Nowadays Trojanized Android apps evolving rapidly in play store and continuously targetting innocent users who all are unaware of the malicious application and apps permission while installing the apps on their devices.
A new malware strain found in Google play masquerading as multiple apps an alarm clock app, a QR scanner app, a compass app, a photo editor app, an Internet speed test app, and a file explorer app.
It has been discovered by Researchers from Malwarebytes labs and the apps found updated between October and November 2017. Malware bytes researchers named the malware variant as Android/Trojan.AsiaHitGroup based on URL code.
Researchers analyzed the function with QR scanner app.It starts just with an icon and if the victim clicks on the icon it opens a functioning QR scanner, as promised.The application is short lived and users have only Once chance to open the app.
Also Read 2 Million Android Users Infected by Malicious Google Play Store Apps
As soon as the app opened icon will disappear and even it will not be available in the app list too even if you check with icon name and they found it deceiving as Download Manager.
At step one, it first tries to locate the location of the device using the website ip-api.com to get the geolocation of the IP. If the location satisfies, it proceeds to next step.
Unfortunately, during testing, the APK could not be downloaded via the malicious QR app—most likely due to my location. However, I was able to manually download the APK using the URL provided in the download instructions. The behavior of this downloaded APK was that of a Trojan SMS (which is why I subsequently named it Android/Trojan.SMS.AsiaHitGroup). Based on all the references to Asia within the code, my assumption is you must be in Asia for this malware to fully function. Researchers said.
Adware app consists of unusual service name: vn.solarjsc.fakeads.ShowAdsService, within this service they have a reference available to download the Trojan SMS.
Even after Google play protect introduced a number of malicious apps continue to enter into play store. Malware bytes strongly suggests the second layer of protection.
MD5: 178E6737A779A845B8F2BAF143FDEA15, Package Name: duy.van.dao.qrcode
MD5: 7EEC1C26E60FEDE7644187B0082B6AC4, Package Name: com.varvet.barcodereader
MD5: 7CEDA121F9D452E9A32B8088F50012B8, Package Name: com.maziao.alarm
MD5: B481CE9D0B7295CDA33B15F9C7809B95, Package Name: com.magiaomatday.editimage
MD5: 60A71632004EE431ABB28BF91C3A4982, Package Name: com.maziao.speedtest
MD5: N/A, Package Name: com.ruzian.explorer
Android/Trojan.SMS.AsiaHitGroup
MD5: 3CC02E4FECEB488B084665E763968108, Package Name: duy.van.dao.dynamicduy
Android/Adware.AsiaHitGroup
MD5: 995D5DC873104B5E42B3C0AF805359DB, Package Name: com.offer.flashcall
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…
The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…
A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…
Meta has announced the removal of over 2 million accounts connected to malicious activities, including…
Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…
A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…