Trojan:Android/Tetus monitors incoming SMS messages and forwards the message contents to a remote server.


Automatic action

Once the scan is complete, the F-Secure security product will ask if you want to uninstall the file, move it to the quarantine or keep it installed on your device.

Find out more

Knowledge Base

Find the latest advice in our Community Knowledge Base.

User Guide

See the user guide for your product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

Tetus.A is an information stealing trojan disguised as an entertainment or social networking application, or a helper tool. It is distributed via a third-party Android app market, and may use the following package file names:

  • com.appsmediaworld.fitpal
  • com.appengines.fastphone
  • com.mobilityplus.friendly
  • com.coolmasterz.flirt
  • com.droidmojo.celebstalker
  • com.droidmojo.awesomejokes
  • com.stephbrigg5.batteryimprove
  • com.supersocialmob.allfriends
  • com.nogginfunsite.zgames

Tetus.A spies on incoming SMS messages. Once an event handler is successfully set, it will notify one of these command and control (C&C) servers:

  • http://[...]/android/[...]/
  • http://[...]/android-gaming-zone/[...]/.com

Whenever a new SMS message arrives, Tetus.A will turn the content into one long string (replacing spaces with ‘_’) and forward it to the C&C server. The server recognizes different infected devices by the International Mobile Equipment Identity (IMEI) number.

Date Created: -

Date Last Modified: -