- Threat Encyclopedia
- Malware
- ANDROIDOS_PLANKTON.BLK
Trojan:AndroidOS/Plankton.gen!A (Microsoft), Andr/NewyearL-B (Sophos), Adware:Android/Ropin.A (Fsecure), Trojan.AndroidOS.Plankton.h (Sunbelt), Android/Plankton.A!tr (Fortinet), Trojan.AndroidOS.Plankton (Ikarus), Android/Plankton.G trojan (Eset),
Information Stealer
Android OS
Downloaded from the Internet, Via app stores
This malicious app is known as Brightest Flashlight Free.
It gathers various information on the affected device. It may connect to a C&C server to send information gathered.
It is capable of setting bookmarks, setting browser homepage, and getting shortcuts on the device.
This backdoor may be manually installed by a user.
1,031,799 bytes
APK
Yes
30 Mar 2012
Compromises system security, Connects to URLs/IPs, Steals information
Arrival Details
This backdoor may be manually installed by a user.
NOTES:
This is Trend Micro's detection for Android applications bundled with malicious code.
It may connect to its C&C server and send details regarding the infected device:
Device details include:
It waits for the backdoor commands from the server:
It has the capability to do the following routines:
9.200
1.211.00
30 Mar 2012
Step 1
Trend Micro Mobile Security Solution
Trend Micro Mobile Security Personal Edition protects Android smartphones and tablets from malicious and Trojanized applications. The App Scanner is free and detects malicious and Trojanized apps as they are downloaded, while SmartSurfing blocks malicious websites using your device's Android browser.
Download and install the Trend Micro Mobile Security App via Google Play.
Step 2
Remove unwanted apps on your Android mobile device