DroidDream.A collects data from a compromised device, and forwards the data to a remote server.
DroidDream.A managed to make its way into the official Android Market in early March 2011, before being removed. It uses two known exploits, 'exploid' and 'rageagainstthecage,' to gain root privilege on an Android device.
The Trojan then obtains the folowing information from the device, and forwards them to a remote server:
DroidDream.A other activities include:
Date Created: -
Date Last Modified: -