種類 |
Spyware
|
||||||
危険度/拡散度 |
![]() ![]() |
||||||
発見日 |
[korea] 2011-05-12 [Foreign] 0000-00-00
|
||||||
Virobot対応 |
2011-05-12 [Able to detect & repair]
|
||||||
1. Summary The malicious code targets to China Mobile users. This Adsms malicious code spreads out through a certain link in SMS and it infects devices by inducing users to install fake patch update.
3. Authority Information android.permission.WRITE_SMS android.permission.SEND_SMS android.permission.RECEIVE_SMS android.permission.RECEIVE_BOOT_COMPLETED android.permission.ACCESS_NETWORK_STATE android.permission.BROADCAST_PACKAGE_REMOVED android.permission.BROADCAST_PACKAGE_ADDED android.permission.ACCESS_WIFI_STATE android.permission.CHANGE_WIFI_STATE android.permission.WAKE_LOCK android.permission.INTERNET android.permission.WRITE_EXTERNAL_STORAGE android.permission.READ_PHONE_STATE android.permission.WAKE_LOCK android.permission.DEVICE_POWER android.permission.WRITE_APN_SETTINGS
4. Analysis The following image shows the SMS that is used for distributing Adsms malicious code.
<A SMS that has malicious link>
<App information>
<Network packet information>
<v1.log file information>
Through the following codes, it is available to check a routine which creates URL to request config file to C&C server.
<URL routine>
<Code for collecting information> |
|||||||
[How to repair]
|