Sunday, May 11, 2025
Homecyber securityFully Undetected Anubis Malware Enables Hackers to Execute Remote Commands

Fully Undetected Anubis Malware Enables Hackers to Execute Remote Commands

Published on

SIEM as a Service

Follow Us on Google News

A recent alert has highlighted the emergence of the AnubisBackdoor, a Python-based backdoor attributed to the Savage Ladybug group, which is reportedly linked to the notorious FIN7 cybercrime gang.

This malware is designed to provide remote access, execute commands, and facilitate data exfiltration, all while evading detection by most antivirus solutions.

Technical Analysis

The AnubisBackdoor is part of a broader trend of sophisticated malware tools being developed and deployed by cybercrime groups.

- Advertisement - Google News

Unlike the Anubis malware, which is primarily known for targeting Android devices with banking trojan capabilities, the AnubisBackdoor is specifically tailored for remote command execution and system compromise on other platforms.

It features mild obfuscation techniques, making it fully undetected (FUD) by many security tools.

This level of stealth allows threat actors to use it effectively in malspam campaigns, further compromising systems and stealing sensitive data.

The Savage Ladybug group’s use of the AnubisBackdoor underscores the evolving tactics of cybercrime groups like FIN7, which have historically been known for their advanced evasion techniques and tool development.

FIN7, also known as Carbanak, has been active since at least 2013 and has employed a range of tools, including the Carbanak backdoor and the AvNeutralizer tool, which is designed to disable endpoint detection and response (EDR) solutions.

The development and deployment of the AnubisBackdoor suggest that these groups continue to innovate and adapt their strategies to evade detection and maximize the impact of their attacks.

Indicators of Compromise (IOCs)

According to the Report, To combat the AnubisBackdoor, security teams are advised to monitor for specific indicators of compromise (IOCs), including backend server IP addresses such as 38.134.148.20, 5.252.177.249, 212.224.107.203, and 195.133.67.35.

Additionally, file hashes like 03a160127cce3a96bfa602456046cc443816af7179d771e300fec80c5ab9f00f and 5203f2667ab71d154499906d24f27f94e3ebdca4bba7fe55fe490b336bad8919 should be flagged for potential malicious activity.

As the threat landscape continues to evolve, it is crucial for organizations to enhance their security posture by implementing robust detection and response strategies to counter such sophisticated malware threats.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Sophisticated PhaaS Phish Toolkits are Now Genetrating Realistic Fake Phishing Pages

Cybersecurity experts are raising alarms over the proliferation of increasingly sophisticated phishing techniques that...

Critical Azure and Power Apps Vulnerabilities Allow Attackers to Exploit RCE

Microsoft has patched four critical security vulnerabilities affecting its Azure cloud services and Power...

How to Detecting Backdoors in Enterprise Networks

In today’s rapidly evolving cybersecurity landscape, enterprise networks face a particularly insidious threat: backdoors,...

Securing Windows Endpoints Using Group Policy Objects (GPOs): A Configuration Guide

Securing Windows endpoints is a top priority for organizations seeking to protect sensitive data...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Sophisticated PhaaS Phish Toolkits are Now Genetrating Realistic Fake Phishing Pages

Cybersecurity experts are raising alarms over the proliferation of increasingly sophisticated phishing techniques that...

Critical Azure and Power Apps Vulnerabilities Allow Attackers to Exploit RCE

Microsoft has patched four critical security vulnerabilities affecting its Azure cloud services and Power...

Bluetooth Core 6.1 Released – What’s New!

Bluetooth SIG’s decision to transition to a bi-annual release cadence marks a strategic pivot...