top of page

ValleyRAT_S2 Campaign Leveraging DLL Side-Loading and Custom TCP Command-and-Control

January 22nd, 2026

High

Our Cyber Threat Intelligence Unit is tracking an active malware campaign involving ValleyRAT_S2, a second-stage payload in the ValleyRAT malware family. The activity spans multiple regions, where threat actors use social engineering and trojanized software to gain initial access. Once executed, ValleyRAT_S2 operates as a full-featured remote access trojan (RAT), facilitating credential theft, keystroke logging, system reconnaissance, and persistent remote control. The campaign relies on stealthy techniques, including DLL side-loading through legitimate or masqueraded applications, and communicates with attacker-controlled infrastructure over a custom TCP protocol. Given its credential-harvesting capabilities, persistence mechanisms, and operator-driven control model, ValleyRAT_S2 poses a high risk to unmonitored or insufficiently hardened endpoint environments. 

Technical Details

  • Threat Name: ValleyRAT_S2

  • Severity: High

  • Malware Type: Remote Access Trojan (RAT) with credential theft capability

  • Primary Language: C++

  • Attack Vectors:

    • Social engineering

    • Trojanized or cracked software installers

    • Phishing-delivered malicious archives

  • Attack Chain:

    • Threat actors distribute malicious content disguised as legitimate Chinese-language utilities, productivity tools, or software installers.

    • Initial execution loads a malicious DLL via DLL side-loading, commonly masquerading as legitimate libraries (e.g., steam_api64.dll).

    • The DLL decodes and launches ValleyRAT_S2 as a second-stage payload, employing obfuscation to evade static detection.

    • Once active, the RAT performs system discovery and establishes persistence, commonly through Task Scheduler or COM-based mechanisms.

    • The malware communicates with hard-coded command-and-control (C2) infrastructure using a custom TCP protocol, awaiting operator commands.

  • Capabilities:

    • System and environment enumeration

    • Credential harvesting (browser-stored credentials and system data)

    • Keystroke logging

    • File upload and download

    • Remote shell and arbitrary command execution

    • Process injection and manipulation

Image by ThisisEngineering

Impact

Successful execution of ValleyRAT_S2 may result in:

  • Persistent Remote Access: Long-term attacker control of compromised endpoints

  • Credential Theft: Exposure of authentication material enabling lateral movement

  • Data Exfiltration: Unauthorized collection of sensitive business or personal data

  • System Manipulation: Arbitrary command execution and malicious process injection

  • Operational Risk: Degraded system integrity, confidentiality, and trust

Detection Method

Organizations should monitor for the following indicators and behaviors:

  • Execution of signed or legitimate applications loading unexpected DLLs from non-standard directories (DLL side-loading).

  • Suspicious files or scripts staged in Temp or AppData paths (e.g., monitor.bat, target.pid).

  • Unexpected Task Scheduler or COM object creation linked to user-level applications.

  • Unusual child processes spawned by document viewers or installer binaries.

  • Outbound TCP connections to unknown or rare external IPs from user workstations.

  • Network traffic consistent with custom, non-HTTP TCP communication patterns.

Indicators of Compromise

Indicator (IP) 

Description 

27.124.3.175:14852 

Custom TCP-based protocol used by ValleyRAT_S2 for command-and-control communications 


mix of red, purple, orange, blue bubble shape waves horizontal for cybersecurity and netwo

Recommendations

  • Block outbound traffic to known malicious IPs and ports, including confirmed ValleyRAT_S2 C2 infrastructure.

  • Enforce application allow-listing and restrict DLL loading from user-writable directories.

  • Deploy endpoint detection capable of identifying DLL side-loading and abnormal persistence creation.

  • Inspect Task Scheduler and COM registrations for unauthorized entries.

  • Implement phishing awareness training focused on trojanized software and installer abuse.

  • Ensure credential hygiene and deploy multi-factor authentication where feasible to limit post-compromise impact.

Conclusion

The ValleyRAT_S2 campaign demonstrates how threat actors continue to combine social engineering with reliable post-exploitation tooling to achieve stealthy, persistent access to enterprise environments. Its use of DLL side-loading, credential harvesting, and operator-controlled C2 communications heightens the risk of long-term compromise and secondary intrusion activity. We urge organizations to prioritize endpoint visibility, outbound traffic monitoring, and proactive threat hunting to detect and disrupt ValleyRAT_S2 activity before it escalates.

bottom of page