MalEval / archived_malware_sample_info.json
Xinzxr's picture
Rename archived_sample_info.json to archived_malware_sample_info.json
fea3469 verified
{
"54df8a318b1b910bbf8437fdae2fd027296dffda228f5ef42babce0492c98cca": {
"type": "trojan",
"family": "Ztorg",
"url": "https://securelist.com/ztorg-money-for-infecting-your-smartphone/78325/",
"sha256": "54df8a318b1b910bbf8437fdae2fd027296dffda228f5ef42babce0492c98cca"
},
"91254c551434590f3ab0707fef0bcb900673d344fa5b910846879ac2f2c49e92": {
"type": "adware",
"family": "TOASTAMIGO",
"url": "https://www.trendmicro.com/en_us/research/17/k/toast-overlay-weaponized-install-android-malware-single-attack-chain.html",
"sha256": "91254c551434590f3ab0707fef0bcb900673d344fa5b910846879ac2f2c49e92"
},
"05b704341befef5c358c7ac99bda808fe2df3e7df67f3d2a11caa40040caf2dd": {
"type": "adware",
"family": "TOASTAMIGO",
"url": "https://www.trendmicro.com/en_us/research/17/k/toast-overlay-weaponized-install-android-malware-single-attack-chain.html",
"sha256": "05b704341befef5c358c7ac99bda808fe2df3e7df67f3d2a11caa40040caf2dd"
},
"41b4dbc8cb144145c9eea8b0e4c9c9da3102ff42500923067ba32a5acfcaa858": {
"type": "ransomware",
"family": "Simplocker",
"url": "https://www.welivesecurity.com/2014/06/25/simplocker-new-variants/",
"sha256": "41b4dbc8cb144145c9eea8b0e4c9c9da3102ff42500923067ba32a5acfcaa858"
},
"2fedbe67d11b51a8a21ebc202caf00fb771e4c4be6dde24387b73d95ea2d9237": {
"type": "banker",
"family": "Anubis",
"url": "https://blog.trendmicro.com/trendlabs-security-intelligence/google-play-apps-drop-anubis-banking-malware-use-motion-based-evasion-tactics/",
"sha256": "2fedbe67d11b51a8a21ebc202caf00fb771e4c4be6dde24387b73d95ea2d9237"
},
"a0f3df39d20c4eaa410a61a527507dbc6b17c7f974f76e13181e98225bda0511": {
"type": "banker",
"family": "Xloader",
"url": "https://www.trendmicro.com/en_us/research/19/d/new-version-of-xloader-that-disguises-as-android-apps-and-an-ios-profile-holds-new-links-to-fakespy.html#",
"sha256": "a0f3df39d20c4eaa410a61a527507dbc6b17c7f974f76e13181e98225bda0511"
},
"d3c91d70b028537d275e603bd36a14bc42555f089e5db6d17e3a652ff99ecd0d": {
"type": "trojan",
"family": "Ztorg",
"url": "https://securelist.com/rooting-pokemons-in-google-play-store/76081/",
"sha256": "d3c91d70b028537d275e603bd36a14bc42555f089e5db6d17e3a652ff99ecd0d"
},
"09e1b08946ed43690ed16d38ca40c71f62336f55f2f9227f1f773706a21b94da": {
"type": "trojan",
"family": "Necro",
"url": "https://gbhackers.com/camscanner-pdf-app/",
"sha256": "09e1b08946ed43690ed16d38ca40c71f62336f55f2f9227f1f773706a21b94da"
},
"53136f6cea9c04cf139c42a0f9b863c87bb1a3114010c324106d85a401fd8caf": {
"type": "ransomware",
"family": "Slocker",
"url": "https://blog.trendmicro.com.tw/?p=51736",
"sha256": "53136f6cea9c04cf139c42a0f9b863c87bb1a3114010c324106d85a401fd8caf"
},
"5bff2298944632cc50a17f88ea59acf64e6093f2a4b4cba6841b38ede0f26c3d": {
"type": "ransomware",
"family": "Slocker",
"url": "https://blog.trendmicro.com.tw/?p=51736",
"sha256": "5bff2298944632cc50a17f88ea59acf64e6093f2a4b4cba6841b38ede0f26c3d"
},
"026733eb26ff09111ce389b56eaf431271812dfe28b426cb171c722eb41d62d7": {
"type": "ransomware",
"family": "Slocker",
"url": "https://blog.trendmicro.com.tw/?p=51736",
"sha256": "026733eb26ff09111ce389b56eaf431271812dfe28b426cb171c722eb41d62d7"
},
"6e5bbedce0f2cffcadf0397282861b8694ad9111fe566da934fc11ee25827f03": {
"type": "ransomware",
"family": "Slocker",
"url": "https://blog.trendmicro.com.tw/?p=51736",
"sha256": "6e5bbedce0f2cffcadf0397282861b8694ad9111fe566da934fc11ee25827f03"
},
"8a0f0b791661076332e9da5c7a269a2215585acedff66c75687ff38ef41e7e27": {
"type": "trojan",
"family": "Necro",
"url": "https://gbhackers.com/camscanner-pdf-app/",
"sha256": "8a0f0b791661076332e9da5c7a269a2215585acedff66c75687ff38ef41e7e27"
},
"cde39a1338905b1c0d5a899378c9428a48d6ca01cb55396c03268da939d3dd4a": {
"type": "ransomware",
"family": "Slocker",
"url": "https://blog.trendmicro.com.tw/?p=51736",
"sha256": "cde39a1338905b1c0d5a899378c9428a48d6ca01cb55396c03268da939d3dd4a"
},
"1ed647cb7a0f145d2e84fdfc7adc2e865c312dbe574c4ab4298173ec7e9fcab5": {
"type": "ransomware",
"family": "Slocker",
"url": "https://blog.trendmicro.com.tw/?p=51736",
"sha256": "1ed647cb7a0f145d2e84fdfc7adc2e865c312dbe574c4ab4298173ec7e9fcab5"
},
"5212b6a8dd17ccfc60f671c82f45f4885e0abcc354da3d007746599f10340774": {
"type": "ransomware",
"family": "Slocker",
"url": "https://blog.trendmicro.com.tw/?p=51736",
"sha256": "5212b6a8dd17ccfc60f671c82f45f4885e0abcc354da3d007746599f10340774"
},
"b16a904af7ebeb3b3a9c8fef342c60eab83dfa6867acdbaa6f55c1f06b974123": {
"type": "ransomware",
"family": "Slocker",
"url": "https://blog.trendmicro.com.tw/?p=51736",
"sha256": "b16a904af7ebeb3b3a9c8fef342c60eab83dfa6867acdbaa6f55c1f06b974123"
},
"de990c12617f7cd01e2b810bc33af4ae43b6e7c43430f7039252ac93416d5223": {
"type": "ransomware",
"family": "Slocker",
"url": "https://blog.trendmicro.com.tw/?p=51736",
"sha256": "de990c12617f7cd01e2b810bc33af4ae43b6e7c43430f7039252ac93416d5223"
},
"16c497c382492c0132d581a4ece0ef0ab6c8ba7b265a9d7b0f6d47d9871d5e06": {
"type": "ransomware",
"family": "Slocker",
"url": "https://blog.trendmicro.com.tw/?p=51736",
"sha256": "16c497c382492c0132d581a4ece0ef0ab6c8ba7b265a9d7b0f6d47d9871d5e06"
},
"decb041278048c001142232ae9374d86489a011af922d2f1803eaebe690daca0": {
"type": "ransomware",
"family": "Slocker",
"url": "https://blog.trendmicro.com.tw/?p=51736",
"sha256": "decb041278048c001142232ae9374d86489a011af922d2f1803eaebe690daca0"
},
"7682e02105fe576b37d38d3732fdd021b88978a08b466cc82aab357a1fc69f50": {
"type": "banker",
"family": "FakeSpy",
"url": "https://www.trendmicro.com/en_us/research/18/f/fakespy-android-information-stealing-malware-targets-japanese-and-korean-speaking-users.html",
"sha256": "7682e02105fe576b37d38d3732fdd021b88978a08b466cc82aab357a1fc69f50"
},
"8fff1bf0bfa618b6350da5d99a620c21bd6f88a8711469575aa449a947cf6e96": {
"type": "ransomware",
"family": "Slocker",
"url": "https://blog.trendmicro.com.tw/?p=51736",
"sha256": "8fff1bf0bfa618b6350da5d99a620c21bd6f88a8711469575aa449a947cf6e96"
},
"6f20f227f79debfdae32233b59f4dc15c7faf05036b21e8cd46b24ebc52f0bf8": {
"type": "banker",
"family": "Xloader",
"url": "https://www.trendmicro.com/en_us/research/18/d/xloader-android-spyware-and-banking-trojan-distributed-via-dns-spoofing.html",
"sha256": "6f20f227f79debfdae32233b59f4dc15c7faf05036b21e8cd46b24ebc52f0bf8"
},
"ae3f772b12d4c97b4377dfadfe01528411811d22f8708a2b33a10494461ec2e4": {
"type": "ransomware",
"family": "Slocker",
"url": "https://blog.trendmicro.com.tw/?p=51736",
"sha256": "ae3f772b12d4c97b4377dfadfe01528411811d22f8708a2b33a10494461ec2e4"
},
"b125ea78fb390950893d146a51f513440314be7648207b59e5d0a1752740f273": {
"type": "banker",
"family": "Xloader",
"url": "https://www.trendmicro.com/en_us/research/18/d/xloader-android-spyware-and-banking-trojan-distributed-via-dns-spoofing.html",
"sha256": "b125ea78fb390950893d146a51f513440314be7648207b59e5d0a1752740f273"
},
"cc2617d7d904986b83baf7843db6969151363000678e8da599edbf6cf23cb827": {
"type": "banker",
"family": "Xloader",
"url": "https://www.trendmicro.com/en_us/research/18/d/xloader-android-spyware-and-banking-trojan-distributed-via-dns-spoofing.html",
"sha256": "cc2617d7d904986b83baf7843db6969151363000678e8da599edbf6cf23cb827"
},
"3c079b47a2129fe6c4b35774a02147de9dd9b28043570fff800318ee75beea7f": {
"type": "ransomware",
"family": "Simplocker",
"url": "https://www.welivesecurity.com/2014/07/22/androidsimplocker/",
"sha256": "3c079b47a2129fe6c4b35774a02147de9dd9b28043570fff800318ee75beea7f"
},
"31f1eb45501a202f226f80e91d63fb239468d24a287fb03a6c4c6acdce029cb9": {
"type": "spyware",
"family": "Maikspy",
"url": "https://www.trendmicro.com/en_us/research/18/e/maikspy-spyware-poses-as-adult-game-targets-windows-and-android-users.html",
"sha256": "31f1eb45501a202f226f80e91d63fb239468d24a287fb03a6c4c6acdce029cb9"
},
"b5c74f1e543015818b4de8b07f4ddfd60e9483f37663e709c241853963051669": {
"type": "spyware",
"family": "Maikspy",
"url": "https://www.trendmicro.com/en_us/research/18/e/maikspy-spyware-poses-as-adult-game-targets-windows-and-android-users.html",
"sha256": "b5c74f1e543015818b4de8b07f4ddfd60e9483f37663e709c241853963051669"
},
"7c17687f4edcc997549b2a5aa32750c51d7586666e4a9e0313eec76948d9cfe3": {
"type": "adware",
"family": "TOASTAMIGO",
"url": "https://www.trendmicro.com/en_us/research/17/k/toast-overlay-weaponized-install-android-malware-single-attack-chain.html",
"sha256": "7c17687f4edcc997549b2a5aa32750c51d7586666e4a9e0313eec76948d9cfe3"
},
"4c0d2cb518a1f224a53f82af4f4fd7a71b0e34788c19a0873bea2d576f4ec35a": {
"type": "spyware",
"family": "Maikspy",
"url": "https://www.trendmicro.com/en_us/research/18/e/maikspy-spyware-poses-as-adult-game-targets-windows-and-android-users.html",
"sha256": "4c0d2cb518a1f224a53f82af4f4fd7a71b0e34788c19a0873bea2d576f4ec35a"
},
"3db0df7b148d6637769acf06510c247bf12ffc05f0d8f9ab6e2deee8bec2d2e3": {
"type": "adware",
"family": "TOASTAMIGO",
"url": "https://www.trendmicro.com/en_us/research/17/k/toast-overlay-weaponized-install-android-malware-single-attack-chain.html",
"sha256": "3db0df7b148d6637769acf06510c247bf12ffc05f0d8f9ab6e2deee8bec2d2e3"
},
"bc0b9bcaddce6ef5a0bab3ba1b278de110e00f8f8a1cf1c64e782740b0bc2f6d": {
"type": "ransomware",
"family": "Slocker",
"url": "https://blog.trendmicro.com.tw/?p=51736",
"sha256": "bc0b9bcaddce6ef5a0bab3ba1b278de110e00f8f8a1cf1c64e782740b0bc2f6d"
},
"c83cc0a54946cac985327ea3b49adafaceacbb9a5a2b1384708dd8d856e52d39": {
"type": "spyware",
"family": "Maikspy",
"url": "https://www.trendmicro.com/en_us/research/18/e/maikspy-spyware-poses-as-adult-game-targets-windows-and-android-users.html",
"sha256": "c83cc0a54946cac985327ea3b49adafaceacbb9a5a2b1384708dd8d856e52d39"
},
"67f0889c5b2aa479621a581cb63c95649cd9a04baaa264da0122fac072c7624c": {
"type": "banker",
"family": "Faketoken",
"url": "https://securelist.com/the-banker-that-encrypted-files/76913/",
"sha256": "67f0889c5b2aa479621a581cb63c95649cd9a04baaa264da0122fac072c7624c"
},
"f3a85e6f0384d8657b086f5793bb4daf1a9770a810187065e7023f615875439c": {
"type": "spyware",
"family": "SpyMax",
"url": "https://blog.lookout.com/commercial-surveillanceware-operators-latest-to-take-advantage-of-covid-19",
"sha256": "f3a85e6f0384d8657b086f5793bb4daf1a9770a810187065e7023f615875439c"
},
"107169ae6951a5cba57d2a0cd274e28fadf5c73d73e91a386f15cf4dc35edd38": {
"type": "spyware",
"family": "SpyMax",
"url": "https://blog.lookout.com/commercial-surveillanceware-operators-latest-to-take-advantage-of-covid-19",
"sha256": "107169ae6951a5cba57d2a0cd274e28fadf5c73d73e91a386f15cf4dc35edd38"
},
"0166ef39488005c7f6f232a93b3329c644a374bcf862b0255796caca3e20f6aa": {
"type": "spyware",
"family": "SpyMax",
"url": "https://blog.lookout.com/commercial-surveillanceware-operators-latest-to-take-advantage-of-covid-19",
"sha256": "0166ef39488005c7f6f232a93b3329c644a374bcf862b0255796caca3e20f6aa"
},
"0a399c83c1dcefe7901642e1e316f963eb2e0950ac3b0125ed1dd7c4d69d0f1a": {
"type": "spyware",
"family": "SpyNote",
"url": "https://blog.lookout.com/nation-state-mobile-malware-targets-syrians-with-covid-19-lures",
"sha256": "0a399c83c1dcefe7901642e1e316f963eb2e0950ac3b0125ed1dd7c4d69d0f1a"
},
"36228f5011d562d932a0643c1aa6929d47c27d8e209c5e08543225592db627ba": {
"type": "banker",
"family": "Faketoken",
"url": "https://securelist.com/the-banker-that-encrypted-files/76913/",
"sha256": "36228f5011d562d932a0643c1aa6929d47c27d8e209c5e08543225592db627ba"
},
"f079c01ce5783e8ceb96fe425c34af535a19fcbe62638bf45366b0c1ba2bc708": {
"type": "banker",
"family": "Hqwar",
"url": "https://securelist.com/hqwar-the-higher-it-flies-the-harder-it-drops/93689/",
"sha256": "f079c01ce5783e8ceb96fe425c34af535a19fcbe62638bf45366b0c1ba2bc708"
},
"79e602a062d05fbb1409afc16e6d41ac0645576b2b5c1899dc93e6852c30a71f": {
"type": "ransomware",
"family": "DoubleLocker",
"url": "https://www.welivesecurity.com/2017/10/13/doublelocker-innovative-android-malware/",
"sha256": "79e602a062d05fbb1409afc16e6d41ac0645576b2b5c1899dc93e6852c30a71f"
},
"8aa4a75adfb50753a2f903469fdf04cc5df0dc524b71c3829c218c06575815a9": {
"type": "banker",
"family": "Hqwar",
"url": "https://securelist.com/hqwar-the-higher-it-flies-the-harder-it-drops/93689/",
"sha256": "8aa4a75adfb50753a2f903469fdf04cc5df0dc524b71c3829c218c06575815a9"
},
"d9208cd995a3228635dbb3c34a3bb2bc9051483c871791e8a2c48de61c07eff6": {
"type": "banker",
"family": "Hqwar",
"url": "https://securelist.com/hqwar-the-higher-it-flies-the-harder-it-drops/93689/",
"sha256": "d9208cd995a3228635dbb3c34a3bb2bc9051483c871791e8a2c48de61c07eff6"
},
"286cbb181204e3c67151766d3c4d969c13ef10350c57ebd71e8bb02423d15609": {
"type": "ransomware",
"family": "Locker",
"url": "https://www.fortinet.com/blog/threat-research/android-locker-malware-uses-google-cloud-messaging-service",
"sha256": "286cbb181204e3c67151766d3c4d969c13ef10350c57ebd71e8bb02423d15609"
},
"74cd5726209dee35f7284f27d08aa6265a54e7b338996db26f30140f92156494": {
"type": "banker",
"family": "Svpeng",
"url": "https://securelist.com/a-new-era-in-mobile-banking-trojans/79198/",
"sha256": "74cd5726209dee35f7284f27d08aa6265a54e7b338996db26f30140f92156494"
},
"18da21d688317ba1eb704b9127757d1c9feeac362537fccd7e68ecb7e06adeb9": {
"type": "banker",
"family": "LokiBot",
"url": "https://www.threatfabric.com/blogs/lokibot_the_first_hybrid_android_malware",
"sha256": "18da21d688317ba1eb704b9127757d1c9feeac362537fccd7e68ecb7e06adeb9"
},
"d2c0ced8bbd2a30c2ec726065d5bf0e124a5949418eb19fc8b94a5541695c1b9": {
"type": "ransomware",
"family": "Lucy",
"url": "https://research.checkpoint.com/2020/lucys-back-ransomware-goes-mobile/",
"sha256": "d2c0ced8bbd2a30c2ec726065d5bf0e124a5949418eb19fc8b94a5541695c1b9"
},
"0ac1a48c7b3d17afb258be9f0fcb03720129d9939f7fbac741dbb6042012045a": {
"type": "ransomware",
"family": "Lucy",
"url": "https://research.checkpoint.com/2020/lucys-back-ransomware-goes-mobile/",
"sha256": "0ac1a48c7b3d17afb258be9f0fcb03720129d9939f7fbac741dbb6042012045a"
},
"283892cbf8ff13ddf499835185d54bb2fa4c86864eaecf5de231c67f6d14da82": {
"type": "ransomware",
"family": "Lucy",
"url": "https://research.checkpoint.com/2020/lucys-back-ransomware-goes-mobile/",
"sha256": "283892cbf8ff13ddf499835185d54bb2fa4c86864eaecf5de231c67f6d14da82"
},
"728a6ea44aab94a2d0ebbccbf0c1b4a93fbd9efa8813c19a88d368d6a46b4f4f": {
"type": "banker",
"family": "Cerberus",
"url": "https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html",
"sha256": "728a6ea44aab94a2d0ebbccbf0c1b4a93fbd9efa8813c19a88d368d6a46b4f4f"
},
"20acb6c9de4eb8764a7d91034c4065adb0b9e5f7afb8183ff9abc1d09bff20fd": {
"type": "ransomware",
"family": "Lucy",
"url": "https://research.checkpoint.com/2020/lucys-back-ransomware-goes-mobile/",
"sha256": "20acb6c9de4eb8764a7d91034c4065adb0b9e5f7afb8183ff9abc1d09bff20fd"
},
"ffa5ac3460998e7b9856fc136ebcd112196c3abf24816ccab1fbae11eae4954c": {
"type": "banker",
"family": "Cerberus",
"url": "https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html",
"sha256": "ffa5ac3460998e7b9856fc136ebcd112196c3abf24816ccab1fbae11eae4954c"
},
"3f2ed928789c200e21fd0c2095619a346f75d84f76f1e54a8b3153385850ea63": {
"type": "banker",
"family": "Cerberus",
"url": "https://www.threatfabric.com/blogs/cerberus-a-new-banking-trojan-from-the-underworld.html",
"sha256": "3f2ed928789c200e21fd0c2095619a346f75d84f76f1e54a8b3153385850ea63"
},
"a2bd3ed53c78b4e9daf8b1d732464423ef8bc7e7f8efc78188107632d8dbf749": {
"type": "ransomware",
"family": "Lucy",
"url": "https://research.checkpoint.com/2020/lucys-back-ransomware-goes-mobile/",
"sha256": "a2bd3ed53c78b4e9daf8b1d732464423ef8bc7e7f8efc78188107632d8dbf749"
},
"c6e27280f6f7d3199bff21018fb1fa6f9338b81f3572b010ab5467fe54649a19": {
"type": "ransomware",
"family": "Lucy",
"url": "https://research.checkpoint.com/2020/lucys-back-ransomware-goes-mobile/",
"sha256": "c6e27280f6f7d3199bff21018fb1fa6f9338b81f3572b010ab5467fe54649a19"
},
"c18c5ca32b80d4b595500853e1899d03edbe954d1e79da14f167aa888918d547": {
"type": "ransomware",
"family": "Lucy",
"url": "https://research.checkpoint.com/2020/lucys-back-ransomware-goes-mobile/",
"sha256": "c18c5ca32b80d4b595500853e1899d03edbe954d1e79da14f167aa888918d547"
},
"3144526d354e29e5cc3985a8f06513627b98441d6db745b96fe85e78bf17b066": {
"type": "ransomware",
"family": "Lucy",
"url": "https://research.checkpoint.com/2020/lucys-back-ransomware-goes-mobile/",
"sha256": "3144526d354e29e5cc3985a8f06513627b98441d6db745b96fe85e78bf17b066"
},
"f1dd83ae85d1c91e09643657e19242f90a39a238d28cd3ece9b91379c768e471": {
"type": "ransomware",
"family": "Lucy",
"url": "https://research.checkpoint.com/2020/lucys-back-ransomware-goes-mobile/",
"sha256": "f1dd83ae85d1c91e09643657e19242f90a39a238d28cd3ece9b91379c768e471"
},
"fa03d0f0d64e7f7192625f4b157b7844205d21c673959e99307b42b6a8c0df56": {
"type": "spyware",
"family": "SpyNote",
"url": "https://blog.lookout.com/nation-state-mobile-malware-targets-syrians-with-covid-19-lures",
"sha256": "fa03d0f0d64e7f7192625f4b157b7844205d21c673959e99307b42b6a8c0df56"
},
"7f4bbe3e6ba3a35e7a187369f5ed280de557e93121c85f2a9e4a8bb63ac8f7f2": {
"type": "banker",
"family": "LokiBot",
"url": "https://www.threatfabric.com/blogs/lokibot_the_first_hybrid_android_malware",
"sha256": "7f4bbe3e6ba3a35e7a187369f5ed280de557e93121c85f2a9e4a8bb63ac8f7f2"
},
"6eb92722e16840495363bb3f3e6bba6f2c6f30ad9eb8e891b90eb455dc5e3e91": {
"type": "banker",
"family": "LokiBot",
"url": "https://www.threatfabric.com/blogs/lokibot_the_first_hybrid_android_malware",
"sha256": "6eb92722e16840495363bb3f3e6bba6f2c6f30ad9eb8e891b90eb455dc5e3e91"
},
"cc450300221377e1b90b496c654a90a27e148dfecffa86d8d2c4846fad714652": {
"type": "adware",
"family": "GhostClicker",
"url": "https://www.trendmicro.com/en_us/research/17/h/ghostclicker-adware-is-a-phantomlike-android-click-fraud.html",
"sha256": "cc450300221377e1b90b496c654a90a27e148dfecffa86d8d2c4846fad714652"
},
"5324460dfe1d4f774a024ecc375e3a858c96355f71afccf0cb67438037697b06": {
"type": "trojan",
"family": "Ztorg",
"url": "https://www.anquanke.com/post/id/85787",
"sha256": "5324460dfe1d4f774a024ecc375e3a858c96355f71afccf0cb67438037697b06"
},
"63cb0e4e97a02de706c68c44b4bda211b037a5c21176fadf12e1cea88d25f1a0": {
"type": "banker",
"family": "Banker",
"url": "https://www.bitdefender.com/en-us/blog/labs/android-apps-and-malware-capitalize-on-coronavirus",
"sha256": "63cb0e4e97a02de706c68c44b4bda211b037a5c21176fadf12e1cea88d25f1a0"
},
"62347708c5db102397e4be4c9fc21f51af0efa1b25ac531286f537e93388fb2e": {
"type": "trojan",
"family": "Ztorg",
"url": "https://securelist.com/ztorg-money-for-infecting-your-smartphone/78325/",
"sha256": "62347708c5db102397e4be4c9fc21f51af0efa1b25ac531286f537e93388fb2e"
},
"dfb54d6c468271c73865d45e54b9dd942a18e716d608cf9233f1122cf79bab8c": {
"type": "banker",
"family": "Banker",
"url": "https://www.bitdefender.com/en-us/blog/labs/android-apps-and-malware-capitalize-on-coronavirus",
"sha256": "dfb54d6c468271c73865d45e54b9dd942a18e716d608cf9233f1122cf79bab8c"
},
"3984c25dba94309a89f911ecd65df2e182e6430f3b0aec1efa11b6a9e58932b4": {
"type": "spyware",
"family": "GolfSpy",
"url": "https://www.trendmicro.com/en_us/research/19/f/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east.html#",
"sha256": "3984c25dba94309a89f911ecd65df2e182e6430f3b0aec1efa11b6a9e58932b4"
},
"36f40d5a11d886a2280c57859cd5f22de2d78c87dcdb52ea601089745eeee494": {
"type": "ransomware",
"family": "Slocker",
"url": "https://blog.trendmicro.com.tw/?p=51736",
"sha256": "36f40d5a11d886a2280c57859cd5f22de2d78c87dcdb52ea601089745eeee494"
},
"200d8f98c326fc65f3a11dc5ff1951051c12991cc0996273eeb9b71b27bc294d": {
"type": "ransomware",
"family": "Slocker",
"url": "https://blog.trendmicro.com.tw/?p=51736",
"sha256": "200d8f98c326fc65f3a11dc5ff1951051c12991cc0996273eeb9b71b27bc294d"
},
"2ffd539d462847bebcdff658a83f74ca7f039946bbc6c6247be2fc62dc0e4060": {
"type": "ransomware",
"family": "Slocker",
"url": "https://blog.trendmicro.com.tw/?p=51736",
"sha256": "2ffd539d462847bebcdff658a83f74ca7f039946bbc6c6247be2fc62dc0e4060"
},
"cb0a18bcc8a2c9a966d3f585771db8b2e627a7b4427a889191a93b3a1b261ba3": {
"type": "ransomware",
"family": "Slocker",
"url": "https://blog.trendmicro.com.tw/?p=51736",
"sha256": "cb0a18bcc8a2c9a966d3f585771db8b2e627a7b4427a889191a93b3a1b261ba3"
},
"6aa59e516b662d1b23f09b04e12ceac86f4ee001111c2f727b149249d08b963c": {
"type": "spyware",
"family": "SpyNote",
"url": "https://blog.lookout.com/nation-state-mobile-malware-targets-syrians-with-covid-19-lures",
"sha256": "6aa59e516b662d1b23f09b04e12ceac86f4ee001111c2f727b149249d08b963c"
},
"3bb289b1680e54dba2bb690ed6f23db4dba6e8f998b503478d6595eee04763bc": {
"type": "spyware",
"family": "SpyMax",
"url": "https://blog.lookout.com/commercial-surveillanceware-operators-latest-to-take-advantage-of-covid-19",
"sha256": "3bb289b1680e54dba2bb690ed6f23db4dba6e8f998b503478d6595eee04763bc"
},
"5b986ef187047d86b64df909b2112aba40226e833772d5a2f526d5d588db0f24": {
"type": "spyware",
"family": "SpyMax",
"url": "https://blog.lookout.com/commercial-surveillanceware-operators-latest-to-take-advantage-of-covid-19",
"sha256": "5b986ef187047d86b64df909b2112aba40226e833772d5a2f526d5d588db0f24"
},
"e5ce81607af44b5bf78612c736fb66cc31372594383f4519cf1e52f79df2ec64": {
"type": "spyware",
"family": "SpyMax",
"url": "https://blog.lookout.com/commercial-surveillanceware-operators-latest-to-take-advantage-of-covid-19",
"sha256": "e5ce81607af44b5bf78612c736fb66cc31372594383f4519cf1e52f79df2ec64"
},
"8cc9ceaefc3a9aac5b1e1a7e482e92ba67d3dfc37fea6709e2c176a87a9adc61": {
"type": "spyware",
"family": "SpyNote",
"url": "https://blog.lookout.com/nation-state-mobile-malware-targets-syrians-with-covid-19-lures",
"sha256": "8cc9ceaefc3a9aac5b1e1a7e482e92ba67d3dfc37fea6709e2c176a87a9adc61"
},
"31b3fed9290644540511fec8307e6edebcdb4a32e594dbee71d0bbc61686b756": {
"type": "spyware",
"family": "SpyNote",
"url": "https://blog.lookout.com/nation-state-mobile-malware-targets-syrians-with-covid-19-lures",
"sha256": "31b3fed9290644540511fec8307e6edebcdb4a32e594dbee71d0bbc61686b756"
},
"38ed92017ed2a1ae068d87f6f9d5b5f327443010cc7282c721f723b2e4daf66d": {
"type": "spyware",
"family": "SpyNote",
"url": "https://blog.lookout.com/nation-state-mobile-malware-targets-syrians-with-covid-19-lures",
"sha256": "38ed92017ed2a1ae068d87f6f9d5b5f327443010cc7282c721f723b2e4daf66d"
},
"9301eb46f81a9c9163325658b6b97dd10c518fa5d5934885a790474fe717a6f1": {
"type": "spyware",
"family": "SpyNote",
"url": "https://blog.lookout.com/nation-state-mobile-malware-targets-syrians-with-covid-19-lures",
"sha256": "9301eb46f81a9c9163325658b6b97dd10c518fa5d5934885a790474fe717a6f1"
},
"bcd046b86ae909943b8bbe2005f4773e1269b8eceb658006a6c88333b9d77438": {
"type": "spyware",
"family": "SpyNote",
"url": "https://blog.lookout.com/nation-state-mobile-malware-targets-syrians-with-covid-19-lures",
"sha256": "bcd046b86ae909943b8bbe2005f4773e1269b8eceb658006a6c88333b9d77438"
},
"bc6f9c6d9beecd6f1353953ef6d883c51739ecec7e5b55e15319fe0d0b124a6d": {
"type": "adware",
"family": "HiddenAd",
"url": "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/multi-tricks-hiddenads-malware/?hilite=%27android%27%2C%27malware%27",
"sha256": "bc6f9c6d9beecd6f1353953ef6d883c51739ecec7e5b55e15319fe0d0b124a6d"
},
"92ea01d0198506d5a43e3cfccf7b2661c131c57e8d260fbf34760f01a897b0cb": {
"type": "trojan",
"family": "FraudBot",
"url": "https://www.trendmicro.com/en_us/research/18/k/fake-voice-apps-on-google-play-botnet-likely-in-development.html",
"sha256": "92ea01d0198506d5a43e3cfccf7b2661c131c57e8d260fbf34760f01a897b0cb"
},
"3f7b367488e761f89b4adeb5dc1b961766c238d41ebb9fbd726da8499d1fce26": {
"type": "trojan",
"family": "FraudBot",
"url": "https://www.trendmicro.com/en_us/research/18/k/fake-voice-apps-on-google-play-botnet-likely-in-development.html",
"sha256": "3f7b367488e761f89b4adeb5dc1b961766c238d41ebb9fbd726da8499d1fce26"
},
"9742148afe109e8ab25ec81f58aee8befed6be20affa7b2a71702a65d4bc377c": {
"type": "trojan",
"family": "FraudBot",
"url": "https://www.trendmicro.com/en_us/research/18/k/fake-voice-apps-on-google-play-botnet-likely-in-development.html",
"sha256": "9742148afe109e8ab25ec81f58aee8befed6be20affa7b2a71702a65d4bc377c"
},
"7a4813f68936a37fce366154a608ad307084336abc205b55f80b0a6788d067ac": {
"type": "trojan",
"family": "FraudBot",
"url": "https://www.trendmicro.com/en_us/research/18/k/fake-voice-apps-on-google-play-botnet-likely-in-development.html",
"sha256": "7a4813f68936a37fce366154a608ad307084336abc205b55f80b0a6788d067ac"
},
"00e82927b20d2db5bdfc6bff77f6841d0e59af80adce3f86f90277669159e5f3": {
"type": "spyware",
"family": "GolfSpy",
"url": "https://www.trendmicro.com/en_us/research/19/f/mobile-cyberespionage-campaign-bouncing-golf-affects-middle-east.html#",
"sha256": "00e82927b20d2db5bdfc6bff77f6841d0e59af80adce3f86f90277669159e5f3"
},
"ca112c63ec11491bea459353299f155fd580e18a1beae99d89f9e4c1ad1eec55": {
"type": "banker",
"family": "FakeSpy",
"url": "https://www.trendmicro.com/en_us/research/18/f/fakespy-android-information-stealing-malware-targets-japanese-and-korean-speaking-users.html",
"sha256": "ca112c63ec11491bea459353299f155fd580e18a1beae99d89f9e4c1ad1eec55"
},
"3a41f07537b31171e380ec7b7ec3e5a9d5a03bc82ce718ebb44c7504d348c57a": {
"type": "banker",
"family": "FakeSpy",
"url": "https://www.trendmicro.com/en_us/research/18/f/fakespy-android-information-stealing-malware-targets-japanese-and-korean-speaking-users.html",
"sha256": "3a41f07537b31171e380ec7b7ec3e5a9d5a03bc82ce718ebb44c7504d348c57a"
},
"76c9d8226ce558c87c81236a9b95112b83c7b546863e29b88fec4dba5c720c0b": {
"type": "banker",
"family": "Rotexy",
"url": "https://securelist.com/the-rotexy-mobile-trojan-banker-and-ransomware/88893/",
"sha256": "76c9d8226ce558c87c81236a9b95112b83c7b546863e29b88fec4dba5c720c0b"
},
"a912166eaf2c8e0c3c87f17bb208f622a0b51bfa1124e5ba84f42a4adf7a96b4": {
"type": "banker",
"family": "LokiBot",
"url": "https://www.threatfabric.com/blogs/lokibot_the_first_hybrid_android_malware",
"sha256": "a912166eaf2c8e0c3c87f17bb208f622a0b51bfa1124e5ba84f42a4adf7a96b4"
},
"61f73bf90c3234faeb8aa7c90f24fa3f7a3a1d38b2e94d40ce96a21e7320fd28": {
"type": "ransomware",
"family": "Filecoder",
"url": "https://www.welivesecurity.com/2019/07/29/android-ransomware-back/",
"sha256": "61f73bf90c3234faeb8aa7c90f24fa3f7a3a1d38b2e94d40ce96a21e7320fd28"
},
"fa9d1664ef9192b50228d7c21589f4fe9f3002faa503b39666a8a3bcd03ed635": {
"type": "ransomware",
"family": "Filecoder",
"url": "https://www.welivesecurity.com/2019/07/29/android-ransomware-back/",
"sha256": "fa9d1664ef9192b50228d7c21589f4fe9f3002faa503b39666a8a3bcd03ed635"
},
"4015d54e74d523a466c2a8cd35efbe764e2629b6147eca0f2f0de79dd2b25d34": {
"type": "spyware",
"family": "SpyNote",
"url": "https://blog.lookout.com/nation-state-mobile-malware-targets-syrians-with-covid-19-lures",
"sha256": "4015d54e74d523a466c2a8cd35efbe764e2629b6147eca0f2f0de79dd2b25d34"
},
"e5f9523c154bf18f4cd093845246994b34e9abb5f99cc9e24ed909a3e2df09f4": {
"type": "banker",
"family": "EventBot",
"url": "https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born",
"sha256": "e5f9523c154bf18f4cd093845246994b34e9abb5f99cc9e24ed909a3e2df09f4"
},
"29af78637243d52da36baa2bda0bd478217f84333c2e00a7e0d8ebe6d980c55c": {
"type": "adware",
"family": "GhostClicker",
"url": "https://www.trendmicro.com/en_us/research/17/h/ghostclicker-adware-is-a-phantomlike-android-click-fraud.html",
"sha256": "29af78637243d52da36baa2bda0bd478217f84333c2e00a7e0d8ebe6d980c55c"
},
"84136b96ee1487a3f763436c5e60591be321ac4dd953d2b9a03dbec908d1962a": {
"type": "banker",
"family": "LokiBot",
"url": "https://www.threatfabric.com/blogs/lokibot_the_first_hybrid_android_malware",
"sha256": "84136b96ee1487a3f763436c5e60591be321ac4dd953d2b9a03dbec908d1962a"
},
"0f7fc30cc701bea7e6ffa541665670ff126a9b3bc0c55ea9bc51c461d8d629a8": {
"type": "banker",
"family": "LokiBot",
"url": "https://www.threatfabric.com/blogs/lokibot_the_first_hybrid_android_malware",
"sha256": "0f7fc30cc701bea7e6ffa541665670ff126a9b3bc0c55ea9bc51c461d8d629a8"
},
"b89892fe9fd306636cb79225ab260320b26b2313d1f415f885b8d6843fcc6919": {
"type": "banker",
"family": "LokiBot",
"url": "https://www.threatfabric.com/blogs/lokibot_the_first_hybrid_android_malware",
"sha256": "b89892fe9fd306636cb79225ab260320b26b2313d1f415f885b8d6843fcc6919"
},
"0b5c854fceaccad3516ebb1a424d935d393fa2f2246f1704e36e8084e29949c8": {
"type": "banker",
"family": "LokiBot",
"url": "https://www.threatfabric.com/blogs/lokibot_the_first_hybrid_android_malware",
"sha256": "0b5c854fceaccad3516ebb1a424d935d393fa2f2246f1704e36e8084e29949c8"
},
"418bdfa331cba37b1185645c71ee2cf31eb01cfcc949569f1addbff79f73be66": {
"type": "banker",
"family": "LokiBot",
"url": "https://www.threatfabric.com/blogs/lokibot_the_first_hybrid_android_malware",
"sha256": "418bdfa331cba37b1185645c71ee2cf31eb01cfcc949569f1addbff79f73be66"
},
"1902424d09c9ddce312c84d166353199c5e6da97918b61616ec38431bdaa1359": {
"type": "banker",
"family": "LokiBot",
"url": "https://www.threatfabric.com/blogs/lokibot_the_first_hybrid_android_malware",
"sha256": "1902424d09c9ddce312c84d166353199c5e6da97918b61616ec38431bdaa1359"
},
"1a18fc5f117c8240dce9379390fe5da27e6b135246dcb7ac37abb1acf47db0fe": {
"type": "banker",
"family": "LokiBot",
"url": "https://www.threatfabric.com/blogs/lokibot_the_first_hybrid_android_malware",
"sha256": "1a18fc5f117c8240dce9379390fe5da27e6b135246dcb7ac37abb1acf47db0fe"
},
"12b1bb4f6fcaab8868e9bf22956013ae1d86cfbb195ce90fee77cc3ae6d22948": {
"type": "trojan",
"family": "Mapin",
"url": "https://www.welivesecurity.com/2015/09/22/android-trojan-drops-in-despite-googles-bouncer/",
"sha256": "12b1bb4f6fcaab8868e9bf22956013ae1d86cfbb195ce90fee77cc3ae6d22948"
},
"b2cc3b288d4bb855e64343317cf1560cb09f22322618c5ff9bdc9d9e70c8f335": {
"type": "banker",
"family": "LokiBot",
"url": "https://www.threatfabric.com/blogs/lokibot_the_first_hybrid_android_malware",
"sha256": "b2cc3b288d4bb855e64343317cf1560cb09f22322618c5ff9bdc9d9e70c8f335"
},
"b28252734dd6cbd2b9c43b84ec69865c5ee6daea25b521387cf241f6326f14a3": {
"type": "banker",
"family": "LokiBot",
"url": "https://www.threatfabric.com/blogs/lokibot_the_first_hybrid_android_malware",
"sha256": "b28252734dd6cbd2b9c43b84ec69865c5ee6daea25b521387cf241f6326f14a3"
},
"ab51dcd0629758743ed1aa48531a71852a49454cc9c90f37fbedb8c02547d258": {
"type": "banker",
"family": "LokiBot",
"url": "https://www.threatfabric.com/blogs/lokibot_the_first_hybrid_android_malware",
"sha256": "ab51dcd0629758743ed1aa48531a71852a49454cc9c90f37fbedb8c02547d258"
},
"969f5a67fcbe15ae7e94188bccf84434745959ff42b0bf16e45ad045ca8aac2d": {
"type": "spyware",
"family": "Inazigram",
"url": "https://www.welivesecurity.com/2017/03/09/new-instagram-credentials-stealers-discovered-google-play/",
"sha256": "969f5a67fcbe15ae7e94188bccf84434745959ff42b0bf16e45ad045ca8aac2d"
},
"c0de04050bdf26e8bdb8559db396cd959f1770f299a7090491289f0792339623": {
"type": "spyware",
"family": "Bahamut",
"url": "https://www.trendmicro.com/en_us/research/18/h/the-urpage-connection-to-bahamut-confucius-and-patchwork.html",
"sha256": "c0de04050bdf26e8bdb8559db396cd959f1770f299a7090491289f0792339623"
},
"59d64fbff1e5a9ac1f8e29660ed9a76e5546ca07c2ff99fe56242fa43b5abec3": {
"type": "trojan",
"family": "MobOk",
"url": "https://gbhackers.com/mobok-malware-via-fake-photo-editing-apps/",
"sha256": "59d64fbff1e5a9ac1f8e29660ed9a76e5546ca07c2ff99fe56242fa43b5abec3"
},
"d4406dee2c0e3e38a851cea6fd5c4283e98497a894ca14a58b27d33a89b5ed5f": {
"type": "trojan",
"family": "MobOk",
"url": "https://gbhackers.com/mobok-malware-via-fake-photo-editing-apps/",
"sha256": "d4406dee2c0e3e38a851cea6fd5c4283e98497a894ca14a58b27d33a89b5ed5f"
},
"e832ed7a0311da2fab5c40b87c5046d7a9cfd825d682de491fd6e85d728ad083": {
"type": "trojan",
"family": "Mapin",
"url": "https://www.welivesecurity.com/2015/09/22/android-trojan-drops-in-despite-googles-bouncer/",
"sha256": "e832ed7a0311da2fab5c40b87c5046d7a9cfd825d682de491fd6e85d728ad083"
},
"dbfab6e6fe3c2af3c8e23476b507eebed3cbe05633ab98fcb421ed156aa34236": {
"type": "trojan",
"family": "FakeApp",
"url": "https://www.welivesecurity.com/2019/06/17/malware-google-permissions-2fa-bypass/",
"sha256": "dbfab6e6fe3c2af3c8e23476b507eebed3cbe05633ab98fcb421ed156aa34236"
},
"9501ca777fcfcf723a67d1b0b79f5a1a16113c8027ed72e434017ed5eafe84ef": {
"type": "trojan",
"family": "FakeApp",
"url": "https://www.welivesecurity.com/2019/06/17/malware-google-permissions-2fa-bypass/",
"sha256": "9501ca777fcfcf723a67d1b0b79f5a1a16113c8027ed72e434017ed5eafe84ef"
},
"d3d80d736245674492327ca0315488ea9ddc670278f84e52daca313751344526": {
"type": "spyware",
"family": "Inazigram",
"url": "https://www.welivesecurity.com/2017/03/09/new-instagram-credentials-stealers-discovered-google-play/",
"sha256": "d3d80d736245674492327ca0315488ea9ddc670278f84e52daca313751344526"
},
"0b75a8de0acd2f86806c794fd29437c6676dad026f68225f0431a4f4d8b43e43": {
"type": "spyware",
"family": "Bahamut",
