Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools


    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware,, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.


      Anubis Android Banker - Andriod Botnet

      16 posts in this topic

      Create an account or sign in to comment

      You need to be a member in order to leave a comment

      Create an account

      Sign up for a new account in our community. It's easy!

      Register a new account

      Sign in

      Already have an account? Sign in here.

      Sign In Now

      • Similar Content

        • By scrack

          Hidden Content
          Give reaction to this post to see the hidden content. level23hacktools.com
        • By dEEpEst
          Learn Ethical Hacking with ease as it is fully Practical Course.
          Get ready to Fight against Hackers and Protect yourself.
          Learn the Tools used by Hackers.
          Start Improving your Coding Skills by writing and executing C, C++, Python Programs on Android Device.
          More importantly if you learn ethical hacking, you can take part in Bug Bounty Programs.
          ¿Para quién es este curso? if you want to learn Android Hacking, this is the First Course you must take  

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          Hidden Content
          Give reaction to this post to see the hidden content.
          Go     Hidden Content
          Give reaction to this post to see the hidden content.     Hidden Content
          Give reaction to this post to see the hidden content.   Hidden Content
          Give reaction to this post to see the hidden content.     Rarog is a Trojan with a built-in miner module and botnet elements. Rarog is written in C / C ++, builds without dependencies on VC ++ (Multi-threaded runtime (/ MT) library). Build weight: 410kb (v3.0). 

          Rarog can hide the miner's process from the following task managers: Windows Task Manager, Process Killer, KillProcess, System Explorer, Process Explorer, AnVir, Process Hacker. Trojan disguised as a Realtek driver, copying the headers of the original utilities. 

          If you are not familiar with hidden mining, then read this article - 
          Hidden Content
          Give reaction to this post to see the hidden content.  . 

          Infection process:
          When you first start, Rarog determines whether the system is infected. If the system is not infected, it creates a hidden folder in the system directory, is copied into it and starts with a special flag, destroying the original file. Then it is fixed in the system - it adds entries to the registry, creates shortcuts and tasks in the system. It then accesses the Rest API, transmits data about the victim's machine, and obtains the machine uID. Then it receives the miner's configuration (CPU / GPU), unloads the corresponding miner version from the server and launches it in hidden mode. 

          Features: Low build weight (410kb). Fixing the system. No dependencies on VC ++, correct work even on a clean OS. Masking for drivers. Hiding the miner's process from all popular task managers (see the list above). User-mode Trojan (work without administrator rights; support for working with a guest account). The ability to update the Trojan on infected machines using the admin panel. The ability to update the miner's builds through the admin panel. Tasks (opening a site in a browser, DDoS, downloading and launching any files) All important data transmitted between the bot and the server is encrypted. The trojan is tied to the customer's server, it is impossible to untie it and use it for its own purposes (all configs are packed). The admin panel is installed on the server of the buyer. Recovery in the system after the complete removal of the Trojan. Automatic infection of USB devices. Search and remove third-party miners on the PC. Helpers are special processes that protect the main process of the Trojan. Increasing the privilege process to the system (relevant only for Windows 7). Mining profiles: The 
          unique feature of this Trojan is mining profiles. According to the standard after the purchase you get 10 builds of the Trojan, tied to 10 profiles in the admin panel. For each profile, you can specify your own miner configuration. 

          This functionality can be useful for those who want to build a team of people who will distribute the builds and get a certain percentage of mining. In the admin panel displays useful information: the number of installations of each profile, and the list of bots displays the name of each profile (you can specify any). 

          What is included:
          Admin panel. 10 builds trojan under profiles. Manual installation and configuration. Recommendations for use. Help in setting up. Support for all issues. Protector to protect builds from VirusTotal. Download:

          Hidden Content
          Give reaction to this post to see the hidden content.