Variants in this family are trojans that infect Windows Mobile devices and send SMS messages to premium rate phone numbers, without the user's consent. This results in abnormally high phone charges.
Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
This trojan's behavior is reminiscent of the malicious dialers of yesteryear, except that the targeted device is now a mobile device rather than a computer connecting to the Internet via a modem.
Redoc variants may arrive on the victim's device bundled together with a legitimate application; in which case, it launches the legitimate application to mask the fact the legitimate application's cab file has been infected. Trojan:WinCE/Redoc is a .NET application for mobiles, and uses basic4ppc (a .NET port for Windows Mobile).
To perform its message sending routine, on execution some Redoc variants will read configuration parameters from a file named setups.dll, a text file that contains the following information:
The steps the trojan follows for its sending routine is simply as follows:
Other Redoc variants have these parameters hard coded.