![]() ![]() 'For individuals, getting infected with Shedun, Shuanet, and ShiftyBug might mean a trip to the store to buy a new phone,' Lookout wrote. Together they've repackaged around 20,000 apps.Ĭurrently, the highest detection rates are in the US, Russia, Brazil, and Mexico. There are at least three similar adware found - Shuanet, Kemoge and Shudun. Lookout Security said there that users who install apps from Google Play, Android's official app store, are no affected. 'Because these pieces of adware root the device and install themselves as system applications, they become nearly impossible to remove, usually forcing victims to replace their device in order to regain normalcy,' said the California-based company in a blog post. This can let a hacker gain access to sensitive data about the user. The app will then serve ads, which generates money for the hacker.Īlthough their may function is to display ads, their system-level status also lets them gain access to key security details built into Android. The problem is that the repackaged apps remain fully functional, and so the problem is difficult to detect. Notifications received: Whatsapp, Instagram, Messenger.The malware works by repackaging legitimate apps from the Google Play store with adware, and then released it to a third-party store.Nivistealer (web steal based - allow/permission interaction) Install and remove apps, GetApps, Inject.Run Shell Command ( use findphno command in run shell command to get device phone number and use findx:pdf to find all the pdf files on the device ).Retrieve Device Location ( □ Only work when the app is open on newer devices).Logs and Keylog (messenger, socialmedia).Push to turnoff Play Protected (Disable).SMS, Call (+Forward), Contact, GPS, Audio.History browser and Call log, SMS Email logs, create a Call and SMS.Keylogger and fingerprint-device duplicate.Voip record such Skype, WeChat, Viber, LINE etc.Notification Listener (Facebook, whatsapp, email, instagram etc).Record phonecall, save it, send it to C&C.Changing the command and control server.webcam snapshots (front cam & back cam).Text to speech for Android to say stuff out loud.Location (the application tries to switch on the GPS, 10s capture location).http RAT ( not required port forwarding).SMS, Call, Call logs, Contact, Toast, Browser.shell command, browser history, microphone, location, storage.Android Tools such, take photo, screenshot etc.Fun Panel (Show messages, shake the phone etc).Get phone’s information (IMEI, WIFI MAC, PHONE CARRIER). ![]() Listen live conversation through mic, record mic sound live.Streaming video (for activity based client only).Please don't download the project if you won't be infected by Trojan, make sure to recheck before downloading or installing from an unknown source (Trojan in a Trojan?). Looking for port forwarding without buying VPN or Router setting? Use Ngrok This repo contains android trojan (and Dataset) as far as I know (free or paid app) with feature and permission list for my documentation. ![]()
0 Comments
Leave a Reply. |