MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 79bfc162c9d2da637620c41dc382008d7ddd9868cd87a4a1b609325716430fee. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ValleyRAT


Vendor detections: 14


Intelligence 14 IOCs 1 YARA 12 File information Comments

SHA256 hash: 79bfc162c9d2da637620c41dc382008d7ddd9868cd87a4a1b609325716430fee
SHA3-384 hash: a06f13cb0bb336a05245eaeb80241f9ea6cfa495ed852de841665e6957f4c2c96ef004181f7d0c2827b3b76f451f3f39
SHA1 hash: 0e3a4a6adb49df1a04f61ea0bd586f6e8380745e
MD5 hash: afea906aa68b0342af677c8b8a3acbcb
humanhash: sink-fifteen-carbon-jupiter
File name:TEMS_Steup_CaAlc.msi
Download: download sample
Signature ValleyRAT
File size:357'888 bytes
First seen:2025-06-23 06:48:37 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ccb723b95fc2a9f7b3794ba856c080c8 (1 x ValleyRAT)
ssdeep 6144:dC6yAW6XHJA0E/NyVLUOndwCWwkxy9HfTvsSCJ9vFlNQ:d2AW6XHKv/4ndwCWHy9/ToQ
Threatray 361 similar samples on MalwareBazaar
TLSH T1AD748D16E79510BAD55B8138C5734A05EBB2BC560B61E68F27E40A6A3F33FE09B3D701
TrID 63.5% (.EXE) Win64 Executable (generic) (10522/11/4)
12.2% (.EXE) OS/2 Executable (generic) (2029/13)
12.0% (.EXE) Generic Win/DOS Executable (2002/3)
12.0% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe msi RAT ValleyRAT

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
182.16.26.82:443 https://threatfox.abuse.ch/ioc/1548750/

Intelligence


File Origin
# of uploads :
1
# of downloads :
459
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
TEMS_Steup_CaAlc.msi
Verdict:
Malicious activity
Analysis date:
2025-06-17 03:29:05 UTC
Tags:
generated-doc arch-exec winos

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.1%
Tags:
shellcode virus
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
DNS request
Connection attempt
Sending a custom TCP request
Creating a file
Сreating synchronization primitives
Searching for synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
Running batch commands
Enabling the 'hidden' option for recently created files
Launching a process
Creating a window
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm fingerprint lolbin microsoft_visual_cc overlay similar-threat update
Result
Threat name:
ValleyRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Self deletion via cmd or bat file
Sigma detected: Notepad Making Network Connection
Sigma detected: Suspicious Process Parents
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Uses cmd line tools excessively to alter registry or file data
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected ValleyRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1720679 Sample: TEMS_Steup_CaAlc.msi.exe Startdate: 23/06/2025 Architecture: WINDOWS Score: 100 113 moneycome.me 2->113 115 img.nmxzjl.icu 2->115 123 Suricata IDS alerts for network traffic 2->123 125 Malicious sample detected (through community Yara rule) 2->125 127 Multi AV Scanner detection for dropped file 2->127 129 5 other signatures 2->129 10 loaddll64.exe 15 2->10         started        13 WindowsEvent.exe 2->13         started        16 WindowsEvent.exe 2->16         started        18 2 other processes 2->18 signatures3 process4 file5 111 C:\Users\user\Desktop\...\DataReport.dll, PE32 10->111 dropped 20 regsvr32.exe 2 11 10->20         started        25 rundll32.exe 11 10->25         started        27 cmd.exe 1 10->27         started        37 3 other processes 10->37 153 Writes to foreign memory regions 13->153 155 Allocates memory in foreign processes 13->155 157 Creates a thread in another existing process (thread injection) 13->157 29 notepad.exe 13->29         started        31 notepad.exe 16->31         started        33 notepad.exe 18->33         started        35 notepad.exe 18->35         started        signatures6 process7 dnsIp8 117 img.nmxzjl.icu 104.21.19.237, 443, 49718, 49721 CLOUDFLARENETUS United States 20->117 79 C:\Users\user\Desktop\...\vcruntime140.dll, PE32 20->79 dropped 81 C:\Users\user\Desktop\...\msvcp140.dll, PE32 20->81 dropped 83 C:\Users\user\Desktop\temp_5079625\down.exe, PE32 20->83 dropped 85 C:\Users\user\Desktop\...\DataReport.dll, PE32 20->85 dropped 131 Self deletion via cmd or bat file 20->131 39 down.exe 6 20->39         started        43 cmd.exe 1 20->43         started        87 C:\Users\user\Desktop\...\vcruntime140.dll, PE32 25->87 dropped 89 C:\Users\user\Desktop\...\msvcp140.dll, PE32 25->89 dropped 91 C:\Users\user\Desktop\temp_5055515\down.exe, PE32 25->91 dropped 93 C:\Users\user\Desktop\...\DataReport.dll, PE32 25->93 dropped 133 System process connects to network (likely due to code injection or exploit) 25->133 45 down.exe 6 25->45         started        47 cmd.exe 25->47         started        135 Uses ping.exe to sleep 27->135 137 Uses ping.exe to check the status of other devices and networks 27->137 49 rundll32.exe 27->49         started        119 moneycome.me 182.16.26.82, 443, 49725, 49726 NETSEC-HKNETSECHK Hong Kong 29->119 139 Contains functionality to inject threads in other processes 29->139 141 Contains functionality to capture and log keystrokes 29->141 143 Contains functionality to inject code into remote processes 29->143 51 cmd.exe 31->51         started        53 cmd.exe 33->53         started        file9 signatures10 process11 file12 95 C:\ProgramData\A92E3F\vcruntime140.dll, PE32 39->95 dropped 97 C:\ProgramData\A92E3F\msvcp140.dll, PE32 39->97 dropped 99 C:\ProgramData\A92E3F\WindowsEvent.exe, PE32 39->99 dropped 101 C:\ProgramData\A92E3F\DataReport.dll, PE32 39->101 dropped 147 Uses cmd line tools excessively to alter registry or file data 39->147 55 reg.exe 1 1 39->55         started        58 WindowsEvent.exe 39->58         started        149 Uses ping.exe to sleep 43->149 60 PING.EXE 1 43->60         started        63 conhost.exe 43->63         started        103 C:\ProgramData\024206\vcruntime140.dll, PE32 45->103 dropped 105 C:\ProgramData\024206\msvcp140.dll, PE32 45->105 dropped 107 C:\ProgramData\024206\WindowsEvent.exe, PE32 45->107 dropped 109 C:\ProgramData\024206\DataReport.dll, PE32 45->109 dropped 65 reg.exe 45->65         started        67 WindowsEvent.exe 45->67         started        69 2 other processes 47->69 151 Self deletion via cmd or bat file 49->151 71 2 other processes 51->71 73 2 other processes 53->73 signatures13 process14 dnsIp15 145 Creates multiple autostart registry keys 55->145 75 conhost.exe 55->75         started        121 127.0.0.1 unknown unknown 60->121 77 conhost.exe 65->77         started        signatures16 process17
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable PE (Portable Executable) Win 64 Exe x64
Threat name:
Win64.Trojan.Egairtigado
Status:
Malicious
First seen:
2025-06-13 07:14:03 UTC
File Type:
PE+ (Dll)
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
donutloader
Score:
  10/10
Tags:
family:donutloader discovery loader persistence
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Internet Connection Discovery
Adds Run key to start application
Enumerates connected drives
Executes dropped EXE
Loads dropped DLL
Detects DonutLoader
DonutLoader
Donutloader family
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
79bfc162c9d2da637620c41dc382008d7ddd9868cd87a4a1b609325716430fee
MD5 hash:
afea906aa68b0342af677c8b8a3acbcb
SHA1 hash:
0e3a4a6adb49df1a04f61ea0bd586f6e8380745e
Malware family:
DonutLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_peb_parsing
Author:Willi Ballenthin
Rule name:pe_detect_tls_callbacks
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Windows_Generic_Threat_4b0b73ce
Author:Elastic Security
Rule name:win_valley_rat_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.valley_rat.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
KERNEL32.dll::OpenProcess
KERNEL32.dll::CloseHandle
WINHTTP.dll::WinHttpCloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineA
KERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleOutputCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileExW
SHLWAPI.dll::PathRemoveFileSpecW
KERNEL32.dll::FindFirstFileW
WIN_HTTP_APIUses HTTP servicesWINHTTP.dll::WinHttpConnect
WINHTTP.dll::WinHttpCrackUrl
WINHTTP.dll::WinHttpOpen
WINHTTP.dll::WinHttpOpenRequest
WINHTTP.dll::WinHttpReadData
WINHTTP.dll::WinHttpReceiveResponse

Comments