File: Fakemart.apk
Size: 247778
MD5: D002F0581A862373AA6C6C0070EC3156
Research:
French Android Users Hit again by SMS Trojan - Webroot
Android/Fakemart's end: Author has been identified -Fortigard
Download (email me if you need the password)
https://www.virustotal.com/en/file/e6bbe679393e962ea5692bc7234f5ec6d475599299e34b2d6ad6a0a3304a62d1/analysis/
SHA256: e6bbe679393e962ea5692bc7234f5ec6d475599299e34b2d6ad6a0a3304a62d1
SHA1: b45d969a8fd1d3fb2a787cab8460b54088d89770
MD5: d002f0581a862373aa6c6c0070ec3156
File size: 242.0 KB ( 247778 bytes )
File name: b45d969a8fd1d3fb2a787cab8460b54088d89770
File type: Android
Tags: apk android
Detection ratio: 19 / 46
Analysis date: 2013-04-29 07:08:10 UTC ( 1 month ago )
Behavioural information
Antivirus Result Update
Comodo UnclassifiedMalware 20130429
VIPRE Trojan.AndroidOS.Generic.A 20130429
TrendMicro-HouseCall TROJ_GEN.RCBH1I1 20130429
Kaspersky HEUR:Trojan-SMS.AndroidOS.FakeMart.a 20130429
Commtouch AndroidOS/GenBl.D002F058!Olympus 20130429
F-Prot AndroidOS/FakeMart.A 20130429
Ikarus AndroidOS.Trojan.FakeInst 20130429
Avast Android:FakeInst-CJ [Trj] 20130429
Fortinet Android/Fakemart.A!tr 20130429
AntiVir Android/FakeInstCJ.A 20130429
Emsisoft Android.Trojan.FakeInst.AV (B) 20130429
MicroWorld-eScan Android.Trojan.FakeInst.AV 20130429
BitDefender Android.Trojan.FakeInst.AV 20130429
F-Secure Android.Trojan.FakeInst.AV 20130429
GData Android.Trojan.FakeInst.AV 20130429
Kingsoft Android.Troj.Undef.a.(kcloud) 20130422
DrWeb Android.SmsSend.215.origin 20130429
CAT-QuickHeal Android.FakeMart.A 20130429
AhnLab-V3 Android-Trojan/FakeInst 20130428
The link for the Fortiguard post is https://blog.fortinet.com/making-money-out-of-androidfakemart/
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteCould you plz send me the password to my email?
ReplyDeleteHi. i want Password, i can't find your email address. im developer, apk analysis system. i need malware sample. please replay to me : tjam160@gmail.com
ReplyDelete