Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
17/03/2025, 21:01
Behavioral task
behavioral1
Sample
MarlbotV42.exe
Resource
win7-20241010-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
MarlbotV42.exe
Resource
win10v2004-20250314-en
7 signatures
150 seconds
General
-
Target
MarlbotV42.exe
-
Size
74KB
-
MD5
6d20753e918ee6fe381fb83ead0570a8
-
SHA1
381653cefa7f4707e300fe1d868e7273918c1c85
-
SHA256
2e748cd193dccc09ca9f11be9fee80ba324b0cd48efed8fd8e4e0678bd3f79d2
-
SHA512
69ef1cbd56ae34dbfc94d1a64e516fd8289e62636f295012d30c0c9bdc0a3b3344c10c28a07805eb4edccb0aeb793cd933060b4c1bb426a1db537b39b7270a1b
-
SSDEEP
1536:mUrwcx3bxACE/PMVSe9VdQuDI6H1bf/K0oQzcyLVclN:mUscx3bqv/PMVSe9VdQsH1bf0QjBY
Score
10/10
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
1st People
C2
193.161.193.99:56266
Mutex
75686758786
Attributes
-
delay
1
-
install
false
-
install_file
12345
-
install_folder
%Temp%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral2/memory/5452-1-0x0000000000D30000-0x0000000000D48000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe 5452 MarlbotV42.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5452 MarlbotV42.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5452 MarlbotV42.exe