ANDROIDOS_LOTOOR.A

 Analysis by: Karl Dominguez

 THREAT SUBTYPE:

Information Stealer, Malicious Downloader, Rooting Tool

 PLATFORM:

Android OS

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW


This Android OS malware has the capability to root an infected smartphone device and execute arbitrary commands, which includes the downloading of other possibly malicious applications with unrestricted access. It arrives with Trojanized applications.

To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.

It steals information. It can also download other possibly malicious applications, which can further compromises the infected device.

It may arrive with Trojanized applications. This malware has the component files rageagainstthecage and exploid that use an Android local exploit code to root the affected device. Rooting is done to attain root access and gain unrestricted permission.

This Trojan may be unknowingly downloaded by a user while visiting malicious websites.

It connects to a website to send and receive information.

  TECHNICAL DETAILS

File Size:

Varies

File Type:

Other

Memory Resident:

Yes

Initial Samples Received Date:

24 May 2011

Payload:

Compromises system security, Steals information, Downloads files

Arrival Details

This Trojan may be unknowingly downloaded by a user while visiting malicious websites.

Backdoor Routine

This Trojan connects to the following websites to send and receive information:

  • http://{BLOCKED}.{BLOCKED}.245.17:8080/GMServer/GMServlet

Other Details

This Trojan does the following:

  • Steals the following information:
    • ClientInfo
    • Country
    • IMEI
    • IMSI
    • Language
    • Partner (Carrier)
    • ProductId
    • UserID
  • Downloads other possibly malicious applications, which can further compromises the affected device

NOTES:
It may arrive with Trojanized applications. This malware has the component files rageagainstthecage and exploid that use an Android local exploit code to root the affected device. Rooting is done to attain root access and gain unrestricted permission.

  SOLUTION

Minimum Scan Engine:

8.900

TMMS Pattern File:

1.101.00

TMMS Pattern Date:

24 May 2011

Step 1

Trend Micro Mobile Security Solution

Trend Micro Mobile Security Personal Edition protects Android smartphones and tablets from malicious and Trojanized applications. The App Scanner is free and detects malicious and Trojanized apps as they are downloaded, while SmartSurfing blocks malicious websites using your device's Android browser.

Download and install the Trend Micro Mobile Security App via Google Play.

Step 2

Remove unwanted apps on your Android mobile device

[ Learn More ]

Did this description help? Tell us how we did.