MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 39521ec09367a85986a7ed76a5c4010581a410531bd4a7db14ff9cc05b61cd99. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PhantomStealer


Vendor detections: 19


Intelligence 19 IOCs YARA 31 File information Comments

SHA256 hash: 39521ec09367a85986a7ed76a5c4010581a410531bd4a7db14ff9cc05b61cd99
SHA3-384 hash: ba56a0bb92268b034ddf6cdf388a237c77cd42e48f361bb3830b76246a6cefcef244c35c2631cb9106ccc42746c6bade
SHA1 hash: 17db20d53bd15745f531a3de92bfd1f2723de67b
MD5 hash: e873ee7b4ffa5b5cca3589c4d1c93ce2
humanhash: pizza-three-stream-tango
File name:Doc346720.exe
Download: download sample
Signature PhantomStealer
File size:1'640'960 bytes
First seen:2025-10-20 05:35:21 UTC
Last seen:2025-11-06 10:57:07 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1895460fffad9475fda0c84755ecfee1 (308 x Formbook, 52 x AgentTesla, 36 x SnakeKeylogger)
ssdeep 49152:bPVt/LZeJbInQRaGKPoc2M/nE3SZ1mAf0u3B:bTYbInQaAMEb
Threatray 133 similar samples on MalwareBazaar
TLSH T11E75E0023391D022FFAB95734F5AF62146BC69260123E62F13981DB9BE705B1573E7A3
TrID 40.3% (.EXE) Win64 Executable (generic) (10522/11/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4504/4/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
Magika pebin
Reporter threatcat_ch
Tags:exe PhantomStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
122
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Doc346720.exe
Verdict:
Malicious activity
Analysis date:
2025-10-20 05:36:54 UTC
Tags:
stealer telegram exfiltration evasion phantom crypto-regex ims-api generic

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
91.7%
Tags:
autoit emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Launching a process
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
adaptive-context anti-debug autoit compiled-script fingerprint keylogger microsoft_visual_cc packed
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-10-20T01:18:00Z UTC
Last seen:
2025-10-22T03:10:00Z UTC
Hits:
~1000
Detections:
Trojan.Win32.Strab.sb Trojan-PSW.MSIL.Stealer.sb Trojan-PSW.Win32.Stealer.sb Backdoor.Win32.Androm Trojan.Win64.Injects.gzh Trojan.Win32.Vimditator.sb PDM:Trojan.Win32.Generic Trojan-Dropper.Win32.Injector.sb Trojan.Win32.Inject.sb Trojan.Win32.Agent.sb Trojan-PSW.Win32.Disco.sb Trojan-PSW.Win32.Coins.sb Trojan-PSW.Win32.Stelega.sb Trojan-PSW.MSIL.Stealerium.sb Trojan-PSW.MSIL.Discord.sb
Result
Threat name:
Phantom stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains process injector
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Binary is likely a compiled AutoIt script file
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Contains functionality to register a low level keyboard hook
Creates a thread in another existing process (thread injection)
Found API chain indicative of sandbox detection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Maps a DLL or memory area into another process
Monitors registry run keys for changes
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected Phantom stealer
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1798054 Sample: Doc346720.exe Startdate: 20/10/2025 Architecture: WINDOWS Score: 100 65 api.telegram.org 2->65 67 youtube-ui.l.google.com 2->67 69 72 other IPs or domains 2->69 91 Suricata IDS alerts for network traffic 2->91 93 Found malware configuration 2->93 95 Multi AV Scanner detection for submitted file 2->95 99 12 other signatures 2->99 9 Doc346720.exe 4 2->9         started        12 msedge.exe 2->12         started        15 firefox.exe 1 2->15         started        17 3 other processes 2->17 signatures3 97 Uses the Telegram API (likely for C&C communication) 65->97 process4 dnsIp5 111 Binary is likely a compiled AutoIt script file 9->111 113 Found many strings related to Crypto-Wallets (likely being stolen) 9->113 115 Found API chain indicative of sandbox detection 9->115 119 2 other signatures 9->119 19 RegSvcs.exe 26 16 9->19         started        85 192.168.2.4, 138, 443, 49246 unknown unknown 12->85 87 192.168.2.23 unknown unknown 12->87 89 239.255.255.250 unknown Reserved 12->89 117 Maps a DLL or memory area into another process 12->117 24 msedge.exe 12->24         started        26 setup.exe 12->26         started        28 msedge.exe 12->28         started        38 5 other processes 12->38 30 firefox.exe 3 409 15->30         started        32 conhost.exe 17->32         started        34 conhost.exe 17->34         started        36 firefox.exe 17->36         started        signatures6 process7 dnsIp8 71 api.telegram.org 149.154.167.220, 443, 49767, 49776 TELEGRAMRU United Kingdom 19->71 73 icanhazip.com 104.16.184.241, 49775, 80 CLOUDFLARENETUS United States 19->73 59 C:\Users\user\AppData\Roaming\RegSvcs.exe, PE32 19->59 dropped 101 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 19->101 103 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 19->103 105 Tries to steal Mail credentials (via file / registry access) 19->105 107 6 other signatures 19->107 40 msedge.exe 19->40         started        43 chrome.exe 19->43 injected 45 firefox.exe 1 19->45         started        55 2 other processes 19->55 75 13.107.213.41, 443, 49763, 49764 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 24->75 77 part-0013.t-0009.t-msedge.net 13.107.246.41, 443, 49735 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 24->77 81 35 other IPs or domains 24->81 47 setup.exe 26->47         started        79 pki-goog.l.google.com 192.178.50.35, 49810, 80 GOOGLEUS United States 30->79 83 14 other IPs or domains 30->83 61 C:\Users\user\AppData\...\gmpopenh264.dll.tmp, PE32+ 30->61 dropped 63 C:\Users\user\...\gmpopenh264.dll (copy), PE32+ 30->63 dropped 49 firefox.exe 30->49         started        51 firefox.exe 30->51         started        53 firefox.exe 30->53         started        file9 signatures10 process11 signatures12 109 Monitors registry run keys for changes 40->109 57 msedge.exe 40->57         started        process13
Verdict:
Malware
YARA:
7 match(es)
Tags:
AutoIt Decompiled Executable PDB Path PE (Portable Executable) PE File Layout Suspect Win 32 Exe x86
Threat name:
Win32.Trojan.Cerbu
Status:
Malicious
First seen:
2025-10-20 04:20:03 UTC
File Type:
PE (Exe)
Extracted files:
13
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
phantomstealer
Score:
  10/10
Tags:
family:phantomstealer collection discovery persistence
Behaviour
Uses Task Scheduler COM API
outlook_office_path
outlook_win_path
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Looks up external IP address via web service
Executes dropped EXE
Phantomstealer family
Malware Config
C2 Extraction:
https://api.telegram.org/bot8423129003:AAF1C425Y4ySOQ3cEf9UROs2_I_zItQtp5g/sendMessage?chat_id=8198121624
Unpacked files
SH256 hash:
39521ec09367a85986a7ed76a5c4010581a410531bd4a7db14ff9cc05b61cd99
MD5 hash:
e873ee7b4ffa5b5cca3589c4d1c93ce2
SHA1 hash:
17db20d53bd15745f531a3de92bfd1f2723de67b
SH256 hash:
372ece8b22f5175762b628a7ca581b9eeeee399508a8dd74174936594f03c30e
MD5 hash:
0a59be87d81a4b7098accfcc0ae79ba5
SHA1 hash:
aec70e4d0a3a7795cf28755582fc615847f4e91d
Detections:
cn_utf8_windows_terminal INDICATOR_EXE_Packed_Fody INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_SandboxUserNames INDICATOR_SUSPICIOUS_EXE_TelegramChatBot INDICATOR_SUSPICIOUS_EXE_WirelessNetReccon INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs INDICATOR_SUSPICIOUS_EXE_SandboxComputerNames
Malware family:
PhantomStealer
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:grakate_stealer_nov_2021
Rule name:INDICATOR_EXE_Packed_Fody
Author:ditekSHen
Description:Detects executables manipulated with Fody
Rule name:INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs
Author:ditekSHen
Description:Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SandboxComputerNames
Author:ditekSHen
Description:Detects executables containing possible sandbox analysis VM names
Rule name:INDICATOR_SUSPICIOUS_EXE_SandboxUserNames
Author:ditekSHen
Description:Detects executables containing possible sandbox analysis VM usernames
Rule name:INDICATOR_SUSPICIOUS_EXE_TelegramChatBot
Author:ditekSHen
Description:Detects executables using Telegram Chat Bot
Rule name:INDICATOR_SUSPICIOUS_EXE_WirelessNetReccon
Author:ditekSHen
Description:Detects executables with interest in wireless interface using netsh
Rule name:Lumma_Stealer_Detection
Author:ashizZz
Description:Detects a specific Lumma Stealer malware sample using unique strings and behaviors
Reference:https://seanthegeek.net/posts/compromized-store-spread-lumma-stealer-using-fake-captcha/
Rule name:Macos_Infostealer_Wallets_8e469ea0
Author:Elastic Security
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:pe_imphash
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:TH_Generic_MassHunt_Win_Malware_2025_CYFARE
Author:CYFARE
Description:Generic Windows malware mass-hunt rule - 2025
Reference:https://cyfare.net/
Rule name:Windows_Generic_Threat_f57e5e2a
Author:Elastic Security
Rule name:Windows_Trojan_Xeno_89f9f060
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

PhantomStealer

Executable exe 39521ec09367a85986a7ed76a5c4010581a410531bd4a7db14ff9cc05b61cd99

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments