Threat Explorer

The Threat Explorer is a comprehensive resource consumers can turn to for daily, accurate, up-to-date information on the latest threats, risks and vulnerabilities.

Android.Mesploit

Android.Mesploit

Updated:
March 20, 2015
Infection Length:
Varies
Risk Impact:
Low
Systems Affected:
Android

Behavior

Android.Mesploit is a tool for Android devices used to create applications that exploit the Android Fake ID vulnerability.

Android package file
The Trojan may arrive as a package with the following characteristics:

Package name: com.metasploit.stage
Version: 1.0
Name: MainActivity


Installation
Once installed, the application will display an icon with a green android and the text "MainActivity" underneath in white.



Antivirus Protection Dates

  • Initial Rapid Release version March 18, 2015 revision 017
  • Latest Rapid Release version February 19, 2017 revision 025
  • Initial Daily Certified version March 18, 2015 revision 024
  • Latest Daily Certified version February 20, 2017 revision 003
  • Initial Weekly Certified release date March 25, 2015
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.
Android package file
The Trojan may arrive as a package with the following characteristics:

Package name: com.metasploit.stage
Version: 1.0
Name: MainActivity


Permissions
When the Trojan is being installed, it requests permissions to perform the following actions:
  • Open network connections
  • Access information about networks
  • Access location information, such as Cell-ID or Wi-Fi
  • Access location information, such as GPS information
  • Check the phone's current state
  • Monitor, read, and send SMS messages
  • Use the device's mic to record audio
  • Initiate a phone call without using the Phone UI or requiring confirmation from the user
  • Read and create contacts data
  • Read or write to the system settings
  • Access the camera

Installation
Once installed, the application will display an icon with a green android and the text "MainActivity" underneath in white.




Functionality
The tool uses the Metasploit Framework to create Android applications that exploit the Android Fake ID vulnerability. The applications may use reverse TCP or reverse HTTP to download and execute payloads.
You may have arrived at this page either because you have been alerted by your Symantec product about this risk, or you are concerned that your device has been affected by this risk.


Install Norton Mobile Security
If you do not already have Norton Mobile Security installed on your device, please download the product from the Google Play Store .

Alternatively, you can navigate to the norton.mobi website from your device and download the product from there by completing the following steps:
  1. Select the 90-Day free download.
  2. Select the Android icon to begin downloading the product.
  3. Select Install in order to accept the permissions that are being requested by the program.
  4. Next, select Open and then Agree & Launch.

Note: The first time the product runs, you will be required to enter a code that is displayed on the screen in order to activate the product. Enter the provided code and select Submit .


Run a full system scan
Run a full system scan using Norton Mobile Security to remove this risk from the device. To do this, please perform the following actions:
  1. Navigate to the Anti-Malware tab.
  2. Select Scan Now.


Manual removal
To remove this risk manually, please perform the following actions:
  1. Open the Google Android Menu.
  2. Go to the Settings icon and select Applications.
  3. Next, select Manage.
  4. Select the application and select Uninstall.