Threat name:
Phantom stealer, Strela Stealer
Alert
Classification:
rans.troj.spyw.expl.evad
.NET source code contains potential unpacker
.NET source code contains process injector
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
AI detected malicious Powershell script
Allocates memory in foreign processes
Bypasses PowerShell execution policy
Connects to a pastebin service (likely for C&C)
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Creates a thread in another existing process (thread injection)
Creates autostart registry keys with suspicious names
Creates autostart registry keys with suspicious values (likely registry only malware)
Creates multiple autostart registry keys
Encrypted powershell cmdline option found
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Monitors registry run keys for changes
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: Potential Startup Shortcut Persistence Via PowerShell.EXE
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Rare Remote Thread Creation By Uncommon Source Image
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Silenttrinity Stager Msbuild Activity
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Suspicious execution chain found
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript called in batch mode (surpress errors)
Wscript starts Powershell (via cmd or directly)
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Yara detected Phantom stealer
Yara detected Powershell download and execute
Yara detected Strela Stealer
behaviorgraph
top1
dnsIp2
2
Behavior Graph
ID:
1790871
Sample:
OAAAA.vbs
Startdate:
07/10/2025
Architecture:
WINDOWS
Score:
100
127
pastebin.com
2->127
129
api.telegram.org
2->129
131
10 other IPs or domains
2->131
153
Suricata IDS alerts
for network traffic
2->153
155
Found malware configuration
2->155
157
Malicious sample detected
(through community Yara
rule)
2->157
163
27 other signatures
2->163
13
wscript.exe
1
2->13
started
16
powershell.exe
2->16
started
18
powershell.exe
2->18
started
20
3 other processes
2->20
signatures3
159
Connects to a pastebin
service (likely for
C&C)
127->159
161
Uses the Telegram API
(likely for C&C
communication)
129->161
process4
signatures5
205
Suspicious powershell
command line found
13->205
207
Wscript starts Powershell
(via cmd or directly)
13->207
209
Uses schtasks.exe or
at.exe to add and modify
task schedules
13->209
213
2 other signatures
13->213
22
powershell.exe
7
13->22
started
25
schtasks.exe
1
13->25
started
27
schtasks.exe
1
13->27
started
29
wscript.exe
16->29
started
31
conhost.exe
16->31
started
33
wscript.exe
18->33
started
35
conhost.exe
18->35
started
211
Wscript called in batch
mode (surpress errors)
20->211
37
conhost.exe
20->37
started
39
3 other processes
20->39
process6
signatures7
167
Suspicious powershell
command line found
22->167
169
Found many strings related
to Crypto-Wallets (likely
being stolen)
22->169
171
Encrypted powershell
cmdline option found
22->171
175
3 other signatures
22->175
41
powershell.exe
14
18
22->41
started
45
conhost.exe
22->45
started
47
conhost.exe
25->47
started
49
conhost.exe
27->49
started
173
Wscript starts Powershell
(via cmd or directly)
29->173
51
powershell.exe
29->51
started
54
powershell.exe
33->54
started
process8
dnsIp9
139
dpaste.org
104.20.36.119, 443, 49691, 49693
CLOUDFLARENETUS
United States
41->139
141
pastebin.com
172.66.171.73, 443, 49690, 49692
CLOUDFLARENETUS
United States
41->141
121
C:\Users\user\AppData\Local\Temp\nAvER.ps1, Unicode
41->121
dropped
56
powershell.exe
15
41->56
started
165
Wscript called in batch
mode (surpress errors)
51->165
60
conhost.exe
51->60
started
62
wscript.exe
51->62
started
64
conhost.exe
54->64
started
66
wscript.exe
54->66
started
file10
signatures11
process12
file13
117
__________________...________-------.lnk, MS
56->117
dropped
119
C:\Users\user\AppData\Local\Temp\xx2.vbs, ASCII
56->119
dropped
197
Found many strings related
to Crypto-Wallets (likely
being stolen)
56->197
199
Writes to foreign memory
regions
56->199
201
Injects a PE file into
a foreign processes
56->201
68
MSBuild.exe
16
107
56->68
started
73
powershell.exe
23
56->73
started
75
MSBuild.exe
56->75
started
77
2 other processes
56->77
signatures14
process15
dnsIp16
133
ftp.tetraatech.com
199.188.201.183, 21, 49759
NAMECHEAP-NETUS
United States
68->133
135
api.telegram.org
149.154.167.220, 443, 49754, 49757
TELEGRAMRU
United Kingdom
68->135
137
icanhazip.com
104.16.184.241, 49756, 49758, 80
CLOUDFLARENETUS
United States
68->137
109
C:\Users\user\AppData\...\ZQIXMVQGAH.pdf, ASCII
68->109
dropped
111
C:\Users\user\AppData\...\VAMYDFPUND.docx, ASCII
68->111
dropped
113
C:\Users\user\AppData\...\UOOJJOZIRH.docx, ASCII
68->113
dropped
115
3 other files (2 malicious)
68->115
dropped
177
Tries to steal Mail
credentials (via file
/ registry access)
68->177
179
Creates multiple autostart
registry keys
68->179
181
Tries to harvest and
steal browser information
(history, passwords,
etc)
68->181
189
5 other signatures
68->189
79
firefox.exe
68->79
started
81
msedge.exe
68->81
started
84
chrome.exe
68->84
started
89
10 other processes
68->89
183
Loading BitLocker PowerShell
Module
73->183
86
powershell.exe
1
11
73->86
started
185
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
75->185
187
Switches to a custom
stack to bypass stack
traces
75->187
file17
signatures18
process19
dnsIp20
91
firefox.exe
79->91
started
123
192.168.2.5, 138, 21, 443
unknown
unknown
81->123
125
239.255.255.250
unknown
Reserved
81->125
95
msedge.exe
81->95
started
97
setup.exe
81->97
started
99
msedge.exe
81->99
started
101
msedge.exe
81->101
started
191
Creates autostart registry
keys with suspicious
values (likely registry
only malware)
86->191
193
Creates autostart registry
keys with suspicious
names
86->193
195
Creates multiple autostart
registry keys
86->195
signatures21
process22
dnsIp23
143
prod.classify-client.prod.webservices.mozgcp.net
35.190.72.216, 443, 49701
GOOGLEUS
United States
91->143
145
127.0.0.1
unknown
unknown
91->145
203
Monitors registry run
keys for changes
91->203
103
firefox.exe
91->103
started
105
firefox.exe
91->105
started
147
part-0013.t-0009.fb-t-msedge.net
13.107.226.41, 443, 49718
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
95->147
149
13.107.253.41, 443, 49731, 49732
MICROSOFT-CORP-MSN-AS-BLOCKUS
United States
95->149
151
37 other IPs or domains
95->151
107
setup.exe
97->107
started
signatures24
process25
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.