Home / malwarePDF  

Android.Fakemrat


First posted on 27 January 2016.
Source: Symantec

Aliases :

There are no other names known for Android.Fakemrat.

Explanation :

Android package file
The Trojan may arrive as a package with the following characteristics:

Package name: com.view.openpdf
Version number: 1.0

Permissions
When the Trojan is being installed, it requests permissions to perform the following actions: Access information about networksAccess information about the W-iFi stateOpen network connectionsCheck the phone's current stateRedirect phone calls to a different number or end phone callsPlace an outgoing callRead user's contact dataRead SMS messagesWrite to external storage devicesAccess low-level system logsRead user's call logMount and unmount file systemsRecord audioAccess location information, such as GPS informationAccess location information, such as Cell-ID or Wi-FiAccess list of accountsManage accounts on the deviceStart once the device has finished bootingEnd background processesAllow all possible interactions across usersAccess the camera

Installation
Once installed, the application will display a red icon with the text "PDF FOTOSEARCH" in white.


Functionality
When the Trojan is executed, it opens a .pdf file within the application.

Next, the Trojan connects to the following remote location through TCP port 3728: ziba.lenovositegroup.com
The Trojan may then perform the following actions: Open a remote shellRecord from the camera and microphoneRecord phone callsUpload and download filesInstalls additional apps
The Trojan may also gather the following details: Lists of accounts, apps, and running processesDevice informationNetwork informationLocation dataContact dataPhotosSMS messages

Last update 27 January 2016

 

TOP