Threat name:
Phantom stealer, Strela Stealer
Alert
Classification:
rans.troj.spyw.expl.evad
.NET source code contains potential unpacker
.NET source code contains process injector
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Bypasses PowerShell execution policy
Connects to a pastebin service (likely for C&C)
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Creates a thread in another existing process (thread injection)
Encrypted powershell cmdline option found
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Monitors registry run keys for changes
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Sigma detected: WScript or CScript Dropper - File
Suricata IDS alerts for network traffic
Suspicious execution chain found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Windows Shell Script Host drops VBS files
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Yara detected Phantom stealer
Yara detected Powershell download and execute
Yara detected Strela Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1796308
Sample:
COTIZACI#U00d3NY.vbs
Startdate:
16/10/2025
Architecture:
WINDOWS
Score:
100
91
pastebin.com
2->91
93
api.telegram.org
2->93
95
4 other IPs or domains
2->95
127
Suricata IDS alerts
for network traffic
2->127
129
Found malware configuration
2->129
131
Malicious sample detected
(through community Yara
rule)
2->131
137
23 other signatures
2->137
13
wscript.exe
3
2->13
started
17
MSBuild.exe
2->17
started
19
MSBuild.exe
2->19
started
21
svchost.exe
2->21
started
signatures3
133
Connects to a pastebin
service (likely for
C&C)
91->133
135
Uses the Telegram API
(likely for C&C
communication)
93->135
process4
file5
87
C:\...\COTIZACI#U00d3NY.vbs:Zone.Identifier, ASCII
13->87
dropped
89
C:\Users\user\...\COTIZACI#U00d3NY.vbs, Unicode
13->89
dropped
153
Suspicious powershell
command line found
13->153
155
Wscript starts Powershell
(via cmd or directly)
13->155
157
Windows Shell Script
Host drops VBS files
13->157
159
3 other signatures
13->159
23
powershell.exe
7
13->23
started
26
schtasks.exe
1
13->26
started
28
schtasks.exe
1
13->28
started
30
conhost.exe
17->30
started
32
conhost.exe
19->32
started
signatures6
process7
signatures8
139
Suspicious powershell
command line found
23->139
141
Found many strings related
to Crypto-Wallets (likely
being stolen)
23->141
143
Encrypted powershell
cmdline option found
23->143
145
2 other signatures
23->145
34
powershell.exe
14
9
23->34
started
38
conhost.exe
23->38
started
40
conhost.exe
26->40
started
42
conhost.exe
28->42
started
process9
dnsIp10
97
pastebin.com
104.20.29.150, 443, 49687, 49689
CLOUDFLARENETUS
United States
34->97
85
C:\Users\user\AppData\Local\Temp\nAvER.ps1, Unicode
34->85
dropped
44
powershell.exe
7
34->44
started
file11
process12
signatures13
147
Found many strings related
to Crypto-Wallets (likely
being stolen)
44->147
149
Writes to foreign memory
regions
44->149
151
Injects a PE file into
a foreign processes
44->151
47
MSBuild.exe
16
110
44->47
started
process14
dnsIp15
113
ftp.tetraatech.com
199.188.201.183, 21, 49751
NAMECHEAP-NETUS
United States
47->113
115
api.telegram.org
149.154.167.220, 443, 49747, 49749
TELEGRAMRU
United Kingdom
47->115
117
icanhazip.com
104.16.184.241, 49748, 49750, 80
CLOUDFLARENETUS
United States
47->117
77
C:\Users\user\AppData\...\ZBEDCJPBEY.jpg, ASCII
47->77
dropped
79
C:\Users\user\AppData\...\KATAXZVCPS.docx, ASCII
47->79
dropped
81
C:\Users\user\AppData\...\KATAXZVCPS.docx, ASCII
47->81
dropped
83
2 other files (1 malicious)
47->83
dropped
119
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
47->119
121
Tries to steal Mail
credentials (via file
/ registry access)
47->121
123
Tries to harvest and
steal browser information
(history, passwords,
etc)
47->123
125
5 other signatures
47->125
52
firefox.exe
47->52
started
54
msedge.exe
47->54
started
57
chrome.exe
47->57
started
59
9 other processes
47->59
file16
signatures17
process18
dnsIp19
61
firefox.exe
52->61
started
99
192.168.2.3, 138, 21, 443
unknown
unknown
54->99
101
239.255.255.250
unknown
Reserved
54->101
65
msedge.exe
54->65
started
67
setup.exe
54->67
started
69
msedge.exe
54->69
started
71
msedge.exe
54->71
started
process20
dnsIp21
103
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216, 443, 49699
GOOGLEUS
United States
61->103
105
127.0.0.1
unknown
unknown
61->105
161
Monitors registry run
keys for changes
61->161
73
firefox.exe
61->73
started
107
part-0013.t-0009.t-msedge.net
13.107.213.41, 443, 49716, 49730
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
65->107
109
ln-0007.ln-msedge.net
150.171.22.17, 443, 49702
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
65->109
111
31 other IPs or domains
65->111
75
setup.exe
67->75
started
signatures22
process23
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.