

DFIR Radar
1.7K posts















Russian 🇷🇺-language humanitarian aid lures deliver sophisticated Python infostealer targeting aid workers. Multi-stage campaign uses GitHub infrastructure and PyArmor obfuscation to establish persistent surveillance platform with credential theft, remote access, and continuous monitoring capabilities. Technical Details: • Initial vector: LNK file (8a100cbdf79231e70cee2364ebd9a4433fda6b4de4929d705f26f7b68d6aeb79) in RAR archive with anti-sandbox evasion techniques • Payload hosted on GitHub Releases (hxxps://github[.]com/leravalera2/dtfls/releases) to abuse trusted infrastructure • Creates self-contained Python environment in %APPDATA%\WindowsHelper with PyArmor v9.2 Pro obfuscation • Full surveillance stack: browser credential theft (T1555.003), keylogging (T1056.001), clipboard monitoring (T1115), screenshots (T1113) • Silent RustDesk/AnyDesk deployment for persistent remote access (T1219) • Persistence via scheduled task "WindowsHelper" running every 5 minutes (T1053.005) C2 Infrastructure: • Primary server: 159[.]198[.]41[.]140 (Namecheap VPS, confirmed active May 2026) • Custom Flask dashboard for threat actor access to stolen data • Exfiltration via HTTP uploads with spoofed Chrome user-agent Monitor for unexpected Python environments in %APPDATA%, scheduled tasks with short intervals, and silent remote desktop tool installations by non-admin processes. #DFIR_Radar

