This report details the analysis of a new, sophisticated variant of the Gremlin information stealer, identified by Unit 42. The malware has evolved significantly, incorporating advanced anti-analysis and obfuscation techniques to evade detection. Key developments include hiding malicious payloads within the .NET Resource section, employing commercial-grade packers with instruction virtualization, and expanding its capabilities to include a cryptocurrency clipboard hijacker, session token theft from Chromium browsers, and a Discord token stealer. These enhancements transform Gremlin from a basic credential harvester into a modular, multi-faceted threat capable of direct financial fraud and comprehensive data compromise. The low detection rates of new samples underscore the increased risk posed to organizations and individuals.
Gremlin is an information stealer designed to siphon sensitive data from compromised systems. This latest iteration demonstrates a marked increase in sophistication, focusing on stealth and modularity. The primary attack vector involves tricking users into executing the malicious binary, which then harvests a wide range of data from web browsers, local storage, and active user sessions.
The malware bundles stolen data—including credentials, cookies, and system information—into a ZIP archive named after the victim's public IP address. This data is then exfiltrated to an attacker-controlled command-and-control (C2) server. A newly identified C2 endpoint is 194.87.92.109, which had zero detections on VirusTotal at the time of discovery, highlighting the threat's evasiveness.
The evolution is clear: older versions were largely unobfuscated, while the new variant uses multi-stage loading and encryption to conceal its true purpose until runtime, making static analysis extremely difficult.
The new Gremlin variant employs several advanced techniques to evade detection and analysis.
The most significant change is the relocation of the malicious payload into the .NET Resource section. The payload is encoded using a single-byte XOR operation, making it appear as an opaque, benign block of data to static analysis tools and signature-based antivirus engines. This technique, also used by malware like Agent Tesla and Formbook, effectively hides critical strings, API calls, and the C2 configuration until the malware decrypts them at runtime.
One analyzed sample (2172dae9a5a695e00e0e4609e7db0207d8566d225f7e815fada246ae995c0f9b) was protected by a commercial packing utility. This packer uses instruction virtualization, converting the original machine code into a custom bytecode that runs on a private virtual machine embedded within the malware. This is a powerful anti-debugging and anti-emulation technique.
Other anti-analysis methods include:
hxxps://api[.]telegram[.]org) and API function names are encrypted and only decrypted in memory when needed.Gremlin has transitioned to a modular architecture, with specialized components for different tasks:
T1027 - Obfuscated Files or Information: The core technique of hiding the payload via XOR encoding in resources.T1027.002 - Software Packing: Use of a commercial packer with instruction virtualization.T1555.003 - Credentials from Web Browsers: Harvesting credentials, cookies, and other data from browser databases.T1552.004 - Web Session Cookie Theft: Hijacking active session tokens directly from browser processes.T1115 - Clipboard Data: Monitoring and modifying clipboard content to steal cryptocurrency.T1059.007 - JavaScript/JScript: Although not explicitly stated, stealer modules often use scripts to interact with browser data.T1041 - Exfiltration Over C2 Channel: Uploading the stolen data in a ZIP archive to the C2 server.T1071.001 - Web Protocols: Using HTTP for C2 communication and data exfiltration.The evolution of Gremlin stealer presents a multi-faceted risk to organizations and individuals. The primary impact is financial, stemming directly from the new clipboard hijacking module that targets cryptocurrency transactions. This feature represents a direct and immediate path to monetization for the attackers.
Beyond direct financial loss, the compromise of credentials, session tokens, and communication platform data (e.g., Discord) can lead to significant follow-on attacks. Stolen credentials can be used to access corporate networks, cloud services, and financial accounts. Hijacked session tokens allow attackers to bypass multi-factor authentication (MFA) and impersonate users, gaining access to sensitive enterprise applications and data. The theft of Discord tokens could lead to account takeovers, social engineering campaigns, or the compromise of developer communities.
194.87.92.1092172dae9a5a695e00e0e4609e7db0207d8566d225f7e815fada246ae995c0f9bd09282b71850616147a3036979603099919018b1088a8f4c281a8b598d97587154a96e95963f9bee19864a7a85818968953151b72e128104860b865672f10b0ehttp://api.ipify.org/?format=jsonhttps://api.telegram.orgSecurity teams may want to hunt for the following patterns, which could indicate Gremlin stealer activity:
194.87.92.109*.exe%APPDATA%, %TEMP%).powershell.exe -c "(New-Object System.Net.WebClient).DownloadFile(...)"/12*.zipDetecting this evolved Gremlin variant requires a layered defense focusing on behavior rather than static signatures.
Endpoint Detection and Response (EDR): Deploy EDR solutions to monitor for suspicious process behaviors. Create rules to detect processes that:
Login Data file).chrome.exe, msedge.exe).Network Monitoring: Actively monitor and filter egress network traffic. Block all outbound connections to the known IOC 194.87.92.109. Use a web proxy to inspect traffic and alert on POST requests containing .zip files to suspicious or uncategorized domains/IPs. D3FEND's Network Traffic Analysis (D3-NTA) is critical here.
File and Memory Analysis: Utilize endpoint security tools capable of performing memory scanning to detect malware components that are decrypted at runtime. For static analysis, D3FEND's File Analysis (D3-FA) can be used with tools that can inspect .NET resource sections and apply automated XOR bruteforcing to uncover hidden payloads.
Incident Response: If an infection is suspected, immediately isolate the affected endpoints from the network to prevent further data exfiltration and lateral movement. Initiate a forensic investigation to determine the scope of the compromise, including what data was stolen. All credentials for accounts used on the compromised machine should be rotated.
Organizations can take several proactive steps to defend against Gremlin stealer and similar threats.
Enforce Multi-Factor Authentication (MFA): The most effective defense against credential theft is strong MFA. This ensures that even if credentials are stolen, attackers cannot easily access accounts. This aligns with MITRE Mitigation M1032 - Multi-factor Authentication.
User Education: Train users to recognize and avoid phishing emails, malicious attachments, and suspicious downloads, which are the primary initial access vectors for stealers. This maps to M1017 - User Training.
Software Patching: Keep all software, especially web browsers and operating systems, up to date to protect against exploits that could be used for initial access. This aligns with M1051 - Update Software.
Application Whitelisting: Implement application control policies to restrict the execution of unauthorized or unsigned applications, particularly from user-writable locations like %APPDATA%. This is a form of M1038 - Execution Prevention.
Network Egress Filtering: Restrict outbound network connections to only what is necessary for business operations. Deny all outbound traffic by default and only allow connections to approved services and domains. This corresponds to M1037 - Filter Network Traffic.
Reduces the impact of stolen credentials by requiring a second factor for authentication, which Gremlin cannot steal as easily.
Mapped D3FEND Techniques:
Endpoint security solutions can detect and block known Gremlin samples based on hashes and behavioral patterns.
Block outbound connections to known malicious IPs like 194.87.92.109 and restrict egress traffic to prevent data exfiltration.
Mapped D3FEND Techniques:
Keeping web browsers and other client-side software updated can prevent exploitation that may lead to initial access.
Mapped D3FEND Techniques:
Educate users to identify and report phishing attempts and suspicious downloads, which are common delivery vectors for info-stealers.
Use EDR tools to monitor for and block suspicious behaviors like a process accessing browser credential files or reading memory from another process.
Mapped D3FEND Techniques:
To counter Gremlin's data exfiltration, organizations should implement robust Network Traffic Analysis. Specifically, configure network monitoring tools and SIEMs to alert on any outbound HTTP/S connections to the known C2 IP address 194.87.92.109. Beyond this specific IOC, create rules to detect and flag outbound connections to raw IP addresses that do not have a corresponding DNS lookup, as this is a common tactic for malware C2. Monitor for POST requests containing .zip file uploads to uncategorized or newly-registered domains. Given Gremlin's use of Telegram, all outbound traffic to api.telegram.org should be scrutinized; while legitimate use may exist, connections from server workloads or non-standard user applications are highly suspicious and should be blocked or trigger an immediate alert. Baselining normal egress traffic patterns is crucial to detect anomalies like the sudden transfer of a compressed archive.
Given Gremlin's focus on stealing data from running processes, Process Analysis via an EDR solution is a critical defense. Configure EDR policies to specifically monitor and alert on processes that attempt to access sensitive browser files, such as Login Data, Cookies, and Local State files within user profiles for Chrome, Edge, and other Chromium browsers. Furthermore, since the new variant hijacks session tokens from memory, rules should be created to detect processes attempting to read the memory space of chrome.exe, msedge.exe, etc. This cross-process memory reading is highly indicative of malicious activity. Also monitor for processes that load the .NET runtime and subsequently exhibit suspicious behaviors like network connections to unknown IPs or file system enumeration. This behavioral approach is essential for detecting Gremlin, as its on-disk signatures are heavily obfuscated.
While Gremlin's session hijacking capability can bypass MFA in some scenarios, implementing phishing-resistant MFA is still a vital countermeasure. The primary value of MFA in this context is to mitigate the impact of the credential theft component. Even if Gremlin successfully exfiltrates usernames and passwords, strong MFA (such as FIDO2/WebAuthn or hardware tokens) prevents the attacker from using those credentials in a separate session. This significantly contains the damage and prevents attackers from easily accessing corporate VPNs, cloud applications, and other critical services with the stolen credentials. For services where session hijacking is a concern, organizations should reduce session timeout lengths and explore solutions that continuously validate user sessions, making a hijacked token less useful over time. MFA acts as a crucial backstop, neutralizing the most common use case for stolen passwords.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.