Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Kepavll
This threat is a high-confidence detection of Trojan:Win32/Kepavll!rfn, an information-stealing malware strongly associated with the Redline Stealer family. The trojan is designed to steal sensitive data such as browser credentials, system information, and cryptocurrency wallets. It uses multiple native Windows tools (LOLBins) like rundll32, PowerShell, and Scheduled Tasks to execute its payload and establish persistence on the compromised system.
Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
e14e998a41b779eac31f6ccdcf5de297a079d67fdc55e790587400e25351ca15b0fa29feb4da48f088d9e383d10ad8aef023efa91f6501142bb1f20749fd23d2e9a69ea6f50295ae2d2b4bce02f1658caa5476733c8e6a57eead01bda1e8c0c5a44c7b06921b509c073e1598fff2a3a257123a9d825de028e7fcdeeab7f6f32730af885b190aa854e6bd1f5bf7ca51d2dc814221e7cf8fffe68c8db0004513d9Isolate the affected machine from the network immediately to prevent data exfiltration. Run a full antivirus scan to remove the threat and any dropped components. Since this is an information stealer, reset all user passwords (email, banking, etc.) that may have been stored on the machine. Investigate for persistence mechanisms (e.g., new scheduled tasks) and block the associated command-and-control IP address (194.38.20.224).