Skip to content
← All malware

Phantom Stealer

According to Proofpoint, this is a fork of Stealerium that has high overlap with its originating codebase.

Last 7 days

Mar 2, 2026
SHAs
1
C2 Total
1
C2 Unique
1
C2 New
1

Behavioral Tags

persistence100%execution100%discovery100%collection100%stealer100%

MITRE ATT&CK Techniques

T1059.001PowerShell
100%

Adversaries may abuse PowerShell commands and scripts for execution.

T1059.007JavaScript
100%

Adversaries may abuse various implementations of JavaScript for execution.

T1012Query Registry
100%

Adversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software.

T1082System Information Discovery
100%

An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture.

T1114Email Collection
100%

Adversaries may target user email to collect sensitive information.

T1124System Time Discovery
100%

An adversary may gather the system time and/or time zone settings from a local or remote system.

T1614.001System Language Discovery
100%

Adversaries may attempt to gather information about the system language of a victim in order to infer the geographical location of that host.

Port Distribution

443100% · 1 hosts