General
-
Target
cheon_H4.03-X64.exe
-
Size
88.8MB
-
Sample
250403-v7r7kstls9
-
MD5
ce1d8c9970b30019e5b35b7ba968107b
-
SHA1
b1e0898deac62e2a763bbd67e973c60d1d2b7267
-
SHA256
9c0f551fa5e93c3f30c90d89f49d811296f84cdb17c45c005559125c275fb7b7
-
SHA512
1742082598e15065880915168f9958b7ca7b2b8232047836d3f67a78538eec9ed21618c8f5e1b60f321e08a381162aeca3227ff0150cce688ef350b438f9cc2d
-
SSDEEP
1572864:4W3kvckR7qEWlVaDkRqDX4beH5HY+9OY0AbOb84I8FalUxTv1+:4WtW7jCcIqWeH6SOVXI8Fai1+
Static task
static1
Behavioral task
behavioral1
Sample
cheon_H4.03-X64.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
cheon_H4.03-X64.exe
Resource
win11-20250313-en
Malware Config
Extracted
valleyrat_s2
1.0
pniu.fun:10501
pniu.fun:10502
pniu.fun:10503
-
campaign_date
2025. 4. 3
Targets
-
-
Target
cheon_H4.03-X64.exe
-
Size
88.8MB
-
MD5
ce1d8c9970b30019e5b35b7ba968107b
-
SHA1
b1e0898deac62e2a763bbd67e973c60d1d2b7267
-
SHA256
9c0f551fa5e93c3f30c90d89f49d811296f84cdb17c45c005559125c275fb7b7
-
SHA512
1742082598e15065880915168f9958b7ca7b2b8232047836d3f67a78538eec9ed21618c8f5e1b60f321e08a381162aeca3227ff0150cce688ef350b438f9cc2d
-
SSDEEP
1572864:4W3kvckR7qEWlVaDkRqDX4beH5HY+9OY0AbOb84I8FalUxTv1+:4WtW7jCcIqWeH6SOVXI8Fai1+
Score10/10-
Valleyrat_s2 family
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Enumerates processes with tasklist
-