New Crocodilus Malware Grants Full Control Over Android Devices

New Crocodilus Malware Grants Full Control Over Android Devices

The Mobile Threat Intelligence (MTI) team identified a formidable new player in the mobile malware landscape: Crocodilus, an Android banking Trojan designed for device takeover.

Initially observed in test campaigns with limited live instances, this malware has rapidly evolved, demonstrating a surge in active campaigns and sophisticated development.

A Rising Threat in the Android Ecosystem

What began as a regionally focused threat, primarily targeting Turkey, has now expanded into a global menace, reaching European nations, South America, and beyond.

– Advertisement –

This alarming progression, coupled with enhanced technical capabilities, positions Crocodilus as a critical concern for Android users and cybersecurity professionals alike.

Crocodilus has undergone significant updates, incorporating advanced obfuscation techniques to evade detection and complicate reverse engineering.

Its dropper and payload now employ code packing, XOR encryption, and convoluted code structures, making analysis challenging for security researchers.

Beyond technical enhancements, the malware introduces invasive features such as the ability to manipulate a victim’s contact list.

By adding fraudulent contacts potentially labeled as “Bank Support” attackers can initiate social engineering attacks, bypassing fraud prevention mechanisms that flag unfamiliar numbers.

Sophisticated Features

Another troubling development is its automated seed phrase collector, which leverages an improved AccessibilityLogging feature with regular expression-based parsing to extract cryptocurrency wallet data directly from the device.

Crocodilus Malware
Targeted apps and regular expressions used to extract data

According to the ThreatFabric Report, this preprocessed, high-quality data enables immediate fraudulent actions, including account takeovers targeting digital assets. The geographic scope of Crocodilus campaigns has widened dramatically.

While maintaining a strong presence in Turkey with overlays mimicking local financial apps, the Trojan now targets users in Poland through malicious Facebook Ads disguised as bank or e-commerce apps offering bonus points.

These ads, though active for mere hours, reached thousands, primarily users over 35 a demographic likely chosen for financial solvency.

Similar campaigns in Spain masquerade as browser updates to target major banks, while smaller, globally oriented efforts hit apps from Argentina, Brazil, the US, Indonesia, and India.

Distribution often relies on social engineering via malicious ads on social platforms, redirecting users to sites hosting the Crocodilus dropper, which bypasses Android 13+ restrictions.

Crocodilus Malware
Malicious advertisement leading to Crocodilus dropper download

The rapid evolution of Crocodilus underscores a shift toward more organized and adaptive threat actors.

Its ability to harvest sensitive data, manipulate device functionalities, and operate across diverse regions marks it as a sophisticated global threat.

Android users and organizations must prioritize proactive defenses such as avoiding suspicious app downloads, scrutinizing ads, and deploying robust mobile security solutions to counter this escalating danger.

As Crocodilus continues to refine its tactics, staying informed and vigilant is paramount.

Indicators of Compromise (IoCs)

App Name Package Name SHA256 Hash C2 Domain
IKO nuttiness.pamperer.cosmetics 6d55d90d021b0980528f56d040e78fa7b85a96f5c244e23f330f24c8e80c1cb2 rentvillcr[.]homes
ETH Mining app apron.confusing fb046b7d0e385ba7ad15b766086cd48b4b099e612d8dd0a460da2385dd31e09e rentvillcr[.]online

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.