Categories: Cyber Security News

Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users

ValleyRAT has emerged as a sophisticated multi-stage remote access trojan targeting Windows systems, with particular focus on Chinese-language users and organizations.

First observed in early 2023, this malware employs a carefully orchestrated infection chain that progresses through multiple components—downloader, loader, injector, and final payload—making detection and removal significantly challenging for security teams.

The threat actors behind ValleyRAT distribute the malware through phishing campaigns and trojanized installers, exploiting trust relationships common in Chinese business environments.

Sponsored

What distinguishes this malware is its geographic kill switch mechanism that queries the Windows Registry for specific applications before execution.

The malware specifically searches for WeChat (HKCUSoftwareTencentWeChat) and DingTalk (HKCUSoftwareDingTalk) registry entries, terminating immediately if neither is found.

Picussecurity security analysts identified the malware’s advanced evasion capabilities, noting its aggressive approach to bypassing system defenses.

ValleyRAT employs multiple User Account Control (UAC) bypass techniques targeting Windows executables like Fodhelper.exe and Event Viewer, while simultaneously manipulating security tokens to gain SeDebugPrivilege access.

This privilege enables the malware to interact with processes at higher integrity levels, effectively granting system-wide control.

The malware’s creators implemented extensive anti-analysis measures to evade detection in virtualized environments.

ValleyRAT performs CPUID instruction checks to verify genuine Intel or AMD processors, examining vendor strings that virtual environments often fail to replicate correctly.

Sponsored

Additionally, it enumerates active windows searching for analysis tools including Wireshark, Fiddler, and other security research applications.

Infection Mechanism and Payload Delivery

ValleyRAT’s loader component utilizes .NET executables containing 3DES-encrypted resources that decrypt and execute entirely in memory.

The malware leverages MSBuild.exe, a legitimate Microsoft build engine binary, as its execution host through process masquerading techniques.

This Living-off-the-Land Binary (LOLBin) approach allows ValleyRAT to blend malicious activities with normal system operations.

The cryptographic implementation employs TripleDES decryption with MD5-hashed keys derived from BigEndianUnicode encoding.

The malware constructs obfuscated strings using .Replace methods, Strings.StrReverse functions, and Unicode escape sequences to evade static analysis.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

The post Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Andaseat’s Value-Packed Novis Gaming Chair Drops Below $200 for the First Time This Year

In 2025, AndaSeat released its most affordable gaming chair - the Andaseat Novis. The Novis…

49 minutes ago

Andaseat’s Value-Packed Novis Gaming Chair Drops Below $200 for the First Time This Year

In 2025, AndaSeat released its most affordable gaming chair - the Andaseat Novis. The Novis…

50 minutes ago

The Bride! Review

The Bride! is in theaters on March 6.Frankenstein's lightning-streaked bride has been an enduring image…

50 minutes ago

Crime Reports: Elderly man reports wife assaulted him with book in Abilene

Editor’s Note: The Abilene Police Department supplied the following arrest and incident reports. All information…

1 hour ago

Cornyn, Paxton head to runoff in Texas Republican Primary for US Senate

Senator John Cornyn and Texas Attorney General Ken Paxton will face off in a runoff…

1 hour ago

Girls found dead in suitcases were half-sisters: Ohio medical examiner

The two young girls found dead inside suitcases that had been buried in shallow graves…

1 hour ago

This website uses cookies.