Trojan:Android/DroidKungFu.C forwards confidential details to a remote server.
Monitoring-Tool:Android/DroidKungFu.C can be uninstalled by following the steps below:
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest detection database updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
NOTE If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note You need administrative rights to change the settings.
Trojan:Android/DroidKungFu.C are distributed on unauthorized Android app sites as trojanized versions of legitimate applications.
Prior to installation, this new variant of the DroidKungFu family requests the following permissions:
Once installed, DroidKungFu.C attempts to root the phone (gain control of the system) by using exploits, including RageAgainstTheCage. These exploits are stored in the malware package and encrypted with a key.
The trojan also attempts to collect the following information from the compromised device:
The collected information is reported to remote command and control (C&C) servers at multiple locations:
This trojan was discovered by researchers at the North Carolina State University. For additional information, see: