Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Crocodilus

158
Global rank
163 infographic chevron month
Month rank
163
Week rank
0
IOCs

Crocodilus is a highly sophisticated Android banking Trojan that emerged in March 2025, designed for full device takeover. Disguised as legitimate apps, it steals banking credentials, cryptocurrency wallet data, and enables remote control, rapidly evolving into a global threat targeting financial users across Europe, South America, and Asia.

Trojan
Type
Unknown
Origin
1 March, 2025
First seen
29 August, 2025
Last seen

How to analyze Crocodilus with ANY.RUN

Type
Unknown
Origin
1 March, 2025
First seen
29 August, 2025
Last seen

IOCs

IP addresses
217.144.187.226
Domains
register-buzzy.store
mastercardkeys.live
mastercardkeys.world
rentvillcr.homes
rentvillcr.online
crocoprimecustm.store
iko-lokata.icu
iko-power-app.sbs
premiumcroco.online
rentvillcr.store
uniquecroco.site
Last Seen at

Recent blog posts

post image
ANY.RUN Sandbox & Microsoft Sentinel: Les...
watchers 569
comments 0
post image
Fighting Telecom Cyberattacks: Investigating...
watchers 2483
comments 0
post image
Efficient SOC: How to Detect and Solve Incide...
watchers 1030
comments 0

Crocodilus Malware: The Android Threat That Hides Your Screen While Draining Your Bank Account

Key Takeaways

  • Crocodilus is a fully-featured threat from inception: it emerged with complete device-takeover capabilities including overlay attacks, accessibility abuse, remote control, and advanced social engineering. This represents a concerning trend toward increasingly mature initial threat releases.
  • Mobile devices are critical attack surfaces: organizations must recognize that mobile devices accessing financial and corporate systems represent significant risk vectors.
  • Accessibility Services are the primary attack vector: Crocodilus's power comes from abusing Android Accessibility Services, which grant extensive control over device functionality.

View Crocodilus detonations in ANY.RUN’s Interactive Sandbox to see malicious processes and network connections and understand how the malware acts:

Crocodilus processes in the Sandbox Crocodilus processes detected in the sandbox analysis

Social engineering remains the critical vulnerability: despite technical sophistication, Crocodilus succeeds primarily through convincing social engineering: fake ads, urgent warnings, and trusted caller ID spoofing. Security awareness training focused on mobile-specific threats is essential for both individuals and organizations.

  • Cryptocurrency users face amplified risks: Crocodilus specifically targets cryptocurrency wallets with tailored social engineering to steal seed phrases, representing complete and irreversible compromise.
  • Threat intelligence enables proactive defense: organizations that leverage threat intelligence about Crocodilus can implement specific countermeasures based on known IOCs, distribution methods, and targeted regions. Early intelligence about emerging threats like Crocodilus provides critical time to prepare defenses before widespread attacks.

What is Crocodilus Malware?

Crocodilus is a sophisticated Android banking Trojan that emerged in early 2025, representing a new generation of mobile device-takeover malware. Unlike simpler malicious apps, Crocodilus arrives fully equipped with advanced capabilities including overlay attacks, keylogging, remote access, and hidden remote control features.

It specifically targets banking applications and cryptocurrency wallets, using social engineering tactics to deceive victims into surrendering their most sensitive credentials. Since its discovery, Crocodilus has rapidly evolved and expanded globally.

The malware employs a multi-layered approach to compromise devices, beginning with a proprietary dropper that bypasses Android 13+ security restrictions. Once installed, it requests Accessibility Service permissions, which grants it extensive control over the device.

The malware operates by continuously monitoring app launches and displaying fake overlays to intercept credentials when victims attempt to access legitimate banking or cryptocurrency applications. What distinguishes Crocodilus is its "Accessibility Logger" feature, which goes beyond traditional keylogging by capturing all accessibility events and screen elements, effectively recording everything displayed on the victim's device.

Crocodilus includes remote access trojan (RAT) capabilities that allow attackers to take complete control of infected devices. The malware can display black screen overlays during fraudulent activities, effectively hiding actions from victims while muting device sounds to prevent detection. The malware communicates with command-and-control (C2) servers to receive instructions, download target lists, and exfiltrate stolen data.

Recent variants have introduced even more sophisticated features, including the ability to modify contact lists by adding fake entries that appear as legitimate bank support numbers, and automated seed phrase collectors that use regular expressions to extract cryptocurrency wallet credentials directly from the screen content.

Crocodilus infiltrates via social engineering-driven droppers distributed through:

  • Malicious Ads: Facebook campaigns mimicking banks, browsers (e.g., "Google Chrome update"), or e-commerce apps, redirecting to APK download sites. Polish ads ran thousands of impressions hourly, targeting seniors.
  • Disguised Apps: Posing as online casinos, crypto miners (e.g., "ETH Mining app"), or bonus programs on third-party stores.
  • Sideloading Vectors: SMS phishing or email links leading to droppers that request Accessibility permissions post-install.

Spread relies on C2 orchestration for global campaigns, with no peer-to-peer replication observed. Evolution includes 17+ dropper families for broader compatibility.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Crocodilus Malware Victimology

Crocodilus primarily preys on Android users engaged in financial activities, with campaigns tailored to specific demographics and regions. Initial attacks focused on Spain and Turkey, targeting users of major banks like BBVA and Garanti BBVA, as well as cryptocurrency wallets. By June 2025, its reach expanded to Poland (via ads targeting users over 35), South America (Argentina and Brazil), and broader Europe, including digital banks in the US, Indonesia, and India.

Notable campaigns:

  • Crypto Drain Campaign (April 2025): Infected 1,200+ Android devices across Spain and Turkey, using wallet overlays and RAT hijacks to steal $2.8 million in cryptocurrencies over two weeks. Attackers harvested seed phrases via fake backup prompts.
  • Polish Facebook Blitz (May 2025): Ads mimicking PKO Bank Polski and Allegro e-commerce apps led to hundreds of infections, targeting users over 35 and enabling bank credential theft.
  • Turkish Casino Scam Wave (March-June 2025): Disguised as gambling apps, it hit major banks like Ziraat, resulting in fraudulent transfers estimated at $1.5 million, with fake contacts used for follow-up vishing.
  • Contact List Manipulation Campaign (June 2025): Later variants introduced a new attack vector where Crocodilus added fake contacts to victims' devices using names like "Bank Support" or legitimate financial institution names. Attackers then called victims from these numbers, which appeared as trusted contacts, facilitating successful social engineering attacks that convinced victims to approve fraudulent transactions or reveal additional sensitive information.

How Crocodilus Malware Functions

Crocodilus operates through a multi-stage infection and control process: Stage 1: Initial Installation The malware uses a proprietary dropper application designed to bypass Android 13+ security restrictions. This dropper disguises itself as a legitimate application, often mimicking banking apps, browsers, cryptocurrency tools, or utility applications.

Stage 2: Permission Acquisition Upon installation, Crocodilus immediately requests Accessibility Service permissions. These permissions grant the malware extensive control over the device's user interface and ability to interact with other applications. The malware uses deceptive messaging to convince users to grant these dangerous permissions.

Stage 3: Command and Control Establishment Once permissions are granted, the malware connects to its C2 server to receive operational instructions. This includes downloading lists of target applications (banks and cryptocurrency wallets to monitor) and the corresponding fake overlay screens to deploy.

Stage 4: Continuous Monitoring Crocodilus runs persistently in the background, monitoring which applications the user launches. When a target application is opened, the malware springs into action.

Stage 5: Credential Interception When victims attempt to log into targeted banking or cryptocurrency applications, Crocodilus displays a fake overlay screen that perfectly mimics the legitimate login interface. Users unknowingly enter their credentials into the malicious overlay, which immediately transmits this data to attackers.

Stage 6: Data Exfiltration The malware's accessibility logger captures all screen content, including sensitive information like account balances, transaction details, two-factor authentication codes from Google Authenticator, and cryptocurrency wallet data. For cryptocurrency wallets specifically, the malware employs social engineering to trick users into revealing their seed phrases.

Stage 7: Remote Control Attackers can initiate remote control sessions, taking direct control of the infected device. During these sessions, the malware can display black screen overlays and mute sounds, hiding fraudulent activities from the victim while attackers execute unauthorized transactions, transfer funds, or steal additional information.

Stage 8: Advanced Manipulation Recent variants add fake contacts to the victim's contact list, enabling attackers to call victims while appearing as legitimate bank support or trusted entities. This facilitates additional social engineering attacks and helps bypass fraud prevention systems that flag calls from unknown numbers.

Crocodilus Attack Example and Technical Analysis

ANY.RUN’s Interactive Sandbox supports the detonation and analysis of mobile malware and lets observe its behavior on an actual Android device. Just select an OS in the VM settings on the analysis launch:

OS selection in Sandbox settings Set up virtual environment selecting an Android OS

A Crocodilus sample sandbox analysis demonstrates its signature TTPs like network discovery, evasion, and encryption.

Crocodilus Sandbox analysis Crocodilus in action in the safe Interactive Sandbox environment

Network Activity and Encryption

The malware performs network reconnaissance, extracting the phone number and the name of the current network operator, which allows it to adapt attacks to a specific user and region.

Crocodilus processes: reconnaissance Crocodilus explores network configuration

The analysis shows the use of cryptographic APIs for data encryption, which helps protect transmitted commands and stolen information from interception.

Crocodilus processes: encryption Crocodilus encrypts stolen data

Configuration File and Management

Crocodilus stores its configuration in the SharedPreferences system storage in XML format, where parameters such as the URL of the command server determine the behavior of the malware.

Crocodilus configuration file Crocodilus’ configuration file

Persistence and Privilege Escalation

To remain stealthy, Crocodilus hides the application icon from the screen and blocks deletion attempts by intercepting events in Android settings. Besides, it requests access to accessibility services and intercepts their events, allowing interface manipulation without user input. The malware uses accessibility to control applications, automatically performing actions such as button taps, for privilege escalation and overlay attacks.

Crocodilus develops its persistence and privileges Crocodilus develops its persistence and privileges

Screen Capture, Keylogging, and Overlay Attacks

Keylogging through screen capture is implemented as an Accessibility Logger. The malware monitors all accessibility events, capturing elements displayed on the screen, including user’s text input. This allows recording not only keystrokes but also dynamic content, such as one-time passwords from applications like Google Authenticator.

Overlay attacks are the main tool for stealing credentials. When a user launches a target application, such as a banking or crypto wallet, the malware overlays a fake screen on top of the real one, imitating the login interface to capture logins and passwords.

How Crocodilus Malware Threatens Businesses and Organizations

While Crocodilus primarily targets individual users, its impact extends significantly to businesses and organizations through multiple attack vectors:

Bring Your Own Device (BYOD) Risks: If an employee's infected device accesses company banking applications, financial systems, or corporate accounts, the malware can compromise business financial assets.

Financial Fraud and Direct Losses: Organizations that conduct mobile banking or maintain cryptocurrency treasuries face direct financial theft.

Data Breach and Compliance Violations: Crocodilus captures sensitive business communications, credentials, and financial data. For organizations subject to regulations like GDPR, PCI DSS, or financial services regulations, such breaches can result in substantial fines, legal liabilities, and mandatory breach notifications.

Business Email Compromise (BEC) Enablement: By accessing business communications and contact lists on infected devices, attackers gain intelligence for BEC attacks. They can impersonate executives, understand business relationships, and craft convincing fraud attempts targeting other employees or business partners.

Reputational Damage: Organizations that fall victim to Crocodilus-enabled fraud may suffer significant reputational harm, especially if customer data or funds are compromised.

Supply Chain Threats: Infected devices used by vendors, contractors, or partners can serve as entry points into broader business ecosystems, potentially compromising multiple organizations through a single infection.

Gathering Threat Intelligence on Crocodilus Malware

Threat intelligence provides specific technical indicators including file hashes, C2 server domains, malicious package names, and behavioral signatures. Security teams can integrate these IOCs into security tools, endpoint protection platforms, and network security devices to identify and block Crocodilus-related activity.

Start from querying Threat Intelligence Lookup with the threat name to find Crocodilus samples that ANY.RUN’s community of 500K professionals and 15K SOC teams has already analyzed. Study TTPs and gather IOCs:

threatName:"crocodilus"

Crocodilus sandbox analyses found via TI Lookup Crocodilus sandbox analyses found via TI Lookup

Add a country code to the request to see how actively Crocodilus samples has been recently analyzed by the Sandbox users from this country and suggest whether the region is heavily targeted right now. In this example, German does not seem to be under fire yet, which means local companies and users still have some time to prepare:

threatName:"crocodilus" AND submissionCountry:"de"

Crocodilus samples analyzed from Germany Crocodilus samples submitted to the Sandbox from Germany

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

Crocodilus exemplifies the accelerating arms race in mobile malware, blending RAT sophistication with global scalability to erode trust in digital finance. From its Turkish roots to worldwide bites, it demands a unified response: vigilant users, fortified apps, and shared intelligence. As Android's dominance grows, ignoring such threats risks financial chaos—but armed with awareness, we can clamp down before it snaps again.

Start gathering actionable threat intelligence on Crocodilus by signing up to ANY.RUN’s TI Lookup: protect your business with timely detection and response.

HAVE A LOOK AT

Cobalt Strike screenshot
Cobalt Strike
cobaltstrike
Cobalt Strike is a legitimate penetration software toolkit developed by Forta. But its cracked versions are widely adopted by bad actors, who use it as a C2 system of choice for targeted attacks.
Read More
Fog Ransomware screenshot
Fog is a ransomware strain that locks and steals sensitive information both on Windows and Linux endpoints. The medial ransom demand is $220,000. The medial payment is $100,000. First spotted in the spring of 2024, it was used to attack educational organizations in the USA, later expanding on other sectors and countries. Main distribution method — compromised VPN credentials.
Read More
Remote Access Trojan screenshot
Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.
Read More
DarkTortilla screenshot
DarkTortilla
darktortilla
DarkTortilla is a crypter used by attackers to spread harmful software. It can modify system files to stay hidden and active. DarkTortilla is a multi-stage crypter that relies on several components to operate. It is often distributed through phishing sites that look like real services.
Read More
DeerStealer screenshot
DeerStealer
deerstealer
DeerStealer is an information-stealing malware discovered in 2024 by ANY.RUN, primarily targeting sensitive data such as login credentials, browser history, and cryptocurrency wallet details. It is often distributed through phishing campaigns and fake Google ads that mimic legitimate platforms like Google Authenticator. Once installed, it exfiltrates the stolen data to a remote command and control (C2) server. DeerStealer’s ability to disguise itself as legitimate downloads makes it particularly dangerous for unsuspecting users.
Read More
Razr screenshot
Razr
razr
Razr is a destructive ransomware that infiltrates systems to encrypt files, rendering them inaccessible to users. It appends the ".razr" extension to the encrypted files and drops a ransom note, typically named "README.txt," instructing victims on how to pay the ransom to obtain the decryption key. The malware often spreads through phishing emails with malicious attachments or by exploiting vulnerabilities in software and operating systems. Razr employs strong encryption algorithms, making it challenging to decrypt files without the attackers' key.
Read More