360. That's How Valley RAT Modifies Registry to Store Plugins

Hello everyone!

Adversaries may use Windows registry to solve various tasks. Some are very common, while others are not. Let's look at one of them!

Today we'll look at Valley RAT. According to this report, it uses the following registry key to store downloaded plugins:

HKCU\Console\0\d33f351a4aeea5e608853d1a56661059

So, from threat hunting perspective, we can look for suspicious registry modification events related to HKCU\Console\:

event_type: "registryvaluesetwin"

AND

reg_key_path: "hkey_current_user\\console"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge