File: com.google.android.smart.apk
MD5: F70664BB0D45665E79BA9113C5E4D0F4
Sample Credits: with many thanks to Sanjay and anonymous, February 3, 2012
Research: Security Alert: New RootSmart Android Malware Utilizes the GingerBreak Root Exploit
Download - password infected
SHA256: | 8cb40e8dce05482907ff83b39911831daf20e4a69ee63a6cff523c880eed1acf |
File name: | suspect.apk |
Detection ratio: | 1 / 43 |
Analysis date: | 2012-02-04 05:41:48 UTC ( 0 minutes ago ) |
SHA256: | 8cb40e8dce05482907ff83b39911831daf20e4a69ee63a6cff523c880eed1acf | |
File name: | suspect.apk | |
Detection ratio: | 1 / 43 | |
Analysis date: | 2012-02-04 05:41:48 UTC ( 0 minutes ago ) |
Symantec | Android.Bmaster | 20120204 |
Thank you for uploading the sample. There are a set of Chinese domains where the Exploit Scripts are hosted at present and these are downloaded by the Rootsmart APK.
ReplyDelete