

Strela Stealer Malware Targets Microsoft Outlook Users for Credential Theft – Active IOCs
March 11, 2025
Strela Stealer Malware Targets Microsoft Outlook Users for Credential Theft – Active IOCs
March 11, 2025Severity
High
Analysis Summary
SideWinder, a sophisticated APT group, has expanded its targeting scope to maritime and logistics companies across South and Southeast Asia, the Middle East, and Africa. The group has been actively attacking entities in Bangladesh, Cambodia, Djibouti, Egypt, the UAE, and Vietnam, with additional focus on nuclear power plants and energy infrastructure in South Asia and Africa. Other sectors of interest include telecommunications, IT services, real estate, consulting firms, and hotels. Moreover, SideWinder has targeted diplomatic entities in multiple countries, including Afghanistan, Algeria, Bulgaria, China, India, the Maldives, Rwanda, Saudi Arabia, Turkey, and Uganda. The group's focus on India is particularly notable due to previous speculation that the threat actor may be of Indian origin. Researchers said, describing it as a "highly advanced and dangerous adversary."

Researcher, analysis in 2024 highlights SideWinder’s ongoing enhancements to its attack toolkit and persistence strategies. The group primarily relies on spear-phishing emails containing malicious documents that exploit the CVE-2017-11882 vulnerability in Microsoft Office Equation Editor. This exploit triggers a multi-stage infection process, deploying a .NET-based downloader called ModuleInstaller, which ultimately launches StealerBot. StealerBot, a modular post-exploitation toolkit first detailed by Researcher, in October 2024, is designed to collect sensitive data from compromised systems. Reports from BlackBerry in July 2024 also emphasized SideWinder’s interest in targeting maritime organizations.
Lure documents used in these campaigns frequently reference nuclear power plants, energy agencies, maritime infrastructures, and port authorities. The group's operations demonstrate a high level of adaptability, particularly in countering security solutions. Researchers have observed that SideWinder closely monitors detection rates of its tools, rapidly modifying its malware within hours if detected. This constant refinement enables them to bypass security defenses effectively. Furthermore, they frequently alter file names, paths, and persistence mechanisms to evade behavioral detections.
The group’s ability to quickly adjust to security countermeasures makes them a highly dangerous adversary. Their use of a modular and evolving attack framework, combined with a broad and strategic victimology, underscores their long-term objectives in cyber espionage and intelligence gathering. By focusing on critical industries such as nuclear energy and maritime logistics, SideWinder poses a serious threat to national security and economic stability across multiple regions.
Impact
- Sensitive Data Theft
- Gain Access
Indicators of Compromise
Domain Name
pmd-office.info
modpak.info
dirctt888.info
file-dwnld.org
defencearmy.pro
document-viewer.info
crontec.site
veorey.live
mod-kh.info
MD5
e9726519487ba9e4e5589a8a5ec2f933
d36a67468d01c4cb789cd6794fb8bc70
313f9bbe6dac3edc09fe9ac081950673
bd8043127abe3f5cfa61bd2174f54c60
f42ba43f7328cbc9ce85b2482809ff1c
a694ccdb82b061c26c35f612d68ed1c2
e0bce049c71bc81afe172cd30be4d2b7
0216ffc6fb679bdf4ea6ee7051213c1e
433480f7d8642076a8b3793948da5efe
SHA-256
d9e373aeea5fe0c744f0de94fdd366b5b6da816209ac394cbbda1c64c03b50b1
865f5b3b1ee94d89ad9a9840f49a17d477cddfc3742c5ef78d77a6027ad1caa5
fa95fadc73e5617305a6b71f77e9d255d14402650075107f2272f131d3cf7b00
aacaf712cf67176f159657be2fbd0fce018aa03b890cb1616b146eddb1de73be
30735312101e60a697f161abba62ca359eed240d2e612b1ff7bed6523b28730d
76daea942654d8175f642696fc758b03767db14ca5dda9994797a3f95a34294a
512a83f1a6c404cb0ba679c7a2f3aa782bb5e17840d31a034de233f7500a6cb9
5740947bb9267e1be8281edc31b3fb2d57a71d2c96a47eeeaa6482c0927aa6a4
44ff1117bb0167f85d599236892deede636c358df3d8908582a6ce6a48070bd4
SHA1
5a12b7f4214ac1f79f2b613fb482e58701dfaaa6
84b4b2705018e38253796cd3f84ee68694d9b9c0
96cafccda39d2dd06e22b33ca37504405439c23d
639ccf8e2e0643b0d93db9ebf508ac0f1836cccd
013ead0c89431a69bbe7e7b39a1095dc4faea456
334f3313b03bbfeaae6fc7a0257d4fd8cb6dd751
9a85051a59212febf71e9d5ff29d6998ee909795
71daaff7ba2b92e69a5e94c0efa2f5a097bcd65c
81d00923f2e9e0bae7c51ffbcb66409dd9a3da05
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets
- Enforce strong password policies across the organization. Encourage the use of complex passwords and enable multi-factor authentication (MFA) wherever possible to add an extra layer of security.
- Deploy reliable endpoint protection solutions that include antivirus, anti-malware, and host-based intrusion prevention systems (HIPS) to detect and block malicious activities.
- Utilize web filtering and content inspection tools to block access to malicious websites and prevent users from downloading malicious files.
- Deploy IDPS solutions to detect and block suspicious network traffic and intrusions.
- Conduct regular vulnerability assessments and penetration testing to identify weaknesses in the network infrastructure and address them before they are exploited by attackers.
- Continuously monitor network traffic and security logs for any signs of suspicious activities. Stay updated on the latest threat intelligence to understand the tactics, techniques, and procedures (TTPs) employed by the Sidewinder APT group and other threat actors.