MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6ec33f8a628bc4343b505db4f1d382390a520caff0a6728e0b845bccddb0e086. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PhantomStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: 6ec33f8a628bc4343b505db4f1d382390a520caff0a6728e0b845bccddb0e086
SHA3-384 hash: 1afe6bf0fd41587217f4d5a83c64bdb5b1be40d70b341f6f39c1a6907bdb40fb904c7531ef9fe060b0bece3a8c7b867d
SHA1 hash: 712fd0e6bbb406feb885092286a192cce712d19f
MD5 hash: db21ae2a251439b3c5ef928f8d0e7b52
humanhash: alabama-bulldog-fruit-beer
File name:Bank Transfer Confirmation - Advance Payment for PO 4500725711.pdf.txz
Download: download sample
Signature PhantomStealer
File size:33'412 bytes
First seen:2025-12-11 11:53:33 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 768:qXj+RV093EJQqplTg1dVe4F/BvxD98TQ2yqdt+pfgq7aauwuq:qaVcaQqpledV1xD98TV0jaauwuq
TLSH T19FE2F1573AB836F6A3D6EA518DD727241532BFA92C1309249C4DAEB15AEC739C8F4002
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Magika rar
Reporter cocaman
Tags:payment PhantomStealer rar txz


Avatar
cocaman
Malicious email (T1566.001)
From: "Gamal Foruad <export@beijinghi.com>" (likely spoofed)
Received: "from mail.beijinghi.com (mail.beijinghi.com [104.223.59.162]) "
Date: "10 Dec 2025 19:20:11 -0800"
Subject: "Advance Payment Processed for PO 4500725711"
Attachment: "Bank Transfer Confirmation - Advance Payment for PO 4500725711.pdf.txz"

Intelligence


File Origin
# of uploads :
1
# of downloads :
57
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Bank Transfer Confirmation - Advance Payment for PO 4500725711_pdf.js
File size:598'868 bytes
SHA256 hash: cc8c48255ef15996de9a4a782148aff817993760bc59b2556aa8d08d53d7f0a8
MD5 hash: 97e845b0a480730cd7841c05027a3c56
MIME type:text/plain
Signature PhantomStealer
Vendor Threat Intelligence
Verdict:
Malicious
Score:
91.7%
Tags:
stration virus blic
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
cloudeye fingerprint masquerade powershell repaired
Verdict:
Malicious
File Type:
rar
First seen:
2025-12-11T02:28:00Z UTC
Last seen:
2025-12-11T09:51:00Z UTC
Hits:
~10
Verdict:
inconclusive
YARA:
1 match(es)
Tags:
Rar Archive
Threat name:
Script-JS.Backdoor.Remcos
Status:
Malicious
First seen:
2025-12-11 02:06:47 UTC
File Type:
Binary (Archive)
Extracted files:
1
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
phantom_stealer
Score:
  10/10
Tags:
family:phantom_stealer adware collection discovery execution persistence spyware stealer
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
outlook_office_path
outlook_win_path
Command and Scripting Interpreter: JavaScript
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses Microsoft Outlook profiles
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Badlisted process makes network request
Detects PhantomStealer payload
PhantomStealer
Phantom_stealer family
Malware Config
C2 Extraction:
https://api.telegram.org/bot8545789480:AAHtIAGYbMQSMC2CJrqUAORJcBQJCuGxOC4/sendMessage?chat_id=6897585916
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

PhantomStealer

rar 6ec33f8a628bc4343b505db4f1d382390a520caff0a6728e0b845bccddb0e086

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments