{"id":2643,"date":"2024-09-25T19:14:21","date_gmt":"2024-09-25T19:14:21","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2643"},"modified":"2025-07-29T05:56:47","modified_gmt":"2025-07-29T05:56:47","slug":"valyrian-trojan-a-cut-above-the-rest","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/valyrian-trojan-a-cut-above-the-rest\/","title":{"rendered":"Valyrian Trojan \u2013 a cut above the rest"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"472\" height=\"318\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4422662388_102354ae59_b.webp\" alt=\"Valyrian Trojan \u2013 a cut above the rest\" class=\"wp-image-2662\" style=\"width:610px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p>Due to their unrivalled strength and cutting edges, Valyrian Steel weapons are highly prized throughout Westeros \u2013 the main continent in A Game of Thrones. Should anyone, even a White Walker, face off against a swordsman (or swordswoman) wielding a Valyrian Steel weapon, the odds are already sharply against them. The same could be said of users encountering the Valyrian Trojan, a particularly insidious malware that hands attackers control of victim machines.&nbsp;<br><br>Not only do the trojan\u2019s advanced techniques enable attackers to hijack the computers, Valyrian can also redirect users to compromised websites, block access to various websites, monitor network traffic, steal personal information, and even update itself. &nbsp;<br><br>Valyrian is typically spread via Microsoft document files, using Visual Basic for Applications to download and execute a file on the infected system.<br><br>Once infected, a computer will suffer severe performance degradation including memory loss, CPU spikes or unexpected system crashes.<\/p>\n\n\n\n<p><strong>Distribution<\/strong><br><br>Valyrian is usually distributed via fake Windows updates, malicious third-party programs (generally a user is told to download these programs to properly view a webpage or video), or via weaponized attachments sent via email or social media.&nbsp;<br><br>Another popular distribution method is via pirated copies of games and software available on Torrent sites.&nbsp;<br><br>Once executed, Valyria may also disable other software on your PC \u2013 like anti-virus security suites or firewalls \u2013 and it can even contact CnC servers to execute further server-side scripts or download additional malware.<br><br><strong>Persistence<\/strong><br><br>Valyria stays concealed in the victim&#8217;s system by writing itself to the Windows startup folder via an installer. When Windows starts, programs in the startup folder are automatically launched, meaning the malware executes and performs its malicious activities whenever the computer is turned on.<br><br><strong>File Details<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>File Type&nbsp;<\/strong><\/td><td>.hta &nbsp;File<\/td><\/tr><tr><td><strong>Md5 hash&nbsp;<\/strong><\/td><td>8c2368c23fc97ebc235d62887f66ea0c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Static Analysis\u00a0<\/strong><br><br>Static analysis shows this sample uses wscript.shell to drop javascripts.exe and task_manager.exe in the %TEMP% folder, while javaupdate.exe is dropped in the Startup folder in order to maintain persistence (as mentioned above).<br><br>Below we see the downloaded executable using Runexe():<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"673\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-47-1024x673.webp\" alt=\"\" class=\"wp-image-2655\"\/><\/figure>\n\n\n\n<p><br><strong>Dynamic Analysis<\/strong><br><br>Upon executing the malware sample, we witnessed Valyrian download and start javascript.exe while wscript.shell connected to 104.16.12.231, and starts RegAsm.exe which contacted 81.22.255.145 and dropped the following files:<br><br>C:\\Users\\&lt;user-name>\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\RDGT5DXT\\task_manager[1].exe<br><br>C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\javascript.exe<br><br>C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\javascripts.exe<br><br>C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\jv (2).js<br><br>C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\syst.exe<br><br>C:\\SystemFiles\\system.exe<br><br>C:\\Users\\&lt;user-name>\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Javaupdate.exe\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"961\" height=\"641\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-45.webp\" alt=\"\" class=\"wp-image-2656\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"887\" height=\"665\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-44.webp\" alt=\"\" class=\"wp-image-2657\"\/><\/figure>\n\n\n\n<p>In the above images, we see Syst.exe remain persistent across reboot, thereby making sure the malware executes whenever the PC is turned on.<br><br><strong>Command and Control<\/strong><br><br>We observed connections to IP addresses \u201c104.16.12.231\u201d and \u201c81.22.255.145\u201d during the period of infection.<br><br><strong>Indicators of Compromise<\/strong><br><br>Below are the respective Indicators of Compromise (IOC\u2019s) for this malware:<br><br>File analyzed: 8c2368c23fc97ebc235d62887f66ea0c<br><br>Files Dropped:<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\javascript.exe\u00a0<br><br>o\u00a0\u00a0 \u00a0md5: e63a322888ae16375a46af1acb8a0aed<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\javascripts.exe\u00a0<br><br>o\u00a0\u00a0 \u00a0md5:0f225efbbcb33c155b22335afffb8c94<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\jv (2).js\u00a0<br><br>o\u00a0\u00a0 \u00a0md5: e24f16ac4fbae07c25e830efabca217a<br><br>\u2022\u00a0\u00a0 \u00a0C:\\SystemFiles\\system.exe\u00a0<br><br>o\u00a0\u00a0 \u00a0md5: 0f225efbbcb33c155b22335afffb8c94<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Temp\\syst.exe\u00a0<br><br>o\u00a0\u00a0 \u00a0md5: 0f225efbbcb33c155b22335afffb8c94<br><br>\u2022\u00a0\u00a0 \u00a0C:\\Users\\&lt;user-name>\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\RDGT5DXT\\task_manager[1].exe\u00a0<br><br>o\u00a0\u00a0 \u00a0md5: 0f225efbbcb33c155b22335afffb8c94<br><br><strong>Registries added<\/strong><br><br>\u2022\u00a0\u00a0 \u00a0HKU\\.DEFAULT\\Software\\Classes\\Local Settings\\MuiCache\\1E\\52C64B7E\\@C:\\Windows\\System32\\mshta.exe,-6412: &#8220;HTML Application&#8221;<br><br>\u2022\u00a0\u00a0 \u00a0HKU\\S-1-5-21-1218962352-309658065-3384228893-1000_Classes\\Local Settings\\MuiCache\\1E\\52C64B7E\\@C:\\Windows\\System32\\mshta.exe,-6412: &#8220;HTML Application&#8221;<br><br>\u2022\u00a0\u00a0 \u00a0HKU\\S-1-5-18\\Software\\Classes\\Local Settings\\MuiCache\\1E\\52C64B7E\\@C:\\Windows\\System32\\mshta.exe,-6412: &#8220;HTML Application&#8221;<br><br><strong>Memory analysis<\/strong><br><br>On capturing the infected system\u2019s RAM image, we noted several malicious functions:<br><br>Connection to the IP \u201c81.22.255.145\u201d:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"537\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4-44-1024x537.webp\" alt=\"\" class=\"wp-image-2658\"\/><\/figure>\n\n\n\n<p>RegAsm.exe persistently running in the infected machine:<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"245\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-42-1024x245.webp\" alt=\"\" class=\"wp-image-2659\"\/><\/figure>\n\n\n\n<p>New registries created by RegAsm.exe:<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"563\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-40-1024x563.webp\" alt=\"\" class=\"wp-image-2660\"\/><\/figure>\n\n\n\n<p>RegAsm.exe ending, syst.exe starting, and the registries being used:\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"609\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/7-38-1024x609.webp\" alt=\"\" class=\"wp-image-2661\"\/><\/figure>\n\n\n\n<p><strong>Command and Control servers (C&amp;C):<\/strong><br><br>104.16.12.231<br><br>81.22.255.145<br><br><strong>Conclusion:<\/strong><br><br>Valyrian\u2019s wide range of functionality and its multiple propagation methods make it particularly devastating to anyone unlucky enough to fall victim to it.<br><br>Just like Valyrian Steel, we don\u2019t know exactly who crafted the Valyrian Trojan, but they\u2019ve created an incredibly sophisticated weapon capable of causing immense damage.<br><br>Updating blacklist rules to include the aforementioned C&amp;C IOCs and keeping antivirus updated with the latest threat signatures will help mitigate exposure to Valyrian Trojan.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Due to their unrivalled strength and cutting edges, Valyrian Steel weapons are highly prized throughout Westeros &ndash; the main continent in A Game of Thrones. Should anyone, even a White Walker, face off against a swordsman (or swordswoman) wielding a Valyrian Steel weapon, the odds are already sharply against them. The same could be said [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2662,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2643","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2643","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2643"}],"version-history":[{"count":4,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2643\/revisions"}],"predecessor-version":[{"id":4300,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2643\/revisions\/4300"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2662"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}