
Cybersecurity researchers are calling consideration to a chain of cyber assaults that experience centered Chinese language-speaking areas like Hong Kong, Taiwan, and Mainland China with a identified malware known as ValleyRAT.
The assaults leverage a multi-stage loader dubbed PNGPlug to ship the ValleyRAT payload, Intezer mentioned in a technical document revealed remaining week.
The an infection chain commences with a phishing web page that is designed to inspire sufferers to obtain a malicious Microsoft Installer (MSI) package deal disguised as legit utility.

As soon as done, the installer deploys a benign software to steer clear of arousing suspicion, whilst additionally stealthily extracting an encrypted archive containing the malware payload.
“The MSI package deal makes use of the Home windows Installer’s CustomAction function, enabling it to execute malicious code, together with working an embedded malicious DLL that decrypts the archive (all.zip) the usage of a hardcoded password ‘hello202411’ to extract the core malware elements,” safety researcher Nicole Fishbein mentioned.
Those come with a rogue DLL (“libcef.dll”), a sound software (“down.exe”) that is used as a canopy to hide the malicious actions, and two payload recordsdata masquerading as PNG photographs (“aut.png” and “view.png”).
The primary goal of the DLL loader, PNGPlug, is to arrange the surroundings for executing the primary malware by way of injecting “aut.png” and “view.png” into reminiscence so as to arrange patience by way of making Home windows Registry adjustments and executing ValleyRAT, respectively.
ValleyRAT, detected within the wild since 2023, is a far flung get entry to trojan (RAT) that is in a position to offering attackers with unauthorized get entry to and management over inflamed machines. Contemporary variations of the malware have integrated options to seize screenshots and transparent Home windows tournament logs.
It is assessed to be connected to a risk team known as Silver Fox, which additionally stocks tactical overlaps with any other job cluster named Void Arachne owing to using a command-and-control (C&C) framework known as Winos 4.0.

The marketing campaign is exclusive for its focal point at the Chinese language-speaking demographic and using software-related lures to turn on the assault chain.
“Similarly hanging is the attackers’ refined use of legit utility as a supply mechanism for malware, seamlessly mixing malicious actions with reputedly benign packages,” Fishbein mentioned.
“The adaptability of the PNGPlug loader additional elevates the risk, as its modular design lets in it to be adapted for a couple of campaigns.”