Sunday, February 23, 2025
HomeMalwareNew Android Trojan "Android/Trojan.AsiaHitGroup" Discovered in Google Play Store

New Android Trojan “Android/Trojan.AsiaHitGroup” Discovered in Google Play Store

Published on

SIEM as a Service

Follow Us on Google News

Nowadays Trojanized Android apps evolving rapidly in play store and continuously targetting innocent users who all are unaware of the malicious application and apps permission while installing the apps on their devices.

A new malware strain found in Google play masquerading as multiple apps an alarm clock app, a QR scanner app, a compass app, a photo editor app, an Internet speed test app, and a file explorer app.

It has been discovered by Researchers from Malwarebytes labs and the apps found updated between October and November 2017. Malware bytes researchers named the malware variant as Android/Trojan.AsiaHitGroup based on URL code.

How Android Trojan Infects

Researchers analyzed the function with QR scanner app.It starts just with an icon and if the victim clicks on the icon it opens a functioning QR scanner, as promised.The application is short lived and users have only Once chance to open the app.

Also Read 2 Million Android Users Infected by Malicious Google Play Store Apps

As soon as the app opened icon will disappear and even it will not be available in the app list too even if you check with icon name and they found it deceiving as Download Manager.

At step one, it first tries to locate the location of the device using the website ip-api.com to get the geolocation of the IP. If the location satisfies, it proceeds to next step.

Unfortunately, during testing, the APK could not be downloaded via the malicious QR app—most likely due to my location. However, I was able to manually download the APK using the URL provided in the download instructions. The behavior of this downloaded APK was that of a Trojan SMS (which is why I subsequently named it Android/Trojan.SMS.AsiaHitGroup). Based on all the references to Asia within the code, my assumption is you must be in Asia for this malware to fully function. Researchers said.

Adware app consists of unusual service name: vn.solarjsc.fakeads.ShowAdsService, within this service they have a reference available to download the Trojan SMS.

Even after Google play protect introduced a number of malicious apps continue to enter into play store. Malware bytes strongly suggests the second layer of protection.

Malicious APK samples: use at own risk

Android/Trojan.AsiaHitGroup

MD5: 178E6737A779A845B8F2BAF143FDEA15, Package Name: duy.van.dao.qrcode
MD5: 7EEC1C26E60FEDE7644187B0082B6AC4, Package Name: com.varvet.barcodereader
MD5: 7CEDA121F9D452E9A32B8088F50012B8, Package Name: com.maziao.alarm
MD5: B481CE9D0B7295CDA33B15F9C7809B95, Package Name: com.magiaomatday.editimage
MD5: 60A71632004EE431ABB28BF91C3A4982, Package Name: com.maziao.speedtest
MD5: N/A, Package Name: com.ruzian.explorer

Android/Trojan.SMS.AsiaHitGroup

MD5: 3CC02E4FECEB488B084665E763968108, Package Name: duy.van.dao.dynamicduy

Android/Adware.AsiaHitGroup

MD5: 995D5DC873104B5E42B3C0AF805359DB, Package Name: com.offer.flashcall

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency

A newly identified malware, dubbed Zhong Stealer, has emerged as a significant threat to...

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency

A newly identified malware, dubbed Zhong Stealer, has emerged as a significant threat to...

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...