Gremlin Stealer has evolved from a simple credential snatcher into a sophisticated malware strain that uses resource files to camouflage its operations. By blending malicious code into legitimate Windows resource files, it evades detection while employing advanced techniques like crypto clipping and session hijacking to compromise sensitive data. This Q&A explores the malware's updated tactics, explaining how it hides in plain sight and what defenders need to know to stay ahead.
1. What is Gremlin Stealer and what makes this variant unique?
Gremlin Stealer is a data-stealing malware that targets credentials, financial data, and session tokens. The latest variant, analyzed by Unit 42, stands out because it hides its malicious payload in Windows resource files. Resource files typically hold non-executable data like icons or dialog strings, making them an ideal camouflage. By embedding malicious code there, the stealer avoids triggering signature-based detection. It also combines crypto clipping—replacing cryptocurrency addresses in memory—and session hijacking to extend its impact beyond static credentials. This three-pronged approach (obfuscation, crypto clipping, session hijacking) allows the malware to quietly exfiltrate information while appearing benign.

2. How does Gremlin Stealer use resource files to hide in plain sight?
The malware stores its core logic inside resource sections of Portable Executable (PE) files. Windows resource files are commonly used for version info, menus, or icons—areas often ignored by antivirus scans. Gremlin Stealer encrypts its payload and places it in a custom resource type. At runtime, it loads this resource, decrypts the code in memory, and executes it. Because the malicious bytes aren't stored in the typical code or data sections, they fly under the radar of static analyzers. This technique is a form of hiding in plain sight: the file looks like a legitimate application, but its resource folder harbors the stealer's core. Developers can further obfuscate by using fake resource names like "MENU" or "DIALOG" to blend in with system files.
3. What is crypto clipping and how does Gremlin Stealer use it?
Crypto clipping is an attack where malware monitors the clipboard for cryptocurrency addresses. When a victim copies a wallet address, the stealer replaces it with an attacker-controlled address. Gremlin Stealer implements this by installing a clipboard listener that scans for patterns matching popular blockchain formats (e.g., Bitcoin or Ethereum addresses). Upon detection, it overwrites the clipboard with a lookalike address. This works unnoticed because users often paste without verifying every character. The attack extends to payment pages: the stealer can modify the destination address during form submission. Combining crypto clipping with its resource file camouflage makes Gremlin Stealer particularly dangerous for crypto traders and exchanges.
4. How does session hijacking operate in Gremlin Stealer?
Session hijacking allows Gremlin Stealer to impersonate victims without needing their passwords. It targets cookies, tokens, and session storage from browsers. Once inside a system, the malware extracts saved session information from files like Chrome's "Cookies" or Firefox's "logins.json". These tokens are then sent to a command-and-control server, which uses them to access the victim's online accounts directly. Because session tokens often remain valid for extended periods—even after password changes—this method bypasses multi-factor authentication. Gremlin Stealer complements this with keylogging to capture login credentials, creating a dual attack path. The resource-file hiding technique ensures the stealer remains active long enough to harvest tokens across multiple logging sessions.

5. What advanced obfuscation techniques does Gremlin Stealer employ?
Beyond resource-file hiding, Gremlin Stealer uses several obfuscation layers. It encrypts the main payload with algorithms like XOR or AES, with decryption keys hidden in registry entries or environment variables. It also employs control-flow flattening to scramble the execution order, making static analysis difficult. String obfuscation disguises API calls and file paths using substitution ciphers. Additionally, the stealer checks for sandbox environments (e.g., VirtualBox or debuggers) and delays execution to evade behavioral analysis. These techniques, combined with resource file embedding, create a multi-layered camouflage that challenges both signature and heuristic detection.
6. How can organizations defend against Gremlin Stealer's evolved tactics?
Defending against Gremlin Stealer requires a layered approach. Endpoint detection and response (EDR) tools should monitor unusual resource file loads and in-memory code execution. Restrict execution of files that load custom resources unless digitally signed. User education is critical: train staff to verify cryptocurrency addresses manually and avoid pasting unverified clipboard content. Deploy behavioral monitoring for processes that access browser session stores. For crypto clipping, use wallets with built-in address confirmation. Keep systems updated and enforce least-privilege policies to limit session token theft. Finally, regularly audit resource files in trusted applications, as Gremlin Stealer can inject into legitimate software during distribution.