Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits
Highlights: Introduction Throughout 2025, we conducted and published several reports related to our research on the Silver Fox APT. In some of them (for example, here), the threat actor delivered the well-known ValleyRAT backdoor, also referred to as Winos or Winos4.0, as the final stage. Since this malware family is widely used, modular, and often associated with Chinese threat actors […] The post Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits appeared first on Check Point Research .
AI Analysis
Technical Summary
ValleyRAT, also known as Winos or Winos4.0, is a sophisticated modular backdoor malware family extensively used by Chinese APT groups, including Silver Fox. The malware operates as a final-stage payload, providing attackers with persistent remote access and control over compromised systems. Its modular design allows for flexible deployment of various capabilities, including data exfiltration, reconnaissance, and lateral movement. A notable advancement in this malware's evolution is the incorporation of kernel rootkits, which operate at the kernel level to hide the malware's presence, evade detection by security tools, and maintain persistence even after system reboots. The research highlights the exploitation of builder secrets, which are internal configurations or cryptographic keys used during malware compilation, enabling defenders to better understand and potentially disrupt the malware's deployment. Although no active exploits have been reported in the wild, the malware's association with state-sponsored actors and its technical sophistication underscore its threat potential. The malware does not require user interaction for execution and can compromise system confidentiality, integrity, and availability. The Check Point Research article provides an in-depth technical analysis of ValleyRAT's architecture, kernel rootkit mechanisms, and operational tactics, emphasizing the need for advanced detection and mitigation strategies.
Potential Impact
For European organizations, ValleyRAT poses a significant threat to confidentiality, integrity, and availability of critical systems. The malware's kernel rootkit capabilities allow it to evade traditional endpoint security solutions, making detection and removal challenging. Targeted organizations could suffer from espionage, intellectual property theft, disruption of operations, and potential sabotage. Sectors such as government, defense, telecommunications, energy, and high-tech manufacturing are particularly at risk due to their strategic importance and historical targeting by Chinese APT groups. The stealthy nature of the malware increases the risk of prolonged undetected presence, enabling extensive data exfiltration and lateral movement within networks. The lack of known active exploits in the wild does not diminish the threat, as the malware's modularity allows for rapid adaptation and deployment of new capabilities. European entities with extensive supply chain connections to Asia or those involved in geopolitical matters sensitive to Chinese interests may face elevated targeting likelihood.
Mitigation Recommendations
European organizations should implement multi-layered defense strategies tailored to detect and mitigate kernel-level threats like ValleyRAT. Key recommendations include: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of kernel-level monitoring and anomaly detection to identify rootkit behaviors. 2) Utilize kernel integrity verification tools to detect unauthorized modifications to kernel structures and drivers. 3) Enforce strict application whitelisting and code signing policies to prevent unauthorized execution of malicious binaries. 4) Segment networks to limit lateral movement and isolate critical assets. 5) Conduct regular threat hunting exercises focusing on indicators of kernel rootkit activity and unusual system calls. 6) Maintain up-to-date threat intelligence feeds to monitor developments related to ValleyRAT and associated APT groups. 7) Educate security teams on the specific tactics, techniques, and procedures (TTPs) used by Silver Fox and similar actors. 8) Implement robust incident response plans that include kernel-level malware remediation procedures. 9) Restrict administrative privileges and enforce least privilege principles to reduce the attack surface. 10) Collaborate with national cybersecurity centers and industry ISACs to share intelligence and coordinate defenses.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Sweden, Poland
Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits
Description
Highlights: Introduction Throughout 2025, we conducted and published several reports related to our research on the Silver Fox APT. In some of them (for example, here), the threat actor delivered the well-known ValleyRAT backdoor, also referred to as Winos or Winos4.0, as the final stage. Since this malware family is widely used, modular, and often associated with Chinese threat actors […] The post Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits appeared first on Check Point Research .
AI-Powered Analysis
Technical Analysis
ValleyRAT, also known as Winos or Winos4.0, is a sophisticated modular backdoor malware family extensively used by Chinese APT groups, including Silver Fox. The malware operates as a final-stage payload, providing attackers with persistent remote access and control over compromised systems. Its modular design allows for flexible deployment of various capabilities, including data exfiltration, reconnaissance, and lateral movement. A notable advancement in this malware's evolution is the incorporation of kernel rootkits, which operate at the kernel level to hide the malware's presence, evade detection by security tools, and maintain persistence even after system reboots. The research highlights the exploitation of builder secrets, which are internal configurations or cryptographic keys used during malware compilation, enabling defenders to better understand and potentially disrupt the malware's deployment. Although no active exploits have been reported in the wild, the malware's association with state-sponsored actors and its technical sophistication underscore its threat potential. The malware does not require user interaction for execution and can compromise system confidentiality, integrity, and availability. The Check Point Research article provides an in-depth technical analysis of ValleyRAT's architecture, kernel rootkit mechanisms, and operational tactics, emphasizing the need for advanced detection and mitigation strategies.
Potential Impact
For European organizations, ValleyRAT poses a significant threat to confidentiality, integrity, and availability of critical systems. The malware's kernel rootkit capabilities allow it to evade traditional endpoint security solutions, making detection and removal challenging. Targeted organizations could suffer from espionage, intellectual property theft, disruption of operations, and potential sabotage. Sectors such as government, defense, telecommunications, energy, and high-tech manufacturing are particularly at risk due to their strategic importance and historical targeting by Chinese APT groups. The stealthy nature of the malware increases the risk of prolonged undetected presence, enabling extensive data exfiltration and lateral movement within networks. The lack of known active exploits in the wild does not diminish the threat, as the malware's modularity allows for rapid adaptation and deployment of new capabilities. European entities with extensive supply chain connections to Asia or those involved in geopolitical matters sensitive to Chinese interests may face elevated targeting likelihood.
Mitigation Recommendations
European organizations should implement multi-layered defense strategies tailored to detect and mitigate kernel-level threats like ValleyRAT. Key recommendations include: 1) Deploy advanced endpoint detection and response (EDR) solutions capable of kernel-level monitoring and anomaly detection to identify rootkit behaviors. 2) Utilize kernel integrity verification tools to detect unauthorized modifications to kernel structures and drivers. 3) Enforce strict application whitelisting and code signing policies to prevent unauthorized execution of malicious binaries. 4) Segment networks to limit lateral movement and isolate critical assets. 5) Conduct regular threat hunting exercises focusing on indicators of kernel rootkit activity and unusual system calls. 6) Maintain up-to-date threat intelligence feeds to monitor developments related to ValleyRAT and associated APT groups. 7) Educate security teams on the specific tactics, techniques, and procedures (TTPs) used by Silver Fox and similar actors. 8) Implement robust incident response plans that include kernel-level malware remediation procedures. 9) Restrict administrative privileges and enforce least privilege principles to reduce the attack surface. 10) Collaborate with national cybersecurity centers and industry ISACs to share intelligence and coordinate defenses.
Affected Countries
Technical Details
- Article Source
- {"url":"https://research.checkpoint.com/2025/cracking-valleyrat-from-builder-secrets-to-kernel-rootkits/","fetched":true,"fetchedAt":"2025-12-10T14:52:56.896Z","wordCount":4976}
Threat ID: 693989485f410c6b20afc44c
Added to database: 12/10/2025, 2:52:56 PM
Last enriched: 1/5/2026, 4:18:30 PM
Last updated: 2/6/2026, 1:10:33 AM
Views: 144
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers
HighVoidLink: Evidence That the Era of Advanced AI-Generated Malware Has Begun
HighCovenant Health data breach after ransomware attack impacted over 478,000 people
HighResearchers Spot Modified Shai-Hulud Worm Testing Payload on npm Registry
HighRomanian energy provider hit by Gentlemen ransomware attack
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.