Malware & RansomwareHIGH

Silver Fox Campaign - ValleyRAT Hidden in Telegram Installer

Featured image for Silver Fox Campaign - ValleyRAT Hidden in Telegram Installer
#ValleyRAT#Silver Fox#APT group#malware campaign#remote access trojan

Original Reporting

CSCyber Security News·Tushar Subhra Dutta

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🦠
🦠 MALWARE PROFILE
Malware NameValleyRAT
Malware TypeRemote Access Trojan
Threat ActorSilver Fox APT Group
Target PlatformWindows
Delivery MethodFake Installer
Persistence MechanismScheduled Task
C2 Infrastructure118.107.43.65
CapabilitiesRemote Access, Screenshot Capture, Kernel Rootkit
IOCs AvailableGjdLUhqZIJJB.exe, SingMusice.exe, DesignAccent.exe
Detection RateLow
MITRE ATT&CKT1071.001 (Application Layer Protocol: Web Protocols)
🎯

Basically, a new malware trick hides in a fake Telegram installer to steal information from users.

Quick Summary

A new malware campaign by the Silver Fox APT group is delivering ValleyRAT through a fake Telegram installer. This poses serious risks to users who may unknowingly install it. Stay vigilant and only download software from trusted sources.

How It Works

The Silver Fox APT group has launched a new malware campaign that cleverly disguises a powerful remote access trojan (RAT) known as ValleyRAT. It uses a fake Telegram Chinese language pack installer, which appears harmless to users. When executed, this malicious MSI file initiates a complex six-stage infection chain designed to evade detection by popular antivirus software.

Who's Being Targeted

This campaign primarily targets Chinese-speaking users who might download what they believe to be a legitimate language pack for Telegram. The attackers exploit the trust users have in widely used applications to deliver their malware.

Signs of Infection

Once the MSI installer is run, it triggers a custom VBScript that executes with full SYSTEM privileges. This script deploys a legitimate archival tool, which is then used to extract the malware payload. Users should be cautious of any unexpected behavior following the installation of language packs or configuration files from unofficial sources.

How to Protect Yourself

To safeguard against this threat, security teams should:

  • Block the command-and-control server 118.107.43.65 at the network perimeter.
  • Monitor for suspicious MSI installations that execute VBScript custom actions.
  • Flag any execution of zpaqfranz outside of developer environments as a high-priority event.
  • Educate users about the risks of downloading software from unofficial channels.

Conclusion

The Silver Fox campaign highlights the evolving tactics of cybercriminals. By disguising malware as legitimate software, they exploit user trust to gain access to sensitive systems. Awareness and proactive security measures are essential to mitigate the risks posed by such sophisticated attacks.

🔍 How to Check If You're Affected

  1. 1.Check for unexpected installations of MSI files from untrusted sources.
  2. 2.Monitor for execution of zpaqfranz outside of developer environments.
  3. 3.Alert on VBScript custom actions that trigger PowerShell executions.
  4. 4.Block network traffic to known command-and-control servers.

🏢 Impacted Sectors

TechnologyAll Sectors

Pro Insight

🔒 Pro insight: The six-stage infection chain demonstrates advanced evasion techniques, indicating a significant threat level from the Silver Fox group.

Sources

Original Report

CSCyber Security News· Tushar Subhra Dutta
Read Original

Related Pings

HIGHMalware & Ransomware

RoningLoader - New Malware Campaign Evades Detection Tactics

A new stealthy malware campaign named RoningLoader has emerged, targeting Chinese-speaking users. It cleverly disguises itself as trusted software to evade detection, posing serious risks to security tools. Organizations must remain vigilant against this sophisticated threat.

Cyber Security News·
HIGHMalware & Ransomware

Automated Magic Packet Generation - Enhancing Malware Analysis

A new tool automates the creation of packets that trigger BPF malware, drastically cutting analysis time. This impacts sectors like telecommunications and government. Swift action is needed to combat these stealthy threats.

Cloudflare Blog·
HIGHMalware & Ransomware

Dutch Healthcare Software Vendor - Ransomware Attack Disrupts Services

A ransomware attack has taken down Dutch healthcare vendor ChipSoft, disrupting services for hospitals nationwide. This incident highlights ongoing cyber threats in the healthcare sector, raising concerns about patient data security.

The Register Security·
HIGHMalware & Ransomware

Masjesu DDoS Botnet Targets IoT Devices with Evasive Tactics

The Masjesu botnet is now marketed as a DDoS-for-hire service, targeting IoT devices with evasive tactics. Learn how it operates and how to protect yourself.

SecurityWeek·
HIGHMalware & Ransomware

Lua-Based Malware LucidRook Targets Taiwanese NGOs

Cisco Talos has uncovered LucidRook, a new Lua-based malware targeting Taiwanese NGOs. This sophisticated malware uses spear-phishing tactics to infiltrate organizations. Vigilance is crucial as it employs advanced evasion techniques.

Cisco Talos Intelligence·
HIGHMalware & Ransomware

Malicious Chrome Extension - Injects Malware in Browsers

A new malicious Chrome extension, Amazing Refresh, is hijacking user clicks and monetizing traffic without consent. This poses risks to both users and website owners. Immediate action is needed to remove the extension and protect users.

Scott Helme·