MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 62fc948da0711a87f65ef112d0b33ddb9ff31b48cd295afd52670e681c2aa544. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



StrelaStealer


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 62fc948da0711a87f65ef112d0b33ddb9ff31b48cd295afd52670e681c2aa544
SHA3-384 hash: 12aa0af033651c15171a02305f1a51cc1c9e92aabc61bce57942736986352a374a8b74e7b6e202b5e665ff6fa9f0fd67
SHA1 hash: 0e8ee9c5b096e0c2e2bf1ceb817509665ae1db0f
MD5 hash: 1c169c16440667cdeb58900483862a00
humanhash: snake-solar-london-mars
File name:VRE18677.zip
Download: download sample
Signature StrelaStealer
File size:1'531 bytes
First seen:2024-07-09 06:05:31 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 24:9hjF/f2fNChYKi8B/ST+yI5BFotgaYUylfhLYDIy29Oid56qwKHzSnLncM20QDPM:9hjF/f2fGZs+yI5botGUy1hE0y8OiT6T
TLSH T1C93129005BECA186E1E7D3F427F30892006EF6BC9261D38ADB5FC2B3A8B41A70094489
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter cocaman
Tags:StrelaStealer zip


Avatar
cocaman
Malicious email (T1566.001)
From: "Sabrina Oberkirch-Kaisen <no-reply@notarius.app>" (likely spoofed)
Received: "from notarius.app (unknown [197.219.254.145]) "
Date: "Tue, 09 Jul 2024 03:03:44 +0000"
Subject: "Hahn Schornsteintechnik GmbH - Rechnung vom 24.06.2024"
Attachment: "VRE18677.zip"

Intelligence


File Origin
# of uploads :
1
# of downloads :
81
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:2727240823238218669.js
File size:5'910 bytes
SHA256 hash: 6547ae56e683d062433e3083d802a4504fb9e592894a6e2d75e4e4947a4efdd8
MD5 hash: f95dec38745edcbb9c3d22555d77c94a
MIME type:text/plain
Signature StrelaStealer
Vendor Threat Intelligence
Verdict:
Malicious
Score:
96.5%
Tags:
Execution Infostealer Network Stealth
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
lolbin net regsvr32
Threat name:
Script-JS.Trojan.AgentSetter
Status:
Malicious
First seen:
2024-07-09 06:05:33 UTC
File Type:
Binary (Archive)
Extracted files:
1
AV detection:
13 of 38 (34.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
execution
Behaviour
Runs net.exe
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
Checks computer location settings
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

StrelaStealer

zip 62fc948da0711a87f65ef112d0b33ddb9ff31b48cd295afd52670e681c2aa544

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments