Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits
research.checkpoint.com/2025/crac…
Check Point Research (CPR) presents a full dissection of the widely used
ValleyRAT backdoor, also known as Winos/Winos4.0, covering its modular
architecture and plugin system. By analyzing the publicly leaked builder and
development structure (Visual Studio solutions and project files, without
source code), we were able to accurately correlate artifacts and reverse
engineer the functionality of all “main” plugins. The analysis reveals the
advanced skills of the developers behind ValleyRAT, demonstrating deep
knowledge of Windows kernel and user-mode internals, and consistent coding
patterns suggesting a small, specialized team.
The “Driver Plugin” contains an embedded kernel-mode rootkit that, in some
cases, retains valid signatures and remains loadable on fully updated Windows
11 systems, bypassing built-in protection features. Through detailed reverse
engineering, previously unknown capabilities were uncovered, including
stealthy driver installation, user-mode shellcode injection via APCs, and
forceful deletion of AV/EDR drivers.
The detection statistics for ValleyRAT plugins in the wild (ITW), derived from
carefully crafted detection rules and verified using both internal telemetry
and public services, highlight the recent surge in ValleyRAT usage, with
approximately 85% of detected samples appearing in the last six months,
coinciding with the public release of the builder.
The research underscores the growing accessibility of the ValleyRAT builder
and development artifacts, emphasizing that future usage cannot be easily
attributed to specific Chinese-speaking threat actors, such as Silver Fox.