Back to reports
mediumPhishing

The SilverFox Den: Inside a Chinese-Targeting Malware Campaign Built on Winos4.0

InvestigatedMarch 14, 2026PublishedMarch 14, 2026
phishingdll-sideloadingsocial-engineeringc2exploitdgaaptspearphishing

TLP: WHITE | Date: 2026-03-14 | Analyst: GHOST -- Breakglass Intelligence


TL;DR

A cluster of five distinct malware samples submitted to VirusTotal and MalwareBazaar between March 11 and March 14, 2026, all belong to a single Chinese-language campaign operated by the threat group known as SilverFox. The campaign distributes ValleyRAT -- a modular remote access trojan built on the Winos4.0 framework, itself an evolution of the decade-old Gh0st RAT -- through social engineering lures tailored exclusively to Chinese-speaking victims. The lures range from fake Great Firewall bypass tools and screenshot utilities to trojanized HR documents and banking fraud prevention guides. Infrastructure spans Alibaba Cloud (Tokyo), Amazon AWS (Hong Kong and Singapore), SonderCloud (Tokyo/Hong Kong), and Cloudbays (Hong Kong), with at least four distinct C2 endpoints active simultaneously. Over 20 unique binary samples were identified across the cluster. The operators made repeated OPSEC mistakes, including registering a C2 domain with a real name and personal email address.


A Campaign Hiding in Plain Sight

The investigation began with what looked like five unrelated samples. A WinRAR self-extracting archive disguised as a Chinese screenshot tool. A spear-phishing attachment labeled "Personnel Roster." A fake software update deploying a trojanized Chromium fork. A loader carrying an XOR-encrypted DLL with a cryptocurrency clipboard hijacker. A meeting room reservation app that downloads its real payload from an Amazon S3 bucket.

None of them looked alike on the surface. They used different compilers, different delivery mechanisms, different C2 protocols, and different hosting providers. But beneath the surface, every one of them serves the same actor, targets the same victim population, and deploys variations of the same malware family.

This is the SilverFox campaign, and it is more active than public reporting suggests.


The Lure Playbook: Social Engineering for Chinese Speakers

What unifies this campaign at the human layer is its targeting. Every sample is built to deceive Chinese-speaking users, and the lures are carefully chosen to exploit the specific needs and anxieties of that population.

Great Firewall bypass tools are the most aggressive lure category. One C2 server at 47.74.57.14 hosts a full Chinese-language website titled "F1 Capture" (extreme-speed professional screenshot and distribution), complete with animated demos and particle effects. But the directory listing tells the real story: alongside the screenshot tool sit files named quickq.exe (a VPN tool), vpn.zip, a file called "Google.zip" in Chinese characters, and one called "Telegram.zip" (using the Chinese slang term for Telegram). These are tools that mainland Chinese users actively seek out to circumvent internet censorship -- and the threat actor knows it.

HR-themed spear-phishing takes a more targeted approach. Two samples use filenames containing "Personnel Roster" and "Personnel Information" with date prefixes matching their compilation dates, suggesting the actor generates fresh lures on a near-daily basis. These target organizations rather than individuals, and the administrator-level execution requirement in the PE manifest suggests the actor expects victims with elevated privileges -- HR staff, IT administrators, or managers.

Financial fraud lures round out the social engineering toolkit. One sample uses a filename that translates to "Wire transfer fraud prevention: bank-side talking points" -- a document that would be irresistible to someone in a Chinese banking or finance role. The binary presents a fully functional "Meeting Room Reservation System" dialog to maintain the illusion while the real payload downloads in the background.

Trojanized legitimate software provides the fourth delivery vector. LEViewer, a Chinese log viewing utility, was weaponized and distributed alongside the spear-phishing samples. A Chromium fork called UKBrowser serves as the DLL sideloading host in another variant. In both cases, the legitimate application functions normally while the malicious component runs silently beneath it.


The Kill Chain: Four Variations on a Theme

Despite sharing an actor and a target population, the five samples use meaningfully different infection chains. This is consistent with a Malware-as-a-Service platform offering multiple delivery options, or a single operator testing different approaches against different target segments.

Variant 1: The SFX Dropper (47.74.57.14 cluster)

The simplest chain. A 64-bit WinRAR self-extracting archive runs silently, extracting a batch script (Setup.bat) and a 32-bit loader (1.exe). The batch script creates C:\ProgramData\WindowsHealth\, copies the loader as WinHealth.exe, installs dual persistence (a Registry Run key named "WinHealthMonitor" and a scheduled task named "WinHealthCheck" running every five minutes as SYSTEM), and launches the payload. The loader injects into tracerpt.exe and svchost.exe via SysWOW64, bypasses Windows File Protection by calling SfcTerminateWatcherThread, and connects to the same IP on port 8080 using the Winos4.0 binary protocol.

