HomeNews
New ValleyRAT Campaign Spotted with Advanced Techniques 
HomeNews
New ValleyRAT Campaign Spotted with Advanced Techniques 

A sophisticated campaign is targeting Chinese-speaking users, distributing a malware known as ValleyRAT. 

What’s happening? 

There’s a new campaign spreading a multi-stage threat designed to monitor and control infected systems while deploying additional plugins to cause further damage. 

Key components of the campaign:

Component  Details 
Target  Chinese-speaking users 
Attack Method  Email messages with URLs pointing to compressed executables 
Malware  ValleyRAT 
Affected systems  Windows 

ValleyRAT employs a range of techniques to evade detection, including the use of shellcode to execute its components directly in memory, minimizing its footprint on the victim’s system. The campaign initially came to light in June 2024, with the latest iteration featuring enhanced capabilities for persistence and privilege escalation. 

Analyze ValleyRAT and other malware in ANY.RUN sandbox 

Sign up for free

Breaking down the attack chain 

The attack begins with a first-stage loader disguised as legitimate applications like Microsoft Office, using filenames such as “工商年报大师.exe” or “补单对接更新记录txt.exe” to appear non-threatening. When launched, the executable drops a decoy document and loads shellcode that advances the attack to the next stage. 

This shellcode initiates communication with a command-and-control (C2) server, downloading two critical components: RuntimeBroker and RemoteShellcode. These components are responsible for setting persistence on the host, gaining administrator privileges through exploitation techniques, and further escalating privileges by abusing legitimate binaries like fodhelper.exe and the CMSTPLUA COM interface. 

RuntimeBroker’s primary task is to retrieve another loader from the C2 server, which repeats the initial infection process while performing additional checks to determine if it is running in a sandbox. It also scans the Windows Registry for keys related to apps like Tencent WeChat and Alibaba DingTalk, reinforcing the notion that ValleyRAT is specifically targeting Chinese systems. 

RemoteShellcode is configured to fetch the ValleyRAT downloader, which uses network protocols like UDP or TCP to connect to the C2 server and receive the final payload. ValleyRAT, attributed to the Silver Fox threat group, is a fully-featured backdoor capable of remotely controlling compromised systems, taking screenshots, executing files, and loading additional plugins.

Remote Shellcode, on the other hand, is responsible for fetching the ValleyRAT downloader, which then uses network protocols to connect to the server and receive the final payload. 

Analyzing ValleyRAT in ANY.RUN 

ValleyRAT can be analyzed in ANY.RUN sandbox, a powerful tool that provides detailed insights into the malware’s behavior.  

ValleyRAT analyzed in the ANY.RUN sandbox

The sandbox analysis shows that the MSBuild.exe executed with a command line pointing to the file.exe located in the Temp directory.

Legitimate programs often use MSBuild.exe, a Microsoft build engine, to compile and build projects, especially those developed using .NET Framework.

In a malicious context, the use of MSBuild.exe indicates an attempt to hide malicious activities within a seemingly legitimate process. 

Details of the ValleyRAT’s CnC activity

The sandbox also provides information on ValleyRAT’s command-and-control (C2) server communication detected by a Suricata IDS rule.

Try all features of ANY.RUN sandbox with a 14-day trial 

Request free trial

About ANY.RUN  

ANY.RUN helps more than 400,000 cybersecurity professionals worldwide.

Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI Lookup, Yara Search and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.  

With ANY.RUN you can: 

  • Detect malware in seconds. 
  • Interact with samples in real time. 
  • Save time and money on sandbox setup and maintenance 
  • Record and study all aspects of malware behavior. 
  • Collaborate with your team 
  • Scale as you need. 

Request free trial → 

Jack Zalesskiy
Technology writer at ANY.RUN at ANY.RUN | + posts

Jack Zalesskiy is a technology writer with five years of experience under his belt. He closely follows malware incidents, data breaches, and the way in which cyber threats manifest in our day-to-day lives.

jack-zalesskiy
Jack Zalesskiy
Technology writer at ANY.RUN
Jack Zalesskiy is a technology writer with five years of experience under his belt. He closely follows malware incidents, data breaches, and the way in which cyber threats manifest in our day-to-day lives.

What do you think about this post?

2 answers

  • Awful
  • Average
  • Great

No votes so far! Be the first to rate this post.

0 comments