Malware, Threat Intelligence

More sophisticated ValleyRAT malware version emerges

Privacy concept: pixelated words Malware on digital background, 3d render

Morphisec Threat Lab researchers have identified a new ValleyRAT malware variant linked to the Silver Fox APT group, which is now being spread through phishing emails, compromised websites, and fake software downloads, Hackread reports.

This campaign primarily targets finance, accounting, and sales professionals, aiming to steal sensitive data. Unlike earlier versions that used PowerShell scripts, the latest variant is distributed via a fake Chinese telecom website called “Karlos” and a fraudulent Chrome browser download from anizomcom/. Once installed, the malware downloads a .NET executable that escalates privileges and deploys additional components, including DLL files for stealthy execution. It leverages DLL side-loading techniques, using a modified executable for Douyin, the Chinese version of TikTok, and legitimate Tier0.dll files from popular games like Left 4 Dead 2. The malware executes its payload through nslookup.exe, bypassing traditional detection methods. Researchers warn that its advanced evasion techniques, including anti-VMware checks and security bypass tactics, highlight the need for stronger cybersecurity measures, such as endpoint protection and real-time monitoring.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds