Overview
overview
10Static
static
10Phxnt0m-ma...per.py
windows11-21h2-x64
3Phxnt0m-ma...ing.py
windows11-21h2-x64
3Phxnt0m-ma...ion.py
windows11-21h2-x64
3Phxnt0m-ma...rer.py
windows11-21h2-x64
3Phxnt0m-ma...val.py
windows11-21h2-x64
3Phxnt0m-ma...ing.py
windows11-21h2-x64
3Phxnt0m-ma...omb.py
windows11-21h2-x64
3Phxnt0m-ma...ber.py
windows11-21h2-x64
3Phxnt0m-ma...are.py
windows11-21h2-x64
3Phxnt0m-ma...ger.py
windows11-21h2-x64
3Phxnt0m-ma...kes.py
windows11-21h2-x64
3Phxnt0m-ma...one.py
windows11-21h2-x64
3Phxnt0m-ma...ger.py
windows11-21h2-x64
3Phxnt0m-ma...ing.py
windows11-21h2-x64
3Phxnt0m-ma...rol.py
windows11-21h2-x64
3Phxnt0m-ma...ess.py
windows11-21h2-x64
3Phxnt0m-ma...try.py
windows11-21h2-x64
3Phxnt0m-ma...ell.py
windows11-21h2-x64
3Phxnt0m-ma...ion.py
windows11-21h2-x64
3Phxnt0m-ma...rec.py
windows11-21h2-x64
3Phxnt0m-ma...hot.py
windows11-21h2-x64
3Phxnt0m-ma...ech.py
windows11-21h2-x64
3Phxnt0m-ma...cam.py
windows11-21h2-x64
3Phxnt0m-ma...ker.py
windows11-21h2-x64
3Phxnt0m-ma...ass.py
windows11-21h2-x64
3Phxnt0m-ma...px.exe
windows11-21h2-x64
5Phxnt0m-ma...rce.py
windows11-21h2-x64
3Phxnt0m-ma...io.bat
windows11-21h2-x64
1Phxnt0m-ma...me.exe
windows11-21h2-x64
9Phxnt0m-ma...ain.py
windows11-21h2-x64
3Phxnt0m-ma...dio.py
windows11-21h2-x64
3Phxnt0m-ma...ter.py
windows11-21h2-x64
3Analysis
-
max time kernel
90s -
max time network
101s -
platform
windows11-21h2_x64 -
resource
win11-20241007-es -
resource tags
arch:x64arch:x86image:win11-20241007-eslocale:es-esos:windows11-21h2-x64systemwindows -
submitted
10-11-2024 21:06
Behavioral task
behavioral1
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/crypto_clipper.py
Resource
win11-20241007-es
Behavioral task
behavioral2
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_downloading.py
Resource
win11-20241023-es
Behavioral task
behavioral3
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_encryption.py
Resource
win11-20241007-es
Behavioral task
behavioral4
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_explorer.py
Resource
win11-20241007-es
Behavioral task
behavioral5
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_removal.py
Resource
win11-20241007-es
Behavioral task
behavioral6
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_uploading.py
Resource
win11-20241007-es
Behavioral task
behavioral7
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/fork_bomb.py
Resource
win11-20241007-es
Behavioral task
behavioral8
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/grabber.py
Resource
win11-20241023-es
Behavioral task
behavioral9
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/jumpscare.py
Resource
win11-20241007-es
Behavioral task
behavioral10
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/keylogger.py
Resource
win11-20241007-es
Behavioral task
behavioral11
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/keystrokes.py
Resource
win11-20241007-es
Behavioral task
behavioral12
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/live_microphone.py
Resource
win11-20241007-es
Behavioral task
behavioral13
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/messager.py
Resource
win11-20241007-es
Behavioral task
behavioral14
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/microphone_recording.py
Resource
win11-20241007-es
Behavioral task
behavioral15
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/monitor_control.py
Resource
win11-20241007-es
Behavioral task
behavioral16
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/process.py
Resource
win11-20241007-es
Behavioral task
behavioral17
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/registry.py
Resource
win11-20241007-es
Behavioral task
behavioral18
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/reverse_shell.py
Resource
win11-20241007-es
Behavioral task
behavioral19
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/screen_manipulation.py
Resource
win11-20241007-es
Behavioral task
behavioral20
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/screenrec.py
Resource
win11-20241007-es
Behavioral task
behavioral21
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/screenshot.py
Resource
win11-20241007-es
Behavioral task
behavioral22
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/texttospeech.py
Resource
win11-20241007-es
Behavioral task
behavioral23
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/webcam.py
Resource
win11-20241007-es
Behavioral task
behavioral24
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/website_blocker.py
Resource
win11-20241007-es
Behavioral task
behavioral25
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/uac_bypass.py
Resource
win11-20241007-es
Behavioral task
behavioral26
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/upx.exe
Resource
win11-20241007-es
Behavioral task
behavioral27
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/source.py
Resource
win11-20241007-es
Behavioral task
behavioral28
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/drawling_studio/DrawlingStudio.bat
Resource
win11-20241007-es
Behavioral task
behavioral29
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/drawling_studio/Runtime.exe
Resource
win11-20241007-es
Behavioral task
behavioral30
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/drawling_studio/main.py
Resource
win11-20241007-es
Behavioral task
behavioral31
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/drawling_studio/studio.py
Resource
win11-20241007-es
Behavioral task
behavioral32
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/splitter.py
Resource
win11-20241007-es
General
-
Target
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/crypto_clipper.py
-
Size
4KB
-
MD5
4cc54ef515902dc1253fed286c2ad680
-
SHA1
000614cd1d751ccf27a19ade34bfaf91523937c2
-
SHA256
fd78ba2e7c4005967db1098108105fbe0fea61a6e2b1643f5ce62727c4394d24
-
SHA512
9f22c50bbb9597ce6d42a7f0325e7e38a71c0f33a7ca9fcdccb17ef3d9fd6b8c9a071f3a0887887e2aeeca13d7f63c03862c42d92e93046861b0d2c0c1c4142c
-
SSDEEP
96:a1LoVOBa5ASQtCd45yO5HvgyKo/WzmLTwM/vBSLUrPlb/WZ//tXM//0:xOBa5ASQtCd4IO5Pv+tMJTZ+h/pM0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4756 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Phxnt0m-malware-main\Phxnt0mware RAT - main\resources\source_code\crypto_clipper.py"1⤵
- Modifies registry class
PID:456
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4756