MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 114b5c2ba2905d6333a8f9146df1c528a507ffc88a3da8c2344dff42ad8a8f97. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ValleyRAT


Vendor detections: 8


Intelligence 8 IOCs YARA 13 File information Comments

SHA256 hash: 114b5c2ba2905d6333a8f9146df1c528a507ffc88a3da8c2344dff42ad8a8f97
SHA3-384 hash: f33d021e2303941e12e40e379e868439c6f96359ed7c0234690d99cd94242295e1a9ccdb7a9469402bc1b81515879e80
SHA1 hash: af70aa59edcdf0ec98cc6ca1d24b7918a947a304
MD5 hash: 9fd8063b0485c11146e5534d7f3a2662
humanhash: carolina-april-fix-xray
File name:zndiouasnd11687868265.zip
Download: download sample
Signature ValleyRAT
File size:3'759'721 bytes
First seen:2025-08-13 05:47:24 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 98304:BRzQoUnfBiHoaKupT2XQy0Kv4VoxjQyrykY0W3g4:BfAfBiIapaXIW4OVrylz3z
TLSH T18006118438100686E2918F3F5D3FE5C57B9C22841A0E7851372B9A9FFE917EE71A44DB
Magika zip
Reporter GDHJDSYDH1
Tags:backdoor dllHijack file-pumped SilverFox ValleyRAT zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
82
Origin country :
US US
File Archive Information

This file archive contains 8 file(s), sorted by their relevance:

File name:MSVCP140.dll
File size:627'992 bytes
SHA256 hash: 99e3e25cda404283fbd96b25b7683a8d213e7954674adefa2279123a8d0701fd
MD5 hash: c1b066f9e3e2f3a6785161a8c7e0346a
MIME type:application/x-dosexec
Signature ValleyRAT
File name:vcruntime140_1.dll
File size:49'744 bytes
SHA256 hash: 6d3a6cde6fc4d3c79aabf785c04d2736a3e2fd9b0366c9b741f054a13ecd939e
MD5 hash: eb49c1d33b41eb49dfed58aafa9b9a8f
MIME type:application/x-dosexec
Signature ValleyRAT
File name:tier0.dll
File size:415'328 bytes
SHA256 hash: 0c1f82e647de026ee30aa1f2948e5cdba680ffa62fe1ca17fd6a5f2cf6ba2df5
MD5 hash: 4e2a7adfddee50035407bb43659f305f
MIME type:application/x-dosexec
Signature ValleyRAT
File name:vstdlib.dll
Pumped file This file is pumped. MalwareBazaar has de-pumped it.
File size:244'695'120 bytes
SHA256 hash: a6771b7daa4e9f74524dc198380bdb3f1064dd3725961b300cebf3d2ef9dc3ce
MD5 hash: a9ee2a5a47ea2b9fbf145a6997a46058
De-pumped file size:244'684'800 bytes (Vs. original size of 244'695'120 bytes)
De-pumped SHA256 hash: 8ceb2e371c7a9123116f9721791d603a038ad6d9f6738b9fd3412fcae0dc5864
De-pumped MD5 hash: a2564e3e15e2fd0445ff787d065a4b0b
MIME type:application/x-dosexec
Signature ValleyRAT
File name:749ju.exe
File size:3'630'176 bytes
SHA256 hash: aa4bd50796313744a38bd02d0f9a911efc4e71a2bf9bdcd4293e0686f8091c22
MD5 hash: f3cf529a24ad407054e2a8359484f0bb
MIME type:application/x-dosexec
Signature ValleyRAT
File name:VCRUNTIME140.dll
File size:119'376 bytes
SHA256 hash: a06c9ea4f815dac75d2c99684d433fbfc782010fae887837a03f085a29a217e8
MD5 hash: e9b690fbe5c4b96871214379659dd928
MIME type:application/x-dosexec
Signature ValleyRAT
File name:emjio.tmp
File size:322'342 bytes
SHA256 hash: 998d4c6e61c149e0c06ebdf491956a58eabb91b3e2058b75bfa96cc7399575bf
MD5 hash: 172c77aee947b954be71bf7ac07496f8
MIME type:image/jpeg
Signature ValleyRAT
File name:qdata.tmp
File size:72'745 bytes
SHA256 hash: c250783846d5de0379e2da6286f554f516f2a3b7ce585c44036d2739be5d396e
MD5 hash: 9c50512b7c67f7fa37510d68c5525191
MIME type:image/jpeg
Signature ValleyRAT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
81.4%
Tags:
shellcode virus
Result
Verdict:
Malicious
File Type:
ZIP File - Malicious
Behaviour
SuspiciousEmbeddedObjects detected
Gathering data
Verdict:
Malware
YARA:
3 match(es)
Tags:
CVE-2019-13232 CVE-2019-9674 CVE-2022-29225 CVE-2022-36114 CVE-2023-46104 CVE-2024-0450 Executable Malicious PDB Path PE (Portable Executable) Zip Archive Zip Bomb
Threat name:
Win32.Trojan.Etset
Status:
Malicious
First seen:
2025-08-13 05:48:23 UTC
File Type:
Binary (Archive)
Extracted files:
14
AV detection:
10 of 24 (41.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence ransomware
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy WMI provider
Uses Volume Shadow Copy service COM API
Enumerates physical storage devices
Suspicious use of SetThreadContext
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_OutputDebugStringA_iat
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:dependsonpythonailib
Author:Tim Brown
Description:Hunts for dependencies on Python AI libraries
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:Indicator_MiniDumpWriteDump
Author:Obscurity Labs LLC
Description:Detects PE files and PowerShell scripts that use MiniDumpWriteDump either through direct imports or string references
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Trojan_Donutloader_f40e3759
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

ValleyRAT

zip 114b5c2ba2905d6333a8f9146df1c528a507ffc88a3da8c2344dff42ad8a8f97

(this sample)

  
Delivery method
Distributed via drive-by

Comments