MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 326ec709d9d42bdd49f421488f957ba6fdcc5f3ec82615dda7a6555d0e8c8578. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ValleyRAT


Vendor detections: 18


Intelligence 18 IOCs 1 YARA 18 File information Comments

SHA256 hash: 326ec709d9d42bdd49f421488f957ba6fdcc5f3ec82615dda7a6555d0e8c8578
SHA3-384 hash: e7b4a2a9fe784f574d936bc950bd29a36922c6a090aa81034d1980cdfb3287202634b055162e608bcfb31dd434252723
SHA1 hash: f57c1073e202a9a0ebebda3e39ec91cfcf06504b
MD5 hash: b5f3398aea0a5120d48ef422cd7ee0bc
humanhash: jersey-beer-lamp-lamp
File name:326ec709d9d42bdd49f421488f957ba6fdcc5f3ec8261.exe
Download: download sample
Signature ValleyRAT
File size:2'495'111 bytes
First seen:2026-03-16 04:50:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7e0a0e8f80bbd1a9c0078e57256f1c3d (7 x ValleyRAT, 5 x GCleaner, 4 x CoinMiner)
ssdeep 49152:FgqKIXzRJryYj0A53S1ML3OiSWxoZHeYetS9iwxVfRHKEbk/:FzDlj0AG8+isHeYetS99HDbO
Threatray 261 similar samples on MalwareBazaar
TLSH T138B51259D6A808F8D073A2B88A635A03E7777C5A1371D78F03A479622F773915D3EB02
TrID 37.0% (.EXE) Win64 Executable (generic) (6522/11/2)
28.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
11.5% (.EXE) OS/2 Executable (generic) (2029/13)
11.3% (.EXE) Generic Win/DOS Executable (2002/3)
11.3% (.EXE) DOS Executable (generic) (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe RAT ValleyRAT


Avatar
abuse_ch
ValleyRAT C2:
143.92.32.132:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
143.92.32.132:80 https://threatfox.abuse.ch/ioc/1767819/

Intelligence


File Origin
# of uploads :
1
# of downloads :
226
Origin country :
NL NL
Vendor Threat Intelligence
Malware configuration found for:
Archives
Details
Archives
SFX commands and extracted archive contents
Malware family:
n/a
ID:
1
File name:
326ec709d9d42bdd49f421488f957ba6fdcc5f3ec82615dda7a6555d0e8c8578.exe
Verdict:
Malicious activity
Analysis date:
2026-03-16 04:38:15 UTC
Tags:
silverfox backdoor valleyrat rat winos donutloader loader evasion arch-exec

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
emotet nemty
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the Program Files directory
Creating a process from a recently created file
Creating a file in the %temp% subdirectories
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Moving a recently created file
Launching a process
Loading a suspicious library
Running batch commands
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context anti-debug anti-vm donut exploit explorer fingerprint fingerprint installer installer installer-heuristic lolbin microsoft_visual_cc msiexec overlay packed packed rozena runonce sfx unsafe valleyrat
Verdict:
Malicious
File Type:
exe x64
Detections:
Trojan.Win64.Agentb.sb Trojan.Win32.Shellcode.sb Trojan.Win32.Shellcode.nsi Backdoor.Win32.Agentb.sb Backdoor.Agent.TCP.C&C UDS:DangerousObject.Multi.Generic
Result
Threat name:
DonutLoader, ValleyRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found evasive API chain (may stop execution after checking mutex)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Ping/Del Command Combination
Suricata IDS alerts for network traffic
Unusual module load detection (module proxying)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected DonutLoader
Yara detected ValleyRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1884058 Sample: 326ec709d9d42bdd49f421488f9... Startdate: 16/03/2026 Architecture: WINDOWS Score: 100 63 zodia-custody-test.co 2->63 65 inst.olpotl.cn 2->65 67 5 other IPs or domains 2->67 79 Suricata IDS alerts for network traffic 2->79 81 Found malware configuration 2->81 83 Malicious sample detected (through community Yara rule) 2->83 85 7 other signatures 2->85 10 326ec709d9d42bdd49f421488f957ba6fdcc5f3ec8261.exe 5 2->10         started        14 WindowsTasker.exe 4 14 2->14         started        signatures3 process4 dnsIp5 51 C:\Program Files\mysetup.exe, PE32 10->51 dropped 53 C:\Program Files\FastOrange.exe, PE32 10->53 dropped 89 Uses ping.exe to sleep 10->89 91 Uses ping.exe to check the status of other devices and networks 10->91 17 mysetup.exe 2 10->17         started        20 PING.EXE 10->20         started        23 FastOrange.exe 19 10->23         started        25 conhost.exe 10->25         started        75 zodia-custody-test.co 143.92.32.132, 49724, 49728, 49732 BCPL-SGBGPNETGlobalASNSG Singapore 14->75 77 myexternalip.com 34.160.111.145, 49729, 49733, 49735 ATGS-MMD-ASUS United States 14->77 93 Found evasive API chain (may stop execution after checking mutex) 14->93 95 Contains functionality to inject threads in other processes 14->95 97 Contains functionality to capture and log keystrokes 14->97 99 3 other signatures 14->99 27 schtasks.exe 14->27         started        file6 signatures7 process8 dnsIp9 45 C:\Users\user\AppData\Local\...\mysetup.tmp, PE32 17->45 dropped 29 mysetup.tmp 5 11 17->29         started        69 127.0.0.1 unknown unknown 20->69 71 appinstall.uajrl.cn 178.128.50.163, 443, 49714, 49719 DIGITALOCEAN-ASNUS Netherlands 23->71 73 cdn.bitiful.qtlcdn.com 117.91.199.23, 443, 49715, 49720 CHINATELECOM-JIANGSU-YANGZHOU-IDCCHINATELECOMJiangSuYangZ China 23->73 33 dfsvc.exe 17 30 23->33         started        35 conhost.exe 27->35         started        file10 process11 file12 55 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 29->55 dropped 57 C:\ProgramData\...\vcruntime140.dll (copy), PE32 29->57 dropped 59 C:\ProgramData\...\msvcp140.dll (copy), PE32 29->59 dropped 61 6 other malicious files 29->61 dropped 101 Multi AV Scanner detection for dropped file 29->101 37 regsvr32.exe 2 29->37         started        signatures13 process14 file15 47 C:\ProgramData\...behaviorgraphuard.dll, PE32 37->47 dropped 49 C:\ProgramData\...\DataReport.dll, PE32 37->49 dropped 40 cmd.exe 1 37->40         started        43 conhost.exe 37->43         started        process16 signatures17 87 Uses ping.exe to sleep 40->87
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 64 Exe x64
Threat name:
Win64.Trojan.Egairtigado
Status:
Malicious
First seen:
2026-03-15 18:00:02 UTC
File Type:
PE+ (Exe)
Extracted files:
69
AV detection:
13 of 24 (54.17%)
Threat level:
  5/5
Result
Malware family:
valleyrat_s2
Score:
  10/10
Tags:
family:valleyrat_s2 backdoor discovery installer
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Inno Setup is an open-source installation builder for Windows applications.
Enumerates physical storage devices
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Drops file in Program Files directory
Enumerates connected drives
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
ValleyRat
Valleyrat_s2 family
Unpacked files
SH256 hash:
326ec709d9d42bdd49f421488f957ba6fdcc5f3ec82615dda7a6555d0e8c8578
MD5 hash:
b5f3398aea0a5120d48ef422cd7ee0bc
SHA1 hash:
f57c1073e202a9a0ebebda3e39ec91cfcf06504b
SH256 hash:
5c17c60f5fb07693cd03dbb2d3e3331afb6e95235df7f99a8c43b5183e657be8
MD5 hash:
4adb5f40b496ecd7d3aa2b78d2f57ef7
SHA1 hash:
54674e04c580b93d3e1e027a8e0c601b1b4e1ff3
SH256 hash:
ccb6f246b0f5058e69782a91fe8dd45379c8918877594966a021f0014be2c7d1
MD5 hash:
9b4e5046097cd4d900a21719e5540803
SHA1 hash:
aa800b76eb6ecdc5a2de0153eaa0a79010bfe83a
Malware family:
ValleyRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:GenericGh0st
Author:Still
Rule name:Gh0stKCP
Author:Netresec
Description:Detects HP-Socket ARQ and KCP implementations, which are used in Gh0stKCP. Forked from @stvemillertime's KCP catchall rule.
Reference:https://netresec.com/?b=259a5af
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_peb_parsing
Author:Willi Ballenthin
Rule name:pe_detect_tls_callbacks
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:telebot_framework
Author:vietdx.mb
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.
Rule name:Windows_Generic_Threat_4b0b73ce
Author:Elastic Security
Rule name:WinosStager
Author:YungBinary
Description:https://www.esentire.com/blog/winos4-0-online-module-staging-component-used-in-cleversoar-campaign

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments