Overview
overview
10Static
static
10Phxnt0m-ma...per.py
windows11-21h2-x64
3Phxnt0m-ma...ing.py
windows11-21h2-x64
3Phxnt0m-ma...ion.py
windows11-21h2-x64
3Phxnt0m-ma...rer.py
windows11-21h2-x64
3Phxnt0m-ma...val.py
windows11-21h2-x64
3Phxnt0m-ma...ing.py
windows11-21h2-x64
3Phxnt0m-ma...omb.py
windows11-21h2-x64
3Phxnt0m-ma...ber.py
windows11-21h2-x64
3Phxnt0m-ma...are.py
windows11-21h2-x64
3Phxnt0m-ma...ger.py
windows11-21h2-x64
3Phxnt0m-ma...kes.py
windows11-21h2-x64
3Phxnt0m-ma...one.py
windows11-21h2-x64
3Phxnt0m-ma...ger.py
windows11-21h2-x64
3Phxnt0m-ma...ing.py
windows11-21h2-x64
3Phxnt0m-ma...rol.py
windows11-21h2-x64
3Phxnt0m-ma...ess.py
windows11-21h2-x64
3Phxnt0m-ma...try.py
windows11-21h2-x64
3Phxnt0m-ma...ell.py
windows11-21h2-x64
3Phxnt0m-ma...ion.py
windows11-21h2-x64
3Phxnt0m-ma...rec.py
windows11-21h2-x64
3Phxnt0m-ma...hot.py
windows11-21h2-x64
3Phxnt0m-ma...ech.py
windows11-21h2-x64
3Phxnt0m-ma...cam.py
windows11-21h2-x64
3Phxnt0m-ma...ker.py
windows11-21h2-x64
3Phxnt0m-ma...ass.py
windows11-21h2-x64
3Phxnt0m-ma...px.exe
windows11-21h2-x64
5Phxnt0m-ma...rce.py
windows11-21h2-x64
3Phxnt0m-ma...io.bat
windows11-21h2-x64
1Phxnt0m-ma...me.exe
windows11-21h2-x64
9Phxnt0m-ma...ain.py
windows11-21h2-x64
3Phxnt0m-ma...dio.py
windows11-21h2-x64
3Phxnt0m-ma...ter.py
windows11-21h2-x64
3Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows11-21h2_x64 -
resource
win11-20241007-es -
resource tags
arch:x64arch:x86image:win11-20241007-eslocale:es-esos:windows11-21h2-x64systemwindows -
submitted
10-11-2024 21:06
Behavioral task
behavioral1
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/crypto_clipper.py
Resource
win11-20241007-es
Behavioral task
behavioral2
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_downloading.py
Resource
win11-20241023-es
Behavioral task
behavioral3
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_encryption.py
Resource
win11-20241007-es
Behavioral task
behavioral4
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_explorer.py
Resource
win11-20241007-es
Behavioral task
behavioral5
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_removal.py
Resource
win11-20241007-es
Behavioral task
behavioral6
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_uploading.py
Resource
win11-20241007-es
Behavioral task
behavioral7
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/fork_bomb.py
Resource
win11-20241007-es
Behavioral task
behavioral8
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/grabber.py
Resource
win11-20241023-es
Behavioral task
behavioral9
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/jumpscare.py
Resource
win11-20241007-es
Behavioral task
behavioral10
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/keylogger.py
Resource
win11-20241007-es
Behavioral task
behavioral11
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/keystrokes.py
Resource
win11-20241007-es
Behavioral task
behavioral12
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/live_microphone.py
Resource
win11-20241007-es
Behavioral task
behavioral13
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/messager.py
Resource
win11-20241007-es
Behavioral task
behavioral14
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/microphone_recording.py
Resource
win11-20241007-es
Behavioral task
behavioral15
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/monitor_control.py
Resource
win11-20241007-es
Behavioral task
behavioral16
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/process.py
Resource
win11-20241007-es
Behavioral task
behavioral17
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/registry.py
Resource
win11-20241007-es
Behavioral task
behavioral18
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/reverse_shell.py
Resource
win11-20241007-es
Behavioral task
behavioral19
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/screen_manipulation.py
Resource
win11-20241007-es
Behavioral task
behavioral20
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/screenrec.py
Resource
win11-20241007-es
Behavioral task
behavioral21
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/screenshot.py
Resource
win11-20241007-es
Behavioral task
behavioral22
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/texttospeech.py
Resource
win11-20241007-es
Behavioral task
behavioral23
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/webcam.py
Resource
win11-20241007-es
Behavioral task
behavioral24
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/website_blocker.py
Resource
win11-20241007-es
Behavioral task
behavioral25
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/uac_bypass.py
Resource
win11-20241007-es
Behavioral task
behavioral26
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/upx.exe
Resource
win11-20241007-es
Behavioral task
behavioral27
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/source.py
Resource
win11-20241007-es
Behavioral task
behavioral28
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/drawling_studio/DrawlingStudio.bat
Resource
win11-20241007-es
Behavioral task
behavioral29
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/drawling_studio/Runtime.exe
Resource
win11-20241007-es
Behavioral task
behavioral30
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/drawling_studio/main.py
Resource
win11-20241007-es
Behavioral task
behavioral31
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/drawling_studio/studio.py
Resource
win11-20241007-es
Behavioral task
behavioral32
Sample
Phxnt0m-malware-main/Phxnt0mware RAT - main/tools/splitter.py
Resource
win11-20241007-es
General
-
Target
Phxnt0m-malware-main/Phxnt0mware RAT - main/resources/source_code/file_uploading.py
-
Size
6KB
-
MD5
c39b1345d3e78ed3742f7a25ae6915e8
-
SHA1
671236856b36a8cf0713a39bbffc7eaed87e9ae9
-
SHA256
b5f48d20fd03e01c30bba0be34f77d5097d394649718608c55eff55a3de624a5
-
SHA512
8aed090a15d9f42d3bf37fbdca47da52b220684c1cada4a9a78c166139a68c8c82c7233059b343482fd3b46d2defb0d9a45b697e300bf39b1d55e301acdab8af
-
SSDEEP
96:J7leTgjgsVTuc7ZWgy8LOF15Ql4Z0u8mzJPBuaVaabhsXg:JMctVyc4J8LOF1+4ZamdPBXUabv
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 3356 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Phxnt0m-malware-main\Phxnt0mware RAT - main\resources\source_code\file_uploading.py"1⤵
- Modifies registry class
PID:3276
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3356