Trojan:Android/Kmin, Trojan:Android/Kmin.A, Trojan:Android/Kmin.B, Trojan:Android/Kmin.C


Trojan:Android/Kmin variants display a message as a decoy, while silently performing multiple malicious routines, including sending SMS messages to a premium-rate number and downloading and installing an additional application onto the device.


Automatic action

Once the scan is complete, the F-Secure security product will ask if you want to uninstall the file, move it to the quarantine or keep it installed on your device.

Find out more

Knowledge Base

Find the latest advice in our Community Knowledge Base.

User Guide

See the user guide for your product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

Upon execution, variants in the Kmin trojan family display a message asking the user for a permission to proceed with a specified action; the A variant asks whether the user wishes to install a paid app and subscribe to a service, while the B and C variants only enquire whether the user would like to install a paid application.

Regardless of whether the user accepts or declines, the app will proceed with the following actions:

  • Sending the Internation Mobile Equipment Identity (IMEI) number and phone number to a remote server
  • Sending SMS messages to a premium-rate number
  • Downloading and installing another application
  • Running services in the background


  • Trojan:Android/Kmin.A
  • Trojan:Android/Kmin.B
  • Trojan:Android/Kmin.C


This malware is discussed in further detail in: Q1 2012 Mobile Threat Report (PDF).

Date Created: -

Date Last Modified: -