PDA

View Full Version : Anubis II Android Banking Trojan – Panel (Source) |Free|



Dragula
05-07-2019, 04:52 AM
A newly observed variant of BankBot named Anubis II has been discovered masquerading as Adobe Flash Player. Firstly, Anubis II takes mobile threats to the next level incorporating ransomware, keylogger abilities, remote access trojan functions, and much more. Android Banking Trojans are sinister enough on their own; however, there is now a growing trend of integrating the functionality of other malware. For example, genres alongside Banker’s typical phishing overlay and SMS-stealing capabilities. In conclusion, banking trojans are now incorporating such a wide range of malicious functionality. Therefore, it’s hardly surprising they have become a favorite among malicious actors.



Arguably Anubis 2 has been deemed one of the most stable and feature packed downloader for Android. In other words, the advanced stealing and bank logging capabilities makes this banking trojan one of the highest desired in all of time. The small size of the generated payload allows for extremely easy disguising of the malware to infect phones in multiple up-to-date methods. For example, the Anubis II banking trojan works perfectly co-inside our Android WebView RCE.



Features
Escalate admin privilege
C2 Botnet Controller
Back up servers
Request permissions to Send SMS (android 6+)
Sens SMS
Read SMS
Logging
Keys
Passwords
Bank details
Disguise / remove incoming SMS
Muffle sound and vibration
System Details
IMEI Number
OS Version
APK Version
Country
Bank (which (d, e) is set (s))
Device model
Remote screen view
Presence of injection for bank and log button

https://mega.nz/#!a7xyHIzC!-qgkyqg2qeukMhNtjTQC_Jyfy_lI-kqULszN7vee18c

kdubsxo
11-06-2019, 02:54 PM
Is this real!!?!

meshpy
05-23-2020, 09:10 PM
Please update the link or DM me