Overview
overview
10Static
static
10Phxnt0m-ma...nux.sh
ubuntu-18.04-amd64
1Phxnt0m-ma...nux.sh
debian-9-armhf
1Phxnt0m-ma...nux.sh
debian-9-mips
1Phxnt0m-ma...nux.sh
debian-9-mipsel
1Phxnt0m-ma...0m.bat
windows7-x64
1Phxnt0m-ma...0m.bat
windows10-2004-x64
1Phxnt0m-ma...der.py
windows7-x64
3Phxnt0m-ma...der.py
windows10-2004-x64
3Phxnt0m-ma...ler.py
windows7-x64
3Phxnt0m-ma...ler.py
windows10-2004-x64
3Phxnt0m-ma...11.pyc
windows7-x64
3Phxnt0m-ma...11.pyc
windows10-2004-x64
3Phxnt0m-ma...11.pyc
windows7-x64
3Phxnt0m-ma...11.pyc
windows10-2004-x64
3Phxnt0m-ma...ber.py
windows7-x64
3Phxnt0m-ma...ber.py
windows10-2004-x64
3Phxnt0m-ma...ies.py
windows7-x64
3Phxnt0m-ma...ies.py
windows10-2004-x64
3Phxnt0m-ma...64.dll
windows7-x64
1Phxnt0m-ma...64.dll
windows10-2004-x64
1Phxnt0m-ma...isc.py
windows7-x64
3Phxnt0m-ma...isc.py
windows10-2004-x64
3Phxnt0m-ma...ber.py
windows7-x64
3Phxnt0m-ma...ber.py
windows10-2004-x64
3Phxnt0m-ma...ons.py
windows7-x64
3Phxnt0m-ma...ons.py
windows10-2004-x64
3Phxnt0m-ma...rol.py
windows7-x64
3Phxnt0m-ma...rol.py
windows10-2004-x64
3Phxnt0m-ma...put.py
windows7-x64
3Phxnt0m-ma...put.py
windows10-2004-x64
3Phxnt0m-ma...sod.py
windows7-x64
3Phxnt0m-ma...sod.py
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
30-07-2024 01:26
Behavioral task
behavioral1
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/Phxnt0m-linux.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/Phxnt0m-linux.sh
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/Phxnt0m-linux.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/Phxnt0m-linux.sh
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral5
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/Phxnt0m.bat
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/Phxnt0m.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/builder.py
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/builder.py
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/compiler.py
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/compiler.py
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/__pycache__/discord_token_grabber.cpython-311.pyc
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/__pycache__/discord_token_grabber.cpython-311.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/__pycache__/protections.cpython-311.pyc
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/__pycache__/protections.cpython-311.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/discord_token_grabber.py
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/discord_token_grabber.py
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/get_cookies.py
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/get_cookies.py
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/libopus-0.x64.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/libopus-0.x64.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/misc.py
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/misc.py
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/passwords_grabber.py
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/passwords_grabber.py
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/protections.py
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/protections.py
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/audio_control.py
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/audio_control.py
Resource
win10v2004-20240704-en
Behavioral task
behavioral29
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/block_input.py
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/block_input.py
Resource
win10v2004-20240729-en
Behavioral task
behavioral31
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/bsod.py
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/bsod.py
Resource
win10v2004-20240709-en
General
-
Target
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/block_input.py
-
Size
2KB
-
MD5
5f2bdcfdb6d04d162edbd0be7322ad95
-
SHA1
7284ac9b666a14210a4c9257c0fea1e9e2feaf27
-
SHA256
509b26dcd0ad875488bcbebb4d0a9bb8e54d1d05f3cd8b068022b85ab4a1728e
-
SHA512
2d08d4bfc2baa40b9c1a4d9d429f3330965ed4ecc4a6819f9601e898767adb45b9c03cce1c10cb6f1656b5fd6dc4bb37f4a989db5a44ec2f1d4916cc220c0311
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2704 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2704 AcroRd32.exe 2704 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2164 wrote to memory of 2720 2164 cmd.exe rundll32.exe PID 2164 wrote to memory of 2720 2164 cmd.exe rundll32.exe PID 2164 wrote to memory of 2720 2164 cmd.exe rundll32.exe PID 2720 wrote to memory of 2704 2720 rundll32.exe AcroRd32.exe PID 2720 wrote to memory of 2704 2720 rundll32.exe AcroRd32.exe PID 2720 wrote to memory of 2704 2720 rundll32.exe AcroRd32.exe PID 2720 wrote to memory of 2704 2720 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Phxnt0m-malware-main\Phxnt0mware RAT - main\resources\source_code\block_input.py"1⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Phxnt0m-malware-main\Phxnt0mware RAT - main\resources\source_code\block_input.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Phxnt0m-malware-main\Phxnt0mware RAT - main\resources\source_code\block_input.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d990edb751fc855d063aff0beb832148
SHA1fe7490ce70d27feb68f55a4a1fce334f045a678b
SHA256f986fdc4545c9a50898198f7005937b543e5e09a3e5b8050126e5fed636c0222
SHA5125af4fff3b158f5bfb8af5b583f53202987fd788b36aac5d438a4ea43bc8207e0c6843ebb4a3f2162d621e3e354cbe93937ad06ac451d52bd030c7230efafa067