MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 a1040d14f8935d6410d04810c376793497982fd2fa5e3647c08ad5ff6110fd6e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
PhantomStealer
Vendor detections: 18
| SHA256 hash: | a1040d14f8935d6410d04810c376793497982fd2fa5e3647c08ad5ff6110fd6e |
|---|---|
| SHA3-384 hash: | 5561c0e144ab04ffe29c4bdcef772f1a9fba89117158e56bd7d7399a3e69c3b5d9369e028f453c99fb453632b7210f20 |
| SHA1 hash: | e9a17cfbd76d3523eefed5d8987f41bccf095b1b |
| MD5 hash: | 549658df6b87fecdb5b5e908a9c988e0 |
| humanhash: | video-hydrogen-coffee-mango |
| File name: | RFQ-MORE MORE(TPO)-TU-202311-100216 .exe |
| Download: | download sample |
| Signature | PhantomStealer |
| File size: | 1'271'808 bytes |
| First seen: | 2025-10-31 07:58:25 UTC |
| Last seen: | 2025-11-06 11:42:11 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger) |
| ssdeep | 24576:xaf4mPN6C2W8pTVwjf11Uqsll6IJrjxKKQoK2kAfzjLoKm+vEf:6HPKFpTSqqsllPvMloPfbvs |
| Threatray | 124 similar samples on MalwareBazaar |
| TLSH | T16F4512583654F05EC4A3D631D9B0EEB0A6257DAB9323C20791D71DAF792CA97CE102B3 |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | exe PhantomStealer |
Intelligence
File Origin
DEVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
22a1315d09e163782edf1fe15c4d1de97c4c960538020872a5ba9b806b4cb0be
8ad7904bf7a48782b456c9a798f2ebab640ffbb845a83fc23ef61ce4b6b60012
ff0c5f600ec9620c472ce25dcb744e0d3209e7009b17cce823fcad577610e783
793723c3e6bb1cc0a7d3500d8204e069bd783288e6579c8d5929f4239935439b
a1040d14f8935d6410d04810c376793497982fd2fa5e3647c08ad5ff6110fd6e
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.