MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7d1abbdb866dff61ad7cb8c0ba58812b026d29b19a3045bd968bffd72b7e7328. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PhantomStealer


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments

SHA256 hash: 7d1abbdb866dff61ad7cb8c0ba58812b026d29b19a3045bd968bffd72b7e7328
SHA3-384 hash: dcc6d2290d3b14fcee632ddf3adc4d4e9ab71135d7c753aff5622221c365a4cfd2d7fc4e66cbedcb1e428eadb85254f5
SHA1 hash: 70bcd97a8f9b2b906f11b4be14c3ee45b2bcd933
MD5 hash: f92a6273b4db2b135c7b6447f470599c
humanhash: king-triple-orange-eight
File name:Rendelés_aqualing_2026_22445146200001.js
Download: download sample
Signature PhantomStealer
File size:35'817 bytes
First seen:2026-04-21 18:43:51 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 768:XeBVdifb9dQKI0wD1haG0bMnQnH1lwFwiRS4aHhqAYQmB0aOG0:XeBniHjwDLaaQnVlywAS4aHo9K7G0
TLSH T1FDF2628B35CA747106A234F76B1AE05AE76D8CC0764CC015FDD8AA8EB86DF18D0B55F4
Magika javascript
Reporter smica83
Tags:HUN js

Intelligence


File Origin
# of uploads :
1
# of downloads :
136
Origin country :
HU HU
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
94.1%
Tags:
virus shell spawn
Verdict:
Malicious
File Type:
js
First seen:
2026-04-21T06:01:00Z UTC
Last seen:
2026-04-23T12:59:00Z UTC
Hits:
~100
Detections:
HEUR:Trojan.Script.Generic HEUR:Trojan-Downloader.Script.Generic Trojan.JS.SAgent.sb Trojan-Downloader.Agent.HTTP.C&C PDM:Trojan.Win32.Generic Trojan-Downloader.JS.SLoad.sb Downloader.Snojan.HTTP.ServerRequest
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad.troj.spyw.expl
Score:
100 / 100
Signature
AI detected malicious Powershell script
Allocates memory in foreign processes
Browser instances using unsafe startup parameters
Bypasses PowerShell execution policy
Connects to many ports of the same IP (likely port scanning)
Creates a thread in another existing process (thread injection)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
JScript performs obfuscated calls to suspicious functions
Malicious sample detected (through community Yara rule)
Monitors registry run keys for changes
Multi AV Scanner detection for submitted file
Potential obfuscated javascript found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Suspicious execution chain found
Switches to a custom stack to bypass stack traces
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
WScript reads language and country specific registry keys (likely country aware script)
Wscript starts Powershell (via cmd or directly)
Yara detected Generic JS Downloader
Yara detected Powershell decode and execute
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1902189 Sample: Rendel#U00e9s_aqualing_2026... Startdate: 21/04/2026 Architecture: WINDOWS Score: 100 65 ftp.corella.ro 2->65 67 acbcr.ro 2->67 69 20 other IPs or domains 2->69 93 Suricata IDS alerts for network traffic 2->93 95 Malicious sample detected (through community Yara rule) 2->95 97 Multi AV Scanner detection for submitted file 2->97 99 9 other signatures 2->99 12 wscript.exe 1 16 2->12         started        signatures3 process4 dnsIp5 87 acbcr.ro 188.241.74.68, 443, 49740 TELECABLU-ASNRO Romania 12->87 59 C:\Users\user\AppData\Local\...\update[1].ps1, ASCII 12->59 dropped 61 C:\Temp\65US8P88.ps1, ASCII 12->61 dropped 115 System process connects to network (likely due to code injection or exploit) 12->115 117 JScript performs obfuscated calls to suspicious functions 12->117 119 Wscript starts Powershell (via cmd or directly) 12->119 121 4 other signatures 12->121 17 powershell.exe 16 12->17         started        file6 signatures7 process8 signatures9 89 Writes to foreign memory regions 17->89 91 Injects a PE file into a foreign processes 17->91 20 aspnet_compiler.exe 15 13 17->20         started        24 aspnet_compiler.exe 17->24         started        26 conhost.exe 17->26         started        28 5 other processes 17->28 process10 dnsIp11 71 ftp.corella.ro 109.73.128.91, 21, 49956, 49958 DJEMBA-ASRO Spain 20->71 73 icanhazip.com 104.16.184.241, 49963, 80 CLOUDFLARENETUS United States 20->73 101 Tries to steal Mail credentials (via file / registry access) 20->101 103 Tries to harvest and steal browser information (history, passwords, etc) 20->103 105 Writes to foreign memory regions 20->105 113 3 other signatures 20->113 30 msedge.exe 20->30         started        33 chrome.exe 1 20->33         started        36 msedge.exe 20->36         started        38 18 other processes 20->38 107 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 24->107 109 Browser instances using unsafe startup parameters 24->109 111 Switches to a custom stack to bypass stack traces 24->111 signatures12 process13 dnsIp14 123 Monitors registry run keys for changes 30->123 63 192.168.11.30, 138, 21, 443 unknown unknown 33->63 40 chrome.exe 33->40         started        43 setup.exe 36->43         started        45 msedge.exe 36->45         started        47 msedge.exe 36->47         started        51 8 other processes 36->51 49 firefox.exe 38->49         started        signatures15 process16 dnsIp17 75 googlehosted.l.googleusercontent.com 142.250.217.1, 443, 49751, 49752 GOOGLEUS United States 40->75 77 clients2.googleusercontent.com 40->77 53 setup.exe 43->53         started        55 setup.exe 43->55         started        79 13.107.253.45, 443, 49812, 49813 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 45->79 81 150.171.109.101, 443, 49834, 49838 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 45->81 85 31 other IPs or domains 45->85 83 127.0.0.1 unknown unknown 49->83 process18 process19 57 setup.exe 53->57         started       
Gathering data
Threat name:
Script-JS.Trojan.Acsogenixx
Status:
Malicious
First seen:
2026-04-21 18:44:22 UTC
File Type:
Text (JavaScript)
AV detection:
11 of 37 (29.73%)
Threat level:
  5/5
Result
Malware family:
phantom_stealer
Score:
  10/10
Tags:
family:phantom_stealer collection discovery execution persistence stealer
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
outlook_office_path
outlook_win_path
Command and Scripting Interpreter: JavaScript
Command and Scripting Interpreter: PowerShell
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Time Discovery
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Checks computer location settings
Badlisted process makes network request
Detects PhantomStealer written in C#
Family: PhantomStealer
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

PhantomStealer

Java Script (JS) js 7d1abbdb866dff61ad7cb8c0ba58812b026d29b19a3045bd968bffd72b7e7328

(this sample)

Comments