MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 426a65c63c1641d6bd86a7c10afa8384f6bcc640a53610730e7519759914c22e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ValleyRAT


Vendor detections: 14


Intelligence 14 IOCs 1 YARA 15 File information Comments

SHA256 hash: 426a65c63c1641d6bd86a7c10afa8384f6bcc640a53610730e7519759914c22e
SHA3-384 hash: 2655aaa95fbbce1e58a08d531f9bf30e069eaf030a8a6ed48d7c49725ac2b9af15dae390fbe11413fd8c1bff682668a8
SHA1 hash: 76f7ffcaff9d698763c1b4481190022789844efc
MD5 hash: 93b7536426a1fb20fc86d7de13ba226e
humanhash: early-oxygen-eighteen-lamp
File name:HAGtYlC.exe
Download: download sample
Signature ValleyRAT
File size:4'286'358 bytes
First seen:2025-05-23 11:35:25 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 12e12319f1029ec4f8fcbed7e82df162 (389 x DCRat, 52 x RedLineStealer, 51 x Formbook)
ssdeep 98304:F6aAinpQIloH79xoRh0fzQN/bx+3HibkjzRtNgJJ5tAzcOwT/u:EaAinagU7IR+fcN/bx+XoEltcvtAzcTK
Threatray 2'410 similar samples on MalwareBazaar
TLSH T12716334175D099B2D8632F320E795A20993DFD201FA9EEDB73E48B5DAD101D0DA34BA3
TrID 89.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.5% (.EXE) Win64 Executable (generic) (10522/11/4)
2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon cdabae6fe6e7eaec (20 x Amadey, 9 x AurotunStealer, 8 x CoinMiner)
Reporter abuse_ch
Tags:exe RAT ValleyRAT


Avatar
abuse_ch
ValleyRAT C2:
38.181.35.237:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
38.181.35.237:80 https://threatfox.abuse.ch/ioc/1532768/

Intelligence


File Origin
# of uploads :
1
# of downloads :
449
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
HAGtYlC.exe
Verdict:
Malicious activity
Analysis date:
2025-05-23 11:37:34 UTC
Tags:
silverfox backdoor valleyrat winos rat upx delphi

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.1%
Tags:
shellcode emotet smarts micro
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% directory
Creating a process from a recently created file
Connection attempt
Sending a custom TCP request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
adaptive-context anti-debug anti-vm anti-vm base64 certreq crypto expand fingerprint installer lolbin microsoft_visual_cc overlay overlay packed packed packed packed packer_detected remote sfx
Result
Threat name:
GhostRat, ValleyRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Binary or sample is protected by dotNetProtector
C2 URLs / IPs found in malware configuration
Contains functionality to capture and log keystrokes
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found evasive API chain (may stop execution after checking mutex)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected GhostRat
Yara detected ValleyRAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Nekark
Status:
Malicious
First seen:
2025-05-23 11:36:14 UTC
File Type:
PE (Exe)
Extracted files:
89
AV detection:
16 of 37 (43.24%)
Threat level:
  5/5
Result
Malware family:
donutloader
Score:
  10/10
Tags:
family:donutloader discovery loader upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
UPX packed file
Enumerates connected drives
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Detects DonutLoader
DonutLoader
Donutloader family
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
426a65c63c1641d6bd86a7c10afa8384f6bcc640a53610730e7519759914c22e
MD5 hash:
93b7536426a1fb20fc86d7de13ba226e
SHA1 hash:
76f7ffcaff9d698763c1b4481190022789844efc
SH256 hash:
04b8befd6d67a5fda0647bc51f3c5e9a775eb25cc03365584843034f35d2572b
MD5 hash:
749a24c7485d7e11d367f0f189aef08a
SHA1 hash:
811c159c4a6a00e7816fd76114e9ba124fa906ca
SH256 hash:
5eb5ec0b0b4934faa829379cdaec2d985a63ceca88b6e6cc9cfc33ee59002282
MD5 hash:
0527d33e11c94ef2021ecd15413d6634
SHA1 hash:
83d15b2fa9b829f2ce9d7c5172acbfbef1b2cab3
SH256 hash:
61d8f39aa6b7fa85db4ee6e9ab6519e838f74f80f7307bc0b1e4d9d0389a0f51
MD5 hash:
86c8ab9c30f0dc45dba3e0cb540f37f8
SHA1 hash:
2d506862cae8bc88e94b51243533e2ca6e814029
SH256 hash:
96cdce11ba3d28bad3088f6997927c643feedf78ee1b0139c05a6edcbc9a9fd2
MD5 hash:
ff1dbe7ad2af9ee8e8a681a492a3d109
SHA1 hash:
23131b4804ba7a7d6ea866c12244dc2568187b9f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_SUSPICIOUS_EXE_ClearMyTracksByProcess
Author:ditekSHen
Description:Detects executables calling ClearMyTracksByProcess
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_peb_parsing
Author:Willi Ballenthin
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Generic_Threat_4b0b73ce
Author:Elastic Security
Rule name:win_valley_rat_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.valley_rat.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ValleyRAT

Executable exe 426a65c63c1641d6bd86a7c10afa8384f6bcc640a53610730e7519759914c22e

(this sample)

  
Delivery method
Distributed via web download

Comments