Home / malwarePDF  

Trojan:AndroidOS/Fakeplayer.C


First posted on 23 October 2010.
Source: SecurityHome

Aliases :

Trojan:AndroidOS/Fakeplayer.C is also known as Trojan-SMS.AndroidOS.FakePlayer.c (Kaspersky), Android.SmsSend.3 (Dr.Web), Troj/FakPlay-C (Sophos), AndroidOS.FakePlayer.B (Symantec), Android.BA41932B (Trend Micro).

Explanation :

Trojan:AndroidOS/Fakeplayer.C may be downloaded as a standard .APK installer for mobile devices running the Android platform. It is available as a download in adult sites originating from Russia and poses as an adult media player application.
Top

Trojan:AndroidOS/Fakeplayer.C may be downloaded as a standard .APK installer for mobile devices running the Android platform. It poses as an adult media player application. Installation Upon installation, Trojan:AndroidOS/Fakeplayer.C may use the following icon: It displays the following information: When viewed on a phone running the Android operating system, this malicious application may appear as the following: Payload Sends SMS without user's knowledge Trojan:AndroidOS/Fakeplayer.C displays "Wait" in Cyrillic, while it sends SMS messages without the user's consent. It sends specific messages to certain premium Russian SMS short code numbers: It sends the following messages: 846978 845784 846996 844858 To the SMS number: 7132 It sends the following message: dx427123 To the SMS number: 4161

Analysis by Marianne Mallen

Last update 23 October 2010

 

TOP