My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets



Added to the Dr.Web virus database: 2018-08-08

Virus description added:


  • c71a842d93d04524d4df3f306c5d1d6ebc3c3bc7

A malicious program for Android mobile devices. It can be distributed under the guise of popular harmless applications, such as software for the Bitcoin cryptocurrency:


When Android.Clipper.1.origin launches for the first time, it makes its main activity inaccessible by changing the access settings. As a result, the malicious application’s icon disappears from the list of programs on the Android home screen.

In the OnPrimaryClipChangedListener interface, the Trojan then adds a listener that tracks changes in the clipboard content and waits for a user to copy a number of one of the targeted digital wallets.

Once the corresponding number is found in the clipboard, Android.Clipper.1.origin sends the number information to the http://fastfrmt.*****.tech command and control server. The malware then reconnects to the server and waits for the cybercriminals’ wallet number that belongs to the same payment system as the intercepted number.

The Trojan tracks and replaces wallet numbers of the following payment systems and cryptocurrencies:

  • QIWI
  • WebMoney R
  • WebMoney Z
  • Yandex.Money
  • Bitcoin
  • Monero
  • zCash
  • DOGE
  • DASH
  • Etherium
  • Blackcoin
  • Litecoin

To provide the autostart every time the infected mobile device is turned on, Android.Clipper.1.origin tracks the following system events:

  • android.intent.action.BOOT_COMPLETED;
  • android.intent.action.QUICKBOOT_POWERON;

News about the Trojan

Curing recommendations


  1. If the mobile device is operating normally, download and install Dr.Web for Android Light. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web для Android Light onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android