Trojan:Android/GoldDream

Classification

Category :

Malware

Type :

Trojan

Platform :

Android

Aliases :

GoldDream, Trojan:Android/GoldDream.[variant]

Summary

Trojan:Android/GoldDream variants silently collect information on SMS messages and phone calls made on the device; the collected data is forwarded to a remote location.

Removal

Once the scan is complete, the F-Secure security product will ask if you want to uninstall the file, move it to the quarantine or keep it installed on your device.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

Once installed on a device, Trojan:Android/GoldDream will monitor incoming SMS messages; information collected related to the messages is saved in a file named 'zjsms.txt'.

GoldDream will also monitor incoming and outgoing phone calls; information collected related to the calls is saved in a file named 'zjphonecall.txt'.

In addition to collecting the SMS message and phone call log details, the trojan also collects the device's ID number, the subscriber ID and the SIM card's serial number. GoldDream connects to and uploads the harvested data to a remote command and control (C&C) server (hxxp : // lebar . gicp . net /zj /[...]).

The trojan is able to receive the following instructions from the C&C server:

  • Install/uninstall an app on the device
  • Make a phone call
  • Send an SMS message