Malware Games

Several Malware games discovered in Google play store that have been downloaded around 4.5 Million Android users and these malicious games helps to steal various sensitive data from infected users mobile.

Several Modules are identified that has performed Different malicious activities also each module has different unique capabilities.

There are 27 Android gaming apps were listed On this malware module with all the famous gaming category.

The Malware also using steganography method to inject malicious script into the Images file and send it to users to get infected.

Also ReadGhostTeam – Android Malware Stealing Your Facebook Credentials

How does This Android Malware Games Works

A Module called Android.RemoteCode.127.origin will helps to SDK which is basically used for developers communication but further indication reveals that it has some unique capabilities to steal sensitive information and send it to the remote server.

Once it’s Connected to remote servers it has a link to download additional module called  Android.RemoteCode.126.origin.

This New Malicious program download by the Previous module and loaded into victims android mobile and this malicious program is completely obfuscated.

Clip View

A class called DexClassLoader is helping to launch this module, once it’s launched, its established a connection with C&C Server where it will download an image that contains an encrypted trojan file.

Once it launched then it downloads another image from the C&C server. This image also contains an encrypted Trojan (Android.Click.221.origin).

This new Malicious Program will download the javascript file that performs various actions with a loaded page, including simulation of a user clicking on different items, such as links and banners.

According to Dr.Web Researchers, The Trojan provides the script with the possibility to perform various actions on a webpage, including simulating clicks on indicated items. Thus, if the Trojan’s task includes following links and advertisements, cybercriminals profit from inflating website traffic stats and clicking on banners.

Infected Program and Application packages

Program name Application package name Version
Hero Mission 1.8
Era of Arcania com.games37.eoa 2.2.5
Clash of Civilizations com.tapenjoy.warx 0.11.1
Sword and Magic com.UE.JYMF&hl 1.0.0
خاتم التنين – Dragon Ring (For Egypt) com.reedgame.ljeg 1.0.0
perang pahlawan com.baiduyn.indonesiamyth 1.1400.2.0
樂舞 – 超人氣3D戀愛跳舞手遊 1.0.2
Fleet Glory 1.5.1
Kıyamet Kombat Arena 1.1.4
Love Dance 1.1.2
Never Find Me – 8v8 real-time casual game com.gemstone.neverfindme 1.0.12
惡靈退散-JK女生の穿越冒險 0.1.7
King of Warship: National Hero com.herogames.gplay.kowglo 1.5.0
King of Warship:Sail and Shoot com.herogames.gplay.kowsea 1.5.0
狂暴之翼-2017年度最具人氣及最佳對戰手遊 com.icantw.wings 0.2.8
武動九天 com.indie.wdjt.ft1 1.0.5
武動九天 com.indie.wdjt.ft2 1.0.7
Royal flush com.jiahe.jian.hjths
Sword and Magic com.linecorp.LGSAMTH Depends on a device model
Gumballs & Dungeons:Roguelike RPG Dungeon crawler 0.41.171020.09-1.8.6
Soul Awakening 1.1.0
Warship Rising – 10 vs 10 Real-Time Esport Battle com.sixwaves.warshiprising 1.0.8
Thủy Chiến – 12 Vs 12 com.vtcmobile.thuychien 1.2.0
Dance Together 1.1.0
頂上三国 – 本格RPGバトル 1.0.5
靈魂撕裂 1.1.0
Star Legends com.dr.xjlh1 1.0.6


All the Malware Games have been informed Google about the detection of the Trojan component in the indicated applications. However, at the moment this news article was posted, they were still available for download. It is recommended that owners of Android smartphones and tablets delete installed games that were installed. Dr.Web said.

Leave a Reply