Skip to content

Export page to PDF
ANDROIDOS_DENDROID.HBT
Malware type: Backdoor
Threat sub-type: Information Stealer, Spying Tool
Destructive: No
Platform: Android OS
In the wild: Yes

Overview


Infection Channel: Dropped by other malware

This malware is a backdoor that is part of a remote administration tool used for malware distribution discovered in March 2014. It records and steals information from affected devices. Users with devices infected by this malware may find their information stolen.

To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.

This is the Trend Micro detection for the Dendroid, a remote administration tool used for malware distribution.

This backdoor arrives as a component bundled with malware/grayware packages. It may be manually installed by a user. It arrives via Trojanized Android applications.

It receives commands from a server that may be controlled by a bot or a malicious user.

Technical Details


File size: 833,648 bytes
File type: APK
Memory resident: Yes
Initial samples received date: 10 Feb 2014
Payload: Steals information

Arrival Details

This backdoor arrives as a component bundled with malware/grayware packages.

It may be manually installed by a user.

It arrives via Trojanized Android applications.

Denial of Service

This backdoor receives commands from a server that may be controlled by a bot or a malicious user.

NOTES:

This is the Trend Micro detection for the Dendroid, a remote administration tool used for malware distribution.

It provides an APK binder tool, an APK client, and a background control panel for user to repack created app and control conveniently. The APK client arrives with the package name com.parent.control.v4, pretending to be a normal parental control software. It obfuscates its code by batch reflection methods.

Some of its features include:

  • Intercept, block, or send SMS
  • Record calls
  • Take screenshots, photos, videos, or audio recordings

Solution


Minimum scan engine: 9.700
VSAPI OPR Pattern Version: 1.691.00
VSAPI OPR Pattern Release Date: 07 Mar 2014

Step 1

Remove unwanted apps on your Android mobile device

[ Learn more ]

Step 2

Trend Micro Mobile Security Solution

Trend Micro Mobile Security Personal Edition protects Android smartphones and tablets from malicious and Trojanized applications. The App Scanner is free and detects malicious and Trojanized apps as they are downloaded, while SmartSurfing blocks malicious websites using your device's Android browser.

Download and install the Trend Micro Mobile Security App via Google Play.

Step 3

Scan your computer with your Trend Micro product to delete files detected as ANDROIDOS_DENDROID.HBT. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.


Did this description help? Tell us how we did.
Analysis By: Seven Shen

Connect with us on