Analysis

  • max time kernel
    88s
  • max time network
    98s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241023-es
  • resource tags

    arch:x64arch:x86image:win11-20241023-eslocale:es-esos:windows11-21h2-x64systemwindows
  • submitted
    10-11-2024 21:06

General

  • Target

    Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_downloading.py

  • Size

    4KB

  • MD5

    852567ae61dba1c96068219b7eee550e

  • SHA1

    5fbc4c2f31a727240c042835a5915a2948d9091e

  • SHA256

    1d89ebfa0b1c844dc8b0b2beda119d3e20e41f4acb041a24321d6288842b1dce

  • SHA512

    4fa944632e9912dd826806b0f52831971dd27ae1ca39258cf83045eb62ceda3a852e6d352607e16c5113520241709bc829d9412fa0aba999738a8ee35224dfcf

  • SSDEEP

    48:eYQn45DIAQYhvOiFjjn80sUpSN4G58mVQk6uo/ifQ4hvrYqy5Q4hvj:eD4lphJjz8M0CG58ma61h8Jh7

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Phxnt0m-malware-main\Phxnt0mware RAT - main\resources\source_code\file_downloading.py"
    1⤵
    • Modifies registry class
    PID:1712
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads