F6 Experts Discover New Phantom Stealer

F6 Experts Discover New Phantom Stealer

In June 2025, researchers identified a new wave of malicious activity they dubbed Phantom Papa. Threat actors were distributing emails in both Russian and English, with attachments that delivered a new stealer malware called Phantom.

Technical Capabilities

Phantom is built on the codebase of Stealerium, a known stealer, and is designed to harvest a wide range of sensitive data. Its capabilities include:

  • Stealing passwords, banking credentials, and cryptocurrency wallet information
  • Extracting data from browsers and messengers
  • Recording keystrokes through a built-in keylogger
  • Evading detection with anti-analysis features and obfuscation support
  • Establishing persistence through auto-start mechanisms

For exfiltration, the malware supports multiple channels, including Telegram, Discord, and SMTP.

Distribution and Infrastructure

According to researchers, Phantom is distributed through a website registered in February 2025. The site advertises several related products, including Phantom Crypter, Phantom Stealer Advanced, and Phantom Stealer Basic.

Victims were targeted across multiple industries—retail, construction, IT, and manufacturing. Logs revealed IP addresses of infected devices in 19 countries, among them the United States, Russia, the UK, Romania, Spain, Hungary, Kazakhstan, Azerbaijan, Estonia, Serbia, Switzerland, Singapore, and Belarus. Researchers cautioned that some of the identified IPs belonged to virtual machines used for analysis.

Email Lures

Attackers used a mix of crude and conventional phishing lures. Some messages carried sensational subjects such as “See My Nude Pictures and Videos” (or the Russian equivalent, clearly machine-translated), while others mimicked financial correspondence like “Attached copy of payment No. 06162025.”

The malicious attachments were RAR archives containing .img or .iso files. When opened, the mounted images exposed executable files, which deployed Phantom on the victim’s machine.

Data Collection and Exfiltration

Once executed, Phantom collects extensive system information, including:

  • Windows version, PC name, and system language
  • CPU, GPU, RAM, battery, and screen details
  • Webcam presence and antivirus detection

It also harvests cookies, passwords, bank card data, documents, and images. All collected information is funneled to a Telegram bot named papaobilogs, which has been active since at least April 2025. This link gave rise to the campaign’s nickname, Phantom Papa.

Persistence and Modules

To maintain access, Phantom copies itself to:

  • %APPDATA%\iWlfdcmimm.exe
  • %TEMP%\tmpB043.tmp

It also creates a delayed task in Windows Task Scheduler.

Beyond its standard modules, researchers highlighted one particularly unusual feature: PornDetector. This module monitors active windows for keywords such as “porn,” “sex,” “hentai,” or “chaturbate.” If detected, it:

  1. Takes a screenshot of the desktop, saving it under %LOCALAPPDATA%\[0-9a-f]{32}\logs\nsfw\...
  2. Waits 12 seconds and, if the same window remains active, captures an image from the webcam, storing it in the same directory.