General
-
Target
0d3cc26534eee5d7d387f1e718299e30909cc192858f6a46646d2b0c85debe8b.exe
-
Size
2.7MB
-
Sample
250330-sj53estlw2
-
MD5
2c54a502a6e895067b44c10518cc526b
-
SHA1
be97549d3a00f0e33787998145d4498b1bb06860
-
SHA256
0d3cc26534eee5d7d387f1e718299e30909cc192858f6a46646d2b0c85debe8b
-
SHA512
720862858a1d9f428772e940ab9a15cf4b915afb15ae983a532bb27e1c59671cd28a7f1ffc7fffb3ce45b0c91697739d5c07338c3e9b15e566d8376aceee1025
-
SSDEEP
49152:m1dJHUNmnJgPa4g5X9IrE76Iech3cfxVfCzhJTzkaNogFZDqVnDnE:m1P0NAJgar5tIrOFech3cfvfCtJTzkIR
Static task
static1
Behavioral task
behavioral1
Sample
0d3cc26534eee5d7d387f1e718299e30909cc192858f6a46646d2b0c85debe8b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d3cc26534eee5d7d387f1e718299e30909cc192858f6a46646d2b0c85debe8b.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
valleyrat_s2
1.0
154.44.8.39:443
154.44.8.39:80
154.44.8.39:8011
-
campaign_date
2025. 3. 7
Targets
-
-
Target
0d3cc26534eee5d7d387f1e718299e30909cc192858f6a46646d2b0c85debe8b.exe
-
Size
2.7MB
-
MD5
2c54a502a6e895067b44c10518cc526b
-
SHA1
be97549d3a00f0e33787998145d4498b1bb06860
-
SHA256
0d3cc26534eee5d7d387f1e718299e30909cc192858f6a46646d2b0c85debe8b
-
SHA512
720862858a1d9f428772e940ab9a15cf4b915afb15ae983a532bb27e1c59671cd28a7f1ffc7fffb3ce45b0c91697739d5c07338c3e9b15e566d8376aceee1025
-
SSDEEP
49152:m1dJHUNmnJgPa4g5X9IrE76Iech3cfxVfCzhJTzkaNogFZDqVnDnE:m1P0NAJgar5tIrOFech3cfvfCtJTzkIR
Score10/10-
Valleyrat_s2 family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Enumerates processes with tasklist
-