- These samples of Anubis are called AndroidOS_AnubisDropper.
- These new variants of Anubis trojan are labeled as either ‘Operatör Güncellemesi’ and ‘Google Services.’
The infamous Anubis banking trojan has evolved to target Android mobile users. Lately, two related servers containing 17,490 samples of Anubis trojans have been detected by security researchers. These samples of Anubis are called AndroidOS_AnubisDropper.
What are the trojan capabilities?
Researchers at Trend Micro used SHA-256 to analyze the new samples of Anubis and found that these variants requested the following URLs to download a malicious app:
These URLs retrieved the following malicious APKs:
Furthermore, these new variants of Anubis trojan are labeled as either ‘Operatör Güncellemesi’ or ‘Google Services.’
According to Trend Micro researchers, “These labels are probably social engineering lures used to trick unwitting users into downloading an Anubis-embedded app.”
The samples that are marked with ‘Operatör Güncellemesi’ label come with information-stealing capabilities as the previous iterations. These information-stealing capabilities include:
- Taking screenshots of the infected device’s screen;
- Remotely controlling the device via virtual network computing (VNC);
- Recording audio;
- Sending, receiving, and deleting SMS;
- Enabling or configuring device administration settings;
- Getting the device’s running tasks;
- Stealing the device’s contact list;
- Opening a specified URL;
- Disabling Google Play Protect;
- Locking the device’s screen and more.
Apart from stealing information, these variants Anubis also target a list of 188 financial and banking-related apps from which it steals personal and financial data. Many of these apps are based in Poland, Australia, Turkey, Germany, France, Italy, Spain, USA, and India.
The samples of Anubis trojan that are marked with the Google Services label include both information-stealing and environment-detection capabilities.