General
-
Target
eefb11e7bb1c352d6ba64795e35ce958efa2c9c520621b9209c28e89adac5c0e.exe
-
Size
12.0MB
-
Sample
250401-vlt42svn14
-
MD5
c043e9f857ae66d89c9471e4a4e5a9c3
-
SHA1
599ca6af0fc22d7c6879063f511aa834d53a951c
-
SHA256
eefb11e7bb1c352d6ba64795e35ce958efa2c9c520621b9209c28e89adac5c0e
-
SHA512
5a3be61f0b5a75fc3fdf9eab66555975fb44d2586e7a971b9d8573e7a9e94abd887b091311f1efc52367f62c7af073211978b2ef9d345474a4d36676d233159a
-
SSDEEP
49152:TSz26GORt1xUI7KnEQsJGtCN5bIfx4f1JTtpZuRQJBQbDW61P067knpfeTkSO2KE:TSk
Static task
static1
Behavioral task
behavioral1
Sample
eefb11e7bb1c352d6ba64795e35ce958efa2c9c520621b9209c28e89adac5c0e.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
valleyrat_s2
1.0
47.236.171.20:10000
47.236.171.20:20000
127.0.0.1:80
-
campaign_date
2024.12.25
Targets
-
-
Target
eefb11e7bb1c352d6ba64795e35ce958efa2c9c520621b9209c28e89adac5c0e.exe
-
Size
12.0MB
-
MD5
c043e9f857ae66d89c9471e4a4e5a9c3
-
SHA1
599ca6af0fc22d7c6879063f511aa834d53a951c
-
SHA256
eefb11e7bb1c352d6ba64795e35ce958efa2c9c520621b9209c28e89adac5c0e
-
SHA512
5a3be61f0b5a75fc3fdf9eab66555975fb44d2586e7a971b9d8573e7a9e94abd887b091311f1efc52367f62c7af073211978b2ef9d345474a4d36676d233159a
-
SSDEEP
49152:TSz26GORt1xUI7KnEQsJGtCN5bIfx4f1JTtpZuRQJBQbDW61P067knpfeTkSO2KE:TSk
-
Valleyrat_s2 family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1