MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d96541e0ccbe6b139e9cc92a198fbe5e759e37369ad0fa0233828afefe8cdd34. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
PhantomStealer
Vendor detections: 18
| SHA256 hash: | d96541e0ccbe6b139e9cc92a198fbe5e759e37369ad0fa0233828afefe8cdd34 |
|---|---|
| SHA3-384 hash: | 1593096fc05593aeb13731d71331161a894be82a2559123ab8b0bc04ba1d27b92b7f475144cebaec2dec8adb709fb7f4 |
| SHA1 hash: | 7764659945201c3156bb4fb144d43ecc527b418d |
| MD5 hash: | ad599034517a0da93cc741038eec87f0 |
| humanhash: | blossom-nebraska-hamper-hot |
| File name: | 2FW25 Bulk Dec pre buy order.exe |
| Download: | download sample |
| Signature | PhantomStealer |
| File size: | 1'190'912 bytes |
| First seen: | 2025-11-10 12:53:02 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 24576:Xc+bwEGTfnUyFoPMzwMSKZWgh5ysJwj7GYu:JmnUyodiHh5vJwj |
| Threatray | 162 similar samples on MalwareBazaar |
| TLSH | T17445235571D8CA23C5F297F46CB2D2350370AC1AA931E22E5EE96EE37E317009C54B9B |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10522/11/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Magika | pebin |
| Reporter | |
| Tags: | exe PhantomStealer |
Intelligence
File Origin
CHVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | CP_Script_Inject_Detector |
|---|---|
| Author: | DiegoAnalytics |
| Description: | Detects attempts to inject code into another process across PE, ELF, Mach-O binaries |
| Rule name: | DebuggerCheck__QueryInfo |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DetectEncryptedVariants |
|---|---|
| Author: | Zinyth |
| Description: | Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded |
| Rule name: | FreddyBearDropper |
|---|---|
| Author: | Dwarozh Hoshiar |
| Description: | Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip. |
| Rule name: | grakate_stealer_nov_2021 |
|---|
| Rule name: | INDICATOR_EXE_Packed_Fody |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables manipulated with Fody |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs |
|---|---|
| Author: | ditekSHen |
| Description: | Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SandboxComputerNames |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing possible sandbox analysis VM names |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SandboxUserNames |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing possible sandbox analysis VM usernames |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_TelegramChatBot |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables using Telegram Chat Bot |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_WirelessNetReccon |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables with interest in wireless interface using netsh |
| Rule name: | Lumma_Stealer_Detection |
|---|---|
| Author: | ashizZz |
| Description: | Detects a specific Lumma Stealer malware sample using unique strings and behaviors |
| Reference: | https://seanthegeek.net/posts/compromized-store-spread-lumma-stealer-using-fake-captcha/ |
| Rule name: | Macos_Infostealer_Wallets_8e469ea0 |
|---|---|
| Author: | Elastic Security |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_CMD_Powershell_Usage |
|---|---|
| Author: | XiAnzheng |
| Description: | May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP) |
| Rule name: | Windows_Generic_Threat_f57e5e2a |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_Xeno_89f9f060 |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.