A new malware distribution campaign is leveraging social engineering to target job seekers with the ValleyRAT remote access trojan. As reported by Trend Micro, attackers are using email lures with executables disguised as compensation or benefits documents. The core of the attack is a DLL side-loading technique that abuses a legitimate, signed executable from the Foxit PDF Reader. This method allows the malware to execute under the guise of a trusted process, evading basic security detections. The campaign highlights the continued effectiveness of combining social engineering with technical evasion tactics like DLL side-loading.
The attack targets individuals who are likely to be opening documents from unknown sources, such as job applicants or HR professionals. The attack chain is multi-staged and designed for stealth:
Compensation_Benefits_Commission.exe.FoxitPDFReader.exe.msvcr100.dll) that has been placed in the same directory. This is a classic example of T1574.002 - DLL Side-Loading.The campaign's success hinges on the abuse of a trusted, signed executable. By using the legitimate FoxitPDFReader.exe, the attackers bypass security measures that might block unsigned or unknown executables. The DLL side-loading technique allows the malicious code to be loaded into the memory space of the trusted Foxit process, making it harder for EDR and antivirus solutions to detect.
The use of a multi-stage loading process (EXE -> DLL -> BAT -> Python -> Shellcode) is a deliberate obfuscation technique designed to break the analysis chain of automated security tools. The final payload, ValleyRAT, is a potent remote access trojan that gives the attacker capabilities such as:
| Type | Value | Description |
|---|---|---|
| IP Address v4 | 196.251.86.145 |
Command-and-control (C2) server used to download the final payload. |
| File Name | Compensation_Benefits_Commission.exe |
Example name of the malicious loader executable. |
| File Name | msvcr100.dll |
Name of the malicious DLL used for the side-loading attack. |
A successful infection results in the complete compromise of the victim's computer. For an individual job seeker, this can lead to the theft of personal data, banking credentials, and other sensitive information. If an HR professional is compromised, the attacker could gain a foothold into a corporate network, potentially leading to a much larger breach. The attacker could use this access to steal employee data, deploy ransomware, or conduct espionage.
FoxitPDFReader.exe loading DLLs from unusual paths (e.g., a user's Downloads folder instead of C:\Program Files\...). EDR solutions should be configured to alert on this behavior. This is an application of D3FEND's D3-PA: Process Analysis.FoxitPDFReader.exe spawning child processes like cmd.exe or python.exe, which is highly anomalous.196.251.86.145) at the network perimeter.Downloads or AppData.Using application control or ASR rules to prevent executables from running from user-writable locations like the Downloads folder can block this attack chain.
Mapped D3FEND Techniques:
Training users to recognize social engineering lures, such as executables disguised as documents, is a crucial preventative measure.
Configuring systems to load DLLs only from trusted, system-defined paths can mitigate many forms of DLL side-loading.
Mapped D3FEND Techniques:
To detect the ValleyRAT campaign's core technique, security teams must configure their EDR or SIEM to monitor for process relationship anomalies. Specifically, create a high-severity alert for when a legitimate, signed executable like FoxitPDFReader.exe loads a DLL from a non-standard, user-writable directory (e.g., C:\Users\<user>\Downloads\, C:\Temp\) instead of its program directory. Furthermore, another critical detection is to alert when FoxitPDFReader.exe (or any similar document reader) spawns a child process that is a command-line interpreter (cmd.exe, powershell.exe) or scripting engine (python.exe). This behavior is fundamentally anomalous for a document viewer and is a strong indicator of a successful DLL side-loading compromise.
A highly effective preventative control is to use an application allowlisting solution like Windows Defender Application Control (WDAC) or AppLocker. Configure a policy that prevents any executable file from running from user-profile directories, including Downloads, AppData, and the Desktop. This simple but powerful rule would block the initial Compensation_Benefits_Commission.exe from ever launching, breaking the attack chain at the very first step. While this requires careful implementation to avoid disrupting legitimate workflows, it provides robust protection against a wide range of malware delivered via phishing.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats