Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits
research.checkpoint.com·1d
🏺ZIP Archaeology
Preview
Report Post

Highlights:

  • Check Point Research (CPR) presents a full dissection of the widely used ValleyRAT backdoor, also known as Winos/Winos4.0, covering its modular architecture and plugin system.
  • By analyzing the publicly leaked builder and development structure (Visual Studio solutions and project files, without source code), we were able to accurately correlate artifacts and reverse engineer the functionality of all “main” plugins. The analysis reveals the advanced skills of the developers behind ValleyRAT, demonstrating deep knowledge of Windows kernel and user-mode internals, and consistent coding patterns suggesting a small, specialized team.
  • The “Driver Plugin” contains an embedded kernel-mode rootkit that, in some cases, retains vali…

Similar Posts

Loading similar posts...