SYMBOLCOMMON_NAMEaka. SYNONYMS
win.boryptgrab (Back to overview)

BoryptGrab


According to Trend Micro, BoryptGrab is a C/C++ Windows stealer that exfiltrates browser credentials (with Chrome App Bound Encryption bypass), desktop and extension-based cryptocurrency wallets, Telegram data, Discord tokens, system information, screenshots, and selected files from common directories. It is delivered via SEO‑poisoned, fake GitHub repositories and multi‑stage loaders (DLL sideloading, VBS/.NET launchers, and a Golang downloader "HeaconLoad") that fetch it and related payloads from attacker servers (notably over HTTP on port 5466). BoryptGrab supports multiple "builds" (tracked via build names like CryptoByte, Shrek, Sonic, etc.), implements anti‑VM/anti‑analysis checks, and can download extra components such as obfuscated Vidar stealer variants and the TunnesshClient backdoor.

References
2026-03-05Trend MicroMingyue Shirley Yang
New BoryptGrab Stealer Targets Windows Users via Deceptive GitHub Pages
BoryptGrab

There is no Yara-Signature yet.