MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6a6f536464eef282d604d18eee6668b26334ed06642969ea1f959a076f542401. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
PhantomStealer
Vendor detections: 15
| SHA256 hash: | 6a6f536464eef282d604d18eee6668b26334ed06642969ea1f959a076f542401 |
|---|---|
| SHA3-384 hash: | dc6809eae54f9179ee360a1282f7e16bc08319c9247583453d7f6113502f348c3ce27b1b06a47047fac2b4753fddc783 |
| SHA1 hash: | 339870a33cce6bd08c5c3c27e8302f4ef377f0a1 |
| MD5 hash: | db1eceb37ae239e0a0471425551f31a4 |
| humanhash: | six-three-king-arkansas |
| File name: | Orden_de_Compra_WHFarm_26587.pdf.exe |
| Download: | download sample |
| Signature | PhantomStealer |
| File size: | 1'858'560 bytes |
| First seen: | 2026-02-09 10:17:19 UTC |
| Last seen: | 2026-02-09 11:25:23 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'818 x AgentTesla, 19'741 x Formbook, 12'286 x SnakeKeylogger) |
| ssdeep | 24576:TEst1d5R43L6c/rWQs3/eBo9BqV8qIIvQDEp//ndkRb80k:lt1d5OBWD/4HVhIZDAn69 |
| Threatray | 348 similar samples on MalwareBazaar |
| TLSH | T17C85F11153E86A6CF9BF9B3C0679445443F1B94ACB32DF2E799D809D1821F93DAA1323 |
| TrID | 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.0% (.EXE) Win64 Executable (generic) (10522/11/4) 6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.2% (.EXE) Win32 Executable (generic) (4504/4/1) 1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| Magika | pebin |
| Reporter | |
| Tags: | exe PhantomStealer |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Unpacked files
6bb2a5678ada801137ea6f5f6b032ca4154de5df7d8f240ee4d7ed2febe5ddcd
a72181561540f1c1d48dd8f33fe4b502fe8b1fdf27a908b035296276638af564
1f9188b926fd1bf32c8731d981cbd0be675b10cc1376f0544f01b99486f56e3a
6a6f536464eef282d604d18eee6668b26334ed06642969ea1f959a076f542401
20beaec4ad8341161ef0a36de86a02923cb904d438823f86fd7dce0682429922
a2909324ee9763d9c6b48ed73d2bb082d622eebd35d22641da2894d9cf94cea9
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CP_Script_Inject_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.