MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 86943869650c77b3a4ac1c1124d197cb92303758d496ba9a4eaa333da53da06d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ValleyRAT


Vendor detections: 14


Intelligence 14 IOCs 1 YARA 10 File information Comments

SHA256 hash: 86943869650c77b3a4ac1c1124d197cb92303758d496ba9a4eaa333da53da06d
SHA3-384 hash: f0f1ca82b53117e5b235b055e583e13596dfd841c728a6af547b0d25c94b22c3e3f7ef911d42f224022685db6232049e
SHA1 hash: 8756999efe4fc28e583cd66b687c6a63596b7935
MD5 hash: d9fa1bafef4e570de63c4520214d6801
humanhash: video-paris-pip-salami
File name:d9fa1bafef4e570de63c4520214d6801.exe
Download: download sample
Signature ValleyRAT
File size:16'641'683 bytes
First seen:2025-07-06 16:00:50 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash efd455830ba918de67076b7c65d86586 (57 x Gh0stRAT, 19 x ValleyRAT, 6 x OffLoader)
ssdeep 393216:boTmuFoOvIGhg/9DfU1FX62SsdIkkK9dANR/Vak4Na:omuu8CFDfUPXfvsK9d4aI
TLSH T157F63313E3CB513FF069593A49B7D222593B7E6A69224C52AAE8386CDF350D40D3F613
TrID 62.3% (.EXE) Inno Setup installer (107240/4/30)
24.1% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
6.1% (.EXE) Win64 Executable (generic) (10522/11/4)
2.6% (.EXE) Win32 Executable (generic) (4504/4/1)
1.2% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Magika pebin
dhash icon c0c8d4cc64d4ccf8 (8 x ValleyRAT, 3 x AsyncRAT, 3 x Blackmoon)
Reporter abuse_ch
Tags:exe RAT ValleyRAT


Avatar
abuse_ch
ValleyRAT C2:
18.162.151.228:443

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
18.162.151.228:443 https://threatfox.abuse.ch/ioc/1554039/

Intelligence


File Origin
# of uploads :
1
# of downloads :
30
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
rl_86943869650c77b3a4ac1c1124d197cb92303758d496ba9a4eaa333da53da06d
Verdict:
Malicious activity
Analysis date:
2025-07-06 16:03:03 UTC
Tags:
auto-reg golang

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
shell virus sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Creating a file
Creating a process with a hidden window
Running batch commands
Launching the process to change the firewall settings
Launching a process
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Enabling the 'hidden' option for recently created files
DNS request
Connection attempt
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context alien anti-debug embarcadero_delphi fingerprint installer overlay overlay packed packed zero
Result
Threat name:
ValleyRAT
Detection:
malicious
Classification:
spre.troj.spyw.expl.evad
Score:
76 / 100
Signature
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
Changes security center settings (notifications, updates, antivirus, firewall)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Modifies the DNS server
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs a network lookup / discovery via ARP
PowerShell case anomaly found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Sample is not signed and drops a device driver
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suricata IDS alerts for network traffic
Suspicious execution chain found
Suspicious powershell command line found
Tries to detect sandboxes / dynamic malware analysis system (QueryWinSAT)
Uses ipconfig to lookup or modify the Windows network settings
Uses netsh to modify the Windows network and firewall settings
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Yara detected ValleyRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1729553 Sample: nzqNj6Ca9T.exe Startdate: 06/07/2025 Architecture: WINDOWS Score: 76 141 ak1.ksdcks2.org 2->141 143 yandex.com 2->143 145 10 other IPs or domains 2->145 157 Suricata IDS alerts for network traffic 2->157 159 Multi AV Scanner detection for dropped file 2->159 161 Multi AV Scanner detection for submitted file 2->161 163 10 other signatures 2->163 12 nzqNj6Ca9T.exe 2 2->12         started        15 wscript.exe 2->15         started        18 svchost.exe 2->18         started        20 11 other processes 2->20 signatures3 process4 dnsIp5 139 C:\Users\user\AppData\...\nzqNj6Ca9T.tmp, PE32 12->139 dropped 23 nzqNj6Ca9T.tmp 25 21 12->23         started        203 Windows Scripting host queries suspicious COM object (likely to drop second stage) 15->203 205 Suspicious execution chain found 15->205 26 WindowsUpdateService.exe 15->26         started        29 WindowsUpdateService.exe 15->29         started        31 drvinst.exe 18->31         started        33 drvinst.exe 18->33         started        147 127.0.0.1 unknown unknown 20->147 207 Changes security center settings (notifications, updates, antivirus, firewall) 20->207 209 Modifies the DNS server 20->209 file6 signatures7 process8 file9 123 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 23->123 dropped 125 C:\Program Files (x86)\...\vpn.exe (copy), PE32 23->125 dropped 127 C:\...\vcruntime140_1.dll (copy), PE32+ 23->127 dropped 137 15 other malicious files 23->137 dropped 35 vpn.exe 23->35         started        39 wscript.exe 1 23->39         started        41 cmd.exe 1 23->41         started        195 Suspicious powershell command line found 26->195 197 Adds a directory exclusion to Windows Defender 26->197 199 PowerShell case anomaly found 26->199 201 Tries to detect sandboxes / dynamic malware analysis system (QueryWinSAT) 26->201 43 powershell.exe 26->43         started        45 powershell.exe 26->45         started        129 C:\Windows\System32\...\tap0901.sys (copy), PE32+ 31->129 dropped 131 C:\Windows\System32\...\SETDA09.tmp, PE32+ 31->131 dropped 133 C:\Windows\System32\...\tap0901.sys (copy), PE32+ 33->133 dropped 135 C:\Windows\System32\drivers\SETE811.tmp, PE32+ 33->135 dropped signatures10 process11 file12 115 C:\Users\user\AppData\Local\...\nsProcess.dll, PE32 35->115 dropped 117 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 35->117 dropped 119 C:\Users\user\AppData\Local\...\nsDialogs.dll, PE32 35->119 dropped 121 217 other malicious files 35->121 dropped 165 Sample is not signed and drops a device driver 35->165 47 LetsPRO.exe 35->47         started        49 tapinstall.exe 35->49         started        66 9 other processes 35->66 167 Windows Scripting host queries suspicious COM object (likely to drop second stage) 39->167 169 Suspicious execution chain found 39->169 52 WindowsUpdateService.exe 1 39->52         started        56 WindowsUpdateService.exe 39->56         started        171 Uses netsh to modify the Windows network and firewall settings 41->171 173 Uses ipconfig to lookup or modify the Windows network settings 41->173 175 Modifies the windows firewall 41->175 177 Performs a network lookup / discovery via ARP 41->177 58 cmd.exe 1 41->58         started        60 conhost.exe 41->60         started        179 Loading BitLocker PowerShell Module 43->179 62 conhost.exe 43->62         started        64 conhost.exe 45->64         started        signatures13 process14 dnsIp15 68 LetsPRO.exe 47->68         started        111 C:\Users\user\AppData\...\tap0901.sys (copy), PE32+ 49->111 dropped 113 C:\Users\user\AppData\Local\...\SETD8A2.tmp, PE32+ 49->113 dropped 72 conhost.exe 49->72         started        149 ak1.ksdcks2.org 18.162.151.228, 443, 49722, 49723 AMAZON-02US United States 52->149 181 Suspicious powershell command line found 52->181 183 Adds a directory exclusion to Windows Defender 52->183 185 PowerShell case anomaly found 52->185 187 Tries to detect sandboxes / dynamic malware analysis system (QueryWinSAT) 52->187 74 powershell.exe 23 52->74         started        76 powershell.exe 52->76         started        78 conhost.exe 58->78         started        80 netsh.exe 58->80         started        82 netsh.exe 58->82         started        84 28 other processes 58->84 189 Loading BitLocker PowerShell Module 66->189 86 14 other processes 66->86 file16 signatures17 process18 dnsIp19 151 yandex.com 77.88.44.55, 443, 49728 YANDEXRU Russian Federation 68->151 153 d1dmgcawtbm6l9.cloudfront.net 18.173.242.161, 443, 49731, 49732 MIT-GATEWAYSUS United States 68->153 155 13 other IPs or domains 68->155 191 Loading BitLocker PowerShell Module 68->191 88 cmd.exe 68->88         started        91 cmd.exe 68->91         started        93 cmd.exe 68->93         started        95 conhost.exe 74->95         started        97 conhost.exe 76->97         started        signatures20 process21 signatures22 193 Performs a network lookup / discovery via ARP 88->193 99 conhost.exe 88->99         started        101 ARP.EXE 88->101         started        103 conhost.exe 91->103         started        105 ipconfig.exe 91->105         started        107 conhost.exe 93->107         started        109 ROUTE.EXE 93->109         started        process23
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) Win 32 Exe x86
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-06-25 15:03:27 UTC
File Type:
PE (Exe)
AV detection:
14 of 36 (38.89%)
Threat level:
  5/5
Result
Malware family:
valleyrat_s2
Score:
  10/10
Tags:
family:valleyrat_s2 backdoor defense_evasion discovery execution persistence privilege_escalation ransomware spyware trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Gathers network information
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy WMI provider
Uses Volume Shadow Copy service COM API
Enumerates physical storage devices
Event Triggered Execution: Netsh Helper DLL
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Adds Run key to start application
Checks installed software on the system
Enumerates connected drives
Network Service Discovery
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Command and Scripting Interpreter: PowerShell
Drops file in Drivers directory
Modifies Windows Firewall
ValleyRat
Valleyrat_s2 family
Malware Config
C2 Extraction:
ak1.ksdcks2.org:443
Unpacked files
SH256 hash:
86943869650c77b3a4ac1c1124d197cb92303758d496ba9a4eaa333da53da06d
MD5 hash:
d9fa1bafef4e570de63c4520214d6801
SHA1 hash:
8756999efe4fc28e583cd66b687c6a63596b7935
SH256 hash:
5219d15e899aaf0d292d6b0faa645bb36fdfb7cffe073d1cefd96976230b4bef
MD5 hash:
f2ef60f80167a6937abb3f7b0e104696
SHA1 hash:
12187f6f0410528bd2ca9e6b349533ec2bde8b6d
SH256 hash:
23d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6
MD5 hash:
192639861e3dc2dc5c08bb8f8c7260d5
SHA1 hash:
58d30e460609e22fa0098bc27d928b689ef9af78
SH256 hash:
89a82c4849c21dfe765052681e1fad02d2d7b13c8b5075880c52423dca72a912
MD5 hash:
b7d61f3f56abf7b7ff0d4e7da3ad783d
SHA1 hash:
15ab5219c0e77fd9652bc62ff390b8e6846c8e3e
SH256 hash:
dfb3bb98cfe620841fbf2a15aa67c1614d4746a2ea0e5925211de1fee7138b38
MD5 hash:
bf2bbecd323865428aa9c919c81def68
SHA1 hash:
b74c6ef70d5ec4f28eaa706e55aaf852059b6077
SH256 hash:
a1268e37fd8573696e7a5ac72245f9e68d03da58e233aa8459ade1ebaceb5e9e
MD5 hash:
272e07f476c7e1c5aca60830b56e0a34
SHA1 hash:
7fa680d08bdf89cb239cb0477bd2670bc551dd21
SH256 hash:
31f5be8f8c915b9380f9313c7207d443ed9457ebe85082b24351bf0dba2de3d4
MD5 hash:
b9a679b3b6e628877a583c69d1494eb8
SHA1 hash:
ba15003edf48bac6ca355278462ce35d6cef1504
SH256 hash:
867e02930955c7b46f056f75103b3f319201f9e17fbf5b43e232339b31aabf23
MD5 hash:
8c7f419509838cba5f21f39354093e2e
SHA1 hash:
7f36028d846d1cfd32431acde5d54347e0751740
SH256 hash:
6ce84b76065b3be4681f8b426bd205b6136b0a86645adb648bcaaf591091a5c4
MD5 hash:
5ca51114b792fc913e1f02f7eee38da7
SHA1 hash:
03ee7ba91620551c7405c7b793274a60c1299baa
SH256 hash:
b55d1e505df751c0a1124fdb603ef0930fff877c444aeb9e032eacfa4d418c16
MD5 hash:
0d5f7e68fa09525e167e03c75eac729a
SHA1 hash:
1f9ba859c2e13ec607fcda992f482566ad4fea92
SH256 hash:
869c7e2c335ac0b4ea8c10ea6b06d46e15cf7e5ddadbc1601b8650382822284c
MD5 hash:
55355b036ab87e8fc8668c903023946e
SHA1 hash:
7e53ae7041706b7d0915f6dd6aba93a53d7a6b7c
SH256 hash:
cc750b2713707819a9040ee4f606ebc3cd1c62ba8280b96dde425c3a356bff00
MD5 hash:
8c0b729c5f2e3a6b3ff67d9e654623c1
SHA1 hash:
d77aaeb6bc94bc71d9f16c67187c695886bca8b5
SH256 hash:
0773e5eb4d9937c29af68f7b44ade7427d1fd682b2242b4cb29daaf8b0e3f56e
MD5 hash:
74f339d5d47aedacd574ea8e43c78eef
SHA1 hash:
9ce203e22c170217a726531b81b3b1119320f5e2
SH256 hash:
66aaef421a6e5600c9a55df8c2408ba6ac393a18481763234062b5b4d6219463
MD5 hash:
7be1e3cf7ce2218c91f8ea5329855106
SHA1 hash:
19e11bd58759d161d6b63c3166c9783cbe25ea53
SH256 hash:
51accaea47c925c746289dcc2c2468000e52d35014d5beec0d4527ba5edb8f32
MD5 hash:
2ab0f22398c97c110ebcec4a16696754
SHA1 hash:
0b3c5f61dd906154849e3641abef80b703f5a524
SH256 hash:
421f535f975206581a319388cf5c4446b13d38fb577cd8d0949cee95d0355bcd
MD5 hash:
61ce4d7a9ce800ae1a2640eb354d8699
SHA1 hash:
e598725c90a17576c348aeb091f62ed8254eca05
SH256 hash:
df37bae8908a3ff8c81f24fe8af7cbed5e7866c06c9d0501e5622cf92f24f2b4
MD5 hash:
4ca0f090fdcfe7f69e76c74ed4061c5f
SHA1 hash:
3f6b2ade15bd17e3788f28a4234579fb29145cb4
SH256 hash:
0fb3e6ce76adb9382505786ca72e54795610ae0945aa2188f1aaa1e2434bc758
MD5 hash:
d11586531b1ad873c75414af8f522b12
SHA1 hash:
e9ffada993abfc3c137b29116b2b0fe825fd5b89
SH256 hash:
2fd76a0b108dae5a8c7f2d3ddb211578708a7fb290f04ab21aa5590afc08bff5
MD5 hash:
52db06f93ceb63971cc6a57f47b2ca08
SHA1 hash:
d7f2fba5bd65626fc277b4119486a9981698f72e
SH256 hash:
8751f05a3fe9f47769688dffbb1a693a4ed294fb926c48977403a33335e8aa16
MD5 hash:
ae161bb3c83ab4b8734180bced6d2f2d
SHA1 hash:
8761f19a2bd2b79f977f60cab4be6eb6cdbeb340
SH256 hash:
e66ecc070ca8d11695e4419a237c8772db52ae379cc25fa8f2d730cd18a1634a
MD5 hash:
c76c74988b910e15a33600329e10d5f7
SHA1 hash:
6062928b46a7a9bbb48460884cd43cfa961e11a3
SH256 hash:
24baf40aaa25034bec86ecf320346f9ff78ce193e0183a9dde30cd88f0aaee0a
MD5 hash:
f28c6dab4323451de706e09f1ae88a1a
SHA1 hash:
93ff9c39dad928a7ba058876e16dab27a97e389e
SH256 hash:
2dcfc29720137e3202d10f58fe12e82550302b6afea08180afc86791e3fc0c44
MD5 hash:
f4398fe43e52a4a4fcae21d461b43372
SHA1 hash:
92a5d557dfa367aff9ee7a1042da259d7da670d9
SH256 hash:
75947d11b416413e79da6ab5f44dcb54b1dc48eebfde6c85610bb8b3d6134004
MD5 hash:
674a8ba78b28a220503c8f98e281fd1d
SHA1 hash:
14fdc05872adf4c6871e07ebcdd470088b987149
SH256 hash:
1ccb3d44ace876f746329fe7fcf2856023e73e55af3d9e903b23a5a25af12c8b
MD5 hash:
7290c34bb20cc24a484db06ae4397f99
SHA1 hash:
0d8277cef404251a8850f463001f4ba57202c6b0
SH256 hash:
3ab9cead7cef63380c067a2dbbab74cf235eae7d0062d6b87bdd54dd3d47d29d
MD5 hash:
c4fd23daaa6cbd1f874a6de29249e265
SHA1 hash:
ca60063bb6116d2d64c8b341a5d629f1b2343309
SH256 hash:
28313d126e02792fb92178bcb85ceb076512f8f5fcad08fa020433c3fc8f62d6
MD5 hash:
d723b270a44704b397a3105227473736
SHA1 hash:
0f9a2e4ebce6b7b5116a331a7f0d12cb1b9cd521
SH256 hash:
c89f066f65528371744e7b11dc5d6ae8d60412f9eedb0ea3b16da34d2b49a0a1
MD5 hash:
3292894be0809414901c1ab760927c9f
SHA1 hash:
de7d403e2b6714ff789442bb0fb3d5568fdaabd3
SH256 hash:
341e481706ec61e991373e0fbd3ed224f74b9b91c3f1d122d0e802f7145fedb1
MD5 hash:
27139c2eaab131627031a142b6eb8fee
SHA1 hash:
3ff180e3709f7b4c70c922dab1ad9544308e132b
SH256 hash:
de86d770cbcf733688daf90f6a7845cc937bd4e0bacc36bcb092ac5552d153c0
MD5 hash:
1a129494d9fa3d82eda1935ae5952bbf
SHA1 hash:
b7523c2d680f2dbca67eca4ba56b2a768b558a63
SH256 hash:
8efb2d14b79c25ede58b2440c533c0469287b8d05e21fc087fa7ceeab35e08db
MD5 hash:
f727238aac4966b90b592873a6675d95
SHA1 hash:
0c05d1ec5aacf7bcecdd9a873b08026e866a262c
SH256 hash:
d186980882573174279c26db7f9f572fd6e0c4456ddb283ef5a4a81da8f3dc2e
MD5 hash:
bb0404fe0c1d40bee14e1efe425efe1c
SHA1 hash:
4d6c5710172e2cad9f3bacead9e139703404599b
SH256 hash:
186953cd630228fbf2dae45609aec84603a7486aa3a801a9a338af9731604a32
MD5 hash:
ecdac8c162642e014ef49f6aa261ad33
SHA1 hash:
d90018d030b2f42f2583f6d1585d77734e4d76a2
SH256 hash:
68d9703cf227e18786c59097b2b161fcca02fdc8fc71e146e114d1e2989c3825
MD5 hash:
9e781243e74d737371a9ab43dbd82c7a
SHA1 hash:
2076cd04f90d0d99e093dd76ab30f60415f637ca
SH256 hash:
9c99142bf158b0504bc6b0f2a90f3e20c5951c3bbb03afaa0a245524f8609fdb
MD5 hash:
2bb3a5d9d0e2f3dbdb0a9db6222df2a2
SHA1 hash:
ef1543080b4195363d8e7dca65f278d8bfa7e41a
SH256 hash:
dbf9db5b408e4148de3a16421778eda94817263e9e6394ced4b150675d47f79e
MD5 hash:
b852f474ef9218f45098ace770f8e03d
SHA1 hash:
0d1dc2458b1f565ba3ad67521e387794d6dbd5dc
SH256 hash:
03a936a32fc810e591ee016ce4d693f74554b29fb3b837dd317116b49ca2cdd7
MD5 hash:
ad9c1cbd94dbe6491ddbcc8a4357bd02
SHA1 hash:
1e3f2624163be873160a321777a360aebaae16a6
SH256 hash:
bb3097be7078f95db4b5f8eca6f096227d4e5bed36ff423cbf1614fa6d6c163f
MD5 hash:
5dd3dee266ec6cbbaaa98cd90d3daf27
SHA1 hash:
e4d1f116c9c7e27039e9a3a7fbfade088b348542
SH256 hash:
10397f8ef2b6d2561a6b66f45b7c39c7dee1bafeb2a7901c7d826cc4b9ee783f
MD5 hash:
99abd532a48a95b0dd97da12d85b6145
SHA1 hash:
3e6ec6080215ffed9fc75e37837a751750a2a90a
SH256 hash:
250ba009864179cf3938c44c3996a0214138a21e557fb4752b1265b2276de8db
MD5 hash:
29aca8d4890037d4c36b2c9a5b908edf
SHA1 hash:
e13ba2fec82ea7f947cfa4b64a8998c74bdb2be4
SH256 hash:
e9dfb48631d420f82dcbdb3ad8b3ea5a1e8530133dc0e53c153a56e83396dcae
MD5 hash:
c40bb25883d8802a3a6a27ecb003bc13
SHA1 hash:
2a145d4ebd6e590a2e2b87ddb459c8b36644da13
SH256 hash:
61cb331483c8bf172c7c78eebb0659700402c91c04c334bdada6745bcf7c317d
MD5 hash:
da8c9b6d2380128ea101c137fec032bc
SHA1 hash:
e25eb1cb8a7dd88d3371eddbb6132c25a90be415
SH256 hash:
a66e04ac02cc716a6b803bbf9392ef30350f11e37fc6ecb73675b679dd6e4ccb
MD5 hash:
a1aef10d7c301e4c682b799a7505fa83
SHA1 hash:
d8373b4d571d928218d4c9b9d7f50aa4df1fd81c
SH256 hash:
