MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4ba27a9d19e6717ba3049c8a99a1127a431c5639121cff564f35711bea613745. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



StrelaStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 4 File information Comments

SHA256 hash: 4ba27a9d19e6717ba3049c8a99a1127a431c5639121cff564f35711bea613745
SHA3-384 hash: fa5d4860d81cc74fe1bb5f990ffdce15af137b24ebb186643742479f2ca36e73042cfb2ccfd0e47f85445d0db8ff6d7c
SHA1 hash: 845e3aa5bf52c5eef683d98fb68f00fd6bb0f5c0
MD5 hash: c4e6239cad71853ac5330ab665187d9f
humanhash: xray-triple-nebraska-utah
File name:SecuriteInfo.com.FileRepMalware.23820.12149
Download: download sample
Signature StrelaStealer
File size:18'432 bytes
First seen:2025-03-07 19:32:55 UTC
Last seen:2025-03-08 15:02:08 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'454 x Formbook, 12'202 x SnakeKeylogger)
ssdeep 384:LFZkl2oFQpoM+li7fuGtcHNdZfvft5fzbDd1O+kE:LFcFQpuoyNH
TLSH T13782E752E7988766E47B3AF081620110273B6E715A23CB4425307E4F3E75B63CCA776E
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
dhash icon 9633239323076171 (1 x Formbook, 1 x StrelaStealer)
Reporter SecuriteInfoCom
Tags:exe StrelaStealer

Intelligence


File Origin
# of uploads :
3
# of downloads :
350
Origin country :
FR FR
Vendor Threat Intelligence
Verdict:
Malicious
Score:
96.5%
Tags:
obfuscate xtreme virus
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process with a hidden window
DNS request
Connection attempt
Sending an HTTP GET request
Creating a file in the %AppData% directory
Creating a process from a recently created file
Creating a file
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Unauthorized injection to a recently created process
Using obfuscated Powershell scripts
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Strela Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Antivirus detection for dropped file
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Drops large PE files
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Potential PowerShell Command Line Obfuscation
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Generic Stealer
Yara detected Strela Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1632299 Sample: SecuriteInfo.com.FileRepMal... Startdate: 07/03/2025 Architecture: WINDOWS Score: 100 69 verifycleansecurity.com 2->69 71 relay-01-static.com 2->71 73 3 other IPs or domains 2->73 93 Antivirus detection for URL or domain 2->93 95 Multi AV Scanner detection for submitted file 2->95 97 Yara detected Generic Stealer 2->97 99 5 other signatures 2->99 10 SecuriteInfo.com.FileRepMalware.23820.12149.exe 15 7 2->10         started        15 license.exe 2->15         started        17 svchost.exe 1 1 2->17         started        19 hosts.exe 2->19         started        signatures3 process4 dnsIp5 89 verifycleansecurity.com 185.170.144.38, 49714, 80 VDWELLEREE unknown 10->89 59 C:\Users\user\AppData\Roaming\a.exe, PE32 10->59 dropped 61 SecuriteInfo.com.F...23820.12149.exe.log, ASCII 10->61 dropped 113 Bypasses PowerShell execution policy 10->113 115 Reads the Security eventlog 10->115 117 Reads the System eventlog 10->117 21 a.exe 14 5 10->21         started        26 powershell.exe 23 10->26         started        119 Antivirus detection for dropped file 15->119 121 Injects a PE file into a foreign processes 15->121 28 license.exe 15->28         started        91 127.0.0.1 unknown unknown 17->91 file6 signatures7 process8 dnsIp9 83 poolfreshstep.com 185.170.144.39, 49749, 80 VDWELLEREE unknown 21->83 85 fallback-01-static.com 111.90.145.132, 49720, 49748, 7798 SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY Malaysia 21->85 57 C:\Users\user\AppData\Local\Tempbehaviorgraphelelx.exe, PE32 21->57 dropped 101 Antivirus detection for dropped file 21->101 103 Multi AV Scanner detection for dropped file 21->103 105 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 21->105 111 8 other signatures 21->111 30 Gelelx.exe 21->30         started        34 chrome.exe 21->34         started        37 chrome.exe 21->37 injected 39 chrome.exe 21->39 injected 107 Found many strings related to Crypto-Wallets (likely being stolen) 26->107 109 Loading BitLocker PowerShell Module 26->109 41 WmiPrvSE.exe 26->41         started        43 conhost.exe 26->43         started        file10 signatures11 process12 dnsIp13 65 C:\Users\user\AppData\Roaming\license.exe, PE32 30->65 dropped 67 C:\Users\user\AppData\Local\Temp\Vhbyv.exe, PE32+ 30->67 dropped 131 Antivirus detection for dropped file 30->131 133 Multi AV Scanner detection for dropped file 30->133 135 Creates multiple autostart registry keys 30->135 137 2 other signatures 30->137 45 Vhbyv.exe 30->45         started        49 Gelelx.exe 30->49         started        75 192.168.2.4, 443, 49709, 49714 unknown unknown 34->75 51 chrome.exe 34->51         started        file14 signatures15 process16 dnsIp17 63 C:\Users\user\AppData\Roaming\hosts.exe, PE32+ 45->63 dropped 123 Antivirus detection for dropped file 45->123 125 Multi AV Scanner detection for dropped file 45->125 127 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 45->127 129 4 other signatures 45->129 54 Vhbyv.exe 45->54         started        77 plus.l.google.com 142.250.185.110, 443, 49745 GOOGLEUS United States 51->77 79 www.google.com 142.250.186.132, 443, 49725, 49727 GOOGLEUS United States 51->79 81 4 other IPs or domains 51->81 file18 signatures19 process20 dnsIp21 87 relay-01-static.com 196.251.69.16 Web4AfricaZA Seychelles 54->87
Threat name:
Win32.Exploit.Generic
Status:
Malicious
First seen:
2025-03-07 18:00:22 UTC
File Type:
PE (.Net Exe)
Extracted files:
5
AV detection:
7 of 24 (29.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
collection discovery execution persistence spyware stealer
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Browser Information Discovery
Command and Scripting Interpreter: PowerShell
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Reads WinSCP keys stored on the system
Reads user/profile data of web browsers
Downloads MZ/PE file
Unpacked files
SH256 hash:
4ba27a9d19e6717ba3049c8a99a1127a431c5639121cff564f35711bea613745
MD5 hash:
c4e6239cad71853ac5330ab665187d9f
SHA1 hash:
845e3aa5bf52c5eef683d98fb68f00fd6bb0f5c0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_powershell
Author:daniyyell
Description:Detects suspicious PowerShell activity related to malware execution
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

StrelaStealer

Executable exe 4ba27a9d19e6717ba3049c8a99a1127a431c5639121cff564f35711bea613745

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments