File: com.google.android.smart.apk
MD5: F70664BB0D45665E79BA9113C5E4D0F4
Sample Credits: with many thanks to Sanjay and anonymous, February 3, 2012
Research: Security Alert: New RootSmart Android Malware Utilizes the GingerBreak Root Exploit
Download - password infected | SHA256: | 8cb40e8dce05482907ff83b39911831daf20e4a69ee63a6cff523c880eed1acf |
| File name: | suspect.apk |
| Detection ratio: | 1 / 43 |
| Analysis date: | 2012-02-04 05:41:48 UTC ( 0 minutes ago ) |
| SHA256: | 8cb40e8dce05482907ff83b39911831daf20e4a69ee63a6cff523c880eed1acf | |
| File name: | suspect.apk | |
| Detection ratio: | 1 / 43 | |
| Analysis date: | 2012-02-04 05:41:48 UTC ( 0 minutes ago ) |
| Symantec | Android.Bmaster | 20120204 |
Thank you for uploading the sample. There are a set of Chinese domains where the Exploit Scripts are hosted at present and these are downloaded by the Rootsmart APK.
ReplyDelete