Nowadays Trojanized Android apps evolving rapidly in play store and continuously targetting innocent users who all are unaware of the malicious application and apps permission while installing the apps on their devices.
A new malware strain found in Google play masquerading as multiple apps an alarm clock app, a QR scanner app, a compass app, a photo editor app, an Internet speed test app, and a file explorer app.
It has been discovered by Researchers from Malwarebytes labs and the apps found updated between October and November 2017. Malware bytes researchers named the malware variant as Android/Trojan.AsiaHitGroup based on URL code.
How Android Trojan Infects
Researchers analyzed the function with QR scanner app.It starts just with an icon and if the victim clicks on the icon it opens a functioning QR scanner, as promised.The application is short lived and users have only Once chance to open the app.
As soon as the app opened icon will disappear and even it will not be available in the app list too even if you check with icon name and they found it deceiving as Download Manager.
At step one, it first tries to locate the location of the device using the website ip-api.com to get the geolocation of the IP. If the location satisfies, it proceeds to next step.
Unfortunately, during testing, the APK could not be downloaded via the malicious QR app—most likely due to my location. However, I was able to manually download the APK using the URL provided in the download instructions. The behavior of this downloaded APK was that of a Trojan SMS (which is why I subsequently named it Android/Trojan.SMS.AsiaHitGroup). Based on all the references to Asia within the code, my assumption is you must be in Asia for this malware to fully function. Researchers said.
Adware app consists of unusual service name: vn.solarjsc.fakeads.ShowAdsService, within this service they have a reference available to download the Trojan SMS.
Even after Google play protect introduced a number of malicious apps continue to enter into play store. Malware bytes strongly suggests the second layer of protection.
Malicious APK samples: use at own risk
MD5: 178E6737A779A845B8F2BAF143FDEA15, Package Name: duy.van.dao.qrcode
MD5: 7EEC1C26E60FEDE7644187B0082B6AC4, Package Name: com.varvet.barcodereader
MD5: 7CEDA121F9D452E9A32B8088F50012B8, Package Name: com.maziao.alarm
MD5: B481CE9D0B7295CDA33B15F9C7809B95, Package Name: com.magiaomatday.editimage
MD5: 60A71632004EE431ABB28BF91C3A4982, Package Name: com.maziao.speedtest
MD5: N/A, Package Name: com.ruzian.explorer
MD5: 3CC02E4FECEB488B084665E763968108, Package Name: duy.van.dao.dynamicduy
MD5: 995D5DC873104B5E42B3C0AF805359DB, Package Name: com.offer.flashcall