{"id":10488,"date":"2017-11-14T17:10:04","date_gmt":"2017-11-15T01:10:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/14\/news-4260\/"},"modified":"2017-11-14T17:10:04","modified_gmt":"2017-11-15T01:10:04","slug":"news-4260","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/11\/14\/news-4260\/","title":{"rendered":"New Android Trojan malware discovered in Google Play"},"content":{"rendered":"<p><strong>Credit to Author: Nathan Collier| Date: Wed, 15 Nov 2017 00:07:53 +0000<\/strong><\/p>\n<p>A new piece of mobile malware has been discovered in Google Play masquerading as multiple apps: an alarm clock app, a QR scanner app, a compass app, a photo editor app, an Internet speed test app, and a file explorer app. According to Google Play data, all were last updated between October and November 2017.\u00a0 These dates are likely when they were added to Google Play, based on their low version numbers (e.g. 1.0, 1.0.1).<\/p>\n<p>We named this new malware variant Android\/Trojan.AsiaHitGroup based on a URL found within the code of these malicious APKs.<\/p>\n<p> <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/11\/new-trojan-malware-discovered-google-play\/#gallery-20524-1-slideshow\">Click to view slideshow.<\/a> <\/p>\n<p>For the sake of discussion as we analyze this malware, let\u2019s concentrate on just one of its associated apps, since they all share the same behavior. We will focus on a malicious QR scanner app named <em>Qr code generator \u2013 Qr scanner<\/em>.<\/p>\n<h3>Surface analysis of Trojan AsiaHitGroup<\/h3>\n<p>AsiaHitGroup has several layers of maliciousness. It starts innocently enough with an icon created on the mobile device after install. Click on the icon, and it opens a functioning QR scanner, as promised.<\/p>\n<p> <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/11\/new-trojan-malware-discovered-google-play\/#gallery-20524-2-slideshow\">Click to view slideshow.<\/a> <\/p>\n<p>However, this QR scanner is short lived. You only get one chance to use the app, because after clicking out of it, the icon disappears! Out of frustration, you may immediately go to your apps list to uninstall this bizarre-behaving QR scanner, but good luck finding it. If you are looking under the Q\u2019s for <em>Qr coder generator <\/em>or <em>Qr scanner, <\/em>it&#8217;s not there. It\u2019s not even under the icon\u2019s name, <em>Barcode reader, <\/em>which is shown briefly before vanishing. Instead, this deceiving app is called\u00a0<em>Download Manager<\/em> in the app list. Unless you know all the apps on your mobile device exceptionally well, it\u2019s near impossible to discover this app name.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20533 size-medium\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/AsiaHitGroup_3-169x300.jpg\" alt=\"\" width=\"169\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/AsiaHitGroup_3-169x300.jpg 169w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/AsiaHitGroup_3-338x600.jpg 338w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/AsiaHitGroup_3.jpg 720w\" sizes=\"auto, (max-width: 169px) 100vw, 169px\" \/><\/p>\n<h3>Diving deeper into Trojan AsiaHitGroup<\/h3>\n<p>If the behaviors listed above weren\u2019t enough to conclude this QR app is malicious, it gets worse. The first step performed by the malicious app in the background is checking the location of the mobile device. This is done by using the website <em>ip-api.com<\/em> which provides Geolocation using IP. If the location is in an area that satisfies rules within the code, then it proceeds to the next step. This next step is to download an APK by visiting a website that contains download instructions.<\/p>\n<h4>Code from <em>http:\/\/[hidden_domain]\/api\/custom\/dynamic-fragment<\/em> with instructions to download an APK<\/h4>\n<p><code>{\"id\": \"duy.van.dao.dynamicduy.20171005.16\", \"files\": [{\"id\": \"duy.van.dao.dynamicduy.20171005.16\", \"md5\": \"4662e8537751c49beb06309a989796fc\", \"url\": \"https:\/\/[hidden_domain]\/hoanghai27\/dynamic-fragment\/raw\/master\/dynamic-plugin-v22.apk\"}], \"version\": \"20171005.16\", \"fragments\": [{\"code\": \"duy.van.dao.dynamicduy.20171005.16\", \"name\": \"duy.van.dao.dynamicduy.MainFragment\", \"host\": \"dynamicfragment\"}]}<br \/> <\/code><\/p>\n<p>Unfortunately during testing, the APK could not be downloaded via the malicious QR app\u2014most likely due to my location. However, I was able to manually download the APK using the URL provided within the download instructions. The behavior of this downloaded APK was that of a Trojan SMS (which is why I subsequently named it Android\/Trojan.SMS.AsiaHitGroup). Based on all the references to Asia within the code, my assumption is <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/11\/emerging-apac-markets-prime-targets-malware-future\/\" target=\"_blank\" rel=\"noopener\">you must be in Asia<\/a> for this malware to fully function.<\/p>\n<h3>Add some adware into the mix<\/h3>\n<p>Even if the malicious Trojan SMS fails to download, there is yet another layer to the malevolence.\u00a0 Hidden within the malicious QR app is another APK waiting to do its biding. However, this hidden APK is a less threatening, adware-pushing app.<\/p>\n<p>The hidden adware app comes with an unusual service name:\u00a0<em>vn.solarjsc.fakeads.ShowAdsService.\u00a0 <\/em>Within this service, there is reference to the same domain that was used to gain download instructions of the Trojan SMS. Although I was unable to verify, this domain may also contain the \u201cfakeads\u201d referenced in the service name. Regardless, rest assured we are detecting this hidden adware app as well as Android\/Adware.AsiaHitGroup.<\/p>\n<h3>Google Play: not quite flawless<\/h3>\n<p>Even with the introduction of <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/08\/mobile-menace-monday-implications-google-play-protect\/\" target=\"_blank\" rel=\"noopener\">Google Play Protect<\/a>, there appears to be no fail-proof way to stop malware from entering the Play store. This is where a second layer of protection is strongly recommended. By using a quality mobile anti-malware scanner, you can stay safe even when Google Play Protect fails. We (obviously) recommend <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=org.malwarebytes.antimalware\" target=\"_blank\" rel=\"noopener\">Malwarebytes for Android<\/a>. Stay safe out there!<\/p>\n<p>&nbsp;<\/p>\n<h3>Malicious APK samples: use at own risk<\/h3>\n<h4>Android\/Trojan.AsiaHitGroup<\/h4>\n<p>MD5: 178E6737A779A845B8F2BAF143FDEA15, Package Name: duy.van.dao.qrcode<br \/> MD5: 7EEC1C26E60FEDE7644187B0082B6AC4, Package Name: com.varvet.barcodereader<br \/> MD5: 7CEDA121F9D452E9A32B8088F50012B8, Package Name: com.maziao.alarm<br \/> MD5: B481CE9D0B7295CDA33B15F9C7809B95, Package Name: com.magiaomatday.editimage<br \/> MD5: 60A71632004EE431ABB28BF91C3A4982, Package Name: com.maziao.speedtest<br \/> MD5: N\/A, Package Name: com.ruzian.explorer<\/p>\n<h4>Android\/Trojan.SMS.AsiaHitGroup<\/h4>\n<p>MD5: 3CC02E4FECEB488B084665E763968108, Package Name: duy.van.dao.dynamicduy<\/p>\n<h4>Android\/Adware.AsiaHitGroup<\/h4>\n<p>MD5: 995D5DC873104B5E42B3C0AF805359DB, Package Name: com.offer.flashcall<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/11\/new-trojan-malware-discovered-google-play\/\">New Android Trojan malware discovered in Google Play<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/11\/new-trojan-malware-discovered-google-play\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Nathan Collier| Date: Wed, 15 Nov 2017 00:07:53 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/11\/new-trojan-malware-discovered-google-play\/' title='New Android Trojan malware discovered in Google Play'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Featured_Image_AsiaHitGroup-640x640.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>New Android Trojan malware has been found in Google Play masquerading as multiple apps. We call this malware Android\/Trojan.AsiaHitGroup.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/mobile\/\" rel=\"category tag\">Mobile<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/android\/\" rel=\"tag\">Android<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/asiahitgroup\/\" rel=\"tag\">AsiaHitGroup<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/google-play\/\" rel=\"tag\">Google Play<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile\/\" rel=\"tag\">Mobile<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/11\/new-trojan-malware-discovered-google-play\/' title='New Android Trojan malware discovered in Google Play'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/11\/new-trojan-malware-discovered-google-play\/\">New Android Trojan malware discovered in Google Play<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10462,16645,4503,11268,10554],"class_list":["post-10488","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-android","tag-asiahitgroup","tag-cybercrime","tag-google-play","tag-mobile"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10488"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10488\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10488"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}