VENON: The First Brazilian Banker RAT in Rust By ZenoX Team Published: 2026-03-10 · Archived: 2026-04-05 13:05:03 UTC Introduction In February 2026, the ZenoX threat intelligence team identified an unknown malware family during hunting activity, internally classified as VENON due to references in the code (spelled with an N). The sample was initially flagged for behavior consistent with Latin American banking trojans, particularly the use of banking overlays and active window monitoring, characteristics present in established families such as Grandoreiro and Mekotio. The fundamental difference emerged during static analysis: unlike all known families in the Latin American ecosystem, VENON does not contain a single line of Delphi code. The binary is compiled entirely in Rust, with 88 external dependencies identified from Crates. This report documents the results of the technical analysis conducted by the ZenoX Research Team, covering the complete infection chain, malware capabilities, command-and-control infrastructure, and attribution indicators identified during the investigation process. The analysis required building custom tooling and reimplementing the Argon2id + XChaCha20- Poly1305 pipeline used to protect the remote configuration. During analysis, the team raised the hypothesis that VENON may essentially be an AI-assisted Vibecoding refactor of an already-established banking trojan in the region, possibly Grandoreiro itself, rewritten from scratch in Rust. The fidelity with which classic functional patterns from the Delphi ecosystem, such as the overlay logic, window monitoring, and swap mechanisms, were reproduced in a completely different systems language suggests the author did not start from an original conception, but from a known behavioral base, using generative AI to perform the technical translation. Additional evidence of AI use was identified in the operator’s own infrastructure: the C2 panel code exhibits AI-assisted generation patterns consistent with what the security community has termed vibe coding, reinforcing the hypothesis that the entire operation, from malware to backend, was built with extensive AI tooling assistance. As of this publication, ZenoX has not identified any other banking trojan in the Brazilian or Latin American ecosystem with this technical profile. VENON represents, possibly, the first appearance of a Brazilian banker RAT developed entirely in Rust, with a level of sophistication comparable to tools used by known APT groups. Click here to read the full report Analysis Complexity VENON presents a level of static analysis difficulty significantly greater than traditional Latin American banking trojans. While Delphi malware like Grandoreiro or Mekotio can be examined with relative ease, with readable strings, exposed RTTI, and identifiable visual components, VENON combines multiple layers of protection that make each step of the reverse engineering process a distinct technical challenge. For an analyst familiar with Delphi trojans, where an x64dbg session reveals strings like “Banco handler of Brasil” ou “Itau” nos primeiros minutos, o VENON exige um investimento de tempo and ferramental de ordem de magnitude superior. https://zenox.ai/en/venon-the-first-brazilian-banker-rat-in-rust/ Page 1 of 17 Barrier Detail UPX with modified headers Prevents automatic decompression; requires manual header reconstruction before processing the binary Native Rust compilation Functions with mangled names, 88 crates, no RTTI or debug symbols XOR encryption with 95 unique functions Each sensitive string is decrypted by a different key derivation function; there is no reusable global key Argon2id + XChaCha20- Poly1305 State-of-the-art encryption for the remote config; requires reimplementing the KDF parameters to decrypt ChaCha20-Poly1305 in C2 C2 traffic encrypted per session via ring-0.17.14; passive inspection is not possible without the session key 9 active anti-analysis techniques AMSI Bypass, ETW Bypass, ntdll overwrite, indirect syscalls, thread hiding, DACL, anti-sandbox, anti-screenshot, and Defender SID Check   Table 1 – Analysis Barriers No single tool was sufficient to cover all protection layers. The analysis required building a six-phase pipeline, each feeding the next with the information needed to advance: Phase Tool / Technique Result Phase 1 DIE/PE Analysis + manual UPX decompression libcef.dll unpacked (9.3 MB) Phase 2 FLOSS v3.1.1 130,749 static strings + 41,799 Rust strings extracted; automatic deobfuscation disabled by binary density Phase 3 Ghidra 12.0.4 Headless 17,765 functions identified; 500 functions of interest decompiled; 143,093 lines of decompiled C generated   Phase 4 Python + Capstone 95 XOR blocks processed; 92 successfully deciphered (96.8% coverage)   Phase 5 Reimplementation of Argon2id KDF + XChaCha20-Poly1305 Remote config decrypted; C2 host confirmed   Phase 6 Categorization of 143,093 decompiled lines 14 functional groups mapped, 70+ features documented, Rust modules reconstructed Table 2 – Analysis Pipeline Adopted The level of effort required to analyze VENON is itself a metric of the artifact’s sophistication. A trojan that requires building custom analysis tools is not ordinary malware. It is an artifact that reflects advanced technical competence from its author and significantly raises the analysis cost for any incident response or threat intelligence team. https://zenox.ai/en/venon-the-first-brazilian-banker-rat-in-rust/ Page 2 of 17 Infection Chain VENON’s infection chain is structured in eleven sequential phases, combining social engineering, multiple evasion layers, and a sophisticated payload delivery mechanism. The campaign demonstrates considerable technical planning, with each phase designed to overcome specific security controls before advancing to the next. Initial Vector The confirmed entry vector is DLL sideloading via the legitimate NVIDIANotification.exe installer: the malicious libcef.dll is loaded in place of the legitimate Chromium Embedded Framework by exploiting the Windows DLL search order, which prioritizes the executable’s directory. The initial delivery mechanism for the NVIDIANotification.exe + libcef.dll pair to the victim’s system was not, however, determined with high confidence during this analysis. It is worth noting that during the period of sample identification, ZenoX observed a significant increase in ClickFix campaigns using NVIDIANotification.exe as the final payload, where the victim is socially engineered into executing a command that downloads and activates the file pair. The correlation between the analyzed artifact and this distribution vector is plausible and is being investigated, but it was not possible to confirm with sufficient confidence to include it as a definitive finding in this report. The infection chain analysis documented in this report begins from the moment the NVIDIANotification.exe + libcef.dll pair is already present on the victim’s system. Distribution occurs via phishing emails, fake pages mimicking legitimate portals, or sponsored ads. In all scenarios, dropper execution depends entirely on voluntary victim action; no technical exploit is required at this stage. Install via PowerShell Obfuscated batch file of ~1.6 KB. Critical strings (URLs, paths, commands) are reconstructed at runtime by concatenating fragmented variables, avoiding static signature detection. The script relaunches itself with RunAs via PowerShell if not running as administrator. Figure 1 – Privilege Escalation Adds C:\ProgramData\USOShared\ NuPLihaOH\ via Add-MpPreference before the download. The parent directory mimics the Update Session Orchestrator; the space in the subfolder name impedes command-line searches. Figure 2 – Defender exclusion https://zenox.ai/en/venon-the-first-brazilian-banker-rat-in-rust/ Page 3 of 17 ZIP obtained from S3 bucket via Invoke-WebRequest, with URL dynamically constructed by variable fragmentation. Figure 3 – Payload download The ZIP contains NVIDIANotification.exe (signed NVIDIA binary) and libcef.dll (malware). The executable is renamed to ®mjtgr.exe; the character ® (U+00AE) in the prefix impedes references via CLI and forensic tools. Figure 4 – Extraction and Renaming Run key added at HKCU\…\Run; individual exclusion created for ®mjtgr.exe. Figure 5 – Persistence + second exclusion Script self-deletes via (goto) 2>nul & and forces reboot in 3 seconds (shutdown /r /t 3 /f), activating the run key and eliminating evidence of the entry vector. Figure 6 – Self-deletion and reboot DLL Sideloading After reboot, Windows executes ®mjtgr.exe via run key. Since the Windows DLL search order prioritizes the executable’s directory, the malicious libcef.dll is loaded in place of the legitimate Chromium Embedded Framework. The process appears in Task Manager with the NVIDIA name and digital signature. The DLL exports the standard functions of a COM object (DllCanUnloadNow, DllGetClassObject, DllMain, DllRegisterServer, DllUnregisterServer) to mimic a legitimate DLL; all malicious code resides in the DLL_PROCESS_ATTACH do DllMain. Initialization and Evasion Upon loading, the DLL executes nine evasion techniques in sequence before initiating any malicious activity. https://zenox.ai/en/venon-the-first-brazilian-banker-rat-in-rust/ Page 4 of 17 The most sophisticated technique in this phase is the overwrite of the .text da ntdll.dll in memory with the clean version read from disk. Figure 7 – ntdll .text Overwrite For sensitive operations, the malware implements indirect syscalls: syscall numbers are read directly from ntdll on disk and stubs are constructed in memory, bypassing any hook that could be reinstalled. Finally, it applies thread hiding via NtSetInformationThread with the flag ThreadHideFromDebugger, modifies the process’s own DACL to deny external access, and configures SetWindowDisplayAffinity nos overlays para que screenshots exibam apenas tela preta. Figure 8 – ThreadHideFromDebugger + DACL Protection Remote Config Fetch https://zenox.ai/en/venon-the-first-brazilian-banker-rat-in-rust/ Page 5 of 17 The config thread makes a GET request to hxxps://storage.googleapis[.]com/mydns2026/startabril2026, with fallback to hxxps://pluginsafeguard[.]help/ipv4/config.enc. Google Cloud Storage is used as the primary channel because it is rarely blocked by corporate firewalls. The response goes through three decryption layers: Base64 Decode, followed by key derivation via Argon2id (m=19456 KiB, t=2, p=1) with password L0@D_S3CR3T_K3Y_X9F2_PR0D_2024! e salt LOAD_SALT_2024!!, and finally XChaCha20-Poly1305 decryption with a 24-byte nonce extracted from the beginning of the blob. The result is a JSON containing the C2 address: {“host”:”brasilmotorsvs14[.]com”}. Earlier versions of this RAT used AES-256-CBC with SHA-256 and a zero IV, significantly weaker. The migration to Argon2id and XChaCha20-Poly1305 reflects deliberate technical evolution between versions. Figure 9 – XOR Decrypt Secret Key + Salt Persistence and C2 After obtaining the configuration, the malware installs a Scheduled Task named “NVIDIA Notification Service” with trigger AtLogOn and maximum run level, replacing the WMI Event Subscription mechanism used in earlier versions. The WebSocket connection to the C2 is established under TLS 1.3 with ChaCha20-Poly1305 cipher via tungstenite e rustls. Each victim is identified by a HardwareID calculated as the SHA-256 of the computer name concatenated with the volume serial. Itaú Swap In addition to the attack mechanisms via banking overlay and clipboard manipulation, VENON deploys two VBScript code blocks extracted directly from libcef.dll. These blocks implement a shortcut hijacking mechanism targeting the Itaú Application, replacing legitimate system shortcuts with tampered versions that redirect the victim to a web page under operator control, preserving the bank’s original icon to avoid suspicion. This is a VB module exclusive to Itaú; no custom scripts like this were found for other banks and targets. https://zenox.ai/en/venon-the-first-brazilian-banker-rat-in-rust/ Page 6 of 17 The attack is operated in two distinct stages: install, which performs shortcut substitution, and uninstall, which reverts the modifications. The presence of the second block indicates the mechanism is controllable via C2, allowing the operator to restore shortcuts before ending the session or upon detecting signs of investigation. Block 1: Install The install script is responsible for locating and tampering with all Itaú Application shortcuts present on the victim’s machine. Execution follows four main steps: Microsoft Edge Path Resolution: the script queries the registry at HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\msedge.exe. If the key is absent, it tries the WOW6432Node alternative path, then directly checks the standard installation paths at Program Files (x86) e Program Files. If Edge is not found by any method, the script writes -2 to the result file and exits without making modifications. Target Location Enumeration: o script define um array com oito locais handler of sistema de arquivos onde atalhos handler of Itau podem existir. Itaú Shortcut Identification: for each .lnk encontrado nos locais alvo, o script abre o atalho via WScript.Shell.CreateShortcut e verifica se o TargetPath contains any of the strings itauaplicativo.exe, aplicativo itau ou itauaplicativo. The comparison is done in lowercase to ensure case-insensitivity. Figure 10 – Itaú Shortcut Identification Shortcut Substitution and Icon Preservation: shortcuts identified as Itaú have their TargetPath substituído pelo caminho handler of msedge.exe resolvido anteriormente, and os Arguments definidos como hxxps://www.itau.com[.]br/empresas. The WorkingDirectory e limpo. Criticamente, o IconLocation is preserved if present, making the shortcut visually identical to the original. The number of modified shortcuts is written to the result file. Variable / Folder Expanded Path (example) Desktop (user) %USERPROFILE%\Desktop Desktop (public) %PUBLIC%\Desktop StartMenu\Programs %APPDATA%\Microsoft\Windows\Start Menu\Programs StartMenu\Programs\Itau …\Programs\Itau StartMenu\Programs\Aplicativo Itau …\Programs\Aplicativo Itau https://zenox.ai/en/venon-the-first-brazilian-banker-rat-in-rust/ Page 7 of 17 AllUsersPrograms %ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs AllUsersPrograms\Itau …\Programs\Itau AllUsersPrograms\Aplicativo Itau …\Programs\Aplicativo Itau Table 1 – Locations enumerated by the VBS script Block 2: Uninstall / Restore The second block implements the inverse operation: it identifies previously tampered shortcuts and restores them to the original Itaú Application executable. The identification logic is distinct from Block 1 and is based on artifacts left by the modification, not the original shortcut attributes. The script resolves the path to the legitimate Itaú executable by checking two possible installation locations: %USERPROFILE%\AppData\Local\Aplicativo Itau\itauaplicativo.exe e %USERPROFILE%\AppData\Local\ItauAplicativo\itauaplicativo.exe. If neither is found, it uses the first path as a fallback. This suggests the operator can trigger the uninstall even on machines where the application is not installed, possibly to cover tracks before the victim notices the tampering. The IsModifiedItauShortcut function identifies tampered shortcuts by checking whether the TargetPath aponta para msedge.exe, microsoft-edge, chrome.exe ou firefox.exe, in combination with a Arguments contendo a string itau.com.br. The inclusion of Chrome and Firefox as detection criteria indicates the operator may have attack variants using other browsers, or that the criterion was designed to be robust against future variations of Block 1. Identified shortcuts have their TargetPath restored to the Itaú executable, the Arguments limpos, and o IconLocation redefined to itauaplicativo.exe,0 if the file exists on disk. The count of restored shortcuts is written to the result file, suggesting the C2 monitors the operation’s success. https://zenox.ai/en/venon-the-first-brazilian-banker-rat-in-rust/ Page 8 of 17 https://zenox.ai/en/venon-the-first-brazilian-banker-rat-in-rust/ Page 9 of 17 Monitored Targets VENON monitors 33 financial institutions and digital asset platforms, distributed across six categories. Monitoring is performed via window title and active browser domain checks, activating attack mechanisms upon detecting any of the targets below. # Institution Monitored Domain 1 Itaú Unibanco itau.com.br 3 Santander Brasil santander.com.br 4 Caixa Econômica Federal caixa.gov.br 5 Banco handler of Brasil bb.com.br 6 Nubank nubank.com.br 7 Banco Inter bancointer.com.br 9 Sicoob (string parcialmente decodificada; confirmado via titulo “- sicoob”) 10 Sicredi sicredi.com.br 11 Banco Original original.com.br 12 Banco Safra safra.com.br Table 1 – Traditional Banks # Institution Monitored Domain 13 BTG Pactual btgpactual.com Table 2 – Investment Bank # Institution Domain / Identifier 14 PagBank / PagSeguro pagseguro.uol.com.br 15 PicPay picpay.com 16 Mercado Pago mercadopago.com.br 17 Bling ERP (título de janela: “bling erp”) Table 3 – Fintech / Payments # Institution Monitored Domain 18 Receita Federal receita.fazenda.gov.br, gov.br/receitafederal Table 4 – Government https://zenox.ai/en/venon-the-first-brazilian-banker-rat-in-rust/ Page 10 of 17 # Platform Monitored Domain 19 Binance binance.com 20 Coinbase coinbase.com 21 Kraken kraken.com 22 Bybit bybit.com 23 Mercado Bitcoin mercadobitcoin.com 24 Foxbit foxbit.com 25 Gemini gemini.com 26 Nexo nexo.com 27 Ripio ripio.com Table 5 – Exchanges and Crypto # Platform Identificador 28 MetaMask (título de janela: “metamask”) 29 Trust Wallet (título de janela: “trust wallet”) 30 Phantom phantom.app 31 Ledger Live ledger.com 32 Rabby Wallet rabby.io 33 Cake DeFi app.cakedefi Table 6 – Crypto Wallets During the initial analysis phases, the ZenoX team identified numerous behavioral similarities with established families in the Latin American ecosystem, particularly Grandoreiro: use of banking overlays for visual interception, active window monitoring, registry-based persistence mechanisms, and a command-and-control structure with remote operation capability. At first glance, the artifact appeared to be yet another representative of the classic LATAM banking trojan paradigm. The fundamental difference emerged during static analysis: unlike all known families in the region, VENON does not contain a single line of Delphi code. The entire binary is compiled from Rust, with 88 crates identified in Cargo.lock and 17,765 functions. This is not merely a Rust loader delivering a Delphi payload, as experimentally observed in Casbaneiro. The final payload, with all attack logic, encryption, evasion, and C2 communication, is native Rust end-to-end. As of this publication, ZenoX has not identified any other banking trojan in the Latin American or Brazilian ecosystem with this profile. VENON represents, possibly, the first discovery of a Brazilian banker RAT developed entirely in Rust, with a level of technical sophistication comparable to APT group tools. The Latin American Banking Trojan Ecosystem https://zenox.ai/en/venon-the-first-brazilian-banker-rat-in-rust/ Page 11 of 17 Latin America, and Brazil in particular, is the global epicenter of banking trojans. Of the 30 most detected families worldwide, 11 are of Brazilian origin, representing 22% of all detections in 2024. Brazil alone accounts for 61% of banking trojan detections in the region (ESET, 2024). The ecosystem has historically been dominated by Delphi-written families, a language that offers self-sufficient binaries and ease of GUI development for banking overlays. The table below lists the main active families and their language characteristics: Family Language Profile Grandoreiro Delphi The largest LATAM banker: 1,700 banks, 45 countries, partial MaaS model Mekotio Delphi Europa and LATAM, uso extensivo de PowerShell no dropper Casbaneiro Delphi + Rust* Experimental Rust use only in the downloader; final payload in Delphi Guildma Delphi Also known as Astaroth; XOR string obfuscation Mispadu Delphi SAMBA SPIDER; dropper via HTA/VBScript Coyote .NET + Nim Emerged in 2024; Squirrel installer; 61 Brazilian banks Kiron Rust Rust downloader with DGA and browser credential theft (2024); no banking attack logic in Rust VENON Rust nativo Full banking RAT in Rust: 88 crates, active evasion, state-of-the-art encryption Table 1 – Profile Comparison Among Latin American Malware * Casbaneiro used Rust experimentally only in the download component in 2023; the core malware handler remains in Delphi. The following table compares VENON’s technical attributes with the three most representative families in the ecosystem: Grandoreiro (volume and reach), Coyote (modern language, Brazil), and Mekotio (European presence). Characteristic VENON Grandoreiro Coyote Mekotio Language Rust nativo Delphi .NET + Nim Delphi Active Period 2024-2026 2017-2026 2024-2026 2015-2026 Binary Size 9,3 MB (UPX) 390-414 MB ~50 MB ~20-30 MB Targets (Banks) 36+ 1.700+ 61+ 50+ Targets (Crypto) 21 plataformas 276 wallets Não Não Geographic Reach Brasil 45 países Brasil LATAM + Europa C2 Protocol WebSocket TLS RealThinClient SSL mutual TCP custom https://zenox.ai/en/venon-the-first-brazilian-banker-rat-in-rust/ Page 12 of 17 C2 Encryption ChaCha20-Poly1305 AES-CTS AES XOR + custom Config Encrypt Argon2 + XChaCha20 AES-256 AES XOR AMSI Bypass Sim Não Não Não ETW Bypass Sim Não Não Não ntdll Unhook Sim Não Não Não Indirect Syscalls Sim Não Não Não Pix QR Intercept Sim Não Não Não Boleto Swap Sim Não Não Parcial Screen Streaming DXGI (GPU) Screenshots Screenshots Screenshots Operational Model Solo / artisanal MaaS (partial)   Solo Solo Table 2 – Comparative Analysis: VENON vs. Established Families Attribution Attribution of VENON to a known operator or group presented low confidence throughout the analysis. Although the malware shares several behavioral characteristics with established Latin American families such as Grandoreiro, Mekotio, and Coyote, the structural technical differences are sufficiently deep to prevent high-confidence attribution to any previously documented group or campaign in the region. Hypothesis: AI-Assisted Development An element that complicated both the analysis and attribution is the hypothesis that VENON may have been developed with extensive artificial intelligence assistance, which the security community has termed “vibe coding”. The Rust code structure presents patterns suggesting a developer familiar with the capabilities of existing Latin American banking trojans, but who used generative AI to rewrite and expand these functionalities in Rust, a language that requires significant technical experience to use at the observed level of sophistication. This hypothesis would explain some asymmetries observed in the code: the coexistence of state-of-the-art cryptographic implementations alongside relatively straightforward control structures, and the reproduction in Rust of functional patterns common in Delphi, such as swap logic and window enumeration, with greater technical fidelity than would be expected from a first-time Rust developer. If confirmed, this would be one of the first documented instances of AI use for banking trojan development in Latin America. Developer Exposure via Compilation Artifacts During the string extraction process from an early DLL version (January 2026), identified during hunting, the ZenoX team located local compilation paths exposed in the binary. Unlike the version analyzed as the main subject of this report, this earlier sample had not removed the full paths from the author’s development environment. The exposed paths repeatedly contain the username byst4, revealing the local machine username where the malware was compiled. The sequence of strings present in the binary includes paths such as C:\Users\byst4\.cargo\registry\src\..., a https://zenox.ai/en/venon-the-first-brazilian-banker-rat-in-rust/ Page 13 of 17 pattern consistent across dozens of entries corresponding to the Rust crates used in the project. Figure 11 – Username Mention in Rust Crates Exposing the Developer Indicatores de