GBHackers

CharlieKirk Grabber Malware Targets Windows Systems to Steal Login Credentials


CharlieKirk Grabber is a Python-based Windows infostealer that focuses on rapid “smash‑and‑grab” credential theft and data exfiltration rather than long-term system control or destructive behavior.

It targets browser‑stored passwords, Wi‑Fi keys, Discord tokens, and gaming sessions, then exfiltrates the collected data via third‑party file hosting and encrypted Discord or Telegram channels.

File Name CharlieKirk.exe
File Size19.58 MB
File TypeExecutables
SignedNot Signed
MD5 Hash598adf7491ff46f6b88d83841609b5cc
SHA 256f56afcdfd07386ecc127aa237c1a045332e4cc5822a9bcc77994d8882f074dd1
First seen wildFeb 2026

Executed under the logged‑in user context, the binary immediately initializes environment variables, prepares a working directory, and launches multiple data collection threads to minimize execution time and user visibility.

This multithreaded model mirrors other modern Python stealers that emphasize speed and automation for large‑scale credential harvesting.

On startup, CharlieKirk Grabber profiles the host using native commands such as SYSTEMINFO and WHOAMI, capturing username, hostname, hardware UUID, OS details, and network configuration, and then queries an external IP information service to obtain the public IP, ISP, location, and time zone.

According to the report, the malware operates as a smash-and-grab threat, focusing on immediate data theft rather than persistence or long-term system control.

All profiling output is written into local files within a temporary directory, laying the groundwork for later consolidation and exfiltration.

CharlieKirk Grabber Malware

To access locked browser databases, the malware forcibly terminates active browser processes using TASKKILL and other Windows utilities, suppressing visible windows with CREATE_NO_WINDOW to remain unobtrusive.

The malware attempts to establish persistence by copying its executable to a specified directory and creating a scheduled task configured to execute at user logon. 

Persistent through Schedule Task Creation (Source : CYFIRMA).

It then enumerates multiple Chromium‑based browsers, extracts the master key from each Local State file, and uses AES‑GCM decryption to recover saved logins, cookies, autofill data, and history from SQLite databases such as Login Data, Cookies, Web Data, and History.

Firefox and other Gecko‑based browsers are targeted via NSS, where encrypted entries in logins.json are decrypted using PK11SDR_Decrypt to expose stored passwords and related data.

Beyond browser stores, CharlieKirk Grabber abuses NETSH to list Wi‑Fi profiles and parse the Key Content field in cleartext, enabling theft of wireless network passwords.

Process Termination for Data Access(Source : CYFIRMA).
Process Termination for Data Access(Source : CYFIRMA).

It hunts for Discord authentication tokens across standard storage paths, decrypts them using the same Chromium master key technique, and validates tokens against Discord APIs to extract account metadata such as username, email, phone, MFA status, and Nitro subscription details.

The malware also targets gaming ecosystems by collecting Minecraft session files and Steam session data, enabling account hijacking even without password reuse. Finally, it captures a desktop screenshot using Python imaging libraries and adds this to the staged data set.

Mitigations

All harvested artifacts are staged under a temporary directory (for example KIRK_administrator under %LOCALAPPDATA%Temp), then compressed into a single ZIP archive for efficient transfer.


File System Activity (Source : CYFIRMA).
File System Activity (Source : CYFIRMA).

The archive is uploaded to a file‑hosting service such as GoFile, which returns a public download link frequently abused by commodity stealers for log trafficking.

That link is then sent to attacker‑controlled infrastructure via Discord webhooks or Telegram bots over HTTPS, leveraging trusted platforms and encrypted channels to blend with legitimate traffic.

After successful exfiltration, the malware deletes the temporary directory and archive, reducing forensic artifacts and aligning with “collect‑and‑pack” patterns seen across infostealer families.

CharlieKirk Grabber uses several defense‑evasion techniques but no sophisticated anti‑analysis capabilities.

It attempts UAC elevation using IsUserAnAdmin(), and when running with administrative rights, it invokes PowerShell to add Microsoft Defender exclusions via Add‑MpPreference, reducing the chance of on‑access detection.

It also creates a scheduled task via schtasks /sc onlogon to maintain persistence when configured, though its primary design remains fast data theft rather than long‑term footholds.

Behaviorally, it relies heavily on LOLBins (TASKKILL, NETSH, SYSTEMINFO, CMD, POWERSHELL) for discovery and credential access, mapping to ATT&CK techniques such as T1082 System Information Discovery, T1555.003 Credentials from Web Browsers, T1560 Archive Collected Data, T1562.001 Impair Defenses, and T1567.002 Exfiltration to Cloud Storage.

Defenders should monitor for abnormal patterns of forced browser process termination followed by intensive access to browser SQLite files and rapid ZIP archive creation within %TEMP% or %LOCALAPPDATA%.

Network monitoring should focus on unusual HTTPS connections to Discord webhooks, Telegram Bot APIs, and file‑sharing services like GoFile, especially in environments where such services are not business critical.

Network Activity (Source : CYFIRMA).
Network Activity (Source : CYFIRMA).

Strategic controls include enforcing MFA, limiting browser password storage, blocking unsanctioned file‑hosting platforms, and adopting Zero Trust principles to reduce the blast radius of stolen credentials.

At the endpoint level, organizations should enable EDR detections for netsh wlan show profile key=clear, suspicious PowerShell execution modifying Defender preferences, and execution of unsigned binaries from user‑writable paths such as %TEMP%, %APPDATA%, and %LOCALAPPDATA%.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link