Regions Targeted: Turkey, Poland, Spain, Argentina, Brazil, India, Indonesia, United States
Related Families: None specified
Key Takeaways
What is Crocodilus?
The malware spreads primarily through phishing campaigns, often disguised as legitimate apps like Google Chrome, online casinos, or e-commerce platforms offering bonus points. In Poland, attackers have utilized Facebook ads, active for only one to two hours but viewed over a thousand times, to lure users over 35—a demographic likely targeted for financial solvency. These ads redirect victims to malicious sites hosting a proprietary dropper that bypasses Android 13+ security restrictions. Once installed, Crocodilus requests Accessibility Service permissions, enabling it to monitor screen content, log user inputs, and execute remote commands. This abuse of accessibility features allows the malware to deploy fake login overlays on targeted apps, capturing credentials in real time.
Crocodilus has introduced significant technical enhancements to evade detection. Its dropper and payload now employ code packing, XOR encryption, and convoluted code structures, complicating reverse engineering efforts. A notable new feature enables the malware to add fake contacts to the victim’s device, such as “Bank Support,” allowing attackers to impersonate trusted entities during fraudulent calls. This capability can bypass fraud prevention systems that flag unknown numbers. Additionally, Crocodilus uses an automated seed phrase collector to extract cryptocurrency wallet keys, deceiving users with fake warnings to “back up” their keys within 12 hours. Local data parsing further enhances the quality of stolen data, enabling immediate account takeovers.
The malware’s infrastructure suggests a link to the threat actor “sybra,” previously associated with MetaDroid, Hook, and Octo malware, though it remains unclear whether sybra is the developer or an early adopter. Debug messages in the source code indicate a Turkish-speaking author, consistent with early campaign focus. While no specific CVEs are exploited, Crocodilus’s reliance on social engineering and accessibility abuse highlights the limitations of traditional signature-based detection. ThreatFabric notes that its global expansion and polished feature set indicate a well-resourced, adaptive threat actor. PolySwarm analysts consider Crocodilus to be an evolving threat.
IOCs
PolySwarm has a sample of Crocodilus.
6d55d90d021b0980528f56d040e78fa7b85a96f5c244e23f330f24c8e80c1cb2
You can use the following CLI command to search for all Crocodilus samples in our portal:
$ polyswarm link list -f Crocodilus
Don’t have a PolySwarm account? Go here to sign up for a free Community plan or subscribe.
Contact us at hivemind@polyswarm.io | Check out our blog | Subscribe to our reports.