MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6600e79da01251789f8cfd6599d9f22edf1a6c4e3e8fb8a4123757bdcc26de57. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ValleyRAT


Vendor detections: 14


Intelligence 14 IOCs 1 YARA 6 File information Comments

SHA256 hash: 6600e79da01251789f8cfd6599d9f22edf1a6c4e3e8fb8a4123757bdcc26de57
SHA3-384 hash: ba98b8dc35d674c73f2d9485d14d0d5b2631cca6aa8a1bee9bc186245aa254d92839598f1e37ce25b2488d6f57dcaeed
SHA1 hash: afde7e557e21ee0c85613d6a9b85f760920fd135
MD5 hash: c635acc81450b3c47bae36ec02762a77
humanhash: may-blossom-florida-paris
File name:e57e1361.exe
Download: download sample
Signature ValleyRAT
File size:2'334'720 bytes
First seen:2026-02-03 16:10:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 58df836f6788615dd5d90fd175be31c9 (1 x ValleyRAT)
ssdeep 24576:1yIaYPJBicbZabh2bXHrJdJ677eTxywgy:oIaYP7L9z6neTxywz
Threatray 4 similar samples on MalwareBazaar
TLSH T12FB56EDAA70D41E5CDDB32B8DB564A73AA84A924077486CFFBAEC91FF00F81540F1916
TrID 32.2% (.EXE) Win64 Executable (generic) (10522/11/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4504/4/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter abuse_ch
Tags:exe RAT ValleyRAT


Avatar
abuse_ch
ValleyRAT C2:
156.254.21.227:6666

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
156.254.21.227:6666 https://threatfox.abuse.ch/ioc/1740818/

Intelligence


File Origin
# of uploads :
1
# of downloads :
132
Origin country :
NL NL
Vendor Threat Intelligence
No detections
Malware family:
n/a
ID:
1
File name:
失足缅北女猪仔被男友骗到园区后遭到主管暴力殴打强奸.7z
Verdict:
Malicious activity
Analysis date:
2026-02-03 16:02:56 UTC
Tags:
arch-exec silverfox backdoor valleyrat rat winos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
70%
Tags:
shellcode emotet small hype
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-02-03T10:17:00Z UTC
Last seen:
2026-02-03T10:31:00Z UTC
Hits:
~10
Detections:
Backdoor.Agent.HTTP.C&C Trojan.Win32.Zenpak.sb Exploit.Win64.Crun.b PDM:Trojan.Win32.Generic PDM:Exploit.Win32.Generic Backdoor.Win32.Agentb.sb HEUR:Exploit.Win32.ShellCode.gen
Result
Threat name:
ValleyRAT
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found evasive API chain (may stop execution after checking mutex)
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Unusual module load detection (module proxying)
Uses known network protocols on non-standard ports
Yara detected ValleyRAT
Behaviour
Behavior Graph:
Gathering data
Result
Malware family:
valleyrat_s2
Score:
  10/10
Tags:
family:valleyrat_s2 backdoor discovery
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Program crash
System Location Discovery: System Language Discovery
Enumerates connected drives
Executes dropped EXE
Loads dropped DLL
Detects ValleyRAT payload
ValleyRat
Valleyrat_s2 family
Unpacked files
SH256 hash:
6600e79da01251789f8cfd6599d9f22edf1a6c4e3e8fb8a4123757bdcc26de57
MD5 hash:
c635acc81450b3c47bae36ec02762a77
SHA1 hash:
afde7e557e21ee0c85613d6a9b85f760920fd135
SH256 hash:
f261cc18252673fe68bb4819325e7378665d2f7a9d54fa100e024d6097a1a15c
MD5 hash:
44a76ddfd505240163b9b792c0b6d227
SHA1 hash:
f024ea34a8d6764c1ec957354b1c0fce9dc638a2
SH256 hash:
5d3552a945b99cb2a5bb23e2472252631bee5012dacc1159817279f19403687c
MD5 hash:
df3a554a2ce746075d60a7f99abb3fc5
SHA1 hash:
2c78873eae162f19c4ee82b88ce4702fdcc18b1e
Malware family:
ValleyRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Capability_Embedded_Lua
Author:Obscurity Labs LLC
Description:Detects embedded Lua engines by looking for multiple Lua API symbols or env-var hooks
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:RANSOMWARE
Author:ToroGuitar

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments