Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

ValleyRAT Campaign Targets Job Seekers, Abuses Foxit PDF Reader for DLL Side-loading

0
Medium
Published: Wed Dec 03 2025 (12/03/2025, 09:29:56 UTC)
Source: AlienVault OTX General

Description

The ValleyRAT campaign targets job seekers by distributing malicious emails containing archive files disguised as Foxit PDF Reader installers. It abuses DLL side-loading techniques to execute its remote access trojan, enabling attackers to gain system control, monitor activity, and steal data. The campaign leverages social engineering by exploiting job seekers' eagerness and uses obfuscation through nested directories to evade detection. Although no CVSS score is assigned, the threat is medium severity due to its potential for data theft and system compromise without requiring user interaction beyond opening the archive. European organizations with users actively seeking employment are at risk, especially those where Foxit PDF Reader is prevalent. Mitigation requires user awareness training focused on recruitment scams, restricting execution of untrusted DLLs, and monitoring for unusual DLL side-loading behaviors. Countries with high Foxit PDF Reader usage and significant job market activity, such as Germany, France, and the UK, are likely most affected. This campaign exemplifies the combination of social engineering and legitimate software abuse to bypass defenses and compromise endpoints.

AI-Powered Analysis

AILast updated: 12/03/2025, 11:00:40 UTC

Technical Analysis

The ValleyRAT campaign is a targeted malware operation focusing on job seekers by sending phishing emails that contain archive files mimicking legitimate Foxit PDF Reader installers. The attackers exploit DLL side-loading, a technique where a malicious DLL is placed alongside a legitimate executable (in this case, Foxit PDF Reader) to achieve code execution under the guise of trusted software. This method bypasses many traditional security controls that whitelist known executables. The campaign uses social engineering by leveraging recruitment-related lures, exploiting the urgency and eagerness of job seekers to open attachments. The malware employs obfuscation techniques such as nested directories within the archive to evade detection by automated scanning tools. Once executed, ValleyRAT establishes remote access, allowing attackers to monitor user activity, exfiltrate sensitive data, and maintain persistence through techniques like process injection and DLL hijacking. The campaign has seen a spike in detections, indicating active and successful exploitation. The attack chain involves multiple MITRE ATT&CK techniques including T1056.001 (Input Capture), T1082 (System Information Discovery), T1005 (Data from Local System), T1140 (Deobfuscate/Decode Files or Information), T1055 (Process Injection), T1083 (File and Directory Discovery), T1059.001 (PowerShell), T1547.001 (Registry Run Keys/Startup Folder), T1566 (Phishing), T1027 (Obfuscated Files or Information), T1012 (Query Registry), and T1059.006 (Graphical User Interface). No known exploits in the wild are reported, but the campaign's sophistication and use of legitimate software abuse make it a significant threat vector.

Potential Impact

For European organizations, this campaign poses a significant risk of credential theft, unauthorized system access, and data exfiltration, especially within sectors with high employment turnover or active recruitment processes. Compromise of endpoints through DLL side-loading can lead to persistent access for attackers, enabling espionage or further lateral movement within networks. The use of social engineering targeting job seekers increases the likelihood of initial infection, potentially affecting HR departments and job applicants alike. Data theft could include personally identifiable information (PII), corporate confidential data, and intellectual property, leading to reputational damage and regulatory penalties under GDPR. The campaign's ability to evade detection by abusing legitimate software complicates incident response and increases remediation costs. Additionally, the medium severity rating suggests that while the threat is not immediately critical, it can escalate if combined with other attack vectors or if attackers gain deeper network footholds.

Mitigation Recommendations

1. Conduct targeted user awareness training emphasizing the risks of recruitment-related phishing and the dangers of opening unsolicited archive files. 2. Implement application control policies that restrict execution of untrusted DLLs and monitor for DLL side-loading behaviors, particularly involving Foxit PDF Reader or similar applications. 3. Employ endpoint detection and response (EDR) solutions capable of detecting obfuscated files, nested archive structures, and suspicious process injections. 4. Regularly audit and restrict software installation privileges to prevent unauthorized software execution. 5. Monitor network traffic for unusual outbound connections indicative of remote access trojans. 6. Use threat intelligence feeds to update detection rules for ValleyRAT indicators and related TTPs. 7. Encourage use of multi-factor authentication (MFA) to limit attacker lateral movement post-compromise. 8. Maintain up-to-date software and security patches, even though no direct patch is available for this technique, to reduce overall attack surface. 9. Implement strict email filtering and sandboxing to detect and block malicious attachments exploiting social engineering. 10. Review and harden registry and startup folder permissions to prevent persistence mechanisms.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.trendmicro.com/en_us/research/25/l/valleyrat-campaign.html"]
Adversary
ValleyRAT
Pulse Id
693003144213e15e12b947d5
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash047ecfaf35b24ec74b523df17a745365
hash98aa859e129d590b94882a55e087c120
hashf30a849f5880243c48d13c76cfb6f227
hashfc54e0d16d9764783542f0146a98b300
hash0227738e5a98622ea88a2f09527618a6fc4b9be9
hash191a7e68ca0d15af4283844aa4916f8f73fe6be2
hash1c796a576e1f30ed0a672b30b0d2644aebe7f739
hash21f6eb9e582043af0be06dbdb2819e9642ca991a
hash2336179beb8a8d4c9a23771cc0ae31f2a146fbbd
hash2afde2c2a7773f68de691fe4f4e835fe530a3471
hash2ed9043c9eaf0cccb96711ca05a07add8a10ec88
hash3776c0df00a24f9152b6cb44c0fa05ef410f747b
hash37a9972e667dc479bbbd586803d809b56b00ffcf
hash5cb888c87b15ec998c638892ad382dc68efb7f94
hash65fec70eaca638cbd10a6774e4e67f2d55f63959
hash678045a8b05e4bf36c7bb0338612bcbfc2376dd8
hash763b0273c03053405806722df9fe3c9e270c8d55
hash784468f153fd9b1676504f51bce1bbd9237373f2
hash7dab6af4c90599ddba656bec8e258d08e9e8ffe6
hash9857742e8f10595111be8cf813f4b83c6e8d7bc5
hash9eb12480a9e3be552c88960d45beeacfb3b2444b
hasha2f95e24cb46a0a1edba7d1ff4f7fa2789ee2325
hashc52473f4e858e91dfd769a1774e5821750b8c8e2
hashda24feaa3f0fc9a326905afab295324944fb0f03
hashde263d9374d90fb7f51b19a036cb75a3d2072342
hashdf86e5d1a2d614c762704dc8842874fad27de978
hashe43daace2965439f2b1574b903d08af427f9307d
hashebcfc4f6c6e63b75dc407f5e76c9d96c69c3c1b6
hash0010c5caa8311201cd3b0e335a3936e7d1143362d98f4b5a57ef780dcdc1ca5a
hash074400e2f09312081c29e905a9d24f70cfc5f535cd1dcaaca31e33586c7b01bc
hash216cd0ccc129a612082bddf2502a58aef6b1c22ea07a18a58e4e8315d6ea3fbb
hash2261efb7516dd49edd3bface0c769a531c37ce0ca6832871768f622abb0f1f71
hash28fb1c360663b13a4f918b76a12bdc6f7532896eabf8200bddb63319c92bad26
hash3b2d397f308e00f6ef5ae4a368b6ec9a1b5791b883583d104949d80711f5789f
hash6266d87b93e8129b0b606971f0c9e00214abadbc758769bd9cf456c6e0ad8b6e
hash6ec18bf62078bb2661b2d0cadf0314ea44fc67da786c28456869b0102eea235c
hash7e8415e2744be160b7d7c600a401de41554c1357c2d2d35c85f8be8068cbc649
hash8046fe163a0ab581df7ea7c86788d7dca42f70fac95023dfb36d9281ad3463d9
hash8a18b8826daafc4a84d49299013c5cabe95dd9159ea5d5f1fb5872a6d70666e6
hash99af1fe7e00d4d82bc6ae4440ad3528202a8a6234038fcde15e78dfea79dac2a
hash9b0afe79696ccb263b8a00c75c021d115f152283714c0e4c5075aad4e52b94f9
hasha32fa6ba08db96ebd611f6ee06da44b419d569a6bac43ed00c68d6ca674004c3
hashbb21ec0bb2b94c5471ed7c768cc999808a42e985955384f6af360caa0c640d6c
hashc3f09771a248daede16382ec9484c6a626e2f289c095164eea97170f3e4a6769
hashcabd71a7a4df7fa6b5ffe0f22354953b5d278c5b2626af8bfba0ba726acc59ef
hashcb30d5b932a461601deaf2ef76476e216c7d2a99ea7c280cadbe6510b2997080
hashce1be9e4b2fd0f3958720f9bc2ae9d545bc0e27dcf1042b64a70f1fc62884610
hashe65b359519b912139ae7ab3ac77c667c5411d2264a1d75166ae2dfffefe2efaa
hashf49ba5d85a7be63599346097278c1af49ab6c1bea82e422462057c78641d54d4
hashf75c4d6c989c03c339ead7708227f22d30b9a5f4f433bbe29391a1003aa85d85
hashff84bb121533144fc87c314a9d50c16dd15bb7d8f036c777e0a6c1dc7395e000

Ip

ValueDescriptionCopy
ip154.90.58.164
ip196.251.86.145

Threat ID: 693014f4e1f6412a905955b2

Added to database: 12/3/2025, 10:46:12 AM

Last enriched: 12/3/2025, 11:00:40 AM

Last updated: 12/5/2025, 2:53:25 AM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats