diff --git a/FakeApps/GooglePlayServices.apk b/FakeApps/GooglePlayServices.apk new file mode 100644 index 0000000..29e60b9 Binary files /dev/null and b/FakeApps/GooglePlayServices.apk differ diff --git a/FakeApps/README.md b/FakeApps/README.md index 507bed9..3226f7b 100644 --- a/FakeApps/README.md +++ b/FakeApps/README.md @@ -7,3 +7,6 @@ Theses are in 3 categories: - ``real app but with malicious code`` apps The most destructive one is the third one, make sure to run this only on **virtual marchines**. + +> [!NOTE] +> I found an archive with some fake Google Play Services app, I managed to extract only **one** fake app. diff --git a/README.md b/README.md index eca7863..ec0c5ef 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,4 @@ -# Android Malware Samples (Currently: 300 samples) +# Android Malware Samples (Currently: 307 samples) [![Lint GitHub Actions](https://github.com/ashishb/android-malware/actions/workflows/lint-github-actions.yaml/badge.svg)](https://github.com/ashishb/android-malware/actions/workflows/lint-github-actions.yaml) diff --git a/unclassified_apks/Unknown (Malware Run 1)/1722087714.apk b/unclassified_apks/Unknown (Malware Run 1)/1722087714.apk new file mode 100644 index 0000000..f8dc67c Binary files /dev/null and b/unclassified_apks/Unknown (Malware Run 1)/1722087714.apk differ diff --git a/unclassified_apks/Unknown (Malware Run 1)/22.apk b/unclassified_apks/Unknown (Malware Run 1)/22.apk new file mode 100644 index 0000000..0f79cdb Binary files /dev/null and b/unclassified_apks/Unknown (Malware Run 1)/22.apk differ diff --git a/unclassified_apks/Unknown (Malware Run 1)/Android.apk b/unclassified_apks/Unknown (Malware Run 1)/Android.apk new file mode 100644 index 0000000..30bd2e0 Binary files /dev/null and b/unclassified_apks/Unknown (Malware Run 1)/Android.apk differ diff --git a/unclassified_apks/Unknown (Malware Run 1)/README.MD b/unclassified_apks/Unknown (Malware Run 1)/README.MD new file mode 100644 index 0000000..e6b40aa --- /dev/null +++ b/unclassified_apks/Unknown (Malware Run 1)/README.MD @@ -0,0 +1,2 @@ +# Unknown +Got the samples from doing a malware run, can't upload all of them since some of them exceed the 5MB limit, might make a Google Drive link. diff --git a/unclassified_apks/Unknown (Malware Run 1)/build.apk b/unclassified_apks/Unknown (Malware Run 1)/build.apk new file mode 100644 index 0000000..379fea3 Binary files /dev/null and b/unclassified_apks/Unknown (Malware Run 1)/build.apk differ diff --git a/unclassified_apks/Unknown (Malware Run 1)/com.adobe.flashplayer-11.1.115.81-111115081-minAPI14.apk b/unclassified_apks/Unknown (Malware Run 1)/com.adobe.flashplayer-11.1.115.81-111115081-minAPI14.apk new file mode 100644 index 0000000..c92ae7b Binary files /dev/null and b/unclassified_apks/Unknown (Malware Run 1)/com.adobe.flashplayer-11.1.115.81-111115081-minAPI14.apk differ diff --git a/unclassified_apks/fullphonecleaner.apk b/unclassified_apks/fullphonecleaner.apk new file mode 100644 index 0000000..9548398 Binary files /dev/null and b/unclassified_apks/fullphonecleaner.apk differ