360. That's How Valley RAT Modifies Registry to Store Plugins
Hello everyone!
Adversaries may use Windows registry to solve various tasks. Some are very common, while others are not. Let's look at one of them!
Today we'll look at Valley RAT. According to this report, it uses the following registry key to store downloaded plugins:
HKCU\Console\0\d33f351a4aeea5e608853d1a56661059
So, from threat hunting perspective, we can look for suspicious registry modification events related to HKCU\Console\:
event_type: "registryvaluesetwin"
AND
reg_key_path: "hkey_current_user\\console"
See you tomorrow!

Comments
Post a Comment