Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/03/2025, 01:27
Behavioral task
behavioral1
Sample
rlmarlbot.V1.7.1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rlmarlbot.V1.7.1.exe
Resource
win10v2004-20250314-en
General
-
Target
rlmarlbot.V1.7.1.exe
-
Size
29.5MB
-
MD5
2b6a51aa8c836eb83cc1712861902078
-
SHA1
44600fdea94f608d62d36c9ccef9d9b42bcee985
-
SHA256
acf2ce4ddaee4fdb3ffae2a9de5b3c89f067ef95e7216c5c7ee75190a40d3d4e
-
SHA512
f6f5c214a6bf3d9e64692b4a42f6b23c1e11eda5447bd09825701b9780cee39328ad2899f0085fa4b1fb2dc09264952ec47d48dda9df850935a25a6cde73910e
-
SSDEEP
786432:83Vl8Z2hOtAj5zcY87hLWJImi0LeFPc+KhXA:f2O0FE7EioLe+zhX
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2412 rlmarlbot.V1.7.1.exe -
resource yara_rule behavioral1/files/0x000300000002097f-1117.dat upx behavioral1/memory/2412-1119-0x000007FEF5B10000-0x000007FEF5F91000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2412 2020 rlmarlbot.V1.7.1.exe 31 PID 2020 wrote to memory of 2412 2020 rlmarlbot.V1.7.1.exe 31 PID 2020 wrote to memory of 2412 2020 rlmarlbot.V1.7.1.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\rlmarlbot.V1.7.1.exe"C:\Users\Admin\AppData\Local\Temp\rlmarlbot.V1.7.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\rlmarlbot.V1.7.1.exe"C:\Users\Admin\AppData\Local\Temp\rlmarlbot.V1.7.1.exe"2⤵
- Loads dropped DLL
PID:2412
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
1.4MB
MD51661de9dc158325038ea32685a182107
SHA131a5b206059bfbdd333a43e800cb466f5e5a4d1a
SHA25621396ce6f622f16d6cba3d8ac1f469654fa49d9edd57d407919012fe26b03a0c
SHA512d8c50191f5adbca5b5d2693b13453765d0130ebcef6f4525865b2f7b93863134592aa3c0c91f92c7d5edb3d8ddf5a190ec76417717250035bcd66aeb11510656