Clicky

Thursday, September 27, 2012

10 samples of SMSZombie Android SMS Trojan




45099416acd51a4517bd8f6fb994ee0bb9408bdd80dd906183a3cdb4b39c4791.apk            098c9874ca14b2544846b24ab8cea204
5f0dbf2b42bf9f400ea4cc81030de3eacd676e54b671a524259a5ceff938e210.apk            4084939a0864b645f6c6a915586fb1ab
576639b9c12143e558a4ff8866d6b0e1370c0705cf8701dfc296b497a4de20c7.apk            40f3f16742cd8ac8598bf859a23ac290
c9bb707b78a714771ade4c1b4adb1cab8e4e16915f0a022e3f742eba93c3334c.apk            4d13d1bc63026b9c26c7cd4946b1bae0
741684cfcbc861b076bd7561be29f8bd3f1814b9049034a0412601f786f0f0f0.apk            9f972dbe36d4ce709aa21c291d632d31
72f9752c809d8cd12da34b20f202cdf578c338ec956491cb7b5f18c6d4cbc250.apk            a31245022c60fc50b81f7ffc4f4967b2
f391cc4ea5961d649bc62a0466560dc76eaebcf26f0c8452c671c2d2b34361b8.apk            a354baf35efcc57752db8bd6ee7f6115
b48be6fec1c25afcf274c9f8c6ac038015f2b04c87a9b8da6519ee3510ef30a2.apk            b6cacc0cf7bad179d6bde68f5c013e6e
319a962f486080b4a7dbe1896a4f1a345d86c5644ebedb8f28ab2b737cf9deeb.apk            c71740ee94467ae70a71265116d54186
eb84256836a99417b13159ad285430bc879eb52fd755d90caec766b17793a265.apk            cafffdee7479a8816f4551ac8c3a0178

Sample credit Pau Oliva Fora

Download (email me if you need the password / use the contagio password scheme)


Fakelash - Android SMS trojan




Research Android malware distributed by malicious SMS in France


File: FlashPlayer.apk
Size: 2620250
MD5:  BE615D9730C1BBEBF73B2205F7B7D51B


File: flashnew.apk
Size: 2744902
MD5:  7DEC1C9174D0F688667F6C34C0FA66C2

Download (email me if you need the password / use the contagio password scheme)


Thursday, September 13, 2012

Android SimpleTemai - Fraud | Downloader Trojan


Research: Lookout: Security Alert: SimpleTemai
Sample credit: Tim Strazzere


File: com.polarbit.rthunderliteok-SiMPLETEMAi.apk
Size: 3386440
MD5:  DF4403B78CFFA505FDCB309CCF0D0E21


Download
https://contagiomobile.deependresearch.org/files/com.polarbit.rthunderliteok-SiMPLETEMAi.zip
(the password scheme is now the same as contagiodump.blogspot.com scheme, email me if you need, email address is in the profile)


Android Spyware samples


File: power_battery.apk
Size: 560429
MD5:  7ECB7A1FA96E18B85ED10D83537CFD3C


File: smartphone5-1.apk
Size: 285814
MD5:  6BAE149BC65576831AC635A23938BE36

Sample credit: Tushar Verma

Download
http://contagiomobile.deependresearch.org/files/6BAE149BC65576831AC635A23938BE36_smartphone5-1.zip
http://contagiomobile.deependresearch.org/files/7ECB7A1FA96E18B85ED10D83537CFD3C_power_battery.zip

 (the password scheme is now the same as contagiodump.blogspot.com scheme, email me if you need, email address is in the profile)


Thursday, September 6, 2012

Contagio mobile file downloads are not available indefinitely (thanks to Mediafire and LeakID ideas about copyright)

Things are better now
See the last and final update on the main page.
http://contagiodump.blogspot.com/2012/09/contagio-file-downloads-are-not.html

I want to thank everyone who offered support, offered help with legal and hosting, and made public posts about it. I truly appreciate, it helped me sort it out.

Wednesday, September 5, 2012

Plankton related adware samples / Airpush


 
Research  Trend Micro -  More Adware and PLANKTON Variants Seen in App Stores

    0503B2F6C1349F7E1CD7E8B6BF17AC46
    11A7767BFE4926458EC84385214B82C9
    1485F498084F963801ED76013749C9FA
    4A300481411AB1992467959491DF412C
    4B7450406A38B522E69DE1426604BF7F
    5A1FD697C3ECD3D050B3D88D8A8649A1
    66C6A88DF66F0C2CF9194C13809FE05A
    67D85DFE26CDA45402CDAC3456D8A863
    7220C948659F9990040C9C20D5FD04EF
    8C7C8231DF0D799B12274B8B39C882B8
    8D52070201F2A81FB1298E133D74057C
    99E42DFA2C847FF0511F7C442999FFAA
    A4D6033F66DA3BE83CBF80724CA013D1
    AA6655B409B647065E19758AE5D242EA
    B5BCAB6FE08C9B6229F5D053705DEE9B
    B8B434AB21D394DAA0A9A78A515BD517
    BC2EEE6F861843EA6FE5A4A14CB44372
    CFB7E66B2FB605CC94DEBD01238B4995
    DF473E3D789C63BAE99828044DA74500
    E4BE39E5955FD3BD7AC97F58E66EF3E5
    E7F0656486EEBFD9AB236451FD980BD4
    E8063DE12976D371441F15F2C5715627
    F134FC245E50F031ED8B4FAE3F1D4EB0
    F1AA24C1641471F5FBEF08AE56A53FB4
    FEE6F3AB17688600E0E15AED1489D9AE

Download (pass infected) 





Tuesday, September 4, 2012

Loozfon - Japanese Android infostealer


File: AndroidLoozfon
Size: 544646
MD5:  157985FF7FCF1CA30F5B026D1B897F1F

File: Loozfon.apk
Size: 42913
MD5:  04C9E05D0F626CC3F47DC0BC9B65A8CF

Research: Loozfon Malware Targets Female Android Users by Symantec
Sample Credit: Sanjay

Download (password infected)