DroidDream.A collects data from a compromised device, and forwards the data to a remote server.


Automatic action

Once the scan is complete, the F-Secure security product will ask if you want to uninstall the file, move it to the quarantine or keep it installed on your device.

Find out more

Knowledge Base

Find the latest advice in our Community Knowledge Base.

User Guide

See the user guide for your product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

DroidDream.A managed to make its way into the official Android Market in early March 2011, before being removed. It uses two known exploits, 'exploid' and 'rageagainstthecage,' to gain root privilege on an Android device.

The Trojan then obtains the folowing information from the device, and forwards them to a remote server:

  • IMEI (International Mobile Equipment Identity) number
  • IMSI (International Mobile Subscriber Identity) number
  • Language
  • Country
  • Device model
  • SDK version

DroidDream.A other activities include:

  • Downloading and installing applications onto the compromised device
  • Keeping track of downloaded applications

Date Created: -

Date Last Modified: -