the Ares infection preys on the poorly secured configurations many set-top boxes use with the ADB debugging interface in Android. In many of the boxes, TCP port 5555 has been opened for both ADB and remote management commands, making it an easy target to any attacker able to scan the open internet.

Do you have a baseline for "normal" in your network? Does it include adb traffic?
A display filter of tcp.port==5555 or tcp.port in {5555..5585} would be a good start.