ValleyRAT Masquerades as LINE Installer to Target Users and Harvest Login Credentials


A malware campaign where cybercriminals distribute a fake LINE messenger installer that secretly deploys the ValleyRAT malware to steal credentials and evade detection.

Since early 2025, threat actors have increasingly used fraudulent software installers to deliver malware.

This campaign shares techniques with previously discovered LetsVPN-themed attacks, including task-scheduler persistence, PowerShell-based evasion, and C2 communications via Hong Kong servers.

Cybereason GSOC performed a detailed analysis of malware repeatedly observed by that posed as the LINE installer, and found several previously unknown capabilities in related samples.

Recent incidents observed by the Cybereason Global SOC (GSOC) show that this fake LINE installer, built with the Nullsoft Scriptable Install System (NSIS), imitates legitimate installers to mislead users particularly Chinese-speaking targets.

Discovery and Behavior

The Cybereason team analyzed a sample (SHA1: b02a99344f2fa81636ad913f805b52051debe529) that pretends to be a LINE setup file. Once launched, it spawns three processes PowerShell, rundll32.exe executing intel.dll, and chrmstp.exe each performing system modifications and stealth operations.

PowerShell commands disable Windows Defender scanning on system drives, while intel.dll and chrmstp.exe execute encoded shellcode files (config.ini, config2.ini, Sangee.ini) that retrieve further payloads from remote C2 servers.


Attack Flow (Source : Cybereason).
Attack Flow (Source : Cybereason).

These payloads establish persistence and perform code injection into Windows Explorer (explorer.exe) and UserAccountBroker.exe using PoolParty Variant 7, a rarely seen injection method that manipulates I/O Completion Ports to run malicious code stealthily within legitimate processes.

Cybereason observed advanced anti-analysis tactics including sandbox detection using file-locking tests, watchdog features inside injected system processes, and digital certificate tampering to feign legitimacy.

The fake installer’s certificate claims to belong to “Chengdu MODIFENGNIAO Network Technology Co., Ltd.” but validation fails with a CRYPT_E_HASH_VALUE error, confirming signature tampering.

Execution result of sysinternal tool sigcheck.exe (Source : Cybereason).

VirusTotal searches revealed multiple other NSIS-based samples using the same certificate to masquerade as installers for AnyDesk, ToDesk, Sogou, and similar Chinese applications.

Potential Payload: ValleyRAT

The C2 infrastructure used by this campaign connects to IPs 143.92.38[.]217 and 206.238.221[.]165, consistent with ValleyRAT (also known as Winos 4.0) activity previously linked to the Silver Fox APT group.

The malware writes shellcode into Explorer’s virtual memory using VirtualAllocEx() and WriteProcessMemory(), then sets the TP_DIRECT structure’s Callback field.

Code to execute ZwSetIoCompletion() and injected code to Explorer.exe (Source : Cybereason).
Code to execute ZwSetIoCompletion() and injected code to Explorer.exe (Source : Cybereason).

ValleyRAT is capable of credential theft, clipboard capture, and system reconnaissance. The new variant adds stealthier persistence through direct RPC-based Scheduled Task registration and PoolParty injection marking a significant upgrade over earlier versions analyzed by Rapid7.

Cybereason advises implementing the following security measures:

  • Detection Rules: Flag creation of files under %AppData%TrustAsia, outbound connections from UserAccountBroker.exe when spawned by Explorer.exe, and binaries signed by invalid or unverifiable certificates.
  • Certificate Validation: Block executables signed with the name Chengdu MODIFENGNIAO Network Technology Co., Ltd., as this entity no longer exists and its certificates are consistently abused.
  • User Awareness: Warn users against downloading software from unverified links and instruct them to cancel installations showing “Unknown Publisher” in the UAC prompt.

This campaign demonstrates how threat actors weaponize installer trust mechanics to gain administrator privileges and deploy information-stealing malware.

By blending legitimate installation flows with sophisticated injection and evasion techniques, attackers can bypass standard endpoint defenses.

Cybereason GSOC continues tracking these evolving ValleyRAT variants and urges enterprises to validate all installer certificates, enforce signed-software execution policies, and monitor for suspicious process hierarchies indicative of installer-based threats.

IOCs

IOCIOC TypeDescription
b02a99344f2fa81636ad913f805b52051debe529SHA-1LineInstaller.exe (Fake Installer)
b4feadbada51e68852a8a732f0e79ae725a755a4SHA-1intel.dll
51330636e299128c026c77cbc77dc24f3db49336SHA-1Config2.ini
9120e22231ea9f597d8bb62d46e4775bd3fe5ccbSHA-1Config2.ini
fab0802c3978f096223ff3b29188c3617e3cfa62SHA-1chrmstp.exe
da64ac77059050fdf30143da3671d41fff872689SHA-1Sangee.ini
8e7e3a910f06310ca9fe1d07fd1a4208eeb53a25SHA-1PolicyManagement.xml
2fd374f17e059cb16e530c3b73b883d5c57ce0f0SHA-1updated.ps1
143.92.38[.]217:18852IP address : Port numberC&C server
206.238.221[.]165:443IP address : Port numberC&C server

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link