Skip to main content

Not Safe for Work: Tracking and Investigating Stealerium and Phantom Infostealers

Medium
Published: Thu Sep 04 2025 (09/04/2025, 00:59:16 UTC)
Source: AlienVault OTX General

Description

Proofpoint researchers have observed an increase in cybercriminals using Stealerium-based malware, an open-source infostealer available on GitHub. Multiple stealers share code with Stealerium, including Phantom Stealer. Campaigns delivering Stealerium have used various lures and file types, targeting industries like hospitality, education, and finance. The malware can exfiltrate a wide range of data, including browser credentials, credit card info, and crypto wallet data. It uses anti-analysis techniques and can exfiltrate data through multiple channels like SMTP, Discord, and Telegram. The rise in Stealerium usage reflects the growing trend of threat actors pivoting to information stealers as identity theft becomes a priority.

AI-Powered Analysis

AILast updated: 09/04/2025, 10:19:36 UTC

Technical Analysis

Stealerium and Phantom Stealer represent a class of open-source infostealer malware that has been increasingly observed in cybercriminal operations. Stealerium, available on GitHub, serves as a base code for multiple infostealers including Phantom Stealer, indicating code reuse and modular development within threat actor communities. These malware families are designed to exfiltrate sensitive user information such as browser credentials, credit card details, and cryptocurrency wallet data. The campaigns leveraging Stealerium employ diverse social engineering lures and file types to target sectors including hospitality, education, and finance, which are known for handling valuable personal and financial data. Technically, these stealers incorporate anti-analysis techniques to evade detection and forensic examination, complicating incident response efforts. Data exfiltration is conducted through multiple channels, notably SMTP email, Discord, and Telegram, which allows flexible and covert communication with command and control infrastructure. The malware also integrates keylogging capabilities (e.g., Snake keylogger) and uses various MITRE ATT&CK techniques such as credential dumping (T1555), process discovery (T1057), and obfuscated files or information (T1027). The rise in Stealerium usage reflects a broader trend where cybercriminals prioritize identity theft and data theft, leveraging open-source tools to lower the barrier for attack deployment. Although no known exploits in the wild have been reported, the availability of source code and active campaigns suggest a persistent and evolving threat landscape.

Potential Impact

For European organizations, the impact of Stealerium and Phantom Stealer is significant due to the sensitive nature of the targeted data and the sectors affected. Hospitality, education, and finance industries in Europe handle large volumes of personal data protected under GDPR, meaning breaches can lead to severe regulatory penalties and reputational damage. The theft of browser credentials and crypto wallet information can facilitate further fraud, unauthorized financial transactions, and identity theft, potentially affecting both individuals and enterprises. The use of multiple exfiltration channels complicates detection and containment, increasing the risk of prolonged data exposure. Additionally, the anti-analysis features hinder timely incident response and forensic investigations, potentially allowing attackers to maintain persistence and expand their foothold. Given Europe's strong regulatory environment and the high value of personal and financial data, organizations face both direct operational risks and indirect legal and compliance consequences. The targeting of education and hospitality sectors also raises concerns about the protection of vulnerable user populations and transient customer data, respectively.

Mitigation Recommendations

European organizations should implement targeted mitigations beyond generic advice: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of detecting infostealer behaviors such as credential dumping, keylogging, and unusual outbound connections to SMTP, Discord, and Telegram domains. 2) Monitor network traffic for anomalous use of non-standard exfiltration channels, especially encrypted or obfuscated communications to known malicious domains like phantomsoftwares.site. 3) Harden email and web gateways to filter and block phishing lures and malicious attachments commonly used to deliver Stealerium payloads. 4) Enforce strict application whitelisting and restrict execution of unauthorized scripts or binaries, particularly those downloaded from untrusted sources or GitHub repositories. 5) Conduct regular credential hygiene practices including multi-factor authentication (MFA) enforcement, password rotation, and monitoring for credential reuse or compromise. 6) Implement user awareness training focused on recognizing social engineering tactics used in these campaigns. 7) Utilize threat intelligence feeds to update detection signatures and indicators of compromise (IOCs) such as the provided hashes and domains. 8) Establish incident response playbooks that include rapid forensic analysis to counter anti-analysis techniques and contain breaches swiftly. 9) Segment networks to limit lateral movement and data access in case of infection. 10) Regularly audit and patch systems to reduce attack surface, even though no specific vulnerabilities are exploited, to prevent secondary infection vectors.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.proofpoint.com/us/blog/threat-insight/not-safe-work-tracking-and-investigating-stealerium-and-phantom-infostealers"]
Adversary
TA2715
Pulse Id
68b8e464780a54c10f7adc54
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash024c6a6cd262b13e1f0438bf89cf84d8
hash86e5e63b28b53133e59e17cecc27b011
hashc742f9b4f1ad3336673662d7213a56ca
hash928623d974b49d989c30b968d8925172f18bed7b
hashe9fdc0060a78608b6768675f6473321f07350ee3
hash41700c8fe273e088932cc57d15ee86c281fd8d2e771f4e4bf77b0e2c387b8b23
hash50927b350c108e730dc4098bbda4d9d8e7c7833f43ab9704f819e631b1d981e3
hasha00fda931ab1a591a73d1a24c1b270aee0f31d6e415dfa9ae2d0f126326df4bb
hashb640251f82684d3b454a29e962c0762a38d8ac91574ae4866fe2736f9ddd676e
hashd4a33be36cd0905651ce69586542ae9bb5763feddc9d1af98e90ff86a6914c0e
hashe590552eea3ad225cfb6a33fd9a71f12f1861c8332a6f3a8e2050fffce93f45e

Url

ValueDescriptionCopy
urlhttps://phantomsoftwares.site/home/.

Domain

ValueDescriptionCopy
domainphantomsoftwares.site

Threat ID: 68b966f223d09a442447948f

Added to database: 9/4/2025, 10:16:18 AM

Last enriched: 9/4/2025, 10:19:36 AM

Last updated: 9/4/2025, 5:58:44 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats