Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Google Warns: Hackers Use AI to Create Zero- Using Working
May 11, 2026
Go Library fsnotify: Supply Chain Alarms After Access Changes
May 11, 2026
Hackers Use PlugX DLL Sideloading in PlugX-Like Chain
May 11, 2026
Home/Threats/ValleyRAT_S2 Malware Steals Financial Details from Organizations
Threats

ValleyRAT_S2 Malware Steals Financial Details from Organizations

The ValleyRAT_S2 malware is behind a new series of attacks, designed to covertly breach organizations, maintain persistence, and pilfer critical financial details. ValleyRAT_S2 is the second-stage...

David kimber
David kimber
January 12, 2026 3 Min Read
2 0

The ValleyRAT_S2 malware is behind a new series of attacks, designed to covertly breach organizations, maintain persistence, and pilfer critical financial details.

ValleyRAT_S2 is the second-stage payload of the ValleyRAT family and is written in C++. Once inside a network, it behaves like a full remote access trojan, giving attackers strong control over infected systems and a reliable way to move data out.

The current campaign spreads mainly through fake Chinese-language productivity tools, cracked software, and trojanized installers that pose as AI-based spreadsheet generators.

In many cases, the malware is delivered through DLL side‑loading, where a legitimate signed application is tricked into loading a malicious DLL named like a normal library, such as steam_api64.dll.

After tracking these operations, APOPHiS identified ValleyRAT_S2 as the core second-stage backdoor driving these intrusions.

The malware also arrives through spearphishing attachments and abused software update channels.

Malicious documents and archives drop payloads into locations like the Temp folder, for example:-

C:UsersAdminAppDataLocalTempAI自动化办公表格制作生成工具安装包steam_api64.dll.

From there, Stage 1 focuses on evasion, while ValleyRAT_S2 takes over long-term control, system discovery, credential theft, and financial data collection.

File info (Source - Medium)
File info (Source – Medium)

Once active, ValleyRAT_S2 scans processes, file systems, and registry keys, then reaches out to hardcoded command‑and‑control servers such as 27.124.3.175:14852 over a custom TCP protocol. It can upload and download files, run shell commands, inject payloads, and capture keystrokes.

This makes it well-suited for harvesting online banking credentials, payment data, and internal financial documents.

Persistence and watchdog behavior

One of the most dangerous parts of ValleyRAT_S2 is its layered persistence and watchdog design, which helps it survive reboots and manual cleanup.

The malware first stages files in the user’s Temp and AppData paths, creating markers such as %TEMP%target.pid and configuration paths under %APPDATA%PromotionsTemp.aps.

It also abuses Windows Task Scheduler through COM APIs to re‑run itself on startup, and may use registry run keys for backup startup paths.

Legitimate-looking process (Source - Medium)
Legitimate-looking process (Source – Medium)

A key feature is a generated batch script, monitor.bat, which acts as a watchdog loop.

The script reads the stored process ID from target.pid, checks if the main malware process is still running, and silently restarts it if needed.

A simplified version looks like this:-

@echo off
set "PIDFile=%TEMP%target.pid"
set /p pid=<"%PIDFile%"
del "%PIDFile%"
:check
tasklist /fi "PID eq %pid%" | findstr >nul
if errorlevel 1 (
  cscript //nologo "%TEMP%watch.vbs"
  exit
)
timeout /t 15 >nul
goto check

This loop allows ValleyRAT_S2 to recover if security tools or admins kill the main process. Combined with structured exception handling, sandbox checks, and process injection into trusted names like Telegra.exe and WhatsApp.exe, the malware maintains a quiet but strong presence.

For defenders, this means simple process killing is not enough; full removal must target the scheduled tasks, batch and VBS watchdog scripts, staged files, and the backdoor process all at once.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarephishingSecurity

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Weaponized Performance Reports Deploy Guloader Malware

Next Post

Cybercriminal Cryptocurrency Transactions Peaked in 2025 Following

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
ShinyHunters Breaches Instructure Canvas LMS Free-
May 11, 2026
Hugging Face Repo with 200k Downloads Inst Trending Repository
May 11, 2026
GhostLock Attack Locks Files Via Windows Sharing Like Ransom
May 11, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us