Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: GrimResource Malware Hits Chinese Government and Business Computers
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: GrimResource Malware Hits Chinese Government and Business Computers
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » GrimResource Malware Hits Chinese Government and Business Computers

Security

GrimResource Malware Hits Chinese Government and Business Computers

Newly discovered GrimResource malware has been targeting Chinese government and business computers by disguising itself as a Chrome download site,

Marco Rizal
Last updated: August 21, 2024 9:57 am
By Marco Rizal - Editor, Journalist 3 Min Read
Share
GrimResource Malware Hits Chinese Government and Business Computers
SHARE

In June 2024, cybersecurity companies worldwide became aware of a new threat known as GrimResource.

The Qi'anxin Threat Intelligence Center and Falcon Operations Team promptly initiated an investigation into this matter.

In mid-July 2024, it was discovered that GrimResource had successfully targeted government and business computers in China.

These attacks were executed by cybercriminals who posed as the Chrome browser download site in order to deceive individuals into downloading their malicious software.

image 22
Fake Chrome browser download (Credits: Qi'anxin Threat Intelligence)

The GrimResource malware operates by exploiting a specific vulnerability known as XSS in select computer files.

The program utilizes a technique called DotNetToJScript to execute concealed code, enabling it to bypass security alerts and operate without the need for file installations.

This can be quite challenging to detect and put a stop to. According to experts, it is predicted that attackers will increasingly utilize this method in the future. They will send deceptive emails that appear harmless but are actually malicious.

How the Attack Works

The GrimResource attack can be easily explained. First, the attacker conceals their malicious code within a specific file format known as MSC.

They intentionally make the code difficult to read. Upon analysis by experts, it was discovered that the attacker employed a unique encryption method sourced from jsjiami.com.v7. This code retrieves a complex code from a designated website.

image 25
Malware execution chain (Credits: Qi'anxin Threat Intelligence Center)

Next, the updated code loads a program called TestAssembly.dll, which is encrypted. This program is specifically designed to download a variety of tools, such as Bandzip, Python components, a zip file (code.zip), and an application called autokey.

The attacker configures a task to execute autokey's white process (wd.exe), which subsequently launches another script (wd.ahk) located in the same directory.

The wd.ahk script uses Bandzip to effortlessly unzip the code.zip file, using the password “403team.” Once unzipped, the Python script (code.py) is executed.

This Python script functions as a downloader, retrieving additional malicious code from a remote server and injecting it into the computer's memory.

This malicious code, known as codemark downloader, establishes a connection to a control server in order to retrieve the encrypted payload.

After decoding, the final payload, referred to as codemark Rat, becomes active. This software has the ability to execute commands and control the infected computer from a remote location.

This program is capable of running a remote PowerShell script and utilizing a commercial remote control tool known as winos.


Qi'anxin continues to watch this threat closely and advises everyone to be careful with email links and downloads. In order to avoid these kind of attacks, always use official websites when downloading software.

More Stories

Congress Finally Decides to Kick China’s Hackers Off The Lawn

US Government Bans Kaspersky Antivirus Over Security Concerns; Company Denies Allegations

Hacker Leaks 3.3 Billion Emails and Yes Every Single One Is Unique

Casio Suspends Repair Services After Major Cyberattack Disrupts Systems

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

ClassLink

Zero-Day Vulnerability Discovered in Windows ClassLink Agent

VidarStealer Promoted Via YouTube

Fake IT Support Website Spreads VidarStealer Malware via YouTube

Your Favorite Apps May Be Leaking Your Personal Data Research Warns

Your Favorite Apps May Be Leaking Your Personal Data, Research Warns

Chrome Exploited by Hackers Using a Fake Crypto Game

Chrome Exploited by Hackers Using a Fake Crypto Game

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?