MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1c4b6b9c2fadda863748af855dc6f34bc43f716cc9368d8ed8b32f6f8eecc007. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ValleyRAT


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 1c4b6b9c2fadda863748af855dc6f34bc43f716cc9368d8ed8b32f6f8eecc007
SHA3-384 hash: 271aefb78af4c4e1a8711b05fa26f8e9ce86e3d8112780102c6f0eb9ea72a627123b1abe0798f96afa168b556f8b5531
SHA1 hash: 03c502efdbd0892667638252b27bcd1f080d5af6
MD5 hash: c30bec888d243536f66af29438cfdd22
humanhash: low-lamp-bravo-missouri
File name:aui.8756241008.exe
Download: download sample
Signature ValleyRAT
File size:79'463'636 bytes
First seen:2025-10-01 06:53:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c329cfdce996b315359260e710fbdc76 (3 x SliverFox, 3 x ValleyRAT)
ssdeep 393216:RKmZuJXsmJ7coYzTiWwoVDVmfC3U8CNluI3Vaqv8Wqud76tGboYrChZZROu8WLAP:nwOD82k3L1qBw
TLSH T110087B42A3E0D565E17B9230C5B642F6A7F37C48EB30C61F1298BD693FB37506928726
TrID 25.7% (.EXE) InstallShield setup (43053/19/16)
24.8% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
18.6% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
9.8% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
6.2% (.EXE) Win64 Executable (generic) (10522/11/4)
Magika pebin
Reporter zhuzhu0009
Tags:backdoor exe SilverFox ValleyRAT winos

Intelligence


File Origin
# of uploads :
1
# of downloads :
168
Origin country :
RU RU
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
aui.8756241008.exe
Verdict:
Malicious activity
Analysis date:
2025-10-01 06:56:10 UTC
Tags:
auto-sch

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
93.3%
Tags:
shellcode cobalt small micro
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Sending a custom TCP request
Creating a process with a hidden window
DNS request
Connection attempt
Sending an HTTP GET request
Adding an exclusion to Microsoft Defender
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug anti-vm base64 CAB evasive explorer installer lolbin microsoft_visual_cc overlay overlay packed
Verdict:
Malicious
File Type:
exe x64
First seen:
2025-10-01T04:22:00Z UTC
Last seen:
2025-10-02T02:29:00Z UTC
Hits:
~100
Detections:
Trojan.Win64.Zenpak.sb Trojan.Win64.Kryplod.sb Trojan.Win32.EtwTamper.mx Trojan.Win32.Agent.sba HackTool.Multi.AmsiETWPatch.sb BSS:Trojan.Win32.Generic
Gathering data
Threat name:
Win64.Trojan.Astraea
Status:
Malicious
First seen:
2025-10-01 06:57:35 UTC
File Type:
PE+ (Exe)
Extracted files:
1131
AV detection:
14 of 38 (36.84%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Verdict:
Suspicious
Tags:
exploit TA_Abused_Service
YARA:
suspicious_RTF_usingURLMoniker
Malware family:
CobaltStrike
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments