Anubis 8.0

Anubis 8.0

The mobile malware landscape has become increasingly dangerous with the emergence of sophisticated banking trojans that target financial applications across multiple platforms. Among these threats, a particularly advanced strain has evolved through multiple iterations to become one of the most pervasive mobile banking malware families in circulation. Anubis 8.0 exemplifies the growing trend of cross-platform financial threats that combine traditional banking trojan capabilities with advanced ransomware features, creating a dual-threat payload that can both steal credentials and lock devices. Its modular architecture and frequent updates make it especially difficult to detect and analyze, posing significant risks to both individual users and financial institutions.

Download Link 1

Download Link 2

Download Link 3

Download Link 4

This malware is a feature-rich banking trojan primarily targeting Android devices, though newer versions have expanded to other platforms. It operates as a malicious overlay application designed to steal banking credentials, credit card information, and sensitive personal data. Typically distributed through fake app stores, malicious advertisements, and smishing campaigns, it is commonly used in financial fraud operations, identity theft, and as a precursor to ransomware attacks. The Anubis 8.0 is a significant evolution from previous iterations, incorporating new evasion techniques and expanded targeting capabilities that make it particularly dangerous in the current threat landscape.

Anubis 8.0

Key Features of Anubis 8.0

FeatureDescription
Overlay AttacksDisplays fake login screens over legitimate banking apps
KeyloggingCaptures all keyboard input including passwords and PINs
SMS InterceptionReads and sends SMS messages to bypass 2FA
Remote ControlAllows attackers to take control of infected devices
Ransomware ModuleEncrypts device files and demands payment
Anti-DetectionUses multiple techniques to evade mobile security solutions
Accessibility AbuseExploits Android accessibility services for persistent access
Target ListContains over 500 financial applications worldwide
C2 CommunicationUses encrypted channels with fallback mechanisms

How Anubis 8.0 Works

Infection Vector

The malware typically spreads through:

  • Fake Application Packages: Disguised as legitimate apps or utilities
  • Smishing Campaigns: Malicious links sent via SMS messages
  • Third-Party Stores: Distributed through unofficial app marketplaces
  • Malvertising: Drive-by downloads from compromised ad networks

Upon installation, the malware:

  1. Requests extensive permissions (accessibility services, SMS, overlay)
  2. Hides its icon from the app drawer to prevent removal
  3. Connects to command and control (C2) servers for configuration

Core Malicious Functionality

  1. Overlay Attack Mechanism:
    • Monitors for launches of targeted banking apps
    • Displays identical-looking fake login screens
    • Captures entered credentials and transmits to C2
  2. SMS Fraud Capabilities:
    • Intercepts incoming SMS messages (including 2FA codes)
    • Can send premium-rate SMS messages without user knowledge
    • Block security-related SMS alerts from banks
  3. Remote Access Features:
    • Allows attackers to remotely control the device
    • Can initiate USSD commands for financial fraud
    • Enables real-time screen viewing and interaction
  4. Ransomware Component:
    • Encrypts user files with strong cryptography
    • Displays ransom demands threatening data loss
    • Can lock the device completely until payment

Evasion and Persistence Techniques

  • Code Obfuscation: Uses advanced packing and encryption
  • Dynamic Loading: Downloads malicious modules after installation
  • Anti-Emulation Checks: Detects and behaves differently in analysis environments
  • Update Mechanism: Can receive new configurations and target lists
  • Persistence: Maintains access through accessibility service abuse

Command and Control Infrastructure

The malware uses a resilient C2 network with:

  • Domain Generation Algorithm (DGA): Creates numerous potential C2 domains
  • Tor-based Fallback: Can connect through Tor hidden services
  • Cloud Hosting Abuse: Leverages legitimate cloud platforms for C2 traffic

Peer-to-Peer Options: Can communicate through other infected devices

Download Link 1

Download Link 2

Download Link 3

Download Link 4