Kraken v2 Android Banking RAT

Kraken v2 Android Banking RAT

Kraken v2 Android landscape has become a prime target for cybercriminals, with Android devices being particularly vulnerable due to their open ecosystem and widespread adoption. Among the most dangerous threats to emerge is an advanced banking Remote Access Trojan (RAT) that combines sophisticated financial fraud capabilities with robust remote-control features. This malware has been actively targeting banking customers worldwide, demonstrating how cybercriminals are adapting desktop attack techniques to the mobile environment. Its ability to bypass security measures and manipulate banking apps in real-time makes it one of the most effective tools for mobile financial fraud today.

Download Link 1

Download Link 2

Download Link 3

Download Link 4

Kraken Android Banking RAT

This software is a sophisticated Android banking trojan that functions as both a credential stealer and a full-featured RAT. It primarily targets online banking users by employing overlay attacks, keylogging, and screen capture capabilities to steal sensitive financial information. The malware is typically distributed through malicious apps disguised as legitimate banking software, utility tools, or game mods on third-party app stores. Once installed, it gains extensive permissions to monitor device activity, intercept SMS messages (including two-factor authentication codes), and even take remote control of the infected device. Cybercriminals frequently use this malware in coordinated attacks against both individual bank customers and financial institutions.

Key Features of Kraken v2 Android 

FeatureDescription
Overlay AttacksDisplays fake login screens over legitimate banking apps
SMS InterceptionReads incoming messages, including 2FA codes
KeyloggingRecords all keystrokes entered on the device
Remote ControlAllows attackers to manipulate the device through VNC
Screen CaptureTakes screenshots of banking app activities
Notification HijackingIntercepts and hides banking app notifications
Contact List TheftHarvests phone contacts for further phishing attacks
Self-ProtectionUses obfuscation and anti-analysis techniques

How the Kraken v2 Android Works

The malware operates through a carefully orchestrated infection chain designed to maximize financial theft while maintaining persistence:

1. Delivery and Installation

  • Fake banking apps on third-party app stores.
  • Trojanized versions of popular utility apps or games.
  • Phishing links in SMS messages pretending to be from banks.

Once installed, it:

  • Requests extensive permissions (SMS, Accessibility Services, overlay).
  • Disguises its icon or hides it completely from the app drawer.
  • Checks for security apps or analysis environments.

2. Persistence Mechanisms

  • Registers itself as a device administrator.
  • Uses Android’s Accessibility Services to prevent uninstallation.
  • Creates persistent background services that auto-restart.

3. Banking Fraud Techniques

  • Overlay Attack

      • Detects when target banking apps are opened.
      • Displays a perfect replica of the login screen.
      • Captures entered credentials when victims “log in.”
  • SMS Interception

      • Monitors incoming messages for transaction authorization codes.
      • Automatically forwards them to attacker-controlled numbers.
      • Can delete messages to hide the theft.
  • Real-Time Fraud

    • Uses remote access to initiate transactions.
    • Bypasses 2FA by inputting intercepted codes.
    • Manipulates banking apps through screen control.

4. Data Exfiltration

  • Encrypted HTTPS to C2 servers.
  • Telegram bots for immediate access.
  • Backup channels through SMS or email.

5. Advanced Evasion

  • Dynamic code loading (only malicious payloads download after installation).
  • Geo-fencing (only activates in targeted countries).
  • Time-delayed execution (bypasses sandbox analysis).
  • Code obfuscation and encryption.

Download Link 1

Download Link 2

Download Link 3

Download Link 4