"url": "https://www.trendmicro.com/en_us/research/18/h/the-urpage-connection-to-bahamut-confucius-and-patchwork.html",
"sha256": "0b75a8de0acd2f86806c794fd29437c6676dad026f68225f0431a4f4d8b43e43"
},
"973ac11b0c8e0b41d3e57dc766bff2d70c460ccf64cbdd2bf3d4c4bb09a00946": {
"type": "spyware",
"family": "Xavier",
"url": "https://www.trendmicro.com/en_us/research/17/f/analyzing-xavier-information-stealing-ad-library-android.html",
"sha256": "973ac11b0c8e0b41d3e57dc766bff2d70c460ccf64cbdd2bf3d4c4bb09a00946"
},
"c1d9a61fdfe9c8dfb8b4482f18886cc74271b6dc63dd6eeb8605d576716c0842": {
"type": "trojan",
"family": "Mapin",
"url": "https://www.welivesecurity.com/2015/09/22/android-trojan-drops-in-despite-googles-bouncer/",
"sha256": "c1d9a61fdfe9c8dfb8b4482f18886cc74271b6dc63dd6eeb8605d576716c0842"
},
"8db04b4fac4cd4368a85dfad85e16e9acadc301700532302687dc273f028bdbd": {
"type": "trojan",
"family": "Ztorg",
"url": "https://securelist.com/ztorg-money-for-infecting-your-smartphone/78325/",
"sha256": "8db04b4fac4cd4368a85dfad85e16e9acadc301700532302687dc273f028bdbd"
},
"5e03ee92805cc086e26ec951c6f0deb802f72e047fc9c3efc3a649884c0973c6": {
"type": "adware",
"family": "GhostClicker",
"url": "https://www.trendmicro.com/en_us/research/17/h/ghostclicker-adware-is-a-phantomlike-android-click-fraud.html",
"sha256": "5e03ee92805cc086e26ec951c6f0deb802f72e047fc9c3efc3a649884c0973c6"
},
"6ca48ef560e3ee8d4064925c26a1fe81a69896d520c63232f8289f111ec0e7a6": {
"type": "spyware",
"family": "Inazigram",
"url": "https://www.welivesecurity.com/2017/03/09/new-instagram-credentials-stealers-discovered-google-play/",
"sha256": "6ca48ef560e3ee8d4064925c26a1fe81a69896d520c63232f8289f111ec0e7a6"
},
"8c5826441a7000f957ece60a3e5294732f9a430d4bec0113bb13b99c73fba47c": {
"type": "adware",
"family": "HiddenAd",
"url": "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/multi-tricks-hiddenads-malware/?hilite=%27android%27%2C%27malware%27",
"sha256": "8c5826441a7000f957ece60a3e5294732f9a430d4bec0113bb13b99c73fba47c"
},
"a5ba85f082785c4368ac9d16663636d297ebc6eefacb5ab6303abac765de1b4c": {
"type": "spyware",
"family": "Bahamut",
"url": "https://www.trendmicro.com/en_us/research/18/h/the-urpage-connection-to-bahamut-confucius-and-patchwork.html",
"sha256": "a5ba85f082785c4368ac9d16663636d297ebc6eefacb5ab6303abac765de1b4c"
},
"72295413a7d8ea14625affa511a58eda8771d2bc0dbc7eb300c87fc4a30bb8ef": {
"type": "spyware",
"family": "Inazigram",
"url": "https://www.welivesecurity.com/2017/03/09/new-instagram-credentials-stealers-discovered-google-play/",
"sha256": "72295413a7d8ea14625affa511a58eda8771d2bc0dbc7eb300c87fc4a30bb8ef"
},
"126547985987c3ecb1321a3a565d8565b64d437fd28418a6ba4bbc3220f684d2": {
"type": "trojan",
"family": "FakeApp",
"url": "https://www.welivesecurity.com/2019/06/17/malware-google-permissions-2fa-bypass/",
"sha256": "126547985987c3ecb1321a3a565d8565b64d437fd28418a6ba4bbc3220f684d2"
},
"66c012f52476b7fc36d3a0c7ab571a5c64532f9afc25fd0baa62b8836a5455c3": {
"type": "spyware",
"family": "SpyMax",
"url": "https://blog.lookout.com/commercial-surveillanceware-operators-latest-to-take-advantage-of-covid-19",
"sha256": "66c012f52476b7fc36d3a0c7ab571a5c64532f9afc25fd0baa62b8836a5455c3"
},
"868e0a1904d2f9c142adca02bc5834035873ad3d5c97a2815cf3c1cd2d961355": {
"type": "spyware",
"family": "banker",
"url": "https://blog.trendmicro.com/trendlabs-security-intelligence/fake-bank-app-phishes-credentials-locks-users-out/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29",
"sha256": "868e0a1904d2f9c142adca02bc5834035873ad3d5c97a2815cf3c1cd2d961355"
},
"464474b7bd50c61ba117573d1def10b047c5c113a02034ccaed91b99754e0098": {
"type": "spyware",
"family": "Inazigram",
"url": "https://www.welivesecurity.com/2017/03/09/new-instagram-credentials-stealers-discovered-google-play/",
"sha256": "464474b7bd50c61ba117573d1def10b047c5c113a02034ccaed91b99754e0098"
},
"4cdbd105ab8117620731630f8f89eb2e6110dbf6341df43712a0ec9837c5a9be": {
"type": "banker",
"family": "Brata",
"url": "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/brata-keeps-sneaking-into-google-play-now-targeting-usa-and-spain/?hilite=%27Android%27%2C%27Malware%27",
"sha256": "4cdbd105ab8117620731630f8f89eb2e6110dbf6341df43712a0ec9837c5a9be"
},
"ba5b031324a2a2bd9398cf695a7d8aea8aae0af27bf414a0108a7a362bebbf11": {
"type": "spyware",
"family": "Inazigram",
"url": "https://www.welivesecurity.com/2017/03/09/new-instagram-credentials-stealers-discovered-google-play/",
"sha256": "ba5b031324a2a2bd9398cf695a7d8aea8aae0af27bf414a0108a7a362bebbf11"
},
"6e995d68c724f121d43ec2ff59bc4e536192360afa3beaec5646f01094f0b745": {
"type": "banker",
"family": "Riltok",
"url": "https://securelist.com/mobile-banker-riltok/91374/",
"sha256": "6e995d68c724f121d43ec2ff59bc4e536192360afa3beaec5646f01094f0b745"
},
"15f5f65b46d79291ef005e4268c3e0c785dcffc49da01debb95ab2b3575f4da2": {
"type": "rootkit",
"family": "LIBSKIN",
"url": "https://www.trendmicro.com/en_us/research/16/b/user-beware-rooting-malware-found-in-3rd-party-app-stores.html",
"sha256": "15f5f65b46d79291ef005e4268c3e0c785dcffc49da01debb95ab2b3575f4da2"
},
"36e74d155ad6ce0b3d546558c8f24d047088400cb923e2ae38990b3ff6c662ee": {
"type": "rootkit",
"family": "ZNIU",
"url": "https://www.trendmicro.com/en_us/research/17/i/zniu-first-android-malware-exploit-dirty-cow-vulnerability.html",
"sha256": "36e74d155ad6ce0b3d546558c8f24d047088400cb923e2ae38990b3ff6c662ee"
},
"d2dd11684e7cd53a134215f173d1bf36c0f5fbdd5a41294cbc032ec8180313f1": {
"type": "rootkit",
"family": "ZNIU",
"url": "https://www.trendmicro.com/en_us/research/17/i/zniu-first-android-malware-exploit-dirty-cow-vulnerability.html",
"sha256": "d2dd11684e7cd53a134215f173d1bf36c0f5fbdd5a41294cbc032ec8180313f1"
},
"2fdb1d7e66332d9398f47d7cb06bfd38a335e5311a201adb60e36c9b5f031279": {
"type": "rootkit",
"family": "ZNIU",
"url": "https://www.trendmicro.com/en_us/research/17/i/zniu-first-android-malware-exploit-dirty-cow-vulnerability.html",
"sha256": "2fdb1d7e66332d9398f47d7cb06bfd38a335e5311a201adb60e36c9b5f031279"
},
"7d81852ead34bb3f87e228f5cb69e7844f51b642d0c45929ceb11ffcbe12e6d6": {
"type": "rootkit",
"family": "ZNIU",
"url": "https://www.trendmicro.com/en_us/research/17/i/zniu-first-android-malware-exploit-dirty-cow-vulnerability.html",
"sha256": "7d81852ead34bb3f87e228f5cb69e7844f51b642d0c45929ceb11ffcbe12e6d6"
},
"c4c9c2befe7c283ddc3885eef5380bf35ae59def84e58783c0aad43b9e3f321d": {
"type": "rootkit",
"family": "ZNIU",
"url": "https://www.trendmicro.com/en_us/research/17/i/zniu-first-android-malware-exploit-dirty-cow-vulnerability.html",
"sha256": "c4c9c2befe7c283ddc3885eef5380bf35ae59def84e58783c0aad43b9e3f321d"
},
"d9de2f8b99643a3d46125c7517dea093ed8eaea3107127c000b6b7acfd9f65b4": {
"type": "rootkit",
"family": "ZNIU",
"url": "https://www.trendmicro.com/en_us/research/17/i/zniu-first-android-malware-exploit-dirty-cow-vulnerability.html",
"sha256": "d9de2f8b99643a3d46125c7517dea093ed8eaea3107127c000b6b7acfd9f65b4"
},
"d0a75e9233d8098f87182d53cd40787bc6f9b671c0f25c3bacdd361ced24741c": {
"type": "rootkit",
"family": "ZNIU",
"url": "https://www.trendmicro.com/en_us/research/17/i/zniu-first-android-malware-exploit-dirty-cow-vulnerability.html",
"sha256": "d0a75e9233d8098f87182d53cd40787bc6f9b671c0f25c3bacdd361ced24741c"
},
"2d7c660b4899bcf4e2efd1473d30af3e0859d003a3b3d531cf84924207debd99": {
"type": "banker",
"family": "Fanta",
"url": "https://www.fortinet.com/blog/threat-research/analyzing-android-malware-using-a-fortisandbox",
"sha256": "2d7c660b4899bcf4e2efd1473d30af3e0859d003a3b3d531cf84924207debd99"
},
"6d4ece4c5712995af7b76a03b535a3eaf10fcdca20f892f8dc9bdaf3fa85d590": {
"type": "banker",
"family": "Fanta",
"url": "https://www.fortinet.com/blog/threat-research/analyzing-android-malware-using-a-fortisandbox",
"sha256": "6d4ece4c5712995af7b76a03b535a3eaf10fcdca20f892f8dc9bdaf3fa85d590"
},
"a15bedfbbdc7022a0b271f26ea333d409486d902166368a6a583a8868e4ea9c9": {
"type": "banker",
"family": "Fanta",
"url": "https://www.fortinet.com/blog/threat-research/analyzing-android-malware-using-a-fortisandbox",
"sha256": "a15bedfbbdc7022a0b271f26ea333d409486d902166368a6a583a8868e4ea9c9"
},
"44c4b9bdcb9840302f928ff035c32e8ecb0328ea5fb712d30510104f57352982": {
"type": "banker",
"family": "Fanta",
"url": "https://www.fortinet.com/blog/threat-research/analyzing-android-malware-using-a-fortisandbox",
"sha256": "44c4b9bdcb9840302f928ff035c32e8ecb0328ea5fb712d30510104f57352982"
},
"30c37ed427252d8fd03dd0df39373c9ad4051b576a36dcfccd479a32ef8c97fa": {
"type": "banker",
"family": "Fanta",
"url": "https://www.fortinet.com/blog/threat-research/analyzing-android-malware-using-a-fortisandbox",
"sha256": "30c37ed427252d8fd03dd0df39373c9ad4051b576a36dcfccd479a32ef8c97fa"
},
"7570817d4ecbd535a8e2bd3d69a53f51fd96d0b9fa1085146ab974c1a4766a81": {
"type": "banker",
"family": "Fanta",
"url": "https://www.fortinet.com/blog/threat-research/analyzing-android-malware-using-a-fortisandbox",
"sha256": "7570817d4ecbd535a8e2bd3d69a53f51fd96d0b9fa1085146ab974c1a4766a81"
},
"d835cf9d88eabc8508f130745fa786385fd7c2cc9c5f29b2da5e6c2dc8372fa6": {
"type": "ransomware",
"family": "Slocker",
"url": "https://blog.trendmicro.com.tw/?p=51736",
"sha256": "d835cf9d88eabc8508f130745fa786385fd7c2cc9c5f29b2da5e6c2dc8372fa6"
},
"000f9f1ce27a57be4db1a0700e680bf36871e2237f18416fe442de0084fa063b": {
"type": "rootkit",
"family": "Godless",
"url": "https://www.whizlabs.com/blog/godless-android-malware/",
"sha256": "000f9f1ce27a57be4db1a0700e680bf36871e2237f18416fe442de0084fa063b"
},
"a346ac7b3dec5c8cabb758d73eb0941f427806db6f572c2453c19223ddf55fe4": {
"type": "rootkit",
"family": "ROOTSTV",
"url": "https://www.bsi.bund.de/EN/Themen/Verbraucherinnen-und-Verbraucher/Cyber-Sicherheitslage/Methoden-der-Cyber-Kriminalitaet/Botnetze/Steckbriefe-aktueller-Botnetze/Steckbriefe/Rootstv/rootstv_node.html",
"sha256": "a346ac7b3dec5c8cabb758d73eb0941f427806db6f572c2453c19223ddf55fe4"
},
"a2af4b765c709860e35974f4744eb7eef5032a6af9b1a97b3946ae550080a3f8": {
"type": "banker",
"family": "EventBot",
"url": "https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born",
"sha256": "a2af4b765c709860e35974f4744eb7eef5032a6af9b1a97b3946ae550080a3f8"
},
"199859a2929af5431df4a4760f93c83472dc21ea0b9e33d9e45439052de44ab3": {
"type": "banker",
"family": "EventBot",
"url": "https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born",
"sha256": "199859a2929af5431df4a4760f93c83472dc21ea0b9e33d9e45439052de44ab3"
},
"3e9933213d3af5b8bc0315c89b3ad17bfa6016980482cd4a858e91d77178257a": {
"type": "banker",
"family": "EventBot",
"url": "https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born",
"sha256": "3e9933213d3af5b8bc0315c89b3ad17bfa6016980482cd4a858e91d77178257a"
},
"793e1a3eda9e050eaefd7b9383bf5d79d56b728ff2d6dabfb25b050546ce0865": {
"type": "banker",
"family": "EventBot",
"url": "https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born",
"sha256": "793e1a3eda9e050eaefd7b9383bf5d79d56b728ff2d6dabfb25b050546ce0865"
},
"906c3093828f934469045479d316a0fa0b75977528a98d6a6bdc4665de7b2dd2": {
"type": "banker",
"family": "EventBot",
"url": "https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born",
"sha256": "906c3093828f934469045479d316a0fa0b75977528a98d6a6bdc4665de7b2dd2"
},
"1cfce7df49ce5dc37d655d80481a3a6637d2e7daff09ceede9d8165fae0fce5f": {
"type": "banker",
"family": "EventBot",
"url": "https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born",
"sha256": "1cfce7df49ce5dc37d655d80481a3a6637d2e7daff09ceede9d8165fae0fce5f"
},
"3f0ced8b829bf0abed887f7a0a4eb33b82ee003b25d98e501eafcbe088ecf865": {
"type": "banker",
"family": "EventBot",
"url": "https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born",
"sha256": "3f0ced8b829bf0abed887f7a0a4eb33b82ee003b25d98e501eafcbe088ecf865"
},
"d82330e1d84c2f866a0ff21093cb9669aaef2b07bf430541ab6182f98f6fdf82": {
"type": "ransomware",
"family": "LeakerLocker",
"url": "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/leakerlocker-mobile-ransomware-acts-without-encryption/",
"sha256": "d82330e1d84c2f866a0ff21093cb9669aaef2b07bf430541ab6182f98f6fdf82"
},
"60f3d4d76cf232372ef569063e01237f5081c45c2e4fecde5fde0da25f0d7484": {
"type": "rootkit",
"family": "ZNIU",
"url": "https://www.trendmicro.com/en_us/research/17/i/zniu-first-android-malware-exploit-dirty-cow-vulnerability.html",
"sha256": "60f3d4d76cf232372ef569063e01237f5081c45c2e4fecde5fde0da25f0d7484"
},
"b2c7f10d758971d09bc4d6b456bac61c3b395ef20de4d56612f243ac1d1031f1": {
"type": "rootkit",
"family": "ZNIU",
"url": "https://www.trendmicro.com/en_us/research/17/i/zniu-first-android-malware-exploit-dirty-cow-vulnerability.html",
"sha256": "b2c7f10d758971d09bc4d6b456bac61c3b395ef20de4d56612f243ac1d1031f1"
},
"f66338e09554693a9d250cec8f89ed5087869d6d75a587078888578316c6a0a0": {
"type": "adware",
"family": "GhostClicker",
"url": "https://www.trendmicro.com/en_us/research/17/h/ghostclicker-adware-is-a-phantomlike-android-click-fraud.html",
"sha256": "f66338e09554693a9d250cec8f89ed5087869d6d75a587078888578316c6a0a0"
},
"723f97ff8f1f14ea4bf80ce83fcab21d03816bb8a7ac49c198e080d6e286a5b1": {
"type": "rootkit",
"family": "ZNIU",
"url": "https://www.trendmicro.com/en_us/research/17/i/zniu-first-android-malware-exploit-dirty-cow-vulnerability.html",
"sha256": "723f97ff8f1f14ea4bf80ce83fcab21d03816bb8a7ac49c198e080d6e286a5b1"
},
"4d8f5e2922e6928a2f8d7d56cc6d2a27828fd2fe2792d2e7ebd963bbe662f7e9": {
"type": "trojan",
"family": "Mapin",
"url": "https://www.welivesecurity.com/2015/09/22/android-trojan-drops-in-despite-googles-bouncer/",
"sha256": "4d8f5e2922e6928a2f8d7d56cc6d2a27828fd2fe2792d2e7ebd963bbe662f7e9"
},
"ed47a5871132c22bf4b7888908f35cacc2cd0c2a6e8e0afffea61d0e14792ea4": {
"type": "adware",
"family": "HiddenAd",
"url": "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/multi-tricks-hiddenads-malware/?hilite=%27android%27%2C%27malware%27",
"sha256": "ed47a5871132c22bf4b7888908f35cacc2cd0c2a6e8e0afffea61d0e14792ea4"
},
"0d7da9b7d6bce9165fa065030ed0a86b40bb52cd4a355e12dea43d496ba5aad1": {
"type": "rootkit",
"family": "ZNIU",
"url": "https://www.trendmicro.com/en_us/research/17/i/zniu-first-android-malware-exploit-dirty-cow-vulnerability.html",
"sha256": "0d7da9b7d6bce9165fa065030ed0a86b40bb52cd4a355e12dea43d496ba5aad1"
},
"a799fda312167cffb3ef53c4a818eb1d0c9005935779cd9e1c839405cfb63fca": {
"type": "rootkit",
"family": "ZNIU",
"url": "https://www.trendmicro.com/en_us/research/17/i/zniu-first-android-malware-exploit-dirty-cow-vulnerability.html",
"sha256": "a799fda312167cffb3ef53c4a818eb1d0c9005935779cd9e1c839405cfb63fca"
},
"1d2164fdc7be110224d66910d1a84a06c8627864920f418f2890aff6a5d0d320": {
"type": "rootkit",
"family": "ZNIU",
"url": "https://www.trendmicro.com/en_us/research/17/i/zniu-first-android-malware-exploit-dirty-cow-vulnerability.html",
"sha256": "1d2164fdc7be110224d66910d1a84a06c8627864920f418f2890aff6a5d0d320"
},
"86eb4574fa0fa4b16ffaac02558110a77b99ef840e8ed32b38547cdfdf14e6ac": {
"type": "rootkit",
"family": "ZNIU",
"url": "https://www.trendmicro.com/en_us/research/17/i/zniu-first-android-malware-exploit-dirty-cow-vulnerability.html",
"sha256": "86eb4574fa0fa4b16ffaac02558110a77b99ef840e8ed32b38547cdfdf14e6ac"
},
"3bf85d0aff5ddc0c57e43b879631ee692d98d01f5c964336471f1cdfe0d291f8": {
"type": "spyware",
"family": "CallerSpy",
"url": "https://www.trendmicro.com/en_us/research/19/l/mobile-cyberespionage-campaign-distributed-through-callerspy-mounts-initial-phase-of-a-targeted-attack.html",
"sha256": "3bf85d0aff5ddc0c57e43b879631ee692d98d01f5c964336471f1cdfe0d291f8"
},
"2add88505e9050a1c9e5887a9d9b52be30068cc14bba002f40be15e0be307630": {
"type": "banker",
"family": "Ghimob",
"url": "https://securelist.com/ghimob-tetrade-threat-mobile-devices/99228/",
"sha256": "2add88505e9050a1c9e5887a9d9b52be30068cc14bba002f40be15e0be307630"
},
"80c29c908818ebeec6d1f12e4c73019cbac7c8b3f5f06c43d6914242c21cb136": {
"type": "banker",
"family": "Ghimob",
"url": "https://securelist.com/ghimob-tetrade-threat-mobile-devices/99228/",
"sha256": "80c29c908818ebeec6d1f12e4c73019cbac7c8b3f5f06c43d6914242c21cb136"
},
"b015c99ad510c766d7fed64aa18f1ff9a7321f062e9c6d2912144168897d166b": {
"type": "banker",
"family": "Ghimob",
"url": "https://securelist.com/ghimob-tetrade-threat-mobile-devices/99228/",
"sha256": "b015c99ad510c766d7fed64aa18f1ff9a7321f062e9c6d2912144168897d166b"
},
"9d6d6f76410428bc4c457c96f5694606caab92dcaa7e709323fb9e66327cfbeb": {
"type": "rootkit",
"family": "Godless",
"url": "https://www.whizlabs.com/blog/godless-android-malware/",
"sha256": "9d6d6f76410428bc4c457c96f5694606caab92dcaa7e709323fb9e66327cfbeb"
},
"c5ca6aa73fdcb523b5e63b52197f134f229792046cbac525d46985ad72880395": {
"type": "trojan",
"family": "MobOk",
"url": "https://gbhackers.com/mobok-malware-via-fake-photo-editing-apps/",
"sha256": "c5ca6aa73fdcb523b5e63b52197f134f229792046cbac525d46985ad72880395"
},
"0c4b08bec1251b1ebc715a7ef1a712cdcb4d37ce0093d88f7fa73b0e05bf7b0e": {
"type": "spyware",
"family": "CallerSpy",
"url": "https://www.trendmicro.com/en_us/research/19/l/mobile-cyberespionage-campaign-distributed-through-callerspy-mounts-initial-phase-of-a-targeted-attack.html",
"sha256": "0c4b08bec1251b1ebc715a7ef1a712cdcb4d37ce0093d88f7fa73b0e05bf7b0e"
},
"7cb0eb93de496e2141b6e0541465ca71a84063867381085692885c75aa59cb1b": {
"type": "spyware",
"family": "CallerSpy",
"url": "https://www.trendmicro.com/en_us/research/19/l/mobile-cyberespionage-campaign-distributed-through-callerspy-mounts-initial-phase-of-a-targeted-attack.html",
"sha256": "7cb0eb93de496e2141b6e0541465ca71a84063867381085692885c75aa59cb1b"
},
"ec5c0f12884158b179a5592002c8e9c10f17035afb27c1f66e53fca8b983e2c0": {
"type": "adware",
"family": "TOASTAMIGO",
"url": "https://www.trendmicro.com/en_us/research/17/k/toast-overlay-weaponized-install-android-malware-single-attack-chain.html",
"sha256": "ec5c0f12884158b179a5592002c8e9c10f17035afb27c1f66e53fca8b983e2c0"
},
"59ec51a43992698a08f8496bc55cf7be4a9ecec381ab638a903f53d72e92247c": {
"type": "trojan",
"family": "Click",
"url": "https://gbhackers.com/clicker-trojan/",
"sha256": "59ec51a43992698a08f8496bc55cf7be4a9ecec381ab638a903f53d72e92247c"
},
"e74ab5be38acd2aa87b3e05aad86e8b9f2fa8bc15c5015b364b8ae810b9d9143": {
"type": "rootkit",
"family": "ROOTSTV",
"url": "https://www.bsi.bund.de/EN/Themen/Verbraucherinnen-und-Verbraucher/Cyber-Sicherheitslage/Methoden-der-Cyber-Kriminalitaet/Botnetze/Steckbriefe-aktueller-Botnetze/Steckbriefe/Rootstv/rootstv_node.html",
"sha256": "e74ab5be38acd2aa87b3e05aad86e8b9f2fa8bc15c5015b364b8ae810b9d9143"
},
"352630c307a03e9c04d8c0a65969358e7e8c2a6a9d68ee790de864a5b691e47d": {
"type": "adware",
"family": "GhostClicker",
"url": "https://www.trendmicro.com/en_us/research/17/h/ghostclicker-adware-is-a-phantomlike-android-click-fraud.html",
"sha256": "352630c307a03e9c04d8c0a65969358e7e8c2a6a9d68ee790de864a5b691e47d"
},
"58be55b3bc11687c63fb15755a317335f881dece298f9aaf5353c4f35423d6c6": {
"type": "rootkit",
"family": "ROOTSTV",
"url": "https://www.bsi.bund.de/EN/Themen/Verbraucherinnen-und-Verbraucher/Cyber-Sicherheitslage/Methoden-der-Cyber-Kriminalitaet/Botnetze/Steckbriefe-aktueller-Botnetze/Steckbriefe/Rootstv/rootstv_node.html",
"sha256": "58be55b3bc11687c63fb15755a317335f881dece298f9aaf5353c4f35423d6c6"
},
"96d4ad62d42f2fc20e90f0ef6c8afbf83831f5f1592b0cd0ab4fdb4a090ef86b": {
"type": "rootkit",
"family": "ROOTSTV",
"url": "https://www.bsi.bund.de/EN/Themen/Verbraucherinnen-und-Verbraucher/Cyber-Sicherheitslage/Methoden-der-Cyber-Kriminalitaet/Botnetze/Steckbriefe-aktueller-Botnetze/Steckbriefe/Rootstv/rootstv_node.html",
"sha256": "96d4ad62d42f2fc20e90f0ef6c8afbf83831f5f1592b0cd0ab4fdb4a090ef86b"
},
"73e5b30c62302d494bea14b0b1bf59efb1f4c93ed7f2a53bf0f074c403fdbd0e": {
"type": "spyware",
"family": "Monokle",
"url": "https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf",
"sha256": "73e5b30c62302d494bea14b0b1bf59efb1f4c93ed7f2a53bf0f074c403fdbd0e"
},
"299b3a90f96b3fc1a4e3eb29be44cb325bd6750228a9342773ce973849507d12": {
"type": "ransomware",
"family": "LeakerLocker",
"url": "https://blog.trendmicro.com/trendlabs-security-intelligence/leakerlocker-mobile-ransomware-threatens-expose-user-information/",
"sha256": "299b3a90f96b3fc1a4e3eb29be44cb325bd6750228a9342773ce973849507d12"
},
"486f80edfb1dea13cde87827b14491e93c189c26830b5350e31b07c787b29387": {
"type": "ransomware",
"family": "LeakerLocker",
"url": "https://blog.trendmicro.com/trendlabs-security-intelligence/leakerlocker-mobile-ransomware-threatens-expose-user-information/",
"sha256": "486f80edfb1dea13cde87827b14491e93c189c26830b5350e31b07c787b29387"
},
"1cd44974c02bb0e758f8bb607c62939c1454e36c9205afc4c4865d9b32fd18b8": {
"type": "trojan",
"family": "Mapin",
"url": "https://www.welivesecurity.com/2015/09/22/android-trojan-drops-in-despite-googles-bouncer/",
"sha256": "1cd44974c02bb0e758f8bb607c62939c1454e36c9205afc4c4865d9b32fd18b8"
},
"58ce4abd526bb056d6b95ed97254816ba9bbfc008182ed91baaff433c8a199b5": {
"type": "trojan",
"family": "Click",
"url": "https://gbhackers.com/clicker-trojan/",
"sha256": "58ce4abd526bb056d6b95ed97254816ba9bbfc008182ed91baaff433c8a199b5"
},
"4aef8d9a3c4cc1e66a6f2c6355ecc38d87d9c81bb2368f4ca07b2a02d2e4923b": {
"type": "spyware",
"family": "ChatSpy",
"url": "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/android-spyware-targets-security-job-seekers-in-saudi-arabia/?hilite=%27android%27%2C%27malware%27",
"sha256": "4aef8d9a3c4cc1e66a6f2c6355ecc38d87d9c81bb2368f4ca07b2a02d2e4923b"
},
"d4073a2dd32d06d41cee48241544f03dc7e99f8e96705b8d65fb45c91818c882": {
"type": "spyware",
"family": "Xavier",
"url": "https://www.trendmicro.com/en_us/research/17/f/analyzing-xavier-information-stealing-ad-library-android.html",
"sha256": "d4073a2dd32d06d41cee48241544f03dc7e99f8e96705b8d65fb45c91818c882"
},
"6839b88624eb5bf9a0783293fa7e940fb736ee37f746c68cb880b0b171125d0c": {
"type": "spyware",
"family": "Xavier",
"url": "https://www.trendmicro.com/en_us/research/17/f/analyzing-xavier-information-stealing-ad-library-android.html",
"sha256": "6839b88624eb5bf9a0783293fa7e940fb736ee37f746c68cb880b0b171125d0c"
},
"4701a359647442d9b2d589cbba9ac7cf56949539410dbb4194d9980ec0d6b5d4": {
"type": "ransomware",
"family": "LeakerLocker",
"url": "https://blog.trendmicro.com/trendlabs-security-intelligence/leakerlocker-mobile-ransomware-threatens-expose-user-information/",
"sha256": "4701a359647442d9b2d589cbba9ac7cf56949539410dbb4194d9980ec0d6b5d4"
},
"5769f8e5133688978b2e2e5878f968aaac88a8c8ba9dff39bafe74d04c21b40c": {
"type": "rootkit",
"family": "ROOTSTV",
"url": "https://www.bsi.bund.de/EN/Themen/Verbraucherinnen-und-Verbraucher/Cyber-Sicherheitslage/Methoden-der-Cyber-Kriminalitaet/Botnetze/Steckbriefe-aktueller-Botnetze/Steckbriefe/Rootstv/rootstv_node.html",
"sha256": "5769f8e5133688978b2e2e5878f968aaac88a8c8ba9dff39bafe74d04c21b40c"
},
"ff6ca0e2ccdf44dc78c739b9b94baef1d579ac7f991b52c3f9f505090a5b9d90": {
"type": "rootkit",
"family": "ROOTSTV",
"url": "https://www.bsi.bund.de/EN/Themen/Verbraucherinnen-und-Verbraucher/Cyber-Sicherheitslage/Methoden-der-Cyber-Kriminalitaet/Botnetze/Steckbriefe-aktueller-Botnetze/Steckbriefe/Rootstv/rootstv_node.html",
"sha256": "ff6ca0e2ccdf44dc78c739b9b94baef1d579ac7f991b52c3f9f505090a5b9d90"
},
"74630208103f9ada2e1fb2a6e7e58eb191d3c9c1603187b89f222c58236a87eb": {
"type": "adware",
"family": "GhostClicker",
"url": "https://www.trendmicro.com/en_us/research/17/h/ghostclicker-adware-is-a-phantomlike-android-click-fraud.html",
"sha256": "74630208103f9ada2e1fb2a6e7e58eb191d3c9c1603187b89f222c58236a87eb"
},
"02ac729e2be729dd5f6be202fb512f6149431add1ed683d115c0a61d5b257219": {
"type": "rootkit",
"family": "ROOTSTV",
"url": "https://www.bsi.bund.de/EN/Themen/Verbraucherinnen-und-Verbraucher/Cyber-Sicherheitslage/Methoden-der-Cyber-Kriminalitaet/Botnetze/Steckbriefe-aktueller-Botnetze/Steckbriefe/Rootstv/rootstv_node.html",
"sha256": "02ac729e2be729dd5f6be202fb512f6149431add1ed683d115c0a61d5b257219"
},
"0114edb7dbc86bf3e2fe70589749b1dd4bf06ec87fabd85a83e28e4c45569a24": {
"type": "rootkit",
"family": "ROOTSTV",
"url": "https://www.bsi.bund.de/EN/Themen/Verbraucherinnen-und-Verbraucher/Cyber-Sicherheitslage/Methoden-der-Cyber-Kriminalitaet/Botnetze/Steckbriefe-aktueller-Botnetze/Steckbriefe/Rootstv/rootstv_node.html",
"sha256": "0114edb7dbc86bf3e2fe70589749b1dd4bf06ec87fabd85a83e28e4c45569a24"
},
"b4a8a6b8cd302fe614331d7549ca09b586b0542993d8329d77b65b3cbca3ea37": {
"type": "rootkit",
"family": "ROOTSTV",
"url": "https://www.bsi.bund.de/EN/Themen/Verbraucherinnen-und-Verbraucher/Cyber-Sicherheitslage/Methoden-der-Cyber-Kriminalitaet/Botnetze/Steckbriefe-aktueller-Botnetze/Steckbriefe/Rootstv/rootstv_node.html",
"sha256": "b4a8a6b8cd302fe614331d7549ca09b586b0542993d8329d77b65b3cbca3ea37"
},
"d8aca3508ee537c0f5b07c6652f2a771c9d7cddd728196669bfcba93b2e5eb2c": {
"type": "rootkit",
"family": "ROOTSTV",
"url": "https://www.bsi.bund.de/EN/Themen/Verbraucherinnen-und-Verbraucher/Cyber-Sicherheitslage/Methoden-der-Cyber-Kriminalitaet/Botnetze/Steckbriefe-aktueller-Botnetze/Steckbriefe/Rootstv/rootstv_node.html",
"sha256": "d8aca3508ee537c0f5b07c6652f2a771c9d7cddd728196669bfcba93b2e5eb2c"
},
"3327c2a0765817e7c2d5787c1889a9dc9abea9593077b8fb217161de499374bf": {
"type": "rootkit",
"family": "ROOTSTV",
"url": "https://www.bsi.bund.de/EN/Themen/Verbraucherinnen-und-Verbraucher/Cyber-Sicherheitslage/Methoden-der-Cyber-Kriminalitaet/Botnetze/Steckbriefe-aktueller-Botnetze/Steckbriefe/Rootstv/rootstv_node.html",
"sha256": "3327c2a0765817e7c2d5787c1889a9dc9abea9593077b8fb217161de499374bf"
},
"fd1a4d039bbf641f9b063d83e98b47493b9624793f60f3ba3761cd1c12472e0b": {
"type": "rootkit",
"family": "ROOTSTV",
"url": "https://www.bsi.bund.de/EN/Themen/Verbraucherinnen-und-Verbraucher/Cyber-Sicherheitslage/Methoden-der-Cyber-Kriminalitaet/Botnetze/Steckbriefe-aktueller-Botnetze/Steckbriefe/Rootstv/rootstv_node.html",
"sha256": "fd1a4d039bbf641f9b063d83e98b47493b9624793f60f3ba3761cd1c12472e0b"
},
"b4822eeb71c83e4aab5ddfecfb58459e5c5e10d382a2364da1c42621f58e119b": {
"type": "trojan",
"family": "BKOTKLIND",
"url": "https://www.trendmicro.com/en_us/research/18/a/first-kotlin-developed-malicious-app-signs-users-premium-sms-services.html",
"sha256": "b4822eeb71c83e4aab5ddfecfb58459e5c5e10d382a2364da1c42621f58e119b"
},
"364a50a23c2b11cd2007d7ee079fce5899c47f3c511b70933e0893cf2bcd21fc": {
"type": "trojan",
"family": "Ztorg",
"url": "https://securelist.com/ztorg-from-rooting-to-sms/78775/",
"sha256": "364a50a23c2b11cd2007d7ee079fce5899c47f3c511b70933e0893cf2bcd21fc"
},
"0ea026ba05dc81043cf407e6d9da27ed432d9e45e7e2efdd74e6e837bd6948bb": {
"type": "adware",
"family": "GhostClicker",
"url": "https://www.trendmicro.com/en_us/research/17/h/ghostclicker-adware-is-a-phantomlike-android-click-fraud.html",
"sha256": "0ea026ba05dc81043cf407e6d9da27ed432d9e45e7e2efdd74e6e837bd6948bb"
},
"30bf493c79824a255f9b56db74a04e711a59257802f215187faffae9c6c2f8dc": {
"type": "adware",
"family": "Haken",
"url": "https://gbhackers.com/malicious-app-haken-malware/",
"sha256": "30bf493c79824a255f9b56db74a04e711a59257802f215187faffae9c6c2f8dc"
},
"eeb73df9f1910dd3f0aae8abe23804d8c897d869e1941c3539eeaa59ea52067e": {
"type": "adware",
"family": "AdDisplay",
"url": "https://www.welivesecurity.com/2019/10/24/tracking-down-developer-android-adware/",
"sha256": "eeb73df9f1910dd3f0aae8abe23804d8c897d869e1941c3539eeaa59ea52067e"
},
"11ba0e1e5735529763768580c9e187bf1ff0b7ed24f66ac5b4ab2bb2afbf41de": {
"type": "adware",
"family": "GhostClicker",
"url": "https://www.trendmicro.com/en_us/research/17/h/ghostclicker-adware-is-a-phantomlike-android-click-fraud.html",
"sha256": "11ba0e1e5735529763768580c9e187bf1ff0b7ed24f66ac5b4ab2bb2afbf41de"
},
"c1a26c5f28cecb4bc6079de8d7c3283984a68db17f56c869ae7171ab7702d1d6": {
"type": "spyware",
"family": "Xavier",
"url": "https://www.trendmicro.com/en_us/research/17/f/analyzing-xavier-information-stealing-ad-library-android.html",
"sha256": "c1a26c5f28cecb4bc6079de8d7c3283984a68db17f56c869ae7171ab7702d1d6"
},
"1c32dcfc1eac9b34b181da2e3f7d7048df3910b022181e7ef07f1a32e9bb9557": {
"type": "adware",
"family": "AdDisplay",
"url": "https://www.welivesecurity.com/2019/10/24/tracking-down-developer-android-adware/",
"sha256": "1c32dcfc1eac9b34b181da2e3f7d7048df3910b022181e7ef07f1a32e9bb9557"
},
"256285d5b9df3470f91f3c4efb4dce8fe80d91500c382153c8c23d9a62dcfe0e": {
"type": "trojan",
"family": "Ztorg",
"url": "https://securelist.com/ztorg-money-for-infecting-your-smartphone/78325/",
"sha256": "256285d5b9df3470f91f3c4efb4dce8fe80d91500c382153c8c23d9a62dcfe0e"
},
"a47049094051135631aea2c9954a6bc7e605ff455cd7ef1e0999042b068a841f": {
"type": "adware",
"family": "Haken",
"url": "https://gbhackers.com/malicious-app-haken-malware/",
"sha256": "a47049094051135631aea2c9954a6bc7e605ff455cd7ef1e0999042b068a841f"
},
"7f5c5a5f57650a44c10948926e107ba9e69b98d1cd1ad47af0696b6cccc08d13": {
"type": "trojan",
"family": "MobOk",
"url": "https://gbhackers.com/mobok-malware-via-fake-photo-editing-apps/",
"sha256": "7f5c5a5f57650a44c10948926e107ba9e69b98d1cd1ad47af0696b6cccc08d13"
},
"9a01dcf472c3bd52570ebb94e1a3569836b52cda371095126fc640640c761c92": {
"type": "adware",
"family": "AdDisplay",
"url": "https://www.welivesecurity.com/2019/10/24/tracking-down-developer-android-adware/",
"sha256": "9a01dcf472c3bd52570ebb94e1a3569836b52cda371095126fc640640c761c92"
},
"a42e141443f94e08c76dc92bdeb1243db8bd1618622c974b883381ddf243a55f": {
"type": "adware",
"family": "AdDisplay",
"url": "https://www.welivesecurity.com/2019/10/24/tracking-down-developer-android-adware/",
"sha256": "a42e141443f94e08c76dc92bdeb1243db8bd1618622c974b883381ddf243a55f"
},
"7331d9cd2ec98c9c01eb5d84bf4c783dc89dd62676d17875be2d07dc9ebe358b": {
"type": "spyware",
"family": "Xavier",
"url": "https://www.trendmicro.com/en_us/research/17/f/analyzing-xavier-information-stealing-ad-library-android.html",
"sha256": "7331d9cd2ec98c9c01eb5d84bf4c783dc89dd62676d17875be2d07dc9ebe358b"
},
"3100c112c1df7b25707fb81206dcce76d9c1ccb1ef1617cf9a3b4837784ecc5e": {
"type": "banker",
"family": "FAKEBANK",
"url": "https://securityaffairs.com/26900/cyber-crime/operation-emmental-banking.html",
"sha256": "3100c112c1df7b25707fb81206dcce76d9c1ccb1ef1617cf9a3b4837784ecc5e"
},
"9a3e4f97dddadaaaf0fa7318576ce45c67ce329f9dc1cecd7fba626aec06f516": {
"type": "banker",
"family": "FAKEBANK",
"url": "https://securityaffairs.com/26900/cyber-crime/operation-emmental-banking.html",
"sha256": "9a3e4f97dddadaaaf0fa7318576ce45c67ce329f9dc1cecd7fba626aec06f516"
},
"c5cdba8771e2aee76d5bad8c2e225cd4a642050a7cfa6f22132edf607de42349": {
"type": "banker",
"family": "FAKEBANK",
"url": "https://securityaffairs.com/26900/cyber-crime/operation-emmental-banking.html",
"sha256": "c5cdba8771e2aee76d5bad8c2e225cd4a642050a7cfa6f22132edf607de42349"
},
"b8a70081136fce7ec11cf218f23dd37ac7c74db44c0367d35f64cd9e3bf58c17": {
"type": "banker",
"family": "FAKEBANK",
"url": "https://securityaffairs.com/26900/cyber-crime/operation-emmental-banking.html",
"sha256": "b8a70081136fce7ec11cf218f23dd37ac7c74db44c0367d35f64cd9e3bf58c17"
},
"ebb512854976651194160b9faa0b83e225076268b490f38321aad0171fa17548": {
"type": "banker",
"family": "FAKEBANK",
"url": "https://securityaffairs.com/26900/cyber-crime/operation-emmental-banking.html",
"sha256": "ebb512854976651194160b9faa0b83e225076268b490f38321aad0171fa17548"
},
"1480df67bc531d4be71ec14016b7b98926cbd73a11f7016e2d543a0bdd13dbea": {
"type": "spyware",
"family": "Xavier",
"url": "https://www.trendmicro.com/en_us/research/17/f/analyzing-xavier-information-stealing-ad-library-android.html",
"sha256": "1480df67bc531d4be71ec14016b7b98926cbd73a11f7016e2d543a0bdd13dbea"
},
"800d0de11cc1790a09ae1c224f5bf989d03fa121ad6485c17bd0bf207f967d5b": {
"type": "adware",
"family": "hiddad",
"url": "https://www.welivesecurity.com/2017/03/08/aggressive-ad-displaying-google-play-app-tricks-users-leaving-high-ratings/",
"sha256": "800d0de11cc1790a09ae1c224f5bf989d03fa121ad6485c17bd0bf207f967d5b"
},
"8da47b68007fb11963d5eb9a428d21cace5908500fc2e56e15ab8269f375c2f4": {
"type": "adware",
"family": "hiddad",
"url": "https://www.welivesecurity.com/2017/03/08/aggressive-ad-displaying-google-play-app-tricks-users-leaving-high-ratings/",
"sha256": "8da47b68007fb11963d5eb9a428d21cace5908500fc2e56e15ab8269f375c2f4"
},
"5f5d1ed09f98ae4d1ed9c3349dc400b1a36f2723093fbb4d1df5c5d7237e704a": {
"type": "spyware",
"family": "Xavier",
"url": "https://www.trendmicro.com/en_us/research/17/f/analyzing-xavier-information-stealing-ad-library-android.html",
"sha256": "5f5d1ed09f98ae4d1ed9c3349dc400b1a36f2723093fbb4d1df5c5d7237e704a"
},
"30c90d4ec57d80c88c1a17bb50d2b76dc2eb66fd19a0c7045a07ed682b338501": {
"type": "adware",
"family": "TOASTAMIGO",
"url": "https://www.trendmicro.com/en_us/research/17/k/toast-overlay-weaponized-install-android-malware-single-attack-chain.html",
"sha256": "30c90d4ec57d80c88c1a17bb50d2b76dc2eb66fd19a0c7045a07ed682b338501"
}
}