Threat Explorer

The Threat Explorer is a comprehensive resource consumers can turn to for daily, accurate, up-to-date information on the latest threats, risks and vulnerabilities.

Android.FindAndCall

Android.FindAndCall

Updated:
March 02, 2015
Name:
Find&Call
Risk Impact:
Low
Systems Affected:
Android

Behavior

Android.FindAndCall is a Potentially Unwanted Application for Android devices that may leak information.

Android package file
The Trojan may arrive as a package with the following characteristics:

Package name: il.co.egv
Name: Find&Call

Permissions
When the Trojan is being installed, it requests permissions to perform the following actions:
  • Access location information, such as GPS information.
  • Open network connections.
  • Access location information, such as Cell-ID or WiFi.
  • Initiate a phone call without using the Phone UI or requiring confirmation from the user.
  • Check the phone's current state.
  • Write to external storage devices.
  • Read user's contacts data.
  • Read SMS messages on the device.

Installation
Once installed, the application will display an icon with a white outline of a phone against a pink background.

Antivirus Protection Dates

  • Initial Rapid Release version April 09, 2013 revision 005
  • Latest Rapid Release version June 12, 2015 revision 022
  • Initial Daily Certified version April 09, 2013
  • Latest Daily Certified version June 13, 2015 revision 001
  • Initial Weekly Certified release date April 10, 2013
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.
Android package file
The Trojan may arrive as a package with the following characteristics:

Package name: il.co.egv
Name: Find&Call

Permissions
When the Trojan is being installed, it requests permissions to perform the following actions:
  • Access location information, such as GPS information.
  • Open network connections.
  • Access location information, such as Cell-ID or WiFi.
  • Initiate a phone call without using the Phone UI or requiring confirmation from the user.
  • Check the phone's current state.
  • Write to external storage devices.
  • Read user's contacts data.
  • Read SMS messages on the device.

Installation
Once installed, the application will display an icon with a white outline of a phone against a pink background.



Functionality
The Application may leak the compromised device's contact details.

The Application creates the following receiver:
.fnc.incomingcall.CustomBroadcastReceiver
You may have arrived at this page either because you have been alerted by your Symantec product about this risk, or you are concerned that your device has been affected by this risk.


Install Norton Mobile Security
If you do not already have Norton Mobile Security installed on your device, please download the product from the Google Play Store .

Alternatively, you can navigate to the norton.mobi website from your device and download the product from there by completing the following steps:
  1. Select the 90-Day free download.
  2. Select the Android icon to begin downloading the product.
  3. Select Install in order to accept the permissions that are being requested by the program.
  4. Next, select Open and then Agree & Launch.

Note: The first time the product runs, you will be required to enter a code that is displayed on the screen in order to activate the product. Enter the provided code and select Submit .


Run a full system scan
Run a full system scan using Norton Mobile Security to remove this risk from the device. To do this, please perform the following actions:
  1. Navigate to the Anti-Malware tab.
  2. Select Scan Now.


Manual removal
To remove this risk manually, please perform the following actions:
  1. Open the Google Android Menu.
  2. Go to the Settings icon and select Applications.
  3. Next, select Manage.
  4. Select the application and select Uninstall.
Writeup By: Mario Ballano