General
-
Target
Valyse Launcher.exe
-
Size
9.8MB
-
Sample
230407-y36qysae32
-
MD5
0fd78804897c07936d54739b8e65fb49
-
SHA1
ef8955ccb92b1d87e8553a01868da740dd1919f0
-
SHA256
4205b5eddc13a65524ad26863ce048ca67ea2cca3bae20ddcc73d7cce926f8c7
-
SHA512
1168e7dc5d013c2bde5d9f9394b6c14e47cb0c1e49915f0988632e19123148beb12a39a818d1fe1ab9c4042597c36b169c48acaee39a32e2dc2f0108146cffbc
-
SSDEEP
196608:Yk9adX+cTGCxPQHirKfwNJeP3//hr98jdu6RubbKtgSebm:Yk9kJT7VpNm598xu64bbKt4
Static task
static1
Behavioral task
behavioral1
Sample
Valyse Launcher.exe
Resource
win10-20230220-en
Malware Config
Targets
-
-
Target
Valyse Launcher.exe
-
Size
9.8MB
-
MD5
0fd78804897c07936d54739b8e65fb49
-
SHA1
ef8955ccb92b1d87e8553a01868da740dd1919f0
-
SHA256
4205b5eddc13a65524ad26863ce048ca67ea2cca3bae20ddcc73d7cce926f8c7
-
SHA512
1168e7dc5d013c2bde5d9f9394b6c14e47cb0c1e49915f0988632e19123148beb12a39a818d1fe1ab9c4042597c36b169c48acaee39a32e2dc2f0108146cffbc
-
SSDEEP
196608:Yk9adX+cTGCxPQHirKfwNJeP3//hr98jdu6RubbKtgSebm:Yk9kJT7VpNm598xu64bbKt4
-
BazarBackdoor
Stealthy backdoor targeting corporate networks, believed to be developed by Trickbot's authors.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Bazar/Team9 Backdoor payload
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies RDP port number used by Windows
-
Sets file execution options in registry
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-