MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 eb39e97c5c106d34d5ac48ecd629614df3f798ff936535ba8a18b2532712590f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



PhantomStealer


Vendor detections: 17


Intelligence 17 IOCs YARA 4 File information Comments

SHA256 hash: eb39e97c5c106d34d5ac48ecd629614df3f798ff936535ba8a18b2532712590f
SHA3-384 hash: 62f59d36c2933340f02a1e2a40c2e1783504712b37a9f537c7766e4ab8cc5fc302296bfe7440005b3d3c1a071522105e
SHA1 hash: 9a44ffb33b4bb3c14d56328c144e098f6cc77b38
MD5 hash: f1557405ac36aa0506b9b7f0df7a680e
humanhash: gee-autumn-bravo-bacon
File name:eb39e97c5c106d34d5ac48ecd629614df3f798ff936535ba8a18b2532712590f
Download: download sample
Signature PhantomStealer
File size:1'542'144 bytes
First seen:2026-02-03 16:37:26 UTC
Last seen:2026-02-03 17:30:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'755 x AgentTesla, 19'664 x Formbook, 12'252 x SnakeKeylogger)
ssdeep 24576:RddNizyYim+BpbFmbjra4oZqHyKZG0EnEDsi4VfPuw61ZD0QK5ZNx6I1HAEfYx:rSZgxmPra4ocHrGqcVfGwc10f5ZN5hAX
Threatray 334 similar samples on MalwareBazaar
TLSH T1AA6523996045CD13CAEB133016B2E7715379ADADAA13D3218FE9EEE73A013B07D18752
TrID 33.1% (.EXE) Win64 Executable (generic) (10522/11/4)
20.7% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
14.1% (.EXE) Win32 Executable (generic) (4504/4/1)
6.5% (.EXE) Win16/32 Executable Delphi generic (2072/23)
6.4% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter Neiki
Tags:exe PhantomStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
115
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
f1557405ac36aa0506b9b7f0df7a680e.exe
Verdict:
Malicious activity
Analysis date:
2026-02-03 16:32:58 UTC
Tags:
phantom stealer crypto-regex evasion auto-startup susp-lnk

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
autorun virus micro msil
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Connection attempt
Sending a custom TCP request
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Launching a process
Creating a file
Using the Windows Management Instrumentation requests
Forced shutdown of a system process
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
krypt obfuscated packed reconnaissance
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-02-03T06:27:00Z UTC
Last seen:
2026-02-03T14:21:00Z UTC
Hits:
~100
Detections:
PDM:Trojan.Win32.Generic HEUR:Trojan.MSIL.PowerShell.gen VHO:Backdoor.Win32.Androm.gen
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Xworm
Status:
Malicious
First seen:
2026-02-03 13:14:28 UTC
File Type:
PE (.Net Exe)
Extracted files:
4
AV detection:
20 of 38 (52.63%)
Threat level:
  5/5
Result
Malware family:
phantom_stealer
Score:
  10/10
Tags:
family:phantom_stealer collection discovery persistence stealer
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
outlook_office_path
outlook_win_path
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Time Discovery
Drops file in Windows directory
SmartAssembly .NET packer
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Drops startup file
Detects PhantomStealer payload
PhantomStealer
Phantom_stealer family
Unpacked files
SH256 hash:
eb39e97c5c106d34d5ac48ecd629614df3f798ff936535ba8a18b2532712590f
MD5 hash:
f1557405ac36aa0506b9b7f0df7a680e
SHA1 hash:
9a44ffb33b4bb3c14d56328c144e098f6cc77b38
SH256 hash:
7574aad8b457abdd1f45b8181ba85496d47718e3e0e246a303061d9c86e3c57c
MD5 hash:
6ef9af68e2076a646975f7f9dd6475f6
SHA1 hash:
0e5c86acb143b0f27bfb385f28d50b26c6c5bf80
SH256 hash:
264f6c56e64e7f056e9a405e9b89a8d62a33c219df90f420b6a8c4aaa0ddf3ea
MD5 hash:
92fab9cbbd05b75fed4cc58012354e61
SHA1 hash:
411c2744672849a14b3761114eb7a4e32540215f
Detections:
phantom_stealer cn_utf8_windows_terminal INDICATOR_EXE_Packed_Fody INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store INDICATOR_SUSPICIOUS_EXE_SandboxUserNames INDICATOR_SUSPICIOUS_EXE_TelegramChatBot INDICATOR_SUSPICIOUS_EXE_WirelessNetReccon INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs INDICATOR_SUSPICIOUS_EXE_SandboxComputerNames
SH256 hash:
cff92df03ab5bb5107a1d47d78c3a5a5437ce21987e7f2be102468334cf05bfb
MD5 hash:
ba3e8fbc0bdafab16a599c7520a4925c
SHA1 hash:
95fdf283962743a60e1e0ef54b650fe62e32c3ec
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24
Malware family:
PhantomStealer
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments