MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a0ab3811cfb62377b0c9cfcc5559858f8da49830cc93df5339e145458f216ea5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PhantomStealer


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: a0ab3811cfb62377b0c9cfcc5559858f8da49830cc93df5339e145458f216ea5
SHA3-384 hash: 7cdb6262260103fd29313572c00e4542791ffb521e92f13b8efab063f0602cec6c6ede3b6e0ac9a8463350cf536aca78
SHA1 hash: 7a6d6d6fe50f5a380ec28a49c803c8baacf3c7df
MD5 hash: f5ec5a2c76d99fb68aade05a9528b50c
humanhash: avocado-london-gee-rugby
File name:nOriginal_Shipping_Documents_tar.xz
Download: download sample
Signature PhantomStealer
File size:1'463'620 bytes
First seen:2026-02-03 07:30:11 UTC
Last seen:Never
File type: xz
MIME type:application/x-xz
ssdeep 24576:U3sbYadU+lYteOlSejCKvfAECZl0BSURUpPHn1MSR7HpCJLlBq8iMoU39nEnpTGv:U3ss+U+zkCKv46BzkH7BHpcgMoA94Tjo
TLSH T18565334BCC4AEC1E74AE9EF7935C8DB0A51810D536A1B79C2D0152A11EEB3CCB9FDA14
TrID 85.7% (.XZ) xz compressed container (6000/1)
14.2% (.) QuickBasic BSAVE binary data (1000/1)
Magika xz
Reporter FXOLabs
Tags:PhantomStealer xz

Intelligence


File Origin
# of uploads :
1
# of downloads :
40
Origin country :
BR BR
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Original Shipping Documents.exe
File size:1'534'464 bytes
SHA256 hash: 63658745db86950d8f70f2cb1739f142b4d42d24153608e500fbcb5225065fd9
MD5 hash: 23d97bf4cea8883bcd12b24b3df824ed
MIME type:application/x-dosexec
Signature PhantomStealer
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
92.5%
Tags:
spawn virus spam hype
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2026-02-03 06:58:21 UTC
File Type:
Binary (Archive)
Extracted files:
6
AV detection:
11 of 24 (45.83%)
Threat level:
  5/5
Result
Malware family:
phantom_stealer
Score:
  10/10
Tags:
family:phantom_stealer collection discovery persistence stealer
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
outlook_office_path
outlook_win_path
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
System Time Discovery
Drops file in Program Files directory
Drops file in Windows directory
SmartAssembly .NET packer
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Detects PhantomStealer payload
PhantomStealer
Phantom_stealer family
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

PhantomStealer

xz a0ab3811cfb62377b0c9cfcc5559858f8da49830cc93df5339e145458f216ea5

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments