Home / malwarePDF  

Trojan:AndroidOS/Fakeplayer.B


First posted on 24 September 2010.
Source: SecurityHome

Aliases :

Trojan:AndroidOS/Fakeplayer.B is also known as Trojan-SMS.AndroidOS.FakePlayer.b (Kaspersky), Trojan.Android.FakePlayer.B (BitDefender), Android.SmsSend.2 (Dr.Web), Android/FakePlayer.B (ESET), Trojan-SMS (Ikarus), Android/FakePlayer.B (Panda), Troj/FakPlay-B (Sophos), AndroidOS.FakePlayer (Symantec).

Explanation :

Trojan:AndroidOS/Fakeplayer.B may be downloaded as a standard .APK installer for mobile devices running the Android platform. It is available as a download in adult sites originating from Russia and poses as an adult media player application.
Top

Trojan:AndroidOS/Fakeplayer.B may be downloaded as a standard .APK installer for mobile devices running the Android platform. It is available as a download in adult sites originating from Russia and poses as an adult media player application. Installation Upon installation, Trojan:AndroidOS/Fakeplayer.B displays the following program information: It runs in the background and does not display anything on execution. When viewed on a phone running the Android operating system, this malicious application may appear as the following icon: Payload Sends SMS without user's knowledge Trojan:AndroidOS/Fakeplayer.B sends SMS messages without the user's consent. The SMS it sends may contain any of the following strings 842397 845784 846996 844858 849321 The message may be sent to the Russian premium SMS short code number "7132", which may charge the user without his or her knowledge.

Analysis by Marianne Mallen

Last update 24 September 2010

 

TOP