SHA1:
1418d0c6f3e230ceeccb405d26a82ccc0a488ca2
A malicious program targeting Android devices. It is an executable ELF file that gets copied by Android.Backdoor.176.origin with the .rt_bridge name into the /system/xbin folder. Together with Android.Rootkit.2, it has the same features as the SU utility.
After that, the Trojan checks by which process it is run. For that, it calculates MD5 from /proc/%pid%/cmdline, where %pid% stands for the parent process ID. If this process is on the list (stored in /data/local/.bridge) of allowed processes, Android.Rootkit.1 starts a root terminal. Subsequently, the terminal is used by Android.Backdoor.176.origin.