ANDROIDOS_GONESIXTY.A

 Analysis by: Christopher Daniel So

 THREAT SUBTYPE:

Information Stealer

 PLATFORM:

Android OS

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This Trojan may be unknowingly downloaded by a user while visiting malicious websites.

It steals certain information from the system and/or the user.

  TECHNICAL DETAILS

File Size:

Varies

File Type:

DEX

Initial Samples Received Date:

30 Sep 2011

Payload:

Steals information

Arrival Details

This Trojan may be unknowingly downloaded by a user while visiting malicious websites.

Information Theft

This Trojan steals the following information:

  • Call Logs
    • Number - number of the called or calling party
    • Type - type of call (incoming, outgoing, missed)
    • Date - date and time the call was made
    • Duration - duration of the call
  • Contact information
    • Name - name of the contact
    • Numbers - phone numbers of the contact
  • SMS Messages
    • Address - the number of the sender of the message
    • Date - the date and time the message was sent
    • Body - the text containing the actual message
  • Visited URLs

Stolen Information

This Trojan sends the gathered information via HTTP POST to the following URL:

  • http://{BLOCKED}s.com/upload.php

  SOLUTION

Minimum Scan Engine:

9.200

TMMS Pattern File:

1.143.00

TMMS Pattern Date:

03 Oct 2011

Step 1

Trend Micro Mobile Security Solution

Trend Micro Mobile Security Personal Edition protects Android smartphones and tablets from malicious and Trojanized applications. The App Scanner is free and detects malicious and Trojanized apps as they are downloaded, while SmartSurfing blocks malicious websites using your device's Android browser.

Download and install the Trend Micro Mobile Security App via Google Play.

Step 2

Remove unwanted apps on your Android mobile device

[ Learn More ]

Did this description help? Tell us how we did.

Related Blog Entries