MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aa94291f9f25c61f4ef1181043c6c402b238774620603716ceea6412a9f29cc5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ValleyRAT


Vendor detections: 7


Intelligence 7 IOCs 1 YARA 6 File information Comments

SHA256 hash: aa94291f9f25c61f4ef1181043c6c402b238774620603716ceea6412a9f29cc5
SHA3-384 hash: caef512185b686ef12ad5cb08930e2cd7d42962c0dbd14f3a6765abaca1c74c6b944192d284093d7b25dde366eb947d4
SHA1 hash: b63153bb028bc0145d312e162447ab3e4a76e301
MD5 hash: b881ee902102572a85080bec53767b0e
humanhash: johnny-white-ten-friend
File name:E-Invoice.rar
Download: download sample
Signature ValleyRAT
File size:702'145 bytes
First seen:2026-02-03 00:53:09 UTC
Last seen:2026-02-03 11:33:46 UTC
File type: rar
MIME type:application/x-rar
ssdeep 12288:jthfEByFfRK6bhiNq9Ep5UkOgDJxN+9IAjSN7d2japGxD5n7:XEBoRKzmEEUD5+9JjSNBEd7
TLSH T158E4239F065A09406AFAD680A90F675CDF96D16D72D3C28F2F1B25381123ACF41DDBE8
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Magika rar
Reporter Anonymous
Tags:rar ValleyRAT

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
47.76.86.151:23156 https://threatfox.abuse.ch/ioc/1739987/

Intelligence


File Origin
# of uploads :
2
# of downloads :
59
Origin country :
TW TW
File Archive Information

This file archive contains 5 file(s), sorted by their relevance:

File name:AISafeSDK64.dll
File size:1'597'440 bytes
SHA256 hash: 6a25cf8ca25379e296985987ab0836301ee6e255868ef013276ba8e360cceb33
MD5 hash: 662b5ce37b3e1f271dc24973a0c4fc4f
MIME type:application/x-dosexec
Signature ValleyRAT
File name:425
File size:48 bytes
SHA256 hash: 5c8258b3423b896b031b7fa12154ad8cf0c0435ab0e2ef8499418eb7f99cc8e9
MD5 hash: baa0fd1888fded14be6b829812ee91f6
MIME type:application/octet-stream
Signature ValleyRAT
File name:E-Invoice.exe
File size:364'624 bytes
SHA256 hash: 8aaba749e9444b3b49ccc8d248415240a305dbd28c37e3f0314d9c9ac33626e5
MD5 hash: 2dbfa346a66e96f5460b7cd41c956c4f
MIME type:application/x-dosexec
Signature ValleyRAT
File name:422
File size:62 bytes
SHA256 hash: bb946c0e8f4db1c00ae128a493ee6cc4e3e73986d1962abea8493445de3eb8ee
MD5 hash: 01e360740b2c2252d346b255f4450fbf
MIME type:application/octet-stream
Signature ValleyRAT
File name:_RDATA
File size:512 bytes
SHA256 hash: 6194443f6e8c830fe6be47871a435dbd54122f30d5aa6199de1d4b0792263491
MD5 hash: 9cf747dafd0e0d9ffe9826e56a360a88
MIME type:application/octet-stream
Signature ValleyRAT
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
dropper virus
Verdict:
Malicious
File Type:
rar
Detections:
HEUR:HackTool.Win64.UACme.gen
Verdict:
inconclusive
YARA:
1 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Rar Archive
Threat name:
Win32.Trojan.Midie
Status:
Malicious
First seen:
2026-02-03 00:53:34 UTC
File Type:
Binary (Archive)
Extracted files:
41
AV detection:
10 of 36 (27.78%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:NETDLLMicrosoft
Author:malware-lu
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:WinosStager
Author:YungBinary
Description:https://www.esentire.com/blog/winos4-0-online-module-staging-component-used-in-cleversoar-campaign

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via e-mail link

Comments