← Back to SOC feed Coverage →

ThreatFox: StrelaStealer IOCs

ioc-hunt HIGH ThreatFox
DnsEvents
infostealeriocthreatfoxwin-strelastealer
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at ThreatFox →
Retrieved: 2026-04-24T09:00:00Z · Confidence: high

Hunt Hypothesis

The ThreatFox: StrelaStealer IOCs rule detects potential credential-stealing activity associated with the StrelaStealer malware, which exfiltrates sensitive user credentials and data. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate early-stage compromises before data exfiltration occurs.

IOC Summary

Malware Family: StrelaStealer Total IOCs: 19 IOC Types: domain

TypeValueThreat TypeFirst SeenConfidence
domaincasadasaguas.ufes.brpayload_delivery2026-04-24100%
domaincarritech.dfk-ms.infopayload_delivery2026-04-24100%
domaincarrascotransportesymas.compayload_delivery2026-04-24100%
domaincario.grpayload_delivery2026-04-24100%
domaincanhkinhvietnhatshome.compayload_delivery2026-04-24100%
domaincamscocare.co.ukpayload_delivery2026-04-24100%
domainbydrealestate.com.aupayload_delivery2026-04-24100%
domainbusiness.adalinki.compayload_delivery2026-04-24100%
domainbursaforum.netpayload_delivery2026-04-24100%
domainbsblink.com.brpayload_delivery2026-04-24100%
domainbosquedocerrado.com.brpayload_delivery2026-04-24100%
domainwww.wildnor.compayload_delivery2026-04-24100%
domainauto-shopping.l0gik.com.brpayload_delivery2026-04-24100%
domainatmconstruct.compayload_delivery2026-04-24100%
domainwww.jejaringsumsel.compayload_delivery2026-04-24100%
domainappraisal.gepayload_delivery2026-04-24100%
domainapp.esinfinitamentereciclable.compayload_delivery2026-04-24100%
domainapmotopart.compayload_delivery2026-04-24100%
domainapgmja.pkpayload_delivery2026-04-24100%

KQL: Domain Hunt

// Hunt for DNS queries to known malicious domains
// Source: ThreatFox - StrelaStealer
let malicious_domains = dynamic(["casadasaguas.ufes.br", "carritech.dfk-ms.info", "carrascotransportesymas.com", "cario.gr", "canhkinhvietnhatshome.com", "camscocare.co.uk", "bydrealestate.com.au", "business.adalinki.com", "bursaforum.net", "bsblink.com.br", "bosquedocerrado.com.br", "www.wildnor.com", "auto-shopping.l0gik.com.br", "atmconstruct.com", "www.jejaringsumsel.com", "appraisal.ge", "app.esinfinitamentereciclable.com", "apmotopart.com", "apgmja.pk"]);
DnsEvents
| where Name has_any (malicious_domains)
| project TimeGenerated, Computer, Name, IPAddresses, QueryType
| order by TimeGenerated desc

Required Data Sources

Sentinel TableNotes
DnsEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://threatfox.abuse.ch/browse/malware/win.strelastealer/