Firewall integrations

Fortinet

Elevate the power of your Fortinet Fortigate Firewall using by adding our Intelligence.

Palo Alto

Palo Alto Firewalls can be hardened with our threat intelligence as well.

Sophos XGS

Enhance the Sophos XGS Firewall with our threat intelligence.

OPNsense

Enhance your OPNsense Firewall with our threat intelligence using the native plugin.

SIEM integrations

Splunk

Splunk is a great platform, but without the right Threat Intelligence it's just a log server. Try our threat intelligence today. 

Microsoft Sentinel

One of the most used SIEM solutions should be enriched with the right Intelligence. At Q-Feeds you're at the right place!

Other

Luckily there are many other SIEM vendors whom support 3rd party threat intelligence.

Threat Intelligence Portal

Darkweb Monitoring

Darkweb monitoring is one of our services, not only for threat intelligence but also for you most important assets.

Threat Lookup

With Threat Lookup you get full insights in our IOC database, including full MITRE ATT&K mapping.

External Attack Surface Management

A toolset to check your external facing assets exposed on the internet

Vulnerability Scanner

A comprehensive vulnerability scanner which can scan your infrastructure and web applications

Brand Protection

Protect your brand for look-a-likes and potential phishing attempts

Services

TAXII Feeds & Server Software

TAXII/STIX2.1 standard. Both in form of feeds and server software available

Implementation

Need help with implementations? No worries, we have a strong network of partners who are able to help you.

Solutions

Enrich my SIEM

Elevate the power of your SIEM solution using by adding our Intelligence.

Enrich my Firewall

Firewalls can be hardened with our threat intelligence as well.

Prevent phishing

Enhance your protection against phishing

Achieve compliancy

Achieve compliancy by correlating the best threat intelligence to your logs

Futuristic eye design with circuits and geometric shapes.

Company

About

Read here all about Q-Feeds

News and Updates

Cybersecurity news and updates about us

Publications

All of our media coverage in one place

Become a reseller

Strengthen your portfolio with our comprehensive reseller program

Partner locator

Find our certified partners here

Contact

For all your questions or inquiries

Neural network representation of a human brain

Support

My Account

Access your account and manage your licenses

Downloads & Manuals

On this page you find white papers and manuals

Knowledge base

Our knowledge base full of implementation instructions

Start for free

Start your cyber security intelligence journey here

Abstract geometric wireframe human head

Unmasking Gremlin Stealer: Evolutionary tactics hiding in resource files

May 17, 2026 | Threat Intelligence Research

Evolving Threat Landscape: Gremlin Stealer Malware

TL;DR
The Gremlin stealer malware has adopted advanced obfuscation techniques and a new exfiltration site, posing a significant risk to sensitive data integrity. It targets various digital assets, employing innovative methods to bypass security defenses.

Main Analysis
Palo Alto Networks has reported on the recent evolution of Gremlin stealer malware, which now incorporates sophisticated obfuscation techniques to conceal its activities and evade detection mechanisms. This latest variant utilizes a commercial packing utility that employs instruction virtualization, transforming original code into a custom bytecode executed by a private virtual machine. This complexity not only complicates analysis but also enhances the malware’s evasion capabilities against static analysis tools.

A central feature of the updated Gremlin variant is its ability to exfiltrate a wide range of sensitive data, including payment card information, session tokens, and cryptocurrency wallet details. It employs a newly identified site for data upload, located at hxxp://194.87.92.109, which was undetected in VirusTotal at the time of discovery. This stealth approach enables the malware to siphon critical information without immediate detection, allowing attackers to control the stolen data for potential monetization.

The obfuscation techniques used by Gremlin have evolved from previous versions, which lacked such sophistication. The malware now stores its payload within the .NET resource section, masking it with XOR encoding. This method significantly hinders detection by evading signature-based approaches and heuristic scanning, as illustrated in analytic diagrams showing how the resource section conceals critical information.

Defensive Context
Organizations should pay particular attention to the methods employed by Gremlin Stealer, especially those handling sensitive user data or financial information. Businesses operating in e-commerce or any sector involving online transactions may find themselves particularly at risk given the malware’s capabilities for credential stealing and real-time financial fraud. Conversely, environments with minimal web interaction or those using robust security measures may not be as exposed.

Why This Matters
The evolution of Gremlin Stealer indicates a marked shift in threat actor behavior, emphasizing more sophisticated approaches to data theft and obfuscation. As attackers increasingly incorporate stealth techniques and expand the scope of their targets, firms must be vigilant in their monitoring efforts.

Defender Considerations
While specific mitigation steps are not outlined, understanding the malware’s techniques can guide defenders in enhancing their detection capabilities. Entities may consider scrutinizing network traffic for communications with identified C2 addresses and implementing comprehensive monitoring measures for sensitive data access, especially involving cryptocurrency transactions.

Indicators of Compromise (IOCs)

  • IP Address: 194.87.92.109
  • SHA256 Hashes:
    • 2172dae9a5a695e00e0e4609e7db0207d8566d225f7e815fada246ae995c0f9b
    • 9aab30a3190301016c79f8a7f8edf45ec088ceecad39926cfcf3418145f3d614
    • Additional SHA256 hashes are provided in the article for further analysis.

Understanding the evolution of not just Gremlin, but similar threats can help in forming proactive defenses against future malware developments.

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles