ValleyRAT Analysis: Strategies, Techniques, and Detection Approaches | Splunk

Keypoints

  • ValleyRAT targets Chinese-speaking users via coordinated phishing campaigns.
  • It operates as a multi-stage loader that evades detection by loading components in stages.
  • The malware can monitor and control infected hosts and deploy additional plugins.
  • Splunk Threat Research Team analyzed variants to identify MITRE ATT&CK TTPs for detection improvements.
  • Notable TTPs include persistence mechanisms, process injection, registry-based kill switches, and C2 behavior.
  • Defenses evasion includes UAC bypass, disabling security tools, virtualization/sandbox checks, and network discovery.

MITRE Techniques

  • [T1547.001] Startup Folder – The ValleyRAT loader creates a copy in the startup folder for persistence. “creates a copy of itself in the startup folder as “appcustom.exe” to maintain persistence.”
  • [T1055] Process Injection – The decrypted ValleyRAT payload is injected into MSBUILD.exe to evade detection. “injected into a newly created MSBUILD.exe process, … to evade detection.”
  • [T1012] Query Registry – Checks registry entries related to WeChat and DingTalk as a kill switch. “Checks registry entries related to WeChat and DingTalk as a kill switch.”
  • [T1071] Application Layer Protocol – Initializes C2 IP addresses and ports, modifying registry entries for persistence. “Initializes the C2 IP addresses and port within its code.”
  • [T1548.002] Bypass User Account Control – Attempts to launch with elevated privileges using various methods. “Attempts to launch with elevated privileges using various methods.”
  • [T1562.001] Impair Defenses: Disable or Modify Tools – Terminates security products to avoid detection. “Terminates security products to avoid detection.”
  • [T1497] Virtualization/Sandbox Evasion – Checks for virtualized environments to evade analysis. “Checks for virtualized environments to evade analysis.”
  • [T1053] Scheduled Task/Job – Creates scheduled tasks for automatic execution of malicious payloads. “Creates scheduled tasks for automatic execution of malicious payloads.”
  • [T1547.001] Registry Run Keys – Uses registry run keys for persistence on boot. “Uses registry run keys for persistence on boot.”
  • [T1016.001] Internet Connection Discovery – Checks for internet connectivity before C2 communication. “Checks for internet connectivity before C2 communication.”

Indicators of Compromise

  • [Hash] ValleyRAT Sample A – a67e68ae707f413ef9e64fa53d661c3f, 60c7bf466af1b547da818d9ac01e10a0
  • [Hash] ValleyRAT Sample B – d208b80a6608c72c3c590f86d93b074, 533c0c4ef8a46b6d36ed52cc2b4c179d5
  • [Hash] ValleyRAT (overall) – 14bf52de60e60a526141ffe61ef5afc2a3, bc7d60d4086e644ec80e67513d2684
  • [IP Address] C2 Server – 158.74.222.152, 154.39.255.141

Read more: https://www.splunk.com/en_us/blog/security/valleyrat-insights-tactics-techniques-and-detection-methods.html