Gremlin stealer has evolved new obfuscation and anti-analysis methods, including hiding payloads in .NET resources, XOR encoding, and instruction virtualization through a commercial packing utility. It steals browser data, session tokens, crypto wallet information, and other credentials, then exfiltrates them to attacker-controlled infrastructure such as hxxp[:]194.87.92[.]109 for publication or sale. #Gremlin #Unit42 #CortexXDR #AdvancedWildFire
Keypoints
- Gremlin stealer now uses advanced obfuscation to hide its payload inside embedded .NET resources.
- A commercial packing utility with instruction virtualization converts the original code into custom bytecode executed by a private virtual machine.
- The malware targets browser cookies, session tokens, clipboard data, cryptocurrency wallets, FTP credentials, VPN credentials, and payment card details.
- A new Gremlin site at hxxp[:]194.87.92[.]109 was identified for publishing stolen data, and it had zero detections at the time of discovery.
- The latest variant adds a Discord token extraction module, a crypto clipper, and WebSocket-based session hijacking for live browser sessions.
- The malware names exfiltrated ZIP archives using the victimâs public IP address before uploading them to attacker-controlled servers.
- Compared with older samples, the newer builds add staged loading, XOR decryption, string encryption, and control-flow obfuscation to hinder analysis.
MITRE Techniques
- [T1027 ] Obfuscated Files or Information â The malware hides its payload in the .NET Resource section and uses XOR encoding to evade static analysis (âthe malicious payload into the .NET Resource section, masking it with XOR encoding to bypass signature-based detection and heuristic scanningâ).
- [T1027.016 ] Stripped Payload â The sample is packed and transformed into custom bytecode executed by a private virtual machine, hindering inspection (âemploys instruction virtualization, transforming the original code into a custom, non-standard bytecode executed by a private virtual machineâ).
- [T1027.013 ] Encrypted/Encoded File â Strings and configuration data are encrypted and recovered only through a decoder routine (âAll important strings are hiddenâ and âuses these numbers to calculate an offset and a lengthâ).
- [T1055 ] Process Injection â The malware requests data directly from the running browser process to hijack live sessions (ârequesting the data directly from the running browser processâ).
- [T1115 ] Clipboard Data â The clipper continuously monitors the clipboard for cryptocurrency wallet strings and replaces them in real time (âcontinuously monitors the system clipboardâ and âreplaces the victimâs address with the attackerâs walletâ).
- [T1005 ] Data from Local System â It collects local browser and system data such as cookies, tokens, clipboard contents, and stored credentials (âBrowser cookiesâ, âSession tokensâ, âClipboard contentsâ, âFTP and VPN credentialsâ).
- [T1566 ] Phishing â The article notes theft of digital identity and social engineering-related artifacts such as Discord tokens (âsignifies a pivot toward targeting digital identity and social engineeringâ).
- [T1041 ] Exfiltration Over C2 Channel â Stolen data is uploaded to attacker-controlled servers for publication or sale (âexfiltrates it to attacker-controlled serversâ).
Indicators of Compromise
- [SHA256] Gremlin stealer samples analyzed in the article â 2172dae9a5a695e00e0e4609e7db0207d8566d225f7e815fada246ae995c0f9b, 9aab30a3190301016c79f8a7f8edf45ec088ceecad39926cfcf3418145f3d614, and other 9 hashes
- [URL] New Gremlin exfiltration/publishing site â hxxp[:]194.87.92[.]109, hxxp[:]194.87.92[.]109/i.php
- [IP Address] Attacker-controlled site backend / published data host â 194.87.92.109
- [File Name / Archive] Stolen data is bundled into ZIP archives and named using the victimâs public IP address â ZIP archive containing browser cookies, session tokens, clipboard contents, and credentials
- [Embedded Resource Name] String decoder reads from the embedded resource file used by the .NET sample â resource
Read more: https://unit42.paloaltonetworks.com/gremlin-stealer-evolution/