Monday, May 5, 2025
HomeMalwareNew Android Trojan "Android/Trojan.AsiaHitGroup" Discovered in Google Play Store

New Android Trojan “Android/Trojan.AsiaHitGroup” Discovered in Google Play Store

Published on

SIEM as a Service

Follow Us on Google News

Nowadays Trojanized Android apps evolving rapidly in play store and continuously targetting innocent users who all are unaware of the malicious application and apps permission while installing the apps on their devices.

A new malware strain found in Google play masquerading as multiple apps an alarm clock app, a QR scanner app, a compass app, a photo editor app, an Internet speed test app, and a file explorer app.

It has been discovered by Researchers from Malwarebytes labs and the apps found updated between October and November 2017. Malware bytes researchers named the malware variant as Android/Trojan.AsiaHitGroup based on URL code.

- Advertisement - Google News

How Android Trojan Infects

Researchers analyzed the function with QR scanner app.It starts just with an icon and if the victim clicks on the icon it opens a functioning QR scanner, as promised.The application is short lived and users have only Once chance to open the app.

Also Read 2 Million Android Users Infected by Malicious Google Play Store Apps

As soon as the app opened icon will disappear and even it will not be available in the app list too even if you check with icon name and they found it deceiving as Download Manager.

At step one, it first tries to locate the location of the device using the website ip-api.com to get the geolocation of the IP. If the location satisfies, it proceeds to next step.

Unfortunately, during testing, the APK could not be downloaded via the malicious QR app—most likely due to my location. However, I was able to manually download the APK using the URL provided in the download instructions. The behavior of this downloaded APK was that of a Trojan SMS (which is why I subsequently named it Android/Trojan.SMS.AsiaHitGroup). Based on all the references to Asia within the code, my assumption is you must be in Asia for this malware to fully function. Researchers said.

Adware app consists of unusual service name: vn.solarjsc.fakeads.ShowAdsService, within this service they have a reference available to download the Trojan SMS.

Even after Google play protect introduced a number of malicious apps continue to enter into play store. Malware bytes strongly suggests the second layer of protection.

Malicious APK samples: use at own risk

Android/Trojan.AsiaHitGroup

MD5: 178E6737A779A845B8F2BAF143FDEA15, Package Name: duy.van.dao.qrcode
MD5: 7EEC1C26E60FEDE7644187B0082B6AC4, Package Name: com.varvet.barcodereader
MD5: 7CEDA121F9D452E9A32B8088F50012B8, Package Name: com.maziao.alarm
MD5: B481CE9D0B7295CDA33B15F9C7809B95, Package Name: com.magiaomatday.editimage
MD5: 60A71632004EE431ABB28BF91C3A4982, Package Name: com.maziao.speedtest
MD5: N/A, Package Name: com.ruzian.explorer

Android/Trojan.SMS.AsiaHitGroup

MD5: 3CC02E4FECEB488B084665E763968108, Package Name: duy.van.dao.dynamicduy

Android/Adware.AsiaHitGroup

MD5: 995D5DC873104B5E42B3C0AF805359DB, Package Name: com.offer.flashcall

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

SonicBoom Attack Chain Lets Hackers Bypass Login and Gain Admin Control

Cybersecurity researchers have uncovered a dangerous new exploitation technique, dubbed the "SonicBoom Attack Chain,"...

Researcher Uses Copilot with WinDbg to Simplify Windows Crash Dump Analysis

A researcher has unveiled a novel integration between AI-powered Copilot and Microsoft's WinDbg, dramatically...

Apache Parquet Java Vulnerability Enables Remote Code Execution

A high-severity vulnerability (CVE-2025-46762) has been discovered in Apache Parquet Java, exposing systems using...

NCSC Warns of Ransomware Attacks Targeting UK Organisations

National Cyber Security Centre (NCSC) has issued technical guidance following a series of cyber...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

TerraStealer Strikes: Browser Credential & Sensitive‑Data Heists on the Rise

Insikt Group has uncovered two new malware families, TerraStealerV2 and TerraLogger, attributed to the...

MintsLoader Malware Uses Sandbox and Virtual Machine Evasion Techniques

MintsLoader, a malicious loader first observed in 2024, has emerged as a formidable tool...

Threat Actors Target Critical National Infrastructure with New Malware and Tools

A recent investigation by the FortiGuard Incident Response (FGIR) team has uncovered a sophisticated,...