CyberSecurityNews

CharlieKirk Grabber Stealer Attacking Windows Systems to Exfiltrate Login Credentials


A new Python-based infostealer called CharlieKirk Grabber has been identified targeting Windows systems, with a focused goal of stealing stored login credentials, browser cookies, and session data.

The malware is built to work as a “smash-and-grab” threat — it launches quickly, collects whatever sensitive data it can find, and disappears before the user notices anything unusual.

The malware arrives as a Windows executable, packaged through a tool called PyInstaller, which bundles all its Python code into a single self-contained file that runs without requiring Python to be installed on the target machine.

It borrows its name and political imagery from Turning Point USA to exploit social engineering. The malware is typically delivered through phishing emails, cracked software packages, game cheat downloads, or social media-based lures.

Cyfirma researchers identified the malware and noted that it uses a builder-style structure, which makes it modular.

This means that whoever operates it can freely configure the command-and-control (C2) settings — such as a Discord webhook or a Telegram bot — and switch specific collection modules on or off before deploying the final executable.

google

Once active on a system, CharlieKirk Grabber profiles the host by collecting the username, hostname, hardware UUID, and the external IP address.

It forcibly kills running browser processes using the Windows TASKKILL tool, unlocking access to saved password databases.

The stolen data — covering passwords, cookies, autofill entries, browsing history, and Wi-Fi credentials — is then bundled into a ZIP archive and uploaded to the GoFile file-hosting platform.

CharlieKirk Grabber Stealer (Source - Cyfirma)
CharlieKirk Grabber Stealer (Source – Cyfirma)

A download link is immediately sent to the attacker over HTTPS through either a Discord webhook or a Telegram bot, keeping all communications encrypted.

Living Off the Land: How CharlieKirk Stays Hidden

What makes this stealer particularly difficult to detect is its heavy use of legitimate Windows tools that are already part of every installation.

Instead of deploying suspicious third-party files, the malware uses NETSH.EXE to retrieve saved Wi-Fi passwords, SYSTEMINFO.EXE to map hardware and OS details, and PowerShell to silently add itself to Microsoft Defender’s exclusion list.

UAC elevation attempt (Source - Cyfirma)
UAC elevation attempt (Source – Cyfirma)

This method, known as “living off the land,” lets malicious actions blend in with normal administrative behavior, helping it avoid signature-based detection.

Discord Token Theft and Account Validation (Source - Cyfirma)
Discord Token Theft and Account Validation (Source – Cyfirma)

Organizations should enforce Multi-Factor Authentication across all critical services and restrict browser-based password storage through enterprise policy.

Security teams should monitor for unusual browser process termination events, outbound HTTPS traffic to Discord, Telegram, or GoFile, and any PowerShell activity in user-writable directories.

Credential and File Extraction Activity (Source - Cyfirma)
Credential and File Extraction Activity (Source – Cyfirma)

Execution from temporary paths such as %TEMP% and %APPDATA% should be blocked using AppLocker or Windows Defender Application Control (WDAC).

Indicators of Compromise (IOC):-

Indicator TypeValue
File NameCharlieKirk.exe
File Size19.58 MB
File TypeExecutable (PE32)
MD5598adf7491ff46f6b88d83841609b5cc
SHA-256f56afcdfd07386ecc127aa237c1a045332e4cc5822a9bcc77994d8882f074dd1
First Seen in WildFebruary 2026
C2 ChannelDiscord Webhook / Telegram Bot API
Exfiltration Platformgofile.io

MITRE ATT&CK Mapping:-

TacticTechnique IDTechnique
DiscoveryT1082System Information Discovery
DiscoveryT1033System Owner/User Discovery
Credential AccessT1555.003Credentials from Password Stores (Web Browsers)
Credential AccessT1552.001Unsecured Credentials: Credentials in Files
CollectionT1560Archive Collected Data
Defense EvasionT1202Indirect Command Execution (LOLBins)
Defense EvasionT1562.001Impair Defenses: Disable or Modify Security Tools
PersistenceT1053.005Scheduled Task/Job: Scheduled Task
Privilege Escalation (Conditional)T1548.002Abuse Elevation Control Mechanism (UAC)
ExfiltrationT1041Exfiltration Over C2 Channel
ExfiltrationT1567.002Exfiltration to Cloud Storage

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

googlenews



Source link