{"id":20437,"date":"2024-03-05T16:36:45","date_gmt":"2024-03-05T15:36:45","guid":{"rendered":"https:\/\/www.nextron-systems.com\/?p=20437"},"modified":"2024-08-02T11:33:35","modified_gmt":"2024-08-02T09:33:35","slug":"tales-of-valhalla-march-2024","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/","title":{"rendered":"Tales Of Valhalla &#8211; March 2024"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.24.2&#8243; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Introduction&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Every month the Nextron Threat Research Team (NTRT) shares insights into evasive threats that we\u2019ve seen in the wild via our Valhalla service. The aim is to highlight interesting samples our rules detected and have or had very low detection rates as reported by VirusTotal scanning.<\/p>\n<p>Please note that we are aware that VirusTotal results do not represent the full capabilities of antivirus or EDR Products. The aim is to highlight how Threat Actors are taking into account evasiveness with some of these samples.<\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Threat Overview&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>Threat Overview<\/b><\/h2>\n<p>The following table gives an overview of the threats mentioned in this blog. You can use the respective Valhalla page for every threat to get a list of the hashes.<\/p>\n<table style=\"border-collapse: collapse; width: 61.2883%; height: 214px;\" border=\"1\">\n<tbody>\n<tr style=\"height: 10px;\">\n<td style=\"width: 11.2199%; text-align: center; height: 10px;\"><b>Threat Name<\/b><\/td>\n<td style=\"width: 13.9758%; text-align: center; height: 10px;\"><b>Initial VT<br \/>Detection Rate<\/b><\/td>\n<td style=\"width: 4.8079%; text-align: center; height: 10px;\"><b>Rule Name<\/b><\/td>\n<\/tr>\n<tr style=\"height: 51px;\">\n<td style=\"width: 11.2199%; text-align: center; height: 51px;\">MrAgent<\/td>\n<td style=\"width: 13.9758%; text-align: center; height: 51px;\">0\/62<\/td>\n<td style=\"width: 4.8079%; text-align: center; height: 51px;\"><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_RANSOM_LNX_VmWare_ESX_Indicators_Oct22_1\">SUSP_RANSOM_LNX_VmWare_ESX_Indicators_Oct22_1<\/a><\/td>\n<\/tr>\n<tr style=\"height: 51px;\">\n<td style=\"width: 11.2199%; text-align: center; height: 51px;\">HemiGate<\/td>\n<td style=\"width: 13.9758%; text-align: center; height: 51px;\">3\/68<\/td>\n<td style=\"width: 4.8079%; text-align: center; height: 51px;\"><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/APT_MAL_HemiGate_DLL_Loader_Sep23\">APT_MAL_HemiGate_DLL_Loader_Sep23<\/a><\/td>\n<\/tr>\n<tr style=\"height: 51px;\">\n<td style=\"width: 11.2199%; text-align: center; height: 51px;\">GuLoader<\/td>\n<td style=\"width: 13.9758%; text-align: center; height: 51px;\">0\/70<\/td>\n<td style=\"width: 4.8079%; text-align: center; height: 51px;\"><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/MAL_GuLoader_Shellcode_Oct22_3\">MAL_GuLoader_Shellcode_Oct22_3<\/a><\/td>\n<\/tr>\n<tr style=\"height: 51px;\">\n<td style=\"width: 11.2199%; text-align: center; height: 51px;\">IronWind<\/td>\n<td style=\"width: 13.9758%; text-align: center; height: 51px;\">0\/71<\/td>\n<td style=\"width: 4.8079%; text-align: center; height: 51px;\"><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/APT_MAL_IronWind_Downloader_Nov23_2\">APT_MAL_IronWind_Downloader_Nov23_2<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Threat Digest&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>Threat Digest<\/b><\/h2>\n<h3><b>MrAgent<\/b><\/h3>\n<p>The MrAgent sample was first reported by <a href=\"https:\/\/twitter.com\/malwrhunterteam\">MalwareHunterTeam<\/a> where he pointed it out from a related sample used by RansomHouse.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/Tales1.png&#8221; title_text=&#8221;Tales1&#8243; admin_label=&#8221;MrAgent-Image1&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text admin_label=&#8221;MrAgent-Text1&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The sample triggered one of our generic Vmware ESX malware rules on the date of the upload last September.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/Tales2.png&#8221; title_text=&#8221;Tales2&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>A couple of months later the Trellix team put out a blog where they dissected the sample in question. Here is an excerpt from the Trellix <a href=\"https:\/\/www.trellix.com\/blogs\/research\/ransomhouse-am-see\/\">blog<\/a>.<\/p>\n<blockquote>\n<p><i>MrAgent is a binary designed to run on hypervisors, with the sole purpose of automating and tracking the deployment of ransomware across large environments with a high number of hypervisor systems. The binary connects back to a set of command &amp; control servers, which need to be supplied as a command-line argument.<\/i><\/p>\n<\/blockquote>\n<p>We\u2019ve only noticed one additional new sample uploaded on the 2024-03-01 that was quickly picked up by multiple vendors (<a href=\"https:\/\/www.virustotal.com\/gui\/file\/430cbf6d340e3b3ee92a0bca41c349071564a14fd31f810bd1b0702d5df75351\">430cbf6d340e3b3ee92a0bca41c349071564a14fd31f810bd1b0702d5df75351<\/a>)<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/Tales3.png&#8221; title_text=&#8221;Tales3&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><b>Guloader Shellcode<\/b><\/h3>\n<p><a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.cloudeye\">Guloader<\/a> is a first stage shellcode based malware that is usually used to download other types of malware such as Agent Tesla, Lokibot and others. It was discovered in 2019 and is still going strong to this day.<\/p>\n<p>We\u2019re seeing multiple uploads a day to VirusTotal, with almost all of the uploaded samples having 0 detections.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/Tales4.png&#8221; title_text=&#8221;Tales4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>It turns out that most of these samples are memory dumps uploaded via the VT API. Investigating them would reveal the GuLoader shellcode.<\/p>\n<p>It is worth noting that we\u2019ve also seen GuLoader ShellCode uploaded directly and some vendors did indeed pick it up directly.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/Tales5.png&#8221; title_text=&#8221;Tales5&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><b>HemiGate<\/b><\/p>\n<p>HemiGate is a backdoor used by the threat actor known as Earth Estries. It was first <a href=\"https:\/\/www.trendmicro.com\/en_za\/research\/23\/h\/earth-estries-targets-government-tech-for-cyberespionage.html\">reported<\/a> by TrendMicro last year. Since the initial reporting we\u2019ve tracked 4 samples uploaded to VT over the next months. The most recent one was uploaded early this (January 2024)<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/Tales6.png&#8221; title_text=&#8221;Tales6&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>While the first 3 samples uploaded had very high AV matches. The most recent <a href=\"https:\/\/www.virustotal.com\/gui\/file\/67e3f336315db1677fa0805cb605af6552cd809930c87318fbf4310a157a263e\/detection\">one<\/a> only started with 3 vendors having coverage for it.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/Tales7.png&#8221; title_text=&#8221;Tales7&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>We can see the coverage increased over the next months to reach 34\/70.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/Screenshot-2024-03-05-at-16.31.56.png&#8221; title_text=&#8221;Screenshot 2024-03-05 at 16.31.56&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>This latest sample of the HemiGate backdoor loader, is very similar in nature to the previous ones. It mimics the \u201clibvlc.dll\u201d DLL to achieve DLL sideloading as can be seen by the exported functions.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/Tales9.png&#8221; title_text=&#8221;Tales9&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>All of the exports are empty except for \u201clibvlc_new\u201d which calls the functions that decrypts the encrypted payload (HemiGate backdoor) with RC4.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/Tales10.png&#8221; title_text=&#8221;Tales10&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>From strings found in the sample, it seems highly likely that this was generated via the <a href=\"https:\/\/github.com\/strivexjun\/AheadLib-x86-x64\">AheadLib tool<\/a>.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/Tales11.png&#8221; title_text=&#8221;Tales11&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><b>IronWind<\/b><\/h3>\n<p>IronWind is an initial access downloader first reported by Proofpoint last November. You can read their analysis for <a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/ta402-uses-complex-ironwind-infection-chains-target-middle-east-based-government\">full technical<\/a> details. Since that report we\u2019ve been tracking the IronWind samples being uploaded to VT.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/Tales12.png&#8221; title_text=&#8221;Tales12&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>And we can see, earlier uploads by the end of last year were highly flagged by almost every major vendor. But in recent months the samples we\u2019re monitoring are getting more stealthier and evading AV signatures. A look at the decrypted strings shows potential new capabilities.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/Tales13.png&#8221; title_text=&#8221;Tales13&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>We\u2019ll be releasing a blog in the upcoming weeks detailing the capabilities of this new variant.<\/p>\n<h2><b>Detection opportunity<\/b><\/h2>\n<h4><b>HemiGate Sideloading Activity<\/b><\/h4>\n<p>The following <a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/windows\/image_load\/image_load_side_load_libvlc.yml\">Sigma rule<\/a> can be used to detect potential sideloading of libvlc.dll<\/p>\n<pre>title: Potential Libvlc.DLL Sideloading<br \/>id: bf9808c4-d24f-44a2-8398-b65227d406b6<br \/>status: test<br \/>description: Detects potential DLL sideloading of \"libvlc.dll\", a DLL that is legitimately used by \"VLC.exe\"<br \/>references:<br \/>    - https:\/\/www.trendmicro.com\/en_us\/research\/23\/c\/earth-preta-updated-stealthy-strategies.html<br \/>    - https:\/\/hijacklibs.net\/entries\/3rd_party\/vlc\/libvlc.html<br \/>author: X__Junior<br \/>date: 2023\/04\/17<br \/>tags:<br \/>    - attack.defense_evasion<br \/>    - attack.persistence<br \/>    - attack.privilege_escalation<br \/>    - attack.t1574.001<br \/>    - attack.t1574.002<br \/>logsource:<br \/>    category: image_load<br \/>    product: windows<br \/>detection:<br \/>    selection:<br \/>        ImageLoaded|endswith: '\\libvlc.dll'<br \/>    filter_main_vlc:<br \/>        ImageLoaded|startswith:<br \/>            - 'C:\\Program Files (x86)\\VideoLAN\\VLC\\'<br \/>            - 'C:\\Program Files\\VideoLAN\\VLC\\'<br \/>    condition: selection and not 1 of filter_main_*<br \/>falsepositives:<br \/>     - False positives are expected if VLC is installed in non-default locations<br \/>level: medium<\/pre>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Nextron\u2019s Solutions for Enhanced Cybersecurity<\/h1>\n<p>Nextron steps in where traditional security measures might miss threats. Our digital forensics tools conduct thorough analyses of systems that show signs of unusual behavior. They effectively identify risky software and expose a range of threats that could go unnoticed by standard methods.<\/p>\n<p>Our signature collection is tailored to detect a variety of security concerns. This includes hacker tools, their remnants, unusual user activities, hidden configuration settings, and legitimate software that might be misused for attacks. Our approach is especially useful in detecting the tactics used in supply chain attacks and identifying tools that evade Antivirus and EDR systems.<\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Authors&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Authors<\/p>\n<ul>\n<li><a href=\"https:\/\/twitter.com\/X__Junior\" target=\"_blank\" rel=\"noopener\">Mohamed Ashraf<\/a><\/li>\n<li><a href=\"https:\/\/twitter.com\/nas_bench\/\">Nasreddine Bencherchali<\/a><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every month the Nextron Threat Research Team (NTRT) shares insights into evasive threats that we\u2019ve seen in the wild via our Valhalla service. The aim is to highlight interesting samples our rules detected and have or had very low detection rates as reported by VirusTotal scanning. Please note that we are aware that VirusTotal results do not represent the full capabilities of antivirus or EDR Products. The aim is to highlight how Threat Actors are taking into account evasiveness with some of these samples.Threat Overview The following table gives an overview of the threats mentioned in this blog. You can use the respective Valhalla page for every threat to get a list of the hashes. Threat Name Initial VTDetection Rate Rule Name MrAgent 0\/62 SUSP_RANSOM_LNX_VmWare_ESX_Indicators_Oct22_1 HemiGate 3\/68 APT_MAL_HemiGate_DLL_Loader_Sep23 GuLoader 0\/70 MAL_GuLoader_Shellcode_Oct22_3 IronWind 0\/71 APT_MAL_IronWind_Downloader_Nov23_2 Threat Digest MrAgent The MrAgent sample was first reported by MalwareHunterTeam where he pointed it out from a related sample used by RansomHouse.The sample triggered one of our generic Vmware ESX malware rules on the date of the upload last September.A couple of months later the Trellix team put out a blog where they dissected the sample in question. Here is an excerpt from the Trellix [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":20548,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[316,749,46,1,760,735,549,32,193,47],"tags":[],"class_list":["post-20437","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apt","category-homepage","category-newsletter","category-nextron","category-recommended","category-research","category-sigma","category-thor","category-valhalla","category-yara"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Tales Of Valhalla - March 2024 - Nextron Systems<\/title>\n<meta name=\"description\" content=\"Every month the Nextron Threat Research Team (NTRT) shares insights into evasive threats that we\u2019ve seen in the wild via our Valhalla service.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/\"},\"author\":{\"name\":\"Nextron Threat Research Team\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/c85023b02fb7500513bb7464c4d36a96\"},\"headline\":\"Tales Of Valhalla &#8211; March 2024\",\"datePublished\":\"2024-03-05T15:36:45+00:00\",\"dateModified\":\"2024-08-02T09:33:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/\"},\"wordCount\":1521,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/cyb3rops_halls_of_Valhalla_north_mythology_computer_screens_vir_0ad84af0-f44e-4af0-80fc-a5ff7cd267f3.png\",\"articleSection\":[\"APT\",\"Homepage\",\"Newsletter\",\"Nextron\",\"Recommended\",\"Research\",\"Sigma\",\"THOR\",\"VALHALLA\",\"YARA\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/\",\"name\":\"Tales Of Valhalla - March 2024 - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/cyb3rops_halls_of_Valhalla_north_mythology_computer_screens_vir_0ad84af0-f44e-4af0-80fc-a5ff7cd267f3.png\",\"datePublished\":\"2024-03-05T15:36:45+00:00\",\"dateModified\":\"2024-08-02T09:33:35+00:00\",\"description\":\"Every month the Nextron Threat Research Team (NTRT) shares insights into evasive threats that we\u2019ve seen in the wild via our Valhalla service.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/#primaryimage\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/cyb3rops_halls_of_Valhalla_north_mythology_computer_screens_vir_0ad84af0-f44e-4af0-80fc-a5ff7cd267f3.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/cyb3rops_halls_of_Valhalla_north_mythology_computer_screens_vir_0ad84af0-f44e-4af0-80fc-a5ff7cd267f3.png\",\"width\":1536,\"height\":768},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/c85023b02fb7500513bb7464c4d36a96\",\"name\":\"Nextron Threat Research Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93ef820b74086420190263e5fff9169f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93ef820b74086420190263e5fff9169f?s=96&d=mm&r=g\",\"caption\":\"Nextron Threat Research Team\"},\"url\":\"https:\/\/www.nextron-systems.com\/author\/threat_research\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tales Of Valhalla - March 2024 - Nextron Systems","description":"Every month the Nextron Threat Research Team (NTRT) shares insights into evasive threats that we\u2019ve seen in the wild via our Valhalla service.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/"},"author":{"name":"Nextron Threat Research Team","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/c85023b02fb7500513bb7464c4d36a96"},"headline":"Tales Of Valhalla &#8211; March 2024","datePublished":"2024-03-05T15:36:45+00:00","dateModified":"2024-08-02T09:33:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/"},"wordCount":1521,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"image":{"@id":"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/cyb3rops_halls_of_Valhalla_north_mythology_computer_screens_vir_0ad84af0-f44e-4af0-80fc-a5ff7cd267f3.png","articleSection":["APT","Homepage","Newsletter","Nextron","Recommended","Research","Sigma","THOR","VALHALLA","YARA"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/","url":"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/","name":"Tales Of Valhalla - March 2024 - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/cyb3rops_halls_of_Valhalla_north_mythology_computer_screens_vir_0ad84af0-f44e-4af0-80fc-a5ff7cd267f3.png","datePublished":"2024-03-05T15:36:45+00:00","dateModified":"2024-08-02T09:33:35+00:00","description":"Every month the Nextron Threat Research Team (NTRT) shares insights into evasive threats that we\u2019ve seen in the wild via our Valhalla service.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/2024\/03\/05\/tales-of-valhalla-march-2024\/#primaryimage","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/cyb3rops_halls_of_Valhalla_north_mythology_computer_screens_vir_0ad84af0-f44e-4af0-80fc-a5ff7cd267f3.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/cyb3rops_halls_of_Valhalla_north_mythology_computer_screens_vir_0ad84af0-f44e-4af0-80fc-a5ff7cd267f3.png","width":1536,"height":768},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/c85023b02fb7500513bb7464c4d36a96","name":"Nextron Threat Research Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/93ef820b74086420190263e5fff9169f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93ef820b74086420190263e5fff9169f?s=96&d=mm&r=g","caption":"Nextron Threat Research Team"},"url":"https:\/\/www.nextron-systems.com\/author\/threat_research\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/20437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=20437"}],"version-history":[{"count":27,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/20437\/revisions"}],"predecessor-version":[{"id":20631,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/20437\/revisions\/20631"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media\/20548"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=20437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=20437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=20437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}