
Loki Bot 2.0 Android Banker Botnet
Loki Bot 2.0 represents a dangerous evolution of the infamous Android banking trojan, now upgraded with advanced botnet capabilities for large-scale financial fraud. This malware specifically targets mobile banking apps, cryptocurrency wallets, and payment systems, using sophisticated overlay attacks and remote access functionality to steal credentials and bypass multi-factor authentication (MFA). Distributed through fake apps, phishing SMS, and malicious ads, Loki Bot 2.0 has become a preferred tool for hackers due to its modular design and high evasion rate against security solutions.
Download Link 1
Download Link 2
Download Link 3
Download Link 4
What is Loki Bot 2.0 Android Banker Botnet?
Loki Bot 2.0 is a Remote Access Trojan (RAT) and banking malware hybrid that infects Android devices to form a botnet controlled via Command & Control (C2) servers. Unlike its predecessor, this version includes:
- Enhanced anti-analysis techniques (sandbox detection, code obfuscation)
- Automated botnet propagation (worm-like spreading via SMS/WhatsApp)
- Real-time transaction manipulation (intercepting banking OTPs)
- Cryptocurrency draining (targeting MetaMask, Trust Wallet, etc.)
Detailed Features of Loki Bot 2.0
| Category | Feature | Technical Details |
|---|---|---|
| Infection Vector | Fake App Distribution | Masquerades as PDF scanners, games, or system updaters on third-party stores. |
| Phishing SMS Campaigns | Uses smishing with malicious links (e.g., “Your package is delayed”). | |
| Botnet Control | Firebase C2 Communication | Leverages Google Firebase for stealthy command routing. |
| Decentralized C2 Backup | Uses Tor hidden services if Firebase is blocked. | |
| Banking Theft | Overlay Attacks | Displays fake login screens for 300+ global banking apps. |
| Keylogging | Logs keystrokes & gestures even in secure keyboards. | |
| SMS Interception | Auto-reads OTP codes via Android accessibility abuse. | |
| Cryptocurrency | Wallet Draining | Targets MetaMask, Trust Wallet via fake update prompts. |
| Clipboard Hijacking | Replaces crypto wallet addresses during transactions. | |
| Evasion | Anti-Emulator Checks | Detects Bluestacks, Genymotion and self-terminates. |
| Dynamic Code Loading | Downloads malicious payloads after installation to avoid detection. | |
| Persistence | Device Admin Abuse | Locks itself as device administrator to prevent removal. |
| Notification Hijacking | Hides alerts from security apps using Android notification API abuse. |
Why Hackers Use Loki Bot 2.0?
High Financial Returns
Direct theft from bank accounts & crypto wallets
Resale of compromised banking credentials ($50-$300 per account on dark web)
Low Detection Rates
Only 11% detection rate in VirusTotal (as of 2024)
Uses legitimate services (Firebase) for C2 communications
Automated Attacks
Botnet auto-spreads via compromised contact lists
AI-generated phishing messages increase success rate
Multi-Platform Targeting
Adapts overlay attacks based on victim’s banking apps
Supports 150+ global banks and 40+ crypto exchanges


