Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Kepavll
This threat is a high-confidence detection of Trojan:Win32/Kepavll!rfn, an information-stealing malware strongly associated with the Redline Stealer family. The trojan is designed to steal sensitive data such as browser credentials, system information, and cryptocurrency wallets. It uses multiple native Windows tools (LOLBins) like rundll32, PowerShell, and Scheduled Tasks to execute its payload and establish persistence on the compromised system.
Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
45f8d87956aab91534ae3748dc3edb9d5e3c041eae29ab345306b485b5140109bb5ef7c60e6687d4175130216c0ea72f1d83e211d79c9c9e08882643419ea6c5a8a6922004c4b8e81d27baedbedb0e5a6916f46ec0d5aa527e766691025b7ffe6a3368fb5ffab1283df539c6f17cb1244b563f5a3ad94d96adcde2dcadab66ae997a685645e23b7d857b05cb46e48831891bc196a601023071f5595a5b820186Isolate the affected machine from the network immediately to prevent data exfiltration. Run a full antivirus scan to remove the threat and any dropped components. Since this is an information stealer, reset all user passwords (email, banking, etc.) that may have been stored on the machine. Investigate for persistence mechanisms (e.g., new scheduled tasks) and block the associated command-and-control IP address (194.38.20.224).