My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets



Added to the Dr.Web virus database: 2018-04-17

Virus description added:


  • 4ae16eb89144b06e91c43b8c1fbcf4e07a2c13ef
  • 359e073544599a0038977b41a98b5e98dca9511d

A Trojan for Android mobile devices. It was distributed on Google Play under the guise of popular harmless applications.

Once launched, Android.Click.245.origin establishes a connection with the command and control server by sending the following request:

Connection: Keep-Alive
Accept-Encoding: gzip
User-Agent: okhttp/3.3.0

Proxy server checks the IP address of the infected device. Depending on the user’s country, the server sends the Trojan a link to a particular website that must be loaded. The link is loaded using WebView. If Android.Click.245.origin does not receive the task, it downloads several pictures from the Internet and displays them on the screen.

If the device is connected to the Internet via Wi-Fi, the user is invited to download an application on the website’s page. To do this, the user is asked to enter his phone number to receive a confirmation code via SMS. Upon entering the code, the victim is subscribed to an expensive service of one of the content providers rather than receiving the intended application.

Android.Click.245.origin screen #drweb Android.Click.245.origin screen #drweb Android.Click.245.origin screen #drweb Android.Click.245.origin screen #drweb

If the Internet access is provided via a mobile connection, the loaded website makes several redirections. The Trojan then finally opens the website in Google Chrome. On this website, the user is also invited to download an application. In this case, however, there is no need to enter phone numbers for receiving SMS confirmation codes. The subscription to a premium content service provider is executed automatically using the Wap-Click technology upon clicking the “Start download” or “Download” buttons.

Android.Click.245.origin screen #drweb Android.Click.245.origin screen #drweb

News about the Trojan

Curing recommendations


  1. If the mobile device is operating normally, download and install Dr.Web for Android Light. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web для Android Light onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android