MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b5e1c67dee17674abd3bb018b8cc80fc8c7524261f905a24ee38f341a382adba. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PhantomStealer


Vendor detections: 18


Intelligence 18 IOCs YARA 6 File information Comments

SHA256 hash: b5e1c67dee17674abd3bb018b8cc80fc8c7524261f905a24ee38f341a382adba
SHA3-384 hash: 76dea5f5c832b4499d319bdfe370a51de2b007b7c90c0fe7256bc1b8012e85135f634686e8dc2c5de469312d700cdda4
SHA1 hash: b9925eb81773022087c6ada5e067fe020ae73b9e
MD5 hash: d3748f7cb99d9d8ad8bda106fa6c6523
humanhash: eight-chicken-artist-gee
File name:KAI-057 25 FOR CMP CHARGES INVOICE.exe
Download: download sample
Signature PhantomStealer
File size:1'304'584 bytes
First seen:2025-09-25 08:05:37 UTC
Last seen:2025-10-09 14:43:16 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'599 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 24576:cZr9qePMZv8chxNPnT5D/xjsj8303q82e5KD1UpdysPDa:cZr9qbZvvijo03ql1UG
Threatray 59 similar samples on MalwareBazaar
TLSH T12155121232E8E701D0B39BF40570D3751B75AFA4A422D34E4DE6ACEF3C66F012A5969B
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter cocaman
Tags:exe INVOICE PhantomStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
104
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
b5e1c67dee17674abd3bb018b8cc80fc8c7524261f905a24ee38f341a382adba.exe
Verdict:
Malicious activity
Analysis date:
2025-09-25 08:30:21 UTC
Tags:
auto-sch-xml stealer evasion phantom crypto-regex

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
infosteal redline emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
invalid-signature masquerade obfuscated packed packed packer_detected signed
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-09-24T10:52:00Z UTC
Last seen:
2025-09-24T10:52:00Z UTC
Hits:
~1000
Result
Threat name:
Phantom stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains process injector
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
AI detected suspicious PE digital signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Creates a thread in another existing process (thread injection)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Monitors registry run keys for changes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Scheduled temp file as task from temp location
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected Phantom stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1783824 Sample: KAI-057 25 FOR CMP CHARGES ... Startdate: 25/09/2025 Architecture: WINDOWS Score: 100 73 mail.honesty-shippings.com 2->73 75 youtube-ui.l.google.com 2->75 77 76 other IPs or domains 2->77 89 Found malware configuration 2->89 91 Antivirus detection for URL or domain 2->91 93 Sigma detected: Scheduled temp file as task from temp location 2->93 95 20 other signatures 2->95 9 KAI-057 25 FOR CMP CHARGES INVOICE.exe 7 2->9         started        13 YvTqAUs.exe 5 2->13         started        15 firefox.exe 2->15         started        17 2 other processes 2->17 signatures3 process4 file5 61 C:\Users\user\AppData\Roaming\YvTqAUs.exe, PE32 9->61 dropped 63 C:\Users\user\...\YvTqAUs.exe:Zone.Identifier, ASCII 9->63 dropped 65 C:\Users\user\AppData\Local\...\tmpA122.tmp, XML 9->65 dropped 67 KAI-057 25 FOR CMP...GES INVOICE.exe.log, ASCII 9->67 dropped 109 Found many strings related to Crypto-Wallets (likely being stolen) 9->109 111 Adds a directory exclusion to Windows Defender 9->111 113 Injects a PE file into a foreign processes 9->113 19 KAI-057 25 FOR CMP CHARGES INVOICE.exe 25 12 9->19         started        23 powershell.exe 23 9->23         started        25 powershell.exe 23 9->25         started        34 2 other processes 9->34 115 Multi AV Scanner detection for dropped file 13->115 27 schtasks.exe 13->27         started        29 YvTqAUs.exe 13->29         started        36 2 other processes 13->36 31 firefox.exe 15->31         started        38 2 other processes 17->38 signatures6 process7 dnsIp8 79 mail.honesty-shippings.com 185.253.219.190, 25 SERVERIUS-ASNL Ukraine 19->79 81 icanhazip.com 104.16.184.241, 49698, 80 CLOUDFLARENETUS United States 19->81 97 Tries to steal Mail credentials (via file / registry access) 19->97 99 Tries to harvest and steal browser information (history, passwords, etc) 19->99 101 Writes to foreign memory regions 19->101 105 3 other signatures 19->105 40 msedge.exe 19->40         started        43 chrome.exe 19->43         started        55 3 other processes 19->55 103 Loading BitLocker PowerShell Module 23->103 45 conhost.exe 23->45         started        47 WmiPrvSE.exe 23->47         started        49 conhost.exe 25->49         started        51 conhost.exe 27->51         started        83 pki-goog.l.google.com 142.250.73.131, 49708, 80 GOOGLEUS United States 31->83 85 prod.detectportal.prod.cloudops.mozgcp.net 34.107.221.82, 49699, 49702, 49751 GOOGLEUS United States 31->85 87 14 other IPs or domains 31->87 69 C:\Users\user\AppData\...\gmpopenh264.dll.tmp, PE32+ 31->69 dropped 71 C:\Users\user\...\gmpopenh264.dll (copy), PE32+ 31->71 dropped 57 3 other processes 31->57 53 conhost.exe 34->53         started        file9 signatures10 process11 signatures12 107 Monitors registry run keys for changes 40->107 59 msedge.exe 40->59         started        process13
Verdict:
inconclusive
YARA:
10 match(es)
Tags:
.Net Executable Managed .NET PDB Path PE (Portable Executable) PE File Layout SOS: 0.16 Win 32 Exe x86
Threat name:
Win32.Trojan.Kepavll
Status:
Malicious
First seen:
2025-09-24 14:59:48 UTC
File Type:
PE (.Net Exe)
Extracted files:
33
AV detection:
26 of 38 (68.42%)
Threat level:
  5/5
Result
Malware family:
phantomstealer
Score:
  10/10
Tags:
family:phantomstealer collection defense_evasion discovery execution persistence spyware stealer trojan
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
outlook_office_path
outlook_win_path
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Checks computer location settings
Reads user/profile data of web browsers
Command and Scripting Interpreter: PowerShell
Phantomstealer family
Unpacked files
SH256 hash:
b5e1c67dee17674abd3bb018b8cc80fc8c7524261f905a24ee38f341a382adba
MD5 hash:
d3748f7cb99d9d8ad8bda106fa6c6523
SHA1 hash:
b9925eb81773022087c6ada5e067fe020ae73b9e
SH256 hash:
170e433c1becc80a7701835be9854e9f9879bab531e8192c12a446e57f27fc04
MD5 hash:
bead339b4fc93600197cad38b53e29a7
SHA1 hash:
1dbb7009b201b0b4dff8357c8a99247ea599749d
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
f8772a891d48e421ad92cf3a0902466fd11dec45159e462dc81f5ed2a2f25bed
MD5 hash:
f4d89044a3ff5fbfacf914c0aab018ec
SHA1 hash:
3950e276187005aa487c4578935f7958a313e95f
Detections:
cn_utf8_windows_terminal INDICATOR_EXE_Packed_Fody INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_SandboxUserNames INDICATOR_SUSPICIOUS_EXE_TelegramChatBot INDICATOR_SUSPICIOUS_EXE_WirelessNetReccon INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs INDICATOR_SUSPICIOUS_EXE_SandboxComputerNames
SH256 hash:
3a8235adcf5c014204b3c7f9bc74cdc5628617fbca4edfd0a89e61bd368598d3
MD5 hash:
805ed8b902bad1be7788a1f25a33f7c1
SHA1 hash:
d7c02f99910d58990504e561694d74e90fd872c5
Malware family:
PhantomStealer
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:INDICATOR_KB_CERT_7c1118cbbadc95da3752c46e47a27438
Author:ditekSHen
Description:Detects executables signed with stolen, revoked or invalid certificates
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

PhantomStealer

Executable exe b5e1c67dee17674abd3bb018b8cc80fc8c7524261f905a24ee38f341a382adba

(this sample)

Comments