Android.Counterclank: Malware or Adware?
Tags
cmtmf-attack-pattern: | Sms Fraud |
attack-pattern: | Data Model Malware - T1587.001 Malware - T1588.001 Tool - T1588.002 |
Common Information
Type | Value |
---|---|
UUID | d97de45d-e8c5-431d-885e-7421837d07b2 |
Fingerprint | 3c2c499525b38f05 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Jan. 30, 2012, 1 p.m. |
Added to db | Oct. 9, 2022, 4:15 p.m. |
Last updated | Nov. 8, 2024, 3:30 p.m. |
Headline | Vulnerability Information |
Title | Android.Counterclank: Malware or Adware? |
Detected Hints/Tags/Attributes | 34/2/15 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 1 | www.apperhand.com |
|
Details | Domain | 2 | data.flurry.com |
|
Details | Domain | 1 | aap.do |
|
Details | Domain | 1 | www.jigsaur.com |
|
Details | Domain | 1 | jigsaur.com |
|
Details | Domain | 1 | www.umeng.com |
|
Details | Domain | 1 | mobclix.com |
|
Details | Domain | 41 | doubleclick.net |
|
Details | Domain | 1 | apperhand.com |
|
Details | File | 1 | andr.pl |
|
Details | Url | 1 | http://www.apperhand.com/protocolgw/protocol/commands |
|
Details | Url | 1 | http://www.searchmobileonline.com |
|
Details | Url | 1 | http://data.flurry.com/aap.do |
|
Details | Url | 1 | http://www.jigsaur.com/index.wsgi?method=checkforreward |
|
Details | Url | 1 | http://www.umeng.com/app_logs |