General

  • Target

    78b8cd9ed9cdfe32f62396f1546c0739b66cf15c8ef5a71d5858358295fc8b15.dll

  • Size

    2.2MB

  • Sample

    250328-jsas7sttf1

  • MD5

    cc66527f0069ca11c2f1f51411135199

  • SHA1

    4e3d3f90abc13e451822f20a943a158d5ed1d207

  • SHA256

    78b8cd9ed9cdfe32f62396f1546c0739b66cf15c8ef5a71d5858358295fc8b15

  • SHA512

    71e028b43aca70c2c06fa16226d71602121b3bb78806c098386ebd6d4e255875f498c0861f908ee723139ea8b448f73cc6de1afb3b0c8dff7e3ac77273029133

  • SSDEEP

    49152:L2cV7CFHgGbWJsUqtmNaOhVYcSUuamW5zo76e7+7WVuSwiPSCmDS+5uSlZLun40:NxOAGbWuUmmNaMVrSU735zoWe7+7WGu

Malware Config

Extracted

Family

valleyrat_s2

Version

1.0

C2

154.44.8.39:443

154.44.8.39:80

154.44.8.39:8011

Attributes
  • campaign_date

    2025. 3. 7

Targets

    • Target

      78b8cd9ed9cdfe32f62396f1546c0739b66cf15c8ef5a71d5858358295fc8b15.dll

    • Size

      2.2MB

    • MD5

      cc66527f0069ca11c2f1f51411135199

    • SHA1

      4e3d3f90abc13e451822f20a943a158d5ed1d207

    • SHA256

      78b8cd9ed9cdfe32f62396f1546c0739b66cf15c8ef5a71d5858358295fc8b15

    • SHA512

      71e028b43aca70c2c06fa16226d71602121b3bb78806c098386ebd6d4e255875f498c0861f908ee723139ea8b448f73cc6de1afb3b0c8dff7e3ac77273029133

    • SSDEEP

      49152:L2cV7CFHgGbWJsUqtmNaOhVYcSUuamW5zo76e7+7WVuSwiPSCmDS+5uSlZLun40:NxOAGbWuUmmNaMVrSU735zoWe7+7WGu

    • ValleyRat

      ValleyRat stage2 is a backdoor written in C++.

    • Valleyrat_s2 family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks