Backdoor:Android/Damon.A

Classification

Category :

Malware

Type :

Backdoor

Platform :

Android

Aliases :

Backdoor:Android/Damon.A, Trojan-Downloader:Android/Damon.A

Summary

Backdoor:Android/Damon allows a remote attacker to take control and perform various actions on the affected device.

Removal

Once the scan is complete, the F-Secure security product will ask if you want to uninstall the file, move it to the quarantine or keep it installed on your device.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

Damon.A is a backdoor program that circulates in a third party Android app market in China. It is dropped onto a device by a downloader program of the same name, which was injected into a clean application to mask its malicious identity.

Damon.A allows the attacker to take control of the device and perform these activities from a remote location:

  • Collect device information
    • Call logs
    • Contacts
    • International Mobile Equipment Identity (IMEI) number
    • International Mobile Subscriber Identity (IMSI) number
    • Locations
  • Intercept phone calls
  • Intercept SMS messages
  • Make phone calls
  • Send logs to attacker
  • Send out SMS messages
  • Restart itself
  • Upgrade itself
  • Visit website