Variants in this family are trojans that infect Windows Mobile devices and send SMS messages to premium rate phone numbers, without the user's consent. This results in abnormally high phone charges.
Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.
Find the latest advice in our Community Knowledge Base.
See the manual for your F-Secure product on the Help Center.
Submit a file or URL for further analysis.
This trojan's behavior is reminiscent of the malicious dialers of yesteryear, except that the targeted device is now a mobile device rather than a computer connecting to the Internet via a modem.
Redoc variants may arrive on the victim's device bundled together with a legitimate application; in which case, it launches the legitimate application to mask the fact the legitimate application's cab file has been infected. Trojan:WinCE/Redoc is a .NET application for mobiles, and uses basic4ppc (a .NET port for Windows Mobile).
To perform its message sending routine, on execution some Redoc variants will read configuration parameters from a file named setups.dll, a text file that contains the following information:
The steps the trojan follows for its sending routine is simply as follows:
Other Redoc variants have these parameters hard coded.
Date Created: -
Date Last Modified: -