MyDFIR Profile picture
Feb 17 18 tweets 6 min read Read on X
Thought DJI Wanted to Work With Me… Turns Out, Someone Wanted to Hack Me Instead.

Woke up to an email that had me grinning...a DJI collaboration request. I'm in the middle of planning an Asia trip, so this was a chance to get my hands on some gear from DJI...or so I thought.

Something wasn’t right.

🧵Thread 👇
The email felt...off. Too generic. No personal details, just the usual "We love your content and want to collaborate!" kind of fluff. Then I looked at the sender's domain: djipartner[.]live. That didn’t feel official.

WARNING: The site is still live, I am not responsible for your actions! :)Image
I decided to perform a quick WHOIS lookup and found that this domain was registered 29 days ago...Boo! Definitely leaning towards a scam. I was looking forward to try out some gear from @DJIGlobal ...unless👀👀 👉👈

But hey, since I was already here, might as well have a little fun with it.Image
I checked out their website and one thing stood out—it specifically mentioned "For YouTube Partners". Okay, so this campaign is likely targeting YouTube Creators. Image
Once the page loaded, I went and clicked on “I am a Partner” and was immediately directed to a download page. Image
The site encourages its "partners" to download the materials, and upon clicking "Download Materials", I was immediately met with a list of instructions. Image
Great instructions don't you think? Image
The download was an archive (RAR) file, and when I tried to open it... password required. Image
At this point, I could’ve walked away, but nah, I wanted to see if I could get the password to access whatever content was in that archive. So I did what any rational person would do... and replied to the email. Heh. Image
Six hours later, my new "business partners" got back to me. Their reply was quite long, but buried in the email was the password!!

I got access to the contents and immediately my attention shifted towards a file with an extension of ".scr" commonly associated with screensavers, but one detail stood out: it was 88MB in size, far larger than a legitimate screensaver file.Image
I extracted the "Advertising" file and generated a SHA256 file hash then searched for it on VirusTotal. Eight vendors flagged it as malicious, labelling this file as a loader. In other words, this file is responsible to deliver additional malware. Image
Looking at its history, the file wasn’t new, it was first seen back in 2019. Image
Analysis showed that it contacts the IP 185[.]147[.]125[.]81 on port 5000. Image
It also dropped two DLL files, both communicating with the same IP and port. Image
Reviewing the behavior logs, I noted another IP: 45[.]150[.]32[.]106. Image
Searching this IP on VirusTotal showed that nine vendors had flagged it as malicious and a community comment labeling it as Rhadamanthys Stealer.

Taken from Malpedia: "According to PCrisk, Rhadamanthys is a stealer-type malware, and as its name implies - it is designed to extract data from infected machines."

That was fun!Image
SHA256 Hashes:

Archive (RAR): 8313137D25C59CBF3BFFCAD734E2F3C48678C3139896BA3BAEB188EE407EA729

Advertising ("Screensaver"): 7109cbe03a69b2ac149ebefd5f2ea2da077a660f76828dc25bf2ef93af1cf336

DLL 1: 88a2a2b3824fd8e60bf05d6979027a5e25aaecf28ba564f8c299f83cce11b06e

DLL 2: bb139ee137c034662df291847eb0e27dda56a26409a0285d2ec7642ef065ff7d
Key takeaways!

Take a second and always try to verify collaboration requests and sponsorships. Be cautious of newly registered domains, generic messaging, and password-protected downloads.

These tactics are designed to lure creators into running malicious files.

Pause, analyze, and verify before engaging.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with MyDFIR

MyDFIR Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @MyDFIR

Nov 9, 2024
🎉Students aspiring to become SOC Analysts, listen up! 🎉

Are you looking for training or certs while saving $$? Here are 10 resources with student discounts on training, labs, and certs to help you build your skills to put your closer to becoming a SOC analyst! 🧵👇
1️⃣ TryHackMe: The SOC Analyst path will help with your analytical & investigative skills. Students get 20% off! 🚨 help.tryhackme.com/en/articles/64…
2️⃣ CyberDefenders: Training platform that is tailored for SOC analysts! Test out your skills by tackling practical labs or try your hands on their certification. Offers a 20% student discount.

help.cyberdefenders.org/en/articles/86…
Read 12 tweets
Jul 11, 2024
🚨 Aspiring SOC Analysts! Want hands-on experience?

Below are 10 sites to level up your skills in investigations, detections, and tooling.

#CyberSecurity #SOCAnalyst

👇
1. Cyber Defenders - @CyberDefenders

Site:

CyberDefenders offers a variety of labs including network forensics, endpoint, malware reverse engineering, and threat intelligence.cyberdefenders.org
2. Blue Team Labs Online - @SecBlueTeam

Site:

Choose from investigations (browser-based VM) or challenges (downloadable artifacts). Great for all skill levels.blueteamlabs.online
Read 12 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(