Fake Huorong Download Site Used to Deploy ValleyRAT Backdoor in Targeted Malware Campaign

In Cybersecurity News - Original News Source is cybersecuritynews.com by Blog Writer

A group of attackers has built a fake version of the Huorong Security antivirus website to trick users into downloading ValleyRAT, a Remote Access Trojan (RAT) built on the Winos4.0 framework.

The campaign is linked to the Silver Fox APT group, a Chinese-speaking threat actor known for distributing trojanized versions of popular Chinese software.

Huorong Security, known in Chinese as 火绒, is a free antivirus product widely used across mainland China. The attackers registered huoronga[.]com — a near-perfect copy of the legitimate huorong.cn — with just one extra letter added at the end.

This typosquatting trick catches users who mistype the address or arrive via a phishing link. The page looks convincing enough that most visitors would suspect nothing.

Fake Huorong Security site (Source – Malwarebytes)

Malwarebytes analysts identified the full infection chain, noting that when a visitor clicks the download button, the request is silently routed through an intermediary domain before the payload is served from Cloudflare R2 storage.

The file, named BR火绒445[.]zip, uses Huorong’s Chinese name to keep the disguise intact up to the point of execution.

Another fake Huorong Security site (Source – Malwarebytes).

The attack does not rely on a zero-day exploit to work. It depends entirely on a convincing website, a realistic installer, and the assumption that many users simply click the first search result.

Since the lure is a security product, the deception is even more effective — targeting people actively trying to protect themselves.

Once ValleyRAT is installed, attackers can monitor victims, steal sensitive data, and remotely control the compromised system.

The malware captures keystrokes, reads browser cookie files, queries system information, and injects code into other processes for stealthy execution.

Its modular design allows additional capabilities to be downloaded on demand, making the full scope of an infection difficult to measure.

Persistence and Evasion Tactics

After gaining access, ValleyRAT instructs Windows Defender via PowerShell to ignore its persistence directory (AppDataRoamingtrvePath) and its main process (WavesSvc64.exe).

It then creates a scheduled task named “Batteries” at C:WindowsTasksBatteries.job, which re-runs the malware on every system boot and reconnects to its C2 server at 161.248.87[.]250 over TCP port 443.

To stay hidden, the malware deletes and rewrites its own core files to avoid signature detection. It also checks for debuggers and virtual machine environments before fully deploying.

Configuration data, including the encoded C2 domain yandibaiji0203[.]com, is stored in the registry under HKCUSOFTWAREIpDates_info.

Organizations should block outbound connections to 161.248.87[.]250, audit Defender exclusions for unauthorized changes, and search endpoints for the “Batteries” scheduled task and the %APPDATA%trvePath directory as signs of infection.

Indicators of Compromise (IOCs)

Type Indicator
Fake Domain huoronga[.]com
Fake Domain huorongcn[.]com
Fake Domain huorongh[.]com
Fake Domain huorongpc[.]com
Fake Domain huorongs[.]com
Redirect Domain hndqiuebgibuiwqdhr[.]cyou
Payload Host pub-b7ce0512b9744e2db68f993e355a03f9.r2[.]dev
C2 IP 161.248.87[.]250 (TCP 443)
Encoded C2 Domain yandibaiji0203[.]com
SHA-256 — NSIS Installer 72889737c11c36e3ecd77bf6023ec6f2e31aecbc441d0bdf312c5762d073b1f4
SHA-256 — WavesSvc64.exe db8cbf938da72be4d1a774836b2b5eb107c6b54defe0ae631ddc43de0bda8a7e
SHA-256 — DuiLib_u.dll d0ac4eb544bc848c6eed4ef4617b13f9ef259054fe9e35d9df02267d5a1c26b2
SHA-256 — WinosStager DLL #1 07aaaa2d3f2e52849906ec0073b61e451e0025ef2523dafbd6ae85ddfa587b4d
SHA-256 — WinosStager DLL #2 66e324ea04c4abbad6db4f638b07e2e560613e481ff588e0148e33e23a5052a9
SHA-256 — WinosStager DLL #3 47df12b0b01ddca9eb116127bf84f63eb31e80cec33e4e6042dff1447de8f45f
Scheduled Task C:WindowsTasksBatteries.job
Persistence Directory %APPDATA%trvePath
Registry Key HKCUSOFTWAREIpDates_info
Registry Key HKCUConsole451b464b7a6c2ced348c1866b59c362e
Log File C:ProgramDataDisplaySessionContainers.log

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.