AndroidOS_GigabudRat
Android

Threat Type: Trojan Spy
Destructiveness: No
Encrypted:
In the wild: Yes
TECHNICAL DETAILS
Mobile Malware Routine
This Trojan Spy posts the following information to its command and control (C&C) server:
- Phone number
- Password of bank
- Bank name
- Bank acount
It receives commands from the following C&C server(s):
- bweri6.]cc
Based on analysis of the codes, it has the following capabilities:
- Record screen
- Set volmue of phone ring
- Send sms
- Display a dialog mimic the given bank UI
- Launch a specific app
- Uninstall a given package
SOLUTION
9.800
Step 1
Scan your computer with your Trend Micro product to delete files detected as AndroidOS_GigabudRat. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:
Step 2
Trend Micro Mobile Security Solution
Trend Micro Mobile Security Personal Edition protects Android and iOS smartphones and tablets from malicious and Trojanized applications. It blocks access to malicious websites, increase device performance, and protects your mobile data. You may download the Trend Micro Mobile Security apps from the following sites:
Did this description help? Tell us how we did.