General
-
Target
d6387be78d258a820e4cb35ec53c65d52a813b63147488629b56269f6648adc1
-
Size
107KB
-
Sample
250331-e2977swjy6
-
MD5
3198b729513bf5a65e39be989298079b
-
SHA1
a79a312a5c8884ec4b51aa4d776ba5793de09ffc
-
SHA256
d6387be78d258a820e4cb35ec53c65d52a813b63147488629b56269f6648adc1
-
SHA512
05c6431a07aad1f276431d99beb4f4dd8e247bde96084cbe5ae0bce01ca262827e96a9187aec4d3dd41c08afde594d1bb98217dfe09718bb4eb3907e0f2bde2e
-
SSDEEP
3072:bw0WMZYV7iTQbXAukRJtps7Fo/3e6Uege/EYpVPVZ:bw0xGVQGXAu2iQV9
Static task
static1
Behavioral task
behavioral1
Sample
d6387be78d258a820e4cb35ec53c65d52a813b63147488629b56269f6648adc1.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d6387be78d258a820e4cb35ec53c65d52a813b63147488629b56269f6648adc1.dll
Resource
win10v2004-20250314-en
Malware Config
Extracted
valleyrat_s2
1.0
43.225.58.178:6666
43.225.58.178:8888
43.225.58.178:7777
-
campaign_date
2025. 3.30
Targets
-
-
Target
d6387be78d258a820e4cb35ec53c65d52a813b63147488629b56269f6648adc1
-
Size
107KB
-
MD5
3198b729513bf5a65e39be989298079b
-
SHA1
a79a312a5c8884ec4b51aa4d776ba5793de09ffc
-
SHA256
d6387be78d258a820e4cb35ec53c65d52a813b63147488629b56269f6648adc1
-
SHA512
05c6431a07aad1f276431d99beb4f4dd8e247bde96084cbe5ae0bce01ca262827e96a9187aec4d3dd41c08afde594d1bb98217dfe09718bb4eb3907e0f2bde2e
-
SSDEEP
3072:bw0WMZYV7iTQbXAukRJtps7Fo/3e6Uege/EYpVPVZ:bw0xGVQGXAu2iQV9
Score10/10-
Valleyrat_s2 family
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-