Upon infected, this malicious application can collect certain information and can leak to certain URL.
Therefore, users need to be careful on downloading application.
With increased users of Android, various and malicious applications are also be generated.
2. Spreading path and symptoms of infection
This following figure describes permission requirement page on installation.
After the installation, this execution icon on following figure will be generated.
* Run screen
After the installation, this will perform following malicious behaviors.
* Collects smartphone information
This malicious application will collect IMEI, manufacturer, and model with following code.
Collected information will be hashed as MD5 form and will be leaked to certain site.
* Collects user name and e-mail account information
This malicious application will collect user name and e-mail account information.
* Tries to leak gathered information
Furthermore, this malicious application will tries to leak gathered information to certain URL.
3. How to prevent
To use smartphone safely from security threats of these malicious applications, we recommend following tips "Smartphone security management tips" for general users.
INCA Internet (Security Response Center / Emergency Response Team) provides diagnosis/treatment function with nProtect Mobile for Android for mobile such as malicious file stated above and runs responding system against various security threats.