MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 014566356dcb7f7ead45bf82659bbc942de33a6a15889d1fcfc8be3338c79506. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PhantomStealer


Vendor detections: 19


Intelligence 19 IOCs YARA 3 File information Comments

SHA256 hash: 014566356dcb7f7ead45bf82659bbc942de33a6a15889d1fcfc8be3338c79506
SHA3-384 hash: 076c34578bd22ccf745805af7876c73a2c51632103125c5239c577e3ae2cd6278dfb42dafa6d9c75cb8b7939e49b76a9
SHA1 hash: 685d926660fbbf2798a610c8236468d7ae202f90
MD5 hash: b3ee4fc8e953211ee5bae64a64d4b444
humanhash: pizza-alaska-maine-undress
File name:e-dekont.pdf.exe
Download: download sample
Signature PhantomStealer
File size:1'213'952 bytes
First seen:2025-10-14 13:42:35 UTC
Last seen:2025-10-20 10:49:25 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 24576:qU+oupUUvb0cV4UiA4ZaqWJjE4N20I/8563NUDs7bF:vWj0cV4UirZabNHM0CJfF
Threatray 2'662 similar samples on MalwareBazaar
TLSH T1A34523983695E609C6523FB96930E27E21791DEDF022D207AFF87EDF7821B0549046D3
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter abuse_ch
Tags:exe geo PhantomStealer TUR

Intelligence


File Origin
# of uploads :
2
# of downloads :
73
Origin country :
SE SE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e-dekont.pdf.exe
Verdict:
Malicious activity
Analysis date:
2025-10-14 14:19:03 UTC
Tags:
stealer telegram exfiltration evasion crypto-regex phantom ims-api generic

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.9%
Tags:
underscore keylog spawn word
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a process with a hidden window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
Adding an exclusion to Microsoft Defender
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm base64 bitmap lolbin masquerade msbuild obfuscated packed packed reconnaissance regsvcs rezer0 roboski schtasks stego telegram vbc vbnet
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-10-14T04:56:00Z UTC
Last seen:
2025-10-16T06:34:00Z UTC
Hits:
~1000
Detections:
Trojan-PSW.Win32.Stealer.sb Trojan-PSW.Win32.Disco.sb HEUR:Trojan-PSW.MSIL.Agensla.gen Trojan.MSIL.Crypt.sb Trojan-PSW.Win32.Coins.sb Trojan-PSW.Stealer.HTTP.C&C Trojan-PSW.MSIL.Stealerium.sb PDM:Trojan.Win32.Generic PDM:Trojan.Win32.Badex.d Trojan.MSIL.Taskun.sb Trojan.MSIL.Inject.sb Trojan-Spy.Stealer.HTTP.C&C
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Phantom stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains process injector
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Creates a thread in another existing process (thread injection)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Monitors registry run keys for changes
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Double Extension File Execution
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected Phantom stealer
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1794934 Sample: e-dekont.pdf.exe Startdate: 14/10/2025 Architecture: WINDOWS Score: 100 59 api.telegram.org 2->59 61 youtube-ui.l.google.com 2->61 63 71 other IPs or domains 2->63 79 Suricata IDS alerts for network traffic 2->79 81 Found malware configuration 2->81 83 Antivirus / Scanner detection for submitted sample 2->83 87 16 other signatures 2->87 9 e-dekont.pdf.exe 4 2->9         started        13 firefox.exe 1 2->13         started        15 msedge.exe 2->15         started        17 firefox.exe 2->17         started        signatures3 85 Uses the Telegram API (likely for C&C communication) 59->85 process4 file5 53 C:\Users\user\...\e-dekont.pdf.exe.log, ASCII 9->53 dropped 99 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 9->99 101 Found many strings related to Crypto-Wallets (likely being stolen) 9->101 103 Adds a directory exclusion to Windows Defender 9->103 105 2 other signatures 9->105 19 e-dekont.pdf.exe 25 12 9->19         started        23 powershell.exe 23 9->23         started        25 firefox.exe 3 413 13->25         started        28 msedge.exe 15->28         started        30 firefox.exe 17->30         started        signatures6 process7 dnsIp8 65 api.telegram.org 149.154.167.220, 443, 49727, 49729 TELEGRAMRU United Kingdom 19->65 67 icanhazip.com 104.16.184.241, 49728, 80 CLOUDFLARENETUS United States 19->67 89 Tries to steal Mail credentials (via file / registry access) 19->89 91 Tries to harvest and steal browser information (history, passwords, etc) 19->91 93 Writes to foreign memory regions 19->93 97 4 other signatures 19->97 32 msedge.exe 19->32         started        35 chrome.exe 19->35 injected 37 firefox.exe 1 19->37         started        49 2 other processes 19->49 95 Loading BitLocker PowerShell Module 23->95 39 WmiPrvSE.exe 23->39         started        41 conhost.exe 23->41         started        69 pki-goog.l.google.com 192.178.50.67, 49738, 80 GOOGLEUS United States 25->69 71 prod.detectportal.prod.cloudops.mozgcp.net 34.107.221.82, 49730, 49732, 49772 GOOGLEUS United States 25->71 73 13 other IPs or domains 25->73 55 C:\Users\user\AppData\...\gmpopenh264.dll.tmp, PE32+ 25->55 dropped 57 C:\Users\user\...\gmpopenh264.dll (copy), PE32+ 25->57 dropped 43 firefox.exe 25->43         started        45 firefox.exe 25->45         started        47 firefox.exe 25->47         started        file9 signatures10 process11 signatures12 75 Monitors registry run keys for changes 32->75 77 Installs a global keyboard hook 32->77 51 msedge.exe 32->51         started        process13
Gathering data
Verdict:
Malicious
Threat:
VHO:Trojan-PSW.MSIL.Agensla
Threat name:
ByteCode-MSIL.Trojan.SnakeKeylogger
Status:
Malicious
First seen:
2025-10-14 08:13:16 UTC
File Type:
PE (.Net Exe)
Extracted files:
8
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
phantomstealer
Score:
  10/10
Tags:
family:phantomstealer collection discovery execution persistence spyware stealer
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
outlook_office_path
outlook_win_path
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Checks computer location settings
Reads user/profile data of web browsers
Command and Scripting Interpreter: PowerShell
Phantomstealer family
Malware Config
C2 Extraction:
https://api.telegram.org/bot8311646472:AAE3y-mOoDjijqIf0ZE_lCtb8S0nWRARlUw/sendMessage?chat_id=6605246356
Unpacked files
SH256 hash:
014566356dcb7f7ead45bf82659bbc942de33a6a15889d1fcfc8be3338c79506
MD5 hash:
b3ee4fc8e953211ee5bae64a64d4b444
SHA1 hash:
685d926660fbbf2798a610c8236468d7ae202f90
SH256 hash:
b794ed0c0c7d4499d0a2ffff67eb5b92dba83f4be7964591e9edad2755176511
MD5 hash:
2a576318d07470206dd7c45f7d896078
SHA1 hash:
3096b2a5ccd98583949a9f57842d5547b50bbc29
SH256 hash:
38d4e6f80b50e28096b19761bd028c63a3fb1b94179a64dc8bae29ceb176ee91
MD5 hash:
b6006207acc36b80ac216ae5be169a5a
SHA1 hash:
4780ecff459d94f54c5c6381f72f5b51c382c3c8
Detections:
cn_utf8_windows_terminal INDICATOR_EXE_Packed_Fody INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_SandboxUserNames INDICATOR_SUSPICIOUS_EXE_TelegramChatBot INDICATOR_SUSPICIOUS_EXE_WirelessNetReccon INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs INDICATOR_SUSPICIOUS_EXE_SandboxComputerNames
SH256 hash:
eb520487f41e85ba8baee00b912130a5b23a62a9817583d6f8af19fe5eeb424e
MD5 hash:
d7070df8d3c4e16eab8aca0484daabb4
SHA1 hash:
ef04be6cf5e7166b5b330df04afdae32a18af4ba
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
Malware family:
PhantomStealer
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments