General

  • Target

    2025-04-03_dcbd97d98e96e4ff8a199e57a93e6ccc_hijackloader_icedid

  • Size

    214.1MB

  • Sample

    250403-w4nwesvjv4

  • MD5

    dcbd97d98e96e4ff8a199e57a93e6ccc

  • SHA1

    45918f72ebf923a5d992981ce609f0e38928b3d8

  • SHA256

    57a5a4a942ef11f0dfa5644d3c9e86474a9006c381a6412f0214bfce5420267c

  • SHA512

    234cb9d5d091b9adfa08a47a00767f89dede91a14bd589f383ee44ee119c7bd024589ee316a6bddb2bf9122c9c0762420a6db10b9af9795a86c7823049b7b1ab

  • SSDEEP

    49152:MhbFk85ulG4dJXY5UeD1jWs1O/BP4YPpPAPGPpPVP6PJP8P8P9PdPdPRPfPdPlPU:WRk85ulG4XywJxFTsmB

Malware Config

Extracted

Family

valleyrat_s2

Version

1.0

C2

154.219.97.191:6666

Attributes
  • campaign_date

    2025. 3.14

Targets

    • Target

      2025-04-03_dcbd97d98e96e4ff8a199e57a93e6ccc_hijackloader_icedid

    • Size

      214.1MB

    • MD5

      dcbd97d98e96e4ff8a199e57a93e6ccc

    • SHA1

      45918f72ebf923a5d992981ce609f0e38928b3d8

    • SHA256

      57a5a4a942ef11f0dfa5644d3c9e86474a9006c381a6412f0214bfce5420267c

    • SHA512

      234cb9d5d091b9adfa08a47a00767f89dede91a14bd589f383ee44ee119c7bd024589ee316a6bddb2bf9122c9c0762420a6db10b9af9795a86c7823049b7b1ab

    • SSDEEP

      49152:MhbFk85ulG4dJXY5UeD1jWs1O/BP4YPpPAPGPpPVP6PJP8P8P9PdPdPRPfPdPlPU:WRk85ulG4XywJxFTsmB

    • Modifies Windows Defender DisableAntiSpyware settings

    • ValleyRat

      ValleyRat stage2 is a backdoor written in C++.

    • Valleyrat_s2 family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks