Crocodilus in the wild: Mapping the campaign in Poland

medium.com · mvaks · 10 months ago · research
quality 7/10 · good
0 net
Crocodilus in the wild: Mapping the campaign in Poland | by mvaks - Freedium Milestone: 20GB Reached We’ve reached 20GB of stored data — thank you for helping us grow! Patreon Ko-fi Liberapay Close < Go to the original Crocodilus in the wild: Mapping the campaign in Poland Over the past week, several malware distribution campaigns have been observed in Poland, all targeting Android users with the same goal —… mvaks Follow ~3 min read · May 30, 2025 (Updated: May 30, 2025) · Free: Yes Over the past week, several malware distribution campaigns have been observed in Poland, all targeting Android users with the same goal — full control over the device and theft of credentials. Each campaign impersonated a well-known Polish brand — including a major bank, e-commerce platform and telecom provider — using fake apps to trick victims into installing malicious software. Despite the use of different themes and brands, all three campaigns relied on malware from the Crocodilus family. Shared infrastructure — including the same AES key for traffic decryption and a common C2 address — strongly suggests they were orchestrated by the same Turkish-speaking threat actor. Play-Plus campaign A campaign impersonating the telecom provider Play used an app with an icon very similar to the legitimate one. Upon launch, the app displayed a message prompting the user to update the Play Store, which in reality was a request to allow the installation of additional applications by the malware. The dropped application then requested access to Accessibility Services in order to take control of the device. The user was asked to enter their phone number to supposedly receive 300 PLN on their mobile. They were told the bonus would be activated within 24 hours, likely to delay suspicion and allow the attackers time to act. IOCs Dropper: package: collie.armchair.puppet MD5: 47687323c7a37ee5ab1c34226b23a360 dex file: submersedfeast.dex installs: rVwMwHK.apk Extracted .apk: package: untitled.lividly.disobey MD5: dc966268be1c40447c73bfc01808dd83 dex file: hermitcrudely.dex C2: 7162abdd9fd6e28.click AES Key: DBeYRNqiFnsyGpY8 Allegro campaign A campaign impersonating Allegro was distributed via the following URL: hxxps://allegro-kupony.sbs/Allegro%20Promo_3.16.apk The downloaded app, named allegro Promo , displayed a message upon launch prompting the user to allegedly update their Chrome browser. It then installed another application embedded within its resources. The dropped app — allegro Kupony — asked the user to provide their phone number and subsequently generated a QR code, supposedly granting a bonus of 1000 PLN. The link included in the app followed this format hxxps://allegro.pl/bonus?tel=+48(phone number) directing the victim to a non-existent resource on Allegro's legitimate domain. The attackers added a message stating that the bonus would be activated within 12 hours — likely to avoid raising suspicion and buy time for further malicious activity. IOCs Dropper: package: alfalfa.ungodly MD5: aca6cc169fe860fe9230d99206a98d12 dex file: lapelrover.dex installs: xdjoN.apk Extracted .apk: package: shore.footprint MD5: dc966268be1c40447c73bfc01808dd83 dex file: confettiunkind.dex C2: rentvillcr.homes AES Key: DBeYRNqiFnsyGpY8 IKO campaign The campaign described in my previous analysis was distributed through fake social media ads promoting the opportunity to receive allegedly attractive interest rates on bank deposits via a new application. The app leveraged Accessibility settings to gain control over the device. IOCs Dropper: package: purge.tremble MD5: 689579531a417b84ddbceb17c75d3c39 dex file: ablemocker.dex installs: iSZMv.apk Extracted .apk: package: unrelated.hamburger MD5: e7551da0d6e05cce11d4bf3ae016bb15 dex file: jasminenacho.dex C2: rentvillcr.homes AES Key: DBeYRNqiFnsyGpY8 Additional .apk found on VT: package: nuttiness.pamperer.cosmetics MD5: f6f589d1a0a189aded4d008b671be0db dex file: gullyclosure.dex C2: rentvillcr.homes AES Key: DBeYRNqiFnsyGpY8 Thanks for checking out my analysis — I'll update the article if any new campaigns pop up :-) #cybersecurity #malware #mobile-malware Reporting a Problem Sometimes we have problems displaying some Medium posts. If you have a problem that some images aren't loading - try using VPN. Probably you have problem with access to Medium CDN (or fucking Cloudflare's bot detection algorithms are blocking you).