Overview
overview
10Static
static
10Phxnt0m-ma...per.py
windows11-21h2-x64
3Phxnt0m-ma...ing.py
windows11-21h2-x64
3Phxnt0m-ma...ion.py
windows11-21h2-x64
3Phxnt0m-ma...rer.py
windows11-21h2-x64
3Phxnt0m-ma...val.py
windows11-21h2-x64
3Phxnt0m-ma...ing.py
windows11-21h2-x64
3Phxnt0m-ma...omb.py
windows11-21h2-x64
3Phxnt0m-ma...ber.py
windows11-21h2-x64
3Phxnt0m-ma...are.py
windows11-21h2-x64
3Phxnt0m-ma...ger.py
windows11-21h2-x64
3Phxnt0m-ma...kes.py
windows11-21h2-x64
3Phxnt0m-ma...one.py
windows11-21h2-x64
3Phxnt0m-ma...ger.py
windows11-21h2-x64
3Phxnt0m-ma...ing.py
windows11-21h2-x64
3Phxnt0m-ma...rol.py
windows11-21h2-x64
3Phxnt0m-ma...ess.py
windows11-21h2-x64
3Phxnt0m-ma...try.py
windows11-21h2-x64
3Phxnt0m-ma...ell.py
windows11-21h2-x64
3Phxnt0m-ma...ion.py
windows11-21h2-x64
3Phxnt0m-ma...rec.py
windows11-21h2-x64
3Phxnt0m-ma...hot.py
windows11-21h2-x64
3Phxnt0m-ma...ech.py
windows11-21h2-x64
3Phxnt0m-ma...cam.py
windows11-21h2-x64
3Phxnt0m-ma...ker.py
windows11-21h2-x64
3Phxnt0m-ma...ass.py
windows11-21h2-x64
3Phxnt0m-ma...px.exe
windows11-21h2-x64
5Phxnt0m-ma...rce.py
windows11-21h2-x64
3Phxnt0m-ma...io.bat
windows11-21h2-x64
1Phxnt0m-ma...me.exe
windows11-21h2-x64
9Phxnt0m-ma...ain.py
windows11-21h2-x64
3Phxnt0m-ma...dio.py
windows11-21h2-x64
3Phxnt0m-ma...ter.py
windows11-21h2-x64
3Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20241007-es -
resource tags
arch:x64arch:x86image:win11-20241007-eslocale:es-esos:windows11-21h2-x64systemwindows -
submitted
10-11-2024 21:06
Behavioral task
behavioral1
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/crypto_clipper.py
Resource
win11-20241007-es
Behavioral task
behavioral2
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_downloading.py
Resource
win11-20241023-es
Behavioral task
behavioral3
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_encryption.py
Resource
win11-20241007-es
Behavioral task
behavioral4
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_explorer.py
Resource
win11-20241007-es
Behavioral task
behavioral5
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_removal.py
Resource
win11-20241007-es
Behavioral task
behavioral6
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_uploading.py
Resource
win11-20241007-es
Behavioral task
behavioral7
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/fork_bomb.py
Resource
win11-20241007-es
Behavioral task
behavioral8
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/grabber.py
Resource
win11-20241023-es
Behavioral task
behavioral9
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/jumpscare.py
Resource
win11-20241007-es
Behavioral task
behavioral10
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/keylogger.py
Resource
win11-20241007-es
Behavioral task
behavioral11
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/keystrokes.py
Resource
win11-20241007-es
Behavioral task
behavioral12
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/live_microphone.py
Resource
win11-20241007-es
Behavioral task
behavioral13
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/messager.py
Resource
win11-20241007-es
Behavioral task
behavioral14
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/microphone_recording.py
Resource
win11-20241007-es
Behavioral task
behavioral15
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/monitor_control.py
Resource
win11-20241007-es
Behavioral task
behavioral16
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/process.py
Resource
win11-20241007-es
Behavioral task
behavioral17
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/registry.py
Resource
win11-20241007-es
Behavioral task
behavioral18
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/reverse_shell.py
Resource
win11-20241007-es
Behavioral task
behavioral19
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/screen_manipulation.py
Resource
win11-20241007-es
Behavioral task
behavioral20
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/screenrec.py
Resource
win11-20241007-es
Behavioral task
behavioral21
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/screenshot.py
Resource
win11-20241007-es
Behavioral task
behavioral22
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/texttospeech.py
Resource
win11-20241007-es
Behavioral task
behavioral23
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/webcam.py
Resource
win11-20241007-es
Behavioral task
behavioral24
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/website_blocker.py
Resource
win11-20241007-es
Behavioral task
behavioral25
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/uac_bypass.py
Resource
win11-20241007-es
Behavioral task
behavioral26
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/upx.exe
Resource
win11-20241007-es
Behavioral task
behavioral27
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/source.py
Resource
win11-20241007-es
Behavioral task
behavioral28
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/drawling_studio/DrawlingStudio.bat
Resource
win11-20241007-es
Behavioral task
behavioral29
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/drawling_studio/Runtime.exe
Resource
win11-20241007-es
Behavioral task
behavioral30
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/drawling_studio/main.py
Resource
win11-20241007-es
Behavioral task
behavioral31
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/drawling_studio/studio.py
Resource
win11-20241007-es
Behavioral task
behavioral32
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/splitter.py
Resource
win11-20241007-es
General
-
Target
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/keylogger.py
-
Size
2KB
-
MD5
607c5ab6acfb5d0296b33cb8508235ff
-
SHA1
278821eccd74ed40025373e5e1e76fc6fcf3c731
-
SHA256
22bdcfc14de5859bb365b030ce6908dc907bf937b1c23ac5bd9a990fbed8f7eb
-
SHA512
481bddf9ab2f81b77befd6bdb171e574a1ec0a90ee254cbc3302ae105b43b6f85f2ca850d8aff2cc95f3e4a5a7fac38c9082c7ffeb94e1a32f26c3c0621f1cd6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3624 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Phxnt0m-malware-main\Phxnt0mware RAT - main\resources\source_code\keylogger.py"1⤵
- Modifies registry class
PID:340
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3624