener Service, Call Phone, Flashlight, Internet, Read Call Log, Write Call Log, Read Contacts, Write Contacts, Read External Storage, Write External Storage, Read Phone State, Read SMS, Send SMS, Receive Boot Completed, Record Audio, System Alert Window, Wake Lock,android.hardware.camera2.full, android.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.BIND_NOTIFICATION_LISTENER_SERVICE, android.permission.CALL_PHONE, android.permission.CAMERA, android.permission.FLASHLIGHT, android.permission.INTERNET, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECORD_AUDIO, android.permission.SEND_SMS, android.permission.SYSTEM_ALERT_WINDOW, android.permission.WAKE_LOCK, android.permission.WRITE_CALL_LOG, android.permission.WRITE_CONTACTS, android.permission.WRITE_EXTERNAL_STORAGEme.hawkshaw6b2463b819f638bc4ccfc55a20d7c99b694c111e17f886cd19d8b4591a5213f70600.00054???70831311.0872,8237.145.281.35???https://github.com/saksham2410/Android-RAT---Hawkshaw
47
RAT:AndroidOS/L3MONBotL3MONBot, L3MON, AhMythCloud based remote android management suite, used for gps logging, audio recording, camera access, view contacts, get and send SMS, view call logs, installed apps, clipboard, notifications, wifi scan, file explorer and uploader, and download and install apps.Java152020YesRATSpyware, C2, Botnet, RAT, Downloader, Billing-Fraud, BackdoorL3MON, AhMythRemote Data Exfiltration, Run at Startup, Run in Background, Bot, Icon Hiding, Stealth, List Granted Permissions, Wifi Scan, Clipboard, List Installed Apps, Install Apps, Make Toasts, Download Files, Upload Files, List Files, Notifications, Access Coarse Location, Access Fine Location, Access Network State, Access Wifi State, Bind Notification Listener Service, Camera, Internet, Modify Audio Settings, Read Call Log, Read Contacts, Read External Storage, Write External Storage, Read Phone State, Read SMS, Send SMS, Receive Boot Completed, Record Audio, Wake Lockandroid.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.ACCESS_WIFI_STATE, android.permission.BIND_NOTIFICATION_LISTENER_SERVICE, android.permission.CAMERA, android.permission.INTERNET, android.permission.MODIFY_AUDIO_SETTINGS, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECORD_AUDIO, android.permission.SEND_SMS, android.permission.WAKE_LOCK, android.permission.WRITE_EXTERNAL_STORAGEcom.etechd.l3monc69e3559a3152eab5062926eff5aa6ff1d6ed8cfd66f10ff0d80bad9bd994160256041.66712819733.846556477.3198,84023.668.322.842.4896.10056.199https://github.com/vxunderground/MalwareSourceCode/blob/main/Android/L3MONBot.zip
48
RAT:AndroidOS/LaRATLaRATApp that disguises as an app to interact with geometric figures and show downloaded images, while it takes pictures and uploads them to the server, along with SMS with contact information, device information, and location. It also allows to turn the screen on. If an error occurs, the exception is reported to the server.Java152015?RATSpyware, Trojan, C2, Botnet, Mailfinder, Billing-Fraud?Remote Data Exfiltration, Run at Startup, Run in Background, Exception Reporting, Periodical Connection With Server, Check Screen Locked, Turn Screen On, Bot, Upload Files, Download Image, Make Toasts, Device Information, Camera, Microphone, Access Fine Location, Access Network State, Get Accounts, Get Tasks, Internet, Quickboot Poweron, Read Contacts, Read Phone State, Read SMS, Receive SMS, Send SMS, Write SMS, Receive Boot Completed, Record Audio, System Alert Window, Vibrate, Wake Lock, Write External Storage, Write Settings, Read History Bookmarks, C2DM Receive, C2DM Send, C2D_MESSAGEandroid.hardware.camera, android.hardware.camera.autofocus, android.hardware.camera.front, android.hardware.microphone, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.CAMERA, android.permission.GET_ACCOUNTS, android.permission.GET_TASKS, android.permission.INTERNET, android.permission.QUICKBOOT_POWERON, android.permission.READ_CONTACTS, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.RECORD_AUDIO, android.permission.SEND_SMS, android.permission.SYSTEM_ALERT_WINDOW, android.permission.VIBRATE, android.permission.WAKE_LOCK, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.WRITE_SETTINGS, android.permission.WRITE_SMS, com.android.browser.permission.READ_HISTORY_BOOKMARKS, com.c4wd.larat.permission.C2D_MESSAGE, com.google.android.c2dm.permission.RECEIVE, com.google.android.c2dm.permission.SENDcom.c4wd.laratfb5ed48cf82beb664fb1dcd2bb2e14ac86e202344e08a9ee29bc9137ca927c720600.00064251255.005351715.5203,0987.875.471.441.7089.31052.228https://github.com/c4wrd/LaRat
49
RAT:AndroidOS/MassRATMass RATApp that connects to the server to download files received from it and sends a list of files and folders found in the device.C#72020?RATSpyware, Botnet, Downloader, RAT, C2, Backdoor?Remote Data Exfiltration, Bot, List Files, Download Files, Run at Startup, Access Network State, Internet, Read External Storage, Write External Storage, Receive Boot Completedandroid.permission.ACCESS_NETWORK_STATE, android.permission.INTERNET, android.permission.READ_EXTERNAL_STORAGE, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.WRITE_EXTERNAL_STORAGEcom.nayncat7f4c23fcf81741a7511f87634f7fcf0401c719a48ddd818981caf276b5913d2d0580.00066261455.582,9593,25448.7646,67317.617.442.372.36??https://github.com/NYAN-x-CAT/Mass-RAT
50
RAT:AndroidOS/PhoneMonitorPhoneMonitorAn app that periodically connects to a server. It records calls and takes pictures and uploads them to the server. The server can specify settings for a unique infected device. It can receive commands via SMS to make the phone vibrate, make calls and SMS, enable Wifi, retrieve GPS location data, call records, SMS messages, contacts and photos.Java112021?RATSpyware, RAT, Backdoor, C2, Botnet, Billing-Fraud?Remote Data Exfiltration, Run at Startup, Run in Background, Persistance, Stealth, Periodical Connection With Server, Bot, Upload Files, Create Files, Read Files, Delete Files, Rename Files, Record Calls, Enable Wifi, Device Information, Device Status, Access Fine Location, Access Network State, Access Wifi State, Change Wifi State, Call Phone, Camera, Internet, Read Call Log, Read Contacts, Read Phone State, Read SMS, Receive SMS, Send SMS, Receive Boot Completed, Record Audio, System Alert Window, Vibrateandroid.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.ACCESS_WIFI_STATE, android.permission.CALL_PHONE, android.permission.CAMERA, android.permission.CHANGE_WIFI_STATE, android.permission.INTERNET, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.RECORD_AUDIO, android.permission.SEND_SMS, android.permission.SYSTEM_ALERT_WINDOW, android.permission.VIBRATEcom.monitor.phone.s0ft.phonemonitor784ddfd92cb8f5c7ee57b1895ba23beafdee6d2dce2925b682314e5c5d34a92e0500.00057191306.845132787.4493,7329.575.901.622.4875.42544.108https://github.com/globalpolicy/phonemonitor
51
RAT:AndroidOS/RafelRATRafel RAT, Raptor, BlackMartRansomware app capable of checking commands from a server using the device ID, binding as admin, locking the device, encrypting files, wiping SD card data, resetting the user password, sending SMS, changing the wallpaper, leaking notifications through discord, exfiltrating contacts, SMS, location, browser history, screenshots and call log to the server, modify call logs, list and upload files, list installed apps, etc.Java122022?RATSpyware, Screen-Locking-Ransomware, Encryption-Ransomware, RAT, Locker, C2, Botnet, Wiper, Downloader, Elevated-Privilege-Abuse, Billing-Fraud, Backdoor?Remote Data Exfiltration, Run at Startup, Run in Background, Activate Admin, Privilege Escalation, Bot, File Encryption, File Decryption, Wipe Data, Root Check, Voice Message, Data Encoding, Screenshot, List Installed Apps, Reset User Password, Lock Device, Notifications, Alert, Discord based Communication, Make Toasts, Read Files, Create Files, List Files, Delete Files, Upload Files, Download Files, Device Information, Access Coarse Location, Access Fine Location, Access Network State, Bind Device Admin, Bind Job Service, Bind Notification Listener Service, Foreground Service, Internet, Manage External Storage, Read Call Log, Write Call Log, Read Contacts, Write Contacts, Read External Storage, Write External Storage, Read Phone Numbers, Read Phone State, Read SMS, Send SMS, Write SMS, Receive Boot Completed, Record Audio, Request Ignore Battery Optimizations, Set Wallpaper, Vibrate, Wake Lock, Read History Bookmarksandroid.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.BIND_DEVICE_ADMIN, android.permission.BIND_JOB_SERVICE, android.permission.BIND_NOTIFICATION_LISTENER_SERVICE, android.permission.FOREGROUND_SERVICE, android.permission.INTERNET, android.permission.MANAGE_EXTERNAL_STORAGE, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_NUMBERS, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECORD_AUDIO, android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS, android.permission.SEND_SMS, android.permission.SET_WALLPAPER, android.permission.VIBRATE, android.permission.WAKE_LOCK, android.permission.WRITE_CALL_LOG, android.permission.WRITE_CONTACTS, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.WRITE_SMS, com.android.browser.permission.READ_HISTORY_BOOKMARKScom.velociraptor.raptorfddfd4d294e075e992acc94d8a9e823b36af8041fe39e611628be6aa94ea83240590.000691616610.381,1632644.1996,28716.547.262.281.8971.66941.912https://github.com/swagkarna/Rafel-Rat
52
RAT:AndroidOS/rdroidrdroidThis app allows to record audio, get and modify contacts, get device information, get and set volume, check connectivity, terminate calls, set wallpaper, get and set clipboard, open URL, shell commands execution, list installled apps, get call logs, vibrate, mute, uninstall or open apps, get, remove and forge SMS, turn on airplane mode, manage, download and upload files, etc.Java72018?RATSpyware, C2, Botnet, RAT, Downloader, Backdoor, Mailfinder, Elevated-Privilege-Abuse, Billing-Fraud?Remote Data Exfiltration, Run at Startup, Run in Background, Activate Admin, Privilege Escalation, Bot, Variable Names Obfuscation, Function Names Obfuscation, List Installed Apps, Open Apps, Uninstall Apps, Volume, Mute, Brightness, Connectivity Check, Remote Shell, Clipboard, Open URL, Airplane Mode, Terminate Calls, Create Files, Delete Files, Copy Files, Move Files, Rename Files, Upload Files, Download Files, Media Player, Make Toasts, Device Information, Access Network State, Access Wifi State, Battery Stats, Bluetooth, Bluetooth Admin, Call Phone, Change Wifi State, DUMP, Get Accounts, Get Tasks, Internet, Kill Background Processes, Modify Audio Settings, Modify Phone State, Network, Read Contacts, Write Contacts, Read Phone State, Read SMS, Receive SMS, Send SMS, Write SMS, Reboot, Receive Boot Completed, Record Audio, Set Wallpaper, Update Device Stats, Vibrate, Write External Storage, Write Secure Settings, Write Settings, C2DM Receive, C2DM Send, C2D_MESSAGEandroid.permission.ACCESS_NETWORK_STATE, android.permission.ACCESS_WIFI_STATE, android.permission.BATTERY_STATS, android.permission.BLUETOOTH, android.permission.BLUETOOTH_ADMIN, android.permission.CALL_PHONE, android.permission.CHANGE_WIFI_STATE, android.permission.DUMP, android.permission.GET_ACCOUNTS, android.permission.GET_TASKS, android.permission.INTERNET, android.permission.KILL_BACKGROUND_PROCESSES, android.permission.MODIFY_AUDIO_SETTINGS, android.permission.MODIFY_PHONE_STATE, android.permission.NETWORK, android.permission.READ_CONTACTS, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.REBOOT, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.RECORD_AUDIO, android.permission.SEND_SMS, android.permission.SET_WALLPAPER, android.permission.UPDATE_DEVICE_STATS, android.permission.VIBRATE, android.permission.WRITE_CONTACTS, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.WRITE_SECURE_SETTINGS, android.permission.WRITE_SETTINGS, android.permission.WRITE_SMS, com.google.android.c2dm.permission.RECEIVE, com.google.android.c2dm.permission.SEND, madsacsoft.maddev.rdroid.permission.C2D_MESSAGEmadsacsoft.maddev.rdroida6223ceeafbbc595ef308841ffbf55ca51fdc0e29fe1dbe71cede51b634235292603.33381716223.141,0782,20220.63510,67128.838.973.213.0440.37623.612https://github.com/m301/rdroid
53
RAT:AndroidOS/ReverseShell2AndroRat, ReverseShell2Tool to generate a malicious app that connects to a server and allows to exfiltrate images and files, execute shell commands, download files sent from the attacker, vibrate, read SMS, get location, clipboard data, device info, audio, video and call logs. It also has the capability of uninstalling itself and restarting the service.Java, Python122022YesRATSpyware, C2, Botnet, RAT, Backdoor, Downloader?Remote Data Exfiltration, Run at Startup, Run in Background, Bot, Persistance, Uninstall Itself, Restart, Icon Hiding, Stealth, Remote Shell, Data Encoding, Upload Files, Download Files, Device Information, Clipboard, Camera, Access Coarse Location, Access Fine Location, Access Network State, Access Wifi State, Bind Job Service, Internet, Read Call Log, Read External Storage, Write External Storage, Read Phone State, Read SMS, Receive Boot Completed, Record Audio, System Alert Window, Vibrate, Wake Lockandroid.hardware.camera, android.hardware.camera.autofocus, android.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.ACCESS_WIFI_STATE, android.permission.BIND_JOB_SERVICE, android.permission.CAMERA, android.permission.INTERNET, android.permission.READ_CALL_LOG, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECORD_AUDIO, android.permission.SYSTEM_ALERT_WINDOW, android.permission.VIBRATE, android.permission.WAKE_LOCK, android.permission.WRITE_EXTERNAL_STORAGEcom.example.reverseshell2638adcd0a9351133c704117cd38a92fd67584e013dfc301bd0220cbbc63227f9205238.46252241697.044041274.3052,9507.475.371.392.3083.12248.609https://github.com/karma9874/AndroRAT
54
RAT:AndroidOS/Sketchyappv2Sketchyappv2Simple android malware/botnet designed to work in the background on an android device connecting to a server and sending files, pictures, audio, etc. and receiving shell commands.Java92017?RATBotnet, C2, Backdoor, RAT, Spyware, Wiper, Trojan, Downloader, Billing-Fraud, Elevated-Privilege-Abuse?Remote Data Exfiltration, File Integrity Check, Force Reboot, Remote Shell, Root Shell, Periodical Connection With Server, Upload Files, Download Files, Delete Files, Bot, Icon Hiding, Stealth, Screenshot, Persistance, Install as Root, Root Check, Run at Startup, Run in Background, Device Information, Access Fine Location, Access Coarse Location, Access Network State, Call Phone, Camera, Internet, Process Outgoing calls, Read Call Log, Read Contacts, Read External Storage, Write External Storage, Read Phone State, Read SMS, Receive SMS, Send SMS, Receive Boot Completed, Record Audio, Wake Lock, Write Secure Settings, Write Settings, Read History Bookmarksandroid.hardware.camera, android.permission.CAMERA, android.permission.INTERNET, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_LOGS, android.permission.READ_PHONE_STATE, android.permission.RECORD_AUDIO, android.permission.WRITE_EXTERNAL_STORAGEcom.twygonik.sketchyappv2ccaadb7230edac9acbed0ab4a2e8035f1198b9129098890ed7633f7a75aa63020560.000318678.3817224115.3111,5743.864.180.922.7965.65538.395https://github.com/twaluigi/Sketchyappv2
55
RAT:AndroidOS/TalentRATTalentRAT, TalRAT, AssassinIt sends the following information to a server via a socket: device information, SMS, contacts, gps coordinates, calling history, pictures, videos and audio. It also allows to send specific SMS, perform fake screen presses, turn screen on, and play media.Kotlin, Java132019YesRATSpyware, RAT, C2, Botnet, Clicker, Billing-Fraud, Backdoor?Remote Data Exfiltration, Bot, Check Screen Locked, Click Spoofing, Input Injection, Periodical Connection With Server, Turn Screen On, Device Information, Set Alarm, Media Player, Create Files, Upload Files, Camera, Access Coarse Location, Access Fine Location, Access Network State, Access Wifi State, Bind Accessibility Service, Call Phone, Foreground Service, Internet, Read Call Log, Read Contacts, Read External Storage, Write External Storage, Read Phone Numbers, Read Phone State, Read SMS, Receive SMS, Send SMS, Write SMS, Record Audio, Wake Lock, Write Contactsandroid.hardware.camera, android.hardware.camera2.autofocus, android.hardware.camera2.full, android.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.ACCESS_WIFI_STATE, android.permission.BIND_ACCESSIBILITY_SERVICE, android.permission.CALL_PHONE, android.permission.CAMERA, android.permission.FOREGROUND_SERVICE, android.permission.INTERNET, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_NUMBERS, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_SMS, android.permission.RECORD_AUDIO, android.permission.SEND_SMS, android.permission.WAKE_LOCK, android.permission.WRITE_CONTACTS, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.WRITE_SMScom.hc.calling.callingtransactionaaf67e8f2da0e41774596eb019bee9427e387fa07111c90ba0af1c0ecca033db196230.64594???6514437.5935,83415.297.052.17???https://github.com/honglvt/TalentRAT
56
RAT:AndroidOS/TearDroidTearDroid PHPApplication that runs as admin and gets gps coordinates, notifications, contacts, installed apps, SMS, call logs, running services, lists and uploads files, executes commands in a shell, uninstall apps, change wallpaper, sends SMS and makes calls.Kotlin132022YesRATSpyware, C2, Botnet, RAT, Backdoor, Elevated-Privilege-Abuse, Billing-Fraud?Run at Startup, Run in Background, Activate Admin, Privilege Escalation, Bot, Periodical Connection With Server, List Installed Apps, Set Alarm, Logging, List Files, Upload Files, Notifications, Running Services, Remote Shell, Make Notifications, Uninstall Apps, Device Information, Access Coarse Location, Access Fine Location, Bind Device Admin, Bind Job Service, Bind Notification Listener Service, Call Phone, Foreground Service, Internet, Query All Packages, Read Call Log, Read Contacts, Read External Storage, Read Phone Numbers, Read Phone State, Read Privileged Phone State, Read SMS, Receive Boot Completed, Send SMS, Set Wallpaperandroid.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.BIND_DEVICE_ADMIN, android.permission.BIND_JOB_SERVICE, android.permission.BIND_NOTIFICATION_LISTENER_SERVICE, android.permission.CALL_PHONE, android.permission.FOREGROUND_SERVICE, android.permission.INTERNET, android.permission.QUERY_ALL_PACKAGES, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_NUMBERS, android.permission.READ_PHONE_STATE, android.permission.READ_PRIVILEGED_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.SEND_SMS, android.permission.SET_WALLPAPERcom.example.teardroidv2bfa61386f3e89e220cdf5b8bc7e458cc37db70de946aa3f17b8806c1c5e5a3a074914.286654???3381950.87122,39862.8012.055.21???https://github.com/ScRiPt1337/Teardroid-phprat
57
Rootkit:AndroidOS/AdoreAdore, AdoreForAndroidAfter installing this app on a phone, Adore will be installed into the system as a kernel module, and hook system calls. By using Adore, this app can open ports on the device as backdoor, and also hide any files and ports from users.Java72014YesRootkitRootkit, BackdoorAdoreHook System Calls, Hide Files, Hide Processes, Hide Ports, Persistance, Open Ports, Privilege Escalation, Mount Filesystems, Unmount Filesystems, Set Debug App, Write Internal Storage, Write External Storageandroid.permission.MOUNT_UNMOUNT_FILESYSTEMS, android.permission.SET_DEBUG_APP, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.WRITE_INTERNAL_STORAGEcom.example.adorefb7e30bca3004bf87a3490eff7385f19a9459a818bb4b30c23de90bd0f47f391276144.26218155.00819422.0664260.982.480.398.00120.65670.559https://github.com/vxunderground/MalwareSourceCode/blob/main/Android/Android.Rootkit.Adore.7z
58
Rootkit:AndroidOS/Android-RootkitAndroid-RootkitAndroid rootkit to intercept system calls to hide and modify files and processes and deploy a reverse shell.C32015?RootkitRootkit, Backdoor, WiperPhrack Issues 68-6?Hook System Calls, Reverse Shell, Hide Files, Hide Processes, Write Files, Persistance, Modify Files, Read Files, Create Files, Create Directories, Delete Directories, Open Files, Close Files, Get Directory Entries, Delete Files, Communicate With Processes, Get Real User ID, Load Module, Unload Module--52a9a5d332d3508f0f5867b3e3d334160e361049375d949539aac26a1cc65c1f0620.000311919.0069134.4832900.652.130.311.37??https://github.com/vxunderground/MalwareSourceCode/blob/main/Android/Android.Rootkit.Self%20Titled%20Project%201.7z
59
Rootkit:AndroidOS/MindtrickMindtrickAndroid rootkit to intercept system calls to hide modules and deploy a reverse shell when a call from a specific number is received.C12015?RootkitRootkit, BackdoorMindtrickHook System Calls, Reverse Shell, Hide Modules, Persistance, Read Files--ba1441428622928cd1de637911489e079a3292036ce486a19527f1aeea3785430510.0001155.001668.824680.141.190.121.40??https://github.com/vxunderground/MalwareSourceCode/blob/main/Android/Android.Rootkit.Mindtrick.7z
60
Rootkit:AndroidOS/Rootkit-AndroidRootkit-AndroidAndroid rootkit to intercept system calls to hide files and processes.C42018?RootkitRootkitPhrack Issues 68-6?Hook System Calls, Persistance, Hide Files, Hide Processes, File Information, Read Files, Get Directory Entries--68be72a6e4d5ee6737a10d219679ea7279402a37881ee4b6d7cda8554fb532520620.0004177.00210151.3751,0912.633.610.732.86??https://github.com/n00d1e5/Rootkit-Android
61
Rootkit:AndroidOS/WhitesnowWhitesnowAndroid rootkit to intercept system calls to deploy a reverse shell when a SMS from a specific number is received.C22013?RootkitRootkit, BackdoorWhitesnowHook System Calls, Reverse Shell, Open Files, Read Files, Write Files, Close Files, Get Real User ID--e1804d6745d4e0fad46e6960cf616709642d6e14d923aaf547f0cdb66cf4b9280630.000211010.00492212.7911720.381.730.222.00??https://github.com/vxunderground/MalwareSourceCode/blob/main/Android/Android.Rootkit.Whitesnow.7z
62
Scareware:AndroidOS/CardCardApplication that pretends to steal contacts, emails, whatsapp messages, etc. when in fact it does nothing.Java22021?ScarewareScareware?Variable Names Obfuscation, Function Names Obfuscation, Make Toasts, Timer?com.my.newproject27315f538454b59f0eb930b078965f3d81e9774942a1ed73f38c6e40da54df5eb0600.000769816.3315500.0007851.863.170.591.1783.84249.030https://github.com/Black-Hell-Team/sppen/tree/main/Mobile/Card
63
Spyware:AndroidOS/AndroidMalwareAppAndroidMalwareAppSends incoming SMS to server.Java72019?SpywareSpyware, Botnet?Remote Data Exfiltration, Bot, Run in Background, Internet, Read Phone State, Broadcast SMS, Read SMS, Receive SMS, Broadcast WAP PUSH, Send Respond Via Messageandroid.permission.BROADCAST_SMS, android.permission.BROADCAST_WAP_PUSH, android.permission.INTERNET, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_SMS, android.permission.SEND_RESPOND_VIA_MESSAGEcom.example.malwareapp15fb1b59bc71f234ff97ba9be830d24698bfc0a14b8b10de027ce702d37ca6e60600.000299303.33109789.1668512.033.270.622.00102.27259.808https://github.com/dotzip/AndroidMalwareApp
64
Spyware:AndroidOS/Child-SpyzierChild-SpyzierParent Control application that sends screen recordings to a database server and displays incoming messages as notifications.Java82021?SpywareSpyware, Botnet?Remote Data Exfiltration, Bot, Run in Background, Record Screen, Internet, Read External Storage, Write External Storage, Vibrate, Wake Lockandroid.permission.INTERNET, android.permission.READ_EXTERNAL_STORAGE, android.permission.VIBRATE, android.permission.WAKE_LOCK, android.permission.WRITE_EXTERNAL_STORAGEcom.rana_aditya.child51b8fbe4d05772a183e7670c2d0f0cfd78c3e6173eedf28001e48ba92e7a69ec0600.000319515.67253796.4121,2322.993.790.791.4990.79153.094https://github.com/ranaaditya/Child-SPYZIER-APP
65
Spyware:AndroidOS/DashDashThis is an Android Spyware App which uploads user data such as Contacts, Messages, Call log & recordings, Send messages, Photos, Videos, etc. It is intended for parents that want to monitor their children.Kotlin, Java82022?SpywareSpyware, Keylogger, Locker, Botnet, C2, Billing-FraudIsTheAppRemote Data Exfiltration, Privilege Escalation, Lock Device, Icon Hiding, Stealth, Draw Over other Apps, Bot, Run in Background, Run at Startup, Bind Notification Listener Service, Keystrokes Monitoring, Input Capture, WhatsApp, Instagram, Messenger, Upload Files, Camera, Access Fine Location, Access Network State, Bind Accessibility Service, Broadcast SMS, Read SMS, Receive SMS, Send SMS, Write SMS, Call Phone, Capture Audio Output, Internet, Kill Background Processes, Package Usage Stats, Process Outgoing Calls, Read Contacts, Read External Storage, Write External Storage, Read Phone State, Receive Boot Completed, Record Audio, Request Ignore Battery Optimizations, System Alert Window, Vibrateandroid.hardware.camera, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.BIND_ACCESSIBILITY_SERVICE, android.permission.BIND_NOTIFICATION_LISTENER_SERVICE, android.permission.BROADCAST_SMS, android.permission.CALL_PHONE, android.permission.CAMERA, android.permission.CAPTURE_AUDIO_OUTPUT, android.permission.INTERNET, android.permission.KILL_BACKGROUND_PROCESSES, android.permission.PACKAGE_USAGE_STATS, android.permission.PROCESS_OUTGOING_CALLS, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.RECORD_AUDIO, android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS, android.permission.SEND_SMS, android.permission.SYSTEM_ALERT_WINDOW, android.permission.VIBRATE, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.WRITE_SMScom.github.muneebwanee.dashf08163ed4e269805f9be93de0fea715cdf3c4a25a0579b50aed5c54ff7005e860620.00034322?2,7796214.16414,91240.9710.254.001.00102.893?https://github.com/muneebwanee/Dash
66
Spyware:AndroidOS/DataFactoryResetDataFactoryResetReads the logs of the device.Java12021?SpywareSpyware?Local Data Exfiltration, Read Logs, Variable Names Obfuscation, Function Names Obfuscation, Make Toasts?dumal.netc4ae598656316bed7186b63e628ef24460931dd942bb83fa4c88ffdfa65d97490600.00077344.865100.0003450.792.280.341.3881.32147.556https://github.com/Black-Hell-Team/sppen/tree/main/Mobile/DataFactoryReset
67
Spyware:AndroidOS/DobermannDobermann WatcherAndroid app to monitor device notifications. It has the ability to update itself by downloading and installing an updated APK.Java92018?SpywareSpyware, Downloader?Local Data Exfiltration, Run at Startup, Run in Background, Download Files, Update App, Install App, Bind Notification Listener Service, Receive Boot Completed, Write External Storageandroid.permission.BIND_NOTIFICATION_LISTENER_SERVICE, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.WRITE_EXTERNAL_STORAGEcom.bioverflow.dobermann.admin, com.bioverflow.dobermann.clientf9751a61487676762c6b7c66c45ffd10942f08561a333f22b63b873e1a8cad750600.0004816674.1924114810.3211,4343.504.030.871.8890.28552.798https://github.com/bioverflow/Dobermann
68
Spyware:AndroidOS/GetFilesApps_GetFiles, ShotdroidExtracts files from internal and external storage and sends it to a server.Java72021?SpywareBotnet, Spyware, Backdoor?Remote Data Exfiltration, Reverse Connection, Internet, Write External Storageandroid.permission.INTERNET, android.permission.WRITE_EXTERNAL_STORAGEcom.getfiles033e2951058b0f134980ae9771256e1dfd1cecf404f377e9b7a08cde84b8ef280610.000273165.3377729.4997581.793.120.572.0029.92317.499https://github.com/kp300/shotdroid/tree/master/Apps_GetFiles
69
Spyware:AndroidOS/IsTheAppIsTheAppThis is an Android Spyware App which uploads user data such as Contacts, Messages, Call log & recordings, Send messages, Photos, Videos, etc. It is intended for parents that want to monitor their children.Kotlin, Java72020?SpywareSpyware, Keylogger, Locker, Botnet, C2, Billing-FraudIsTheAppRemote Data Exfiltration, Privilege Escalation, Lock Device, Icon Hiding, Stealth, Draw Over other Apps, Bot, Run in Background, Run at Startup, Bind Notification Listener Service, Keystrokes Monitoring, Input Capture, WhatsApp, Instagram, Messenger, Upload Files, Camera, Access Fine Location, Access Network State, Bind Accessibility Service, Broadcast SMS, Read SMS, Receive SMS, Send SMS, Write SMS, Call Phone, Capture Audio Output, Internet, Kill Background Processes, Package Usage Stats, Process Outgoing Calls, Read Contacts, Read External Storage, Write External Storage, Read Phone State, Receive Boot Completed, Record Audio, Request Ignore Battery Optimizations, System Alert Window, Vibrateandroid.hardware.camera, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.BIND_ACCESSIBILITY_SERVICE, android.permission.BIND_NOTIFICATION_LISTENER_SERVICE, android.permission.BROADCAST_SMS, android.permission.CALL_PHONE, android.permission.CAMERA, android.permission.CAPTURE_AUDIO_OUTPUT, android.permission.INTERNET, android.permission.KILL_BACKGROUND_PROCESSES, android.permission.PACKAGE_USAGE_STATS, android.permission.PROCESS_OUTGOING_CALLS, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.RECORD_AUDIO, android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS, android.permission.SEND_SMS, android.permission.SYSTEM_ALERT_WINDOW, android.permission.VIBRATE, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.WRITE_SMScom.github.midros.istheapp2d14d7178886672d838c186ac780f856bac64da7d75173ce5bcb6a21e4efdce50620.000342???2,7756204.16114,89940.9310.243.99???https://github.com/M1Dr05/IsTheApp
70
Spyware:AndroidOS/Java-SpywareJava-spywareSend all contacts and SMS to a remote database.Java, C++112022?SpywareSpyware, Botnet?Remote Data Exfiltration, Bot, Data Encryption, Data Decryption, Run at Startup, Bind Notification Listener Service, Internet, Read Contacts, Read External Storage, Read SMS, Receive SMS, Receive Boot Completedandroid.permission.BIND_NOTIFICATION_LISTENER_SERVICE, android.permission.INTERNET, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMScom.test.myapplication97db2b8b29d83cc7195ad4e16be2b9ac070bf80392897f5dc4935b73166448150620.0003915543.6031823217.3781,3353.253.910.831.9487.13050.953https://github.com/komen205/java-backdoor
71
Spyware:AndroidOS/POC-Android-MalwarePOC Android Malware.A simple android malware uploading contacts, call logs and SMS to remote server.Java52017?SpywareSpyware, Botnet?Run at Startup, Bot, Device Information, Access Wifi State, Change Wifi State, Internet, Read Contacts, Read Phone State, Read SMS, Receive Boot Completed, Wake Lockandroid.permission.ACCESS_WIFI_STATE, android.permission.CHANGE_WIFI_STATE, android.permission.INTERNET, android.permission.READ_CONTACTS, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.WAKE_LOCKcom.attify.pocmalwareda0270e506f33b8ead69d662dc1307f9f8323ad2c744b5a629a07834fcceb4530590.0001822311.50909321.8824250.982.480.391.96108.71963.578https://github.com/LeetCodes/POC-Android-Malware
72
Spyware:AndroidOS/Spy-AppAndroid-Undetectable-Spy-AppIt fetches all notifications in real time and Whatsapp and Instagram messages and sends them to a Firebase database. Java82019?SpywareSpyware, Botnet?Remote Data Exfiltration, Run in Background, Bot, Icon Hiding, Stealth, Device Information, WhatsApp, Bind Accessibility Service, Bind Notification Listener Service, Write External Storageandroid.permission.BIND_ACCESSIBILITY_SERVICE, android.permission.BIND_NOTIFICATION_LISTENER_SERVICE, android.permission.WRITE_EXTERNAL_STORAGEin.spyapp.patanjali.androide75eb472308f6cf83db5c53db7193d2dee04b4cb57e3f5068369b3fced2897a50620.000268364.5028725024.6311,0152.443.510.702.8681.42647.618https://github.com/patanjalikr13/Android-Undetectable-Spy-App
73
Spyware:AndroidOS/SpyAppClientSpyApp ClientSends contacts, call logs and recieved and sent SMS to a FireBase database. Can also send SMS.Java92017?SpywareSpyware, Botnet, Billing-Fraud?Remote Data Exfiltration, Bot, Run at Startup, Run in Background, Icon Hiding, Stealth, Access Fine Location, Access Network State, Bind Notification Listener Service, Call Phone, Camera, Internet, Process Outgoing Calls, Read Call Log, Read Contacts, Write Contacts, Read Phone State, Read SMS, Receive SMS, Send SMS, Receive Boot Completed, Record Audio, System Alert Window, Wake Lock, Write External Storage, Vibrateandroid.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.BIND_NOTIFICATION_LISTENER_SERVICE, android.permission.CALL_PHONE, android.permission.CAMERA, android.permission.INTERNET, android.permission.PROCESS_OUTGOING_CALLS, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.RECORD_AUDIO, android.permission.SEND_SMS, android.permission.SYSTEM_ALERT_WINDOW, android.permission.VIBRATE, android.permission.WAKE_LOCK, android.permission.WRITE_CONTACTS, android.permission.WRITE_EXTERNAL_STORAGEcom.example.ghazi.smsff87b6b288d59585355bb23b6e45ad87f41c90a505a0e1133a7d986db4631db80580.000311115113.7340220010.8641,8414.564.451.021.6489.84352.540https://github.com/ghazikr/SpyAppClient
74
Spyware:AndroidOS/TrojanDemoTrojanDemoExfiltrates the account database of an app called Renren, containing the account, name, password, uid, last login time, etc. Also has the ability to read data from the sdcard, downloaded files, contacts, call logs, SMS and forge a received SMS.Java82014?SpywareSpyware, Password-Stealing-Ware, Elevated-Privilege-Abuse?Local Data Exfiltration, Stealth, Read Files, Open Files, List Files, Delete Files, File Decryption, Root Check, Credential Theft, Root Shell, Mount Filesystems, Unmount Filesystems, Read Call Log, Write Call Log, Read Contacts, Write Contacts, Read External Storage, Write External Storage, Read SMSandroid.permission.MOUNT_UNMOUNT_FILESYSTEMS, android.permission.READ_CALL_LOG, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_SMS, android.permission.WRITE_CALL_LOG, android.permission.WRITE_CONTACTS, android.permission.WRITE_EXTERNAL_STORAGEcom.singuloid.trojandemo4a6c7ca64a7efccaf3f1247795f9515def1eda0664c29bd019fd5da120a24a720600.0005315885.873281376.0012,2835.714.851.182.3248.11428.137https://github.com/IceDcap/TrojanDemo
75
Spyware:AndroidOS/UpdateServiceAndroidRAT, updateServiceConnects to the server to check what data to exfiltrate from the following: browser history, contacts, GPS and SMS.Java82013?SpywareSpyware, C2, Botnet?Remote Data Exfiltration, Run at Startup, Run in Background, Bot, Device Information, Receive Boot Completed, Access Coarse Location, Access Fine Location, Access GPS, Access Location, Internet, Read Contacts, Read Phone State, Read SMS, Receive Boot Completed, Wake Lock, Write External Storage, Read History Bookmarksandroid.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_GPS, android.permission.ACCESS_LOCATION, android.permission.INTERNET, android.permission.READ_CONTACTS, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.WAKE_LOCK, android.permission.WRITE_EXTERNAL_STORAGE, com.android.browser.permission.READ_HISTORY_BOOKMARKScom.android.updateServicef448bde781feb754d7727319fe60d900995e64b15ee5c97a0f52cbc869857692196330.1594112695.7533031513.4102,3495.884.901.201.99110.39464.558https://github.com/ibrahimbalic/androidrat
76
Trojan:AndroidOS/FakeFacebookFakeFacebookAndroidAn example of a possible malware app pretending to be a legitimate Facebook update.Java42013?TrojanTrojan?--com.feigdev.fakefacebook9eeb54444b4020b1598ace14e68aca964248895c45bb3455b18ce356d7363f5b0600.00016122.00354425.5811720.381.730.221.00157.38292.036https://github.com/emil10001/FakeFacebookAndroid
77
Trojan-Backdoor:AndroidOS/DarkSilentdark.silentIt is a trojan that sends device information and receives back a payload in json format that requests to download a file, with a hash to check its integrity. Lastly, decompresses the file and executes the code found in it.Java12018YesTrojan-BackdoorC2, Botnet, Trojan, Downloader, Dropper, BackdoorDarkSilentRemote Data Exfiltration, Bot, Remote Code Execution, Create Files, Delete Files, Copy Files, Download Files, Upload Files, Integrity Check, Data Encoding, Data Decoding, Compress Files, Decompress Files, Device Information, Access Coarse Location, Access Fine Location, Access Network State, Access Wifi State, Download WIthout Notification, Internet, Change Wifi State, System Alert Window, Write External Storageandroid.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.ACCESS_WIFI_STATE, android.permission.DOWNLOAD_WITHOUT_NOTIFICATION, android.permission.INTERNET, android.permission.CHANGE_WIFI_STATE, android.permission.SYSTEM_ALERT_WINDOW, android.permission.WRITE_EXTERNAL_STORAGEdark.silent37aa787c7a2d0be0521e621e2c04cbc062264bb0e5d71a1e67a79d6a30abe6370600.00099293.225040.6446211.462.880.504.0098.91457.844https://github.com/cweiske/dark.silent/tree/master/readable/dark/silent
78
Trojan-Backdoor:AndroidOS/DarkSilent.Obfuscateddark.silentIt is an obfuscated trojan that sends device information and receives back a payload in json format that requests to download a file, with a hash to check its integrity. Lastly, decompresses the file and executes the code found in it.Java12018YesTrojan-BackdoorC2, Botnet, Trojan, Downloader, DropperDarkSilentRemote Data Exfiltration, Bot, Variable Names Obfuscation, Function Names Obfuscation, Remote Code Execution, Create Files, Delete Files, Copy Files, Download Files, Upload Files, Integrity Check, Data Encoding, Data Decoding, Compress Files, Decompress Files, Device Information, Access Coarse Location, Access Fine Location, Access Network State, Access Wifi State, Download WIthout Notification, Internet, Change Wifi State, System Alert Window, Write External Storageandroid.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.ACCESS_WIFI_STATE, android.permission.DOWNLOAD_WITHOUT_NOTIFICATION, android.permission.INTERNET, android.permission.CHANGE_WIFI_STATE, android.permission.SYSTEM_ALERT_WINDOW, android.permission.WRITE_EXTERNAL_STORAGEdark.silent4e5eaa154b657f7912e1a23496b0d4ea22f5906d3329101efafc4df39c4445300620.00099293.224600.0006251.472.890.514.0083.04948.567https://github.com/cweiske/dark.silent/tree/master/obfuscated/dark/silent
79
Trojan-Banker:AndroidOS/Anubis.bAnubis, BankBot, BankSpyThis sandbox aware malware sends information using encrypted traffic with user and password and receives commands for recording and streaming audio, device information, open URLs, update the app, replace C2 URL (backup servers for redundancy, URLs obtained from Twitter), add a USSD, set a VNC backdoor, activate the admin, load classes at runtime, get GPS coordinates, read, send, intercept, block and delete SMS, log keystrokes, open apps, reset system, proxy HTTP traffic, perform ransomware through file encryption and decrypt them, spoof clicks, get screenshots, list and inject into running processes, get the top app, forward calls, upload files, uninstall itself, disable Play Protect, and more. It also checks the installed apps against a list of hardcoded targeted apps, mainly banking, crypto and online shopping apps to load a similar looking view over the app in an overlay attack to perform a phishing attempt to steal credentials.Java182019YesTrojan-BankerSpyware, C2, Trojan, RAT, Botnet, Keylogger, Clicker, Spam, Encryption-Ransomware, Screen-Locking-Ransomware, Downloader, Loader, Locker, Phishing, Overlay, Proxy, Backdoor, Password-Stealing-Ware, Elevated-Privilege-Abuse, Billing-FraudAnubisRemote Data Exfiltration, Run at Startup, Run in Background, Bot, Credential Theft, Sandbox Aware, File Encryption, File Decryption, VNC Backdoor, Encrypted Traffic, RC4 Encryption, Data Encoding, Data Decoding, Accelerometer Sensors, Persistance, Replace C2 URL, Backup Servers, Open URL, Stream Audio, Update App, HTTP forwarding, Volume, Load Classes at Runtime, Send SMS Spam, Hardcoded List of Targeted Apps, Target Banking Apps, Target Crypto Apps, Target Shopping Apps, Overlay, Multiple Languages, Add USSD, Twitter Communication, Disable Play Protect, List Running Processes, Top App, Process Injection, Open Apps, Doze Mode, Device Information, Click Spoofing, Input Injection, Vibrate, Lock Device, Persist on Screen, Draw Over Other Apps, Check Screen Locked, SMS Manager Change, Connectivity Check, Keystrokes Monitoring, Input Capture, Reset System, Alarm, Periodical, Screenshot, Uninstall Itself, Create Files, Read Files, Clear Files, Write Files, Delete Files, Search Files, List Files, Upload Files, Download Files, Logging, Make Notifications, Dialogs, Events, List Installed Apps, List Granted Permissions, Activate Admin, Check Admin, Privilege Escalation, Access Fine Location, Access Network State, Bind Accessibility Service, Broadcast WAP PUSH, Call Phone, Get Tasks, Internet, Package Usage Stats, Read Contacts, Read External Storage, Write External Storage, Read Phone State, Broadcast SMS, Read SMS, Receive SMS, Send SMS, Write SMS, Receive Boot Completed, Record Audio, Request Ignore Battery Optimizations, Send Respond Via Message, System Alert Window, Wake Lockandroid.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.BIND_ACCESSIBILITY_SERVICE, android.permission.BROADCAST_SMS, android.permission.BROADCAST_WAP_PUSH, android.permission.CALL_PHONE, android.permission.GET_TASKS, android.permission.INTERNET, android.permission.PACKAGE_USAGE_STATS, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.RECORD_AUDIO, android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS, android.permission.SEND_RESPOND_VIA_MESSAGE, android.permission.SEND_SMS, android.permission.SYSTEM_ALERT_WINDOW, android.permission.WAKE_LOCK, android.permission.WRITE_EXTERNAL_STORAGE, android.permission.WRITE_SMSanubis.bot.myapplication92c5e53709075b26be311863bffdbd515ad8916cc4b74176fed69f8b5ff7ceef174934.694814704306.1417,84211,2907.447151,595467.6625.8518.093.7369.35540.558https://github.com/vxunderground/MalwareSourceCode/blob/main/Android/Android.Anubis.b.7z
80
Trojan-Banker:AndroidOS/CerberusCerberus, CerbuserThis Banking Trojan connects to a C2 server through an encrypted socket and it is able to steal 2FA tokens using SMS and google authenticator, grant permissions to itself, steal emails, get, block, intercept, and send SMS, lock the device, encrypt files and ask for a ransom, overlay a view over a certain list of hardcoded apps and perform phishing attacks, replace the C2 URL if it is down, open URL, download updates and modules, load classes at runtime, disable Play Protect, install and uninstall apps, lock the device, log keystrokes, activate admin, spoof clicks, prevent app removal, get contacts, and more.Java162020YesTrojan-BankerSpyware, C2, Trojan, RAT, Backdoor, Botnet, Encryption-Ransomware, Screen-Locking-Ransomware, Phishing, Overlay, Loader, Locker, Keylogger, Clicker, Downloader, Password-Stealing-Ware, Elevated-Privilege-Abuse, Billing-FraudCerberusRemote Data Exfiltration, Run at Startup, Run in Background, Bot, Credential Theft, 2FA Theft, Process Injection, Overlay, Persist on Screen, Draw Over Other Apps, Hardcoded List of Targeted Apps, Target Banking Apps, Target Card Apps, Target Email Apps, Device Information, Schedule Tasks, Global Actions, Replace C2 URL, Backup Servers, Get Google Authenticator, Play Protect Running Check, Disable Play Protect, Logging, Get Emails, Accelerometer Sensors, Open URL, Add USSD, Grant Permissions, Doze Mode, Load Classes at Runtime, List Installed Apps, Keystrokes Monitoring, Click Monitoring, Input Capture, Volume, Persistance, Update App, File Encryption, File Decryption, RC4 Encryption, Data Encoding, Data Decoding, Lock Device, Make Notifications, Make Toasts, Dialogs, Multiple Languages, Encrypted Traffic, Alarm, Press Button, List Granted Permissions, Activate Admin, Deactivate Admin, Check Admin, Privilege Escalation, Click Spoofing, Input Injection, Create Files, Delete Files, Download Files, Install Apps, Uninstall Apps, Uninstall Itself, Prevent App Removal, Block by Several Back Button Presses, Check Screen Locked, Open Apps, SMS Manager Change, Play Protect Running Check, Disable Play Protect, Logging, Bind Accessibility Service, Bind Device Admin, Broadcast WAP PUSH, Call Phone, Internet, Read Contacts, Read Phone State, Broadcast SMS, Read SMS, Receive SMS, Send SMS, Receive Boot Completed, Request Delete Packages, Request Ignore Battery Optimizations, Send Respond Via Message, Wake Lock, Install Shortcutandroid.permission.BIND_ACCESSIBILITY_SERVICE, android.permission.BIND_DEVICE_ADMIN, android.permission.BROADCAST_SMS, android.permission.BROADCAST_WAP_PUSH, android.permission.CALL_PHONE, android.permission.INTERNET, android.permission.READ_CONTACTS, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.REQUEST_DELETE_PACKAGES, android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS, android.permission.SEND_RESPOND_VIA_MESSAGE, android.permission.SEND_SMS, android.permission.WAKE_LOCK, com.android.launcher.permission.INSTALL_SHORTCUTcom.example.mmm, com.example.modulebote63f068af816d5163b3b4b1c31c043551e36990b4a9f587059f87329de6784d573818.421914422425.7619,2513,3611.527220,173692.0130.0023.062.9783.80749.010https://github.com/vxunderground/MalwareSourceCode/tree/087e41d5b81376a057d706f9d3586227419f3bf8/Leaks/Android/Android.Cerberus
81
Trojan-Banker:AndroidOS/Cerberus.dCerberus, CebruserThis Banking Trojan connects to a C2 server through an encrypted socket and it is able to steal 2FA tokens using SMS and google authenticator, grant permissions to itself, get, block, intercept, and send SMS, lock the device, encrypt files and ask for a ransom, overlay a view over a certain list of hardcoded apps and perform phishing attacks, open URL, replace the C2 URL if it is down, download updates and modules, load classes at runtime, disable Play Protect, install and uninstall apps, lock the device, log keystrokes, activate admin, spoof clicks, prevent app removal, get contacts, and more.Java92021YesTrojan-BankerSpyware, C2, Trojan, RAT, Backdoor, Botnet, Encryption-Ransomware, Screen-Locking-Ransomware, Clicker, Phishing, Overlay, Locker, Downloader, Loader, Keylogger, Password-Stealing-Ware, Elevated-Privilege-Abuse, Billing-FraudCerberusRemote Data Exfiltration, Run at Startup, Run in Background, Bot, Credential Theft, 2FA Theft, Process Injection, Overlay, Persist on Screen, Draw Over Other Apps, Open URL, Replace C2 URL, Backup Servers, Get Google Authenticator, Play Protect Running Check, Disable Play Protect, Global Actions, Schedule Tasks, File Encryption, File Decryption, RC4 Encryption, Alarm, Hardcoded List of Targeted Apps, Target Banking Apps, Target Card Apps, Target Email Apps, Device Information, Create Files, Write Files, Download Files, Update App, Load Classes at Runtime, Data Encoding, Data Decoding, Keystrokes Monitoring, Click Monitoring, Input Capture, Lock Device, Open Apps, Volume, Click Spoofing, Input Injection, Grant Permissions, Encrypted Traffic, Check Screen Locked, Press Button, Uninstall Apps, Uninstall Itself, Prevent App Removal, Activate Admin, Deactivate Admin, Check Admin, Privilege Escalation, Block by Several Back Button Presses, List Granted Permissions, SMS Manager Change, Multiple Languages, Persistance, Doze Mode, Make Toasts, Dialogs, Accelerometer Sensors, Bind Accessibility Service, Bind Device Admin, Broadcast WAP PUSH, Call Phone, Internet, Read Contacts, Read Phone State, Broadcast SMS, Read SMS, Receive SMS, Send SMS, Receive Boot Completed, Request Delete Packages, Request Ignore Battery Optimizations, Send Respond Via Message, Wake Lockandroid.permission.BIND_ACCESSIBILITY_SERVICE, android.permission.BIND_DEVICE_ADMIN, android.permission.BROADCAST_SMS, android.permission.BROADCAST_WAP_PUSH, android.permission.CALL_PHONE, android.permission.INTERNET, android.permission.READ_CONTACTS, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.REQUEST_DELETE_PACKAGES, android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS, android.permission.SEND_RESPOND_VIA_MESSAGE, android.permission.SEND_SMS, android.permission.WAKE_LOCKcom.example.mmmd0434194da86bb491c8fe0e95ad0410df69da215a191fea6c88eec6ab4455849336154.098152291756.031,6094164.6169,01224.148.382.882.7888.84451.956https://github.com/vxunderground/MalwareSourceCode/blob/main/Android/Android.Cerberus.d.rar
82
Trojan-Banker:AndroidOS/Cerberus.kCerberus, CebruserThis Banking Trojan connects to a C2 server through an encrypted socket (two encryption algorithms) and it is able to steal 2FA tokens using SMS and google authenticator, avoid antivirus software, grant permissions to itself, get, block, intercept, and send SMS, lock the device, encrypt files and ask for a ransom, overlay a view over a certain list of hardcoded apps and perform phishing attacks, open URL, replace the C2 URL if it is down, download updates and modules, load classes at runtime, disable Play Protect, install and uninstall apps, lock the device, log keystrokes, activate admin, spoof clicks, prevent app removal, get contacts, and more.Java162021YesTrojan-BankerSpyware, C2, Trojan, Backdoor, RAT, Botnet, Encryption-Ransomware, Screen-Locking-Ransomware, Clicker, Phishing, Overlay, Locker, Downloader, Loader, Keylogger, Password-Stealing-Ware, Elevated-Privilege-Abuse, Billing-FraudCerberusRemote Data Exfiltration, Run at Startup, Run in Background, Bot, Credential Theft, 2FA Theft, Antivirus Evasion, Open URL, Make Notifications, File Encryption, File Decryption, RC4 Encryption, AES Encryption, Encrypted Traffic, Replace C2 URL, Backup Servers, Global Actions, Data Encoding, Data Decoding, Click Spoofing, Input Injection, Create Files, Write Files, Download Files, Update App, Load Classes at Runtime, Alarm, Grant Permissions, Process Injection, Overlay, Persist on Screen, Draw Over Other Apps, Hardcoded List of Targeted Apps, Target Banking Apps, Target Card Apps, Target Email Apps, List Granted Permissions, Connectivity Check, Change Wifi State, Press Button, Uninstall Apps, Uninstall Itself, Prevent App Removal, Block by Several Back Button Presses, Check Screen Locked, Lock Device, Get Google Authenticator, Play Protect Running Check, Disable Play Protect, Schedule Tasks, Keystrokes Monitoring, Click Monitoring, Input Capture, Volume, Make Toasts, Dialogs, Activate Admin, Deactivate Admin, Check Admin, Privilege Escalation, Device Information, Logging, Persistance, Doze Mode, Multiple Languages, SMS Manager Change, Accelerometer Sensors, Access Network State, Bind Accessibility Service, Bind Device Admin, Bind Job Service, Broadcast WAP PUSH, Call Phone, Internet, Read Contacts, Read Phone State, Broadcast SMS, Read SMS, Receive SMS, Send SMS, Receive Boot Completed, Request Delete Packages, Request Ignore Battery Optimizations, Send Respond Via Message, Wake Lock, C2DM Receive, C2DM Send, Bind Get Install Referrer Serviceandroid.permission.ACCESS_NETWORK_STATE, android.permission.BIND_ACCESSIBILITY_SERVICE, android.permission.BIND_DEVICE_ADMIN, android.permission.BIND_JOB_SERVICE, android.permission.BROADCAST_SMS, android.permission.BROADCAST_WAP_PUSH, android.permission.CALL_PHONE, android.permission.INTERNET, android.permission.READ_CONTACTS, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.REQUEST_DELETE_PACKAGES, android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS, android.permission.SEND_RESPOND_VIA_MESSAGE, android.permission.SEND_SMS, android.permission.WAKE_LOCK, com.google.android.c2dm.permission.RECEIVE, com.google.android.c2dm.permission.SEND, com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICEcom.example.mmmb366031bf5ef9119f00752653e25752dd96e5494ff92b0695853860e195228c5255248.077507773875.0310,7457,3055.598130,485399.5324.3516.412.0576.57644.781https://github.com/vxunderground/MalwareSourceCode/blob/main/Android/Android.Cerberus.k.7z
