Cyber Security

StrelaStealer’s Malware Resurgence: What Security Leaders Need to Know in 2024

Stolen credentials are the most common way for hackers to access an organization, according to the 2023 DBIR report. As an analyst for CyOps, Cynet’s team of experts to monitor threat actor activities and protect Cynet clients, I’ve seen how cybercriminals pilfer usernames and passwords, then ruthlessly leverage those lifted logins to wreak havoc on target organizations.

The damage can be especially disastrous for small-to-medium enterprises (SMEs) that lack the big budgets and sprawling security teams to respond rapidly to a breach. Therefore, it is crucial for SME I.T. security leaders to ensure that their organizations are secure through affordable measures to reduce their exposure to compromise.

For a deeper technical dive into the mechanics and mitigations of credential stealing, plus hackers’ other favorite points of entry, I highly encourage you to watch Securing the Top 3 SME Attack Vectors.”

Now, in this piece, we’ll dissect a timely example of credential theft—StrelaStealer—to identify the malware’s characteristics and capabilities and the detections and preventions necessary to block it from affecting your organization. 

StrelaStealer’s New Tricks

A massive StrelaStealer campaign recently rocked hundreds of US- and EU-based companies. StrelaStealer, as its name suggests, is a stealer. Its goal is to swipe email login credentials from victim machines, focusing primarily on Thunderbird and Outlook email accounts.

When StrelaStealer was first observed in early November 2022, it was distributed as an ISO file that contained a .LNK file which either side-loaded the stealer’s DLL payload or, through a more sophisticated method, executed the payload as a DLL/HTML polyglot. 

That distribution method has evolved. In this most recent campaign, we see StrelaStealer delivered via phishing emails in several languages, depending on what their target speaks.

Here, in this phishing email, we can see how users are lured into opening a zip file attachment purporting to enclose a PDF invoice:

The zip file actually contains a JavaScript file named “18262829011200.js”:

Now, by performing static and dynamic analyses, we can assess that file and understand its functionality and capabilities.

Static Analysis

First up, static analysis. StrelaStealer’s source code can be parsed for signs of potential security issues.

Reviewing the file in a text editor reveals several exciting commands:

  1. The following commands look like an obfuscated script, replacing characters with variable names:

De-obfuscating the code, we can see that it contains several commands using native Windows applications to create and ultimately run a DLL file named “returnready.dll”:

  1. Additional strings show more obfuscated code, using the same method of setting characters as variables:

Once decoded, we can see how wscript’s ‘shell’ method is used to execute cmd.exe and create the file “trousersperpetual.bat” in the %temp% directory:

  1. Finally, a very large base64 encoded string was observed in the file:

Decoding the string, we can see that it is a portable executable (PE) file:

Dynamic Analysis

Next, dynamic analysis. StrelaStealer can be run in a controlled environment to reveal its attack flow step-by-step.

Upon execution of the file “18262829011200.js” via wscript.exe, cmd.exe is used to create a copy of the .js file’s contents, which is then saved on the host as the file “C:\Users\*\AppData\Local\Temp\trousersperpetual.bat”:

Cmd.exe continues by running “findstr” on the file “C:\Users\*\AppData\Local\Temp\trousersperpetual.bat”, looking for all strings that do not contain the word “marrywise” and saving the result to the file “C:\Users\*\AppData\Local\Temp\magnificentdevelopment”.

This file ends up containing the large base64 string found in our static analysis:

Then certutil.exe is invoked to decode the newly created base64 encoded file “magnificentdevelopment” into the file “C:\Users\*\AppData\Local\Temp\returnready.dll”.

This is essentially StrelaStealer’s payload file:

The file “returnready.dll” is then executed via rundll32.exe, which proceeds to enumerate the host’s Outlook and Thunderbird email account data, before exfiltrating it to the threat actor’s command and control (C2) server. 

MITRE ATT&CK Tactics & Techniques

Initial AccessExecutionDefense Evasion CollectionCommand and ControlExfiltration
Phishing Command and Scripting InterpreterDeobfuscate/Decode Files or InformationEmail CollectionApplication Layer ProtocolAutomated Exfiltration
User ExecutionObfuscated Files or InformationExfiltration Over C2 Channel
System Binary Proxy Execution

How to detect StrelaStealer

With an understanding of StrelaStealer’s characteristics and capabilities, cybersecurithttps://go.cynet.com/top-3-sme-attack-vectors?utm_source=gbhackers&utm_medium=sponsored_article&utm_campaign=Q2-sponsored-webinarsy teams can ensure their protections are able to block the stealer from compromising their organization.

Because Cynet is easily able to detect and prevent StrelaStealer, we’ll configure the all-in-one cybersecurity solution in detection mode (without prevention) to allow StrelaStealer to execute its full flow. This simulated execution lets Cynet detect and log each step of the attack, while highlighting how StrelaStealer triggers two specific Cynet detections.

1. File Dumped on the Disk

Cynet’s AV/AI engine detects that malicious files have been dumped on the disk or are attempting to run:




Process Monitoring

Cynet’s Process Monitoring mechanism detects the use of Certutil.exe to decode the malicious DLL file:

For further guidance to safeguard your SME, don’t miss Securing the Top 3 SME Attack Vectors.” And make sure your team is empowered by an affordable, easy to use solution, such as Cynet’s all-in-one cybersecurity platform, which is purpose-built for small teams. After all, the future of your organization is too important to gamble.

Kaaviya

Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Recent Posts

New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands

ChaosBot surfaced in late September 2025 as a sophisticated Rust-based backdoor targeting enterprise networks. Initial…

13 hours ago

Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware

Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances…

13 hours ago

Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture

Menlo Park, USA, October 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud Native…

14 hours ago

175 Malicious npm Packages With 26,000 Downloads Attacking Technology, and Energy Companies Worldwide

Socket's Threat Research Team has uncovered a sophisticated phishing campaign involving 175 malicious npm packages…

14 hours ago

RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers

Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive…

15 hours ago

Microsoft Defender Incorrectly Flags SQL Server Software as End-of-life

Microsoft Defender for Endpoint is incorrectly flagging specific versions of SQL Server as having reached…

17 hours ago