Overview
overview
10Static
static
10Phxnt0m-ma...per.py
windows11-21h2-x64
3Phxnt0m-ma...ing.py
windows11-21h2-x64
3Phxnt0m-ma...ion.py
windows11-21h2-x64
3Phxnt0m-ma...rer.py
windows11-21h2-x64
3Phxnt0m-ma...val.py
windows11-21h2-x64
3Phxnt0m-ma...ing.py
windows11-21h2-x64
3Phxnt0m-ma...omb.py
windows11-21h2-x64
3Phxnt0m-ma...ber.py
windows11-21h2-x64
3Phxnt0m-ma...are.py
windows11-21h2-x64
3Phxnt0m-ma...ger.py
windows11-21h2-x64
3Phxnt0m-ma...kes.py
windows11-21h2-x64
3Phxnt0m-ma...one.py
windows11-21h2-x64
3Phxnt0m-ma...ger.py
windows11-21h2-x64
3Phxnt0m-ma...ing.py
windows11-21h2-x64
3Phxnt0m-ma...rol.py
windows11-21h2-x64
3Phxnt0m-ma...ess.py
windows11-21h2-x64
3Phxnt0m-ma...try.py
windows11-21h2-x64
3Phxnt0m-ma...ell.py
windows11-21h2-x64
3Phxnt0m-ma...ion.py
windows11-21h2-x64
3Phxnt0m-ma...rec.py
windows11-21h2-x64
3Phxnt0m-ma...hot.py
windows11-21h2-x64
3Phxnt0m-ma...ech.py
windows11-21h2-x64
3Phxnt0m-ma...cam.py
windows11-21h2-x64
3Phxnt0m-ma...ker.py
windows11-21h2-x64
3Phxnt0m-ma...ass.py
windows11-21h2-x64
3Phxnt0m-ma...px.exe
windows11-21h2-x64
5Phxnt0m-ma...rce.py
windows11-21h2-x64
3Phxnt0m-ma...io.bat
windows11-21h2-x64
1Phxnt0m-ma...me.exe
windows11-21h2-x64
9Phxnt0m-ma...ain.py
windows11-21h2-x64
3Phxnt0m-ma...dio.py
windows11-21h2-x64
3Phxnt0m-ma...ter.py
windows11-21h2-x64
3Analysis
-
max time kernel
91s -
max time network
97s -
platform
windows11-21h2_x64 -
resource
win11-20241007-es -
resource tags
arch:x64arch:x86image:win11-20241007-eslocale:es-esos:windows11-21h2-x64systemwindows -
submitted
10-11-2024 21:06
Behavioral task
behavioral1
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/crypto_clipper.py
Resource
win11-20241007-es
Behavioral task
behavioral2
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_downloading.py
Resource
win11-20241023-es
Behavioral task
behavioral3
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_encryption.py
Resource
win11-20241007-es
Behavioral task
behavioral4
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_explorer.py
Resource
win11-20241007-es
Behavioral task
behavioral5
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_removal.py
Resource
win11-20241007-es
Behavioral task
behavioral6
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_uploading.py
Resource
win11-20241007-es
Behavioral task
behavioral7
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/fork_bomb.py
Resource
win11-20241007-es
Behavioral task
behavioral8
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/grabber.py
Resource
win11-20241023-es
Behavioral task
behavioral9
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/jumpscare.py
Resource
win11-20241007-es
Behavioral task
behavioral10
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/keylogger.py
Resource
win11-20241007-es
Behavioral task
behavioral11
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/keystrokes.py
Resource
win11-20241007-es
Behavioral task
behavioral12
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/live_microphone.py
Resource
win11-20241007-es
Behavioral task
behavioral13
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/messager.py
Resource
win11-20241007-es
Behavioral task
behavioral14
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/microphone_recording.py
Resource
win11-20241007-es
Behavioral task
behavioral15
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/monitor_control.py
Resource
win11-20241007-es
Behavioral task
behavioral16
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/process.py
Resource
win11-20241007-es
Behavioral task
behavioral17
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/registry.py
Resource
win11-20241007-es
Behavioral task
behavioral18
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/reverse_shell.py
Resource
win11-20241007-es
Behavioral task
behavioral19
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/screen_manipulation.py
Resource
win11-20241007-es
Behavioral task
behavioral20
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/screenrec.py
Resource
win11-20241007-es
Behavioral task
behavioral21
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/screenshot.py
Resource
win11-20241007-es
Behavioral task
behavioral22
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/texttospeech.py
Resource
win11-20241007-es
Behavioral task
behavioral23
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/webcam.py
Resource
win11-20241007-es
Behavioral task
behavioral24
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/website_blocker.py
Resource
win11-20241007-es
Behavioral task
behavioral25
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/uac_bypass.py
Resource
win11-20241007-es
Behavioral task
behavioral26
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/upx.exe
Resource
win11-20241007-es
Behavioral task
behavioral27
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/source.py
Resource
win11-20241007-es
Behavioral task
behavioral28
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/drawling_studio/DrawlingStudio.bat
Resource
win11-20241007-es
Behavioral task
behavioral29
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/drawling_studio/Runtime.exe
Resource
win11-20241007-es
Behavioral task
behavioral30
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/drawling_studio/main.py
Resource
win11-20241007-es
Behavioral task
behavioral31
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/drawling_studio/studio.py
Resource
win11-20241007-es
Behavioral task
behavioral32
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/splitter.py
Resource
win11-20241007-es
General
-
Target
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/texttospeech.py
-
Size
1KB
-
MD5
fcdbea32d7fc0e631d1e1652994fc7b5
-
SHA1
2d302d21dafe696a136ea3a5748b08a9cd23ee85
-
SHA256
646aae0d27e33ffbcff71ebb6aa9699ee2a19f91093256589c197c37c3e3ed50
-
SHA512
a69cdda97fe8e7f4b552355345edef95b74f64d6a1024b17021bd7c20ce15c791a81899da4dd5053c39722b093b79ce41b0db3f148d69a1ac4945b5e583f2032
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 4060 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Phxnt0m-malware-main\Phxnt0mware RAT - main\resources\source_code\texttospeech.py"1⤵
- Modifies registry class
PID:824
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4060