La mia libreria
La mia libreria

+ Aggiungi alla libreria

Supporto
Supporto 24/7 | Regole per contattare

Richieste

Profile

Android.Phantom.5.origin

Aggiunto al database dei virus Dr.Web: 2026-01-30

La descrizione è stata aggiunta:

SHA1 hash:

  • 68572b9f2f588396d89ea85dc69bc5242de98a1c

Description

A trojan spy. The module loaded and executed by Android.Phantom.1.origin. It sends the hxxps[:]//iboot[.]site server device information, including the phone number, geolocation, and the list of apps. Below is the list of parameters collected by this SDK; whether the information in a parameter will be received depends on the permissions granted to the application containing the embedded trojan.

The list of parameters sent:

Parameter Description
sdk_version_nameSDK version
timetime of creation
appsflyerdebuginfoAppsflyer data
idsdevice identifier
buildAndroid build data
inputinput information
librarylibrary data
mediamedia opportunities
storagestorage information
memThresholdthreshold of available memory
usbUSB and ADB data
sensorsensors
hardwarehardware data
batteryInfobattery status
netnetwork
locationlocation
packageInfoinstaller information
deviceInfodetailed device data
procVersionkernel version
fileStatfile system statistics
fontsuser fonts
systemFontssystem fonts
ringTitlecurrent ringtone
InputLanguageListinput languages
inputMethodsactive input methods
installedAppsinstalled applications
gpuInfoGPU information
inputDevicesinput devices
unameuname data
service_listserver list
advertisingInfoadvertising information
upTimedevice uptime
getTotalSpace_INTERNALsize of internal storage
getTotalSpace_EXTERNALsize of external storage
screenOffTimeoutscreen timeout
isEmulatoremulator's flag
EmuCheckercauses of emulator detection
deviceInfo.cpuFreqCPU frequency per each core
deviceInfo.dfdrive information
deviceInfo.memInfoListmemory data
deviceInfo.uptimesystem uptime
deviceInfo.versionkernel version
deviceInfo.wlan0_addressWi-Fi MAC address
deviceInfo.cpuFreq.cpuX.cpuinfo_max_freqmaximum CPU frequency
deviceInfo.cpuFreq.cpuX.cpuinfo_min_freqminimum CPU frequency
deviceInfo.cpuFreq.cpuX.time_in_stateCPU frequency statistics
deviceInfo.memInfoList.memInfoX.meminfo0meminfo data
deviceInfo.memInfoList.memInfoX.meminfo1meminfo data
deviceInfo.memInfoList.memInfoX.meminfo2meminfo data
ids.imeiIMEI
ids.imeisIMEI list
ids.deviceIdsdevice identifier
ids.meidsMEID
ids.imsiIMSI
ids.serialNodevice serial number
ids.androidIdAndroid ID
ids.iccidSIM serial number
ids.phoneNophone number
ids.userAgentUser-Agent
ids.googleADIDGoogle Advertising ID
ids.drmIdDRM identifier
ids.descriptionbuild description
ids.bootloaderinstaller version
ids.bootimage_utcdate of the "boot image" build
ids.getpropgetprop system properties
net.networkCountryIsonetwork country code
net.networkOperatornetwork operator code
net.networkSpecifiernetwork specifier
net.networkTypenetwork type
net.networkSubTypenetwork subtype
net.networkTypeNamenetwork type name
net.networkSubTypeNamenetwork subtype name
net.apnAPN
net.ip4IPv4 address
net.ip6IPv6 address
net.mac1MAC address
net.mac2MAC address
net.linkedWificurrent Wi-Fi network
net.wifiListlist of Wi-Fi networks
net.isWifiWi-Fi connection flag
net.wifiProxyWi-Fi proxy
net.baseStationIdbase station ID
net.baseStationId1base station ID
net.bluetoothAddressBluetooth address
net.bluetoothMACBluetooth MAC
net.allCellInfocell information
net.IP_addressthe ip address command output
net.ip_neighborthe ip neighbor command output
net.ip_route_list_match_0the ip route list output
net.ip_routerouting list
net.ip_addr_showthe ip addr show output

News posts about this trojan
Indicators of compromise

Curing recommendations


Android

  1. If the mobile device is operating normally, download and install Dr.Web for Android Light. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web для Android Light onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android