MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 992c05a9cc84dfa9873d4d379f8d8dd80fcf2df64adf3f23477d3191be449000. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ValleyRAT


Vendor detections: 10


Intelligence 10 IOCs YARA 6 File information Comments 1

SHA256 hash: 992c05a9cc84dfa9873d4d379f8d8dd80fcf2df64adf3f23477d3191be449000
SHA3-384 hash: 5eb794a37ca914dc472755a5e9b751b72e9f70394fe986303c7c64b644b7db3b9febdf3a15e5b6938eaa6f3f921f44f6
SHA1 hash: e4f0d93d2f1eb1a81b349c1766c58e45ae85dc11
MD5 hash: 55e76b4221eeaeb60e4d26e6e86f2a21
humanhash: coffee-may-montana-virginia
File name:Sandboxie.exe
Download: download sample
Signature ValleyRAT
File size:63'397'519 bytes
First seen:2025-05-22 06:53:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 40ab50289f7ef5fae60801f88d4541fc (59 x ValleyRAT, 49 x Gh0stRAT, 41 x OffLoader)
ssdeep 1572864:z6+HHghR6lrfpGTWGCSgedXbxR9duq646ot0k1nHi:z6uHgj6lDpGTNXNdud46sL9H
TLSH T1B9D73312F38FF86BE1495B3718B3FA1894F7AA212512AE4586FC78D8CE355100D3E65B
TrID 49.8% (.EXE) Inno Setup installer (107240/4/30)
20.0% (.EXE) InstallShield setup (43053/19/16)
19.3% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
4.8% (.EXE) Win64 Executable (generic) (10522/11/4)
2.0% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon 5050d270cccc82ae (109 x Adware.Generic, 43 x LummaStealer, 42 x OffLoader)
Reporter dght_432
Tags:exe ValleyRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
573
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Sandboxie.exe
Verdict:
No threats detected
Analysis date:
2025-05-22 06:43:01 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
94.1%
Tags:
dropper virus blic
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Searching for the window
Creating a file in the %AppData% subdirectories
Moving a file to the %AppData% subdirectory
Creating a file
Connection attempt
Sending a custom TCP request
DNS request
Replacing files
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
embarcadero_delphi fingerprint installer invalid-signature overlay overlay packed signed
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
AI detected suspicious PE digital signature
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to compare user and computer (likely to detect sandboxes)
Creates / moves files in alternative data streams (ADS)
Detected unpacking (creates a PE file in dynamic memory)
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Multi AV Scanner detection for submitted file
Opens the same file many times (likely Sandbox evasion)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suricata IDS alerts for network traffic
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1696643 Sample: Sandboxie.exe Startdate: 22/05/2025 Architecture: WINDOWS Score: 100 61 symptomatic.quest 2->61 67 Suricata IDS alerts for network traffic 2->67 69 Multi AV Scanner detection for submitted file 2->69 71 AI detected suspicious PE digital signature 2->71 73 2 other signatures 2->73 10 Sandboxie.exe 2 2->10         started        13 QMUpload.exe 2->13         started        16 svchost.exe 2->16         started        18 6 other processes 2->18 signatures3 process4 dnsIp5 51 C:\Users\user\AppData\Local\...\Sandboxie.tmp, PE32 10->51 dropped 21 Sandboxie.tmp 5 13 10->21         started        79 Contains functionality to compare user and computer (likely to detect sandboxes) 13->79 24 QMUpload.exe 2 13->24         started        81 Changes security center settings (notifications, updates, antivirus, firewall) 16->81 28 MpCmdRun.exe 16->28         started        63 127.0.0.1 unknown unknown 18->63 53 C:\ProgramData\Microsoft53etwork\...\qmgr.jfm, DOS 18->53 dropped file6 signatures7 process8 dnsIp9 43 C:\Users\user\AppData\...\boiii.exe (copy), PE32+ 21->43 dropped 45 C:\Users\user\AppData\...\is-NUSSE.tmp, PE32+ 21->45 dropped 47 C:\Users\user\AppData\...\is-J9QM3.tmp, PE32 21->47 dropped 49 6 other files (none is malicious) 21->49 dropped 30 boiii.exe 15 21->30         started        65 118.107.46.23, 27979, 49697, 49700 BCPL-SGBGPNETGlobalASNSG Singapore 24->65 77 Opens the same file many times (likely Sandbox evasion) 24->77 34 conhost.exe 28->34         started        file10 signatures11 process12 file13 55 C:\ProgramData\nyUmpdF5\msvcp140.dll, PE32 30->55 dropped 57 C:\ProgramData\nyUmpdF5\QMStuck.dll, PE32 30->57 dropped 59 :ATK (copy), PE32+ 30->59 dropped 83 Detected unpacking (creates a PE file in dynamic memory) 30->83 85 Creates / moves files in alternative data streams (ADS) 30->85 87 Adds a directory exclusion to Windows Defender 30->87 36 powershell.exe 23 30->36         started        signatures14 process15 signatures16 75 Loading BitLocker PowerShell Module 36->75 39 conhost.exe 36->39         started        41 WmiPrvSE.exe 36->41         started        process17
Gathering data
Threat name:
Win32.Malware.Generic
Status:
Suspicious
First seen:
2025-05-22 06:43:05 UTC
File Type:
PE (Exe)
AV detection:
12 of 37 (32.43%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery execution
Behaviour
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Checks installed software on the system
Enumerates connected drives
Executes dropped EXE
Loads dropped DLL
Command and Scripting Interpreter: PowerShell
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:HUNTING_SUSP_TLS_SECTION
Author:chaosphere
Description:Detect PE files with .tls section that can be used for anti-debugging
Reference:Practical Malware Analysis - Chapter 16
Rule name:pe_detect_tls_callbacks
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User Authorizationadvapi32.dll::AllocateAndInitializeSid
advapi32.dll::ConvertSidToStringSidW
advapi32.dll::ConvertStringSecurityDescriptorToSecurityDescriptorW
advapi32.dll::EqualSid
advapi32.dll::FreeSid
SECURITY_BASE_APIUses Security Base APIadvapi32.dll::AdjustTokenPrivileges
advapi32.dll::GetTokenInformation
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CreateProcessW
advapi32.dll::OpenProcessToken
advapi32.dll::OpenThreadToken
kernel32.dll::CloseHandle
kernel32.dll::CreateThread
WIN_BASE_APIUses Win Base APIkernel32.dll::LoadLibraryA
kernel32.dll::LoadLibraryExW
kernel32.dll::LoadLibraryW
kernel32.dll::GetDriveTypeW
kernel32.dll::GetVolumeInformationW
kernel32.dll::GetSystemInfo
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateDirectoryW
kernel32.dll::CreateFileW
kernel32.dll::DeleteFileW
kernel32.dll::GetWindowsDirectoryW
kernel32.dll::GetSystemDirectoryW
kernel32.dll::GetFileAttributesW
WIN_BASE_USER_APIRetrieves Account Informationadvapi32.dll::LookupPrivilegeValueW
WIN_REG_APICan Manipulate Windows Registryadvapi32.dll::RegOpenKeyExW
advapi32.dll::RegQueryValueExW
WIN_USER_APIPerforms GUI Actionsuser32.dll::PeekMessageW
user32.dll::CreateWindowExW

Comments



Avatar
commented on 2025-05-22 06:54:57 UTC

Reference:https://tip.neiki.dev/file/992c05a9cc84dfa9873d4d379f8d8dd80fcf2df64adf3f23477d3191be449000