MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7fe80e04473465d9f615ff5b47b0d79e7b1b0f43cee6d249e0ca695073a5f7fa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
ValleyRAT
Vendor detections: 16
| SHA256 hash: | 7fe80e04473465d9f615ff5b47b0d79e7b1b0f43cee6d249e0ca695073a5f7fa |
|---|---|
| SHA3-384 hash: | 16e9cc094a057a1ba2411e5b535a44f15dc277cf37e8f345cc96667ee6228902ac549909346aa49ed530c625ca933646 |
| SHA1 hash: | ef6ae6a21fc87ea548d2425ad9149ad88efeba4c |
| MD5 hash: | fc057b47b3bea3b1e5410b326ac55315 |
| humanhash: | gee-wolfram-november-six |
| File name: | 7fe80e04473465d9f615ff5b47b0d79e7b1b0f43cee6d249e0ca695073a5f7fa |
| Download: | download sample |
| Signature | ValleyRAT |
| File size: | 518'144 bytes |
| First seen: | 2025-05-16 09:48:17 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c316c09a38dd8756a01b65ed6910d7a5 (1 x ValleyRAT) |
| ssdeep | 6144:DPUlmJBsosn5hzSk7/Ud9OB/ivvcYohahENkxQol0XAD35m0ampO83rvdcYc7KH:DPUlyuFHzV/U+UcYoL+eKQG5+YV6 |
| TLSH | T1AEB47D1A72E804B9E577813DC9538906F7B3BC560720DAAF13A4476B1F237D1A93EB21 |
| TrID | 48.7% (.EXE) Win64 Executable (generic) (10522/11/4) 23.3% (.EXE) Win16 NE executable (generic) (5038/12/1) 9.3% (.EXE) OS/2 Executable (generic) (2029/13) 9.2% (.EXE) Generic Win/DOS Executable (2002/3) 9.2% (.EXE) DOS Executable Generic (2000/1) |
| Magika | pebin |
| Reporter | |
| Tags: | dsh-fvsrchps-cn exe ValleyRAT |
Intelligence
File Origin
ITVendor Threat Intelligence
Result
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
cf417c75c8323c2f5b6d99661aac0ccfdb977a020b6c02d0170f1de350c04252
2f8caaee0056f565ff196509cec7c15e804b5a3349e0f8da20e93e889939e5cf
7fe80e04473465d9f615ff5b47b0d79e7b1b0f43cee6d249e0ca695073a5f7fa
144ef23ee12c8eea97bb470379504ba2ae30f2263b8242d5aa9e358e29234b35
589843f0267a1dfc864fd4e1d87c3aeaddea946f67d4fa5f94e319cfd09bd623
ec254c2d8a4ff02028505bf7c1eb994d24ff30d7395d2057d45f8cb9e4adfb60
78073d05ad9332199eea1f51bc30ae648745d4fe2e725f1ffca0d164369822f9
a5d58182d5e4d5c1452d7d39dd2261c0fd78363cc5ec9772cb3b681238781958
970e8ab761970955e79c64c81b07e4598161cfb1d269b980f067bfe019495f6c
6e077a0d195558a6dbe2f78349db94ccddff1513a92288b9a1408256267560e7
c16ba051fe48b6f157f2bd2fe580ded19982122b56b55b1342163f064db7dedb
f320b0222a719de0b9b5c67fc856f391ae3a6af171205b8373914e63eed11ff8
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__QueryInfo |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | dgaagas |
|---|---|
| Author: | Harshit |
| Description: | Uses certutil.exe to download a file named test.txt |
| Rule name: | golang_bin_JCorn_CSC846 |
|---|---|
| Author: | Justin Cornwell |
| Description: | CSC-846 Golang detection ruleset |
| Rule name: | ICMLuaUtil_UACMe_M41 |
|---|---|
| Author: | Marius 'f0wL' Genheimer <hello@dissectingmalwa.re> |
| Description: | A Yara rule for UACMe Method 41 -> ICMLuaUtil Elevated COM interface |
| Reference: | https://github.com/hfiref0x/UACME |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
| Rule name: | malware_shellcode_hash |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect shellcode api hash value |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CreateRemoteThread KERNEL32.dll::OpenProcess KERNEL32.dll::VirtualAllocEx KERNEL32.dll::WriteProcessMemory KERNEL32.dll::CloseHandle KERNEL32.dll::CreateThreadpoolWait |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess ntdll.dll::NtQueryInformationProcess KERNEL32.dll::LoadLibraryA KERNEL32.dll::LoadLibraryExW KERNEL32.dll::GetStartupInfoW KERNEL32.dll::GetCommandLineW KERNEL32.dll::GetCommandLineA |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::ReadConsoleW KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleOutputCP KERNEL32.dll::GetConsoleMode |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CreateFileW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegOpenKeyExA ADVAPI32.dll::RegQueryValueExA ADVAPI32.dll::RegSetValueExW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.