98521e259e5be4e96a6f4060a8bfa732316629da5409bc0262ce0ee412ef4876
MD5 hash:
57d5105ad4304c17acbc7a056ed854fe
SHA1 hash:
60fc4e5ef8ed785b881183165eea3eed62947487
SH256 hash:
f6850dac70f91a49aa17ce01ab745374daff1e97fdd8429081d49f48e1a11b1e
MD5 hash:
7d221893b9a3c2c8f56d509e3a11a779
SHA1 hash:
36ed9bae1965a3bd78448c5f31fba0e36dfc788b
SH256 hash:
1b4a31d943d1cdf61374c5f1144d987fb592b6fe07634904b686337c402443c5
MD5 hash:
dcd13ca6580abcbce9d784e4c8b7baf6
SHA1 hash:
8525809d4f44f688eb1c9a6c91cd16a807147824
SH256 hash:
1aa08bbc0d85705059ec93b377e65ed7621d753b9c72287adec70f34d4748250
MD5 hash:
0c993e9e4f7730dbf766b4c3ccfa6fe0
SHA1 hash:
8cee7f00a3be84e50fdb75f4d7cdfe19d8f71c65
SH256 hash:
3fca1c2976a99d3c5360e9c23e56945e88fe308982e08b974133238a8d19197a
MD5 hash:
83200c33c863a600dffe0121fb088be7
SHA1 hash:
20232a807d6d7fdfab3dee5b50edbd9d1371ea00
SH256 hash:
df146439dabf50af9ec29cdbabcf0308eb3b6889090282dc5da5cd4c5a092851
MD5 hash:
88365149f581ab45b8e7069a9ded8f84
SHA1 hash:
031ff0b7e79acf3a5b2672af300baf2fa2a3fdfd
SH256 hash:
a89de7b1912796b438a57cf8c55253dafe969a6b7ffca11c8746a5ca0a90701e
MD5 hash:
291bbc4128fdbdbbb936664f855198b7
SHA1 hash:
9f172721d5f6369833457463fdbe1d0d8fcc6407
SH256 hash:
f6b0218f34cf89f7e085c6583d6547e85388e090e5f9a4d17d7814f264fe6f39
MD5 hash:
e064afd521d474e661a94303bf6cc73e
SHA1 hash:
c21937438cb35da6d317e8a682a4e3b250de6411
SH256 hash:
f1229345db1f7cf3c21f3cbc23c0386f94d8684aa1df53f8e582885682782bec
MD5 hash:
3f23561a65159d080bda4946ae485e45
SHA1 hash:
1c8959a750ad6058004ec6904d407d6d2296a5d3
SH256 hash:
51bcb05b3683925a1cd24f8736ba8b37b35be4e4744d6780ef2f2e15c84526b3
MD5 hash:
2c91a4b1460a6fd711ce9ff2197e161c
SHA1 hash:
fc3ccbfd8f48ef89e07d4fd17fb596473594ed06
SH256 hash:
2997a69a5fafd14f06fef0209ff6d401514931726392767720240bebbb715e66
MD5 hash:
5965914eb0a3f60ff4644c0a7b03c0ac
SHA1 hash:
9977bff0bed6207a8e385562022f6f4cfef7ba97
SH256 hash:
1a623db73e79276b0ad3d2455e7edc3ab8952d4169eb3dbb8a5e2dba9db5d6c0
MD5 hash:
137388fc71b167712ef759277a3779c1
SHA1 hash:
de07b9e5cf067fdd7ccd0e9a44b3bf2c466f5185
SH256 hash:
7bef8b7fef823154ab234c36ef1276a93edc131375e870a0fdb0643daec08d93
MD5 hash:
77d97d2588b6a66c15fac9336513c324
SHA1 hash:
59f71fe70e5b3048fbb6fe6b08515388c37c24c3
SH256 hash:
33655cfc898b404d3ebec588170bba8129690ea24c69017d3c79a3b752f66137
MD5 hash:
731d978add96e14f34af3decff8e0a6d
SHA1 hash:
f7d69618e685c7ed9b94e02af08bbff82362aec9
SH256 hash:
de919b194118e02b8142c3e04dc64b3af66c8ce30747c8f0dd98856d6e3ab9d5
MD5 hash:
212dcaa8fe2f1b73790c4d8376531c5a
SHA1 hash:
62af026c0c45561574a836fc3ca0075e6647f4e9
SH256 hash:
d28d191c3cc8a94562596f7bc4f2e2f6104fd3b6de55a3170d283c730998321f
MD5 hash:
ad4d0251860b77641c21f425d137b6a0
SHA1 hash:
79512ddb574ad45a16fc286015b7c348afe838ed
SH256 hash:
631403b64c713b78211dbc4bfa385f2e908798299ae1af1cf913fbc2836717e8
MD5 hash:
4b3ff081a6ca2f2a0287d903f5d93f80
SHA1 hash:
