A growing number of malicious campaigns have leveraged a recently discovered Android banking trojan called Crocodilus to target users in Europe and South America.
The malware, according to a new report published by ThreatFabric, has also adopted improved obfuscation techniques to hinder analysis and detection, and includes the ability to create new contacts in the victim’s contacts list.
“Recent
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-06-03 10:07:062025-06-03 10:07:06Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto Wallets
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-06-03 09:06:502025-06-03 09:06:50Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names
Editor’s note: The current article is authored by Mauro Eldritch, offensive security expert and threat intelligence analyst. You can find Mauro on X.
What looks like a simple freelance bug fix turns out to be a full-blown malware infection. OtterCookie, a new tool from the Lazarus Group APT, hides behind clean code and fake job offers, then silently steals credentials, crypto wallets, and more.
In this step-by-step technical analysis, Mauro Eldritch breaks down the full attack chain, supported by live insights from ANY.RUN’s Interactive Sandbox.
Overview of OtterCookie Malware
North Korean state-sponsored groups, most notably Lazarus, continue to target the financial and cryptocurrency sectors using a range of custom malware families. Previously observed campaigns included threats like InvisibleFerret and Beavertail, which were distributed through elaborate social engineering tactics such as fake developer interviews and staged business calls with executives.
A new addition to this toolkit is OtterCookie, a stealer malware that, much like its predecessors, isn’t spread through random means like pirated software or infected USB drives. Instead, it is part of a broader, coordinated campaign targeting professionals in the tech, financial, and crypto industries. By staging fake interviews, threat actors deliver malware disguised either as coding challenges (or their dependencies) or video call software, in a campaign now known as Contagious Interview or DevPopper.
OtterCookie, written in heavily obfuscated JavaScript, was uncovered during a recent investigation conducted with the Bitso Quetzal Team. Notably, the delivery method used in this case stands out for its creativity and level of deception.
OtterCookie is a new stealer malware linked to North Korean APT Lazarus, delivered through fake job offers.
Malware is hidden in clean-looking Node.js repos and executed via an intentional try/catch failure.
Payload is fetched from an external API and executed using a require() call—no local implant needed.
Targets include browser credentials, macOS keychains, and crypto wallets like Solana and Exodus.
Data is exfiltrated via port 1224 to a U.S.-based C2 server, following patterns seen in Beavertail and InvisibleFerret.
ANY.RUN detects OtterCookie early, before deobfuscation, and maps its behavior in the ATT&CK Matrix.
OtterCookie eventually deploys InvisibleFerret, continuing Lazarus’s modular, multi-stage approach.
Social Engineering Delivery: The “Job Offer” Trap
As part of the Contagious Interview campaign, one observed variation involved a new form of social engineering distributed through LinkedIn. Instead of requesting participation in a coding challenge or scheduling a business call, as seen in previous campaigns, the attacker proposed freelance contract work. The task was simple: resolve a minor visual bug in the frontend of a decentralized application (DApp).
The sender claimed their development team was unavailable due to vacation and shared access to a Bitbucket repository containing Node.js code.
Picture 2: Bitbucket repo
Surprisingly, the repository appeared entirely clean. No implants, no hidden payloads, and none of the suspicious NPM dependencies commonly associated with earlier malware like Beavertail. This wasn’t an example of FUD (Fully Undetectable) malware bypassing antivirus detection, it was genuinely clean. The kind of clean that instills confidence and lowers suspicion.
Picture 3: VirusTotal
A Closer Look at OtterCookie Malware
The code simulates a NodeJS web service and frontend based on Express, with two interesting functions. First, there’s an error section that looks hastily written, with a particularly odd error message.
Picture 4: Badly written Error
Next, there’s a notable try/catch block in the code. For context, a try/catch block is a common programming construct that allows an application to attempt an operation. If the operation fails, due to either a specific error or a general exception, the catch block executes to handle the failure without crashing the application.
Picture 5: Try/Catch block
Execution Through Controlled Failure
This particular implementation is one of the most creative ways of deploying malware seen recently. The app’s initialization sequence is wrapped in a try/catch block. When an error is triggered, it fetches a response from an external API that appears to provide contextual error information, and then… executes it.
You read it right – it uses a require() statement to execute whatever response comes back from the external API.
The first thought that comes to mind: “Does that mean the system gets infected if the app fails?”
And yes, that’s exactly the point! The failure is intentional and triggered during the app’s bootstrap phase. It kicks in, catches the error, prints it to the console, and pretends it just handled the issue gracefully—like everything’s fine now and ready to go. In the background, it already fetched “the error” and is executing it.
Interactive Sandbox Analysis with ANY.RUN
Let’s take a closer look at how this plays out in ANY.RUN’s interactive sandbox
After launching an Ubuntu instance and installing Node.js, the next step involves adding the legacy peer dependencies from NPM—around 1,540 packages in total. Running the web server then triggers the expected error routine: “Unexpected reserved word.” Despite the wording, this error is anything but unexpected.
Speed up and simplify analysis of malware and phishing threats with ANY.RUN’s Interactive Sandbox
Originally, the task was to fix a simple visual bug. But that raises the question—how did a blatant, critical error like using a reserved word make it into the code? The answer becomes obvious a bit too late: while the app was running, it quietly queried a remote API in Finland—chainlink-api-v3[.]cloud—and received what appeared to be an error response.
Or at least something that looked like one. And it got executed.
Picture 7: The response, obfuscated in JavaScript
Deobfuscation and Payload Behavior
Let’s try to deobfuscate that response.
Lazarus is known for its frequent use of a legitimate online tool: deobfuscate[.]io. This platform has been used to obfuscate JavaScript payloads in fake NPM packages, and even entire malware families like Beavertail.
Picture 8: Decoded malware
When the obfuscated code is pasted, the webapp recognizes which version was used to scramble it and offers to redirect you straight to the right decoder. One click later, you get the original code, which is nice and readable. Let me introduce you to OtterCookie. Let’s analyze it.
Inside OtterCookie: What It Targets
OtterCookie begins by requesting libraries that allow interaction with the operating system, such as fs, os, path, request, and child_process. It also includes modules specifically designed to target major browsers like Brave, Google Chrome, Opera, and Mozilla Firefox, along with numerous browser extensions, primarily those related to cryptocurrency wallets and password managers.
Picture 9: Imported libraries and dedicated malicious modules
This behavior may sound familiar to those who’ve followed earlier DPRK-linked malware campaigns, such as Beavertail and InvisibleFerret.
Credential and Wallet Theft
In this case, OtterCookie specifically targets Firefox profile directories, copying the user’s Solana-related profile data for exfiltration.
Picture 10: Firefox and Solana profiles are stolen
In addition to Solana, other wallets, such as Exodus, are also targeted, with sensitive files being copied for exfiltration. This aligns with the broader pattern observed in DPRK campaigns, where cryptocurrency assets are a primary focus due to their relative ease of laundering and anonymization.
And it’s not just about cryptocurrency. Some NFTs, despite having little market value, are used as authentication mechanisms in certain Web3 environments, which are increasingly widespread. These, too, can be valuable to threat actors.
Picture 11: Exodus Wallet is actively targeted
Next, OtterCookie attempts to access the macOS login keychain, along with credential databases from various browsers, extracting saved passwords, session tokens, and other sensitive authentication data.
Exfiltration Tactics and Infrastructure
Once everything is staged, the malware sends the loot to a webserver in the US (144.172.101.45), using port 1224 and the /uploads path.
We’ve seen this exact pattern before… in InvisibleFerret.
It’s safe to assume that some practices—and even bits of code—are being recycled across these malware strains.
Picture 12: Remembrances of InvisibleFerret and BeaverTail
Before exfiltration, OtterCookie attempts to compress the collected data using tar. At this stage, some familiar filenames appear, p.zi and p2.zip, previously seen in related campaigns.
That definitely rings a bell. Similar filenames were seen in the Beavertail campaign, used to download and install its partner-in-crime and next stage: InvisibleFerret, pulled from an endpoint called /pdown. Just like in the snippet at the end of this script.
Picture 13: Downloading the next stage: InvisibleFerret
Next Stage: Delivering InvisibleFerret
At this stage, the malware attempts to download a portable Python distribution, compatible with either Windows or Unix, from its command-and-control (C2) server. Once installed, it proceeds to execute InvisibleFerret as the next stage of the attack. For context, InvisibleFerret is a cross-platform remote access trojan (RAT) written in Python, known for leveraging legitimate tools such as AnyDesk to maintain persistent access to the victim’s system.
Picture 14: Preparing the next stage by setting up Python
The good news is that ANY.RUN successfully detects all three malware strains—OtterCookie, InvisibleFerret, and Beavertail.
Learn to analyze cyber threats
Follow along a detailed guide to using ANY.RUN’s Interactive Sandbox for malware and phishing analysis
Read full guide
In this case, the obfuscated payload was flagged even before manual deobfuscation could begin.
With that covered, it’s time to move on to the MITRE ATT&CK Matrix, which ANY.RUN conveniently generates as part of the analysis.
Picture 15: Detected as OTTERCOOKIE
The OtterCookie Matrix
OtterCookie shares several Tactics, Techniques, and Procedures (TTPs) with its counterparts, InvisibleFerret and Beavertail. Some of the most notable include:
T1082 – System Information Discovery OtterCookie collects detailed information from the victim’s system to build a comprehensive host profile.
T1003 – OS Credential Dumping The malware accesses sensitive local files such as /etc/passwd and /etc/shadow, along with browser credential stores and OS keychains. The harvested data is then compressed and prepared for exfiltration.
T1071 – Application Layer Protocol This technique is used to communicate with the command-and-control server (144.172.101.45) for data exfiltration.
T1571 – Non-Standard Port Supporting T1071, this technique involves the use of an uncommon port—1224—to evade standard detection mechanisms.
Picture 16: MITRE ATT&CK Matrix
Conclusion
OtterCookie is yet another reminder of how advanced and deceptive modern malware has become. Hidden behind a routine bug fix task, it exfiltrates credentials, crypto wallet data, and system information, while quietly setting up a second-stage payload like InvisibleFerret.
Attacks like this demand more than traditional detection. They require a dynamic, transparent environment to truly understand what’s happening.
With ANY.RUN’s interactive sandbox, security teams can:
Cut investigation time from hours to seconds by getting clear verdicts in under 40 seconds even for obfuscated, evasive malware.
Understand threats in real time, helping analysts take action before damage is done.
Train junior analysts faster by giving them a safe, hands-on environment to explore real malware behavior without risking the network.
Improve response quality and speed, thanks to visualized tactics, techniques, and clear IOCs that can be used immediately in detection rules.
Boost team efficiency with easy-to-share sessions and collaborative analysis tools, reducing back-and-forth and enabling faster decision-making.
Whether you’re investigating OtterCookie or preparing for what’s next, ANY.RUN helps you detect, understand, and respond faster with clarity and control.
Join now to experience its advanced features for 14 days.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-06-03 09:06:412025-06-03 09:06:41OtterCookie Malware Analysis and Distribution
Microsoft and CrowdStrike have announced that they are teaming up to align their individual threat actor taxonomies by publishing a new joint threat actor mapping.
“By mapping where our knowledge of these actors align, we will provide security professionals with the ability to connect insights faster and make decisions with greater confidence,” Vasu Jakkal, corporate vice president at Microsoft
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-06-03 08:07:202025-06-03 08:07:20Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion
Google has revealed that it will no longer trust digital certificates issued by Chunghwa Telecom and Netlock citing “patterns of concerning behavior observed over the past year.”
The changes are expected to be introduced in Chrome 139, which is scheduled for public release in early August 2025. The current major version is 137.
The update will affect all Transport Layer Security (TLS)
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-06-03 08:07:182025-06-03 08:07:18Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues
Google on Monday released out-of-band fixes to address three security issues in its Chrome browser, including one that it said has come under active exploitation in the wild.
The high-severity flaw is being tracked as CVE-2025-5419, and has been flagged as an out-of-bounds read and write vulnerability in the V8 JavaScript and WebAssembly engine.
“Out of bounds read and write in V8 in Google
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-06-03 02:06:482025-06-03 02:06:48Don’t let dormant accounts become a doorway for cybercriminals