MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2289d9d5d2b1879c9b95fe142444c8c43e72979d0af81a4bead23ef66b87c257. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PhantomStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 4 File information Comments

SHA256 hash: 2289d9d5d2b1879c9b95fe142444c8c43e72979d0af81a4bead23ef66b87c257
SHA3-384 hash: 2fa64144c80b6cab51bd2f1a2209dc5d55bf7faeffb99f98e50628c3b55e94ca88b8fdd64b8da91548cb823a24420122
SHA1 hash: 192b329bf43dd780c518f58cbb6269e8f79b1821
MD5 hash: ef6a37224eaa59431cfd3feca2d536a7
humanhash: three-mexico-uncle-michigan
File name:Document Reviews.VBE
Download: download sample
Signature PhantomStealer
File size:4'469'791 bytes
First seen:2025-10-28 08:26:03 UTC
Last seen:Never
File type:Visual Basic Script (vbe) vbe
MIME type:text/plain
ssdeep 49152:2KhhIwP7y+9vSmX/CCLWjWIO61l6S9BqT8zI0vZaBbv83I6daezlmA0:V
Threatray 172 similar samples on MalwareBazaar
TLSH T11426021589C82FB9CFAC5A1880FE161EA3F04A8E546B758AFB377D4AAFF750402071D5
Magika vba
Reporter abuse_ch
Tags:PhantomStealer vbe

Intelligence


File Origin
# of uploads :
1
# of downloads :
40
Origin country :
SE SE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
97.4%
Tags:
vmdetect keylog spawn word
Verdict:
Clean
File Type:
text
First seen:
2025-10-27T23:32:00Z UTC
Last seen:
2025-10-28T08:06:00Z UTC
Hits:
~10
Result
Threat name:
Phantom stealer
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
AI detected malicious Powershell script
Allocates memory in foreign processes
Bypasses PowerShell execution policy
Connects to many ports of the same IP (likely port scanning)
Creates a thread in another existing process (thread injection)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Monitors registry run keys for changes
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Phantom stealer
Yara detected Powershell decode and execute
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1803043 Sample: Document Reviews.VBE.vbe Startdate: 28/10/2025 Architecture: WINDOWS Score: 100 81 prod.classify-client.prod.webservices.mozgcp.net 2->81 83 icanhazip.com 2->83 85 ftp.asmarychem.com 2->85 101 Multi AV Scanner detection for submitted file 2->101 103 Yara detected Phantom stealer 2->103 105 Yara detected Powershell decode and execute 2->105 107 4 other signatures 2->107 12 wscript.exe 1 2->12         started        15 svchost.exe 1 1 2->15         started        18 AddInProcess32.exe 2->18         started        20 AddInProcess32.exe 2->20         started        signatures3 process4 dnsIp5 129 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->129 131 Suspicious execution chain found 12->131 22 cscript.exe 3 12->22         started        99 127.0.0.1 unknown unknown 15->99 26 conhost.exe 18->26         started        28 conhost.exe 20->28         started        signatures6 process7 file8 75 C:\Temp\cmd_fgXhlwPMBf_16898.76.ps1, ASCII 22->75 dropped 121 Suspicious powershell command line found 22->121 123 Bypasses PowerShell execution policy 22->123 30 powershell.exe 16 22->30         started        33 conhost.exe 22->33         started        signatures9 process10 signatures11 133 Writes to foreign memory regions 30->133 135 Injects a PE file into a foreign processes 30->135 35 AddInProcess32.exe 16 91 30->35         started        40 AddInProcess32.exe 30->40         started        42 AddInProcess32.exe 30->42         started        44 8 other processes 30->44 process12 dnsIp13 87 ftp.asmarychem.com 138.201.165.86, 21, 49751, 49752 HETZNER-ASDE Germany 35->87 89 icanhazip.com 104.16.185.241, 49763, 80 CLOUDFLARENETUS United States 35->89 71 C:\Users\user\AppData\...\Log_Summaries.txt, Unicode 35->71 dropped 73 C:\Users\user\AppData\...\AddInProcess32.exe, PE32 35->73 dropped 109 Tries to steal Mail credentials (via file / registry access) 35->109 111 Tries to harvest and steal browser information (history, passwords, etc) 35->111 113 Writes to foreign memory regions 35->113 119 4 other signatures 35->119 46 firefox.exe 2 35->46         started        48 msedge.exe 64 713 35->48         started        51 chrome.exe 35->51 injected 53 3 other processes 35->53 115 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 40->115 117 Switches to a custom stack to bypass stack traces 40->117 file14 signatures15 process16 dnsIp17 55 firefox.exe 3 43 46->55         started        77 192.168.2.7, 138, 21, 443 unknown unknown 48->77 79 239.255.255.250 unknown Reserved 48->79 59 msedge.exe 48->59         started        61 setup.exe 48->61         started        63 msedge.exe 48->63         started        65 msedge.exe 48->65         started        process18 dnsIp19 91 prod.classify-client.prod.webservices.mozgcp.net 35.190.72.216, 443, 49693 GOOGLEUS United States 55->91 125 Monitors registry run keys for changes 55->125 127 Installs a global keyboard hook 55->127 67 firefox.exe 1 55->67         started        93 sb.scorecardresearch.com 18.65.229.88, 443, 49710 MIT-GATEWAYSUS United States 59->93 95 104.208.16.88, 443, 49725 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 59->95 97 34 other IPs or domains 59->97 69 setup.exe 61->69         started        signatures20 process21
Verdict:
inconclusive
YARA:
2 match(es)
Tags:
PowerShell
Threat name:
Script.Trojan.Heuristic
Status:
Malicious
First seen:
2025-10-28 08:29:43 UTC
File Type:
Text (VBS)
AV detection:
5 of 24 (20.83%)
Threat level:
  2/5
Result
Malware family:
phantomstealer
Score:
  10/10
Tags:
family:phantomstealer collection discovery execution persistence
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Command and Scripting Interpreter: PowerShell
Phantomstealer family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Base64_Encoded_Powershell_Directives
Rule name:detect_tiny_vbs
Author:daniyyell
Description:Detects tiny VBS delivery technique
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments