Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Researchers Detail ValleyRAT Password Theft Techniques
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Researchers Detail ValleyRAT Password Theft Techniques

Highlights

  • ValleyRAT is a sophisticated Remote Access Trojan.

  • It uses multi-stage payload delivery for stealth.

  • Advanced evasion tactics make it hard to detect.

Kaan Demirel
Last updated: 11 June, 2024 - 5:15 pm 5:15 pm
Kaan Demirel 11 months ago
Share
SHARE

Cybersecurity researchers at Zscaler have delved into the methods utilized by ValleyRAT, a sophisticated Remote Access Trojan (RAT) that emerged earlier this year. This malware employs various techniques to gain unauthorized access to victims’ systems, often leveraging complex multi-stage payloads to evade detection by security software.

Contents
Campaign AnalysisKey Insights

ValleyRAT is a remote access tool observed first in early 2023. It aims to compromise systems and provide unauthorized access to threat actors. A recent campaign has been discovered, delivering the latest version of ValleyRAT through several stages. This version includes enhanced capabilities, such as advanced evasion techniques and enhanced functionality for persistence within compromised systems.

Campaign Analysis

The initial phase of infection involves a downloader that retrieves and decrypts XOR and RC4 encrypted files, including essential DLL payloads. These DLLs check for and terminate certain security processes while downloading additional files. One of these files is executed with administrative privileges, initiating a secondary stage of the attack. The campaign uses an HFS server for downloading components and conducting command-and-control (C2) communications, expanding the malware’s functionalities with new commands like taking screenshots and clearing logs.

As part of the infection process, the malware sideloads a malicious DLL that unpacks and loads additional encrypted payloads. This secondary payload injects itself into a suspended system process to ensure persistence and evade detection. The injected shellcode dynamically resolves APIs, retrieves C2 configurations, and executes further encrypted payloads, maintaining a foothold on the infected system.

The malware establishes persistence by adding its loader to autorun and hiding component files. It uses sophisticated methods like process injection and API resolving to deliver multiple stages of its payload stealthily. The final payload involves a decrypted shellcode reflecting DLL loading and parsing configuration strings that communicate with the C2 server to download additional data.

ValleyRAT engages in multi-stage payload delivery, utilizing techniques such as process injection, configuration parsing, and registry storage to maintain stealth and persistence. The malware’s evolution includes new device fingerprinting fields, an altered bot ID generation algorithm, and additional commands, enhancing its effectiveness in compromising targeted systems.

Key Insights

– ValleyRAT employs multi-stage payload delivery for stealth and persistence.
– The malware uses XOR and RC4 encryption for its payloads.
– It adapts to avoid detection by security software through process injection and API resolving.

The recent analysis by Zscaler highlights ValleyRAT’s advanced capabilities and the continuous evolution of its techniques to stay ahead of detection measures. The malware’s use of sophisticated multi-stage payload delivery and evasion tactics makes it a significant threat to computer systems. This research offers valuable insights for cybersecurity professionals to develop better detection and mitigation strategies.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Microsoft Tackles 72 Vulnerabilities in May Security Update

Apple Boosts Security With Extensive Software Updates

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

Share This Article
Facebook Twitter Copy Link Print
Kaan Demirel
By Kaan Demirel
Kaan Demirel is a 28-year-old gaming enthusiast residing in Ankara. After graduating from the Statistics department of METU, he completed his master's degree in computer science. Kaan has a particular interest in strategy and simulation games and spends his free time playing competitive games and continuously learning new things about technology and game development. He is also interested in electric vehicles and cyber security. He works as a content editor at NewsLinker, where he leverages his passion for technology and gaming.
Previous Article Metal Gear Solid Fans Celebrate New Game Features
Next Article Itron Uses Sequans Monarch 2 for Next-Gen Water Meters

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Capcom Reports Record Profits with Monster Hunter Leading Sales
Gaming
Elon Musk Expands Starlink in Saudi Arabia for Maritime and Aviation
Electric Vehicle Technology
Tesla’s FSD Reacts Swiftly to Avoid Semi-Truck Collision
Electric Vehicle
Tesla Brings Robotaxi to Saudi Arabia as Global Expansion Continues
Electric Vehicle
Tesla Constructs Cortex 2.0 at Giga Texas to Boost Computing Power
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?