83
Trojan-Banker:AndroidOS/DefensorIdDefensorIdBanking Trojan with a firebase database that can read text displayed on screen, which allows the app to steal SMS and emails, private keys, 2FA codes, etc. It modifies the screen timeout to have time to perform it's neferious activities, as it does not have capabilities to unlock the device. It receives commands to start and stop the service, perform global actions (back, home, recents, notifications), open apps, list installed apps, perform clicks and swipes, etc.Java142020YesTrojan-BankerSpyware, Botnet, C2, Trojan, ClickerDefensorIdRemote Data Exfiltration, Run at Startup, Run in Background, Credential Theft, 2FA Theft, Bot, Click Spoofing, Input Injection, Swipe Spoofing, Press Button, Global Actions, Open Apps, Hide Apps, Screen Text Capture, Input Capture, List Installed Apps, Uninstall Apps, Strings Obfuscation, Device Information, Make Toasts, Set Screen Timeout, Alert, Dialogs, Open URL, Access Network State, Bind Accessibility Service, Bind Job Service, Foreground Service, Internet, Request Delete Package, System Alert Window, System Overlay Window, Wake Lock, Write Setting, C2DM Receive, C2DM Send, Bind Get Install Referrer Serviceandroid.permission.ACCESS_NETWORK_STATE, android.permission.BIND_ACCESSIBILITY_SERVICE, android.permission.BIND_JOB_SERVICE, android.permission.FOREGROUND_SERVICE, android.permission.INTERNET, android.permission.REQUEST_DELETE_PACKAGES, android.permission.SYSTEM_ALERT_WINDOW, android.permission.SYSTEM_OVERLAY_WINDOW, android.permission.WAKE_LOCK, android.permission.WRITE_SETTINGS, com.google.android.c2dm.permission.RECEIVE, com.google.android.c2dm.permission.SEND, com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICEcom.client.teach.education8fb162835e8f503dfcf2761138a430787003ffe4f307bee1a9e3f76a16761cfa64812.50056777010.0013,61419,38617.547110,480335.4722.7914.722.6783.76848.987https://github.com/vxunderground/MalwareSourceCode/blob/main/Android/Android.DefensorId.7z
84
Trojan-Banker:AndroidOS/GmBotGMBot, SlemBunk, Bankosy, Acecard, Slempo and MazarBotBanking Trojan that targets specific email, card, social media, shopping and banking applications to overlay a window in order to steal credentials, billing and card information. It also sends user, phone, and account information as well as a list of installed apps and crash reports. It also has functionalities to get, send and intercept SMS, forward calls, block and unblock numbers, lock the device, etc.Java112016YesTrojan-BankerSpyware, C2, Trojan, Botnet, Phishing, Overlay, Locker, Password-Stealing-Ware, Elevated-Privilege-Abuse, Billing-FraudSlempoRemote Data Exfiltration, Run at Startup, Run in Background, Bot, Credential Theft, Icon Hiding, Stealth, Lock Device, Persistance, Process Injection, Overlay, Draw Over Other Apps, List Running Processes, Top App, List Installed Apps, Hardcoded List of Targeted Apps, Target Banking Apps, Target Card Apps, Target Social Media Apps, Target Email Apps, Target Shopping Apps, Check Card Validity, Check Phone Number Validity, Open URL, Schedule Tasks, Periodical Connection With Server, Add USSD, Blocked Numbers, Block Numbers, Unblock Numbers, Crash Report, Device Information, Ignore Russian Victims, Check Admin, Activate Admin, Privilege Escalation, Calendar, Alarm, Dialog, Volume, Data Encoding, Data Decoding, Access Coarse Location, Access Fine Location, Access Network State, Bind Device Admin, Call Phone, Get Tasks, Internet, Read Phone State, Read SMS, Receive SMS, Send SMS, Receive Boot Completed, System Alert Window, Wake Lockandroid.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.BIND_DEVICE_ADMIN, android.permission.CALL_PHONE, android.permission.GET_TASKS, android.permission.INTERNET, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.SEND_SMS, android.permission.SYSTEM_ALERT_WINDOW, android.permission.WAKE_LOCKorg.slempo.service827bb5c81b3992d706a787a330032eb347db8f819d98e3cc53dbdd4374e5c4a30600.000417786458.275,7258,4906.194137,079420.7624.8416.941.9597.54557.044https://github.com/vxunderground/MalwareSourceCode/blob/main/Android/Android.GmBot.rar
85
Trojan-Banker:AndroidOS/MazarBotGMBot, SlemBunk, Bankosy, Acecard, Slempo and MazarBotBanking Trojan that targets specific card and shopping applications to overlay a window in order to steal credentials, billing and card information. It also sends user, phone, and account information as well as a list of installed apps and crash reports. It also has functionalities to get, send and intercept SMS, forward calls, block and unblock numbers, wipe the device data, lock the device, etc.Java92018YesTrojan-BankerSpyware, C2, Trojan, Botnet, Phishing, Overlay, Locker, Wiper, Password-Stealing-Ware, Elevated-Privilege-Abuse, Billing-FraudSlempoRemote Data Exfiltration, Run at Startup, Run in Background, Bot, Wipe Data, Credential Theft, Persistance, Icon Hiding, Stealth, Lock Device, Process Injection, Overlay, Draw Over Other Apps, List Running Processes, Top App, List Installed Apps, Hardcoded List of Targeted Apps, Target Card Apps, Target Shopping Apps, Check Card Validity, Check Phone Number Validity, Open URL, Schedule Tasks, Periodical Connection With Server, Check Admin, Activate Admin, Privilege Escalation, Device Information, Ignore Russian Victims, Blocked Numbers, Block Numbers, Unblock Numbers, Data Encoding, Data Decoding, Calendar, Dialog, Alarm, Access Network State, Bind Device Admin, Call Phone, Get Tasks, Internet, Read Phone State, Read SMS, Receive SMS, Send SMS, Receive Boot Completed, System Alert Window, Wake Lockandroid.permission.ACCESS_NETWORK_STATE, android.permission.BIND_DEVICE_ADMIN, android.permission.CALL_PHONE, android.permission.GET_TASKS, android.permission.INTERNET, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.SEND_SMS, android.permission.SYSTEM_ALERT_WINDOW, android.permission.WAKE_LOCKorg.slempo.service1ac1b4c78517ac300c696e37a6ccdb60605e5dbfc645bb3ec2aa4ddb471df5ae226334.921311312718.744,0466,8184.254160,267495.7926.4318.761.9597.78557.184https://github.com/NBG0x1/AndroidMalware-MazarBot
86
Trojan-SMS:AndroidOS/MalRecipeTrojanRecipe, malrecipeTrojan embedded within a simple recipe book application. The trojan sends a text message from the victim android mobile phone when the recipe book application is run. This message is sent everytime the recipe book application is opened.Java82017?Trojan-SMSTrojan, Billing-Fraud?Send SMSandroid.permission.SEND_SMScom.example.malrecipefdd67bfa4f4e891bb224b2d46c987a4632ed0a15a36ad511e82e11a31176c81a0600.000315173.40807113.6545201.212.690.451.76124.66572.904https://github.com/shivenchawla/Trojan_Recipe
87
Trojan-SMS:AndroidOS/SMSListenerAndroid SMS Trojan, smslistenerAn app that receives the incoming messages and sends them back to a specific phone number.Java12015?Trojan-SMSTrojan, Spyware, Billing-Fraud?Read SMS, Receive SMS, Send SMS-com.example.smslistener05503e201c34406f2a8632865e866a4b2b2e48aa7acb4807cb36cb02931f98af0620.0004242.001700.0001200.261.500.172.50101.02759.080https://github.com/sushiomsky/ANDROID_SMS_TROJAN
88
Trojan-SMS:AndroidOS/YSPYSPSends all received SMS to the attacker via SMS.Java52016?Trojan-SMSTrojan, Spyware, Billing-Fraud?Remote Data Exfiltration, Run at Startup, Run in Background, Icon Hiding, Stealth, Read SMS, Receive SMS, Send SMS, Receive Boot Completedandroid.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.SEND_SMScom.example.yspacf2a92e7662d4ddfe2b37cbb9d338851a0fb41d5e81d9865213dee199c083340610.00023382.67685215.8053290.752.240.331.7575.31744.045https://github.com/WSAyan/ysp
89
Trojan-Spy:AndroidOS/AndroidSpyCameraAndroidSpyCameraSimple app that takes a photo and saves it without notifying the user.Java82017?Trojan-SpySpyware, Trojan?Local Data Exfiltration, Run in Background, Cameraandroid.hardware.camera, android.hardware.camera.autofocus, android.permission.CAMERAcom.twoeightnine.root.camera34e15cb6ad99fbe28e0a868a2d644bdda6c578b71eda56dc0d087d6be1b072340620.0003677911.2931154341.3871,3123.193.890.821.9574.16643.372https://github.com/TwoEightNine/AndroidSpyCamera
90
