Home / malware Android.Dengaru
First posted on 13 May 2015.
Source: SymantecAliases :
There are no other names known for Android.Dengaru.
Explanation :
Android package file
The Trojan may arrive as a package with the following characteristics:
Package name: com.table.hockes
Permissions
When the Trojan is being installed, it requests permissions to perform the following actions: Open network connectionsOpen system alert windowsAccess information about networks
Installation
Once installed, the application will display an icon with an image of a cog in order to mimic the appearance of the Android Settings application.
Functionality
When the Trojan is executed, it connects to the following remote location: [http://]pop.oin.systems/com/geti[REMOVED]
The Trojan may then perform the following actions: Connect to websites listed in configuration files that were downloaded from the command-and-control serverClick on embedded links within these websites, which may allow the attackers to earn revenueLast update 13 May 2015