Trojan:Android/Crusewind.A intercepts incoming SMS messages and forwards them to a remote server.
Once the scan is complete, the F-Secure security product will ask if you want to uninstall the file, move it to the quarantine or keep it installed on your device.
Trojan:Android/Crusewind.A can be uninstalled by following the steps below:
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
Prior to installation, the program detected as Trojan:Android/Crusewind.A will request the following permissions:
Once installed, this trojan displays an application icon in the Applications menu. In the samples we analyzed, the application name used are either 'Flashp' or 'MMS', with differing icons.
Example of Trojan:Android/Crusewind.A using the application name 'MMS'.
When the user clicks on the application icon, the program appears to simply exit without launching. In the background however, the trojan creates a new service named 'com.flashp.Flashservice':
Service created by Trojan:Android.Crusewind.A
Once the service is active, the trojan will attempt to download an XML configuration file from the following location
The downloaded file contains a list of URLs the trojan will attempt to contact to send and receive data. Further details in the XML file are used by the trojan to determine the remote location where an incoming SMS message will be forwarded.
Crusewind.A also uses JSON to serialise and post a list of applications installed on the affected device to a remote server listed in the XML file.
At the time of writing, all URLs listed in the XML file are blocked by F-Secure's Browsing Protection.
In addition to forwarding SMS messages, the trojan also has the capability to delete them.
Crusewind is also able to check its current version and update itself, or if necessary delete itself.