Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: GrimResource Malware Hits Chinese Government and Business Computers
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: GrimResource Malware Hits Chinese Government and Business Computers
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » GrimResource Malware Hits Chinese Government and Business Computers

Security

GrimResource Malware Hits Chinese Government and Business Computers

Newly discovered GrimResource malware has been targeting Chinese government and business computers by disguising itself as a Chrome download site,

Marco Rizal
Last updated: August 21, 2024 9:57 am
By Marco Rizal - Editor, Journalist 3 Min Read
Share
GrimResource Malware Hits Chinese Government and Business Computers
SHARE

In June 2024, cybersecurity companies worldwide became aware of a new threat known as GrimResource.

The Qi'anxin Threat Intelligence Center and Falcon Operations Team promptly initiated an investigation into this matter.

In mid-July 2024, it was discovered that GrimResource had successfully targeted government and business computers in China.

These attacks were executed by cybercriminals who posed as the Chrome browser download site in order to deceive individuals into downloading their malicious software.

image 22
Fake Chrome browser download (Credits: Qi'anxin Threat Intelligence)

The GrimResource malware operates by exploiting a specific vulnerability known as XSS in select computer files.

The program utilizes a technique called DotNetToJScript to execute concealed code, enabling it to bypass security alerts and operate without the need for file installations.

This can be quite challenging to detect and put a stop to. According to experts, it is predicted that attackers will increasingly utilize this method in the future. They will send deceptive emails that appear harmless but are actually malicious.

How the Attack Works

The GrimResource attack can be easily explained. First, the attacker conceals their malicious code within a specific file format known as MSC.

They intentionally make the code difficult to read. Upon analysis by experts, it was discovered that the attacker employed a unique encryption method sourced from jsjiami.com.v7. This code retrieves a complex code from a designated website.

image 25
Malware execution chain (Credits: Qi'anxin Threat Intelligence Center)

Next, the updated code loads a program called TestAssembly.dll, which is encrypted. This program is specifically designed to download a variety of tools, such as Bandzip, Python components, a zip file (code.zip), and an application called autokey.

The attacker configures a task to execute autokey's white process (wd.exe), which subsequently launches another script (wd.ahk) located in the same directory.

The wd.ahk script uses Bandzip to effortlessly unzip the code.zip file, using the password “403team.” Once unzipped, the Python script (code.py) is executed.

This Python script functions as a downloader, retrieving additional malicious code from a remote server and injecting it into the computer's memory.

This malicious code, known as codemark downloader, establishes a connection to a control server in order to retrieve the encrypted payload.

After decoding, the final payload, referred to as codemark Rat, becomes active. This software has the ability to execute commands and control the infected computer from a remote location.

This program is capable of running a remote PowerShell script and utilizing a commercial remote control tool known as winos.


Qi'anxin continues to watch this threat closely and advises everyone to be careful with email links and downloads. In order to avoid these kind of attacks, always use official websites when downloading software.

More Stories

90% of Credit Card Leaks Are From Visa and Mastercard

One Less Scanner? Norton Antivirus Jumps on Avast’s Engine

New Cyberattack Targets Industrial Automation Sector with Malware

Blur Your Home on Google Maps to Avoid This Scary New Sextortion Scam

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Grayscale Dogecoin ETF Makes Historic NYSE Trading Debut

November 24, 2025

Breaking: FBI Probes Cardano Network Split After Malicious Transaction

November 24, 2025

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

You might also like

Nigerian Hackers Jailed for 5 Million Email Scam

Nigerian Hackers Jailed for $5 Million Email Scam

Credit Suisse

Credit Suisse Data Breach: Sensitive Information for Sale on Dark Web

Chinese Data Breach

Massive Chinese Data Leaked, From Loans, to Real Estate and More

Fortinet Got Hacked and the Hackers Name is the Icing on the Cake

Fortinet Got Hacked, and the Hacker’s Name is the Icing on the Cake

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?