General

  • Target

    2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245

  • Size

    3.8MB

  • Sample

    250402-pf4hmswwht

  • MD5

    220aae5d05fd2cc172ddb78e3b5a79d8

  • SHA1

    7f66e1d9d3bb81eb4df045ca7ece093ca166a595

  • SHA256

    2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245

  • SHA512

    3252348ade86c5913648c041ce58e438b7be7ca8b1554ba64f1024a4d9e126d19bb8a58536f5a4a1d0b2c93d472393f32336fac800c1b8b66a82bd274e0fc2c2

  • SSDEEP

    49152:MhbFk85ulG4dJXY5UeD1jWs1O/BP4YPpPAPGPpPVP6PJP8P8P9PdPdPRPfPdPlPl:WRk85ulG4XywJxFTsmBm

Malware Config

Extracted

Family

valleyrat_s2

Version

1.0

C2

154.219.97.191:6666

Attributes
  • campaign_date

    2025. 3.14

Targets

    • Target

      2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245

    • Size

      3.8MB

    • MD5

      220aae5d05fd2cc172ddb78e3b5a79d8

    • SHA1

      7f66e1d9d3bb81eb4df045ca7ece093ca166a595

    • SHA256

      2730464d9dd8281efae4a02efc3bedb74567883b81b90c4198250545a1d40245

    • SHA512

      3252348ade86c5913648c041ce58e438b7be7ca8b1554ba64f1024a4d9e126d19bb8a58536f5a4a1d0b2c93d472393f32336fac800c1b8b66a82bd274e0fc2c2

    • SSDEEP

      49152:MhbFk85ulG4dJXY5UeD1jWs1O/BP4YPpPAPGPpPVP6PJP8P8P9PdPdPRPfPdPlPl:WRk85ulG4XywJxFTsmBm

    • Modifies Windows Defender DisableAntiSpyware settings

    • ValleyRat

      ValleyRat stage2 is a backdoor written in C++.

    • Valleyrat_s2 family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks