<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Advanced WildFire — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/advanced-wildfire/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 10:02:31 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/advanced-wildfire/feed.xml" rel="self" type="application/rss+xml"/><item><title>Gremlin Stealer Evolves with Advanced Obfuscation and Session Hijacking</title><link>https://feed.craftedsignal.io/briefs/2026-05-gremlin-stealer-evolution/</link><pubDate>Fri, 15 May 2026 10:02:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gremlin-stealer-evolution/</guid><description>The Gremlin stealer malware has evolved with advanced obfuscation techniques, crypto clipping, and session hijacking capabilities to steal sensitive information from compromised systems.</description><content:encoded><![CDATA[<p>The Gremlin stealer malware has undergone significant evolution, incorporating advanced obfuscation and anti-analysis techniques. The latest variant conceals malicious payloads within embedded resources, employing XOR encoding and a complex commercial packing utility to evade detection. This version targets web browsers, system clipboards, and local storage to exfiltrate sensitive information such as payment card details, browser cookies, session tokens, cryptocurrency wallet data, FTP, and VPN credentials. A notable feature is the WebSocket-based session hijacking module that allows the malware to bypass modern cookie protections by directly requesting data from the running browser process. The malware also includes a crypto clipper functionality, which monitors the system clipboard for cryptocurrency wallet patterns and replaces the victim&rsquo;s address with the attacker’s wallet in real time.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker deploys a Gremlin stealer variant packed with a commercial packing utility.</li>
<li>The malware loads the main payload from a .NET resource section, which is XOR encoded to evade signature-based detection.</li>
<li>The malware decrypts strings at runtime using a custom decoder ring function <code>_003CModule_003E.c(int, int, int)</code> which reads encrypted strings from an embedded resource file.</li>
<li>The stealer targets web browsers to steal payment card details, browser cookies, and session tokens using a class, BrowserCredentialStealer.</li>
<li>It monitors the system clipboard for cryptocurrency wallet addresses and replaces the victim&rsquo;s address with the attacker&rsquo;s address in real time.</li>
<li>The malware uses a WebSocket-based session hijacking module to steal session data from running browser processes.</li>
<li>The stealer exfiltrates the stolen data, bundled into a ZIP archive named using the victim&rsquo;s public IP address, to the C2 server at hxxp[:]194.87.92[.]109/i.php.</li>
<li>The C2 server receives and stores the stolen data, potentially for sale or publication.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful Gremlin stealer infections can lead to significant financial losses due to the theft of payment card details and cryptocurrency wallet data. Stolen session tokens and credentials can provide attackers with unauthorized access to sensitive accounts, potentially leading to further compromise and data breaches. The exfiltration of FTP and VPN credentials can allow attackers to pivot to other systems within the victim&rsquo;s network. This malware represents a significant threat to individuals and organizations alike, potentially impacting thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Block the C2 IP address <code>194.87.92[.]109</code> at the firewall or DNS resolver to prevent data exfiltration.</li>
<li>Implement endpoint detection and response (EDR) solutions capable of detecting and blocking the execution of packed .NET executables similar to the one with SHA256 hash <code>2172dae9a5a695e00e0e4609e7db0207d8566d225f7e815fada246ae995c0f9b</code>.</li>
<li>Deploy the Sigma rule &ldquo;Detect Gremlin Stealer String Decoding Routine&rdquo; to identify the malware&rsquo;s string decryption function.</li>
<li>Enable Sysmon process creation logging to improve visibility into process execution and identify suspicious parent-child process relationships associated with the stealer.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>infostealer</category><category>credential-theft</category><category>session-hijacking</category><category>crypto-clipping</category><category>dotnet</category></item></channel></rss>