PhantomLance

Description

(Dr.Web) The backdoor communicates with several command and control servers to receive commands from the attackers and send the collected data. The cybercriminals can also control the trojan via the Firebase Cloud Messaging service. Android.Backdoor.736.origin is capable of: • sending information on contacts from the contact list to the server; • sending information on text messages to the server (the investigated version of the trojan did not have the permissions for this); • sending the phone call history to the server; • sending the device location to the server; • downloading and launching an APK or a DEX file using the DexClassLoader class; • sending the information on the installed software to the server; • downloading and launching a specified executable file; • downloading a file from the server; • uploading a specified file to the server; • transmitting information on files in the specified directory or a memory card to the server; • executing a shell command; • launching the activity specified in a command; • downloading and installing an Android application; • displaying a notification specified in a command; • requesting permission specified in a command; • sending the list of permissions granted to the trojan to the server; • not letting the device go into sleep mode for a specified time period.

Names

Name
PhantomLance
PWNDROID1
Android.Backdoor.736.origin

Category

Malware

Type

  • Reconnaissance
  • Backdoor
  • Info stealer
  • Downloader
  • Exfiltration

Information

Malpedia

Other Information

Uuid

d6d0a523-fa63-4a7a-a20a-df07a5cb7087

Last Card Change

2021-04-24