Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Chinese APT Exploits Microsoft Exchange to Breach Energy Networks
May 14, 2026
Sandworm Targets Critical OT Assets, Pivoting from
May 14, 2026
New Malware Framework: Screen Control, Browser & Enables Artifact
May 14, 2026
Home/Threats/ValleyRAT Mimics LINE Installer to Steal User Attacking Users
Threats

ValleyRAT Mimics LINE Installer to Steal User Attacking Users

A sophisticated malware campaign is now distributing the ValleyRAT backdoor, which threat actors are disguising as a legitimate installer for the popular messaging application, LINE. This targeted...

David kimber
David kimber
February 4, 2026 3 Min Read
3 0

A sophisticated malware campaign is now distributing the ValleyRAT backdoor, which threat actors are disguising as a legitimate installer for the popular messaging application, LINE.

This targeted attack primarily focuses on Chinese-speaking users, leveraging a deceptive executable to infiltrate systems and compromise sensitive login credentials.

The malware employs a complex loading chain involving shellcode execution and legitimate system binaries to evade detection while establishing a firm foothold on the victim’s machine for long-term surveillance.

Upon execution, the fake installer triggers a multi-stage infection process designed to bypass endpoint security controls.

It immediately attempts to neutralize Windows Defender by using PowerShell commands to exclude entire system drives from antivirus scanning protocols.

Attack Flow (Source - Cybereason)
Attack Flow (Source – Cybereason)

Simultaneously, it deploys a malicious library, identified as intel.dll, which performs rigorous environmental checks. These checks involve file locking and mutex creation to determine if the code is running within a sandbox.

If the environment is deemed safe, the malware unpacks its primary payload, effectively transforming the device into a fully compromised node.

Cybereason analysts identified this campaign and noted that the malware utilizes the advanced PoolParty Variant 7 injection technique.

This method allows the attackers to hide malicious activity within trusted system processes, significantly complicating detection.

By abusing Windows I/O completion ports, the malware injects code into legitimate processes, ensuring it can operate stealthily while harvesting user credentials and maintaining persistent communication with command-and-control servers.

Advanced Injection and Persistence Mechanisms

The technical complexity of this ValleyRAT variant is most evident in its evasion and persistence strategies.

The malware injects code into Explorer.exe and UserAccountBroker.exe, utilizing the latter process as a watchdog to ensure malicious components remain active.

Execution result of sysinternal tool sigcheck.exe (Source - Cybereason)
Execution result of sysinternal tool sigcheck.exe (Source – Cybereason)

This injection relies on manipulating system handles via specific Windows APIs like ZwSetIoCompletion, allowing the threat actors to execute code within the memory space of trusted processes.

GUI of Fake Installer (Source - Cybereason)
GUI of Fake Installer (Source – Cybereason)

Additionally, the malware actively scans for security products from vendors like Qihoo 360 and terminates their network connections to blind local defenses.

Execution result of certutil.exe (Source - Cybereason)
Execution result of certutil.exe (Source – Cybereason)

To maintain persistence, the malware registers scheduled tasks via Remote Procedure Call (RPC) protocols, ensuring automatic execution upon user login.

It also utilizes a digital certificate issued to “Chengdu MODIFENGNIAO Network Technology Co., Ltd” to appear legitimate, though the signature is cryptographically invalid.

To prevent infection, users must only download installers from official sources.

Security teams should configure detection rules to flag invalid certificates and monitor for suspicious child processes spawned by Explorer.exe, such as UserAccountBroker.exe, which indicates potential process hollowing activity.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Hackers Using AI to Get AWS Admin Access Within 10 Minutes

Next Post

Notepad++ Supply Chain Attack Delivers Targeted Malware

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Canon MailSuite Flaw Allows Remote Code Execution
May 14, 2026
Anthropic Mythos AI Finds macOS Flaws B Anthropic’s Reportedly
May 14, 2026
Hackers Compromise 170 npm Packages to Steal GitHub
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us