Gremlin Stealer's Evolved Tactics: Hiding in Plain Sight With Resource Files

Gremlin Stealer Hides in Plain Sight, Using .NET Resources to Steal Crypto and Sessions

HIGH
May 15, 2026
7m read
MalwareThreat IntelligenceThreat Actor

Related Entities

Full Report

Executive Summary

This report details the analysis of a new, sophisticated variant of the Gremlin information stealer, identified by Unit 42. The malware has evolved significantly, incorporating advanced anti-analysis and obfuscation techniques to evade detection. Key developments include hiding malicious payloads within the .NET Resource section, employing commercial-grade packers with instruction virtualization, and expanding its capabilities to include a cryptocurrency clipboard hijacker, session token theft from Chromium browsers, and a Discord token stealer. These enhancements transform Gremlin from a basic credential harvester into a modular, multi-faceted threat capable of direct financial fraud and comprehensive data compromise. The low detection rates of new samples underscore the increased risk posed to organizations and individuals.


Threat Overview

Gremlin is an information stealer designed to siphon sensitive data from compromised systems. This latest iteration demonstrates a marked increase in sophistication, focusing on stealth and modularity. The primary attack vector involves tricking users into executing the malicious binary, which then harvests a wide range of data from web browsers, local storage, and active user sessions.

The malware bundles stolen data—including credentials, cookies, and system information—into a ZIP archive named after the victim's public IP address. This data is then exfiltrated to an attacker-controlled command-and-control (C2) server. A newly identified C2 endpoint is 194.87.92.109, which had zero detections on VirusTotal at the time of discovery, highlighting the threat's evasiveness.

The evolution is clear: older versions were largely unobfuscated, while the new variant uses multi-stage loading and encryption to conceal its true purpose until runtime, making static analysis extremely difficult.


Technical Analysis

The new Gremlin variant employs several advanced techniques to evade detection and analysis.

Payload Obfuscation in .NET Resources

The most significant change is the relocation of the malicious payload into the .NET Resource section. The payload is encoded using a single-byte XOR operation, making it appear as an opaque, benign block of data to static analysis tools and signature-based antivirus engines. This technique, also used by malware like Agent Tesla and Formbook, effectively hides critical strings, API calls, and the C2 configuration until the malware decrypts them at runtime.

Advanced Packing and Anti-Analysis

One analyzed sample (2172dae9a5a695e00e0e4609e7db0207d8566d225f7e815fada246ae995c0f9b) was protected by a commercial packing utility. This packer uses instruction virtualization, converting the original machine code into a custom bytecode that runs on a private virtual machine embedded within the malware. This is a powerful anti-debugging and anti-emulation technique.

Other anti-analysis methods include:

  • String Encryption: Sensitive strings like C2 URLs (hxxps://api[.]telegram[.]org) and API function names are encrypted and only decrypted in memory when needed.
  • Control Flow Obfuscation: The code's logic is intentionally convoluted with junk code and confusing jumps to hinder reverse engineering.
  • Staged Loading: Critical functions are decrypted and mapped into memory from the resource section on-demand, forcing analysts to rely on dynamic analysis to observe program behavior.

Modular Capabilities

Gremlin has transitioned to a modular architecture, with specialized components for different tasks:

  1. Chromium Session Hijacking: The malware now targets active session tokens directly from the memory of running Chromium-based browser processes, bypassing the need to parse static database files.
  2. Discord Token Stealer: A dedicated module scans multiple file paths for Discord tokens and uses regex validation to ensure their authenticity before exfiltration.
  3. Clipboard Hijacker: This new module continuously monitors the system clipboard. When it detects a string matching the pattern of a cryptocurrency wallet address, it replaces it with an attacker-controlled address, enabling direct financial theft.

MITRE ATT&CK Mapping


Impact Assessment

The evolution of Gremlin stealer presents a multi-faceted risk to organizations and individuals. The primary impact is financial, stemming directly from the new clipboard hijacking module that targets cryptocurrency transactions. This feature represents a direct and immediate path to monetization for the attackers.