comprometimento Type Indicator Description / Contexto Domains Domain brasilmotorsvs14[.]com Primary C2 WebSocket (Cloudflare) Domain lazybearpottery[.]net Alternate C2 (Cloudflare) Domain digitalmoineyp[.]com Distribution infrastructure Domain portalhondihs[.]com Distribution infrastructure Domain storage.googleapis[.]com Dead drop – GCS bucket mydns2026 URLs URL https://s3.sa-east-1.amazonaws[.]com/8151218- 25.2025.7.12.5178/modmarco2026-2.zip Payload – AWS S3 (sa-east-1) URL https://storage.googleapis[.]com/mydns2026/startabril2026 Dead drop resolver – GCS URL https://storage.googleapis[.]com/mydns2026/startmarco2026_1_ Dead drop resolver – GCS URL https://storage.googleapis[.]com/mydns2026/startjaneiro_1_ Dead drop resolver – GCS https://zenox.ai/en/venon-the-first-brazilian-banker-rat-in-rust/ Page 14 of 17 Type Indicator Description / Contexto URL https://storage.googleapis[.]com/mydns2026/startabril_2 Dead drop resolver – GCS URL https://pastebin.com/raw/2qEMcLsD Dead drop resolver – Pastebin URL https://digitalmoineyp[.]com/v2/cloudflare/avsmail/recive.php Distribution endpoint IP Addresses – C2 / Panel IP 104.21.7[.]106 brasilmotorsvs14.com – Cloudflare CDN IP 188.114.96[.]3 lazybearpottery.net – Cloudflare CDN IP 206.0.29[.]58 VENON Panel – LACNIC IP 51.222.75[.]250 VENON Panel – OVH Canada IP 51.222.75[.]248 VENON Panel – OVH Canada IP 192.99.226[.]117 VENON Panel – OVH Canada IP 212.69.5[.]84 VENON Panel – Europe IP 34.227.229[.]85 VENON Panel – AWS EC2 IP Addresses – Abused Legitimate Services IP 34.117.59[.]81 ipinfo.io – geolocation fingerprinting IP 142.251.140[.]187 storage.googleapis.com – dead drop GCS IP 142.251.141[.]67 c.pki.goog – CRL validation IP 142.251.140[.]163 o.pki.goog – OCSP validation File System Paths https://zenox.ai/en/venon-the-first-brazilian-banker-rat-in-rust/ Page 15 of 17 Type Indicator Description / Contexto Path C:\ProgramData\USOShared\NuPLihaOH\ Implant staging directory Path C:\ProgramData\USOShared\NuPLihaOH\NVIDIANotification.exe Legitimate NVIDIA executable (sideloading) Path C:\ProgramData\USOShared\NuPLihaOH\®mjtgr.exe Main implant (Unicode prefix) Path C:\ProgramData\USOShared\NuPLihaOH\qYogBt.zip Temporary ZIP in staging Registry Keys Registry HKCU\Software\Microsoft\Windows\CurrentVersion\Run Persistence – executes ®mjtgr.exe at logon Processes Process ®mjtgr.exe Main implant (PID 6864) Process NVIDIANotification.exe Legitimate NVIDIA executable – sideloading vehicle Process CasPol.exe LOLBin – sideloading target Process wscript.exe VBS script executor Files File libcef.dll Malicious DLL – sideloading via CEF (packed) File NVIDIANotification.exe Legitimate NVIDIA executable used as loader File ®mjtgr.exe Renamed implant (Unicode ® prefix) File qYogBt.zip Temporary ZIP in staging https://zenox.ai/en/venon-the-first-brazilian-banker-rat-in-rust/ Page 16 of 17 Type Indicator Description / Contexto File modmarco2026.zip Versioned payload – hosted on S3 File DocumentReclamaAQUI_56b2ca9811.cmd.bin CMD dropper (phase F1) File Itau_swap_install.vbs VBS Script – Itaú shortcut swap File startabril2026 Dead drop resolver – GCS File startmarco2026_1_ Dead drop resolver – GCS File startjaneiro_1_ Dead drop resolver – GCS File startabril_2 Dead drop resolver – GCS Hashes MD5 427ccfa456ed27a819aa152708212ff4 libcef.dll (packed) SHA256 c482286a7fdfb64d308c197a4deabcd773b8b62d9e74d1d08fcfd02568d75d72 libcef.dll (packed) MD5 2d1c4778094ba0e1a6e13bb67ce1b631 libcef.dll (unpacked) SHA256 75d1a2560cf93c6a028aa3573febddaf713014d64b0e8904488111772e4cff49 libcef.dll (unpacked) MD5 a99cb35768489b7aacf2d31d33d8f541 Itau_swap_install.vbs SHA256 fd5d9effc1ef77a49b0720d2691bc144f513609760c22fa62bc1e8b84dedf879 Itau_swap_install.vbs SHA256 78b62856878cb09602b14104df18ca2bedac8640e09d74b934ff3ea0e15627f3 Amostra adicional SHA256 d61be2b21e135726c547a388ecb47552559e5221894f5005ce35bdb24efc0c26 Amostra adicional Source: https://zenox.ai/en/venon-the-first-brazilian-banker-rat-in-rust/ https://zenox.ai/en/venon-the-first-brazilian-banker-rat-in-rust/ Page 17 of 17