MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 62fc948da0711a87f65ef112d0b33ddb9ff31b48cd295afd52670e681c2aa544. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
StrelaStealer
Vendor detections: 10
| SHA256 hash: | 62fc948da0711a87f65ef112d0b33ddb9ff31b48cd295afd52670e681c2aa544 |
|---|---|
| SHA3-384 hash: | 12aa0af033651c15171a02305f1a51cc1c9e92aabc61bce57942736986352a374a8b74e7b6e202b5e665ff6fa9f0fd67 |
| SHA1 hash: | 0e8ee9c5b096e0c2e2bf1ceb817509665ae1db0f |
| MD5 hash: | 1c169c16440667cdeb58900483862a00 |
| humanhash: | snake-solar-london-mars |
| File name: | VRE18677.zip |
| Download: | download sample |
| Signature | StrelaStealer |
| File size: | 1'531 bytes |
| First seen: | 2024-07-09 06:05:31 UTC |
| Last seen: | Never |
| File type: | zip |
| MIME type: | application/zip |
| ssdeep | 24:9hjF/f2fNChYKi8B/ST+yI5BFotgaYUylfhLYDIy29Oid56qwKHzSnLncM20QDPM:9hjF/f2fGZs+yI5botGUy1hE0y8OiT6T |
| TLSH | T1C93129005BECA186E1E7D3F427F30892006EF6BC9261D38ADB5FC2B3A8B41A70094489 |
| TrID | 80.0% (.ZIP) ZIP compressed archive (4000/1) 20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1) |
| Reporter | |
| Tags: | StrelaStealer zip |
cocaman
Malicious email (T1566.001)From: "Sabrina Oberkirch-Kaisen <no-reply@notarius.app>" (likely spoofed)
Received: "from notarius.app (unknown [197.219.254.145]) "
Date: "Tue, 09 Jul 2024 03:03:44 +0000"
Subject: "Hahn Schornsteintechnik GmbH - Rechnung vom 24.06.2024"
Attachment: "VRE18677.zip"
Intelligence
File Origin
# of uploads :
1
# of downloads :
81
Origin country :
CHFile Archive Information
This file archive contains 1 file(s), sorted by their relevance:
| File name: | 2727240823238218669.js |
|---|---|
| File size: | 5'910 bytes |
| SHA256 hash: | 6547ae56e683d062433e3083d802a4504fb9e592894a6e2d75e4e4947a4efdd8 |
| MD5 hash: | f95dec38745edcbb9c3d22555d77c94a |
| MIME type: | text/plain |
| Signature | StrelaStealer |
Vendor Threat Intelligence
Detection(s):
Verdict:
Malicious
Score:
96.5%
Link:
Tags:
Execution Infostealer Network Stealth
Result
Verdict:
Malicious
File Type:
JS File
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
lolbin net regsvr32
Verdict:
Malicious
Labled as:
HEUR/Suspar.Generic
Result
Verdict:
MALICIOUS
Link:
Score:
100%
Verdict:
Malware
File Type:
ARCHIVE
Threat name:
Script-JS.Trojan.AgentSetter
Status:
Malicious
First seen:
2024-07-09 06:05:33 UTC
File Type:
Binary (Archive)
Extracted files:
1
AV detection:
13 of 38 (34.21%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
7/10
Tags:
execution
Behaviour
Runs net.exe
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
Checks computer location settings
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.57
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
StrelaStealer
zip 62fc948da0711a87f65ef112d0b33ddb9ff31b48cd295afd52670e681c2aa544
(this sample)
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.