Beyond direct financial loss, the compromise of credentials, session tokens, and communication platform data (e.g., Discord) can lead to significant follow-on attacks. Stolen credentials can be used to access corporate networks, cloud services, and financial accounts. Hijacked session tokens allow attackers to bypass multi-factor authentication (MFA) and impersonate users, gaining access to sensitive enterprise applications and data. The theft of Discord tokens could lead to account takeovers, social engineering campaigns, or the compromise of developer communities.


IOCs — Directly from Articles

Type
ip_address_v4
Value
194.87.92.109
Description
Newly deployed Gremlin C2 server.
Type
file_hash_sha256
Value
2172dae9a5a695e00e0e4609e7db0207d8566d225f7e815fada246ae995c0f9b
Description
Packed Gremlin stealer sample.
Type
file_hash_sha256
Value
d09282b71850616147a3036979603099919018b1088a8f4c281a8b598d975871
Description
Gremlin stealer sample.
Type
file_hash_sha256
Value
54a96e95963f9bee19864a7a85818968953151b72e128104860b865672f10b0e
Description
Gremlin stealer sample.
Type
url
Value
http://api.ipify.org/?format=json
Description
Used by malware to get victim's public IP.
Type
url
Value
https://api.telegram.org
Description
Used for C2 communication in some variants.

Cyber Observables — Hunting Hints

Security teams may want to hunt for the following patterns, which could indicate Gremlin stealer activity:

Type
network_traffic_pattern
Value
194.87.92.109
Description
Outbound HTTP POST requests to the known C2 IP.
Context
Firewall, proxy, or NetFlow logs.
Confidence
high
Type
process_name
Value
*.exe
Description
Unsigned executables running from temporary user directories (%APPDATA%, %TEMP%).
Context
EDR logs, Windows Event ID 4688.
Confidence
medium
Type
command_line_pattern
Value
powershell.exe -c "(New-Object System.Net.WebClient).DownloadFile(...)"
Description
PowerShell commands used to download secondary payloads.
Context
EDR, PowerShell script block logging (Event ID 4104).
Confidence
medium
Type
api_endpoint
Value
/
Description
HTTP POST requests containing a ZIP file to an IP-based URL.
Context
Web proxy logs, Network Security Monitoring (NSM) tools.
Confidence
high
Type
event_id
Value
12
Description
Sysmon Event ID 12 (RegistryEvent) showing modifications to clipboard-related keys.
Context
Sysmon logs.
Confidence
low
Type
file_name
Value
*.zip
Description
Creation of ZIP archives with an IP address as the filename.
Context
File integrity monitoring, EDR logs.
Confidence
medium

Detection & Response

Detecting this evolved Gremlin variant requires a layered defense focusing on behavior rather than static signatures.

  1. Endpoint Detection and Response (EDR): Deploy EDR solutions to monitor for suspicious process behaviors. Create rules to detect processes that:

    • Access credential stores of major browsers (e.g., Chrome's Login Data file).
    • Read memory from browser processes (chrome.exe, msedge.exe).
    • Make network connections to raw IP addresses, especially those with no associated domain.
    • Exhibit signs of runtime unpacking, such as writing and executing code in a new memory region.
  2. Network Monitoring: Actively monitor and filter egress network traffic. Block all outbound connections to the known IOC 194.87.92.109. Use a web proxy to inspect traffic and alert on POST requests containing .zip files to suspicious or uncategorized domains/IPs. D3FEND's Network Traffic Analysis (D3-NTA) is critical here.

  3. File and Memory Analysis: Utilize endpoint security tools capable of performing memory scanning to detect malware components that are decrypted at runtime. For static analysis, D3FEND's File Analysis (D3-FA) can be used with tools that can inspect .NET resource sections and apply automated XOR bruteforcing to uncover hidden payloads.

  4. Incident Response: If an infection is suspected, immediately isolate the affected endpoints from the network to prevent further data exfiltration and lateral movement. Initiate a forensic investigation to determine the scope of the compromise, including what data was stolen. All credentials for accounts used on the compromised machine should be rotated.


Mitigation

Organizations can take several proactive steps to defend against Gremlin stealer and similar threats.

  1. Enforce Multi-Factor Authentication (MFA): The most effective defense against credential theft is strong MFA. This ensures that even if credentials are stolen, attackers cannot easily access accounts. This aligns with MITRE Mitigation M1032 - Multi-factor Authentication.

  2. User Education: Train users to recognize and avoid phishing emails, malicious attachments, and suspicious downloads, which are the primary initial access vectors for stealers. This maps to M1017 - User Training.

  3. Software Patching: Keep all software, especially web browsers and operating systems, up to date to protect against exploits that could be used for initial access. This aligns with M1051 - Update Software.

  4. Application Whitelisting: Implement application control policies to restrict the execution of unauthorized or unsigned applications, particularly from user-writable locations like %APPDATA%. This is a form of M1038 - Execution Prevention.

  5. Network Egress Filtering: Restrict outbound network connections to only what is necessary for business operations. Deny all outbound traffic by default and only allow connections to approved services and domains. This corresponds to M1037 - Filter Network Traffic.

Timeline of Events

1
May 15, 2026
This article was published

MITRE ATT&CK Mitigations

Reduces the impact of stolen credentials by requiring a second factor for authentication, which Gremlin cannot steal as easily.

Mapped D3FEND Techniques:

Endpoint security solutions can detect and block known Gremlin samples based on hashes and behavioral patterns.

Mapped D3FEND Techniques:

Block outbound connections to known malicious IPs like 194.87.92.109 and restrict egress traffic to prevent data exfiltration.

Mapped D3FEND Techniques:

Keeping web browsers and other client-side software updated can prevent exploitation that may lead to initial access.

Mapped D3FEND Techniques:

Educate users to identify and report phishing attempts and suspicious downloads, which are common delivery vectors for info-stealers.

Use EDR tools to monitor for and block suspicious behaviors like a process accessing browser credential files or reading memory from another process.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To counter Gremlin's data exfiltration, organizations should implement robust Network Traffic Analysis. Specifically, configure network monitoring tools and SIEMs to alert on any outbound HTTP/S connections to the known C2 IP address 194.87.92.109. Beyond this specific IOC, create rules to detect and flag outbound connections to raw IP addresses that do not have a corresponding DNS lookup, as this is a common tactic for malware C2. Monitor for POST requests containing .zip file uploads to uncategorized or newly-registered domains. Given Gremlin's use of Telegram, all outbound traffic to api.telegram.org should be scrutinized; while legitimate use may exist, connections from server workloads or non-standard user applications are highly suspicious and should be blocked or trigger an immediate alert. Baselining normal egress traffic patterns is crucial to detect anomalies like the sudden transfer of a compressed archive.

Given Gremlin's focus on stealing data from running processes, Process Analysis via an EDR solution is a critical defense. Configure EDR policies to specifically monitor and alert on processes that attempt to access sensitive browser files, such as Login Data, Cookies, and Local State files within user profiles for Chrome, Edge, and other Chromium browsers. Furthermore, since the new variant hijacks session tokens from memory, rules should be created to detect processes attempting to read the memory space of chrome.exe, msedge.exe, etc. This cross-process memory reading is highly indicative of malicious activity. Also monitor for processes that load the .NET runtime and subsequently exhibit suspicious behaviors like network connections to unknown IPs or file system enumeration. This behavioral approach is essential for detecting Gremlin, as its on-disk signatures are heavily obfuscated.

While Gremlin's session hijacking capability can bypass MFA in some scenarios, implementing phishing-resistant MFA is still a vital countermeasure. The primary value of MFA in this context is to mitigate the impact of the credential theft component. Even if Gremlin successfully exfiltrates usernames and passwords, strong MFA (such as FIDO2/WebAuthn or hardware tokens) prevents the attacker from using those credentials in a separate session. This significantly contains the damage and prevents attackers from easily accessing corporate VPNs, cloud applications, and other critical services with the stolen credentials. For services where session hijacking is a concern, organizations should reduce session timeout lengths and explore solutions that continuously validate user sessions, making a hijacked token less useful over time. MFA acts as a crucial backstop, neutralizing the most common use case for stolen passwords.

Sources & References

Gremlin Stealer's Evolved Tactics: Hiding in Plain Sight With Resource Files
Unit 42 (unit42.paloaltonetworks.com) May 15, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Gremlin StealerInfoStealerMalware AnalysisObfuscationCryptocurrencyClipboard HijackerSession Hijacking.NET MalwareThreat Research

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.