MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 795190db4f5689c3b9973a7d3e6a01ad9eaee7c34d7c7446d0557a8fd916b96d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ValleyRAT


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 4 File information Comments

SHA256 hash: 795190db4f5689c3b9973a7d3e6a01ad9eaee7c34d7c7446d0557a8fd916b96d
SHA3-384 hash: b48b9ee731ba7c77ac3c092f19f1dbbbd95768ac85614825d5833b3df0323fce72094dd01d1e7b25ca322aca2664f857
SHA1 hash: fce76759c61c56fb96e5e60b2aead81bcda692fb
MD5 hash: 575ae22575b47753935082237d589eaf
humanhash: december-monkey-blossom-johnny
File name:sqlite3.dll
Download: download sample
Signature ValleyRAT
File size:852'480 bytes
First seen:2026-03-17 13:23:46 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash b15035de0874191bbda1e93d484ec77f (4 x ValleyRAT)
ssdeep 12288:50vdN8P2wT2YwIeeZKdg8wIS8RbYzPfslHML3bICEUbPyk8s2pOstc+/XWth04ck:48drtfZ203wsLLMUbV8s28sgCFU
TLSH T18C0512136A17D172FBC40930A013ABE699656CA2CFD5B697DBD2FB8E1C305C1A738705
TrID 58.7% (.EXE) UPX compressed Win64 Executable (70117/5/12)
22.6% (.EXE) UPX compressed Win32 Executable (27066/9/6)
5.4% (.EXE) Win64 Executable (generic) (6522/11/2)
4.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
3.7% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter JAMESWT_WT
Tags:43-160-214-122 dll ValleyRAT ywdtwss-icu

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
43.160.214.122:22011 https://threatfox.abuse.ch/ioc/1770774/

Intelligence


File Origin
# of uploads :
1
# of downloads :
137
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
99.1%
Tags:
virus zusy
Result
Verdict:
Malware
Maliciousness:

Behaviour
Using the Windows Management Instrumentation requests
DNS request
Connection attempt
Sending an HTTP GET request
Creating a file in the %temp% directory
Launching a process
Creating a process with a hidden window
Sending a custom TCP request
Creating a process from a recently created file
Creating a file
Loading a system driver
Setting a prohibition to launch some applications
Running batch commands
Сreating synchronization primitives
Creating a window
Forced shutdown of a system process
Firewall traversal
Prohibiting to launch files
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug explorer lolbin microsoft_visual_cc packed packed packed zusy
Verdict:
Malicious
File Type:
dll x32
Detections:
Backdoor.Win32.Agent.sb Trojan-Spy.Win32.Stealer.sb Trojan.Win64.Agentb.lhme Backdoor.Win32.Agent.myxecr Backdoor.Xkcp.TCP.ServerRequest Backdoor.Win32.Xkcp.a VHO:Rootkit.Win64.Agent.gsr Trojan.Win32.Inject.sb Trojan.Win32.Agent.sb Trojan-Spy.Win32.KeyLogger.sba Trojan.Win64.Kryplod.sb Backdoor.Agent.TCP.C&C Trojan-Dropper.Win32.Agent.sb Trojan.Win64.Agentb.lhmf Rootkit.Win64.Agent.gsr
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Win 32 Exe x86
Verdict:
Malicious
Threat:
Trojan-Spy.Win32.KeyLogger
Threat name:
Win32.Backdoor.Valleyrat
Status:
Malicious
First seen:
2026-03-11 13:37:25 UTC
File Type:
PE (Dll)
Extracted files:
65
AV detection:
16 of 22 (72.73%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery upx
Behaviour
Modifies registry class
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
UPX packed file
Looks up external IP address via web service
Executes dropped EXE
Badlisted process makes network request
Unpacked files
SH256 hash:
795190db4f5689c3b9973a7d3e6a01ad9eaee7c34d7c7446d0557a8fd916b96d
MD5 hash:
575ae22575b47753935082237d589eaf
SHA1 hash:
fce76759c61c56fb96e5e60b2aead81bcda692fb
SH256 hash:
7d7655e9446fd41dc1ae859435f39c250964532bc604c9bf6d737992430d645e
MD5 hash:
e45077d87ed038604553fa77cf824f8e
SHA1 hash:
bfe930582aec1dcef98e95f15fa717d5632bf97d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments