Threat name:
Phantom stealer, Strela Stealer
Alert
Classification:
troj.spyw.expl.evad
.NET source code contains a sample name check
.NET source code contains potential unpacker
.NET source code contains process injector
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Creates a thread in another existing process (thread injection)
Creates autostart registry keys with suspicious values (likely registry only malware)
Creates processes via WMI
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Monitors registry run keys for changes
Multi AV Scanner detection for submitted file
Powershell is started from unusual location (likely to bypass HIPS)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Reads the Security eventlog
Reads the System eventlog
Renames powershell.exe to bypass HIPS
Sample uses string decryption to hide its real strings
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: PowerShell Base64 Encoded IEX Cmdlet
Sigma detected: System File Execution Location Anomaly
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses the Telegram API (likely for C&C communication)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Costura Assembly Loader
Yara detected Phantom stealer
Yara detected Powershell decode and execute
Yara detected Strela Stealer
Yara detected Telegram RAT
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1800425
Sample:
SWIFT Ref No TT 00189330982...
Startdate:
23/10/2025
Architecture:
WINDOWS
Score:
100
70
api.telegram.org
2->70
72
prod.classify-client.prod.webservices.mozgcp.net
2->72
74
icanhazip.com
2->74
96
Suricata IDS alerts
for network traffic
2->96
98
Found malware configuration
2->98
100
Malicious sample detected
(through community Yara
rule)
2->100
104
24 other signatures
2->104
13
wscript.exe
1
2->13
started
17
powershell.exe
2->17
started
19
powershell.exe
2->19
started
signatures3
102
Uses the Telegram API
(likely for C&C
communication)
70->102
process4
file5
68
C:\Users\Public\StableBuilding.bat, ASCII
13->68
dropped
124
Wscript starts Powershell
(via cmd or directly)
13->124
126
Windows Scripting host
queries suspicious COM
object (likely to drop
second stage)
13->126
128
Suspicious execution
chain found
13->128
130
Creates processes via
WMI
13->130
21
cmd.exe
1
13->21
started
132
Powershell is started
from unusual location
(likely to bypass HIPS)
17->132
134
Reads the Security eventlog
17->134
136
Reads the System eventlog
17->136
24
conhost.exe
17->24
started
26
conhost.exe
19->26
started
signatures6
process7
signatures8
106
Suspicious powershell
command line found
21->106
108
Wscript starts Powershell
(via cmd or directly)
21->108
28
cmd.exe
1
21->28
started
30
conhost.exe
21->30
started
process9
process10
32
cmd.exe
2
28->32
started
signatures11
92
Suspicious powershell
command line found
32->92
94
Wscript starts Powershell
(via cmd or directly)
32->94
35
powershell.exe
26
63
32->35
started
40
conhost.exe
32->40
started
process12
dnsIp13
76
api.telegram.org
149.154.167.220, 443, 49735, 49741
TELEGRAMRU
United Kingdom
35->76
78
icanhazip.com
104.16.184.241, 49740, 80
CLOUDFLARENETUS
United States
35->78
66
C:\Users\user\AppData\...\powershell.exe, PE32+
35->66
dropped
110
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
35->110
112
Found many strings related
to Crypto-Wallets (likely
being stolen)
35->112
114
Creates autostart registry
keys with suspicious
values (likely registry
only malware)
35->114
116
9 other signatures
35->116
42
firefox.exe
1
35->42
started
44
msedge.exe
18
417
35->44
started
48
msedge.exe
35->48
injected
50
2 other processes
35->50
file14
signatures15
process16
dnsIp17
52
firefox.exe
3
46
42->52
started
90
239.255.255.250
unknown
Reserved
44->90
122
Writes to foreign memory
regions
44->122
56
msedge.exe
44->56
started
58
msedge.exe
44->58
started
60
msedge.exe
44->60
started
signatures18
process19
dnsIp20
80
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216, 443, 49694
GOOGLEUS
United States
52->80
82
127.0.0.1
unknown
unknown
52->82
118
Monitors registry run
keys for changes
52->118
120
Installs a global keyboard
hook
52->120
62
firefox.exe
1
52->62
started
64
firefox.exe
1
52->64
started
84
part-0013.t-0009.t-msedge.net
13.107.213.41, 443, 49705, 49732
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
56->84
86
13.91.222.61, 443, 49729
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
56->86
88
30 other IPs or domains
56->88
signatures21
process22
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.