Threat Advisory

Gremlin Stealer Conducts Session Theft and Crypto Clipping Features

Threat: Malware
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: High
[subscribe_to_unlock_form]


EXECUTIVE SUMMARY:

Gremlin Stealer is an advanced information-stealing malware that has transformed from a basic credential-harvesting tool into a sophisticated modular threat. It is designed to compromise Windows-based systems and extract a wide range of sensitive data from infected environments. The malware is increasingly distributed through malicious campaigns and is engineered to operate stealthily while maximizing data theft for financial gain and credential abuse. Its continued development highlights a shift toward more resilient and adaptable infostealer ecosystems targeting both individuals and enterprises.[/subscribe_to_unlock_form]


EXECUTIVE SUMMARY:

Gremlin Stealer is an advanced information-stealing malware that has transformed from a basic credential-harvesting tool into a sophisticated modular threat. It is designed to compromise Windows-based systems and extract a wide range of sensitive data from infected environments. The malware is increasingly distributed through malicious campaigns and is engineered to operate stealthily while maximizing data theft for financial gain and credential abuse. Its continued development highlights a shift toward more resilient and adaptable infostealer ecosystems targeting both individuals and enterprises.[emaillocker id="1283"]

The updated Gremlin Stealer introduces multiple layers of obfuscation and anti-analysis techniques to evade detection. It conceals its malicious payload within embedded resource sections of .NET binaries, often protected using XOR encoding and advanced packing utilities. Execution flow is further obscured through instruction virtualization, where original code is transformed into custom bytecode executed within a private virtual machine. The malware bundles stolen data such as cookies, session tokens, cryptocurrency wallet details, clipboard content, VPN credentials, and FTP data into compressed archives labeled using victim identifiers before transmitting them to remote command-and-control servers. Enhancements also include specialized modules for Discord token extraction, clipboard-based cryptocurrency address manipulation for transaction redirection, and WebSocket-based session hijacking, enabling attackers to take over active authenticated sessions and bypass multi-factor authentication protections.

Gremlin Stealer represents a significant in infostealer malware, transitioning into a highly modular and stealth-oriented threat. Its combination of deep obfuscation, real-time financial manipulation, and session hijacking capabilities highlights its focus on both persistent access and direct monetization of stolen data. The continuous refinement of its architecture and evasion strategies underscores the growing complexity of modern credential-stealing ecosystems and the increasing risk they pose to individuals and organizations handling sensitive digital assets.

 

THREAT PROFILE:

Tactic Technique Id Technique Sub-technique
Initial Access T1566.001 Phishing Spearphishing Attachment
Execution T1059.001 Command and Scripting Interpreter PowerShell
T1204.002 User Execution Malicious File
Persistence T1547.001 Boot or Logon Autostart Execution Registry Run Keys / Startup Folder
Privilege Escalation T1068 Exploitation for Privilege Escalation -
Stealth T1027.002 Obfuscated Files or Information Software Packing
T1027.009 Embedded Payloads
T1620 Reflective Code Loading -
Credential Access T1555.003 Credentials from Password Stores Credentials from Web Browsers
T1528 Steal Application Access Token -
Discovery T1082 System Information Discovery -
T1083 File and Directory Discovery -
Collection T1119 Automated Collection -
Exfiltration T1041 Exfiltration Over C2 Channel -
T1567.002 Exfiltration Over Web Service Exfiltration to Cloud Storage

 

MBC MAPPING:

Objective Behaviour ID Behaviour
Anti-Behavioral Analysis B0001 Debugger Detection
B0002 Debugger Evasion
B0006 Memory Dump Evasion
B0025 Conditional Execution
Anti-Static Analysis B0012 Disassembler Evasion
B0032 Executable Code Obfuscation
E1027 Obfuscated Files or Information
Collection E1056 Input Capture
B0028 Cryptocurrency
Command and Control B0030 C2 Communication
Credential Access F0002 Keylogging
Defense Evasion F0001 Software Packing
E1055 Process Injection
B0040 Covert Location
Impact B0018 Resource Hijacking
Lateral Movement E1105 Ingress Tool Transfer

 

REFERENCES:

The following reports contain further technical details:

https://www.infosecurity-magazine.com/news/gremlin-stealer-evolves-into/
https://unit42.paloaltonetworks.com/gremlin-stealer-evolution/

[/emaillocker]
crossmenu