ValleyRAT Malware Targets Job Seekers Using Foxit PDF Reader Disguise

ValleyRAT Campaign Abuses Foxit PDF Reader for DLL Side-Loading to Target Job Seekers

MEDIUM
December 3, 2025
5m read
MalwarePhishingThreat Actor

Related Entities

Organizations

Products & Tech

Other

ValleyRAT

Full Report

Executive Summary

A new malware distribution campaign is leveraging social engineering to target job seekers with the ValleyRAT remote access trojan. As reported by Trend Micro, attackers are using email lures with executables disguised as compensation or benefits documents. The core of the attack is a DLL side-loading technique that abuses a legitimate, signed executable from the Foxit PDF Reader. This method allows the malware to execute under the guise of a trusted process, evading basic security detections. The campaign highlights the continued effectiveness of combining social engineering with technical evasion tactics like DLL side-loading.


Threat Overview

The attack targets individuals who are likely to be opening documents from unknown sources, such as job applicants or HR professionals. The attack chain is multi-staged and designed for stealth:

  1. Social Engineering: The victim receives an email with a compressed file (e.g., a ZIP archive). Inside is an executable file named to look like a document, such as Compensation_Benefits_Commission.exe.
  2. Masquerading: The executable uses the Foxit PDF Reader's icon to trick the user into thinking it is a safe PDF file. The file itself is a renamed, legitimate FoxitPDFReader.exe.
  3. DLL Side-Loading: When the user runs the executable, the legitimate Foxit program is launched. However, because of the way Windows handles DLL loading, it first loads a malicious DLL (e.g., msvcr100.dll) that has been placed in the same directory. This is a classic example of T1574.002 - DLL Side-Loading.
  4. Payload Execution: The malicious DLL executes, launching a batch file which in turn runs a Python script. This script downloads the final ValleyRAT payload from a command-and-control (C2) server.
  5. Persistence: The malware establishes persistence by creating an autorun registry key.

Technical Analysis

The campaign's success hinges on the abuse of a trusted, signed executable. By using the legitimate FoxitPDFReader.exe, the attackers bypass security measures that might block unsigned or unknown executables. The DLL side-loading technique allows the malicious code to be loaded into the memory space of the trusted Foxit process, making it harder for EDR and antivirus solutions to detect.

The use of a multi-stage loading process (EXE -> DLL -> BAT -> Python -> Shellcode) is a deliberate obfuscation technique designed to break the analysis chain of automated security tools. The final payload, ValleyRAT, is a potent remote access trojan that gives the attacker capabilities such as:

  • Keystroke logging
  • Screen capture
  • File system access (upload/download)
  • Command execution
  • Credential theft from browsers and other applications

IOCs

Type Value Description
IP Address v4 196.251.86.145 Command-and-control (C2) server used to download the final payload.
File Name Compensation_Benefits_Commission.exe Example name of the malicious loader executable.
File Name msvcr100.dll Name of the malicious DLL used for the side-loading attack.

Impact Assessment

A successful infection results in the complete compromise of the victim's computer. For an individual job seeker, this can lead to the theft of personal data, banking credentials, and other sensitive information. If an HR professional is compromised, the attacker could gain a foothold into a corporate network, potentially leading to a much larger breach. The attacker could use this access to steal employee data, deploy ransomware, or conduct espionage.

Detection & Response

  • Process Anomaly Detection: Monitor for legitimate applications like FoxitPDFReader.exe loading DLLs from unusual paths (e.g., a user's Downloads folder instead of C:\Program Files\...). EDR solutions should be configured to alert on this behavior. This is an application of D3FEND's D3-PA: Process Analysis.
  • Command Line Logging: Enable and monitor command line logging (Windows Event ID 4688). Look for FoxitPDFReader.exe spawning child processes like cmd.exe or python.exe, which is highly anomalous.
  • Network IOCs: Block the known C2 IP address (196.251.86.145) at the network perimeter.

Mitigation

  1. User Training: Educate users, especially job seekers and HR staff, to be extremely cautious of executable files disguised as documents. Teach them to check file extensions and be wary of files arriving in ZIP archives.
  2. Attack Surface Reduction (ASR) Rules: Implement Microsoft Defender ASR rules, such as "Block executable files from running unless they meet a prevalence, age, or trusted list criterion," to prevent novel malicious executables from running.
  3. Application Control: Where possible, use application control solutions like AppLocker to prevent applications from running from user-writable directories like Downloads or AppData.
  4. Email Security: Use an email gateway that can scan inside archives and identify suspicious executables, even if they are renamed or use legitimate icons.

Timeline of Events

1
December 3, 2025
This article was published

MITRE ATT&CK Mitigations

Using application control or ASR rules to prevent executables from running from user-writable locations like the Downloads folder can block this attack chain.

Mapped D3FEND Techniques:

Training users to recognize social engineering lures, such as executables disguised as documents, is a crucial preventative measure.

Configuring systems to load DLLs only from trusted, system-defined paths can mitigate many forms of DLL side-loading.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To detect the ValleyRAT campaign's core technique, security teams must configure their EDR or SIEM to monitor for process relationship anomalies. Specifically, create a high-severity alert for when a legitimate, signed executable like FoxitPDFReader.exe loads a DLL from a non-standard, user-writable directory (e.g., C:\Users\<user>\Downloads\, C:\Temp\) instead of its program directory. Furthermore, another critical detection is to alert when FoxitPDFReader.exe (or any similar document reader) spawns a child process that is a command-line interpreter (cmd.exe, powershell.exe) or scripting engine (python.exe). This behavior is fundamentally anomalous for a document viewer and is a strong indicator of a successful DLL side-loading compromise.

A highly effective preventative control is to use an application allowlisting solution like Windows Defender Application Control (WDAC) or AppLocker. Configure a policy that prevents any executable file from running from user-profile directories, including Downloads, AppData, and the Desktop. This simple but powerful rule would block the initial Compensation_Benefits_Commission.exe from ever launching, breaking the attack chain at the very first step. While this requires careful implementation to avoid disrupting legitimate workflows, it provides robust protection against a wide range of malware delivered via phishing.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ValleyRATMalwarePhishingDLL Side-loadingSocial EngineeringJob SeekersTrend Micro

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading