Jump to content

stvvv

Members
  • Content Count

    6
  • Joined

  • Last visited

About stvvv

  • Rank
    New Member

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. It's a UMX U683CL gov't issue phone. I believe that that it had come with ADups & whatever else preinstalled as the only apps I have installed came from some of the standard major software companies and I have never really used it to surf the web. They sent me a replacement phone a few weeks ago and it has the same issues. I don't know too much about Android, but I was wondering if it was possible to get a new ROM and install it myself. I assume my phone number and service is on the sim card. If this is possible, where can I get a clean ROM?
  2. Malwarebytes has detected Trojan.Agent.BHB in the settings app. It is saying that it is in com.android.settings. I'm not sure if com.android.settings is a real system app or if it is a fake app containing the virus. As it is a system app I can't uninstall it nor can I disable the app even temporarily. Can you tell me how to disable or remove this virus using ADB?
  3. It actually looks like the result of malware in and of itself. Malwarebytes, please look at this. Code to the left after posting from yahoo mail. ecp.yusercontent.com.
  4. Sorry, I just pasted that in from email and it looks like there is a vertical line of code to the left, if your seeing that too just ignore.
  5. I worked with Malwarebytes on this problem and at the time Malwarebytes wasn't detecting it, but I knew that I had Adups because of the browser hijack. If you look at your apps list you should see a green icon with a yellow center with an arrow or something called "Wireless Update" and within it is another app called "Hidden Menu" I tried to remove it by following the "How to remove adups" above, but it didn't work. They figured out the "real names" of the app. When I first went through the removal, I think the browser hijack came back, but I reset my phone to factory settings and immediately went through the procedure and the past few days I haven't seen any sign of it. You need to use a pc, mac or linux computer to execute the commands over USB to your phone after setting it all up in developer mode as described in the memo above. But the important thing was knowing what to target. So if you have ADB on your computer and your phone all ready to go, these are the commands that I entered: Hi @stvvv, Okay, I got: com.dtinfo.tools Wireless Update To remove, you would use this command: adb shell pm uninstall -k --user 0 com.dtinfo.tools As far as HiddenMenu, use this: adb shell pm uninstall -k --user 0 com.teleepoch.hiddenmenu Apparently if you reset your phone, it will all come back since they are system apps so if you ever factory reset your phone you will have to do this again. Once you uninstall it, it will still appear in your apps list but it will say uninstalled for this user.
  6. I'm new to Android and I believe I have the "Wireless Update" malware and within the app is another app called "Hidden Menu". The only symptom that I have observed is that it is a browser hijacker and causes Chrome to pop up randomly, especially after charging and it directs to cheesy websites that offer to sell or play videogames. I can disable the app, but it reactivates by itself. Clearing histories etc does not stop it and I've done a factory reset twice to no avail. One problem I'm facing is that neither Malwarebytes or Sophos find any malware on the phone so I may be having difficulty targeting the problem on my own. I have followed instructions to use ADB to uninstall what I think is the package from both a PC and a Linux and it says not installed for this user. (user 0) the path is: /system/priv-app/SystemFota/SystemFota.apk I considered just deleting the package through the Android Studio gui, but was in doubt that it would actually uninstall the app. Any help is greatly appreciated.
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.