103a4395f7a2c4226adc70a6c88cbaec697dc7c0
SH256 hash:
c6547cad13a9e664fdbd634e6b2f1ad5da2f478c55812e0d6ce7ea63d9ea2438
MD5 hash:
74b67a114c8b98763bf3598fd3f0f866
SHA1 hash:
7b5596cc656e010c065274b08dcc578e3172cb60
SH256 hash:
499cad64cfefa6a9a6311c2278b62280978da027915516f2ca9d346556c254ab
MD5 hash:
ac00e3dce46dc817a5cff6aea0a832fb
SHA1 hash:
94aca30ace3ef5de69ef5de246e8f071b71b1356
SH256 hash:
be16d630d658a5b0cf6562c6d682c67c825658b601e3026f4d07ad4bd9ed50ab
MD5 hash:
2442f972874f392058f1a75152926631
SHA1 hash:
6876d5b68fe2dc77ab3f5f65842f582629a16961
SH256 hash:
d63c912d8923ff50932ee4ddd44c66e50fe3059f34731f5c07cd532c17b588a6
MD5 hash:
781acd9e4ac8e02b253d55078d569cfe
SHA1 hash:
92b3c76c9df9986d7c03ef58ac94ba037982fc97
SH256 hash:
70333a2723e6b7b93114749a6cb0cbd3ee5d69bfdccdcf1330eadca4df26a68e
MD5 hash:
ed14048fc83edc332eadad9ddc42b6a3
SHA1 hash:
c0a7c8a43106629931f6971300711d47d1e0de6b
SH256 hash:
9a70bfcc63443345ed9df805540638ce7726c894597bc10c4acb850e59905d5b
MD5 hash:
4d8e2cad10047b4bfe8bb92e025fa1d0
SHA1 hash:
449d7204491a2564c36f648d1ed58ca7be1fc3aa
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:botnet_plaintext_c2
Author:cip
Description:Attempts to match at least some of the strings used in some botnet variants which use plaintext communication protocols.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:pe_detect_tls_callbacks
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:Windows_Generic_Threat_3055c14a
Author:Elastic Security
Rule name:Windows_Trojan_Winos_464b8a2e
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_TRUST_INFORequires Elevated Execution (level:requireAdministrator)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User Authorizationadvapi32.dll::AllocateAndInitializeSid
advapi32.dll::ConvertSidToStringSidW
advapi32.dll::ConvertStringSecurityDescriptorToSecurityDescriptorW
advapi32.dll::EqualSid
advapi32.dll::FreeSid
SECURITY_BASE_APIUses Security Base APIadvapi32.dll::AdjustTokenPrivileges
advapi32.dll::GetTokenInformation
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CreateProcessW
advapi32.dll::OpenProcessToken
advapi32.dll::OpenThreadToken
kernel32.dll::CloseHandle
kernel32.dll::CreateThread
WIN_BASE_APIUses Win Base APIkernel32.dll::LoadLibraryA
kernel32.dll::LoadLibraryExW
kernel32.dll::LoadLibraryW
kernel32.dll::GetDriveTypeW
kernel32.dll::GetVolumeInformationW
kernel32.dll::GetSystemInfo
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateDirectoryW
kernel32.dll::CreateFileW
kernel32.dll::DeleteFileW
kernel32.dll::GetWindowsDirectoryW
kernel32.dll::GetSystemDirectoryW
kernel32.dll::GetFileAttributesW
WIN_BASE_USER_APIRetrieves Account Informationadvapi32.dll::LookupPrivilegeValueW
WIN_REG_APICan Manipulate Windows Registryadvapi32.dll::RegOpenKeyExW
advapi32.dll::RegQueryValueExW
WIN_USER_APIPerforms GUI Actionsuser32.dll::PeekMessageW
user32.dll::CreateWindowExW

Comments