That sort of exists:

en.wikipedia.org/wiki/EICAR_test_file

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
EICAR test file - Wikipedia

That’s just a test file tho. Its whole purpose is to prove heuristic based scans work.

It’s not actually a virus.

No it’s not but the whole point of it is that antivirus packages detect it, and they will kill and quarantine the process handling the data. Its purpose is to trigger an antivirus response for testing purposes.

So it can indeed be used as a DoS kinda thing in many cases.

Nice, if android even cares though. Dunno, what’s the state of android AV these days?

There’s some AV packages like Lookout that are pretty common in corporate environments.

And really any big data collection through apps will make itself to servers eventually if course. You don’t need to open a URL for this to trigger, the eicar code being in memory of a process is enough.

Of course you do need to decode the QR. But I’m sure many environments focused on video data collection would device QR codes.

Yeah, turns out a lot of companies don’t really think about security, here’s a DEF CON talk where they find stuff that chokes on it:

www.youtube.com/watch?v=cIcbAMO6sxo

DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E I E I CAR

YouTube