Trojan-Spy:AndroidOS/AndroidTrojanAndroidTrojanWhen a specific command is sent via WeChat, the app replies with an image that contains the contact list hidden inside it. It then deletes the chat log.Java82017?Trojan-SpySpyware, Trojan, Botnet?Remote Data Exfiltration, Bot, Run at Startup, Run in Background, Draw Over Other Apps, Image Steganography, Unlock Device, Chat Log Deletion, WeChat Event Monitor, Bind Accessibility Service, Disable Keyguard, Get Tasks, Internet, Modify Audio Settings, Mount Filesystems, Unmount Filesystems, Read Contacts, Read External Storage, Receive Boot Completed, Redorder Tasks, Wake Lock, Write External Storageandroid.permission.BIND_ACCESSIBILITY_SERVICE, android.permission.DISABLE_KEYGUARD, android.permission.GET_TASKS, android.permission.INTERNET, android.permission.MODIFY_AUDIO_SETTINGS, android.permission.MOUNT_UNMOUNT_FILESYSTEMS, android.permission.READ_CONTACTS, android.permission.READ_EXTERNAL_STORAGE, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.REORDER_TASKS, android.permission.WAKE_LOCK, android.permission.WRITE_EXTERNAL_STORAGEcom.example.gx.androidtrojand36181af63d57f6c9bd4c4b7073f630aeb5e05a10693991f44d96076e9d33eab0620.000289515.6717014214.2149992.403.490.692.3571.56441.850https://github.com/guaiyt/AndroidTrojan
91
Trojan-Spy:AndroidOS/BabyBotBabyBot, fakeappFake application that hides an Information Botnet Trojan that obtains contact lists, email accounts, SMS and device information.Kotlin82021?Trojan-SpyBotnet, C2, Trojan, Spyware, Mailfinder, Backdoor?Remote Data Exfiltration, Bot, Run in Background, Get Accounts, Internet, Read Contacts, Read SMS, Receive SMS, Write External Storageandroid.permission.GET_ACCOUNTS, android.permission.INTERNET, android.permission.READ_CONTACTS, android.permission.READ_SMS, android.permission.RECEIVE_SMS, android.permission.WRITE_EXTERNAL_STORAGEcom.company.app.fakeapp3590db1305d204af4820c0c82a143cedf2dbfeec888486306069a691e106f34e0590.000155???7512174.8174,50511.666.361.83???https://github.com/FahedHermoza/BabyBot
92
Trojan-Spy:AndroidOS/ClearChatClearChatThis has a simple login screen, but in the background will extract the victims contacts and emails and will send it to the attacker.Java102017?Trojan-SpySpyware, Trojan, Botnet, Mailfinder?Remote Data Exfiltration, Bot, Get Accounts, Read Profile, Read Contacts, Internet, Access Network Stateandroid.permission.ACCESS_NETWORK_STATE, android.permission.GET_ACCOUNTS, android.permission.INTERNET, android.permission.READ_CONTACTS, android.permission.READ_PROFILEcom.divya.mvp.clearchat73eaf6e2dd914313f0d7478f95e2c646550b5ffdd64901493ac9c549727da6981601.6675065336.602,1489,86913.59172,614215.9119.2711.201.9186.61250.650https://github.com/nithinmurali/ClearChat
93
Trojan-Spy:AndroidOS/ColumbusTrojanColumbus-trojan, cute trojan, crackappTrojan app that hides as a crack for the PowerAmp app but records audio, takes pictures, monitors location and uploads them to an Amazon S3 bucket. The it sends the location of that bucket alongside the account of the user to the server.Java82016?Trojan-SpySpyware, Trojan, Botnet, Mailfinder?Remote Data Exfiltration, Bot, Read Files, Delete Files, Upload Files, Camera, Access Fine Location, Access Network State, Get Accounts, Internet, Record Audioandroid.hardware.camera, android.hardware.camera.front, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.CAMERA, android.permission.GET_ACCOUNTS, android.permission.INTERNET, android.permission.RECORD_AUDIOco.poweramp.crackappb590af54254f063cf8c38165d882694753c6a7e61512426b5a48b86ee6f5f3b70620.0003813957.3121318712.1191,5433.784.150.911.6575.43744.115https://github.com/project-columbus/trojan
94
Trojan-Spy:AndroidOS/FlashlightFlashLightSilently logs and e-mails all incoming/outgoing calls and text messages with contact information while doubling up as a flashlight app. The app also has the ability to hide itself via a keyword using text messages and show the phones location. Java72021?Trojan-SpySpyware, Trojan, Botnet, Billing-Fraud?Remote Data Exfiltration, Run in Background, Run at Startup, Icon Hiding, Stealth, Make Toasts, Send Email, Device Information, Camera, GPS, Telephony, Touchscreen, Access Coarse Location, Access Fine Location, Flashlight, Internet, Process Outgoing Calls, Read Contacts, Read Phone State, Broadcast SMS, Read SMS, Receive SMS, Send SMS, Receive Boot Completed, Wake Lockandroid.hardware.camera, android.hardware.camera.autofocus, android.hardware.camera.flash, android.hardware.location.gps, android.hardware.telephony, android.hardware.touchscreen, android.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.BROADCAST_SMS, android.permission.CAMERA, android.permission.FLASHLIGHT, android.permission.INTERNET, android.permission.PROCESS_OUTGOING_CALLS, android.permission.READ_CONTACTS, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECEIVE_SMS, android.permission.SEND_SMS, android.permission.WAKE_LOCKcom.flash.lighta38df5a0bb77d4c65c4778e01018662b9f7b8f5f59cab812c7ffba17dcc46a100600.000264151449.602,6499,35181.59711,46031.079.233.371.7275.31444.043https://github.com/amboxer21/FlashLight
95
Trojan-Spy:AndroidOS/JawarJawarAs long as the app is installed, it records permanently with the mic and send the audios through TCP.Java82017?Trojan-SpySpyware, Trojan, Botnet?Remote Data Exfiltration, Bot, Run at Startup, Run in Background, Bind Job Service, Internet, Receive Boot Completed, Record Audioandroid.permission.BIND_JOB_SERVICE, android.permission.INTERNET, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.RECORD_AUDIOeu.davidriff.jawar43e22abc511c36bbe718efe744d6798f5df48a6da9e9d8db435a1c3cdcdd43b20620.000256233.831508214.1875781.352.800.481.8386.57050.626https://github.com/davidriff/Jawar
96
Trojan-Spy:AndroidOS/MAD-SpyMAD SpyApp comprised of services used to repack legitimate apps to add spyware functionalities, mainly keystroke and screenshot exfiltration to a firebase database.Java82019?Trojan-SpyTrojan, Spyware, Keylogger, Botnet?Remote Data Exfiltration, Run at Startup, Run in Background, Bot, Periodical Connection With Server, Create Files, Delete Files, Upload Files, Stealth, Screenshot, Keystrokes Monitoring, Click Monitoring, Input Capture, Access Network State, Bind Accessibility Service, Camera, Internet, Read External Storage, Write External Storage, Receive Boot Completedandroid.permission.ACCESS_NETWORK_STATE, android.permission.BIND_ACCESSIBILITY_SERVICE, android.permission.CAMERA, android.permission.INTERNET, android.permission.READ_EXTERNAL_STORAGE, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.WRITE_EXTERNAL_STORAGEcom.example.cristianturetta.spywaref03202c2f7cec4db16a174eeed97127b40a164bd995741142a6c20c3711a25630620.0003216674.1922121018.3891,1422.763.680.752.0694.23455.108https://github.com/CristianTuretta/MAD-Spy
97
Trojan-Spy:AndroidOS/SocietyPoisonerTrojanSocietyPoisonerTrojan, socialpoisonerPeriodically sends an email containing device information, GPS coordinates, camera pictures, SMS and contacts.Java82016?Trojan-SpySpyware, Botnet, Trojan?Remote Data Exfiltration, Persistance, Periodical Connection With Server, Run in Background, Bot, Run at Startup, Icon Hiding, Stealth, Device Information, Camera, Access Coarse Location, Access Fine Location, Access Network State, Access Wifi State, Internet, Read Contacts, Read Phone State, Read SMS, Receive Boot Completed, Write External Storageandroid.hardware.camera, android.hardware.camera.autofocus, android.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION, android.permission.ACCESS_NETWORK_STATE, android.permission.ACCESS_WIFI_STATE, android.permission.CAMERA, android.permission.INTERNET, android.permission.READ_CONTACTS, android.permission.READ_PHONE_STATE, android.permission.READ_SMS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.WRITE_EXTERNAL_STORAGEcom.cakeman.doctorrabb.socialpoisonerc6665c079f46476878b006a713dcd8948a4a41933761608fb13b2a6e2dca0cbb0620.0002611433.9122010412.8558091.923.200.602.0289.72352.470https://github.com/KbaHaxor/SocietyPoisonerTrojan
98
Trojan-Wiper:AndroidOS/TicTacToe_MalwareTicTacToe_Malware, maltictactoeThis malicious game deletes all the contacts from an android mobile phone when run. Instead of just deleting the contacts once, the malicious tictactoe game runs as a background service everytime the phone reboots and deletes the entire contact list on every reboot.Java82017?Trojan-WiperTrojan, Wiper?Run in Background, Run at Startup, Read Contacts, Write Contacts, Receive Boot Completedandroid.permission.READ_CONTACTS, android.permission.RECEIVE_BOOT_COMPLETED, android.permission.WRITE_CONTACTSmaltictactoe.example.org.maltictactoe989fe4b24403e9734ae16025400da3ec4862df583b8602772285f1f366b564030620.000276233.831088212.2026721.582.980.532.26105.29961.578https://github.com/shivenchawla/TicTacToe_Malware