Meant to post it for a looong time. But better late then never.
Here is a sample of FakeGuard / sms trojan that was prevalent in Korea in December (maybe still is)
Sample credit: many thanks to Jihong Park
Download (email me if you need the password)
SHA256: 324a06bd57aae2d3cd3a3b8bd75cdfdda4299e8f65617227aeb69a16f34b7c0e
SHA1: 1bd0039133b568ce4f810d8c2cbdd28726824b3e
MD5: dab7f3ac999885b78818eafe501b1095
File size: 206.8 KB ( 211733 bytes )
File name: com.cn.smsclient.apk
File type: Android
Detection ratio: 13 / 46
Analysis date: 2013-01-03 04:48:14 UTC ( 0 minutes ago )
Avast Android:FakeGuard-E [Trj] 20130103
CAT-QuickHeal Android.Fakeguard.B1243 20130102
Commtouch AndroidOS/GenBl.DAB7F3AC!Olympus 20130103
Comodo UnclassifiedMalware 20130102
DrWeb Android.SmsSpy.10.origin 20130103
ESET-NOD32 a variant of Android/FakeGuard.B 20130102
F-Secure Trojan:Android/Fakeguard.A 20130103
Fortinet Android/FkGuard.A 20130103
GData Android:FakeGuard-E 20130103
PCTools Android.Fakeguard 20130103
Sophos Andr/FkGuard-A 20130103
Symantec Android.Fakeguard 20130103
TrendMicro-HouseCall TROJ_GEN.RCBH1KU 20130103
http://erteam.nprotect.com/377
ReplyDelete