Malware News CharlieKirk grabber stealer attacking Windows systems to exfiltrate creds

Khushal

Level 13
Thread author
Verified
Top Poster
Well-known
Apr 4, 2024
601
3,615
1,169

CharlieKirk Grabber is a Python-based Windows infostealer, designed for rapid credential harvesting and data exfiltration. The malware operates as a smash-and-grab threat, focusing on immediate data theft rather than persistence or long-term system control.

Executed under the logged-in user context (packaged via PyInstaller), the malware performs system reconnaissance and collects identifiers such as username, hostname, hardware UUID, environment details, proxy configuration, and external IP address.

To access browser databases, it forcibly terminates browser processes and leverages legitimate Windows command-line utilities (e.g., TASKKILL, NETSH, PowerShell, CMD) to blend malicious activity with normal system operations.

Collected data is staged in a temporary directory, compressed, uploaded to a third-party file hosting service, and the download link is transmitted to attacker-controlled infrastructure via Discord or Telegram over HTTPS.

No anti-analysis techniques were observed. The primary risk is large-scale credential compromise and session hijacking, with detection complicated by the malware’s use of legitimate tools and encrypted communications.

 
In cases like CharlieKirk, the best digital defense is to stick to sensible routines. It’s like at home: putting a double lock on the door (MFA), keeping the keys in a safe (password manager), and occasionally peeking outside to see who’s wandering around the neighborhood (account activity checks). With those habits, the fortress stays standing and you can sleep peacefully without the “dinnerware” vanishing at midnight. 🛡️🔑🍽️
 
  • Like
Reactions: Brownie2019
Technical Analysis & Remediation
The malware operates as a standalone executable compiled via PyInstaller, meaning the host does not require Python to be natively installed. Upon execution, it leverages threading to launch multiple concurrent data collection modules.

MITRE ATT&CK Mapping

T1082 (System Information Discovery)

Executes SYSTEMINFO.EXE and WHOAMI.EXE to fingerprint the host.

T1555.003 (Credentials from Password Stores) Targets SQLite databases in Chromium and Gecko-based browsers (extracting the master encryption key from the 'Local State' file to decrypt AES-GCM secured passwords).

T1202 (Indirect Command Execution)
Heavy reliance on LOLBins (Living-Off-the-Land Binaries) such as TASKKILL.EXE to unlock database files.

T1053.005 (Scheduled Task)
Uses schtasks /sc onlogon to establish persistence.

T1567.002 (Exfiltration to Cloud Storage) Archives stolen data and uploads it to GoFile, forwarding the download link via Discord Webhooks or Telegram Bot APIs.

CVE Profile
N/A + [CISA KEV Status: Inactive].
This threat relies on user-execution and operational abuse of native tools, not software vulnerability exploitation.

Telemetry

Hashes

MD5: "598adf7491ff46f6b88d83841609b5cc"

SHA256 "f56afcdfd07386ecc127aa237c1a045332e4cc5822a9bcc77994d8882f074dd1"

File Paths
Creates a staging directory at %LOCALAPPDATA%\Temp named "KIRK_administrator".

Registry/Processes
Executes Add-MpPreference -ExclusionPath via PowerShell to add Microsoft Defender exclusions if elevated privileges are obtained.

Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)

GOVERN (GV) – Crisis Management & Oversight

Command
Initiate incident response protocols for credential compromise and session hijacking; notify legal and compliance teams if exposed data included customer PII or proprietary source code.

DETECT (DE) – Monitoring & Analysis

Command
Hunt for Event ID 4688 (Process Creation) indicating TASKKILL.EXE targeting multiple browser processes in rapid succession.

Command
Monitor SIEM for abnormal volume of file access events within the %LOCALAPPDATA%\Temp directory followed by archive creation.

Command
Alert on outbound HTTPS connections to GoFile APIs and unsanctioned Discord Webhooks or Telegram Bot endpoints.

RESPOND (RS) – Mitigation & Containment

Command
Isolate the affected endpoint(s) from the corporate network immediately.

Command
Kill unauthorized Python or PowerShell interpreter processes and delete the "KIRK_administrator" staging directory.

RECOVER (RC) – Restoration & Trust

Command
Force immediate credential rotation and MFA token revocation for all identities associated with the compromised host (including VPN, Email, and Cloud environments).

Command
Validate the clean state by verifying the removal of malicious logon Scheduled Tasks.

IDENTIFY & PROTECT (ID/PR) – The Feedback Loop

Command
Implement Windows Defender Application Control (WDAC) or AppLocker to explicitly restrict the execution of unsigned binaries originating from %TEMP%, %APPDATA%, and %LOCALAPPDATA%.

Command
Enable Microsoft Defender Attack Surface Reduction (ASR) rules to block Office applications or unrecognized scripts from spawning child processes.

Remediation - THE HOME USER TRACK (Safety Focus)

Priority 1: Safety

Command
Disconnect from the internet immediately. (This severs the malware's ability to exfiltrate the generated ZIP archive to the attacker's cloud hosting).

Command
Do not log into banking/email until verified clean.

Priority 2: Identity

Command
Reset passwords/MFA using a known clean device (e.g., your smartphone connected to 5G cellular data). Ensure you specifically rotate credentials for Discord, Steam, Minecraft, and all accounts saved in your web browsers, as these are actively targeted by this payload.

Priority 3: Persistence

Command
Check Scheduled Tasks (taskschd.msc) for any abnormal tasks set to run at user logon.

Command
Verify Microsoft Defender exclusion lists (Settings > Privacy & Security > Windows Security > Virus & threat protection settings > Exclusions) and remove any unauthorized paths.

Hardening & References

Baseline

CIS Microsoft Windows 11 Benchmark (v3.0.0) - Focus on disabling unnecessary administrative utilities for standard users.

Framework
NIST CSF 2.0 / SP 800-61r3.

Style
Zero-Trust architecture implementation regarding locally stored session tokens. Limit browser password storage natively where password managers with hardware-backed encryption can be utilized.

Source

CYFIRMA Threat Intelligence Report
 
  • Like
Reactions: harlan4096