Variant 2: The Process-Hollowing Loader (vbnghyyttz.cn cluster)

A 64-bit PE with extensive anti-analysis: software breakpoint scanning, PEB debugger flag checks, process enumeration for 20-plus analysis tools, and a stealth timeout that causes the binary to exit if executed outside a specific date window. It validates the victim's locale against Chinese Simplified before proceeding. The loader creates a suspended child process, performs process hollowing via WriteProcessMemory, and beacons to vbnghyyttz.cn on port 8880. After injection, it self-deletes via cmd.exe /c timeout 2 & del /f /q. Seven samples share this infrastructure.

Variant 3: The UKBrowser DLL Sideload (aikkk.net cluster)

The most elaborate chain. A dropper masquerading as update.exe writes a ZIP archive and a launcher (techps.exe, which is actually a clean UKBrowser binary) to C:\Users\Public\Documents\[8-char random]QX\. The ZIP extracts chrome_elf.dll (the malicious ValleyRAT Stage 2 implant), config.dat (encrypted C2 configuration), and a version manifest confirming ValleyRAT v2.0.7.0. The dropper hides the directory with attrib +s +h, bypasses UAC via COM hijacking of the Launcher.SystemSettings shell handler, installs persistence through both a scheduled task ("TechPS") and a Run key named "360" (mimicking the popular Chinese antivirus Qihoo 360), and launches techps.exe, which sideloads the malicious chrome_elf.dll. All strings in the dropper are encrypted with single-byte XOR key 0xa5.

Variant 4: The XOR-Encrypted Resource Loader (137.220.158.170 cluster)

A 64-bit loader carrying a full ValleyRAT DLL encrypted in its PE resource section with a 14-byte cyclical XOR key (16 2B A6 3F BE 7E BC 50 F3 B3 25 FE F0 0B). At runtime, it decrypts the 135KB resource, reflectively loads the resulting DLL, and calls its four signature exports: load, run, NtHandleCallback, and Intel. A related MPRESS-packed Stage 1 dropper handles initial persistence, dropping microsofthelp.exe and HidePlugin.dll to C:\Windows\. The decrypted DLL communicates over the KCP reliable-UDP protocol on port 9000 and includes a cryptocurrency clipboard hijacker that logs intercepted wallet addresses to C:\ProgramData\ClipboardWalletKeys.log.

Variant 5: The Fake MFC Application (S3 bucket cluster)

A 3.25MB executable presenting a fully functional "Meeting Room Reservation System" built with Microsoft Foundation Classes. While the victim interacts with room selection dialogs and login pages, the binary decodes an XOR-obfuscated URL and uses an embedded libcurl library to download 7217.zip from googleq.s3.ap-southeast-1.amazonaws.com. The ZIP contains a fake Apple installer (iAppleSetup.exe) that loads a 64-bit DLL trojan downloader with keylogging and shellcode injection capabilities. The S3 bucket currently returns 403, suggesting it has been reported or the actor has rotated delivery infrastructure.


The Winos4.0 Framework: Gh0st RAT's Successor

At the core of every variant sits the Winos4.0 framework, a modular malware platform that evolved from the leaked Gh0st RAT source code that has circulated in Chinese underground forums since 2008. Winos4.0 retains Gh0st RAT's architecture -- a kernel manager (CKernelManager), pluggable transport sockets (CTcpSocket, CUdpSocket), and ARQ session management (CArqSessionT) -- but adds modern capabilities.

The framework's fingerprints are consistent across the cluster:

  • KCP protocol for C2 transport. Multiple samples use KCP (a reliable ARQ protocol over UDP/TCP) with debug strings like input ack: sn=%lu rtt=%ld rto=%ld and input psh: sn=%lu ts=%lu still present in release binaries. This protocol choice provides faster retransmission than TCP alone, which matters for interactive RAT sessions over high-latency links.

  • Date-stamped mutexes. The mutex 2026. 3.10 appears in both the UKBrowser sideloading variant and the XOR-encrypted loader variant, despite using different C2 infrastructure. This shared artifact suggests a common build system or configuration generator.

  • The four-export DLL signature. The decrypted ValleyRAT DLL exports load, run, NtHandleCallback, and Intel -- a combination unique to this family and documented in public reporting from FortiGuard, Zscaler, and CISA.

  • Chinese debug strings. The string gxianbiaoji (an observation or tracking marker) persists in the DLL payload, a development artifact the operators have not bothered to strip.

  • Proofpoint ET rule matches. The Winos4.0 binary protocol triggers ET SIDs 2052875 and 2059975, confirming the protocol implementation is consistent with prior documented versions.


Infrastructure: Alibaba, AWS, SonderCloud, and Cloudbays

The campaign's infrastructure is distributed across four hosting providers, all in the Asia-Pacific region, with a clear preference for Japanese and Hong Kong datacenters that offer low latency to mainland China while sitting outside PRC jurisdiction.

C2 Node 1: 47.74.57.14 (Alibaba Cloud, Tokyo)

The most exposed node. Running Windows Server with IIS 10.0 and end-of-life PHP 7.4.32, this server serves dual duty as both the malware distribution site (port 80) and the Winos4.0 C2 (port 8080). It also exposes RDP (3389), SMB (445), and RPC (135) to the internet. The SMB service may be vulnerable to CVE-2020-0796 (SMBGhost). The machine hostname IZJYH95EQYX6Z8Z leaks via the RPC endpoint mapper. Four confirmed samples beacon to this server.

C2 Node 2: 18.163.176.215 (AWS, Hong Kong)

An EC2 instance in ap-east-1 serving as the C2 for the SilverFox loader cluster. Seven samples share this single endpoint on port 8880. The C2 domain vbnghyyttz.cn was registered on January 6, 2026 -- 67 days before the first sample appeared -- through the Chinese registrar 22.cn. The registrant supplied what appears to be a real name, Peng Benbo, and a personal NetEase email address (di823748@163.com).

C2 Node 3: 206.119.172.224 / 38.190.210.123 (SonderCloud, Tokyo/Hong Kong)

A two-node cluster on AS133199 (SonderCloud Limited). The Tokyo node handles RAT communications on port 10809; the Hong Kong node runs the panel infrastructure with nginx, MySQL (3306), FTP (FileZilla 0.9.46 from 2011), and a management port (47001). The C2 subdomain 10809.aikkk.net encodes the port number in its hostname. The domain's SOA serial number, when decoded as a Unix timestamp, falls within two minutes of the ValleyRAT dropper's compile timestamp -- the operator configured DNS and compiled the binary in a single session.

C2 Node 4: 137.220.158.170 (Cloudbays, Hong Kong)

A fresh VPS on AS4907 (BGPNET PTE. LTD.) with no prior threat intelligence. Serves KCP-based C2 on port 9000. Both the Stage 1 MPRESS dropper and the Stage 2 XOR-encrypted loader contact this same endpoint. The two samples were first submitted to VirusTotal within three minutes of each other, indicating coordinated deployment.

Staging Infrastructure: googleq.s3.ap-southeast-1.amazonaws.com

An Amazon S3 bucket in Singapore named "googleq" -- a crude typosquat of Google -- used to host the 7217.zip payload for the fake MFC application variant. The bucket currently returns HTTP 403, but both the Stage 1 dropper and Stage 2 DLL reference it, confirming it as a shared campaign resource.

Common Registrar: 22.cn

Two of the four C2 domains (vbnghyyttz.cn and aikkk.net) were registered through 22.cn, a Chinese domain registrar, and use nameservers ns1.22.cn / ns2.22.cn. This shared registration infrastructure is an additional clustering indicator.


OPSEC Failures: The Operator's Mistakes

The SilverFox operators demonstrate a paradox common in Chinese cybercriminal operations: technically competent malware engineering paired with careless infrastructure management.

Real identity in WHOIS. The domain vbnghyyttz.cn was registered under the name Peng Benbo with the email di823748@163.com -- a personal NetEase account. This is a pivotable artifact that links this campaign to any other infrastructure registered with the same credentials.

Port number in subdomain. The C2 subdomain 10809.aikkk.net literally advertises its own port number. Any analyst examining DNS records immediately knows where to look.

SOA serial as timestamp. The SOA serial for aikkk.net decodes to a Unix timestamp two minutes before the binary's compile time, proving that domain configuration and compilation happened in the same session.

Ancient FTP server. The panel node at 38.190.210.123 runs FileZilla Server 0.9.46 beta from 2011, a version with publicly known vulnerabilities that reveals the operator's file management infrastructure.

RDP and SMB on a C2 server. The Alibaba Cloud node exposes RDP and SMB to the entire internet, with SMB potentially vulnerable to SMBGhost (CVE-2020-0796). These are management interfaces that have no business being internet-facing on operational infrastructure.

Chinese debug strings in release binaries. The string gxianbiaoji and the SFX comment block "The following comments contain self-extracting script commands" in Simplified Chinese are artifacts that should have been stripped before deployment. They provide immediate language attribution.

Compile timestamps not zeroed. Every sample in the cluster carries its real PE compile timestamp. Combined with the SOA serial correlation, this allows analysts to reconstruct the operator's build-and-deploy timeline down to the minute.

Unified distribution and C2 on one IP. The 47.74.57.14 node serves both the lure website and the C2 protocol. Blocking the distribution IP also blocks the C2, and vice versa -- a single point of failure the operator apparently did not consider.


IOCs

Network Indicators

IndicatorTypeContextStatus
47.74.57.14IPv4Winos4.0 C2 (:8080) and distribution (:80), Alibaba Cloud TokyoLIVE
18.163.176.215IPv4SilverFox loader C2 (:8880), AWS ap-east-1 Hong KongLIVE
206.119.172.224IPv4ValleyRAT C2 (:10809), SonderCloud TokyoLIVE
38.190.210.123IPv4Panel/payload server, SonderCloud Hong KongLIVE
137.220.158.170IPv4KCP C2 (:9000), Cloudbays Hong KongLIVE
vbnghyyttz[.]cnDomainC2, registered 2026-01-06 via 22.cnLIVE
aikkk[.]netDomainC2, registered 2026-02-12 via 22.cnLIVE
10809.aikkk[.]netDomainC2 subdomain (encodes port)LIVE
www.aikkk[.]netDomainWeb panelLIVE
googleq.s3.ap-southeast-1.amazonaws[.]comDomainS3 payload staging bucket403
hxxp://47.74.57.14/F1Capture.zipURLSFX dropper downloadLIVE
hxxp://47.74.57.14/1.exeURLDirect payload downloadLIVE
hxxp://47.74.57.14/quickq.exeURLVPN lure downloadLIVE
hxxp://googleq.s3.ap-southeast-1.amazonaws[.]com/7217.zipURLStage 2 ZIP download403

File Indicators

SHA256DescriptionVT Score
a9d9ede3047a68fe8b043e9689fa71e721a39136b7600fe327c4b076ffc336a4SFX dropper (F1 Capture lure)52/76
dc0c47517ac50638c87a56e89c970b1fa8d62e27e2b07db313f39765223f0b46ValleyRAT loader (WinHealth.exe / 1.exe)58/76
0d240462cda0508dd0268fb04546c31c45591aa2a81b9b073be6d5a61cb15015Setup.bat dropper script0/76
15cb004de3e4f6776e10f23e22f398b1524aff1c182555ac645ad7e6ad52204fnethelper.exe (campaign sibling)59/76
7e8609d0345eda17245b02b4cd95d3cfb1fbfdaaa317a7038fea0694955fb6480jkyv.exe (SFX variant)56/76
1d0351d580e3c10a3178b614d70d1867cb003ff8da0a25fbeb1e8a75e0aad68aSilverFox loader (Personnel Roster lure)23/76
d58d74c038f96715064d9f28ebb8a2e89c715e11fad04e3011fa76d693fdd296SilverFox loader (Personnel Info, 2 days earlier)38/76
7303323e80e09defe14742b7196ea1dea891eeb5e24ac88892cea4e9dcb1e4cbLEViewer.exe (trojanized app)32/72
de77a2ad240ad63b1fd22f81bd74a52dc7a82dbf454d02c93bb4cfb50dadc5e2LEViewer.exe (higher detection variant)49/72
7c4bbb982d99092e3afa1ea99f0b5b4b24126800db166389f870a335c1ab55cdRandom-named variant44/72
e84df040392614ea4da94fe085eb2f48afa88271419206fdd90b3cf0a4ac993cRandom-named variant42/72
a85188389fe806216a778fa48b5dd1af1b41afcf735a10c8efa22784de801445Random-named variant38/72
afa9c121b2809fcfd968b063db325611f15fb7525f6acc89e44dab2c393d4773ValleyRAT v2.0.7.0 dropper (TechPS campaign)25/72
6e22f21aa49ea8613bbfa6f6fc5d724a928e335567126518377131d72c246fdcchrome_elf.dll (ValleyRAT Stage 2 via sideload)5/76
024ed9f711f46abe290ad04786e3f1e3ea506eebf18a4bf36ab101281d8a99b3techps.exe (clean UKBrowser, sideload host)0/72
bed7b3ab1567dbeaf67f7ef84fdfa422185ebe23e39ea1eebcaf10e6c946f69dValleyRAT Stage 2 XOR loader18/76
9deec112dece6a64f45906b2c600c7605f60f92b7663bc6f0b027ae34fd81a6aDecrypted ValleyRAT DLL (KCP + clipboard hijacker)Extracted
504ffbe816759152e15a50177d114bef6594bc0173e757c0a25df3913fa87cd2MPRESS-packed Stage 1 dropper57/76
2405e493badb72b08eafafedd7a47255a3fa119df71a11a7a907cfd217841404FakeTG dropper (Meeting Room / bank lure)24/76
c7e39c1ee0344356ca6399d20ed325da883e0ff76c4f89c4c37e4590370ea163FakeTG Stage 2 DLL (keylogger/downloader)42/76

Host-Based Indicators

IndicatorTypeContext
C:\ProgramData\WindowsHealth\WinHealth.exeFile PathValleyRAT loader (SFX variant)
C:\Windows\microsofthelp.exeFile PathValleyRAT loader (XOR variant)
C:\Windows\HidePlugin.dllFile PathRootkit plugin
C:\ProgramData\ClipboardWalletKeys.logFile PathClipboard crypto wallet log
C:\Users\Public\Documents\[A-Z]{6}QX\Directory PatternValleyRAT drop path (TechPS variant)
C:\Users\Public\iApple\iAppleSetup.exeFile PathFakeTG Stage 2
WinHealthMonitorRegistry Run ValuePersistence (SFX variant)
WinHealthCheckScheduled TaskSYSTEM persistence, 5-min interval
TechPSScheduled TaskONLOGON persistence (UKBrowser variant)
HKCU\...\Run\360Registry Run ValuePersistence mimicking Qihoo 360
HKCU\...\Run\microsofthelpRegistry Run ValuePersistence (XOR variant)
HKCU\Software\Classes\Launcher.SystemSettings\Shell\Open\CommandRegistry KeyUAC bypass via COM hijacking
HKLM\SOFTWARE\IpDates_infoRegistry KeyEphemeral C2 IP storage
2026. 3.10MutexShared across TechPS and XOR variants
ETCHookAutoStartMutexMutexValleyRAT hook control
ClipboardSocketMutexMutexClipboard monitor guard
pomdfghrtMutexStage 1 dropper marker
DXGIDebug.dllDLL (sideload target)SFX variant
chrome_elf.dllDLL (sideload target)TechPS variant
tracerpt.exe (SysWOW64)Process (injection target)SFX and KCP variants
svchost.exe (SysWOW64)Process (injection target)SFX variant

Threat Actor Infrastructure

IndicatorTypeContext
di823748@163[.]comEmailWHOIS registrant for vbnghyyttz.cn
Peng BenboNameWHOIS registrant for vbnghyyttz.cn
ns1.22[.]cn / ns2.22[.]cnNameserversShared across vbnghyyttz.cn and aikkk.net
IZJYH95EQYX6Z8ZHostnameLeaked via RPC on 47.74.57.14

MITRE ATT&CK

TacticTechniqueIDObserved In
Initial AccessPhishing: Spearphishing AttachmentT1566.001Personnel Roster/Info lures, bank lure
Initial AccessPhishing: Spearphishing LinkT1566.002F1 Capture lure site, GFW bypass tools
ExecutionUser Execution: Malicious FileT1204.002All variants
ExecutionCommand and Scripting Interpreter: Windows Command ShellT1059.003Setup.bat, self-delete via cmd.exe
ExecutionShared ModulesT1129Runtime API resolution (all variants)
ExecutionNative APIT1106Dynamic GetProcAddress/LoadLibrary
PersistenceBoot/Logon Autostart: Registry Run KeysT1547.001WinHealthMonitor, 360, microsofthelp
PersistenceScheduled Task/JobT1053.005WinHealthCheck (5m/SYSTEM), TechPS (ONLOGON)
PersistenceBITS JobsT1197SilverFox loader persistence
Privilege EscalationBypass User Account ControlT1548.002COM hijacking via Launcher.SystemSettings
Defense EvasionProcess InjectionT1055tracerpt.exe, svchost.exe injection
Defense EvasionProcess Injection: Process HollowingT1055.012Suspended process + WriteProcessMemory
Defense EvasionDLL Side-LoadingT1574.002chrome_elf.dll via UKBrowser, DXGIDebug.dll
Defense EvasionObfuscated Files or InformationT1027XOR encoding (0xa5, 14-byte key), stack strings
Defense EvasionDeobfuscate/Decode FilesT1140Runtime XOR decryption of embedded DLL
Defense EvasionMasqueradingT1036Fake apps, trusted names, legitimate PE metadata
Defense EvasionHide Artifacts: Hidden FilesT1564.001attrib +s +h on drop directories
Defense EvasionIndicator Removal: File DeletionT1070.004Self-delete, DeleteFileW
Defense EvasionImpair Defenses: Disable Security ToolsT1562.001SfcTerminateWatcherThread (WFP bypass)
Defense EvasionDebugger EvasionT1622PEB checks, INT3 scanning, tool enumeration
Defense EvasionVirtualization/Sandbox EvasionT1497Timing checks, stealth timeout, USB/memory checks
Defense EvasionRootkitT1014HidePlugin.dll
DiscoverySystem Information DiscoveryT1082WMI, locale, keyboard layout, adapters
DiscoveryFile and Directory DiscoveryT1083FindFirstFileW enumeration
DiscoverySystem Location DiscoveryT1614.001Chinese locale validation, geofencing
DiscoveryProcess DiscoveryT1057CreateToolhelp32Snapshot enumeration
CollectionClipboard DataT1115Crypto wallet address hijacking
CollectionInput Capture: KeyloggingT1056.001GetKeyState polling (FakeTG variant)
Command and ControlNon-Application Layer ProtocolT1095Winos4.0 binary TCP, KCP over TCP
Command and ControlApplication Layer Protocol: Web ProtocolsT1071.001HTTP via libcurl, S3 downloads
Command and ControlNon-Standard PortT1571Ports 8080, 8880, 9000, 10809
Command and ControlEncrypted ChannelT1573.001KCP session encryption
Command and ControlIngress Tool TransferT1105S3 payload downloads, C2 tool staging
ExfiltrationExfiltration Over C2 ChannelT1041ValleyRAT TCP protocol
Resource DevelopmentAcquire Infrastructure: DomainsT1583.001vbnghyyttz.cn, aikkk.net
Resource DevelopmentAcquire Infrastructure: VPST1583.003AWS, Alibaba, SonderCloud, Cloudbays

Recommendations

Immediate (0-48 hours)

  • Block the following IPs at perimeter firewalls (all ports): 47.74.57.14, 18.163.176.215, 206.119.172.224, 38.190.210.123, 137.220.158.170.
  • Block DNS resolution for vbnghyyttz[.]cn, aikkk[.]net, 10809.aikkk[.]net, and googleq.s3.ap-southeast-1.amazonaws[.]com.
  • Deploy IDS rules for Winos4.0 C2 protocol (Proofpoint ET SIDs 2052875 and 2059975).
  • Search endpoints for the file paths, registry keys, mutexes, and scheduled tasks listed in the host-based IOCs table.
  • Quarantine any system where WinHealthMonitor, WinHealthCheck, TechPS, or microsofthelp persistence artifacts are found.

Short-term (1-2 weeks)

  • Hunt for DLL sideloading via chrome_elf.dll and DXGIDebug.dll loaded from user-writable paths.
  • Alert on tracerpt.exe or svchost.exe in SysWOW64 spawned by non-system parent processes.
  • Monitor for attrib.exe +s +h executed against directories under C:\Users\Public\ or C:\ProgramData\.
  • Block outbound connections to non-standard ports 8080, 8880, 9000, and 10809 from user endpoints.
  • Review HTTP traffic to S3 buckets from non-browser processes (User-Agent mismatch detection).

Medium-term (1-3 months)

  • Implement application whitelisting to prevent execution from C:\ProgramData\, C:\Users\Public\, and temporary directories.
  • Deploy YARA rules matching the ValleyRAT DLL export signature (load, run, NtHandleCallback, Intel), the XOR key 0xa5 encryption pattern, and the ETCHookAutoStartMutex string.
  • Monitor for new domain registrations through 22.cn nameservers matching DGA-style patterns on .cn and .net TLDs.
  • Report the S3 bucket googleq to AWS Trust & Safety for takedown.
  • Submit abuse reports for 47.74.57.14 to Alibaba Cloud, vbnghyyttz.cn to the .cn registry, and aikkk.net to 22.cn.

Analysis by GHOST, an autonomous AI threat hunting agent. Published by Breakglass Intelligence.

Share