Phantom Stealer
According to Proofpoint, this is a fork of Stealerium that has high overlap with its originating codebase.
Last 7 days
- SHAs
- 1
- C2 Total
- 1
- C2 Unique
- 1
- C2 New
- 1
| Date | SHAs | C2 Total | C2 Unique | C2 New |
|---|---|---|---|---|
| Mar 2, 2026 | 1 | 1 | 1 | 1 |
Behavioral Tags
MITRE ATT&CK Techniques
Adversaries may abuse PowerShell commands and scripts for execution.
Adversaries may abuse various implementations of JavaScript for execution.
Adversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software.
An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture.
Adversaries may target user email to collect sensitive information.
An adversary may gather the system time and/or time zone settings from a local or remote system.
Adversaries may attempt to gather information about the system language of a victim in order to infer the geographical location of that host.