user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Trojan:AndroidOS/Multiverze!rfn
Trojan:AndroidOS/Multiverze!rfn - Windows Defender threat signature analysis

Trojan:AndroidOS/Multiverze!rfn - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Trojan:AndroidOS/Multiverze!rfn
Classification:
Type:Trojan
Platform:AndroidOS
Family:Multiverze
Detection Type:Concrete
Known malware family with identified signatures
Suffix:!rfn
Specific ransomware family name
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Trojan - Appears legitimate but performs malicious actions for AndroidOS platform, family Multiverze

Summary:

Trojan:AndroidOS/Multiverze!rfn is a malicious application for Android devices belonging to the Multiverze family. It typically masquerades as a legitimate app to perform harmful actions, such as subscribing users to unwanted premium services without consent, stealing personal data, or displaying aggressive advertisements.

Severity:
High
VDM Static Detection:
No specific strings found for this threat
Known malware which is associated with this threat:
Filename: 35776905c2a9d206f4eabc1030f0ba4151817a4736e2dde455f58a2587f72ac1.jar
35776905c2a9d206f4eabc1030f0ba4151817a4736e2dde455f58a2587f72ac1
10/12/2025
Filename: ACTED.apk
22dd514e77f6f5a853e889471777a763c72316a4f68a612ea03a52121d17247d
03/12/2025
Filename: V6.apk
09164a7f82f768d089bc99d35a8a61e92ec17d23880911491b7d84380b69e0f4
21/11/2025
Filename: ACTED.apk
8ef62bef2f33e486fe2a962a863dc2f621dd2369f24398817e9c4795f970c012
19/11/2025
Filename: ACTED.apk
c2ab5c7e802949219686c7ce6ed1c4f66ed9802c8bbb1eea5fdb1b2687c31c70
13/11/2025
Remediation Steps:
Immediately uninstall the malicious application from the affected Android device. Run a full scan with a reputable mobile security app to ensure complete removal. Review recent mobile billing statements for any unauthorized charges.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 09/11/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$