Where to Buy Trend Micro Products

For Home

For Small Business

1-888-762-8736
(M-F 8:00am-5:00pm CST)

For Enterprise

1-877-218-7353
(M-F 8:00am-5:00pm CST)

Not in the United States?
Select the country/language of your choice:

Asia Pacific Region

Europe

The Americas

Not in the United States?
Select the country/language of your choice:

Asia/Pacific

Europe

America

Login

For Home

For Business

For Partners

Threat Encyclopedia

ANDROIDOS_NICKISPY.A

ANALYSIS BY

Karl Dominguez


THREAT SUBTYPE:

Information Stealer

PLATFORM:

Android OS

OVERALL RISK RATING:
DAMAGE POTENTIAL:
DISTRIBUTION POTENTIAL:
REPORTED INFECTION:

  • Threat Type:Spyware

  • Destructiveness:No

  • Encrypted: No

  • In the wild: Yes

OVERVIEW


This Android malware is said to record actual phone conversations.

To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.

This Android malware automatically executes upon boot-up and runs certain services that monitor SMS, calls, and location.

When executed, it does several routines such as gathering the GPS location, recording calls made in the infected phone, and stealing messages in the inbox and outbox.

It sends the information it gathers to a remote site using port 2018. It also sends the IMEI of the infected device via SMS to a certain number.

This spyware may be unknowingly downloaded by a user while visiting malicious websites.

TECHNICAL DETAILS

File Size:

30,554 bytes

File Type:

DEX

Memory Resident:

No

Initial Samples Received Date:

28 Jul 2011

Arrival Details

This spyware may be unknowingly downloaded by a user while visiting malicious websites.

NOTES:
This malware automatically executes upon boot-up and runs the following services that monitor SMS, calls, and location:

  • XM_CallListener
  • MainService
  • XM_CallRecordService
  • SocketService
  • XM_SmsListener
  • GpsService
  • RecordService
It performs the following routines:
  • Gathers the GPS location
  • Steals messages in the inbox and outbox of the affected phone
  • Records calls made in the affected phone
Records of calls are saved in the following directory in .AMR format:
  • /sdcard/shangzhou/callrecord/
The file name of the .AMR files are as follows:
  • YYYYMMDDHHMMss
It sends the information it gathers to the following remote site using port 2018:
  • {BLOCKED}n.{BLOCKED}o.com
It sends the IMEI of the infected device via SMS to the following number:
  • {BLOCKED}68161

SOLUTION

Minimum Scan Engine:

8.900

TMMS Pattern File:

1.121.00

TMMS Pattern Date:

01 Aug 2011

Step 1

Trend Micro Mobile Security Solution

Trend Micro Mobile Security Personal Edition protects Android smartphones and tablets from malicious and Trojanized applications. The App Scanner is free and detects malicious and Trojanized apps as they are downloaded, while SmartSurfing blocks malicious websites using your device's Android browser.

Download and install the Trend Micro Mobile Security App via Google Play.

Step 2

Remove unwanted apps on your Android mobile device

[ Learn More ]

Did this description help? Tell us how we did.

Featured Stories

Connect with us on