Android/FakeNotify.A!tr.dial

description-logoAnalysis

Android/FakeNotify.A!tr.dial is typically downloaded from a web site on which it is advertised as a phone optimizer for Android that reveals hidden capabilities of the phone.

Figure 1. Web site advertising phone optimizer Figure 2. The Android malware is downloaded when visiting the page with an Android phone
In reality, it sends SMS messages to a short code as soon as launched.
Figure 3. Malware is installed on the phone Figure 4. Permissions requested by the malware


Technical Details


Android/FakeNotify.A!tr.dial is the Android version of Java/FakeNotify.A!tr.dial.
It is malicious in two ways:
  1. It send SMS messages even before the victim has the change to read and accept the license terms.
  2. and it is downloaded on a 'phone optimizer' web site, intentionally deceiving the end-user.
The main differences with Java/FakeNotify.A!tr.dial are:
  • the settings are stored in a raw database file located in res/raw/data.db
  • the malware uses character substitution to obfuscate parameter names

recommended-action-logoRecommended Action

    FortiGate Systems
  • Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option.
    FortiClient Systems
  • Quarantine/delete files that are detected and replace infected files with clean backup copies.

Telemetry logoTelemetry

Detection Availability

FortiGate
Extended
FortiClient
Extreme
FortiAPS
FortiAPU
FortiMail
Extreme
FortiSandbox
Extreme
FortiWeb
Extreme
Web Application Firewall
Extreme
FortiIsolator
Extreme
FortiDeceptor
Extreme
FortiEDR

Version Updates

Date Version Detail
2023-03-21 91.01633
2023-03-10 91.01307
2023-03-06 91.01181