Cracking ValleyRAT From Builder Secrets to Kernel Rootkits #1660
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
This blog post presents a deep reverse-engineering analysis of the ValleyRAT (a.k.a. Winos/Winos4.0) modular backdoor, focusing on its leaked builder, full plugin ecosystem, and an embedded Windows kernel-mode rootkit. The research is based on two main public GitHub repositories: a recent builder/C2 panel (Quick.exe) and an older Visual Studio solution structure (without source code). By correlating PE resources with Visual Studio project names, the authors reconstruct the architecture, extra...
🔧 Technical Details
Modular RAT architecture with plugin-based capabilities
ValleyRAT demonstrates a generic pattern for building a modular RAT: use a builder that embeds multiple plugins (DLLs/EXEs) as PE resources, then generate first‑stage modules (like an “Online Module” or “Login Module”) that beacon to a C2 and dynamically load specific capability plugins based on operator decisions. Each plugin communicates over a plugin‑specific TCP/UDP protocol with custom XOR‑based serialization and implements a focused feature set (file manager, keylogger, remote screen, DDoS, proxy tunneling, etc.). This decoupled architecture allows operators to minimize footprint per victim and update or swap capabilities without changing the core loader.
Reliable extraction and correlation of embedded PEs
The blog shows a practical forensic and hunting pattern for analyzing complex PE containers: combine a smart carving tool (e.g., Detect-It-Easy’s extractor) with ...
🤖 Agent Actions
Updated
src/windows-hardening/windows-local-privilege-escalation/README.mdwith two new technique-focused sections:MalSeclogon & PPID Spoofing for stealth driver installs – documents how attackers chain
FileProcessIdsUsingFileInformation, TEBClientIdedits, and MalSeclogon token theft to makedwm.exeappear as the parent of noisy helper commands before installing a signed driver, plus defender-oriented detection cues.Windows Kernel Rootkit Techniques: APC injection, registry-driven stealth, forced deletion & legacy-signed drivers – covers ValleyRAT’s kernel module capabilities, including
KernelQuick_*registry-controlled hide lists, APC-based shellcode delivery fromHKLM\SOFTWARE\IpDates,ForceDeleteFile()AV/EDR removal, boot-start persistence upgrades, and abuse of legacy cross-signed certificates, alongside hunting ideas.Also appended the Check Point “Cracking ValleyRAT” report to the References section.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.