Malware News Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits

Khushal

Level 11
Thread author
Verified
Well-known
Apr 4, 2024
487
2,510
969

Check Point Research (CPR) presents a full dissection of the widely used ValleyRAT backdoor, also known as Winos/Winos4.0, covering its modular architecture and plugin system.
 
Last edited by a moderator:
  • Like
Reactions: rashmi

Check Point Research (CPR) presents a full dissection of the widely used ValleyRAT backdoor, also known as Winos/Winos4.0, covering its modular architecture and plugin system.

View attachment 293627
Nice find – ValleyRAT/Winos has been popping up in a lot of recent campaigns, so a deep dive like this is very relevant.

Quick context on ValleyRAT / Winos
Based on earlier public reporting (pre‑2025), ValleyRAT is:

  • A Windows remote‑access Trojan (RAT) focused on long‑term access and data theft.
  • Often used in targeted or semi‑targeted campaigns (for example via phishing, malicious documents, cracked software, etc.).
  • Known for using multiple components (loaders, decryptors, plugins) rather than a single monolithic EXE.

Your description matches that trend: a modular backdoor with a plugin system, now apparently extended with kernel‑level components/rootkits.

Why a modular plugin system matters
A RAT built around plugins and a builder typically means:

  • Flexible feature set – The operator can compile custom builds with only the plugins they need (keylogger, screen grabber, file manager, lateral movement tools, etc.).
  • Lower detection surface – Not all capabilities are shipped at once. Plugins can be downloaded on demand, making static signatures less reliable.
  • Easier updates – C2 operators can refresh or swap individual DLLs without changing the core loader.
  • Malware “service” model – A polished builder with options usually indicates this can be sold or leased to other actors.

Kernel‑mode / rootkit angle
Once a family starts using kernel‑mode drivers, defenders have extra problems:

  • Stealth – Rootkits can hide processes, files, registry keys or network connections from user‑mode tools.
  • Tamper resistance – Security products may be disabled or blinded if their drivers are attacked.
  • Persistence – Drivers installed as services or abusing legitimate signed drivers can survive reboots and be harder to remove.

How dangerous this is in practice depends heavily on:

  • Whether the driver is properly signed and how it bypasses Microsoft’s driver‑signing enforcement (if at all).
  • If it abuses BYOVD (Bring Your Own Vulnerable Driver) to get kernel‑level primitives.
  • How stable and bug‑free the rootkit is – many custom rootkits are crash‑prone.

Defensive takeaways (general, not specific to this report)
Even without reading the full Check Point write‑up, for a modular RAT with possible kernel components, some sensible measures are:

  • Harden initial access
    • Treat email attachments, “cracks”, and random loaders as high‑risk; use cloud AV/EDR plus sandboxing where possible.
    • Disable or strictly control Office macros, script execution (PowerShell/WSH), and untrusted MSI/EXE installers.
  • Driver and kernel protection
    • Keep Secure Boot and HVCI/Memory Integrity enabled on supported Windows versions.
    • Use security products that detect unsigned or abnormal driver loading and known‑bad / vulnerable drivers (BYOVD).
  • Behavioral detection
    • Look for suspicious process trees (document → script interpreter → unknown EXE/DLL).
    • Monitor for unusual use of LOLBins (e.g. regsvr32, rundll32, mshta, powershell) pulling from the internet or temp folders.
  • Network‑side controls
    • Block or inspect outbound connections to uncommon ports/domains; use DNS logging and TLS inspection where acceptable.
    • Leverage threat‑intel feeds that add IOCs from reports like this Check Point one.
  • Incident response readiness
    • Have a plan for collecting memory and disk images, driver lists (`fltmc`, `sc query type= driver`, etc.) and pushing them to IR tools.
    • For confirmed kernel‑mode compromise, strongly consider clean OS reinstall rather than just removal, if feasible.

If you’re interested in the technical side…
Since I can’t see that CPR article directly, I can’t quote its specifics, but in similar reports researchers usually publish:

  • The builder’s configuration options (plugins, C2, mutexes, encryption, obfuscation).
  • Protocol details (encryption, tasking format, plugin loading flow).
  • Hash lists, YARA rules, and sometimes IDA scripts or deobfuscation logic.

Those are very useful for:

  • Creating Sigma/YARA rules and EDR detections.
  • Hunting in existing logs for past ValleyRAT activity.
  • Comparing campaigns to attribute different operators using the same malware.

If you’d like, you can paste specific snippets (e.g. the plugin list, builder options, or the rootkit section) and I can help break them down into more practical detection/mitigation ideas.
 

You may also like...