Riskware:Android/FakeAngry.variant!Online

Classification

Riskware

Riskware

Android

Riskware:android/fakeangry.variant!online

Summary

This detection from the F-Secure Security Cloud identifies Android apps with code or behavior similar to Trojan:Android/FakeAngry. This known threat silently gathers information from the device and forwards the details to a remote location.

Removal

Automatic action

Once the scan is complete, the F-Secure security product will ask if you want to uninstall the file, move it to the quarantine or keep it installed on your device.

Find out more

Knowledge Base

Find the latest advice in our Community Knowledge Base.

User Guide

See the user guide for your product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

About Security Cloud

F-Secure's Security Cloud is an online service that tracks the security reputation of common programs, files and websites. If a questionable program or file is found during a scan, your F-Secure security product will send a query to the Security Cloud to get its most recent reputation rating. The product will then use that information (and if needed, further analysis) to choose whether to block, quarantine or remove the program or file.

The Security Cloud rating for the identified app indicates that it has code or behavior similar to Trojan:Android/FakeAngry.

FakeAngry variants are usually copies of a popular program that have been recompile or trojanized to include malicious components. These altered apps are then redistributed, either under their original branding or with new names.

Once installed, the app gathers the following information from the compromised device and forwards the details to a remote location:

  • Device ID
  • International Mobile Equipment Identity (IMEI) number
  • International Mobile Subscriber Identity (IMSI) number
  • SDK version
  • SIM serial number
  • Subscriber ID

More

This program is discussed in further detail in: Q1 2012 Mobile Threat Report (PDF).

Date Created: -

Date Last Modified: -