Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: GrimResource Malware Hits Chinese Government and Business Computers
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: GrimResource Malware Hits Chinese Government and Business Computers
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » GrimResource Malware Hits Chinese Government and Business Computers

Security

GrimResource Malware Hits Chinese Government and Business Computers

Newly discovered GrimResource malware has been targeting Chinese government and business computers by disguising itself as a Chrome download site,

Marco Rizal
Last updated: August 21, 2024 9:57 am
By Marco Rizal - Editor, Journalist 3 Min Read
Share
GrimResource Malware Hits Chinese Government and Business Computers
SHARE

In June 2024, cybersecurity companies worldwide became aware of a new threat known as GrimResource.

The Qi'anxin Threat Intelligence Center and Falcon Operations Team promptly initiated an investigation into this matter.

In mid-July 2024, it was discovered that GrimResource had successfully targeted government and business computers in China.

These attacks were executed by cybercriminals who posed as the Chrome browser download site in order to deceive individuals into downloading their malicious software.

image 22
Fake Chrome browser download (Credits: Qi'anxin Threat Intelligence)

The GrimResource malware operates by exploiting a specific vulnerability known as XSS in select computer files.

The program utilizes a technique called DotNetToJScript to execute concealed code, enabling it to bypass security alerts and operate without the need for file installations.

This can be quite challenging to detect and put a stop to. According to experts, it is predicted that attackers will increasingly utilize this method in the future. They will send deceptive emails that appear harmless but are actually malicious.

How the Attack Works

The GrimResource attack can be easily explained. First, the attacker conceals their malicious code within a specific file format known as MSC.

They intentionally make the code difficult to read. Upon analysis by experts, it was discovered that the attacker employed a unique encryption method sourced from jsjiami.com.v7. This code retrieves a complex code from a designated website.

image 25
Malware execution chain (Credits: Qi'anxin Threat Intelligence Center)

Next, the updated code loads a program called TestAssembly.dll, which is encrypted. This program is specifically designed to download a variety of tools, such as Bandzip, Python components, a zip file (code.zip), and an application called autokey.

The attacker configures a task to execute autokey's white process (wd.exe), which subsequently launches another script (wd.ahk) located in the same directory.

The wd.ahk script uses Bandzip to effortlessly unzip the code.zip file, using the password “403team.” Once unzipped, the Python script (code.py) is executed.

This Python script functions as a downloader, retrieving additional malicious code from a remote server and injecting it into the computer's memory.

This malicious code, known as codemark downloader, establishes a connection to a control server in order to retrieve the encrypted payload.

After decoding, the final payload, referred to as codemark Rat, becomes active. This software has the ability to execute commands and control the infected computer from a remote location.

This program is capable of running a remote PowerShell script and utilizing a commercial remote control tool known as winos.


Qi'anxin continues to watch this threat closely and advises everyone to be careful with email links and downloads. In order to avoid these kind of attacks, always use official websites when downloading software.

More Stories

This Nasty Malware Duo Is After Your Banking Apps

Chrome Exploited by Hackers Using a Fake Crypto Game

Nearly Half of US Doctors at Risk Following Alleged Data Leak

Tencent Denies Massive Data Leak of 1.4 Billion QQ Accounts

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Grayscale Dogecoin ETF Makes Historic NYSE Trading Debut

November 24, 2025

Breaking: FBI Probes Cardano Network Split After Malicious Transaction

November 24, 2025

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

You might also like

When The House Loses Gambling Industry Caught Off Guard By Hackers

When The House Loses; Gambling Industry Caught Off Guard By Hackers

5.6 billion IoT devices Could Be Hacked In Five Years

5.6 billion IoT devices Could Be Hacked In Five Years

Massive Ransomware Campaign Hits Over 110000 Domains via Exposed ENV Files

Massive Ransomware Campaign Hits Over 110,000 Domains via Exposed ENV Files

Smishing Scams Rise As Election Day Approaches

Smishing Scams Rise As Election Day Approaches

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?