MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e8e9df79257bea763a14fc5493e653f2201a579fb1d7d0e31a56310e41fc5126. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ValleyRAT


Vendor detections: 18


Intelligence 18 IOCs 1 YARA 23 File information Comments

SHA256 hash: e8e9df79257bea763a14fc5493e653f2201a579fb1d7d0e31a56310e41fc5126
SHA3-384 hash: d98a5807089e5cfed6306c655617f0f6140637864a9af480a5e6693d5123a17ad660256049ab981350ac89c9a2197451
SHA1 hash: 69606bf0e94ff870e72ac68441ec1be718d377c8
MD5 hash: 0b8e76770a9e5803082153c2535053df
humanhash: ink-gee-oregon-river
File name:e8e9df79257bea763a14fc5493e653f2201a579fb1d7d.exe
Download: download sample
Signature ValleyRAT
File size:2'190'054 bytes
First seen:2026-04-15 03:50:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 40ab50289f7ef5fae60801f88d4541fc (67 x ValleyRAT, 52 x Gh0stRAT, 42 x OffLoader)
ssdeep 49152:++MRvHjHJzVmaxh67MZ2Z9ftchfudg87dqn7iMO:+rjmaxh+MYchXqdnMO
TLSH T1ADA5D023B2CBE43EE05D4B3B45B2A25494FBAB616523BD1797E4849CCF250602E3E747
TrID 61.4% (.EXE) Inno Setup installer (107240/4/30)
23.8% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
3.7% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.7% (.EXE) Win64 Executable (generic) (6522/11/2)
2.5% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
dhash icon 71f096a2a296c4c1 (3 x ValleyRAT)
Reporter abuse_ch
Tags:exe RAT ValleyRAT


Avatar
abuse_ch
ValleyRAT C2:
108.187.4.158:557

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
108.187.4.158:557 https://threatfox.abuse.ch/ioc/1791357/

Intelligence


File Origin
# of uploads :
1
# of downloads :
153
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e8e9df79257bea763a14fc5493e653f2201a579fb1d7d0e31a56310e41fc5126.exe
Verdict:
Malicious activity
Analysis date:
2026-04-15 03:35:04 UTC
Tags:
anti-evasion auto-reg auto-sch

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
dropper agentb virus sage
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Searching for the window
Sending a custom TCP request
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Enabling the 'hidden' option for recently created files
Creating a service
Loading a system driver
Launching a service
DNS request
Connection attempt
Sending an HTTP GET request
Running batch commands
Launching a process
Launching a tool to kill processes
Enabling autorun for a service
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
adaptive-context anti-debug barys embarcadero_delphi fingerprint inno installer installer installer-heuristic packed redcap soft-404
Verdict:
Malicious
File Type:
exe x32
First seen:
2026-04-15T00:35:00Z UTC
Last seen:
2026-04-15T06:37:00Z UTC
Hits:
~10
Detections:
Trojan.Win32.Agent.xcdmfq Trojan.Win32.Agent.sb PDM:Trojan.Win32.Generic Backdoor.Xkcp.TCP.ServerRequest Backdoor.Agent.TCP.C&C HEUR:Trojan.Win32.Agentb.gen
Result
Threat name:
ValleyRAT
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to capture and log keystrokes
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Delayed program exit found
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Potential Privilege Escalation using Task Scheduler highest RunLevel
Sample is not signed and drops a device driver
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Suricata IDS alerts for network traffic
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected ValleyRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1898416 Sample: e8e9df79257bea763a14fc5493e... Startdate: 15/04/2026 Architecture: WINDOWS Score: 100 67 Suricata IDS alerts for network traffic 2->67 69 Found malware configuration 2->69 71 Antivirus detection for dropped file 2->71 73 12 other signatures 2->73 9 e8e9df79257bea763a14fc5493e653f2201a579fb1d7d.exe 2 2->9         started        12 PrintDialog.exe 1 12 2->12         started        14 PrintDialog.exe 12 2->14         started        process3 file4 61 e8e9df79257bea763a...f2201a579fb1d7d.tmp, PE32 9->61 dropped 16 e8e9df79257bea763a14fc5493e653f2201a579fb1d7d.tmp 20 13 9->16         started        19 cmd.exe 1 12->19         started        21 cmd.exe 1 14->21         started        process5 file6 53 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 16->53 dropped 55 C:\...\unins000.exe (copy), PE32 16->55 dropped 57 C:\Program Files (x86)\...\is-UTBUP.tmp, PE32 16->57 dropped 59 6 other malicious files 16->59 dropped 23 PrintDialog.exe 4 12 16->23         started        26 6688.exe 4 1 16->26         started        30 taskkill.exe 1 16->30         started        32 taskkill.exe 1 16->32         started        34 conhost.exe 19->34         started        36 schtasks.exe 1 19->36         started        38 conhost.exe 21->38         started        40 schtasks.exe 1 21->40         started        process7 dnsIp8 65 108.187.4.158, 49716, 49717, 49718 LEASEWEB-USA-LAX-11US United States 23->65 42 cmd.exe 1 23->42         started        63 C:\Program Files (x86)\...\PengPeng.sys, PE32+ 26->63 dropped 79 Sample is not signed and drops a device driver 26->79 45 conhost.exe 30->45         started        47 conhost.exe 32->47         started        file9 signatures10 process11 signatures12 75 Uses schtasks.exe or at.exe to add and modify task schedules 42->75 77 Potential Privilege Escalation using Task Scheduler highest RunLevel 42->77 49 conhost.exe 42->49         started        51 schtasks.exe 1 42->51         started        process13
Gathering data
Threat name:
Win32.Trojan.Qwexlafiba
Status:
Malicious
First seen:
2026-04-15 03:35:22 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
valleyrat
Similar samples:
Result
Malware family:
valleyrat_s2
Score:
  10/10
Tags:
family:valleyrat_s2 backdoor defense_evasion discovery execution installer persistence
Behaviour
Kills process with taskkill
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Inno Setup is an open-source installation builder for Windows applications.
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Adds Run key to start application
Checks installed software on the system
Enumerates connected drives
Executes dropped EXE
Loads dropped DLL
Sets service image path in registry
Family: ValleyRat
Malware Config
C2 Extraction:
108.187.4.158:557
108.187.4.158:558
127.0.0.1:80
Unpacked files
SH256 hash:
e8e9df79257bea763a14fc5493e653f2201a579fb1d7d0e31a56310e41fc5126
MD5 hash:
0b8e76770a9e5803082153c2535053df
SHA1 hash:
69606bf0e94ff870e72ac68441ec1be718d377c8
SH256 hash:
19a797b23aa60073b476d961fd9f9dcafb2824261a97c29842301271a33d6acb
MD5 hash:
ecd40970f655783472e57e83efd232a7
SHA1 hash:
f6a48dd965ba16acec753d96013640487c56027d
SH256 hash:
0d4461e506685ec2ef2c81821205e4714d6e5fc2cb3f442e51661ddf186bcbf8
MD5 hash:
90831041a60ae7036f04aa33f3fba8fa
SHA1 hash:
5d59b15cd93763346508fbb0620b444ad40f9cf7
SH256 hash:
1e6b6925749f95bdd2933c410143487d9e9ff206e6b7b210419526ca9debd095
MD5 hash:
a5d691445e17755cb56e57ec28870436
SHA1 hash:
35121dd962a6703f552e5440d77251f4acff8bd1
SH256 hash:
c79f0a938f63d0705182d0259bac8be0f313653ca5ad8eb7679dee383d331736
MD5 hash:
8da7f4fc310e0646362209e63cac06ed
SHA1 hash:
951aa504f2aba94aee8f72c26397a8289c476504
SH256 hash:
7e0c74be7c9d31b95d1f336e0800bb980e8c0afa4d58827022267479c308a9d8
MD5 hash:
1438ed54b4f142781f576a57d2b78bca
SHA1 hash:
f1e6f797c8902361af1522c492366662306810e5
Malware family:
ValleyRAT
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:GenericGh0st
Author:Still
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_SUSPICIOUS_EXE_ClearMyTracksByProcess
Author:ditekSHen
Description:Detects executables calling ClearMyTracksByProcess
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_peb_parsing
Author:Willi Ballenthin
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:pe_detect_tls_callbacks
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:telebot_framework
Author:vietdx.mb
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:TH_AntiVM_MassHunt_Win_Malware_2026_CYFARE
Author:CYFARE
Description:Detects Windows malware employing anti-VM / anti-sandbox evasion techniques across VMware, VirtualBox, Hyper-V, QEMU, Xen, and generic sandbox environments
Reference:https://cyfare.net/
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.
Rule name:Windows_Generic_Threat_4b0b73ce
Author:Elastic Security
Rule name:WinosStager
Author:YungBinary
Description:https://www.esentire.com/blog/winos4-0-online-module-staging-component-used-in-cleversoar-campaign

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments