{"id":215425,"date":"2025-12-04T17:41:13","date_gmt":"2025-12-04T17:41:13","guid":{"rendered":"https:\/\/www.europesays.com\/ie\/215425\/"},"modified":"2025-12-04T17:41:13","modified_gmt":"2025-12-04T17:41:13","slug":"silver-fox-uses-fake-microsoft-teams-installer-to-spread-valleyrat-malware-in-china","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ie\/215425\/","title":{"rendered":"Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China"},"content":{"rendered":"<p><a href=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/12\/msteams.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/12\/msteams.jpg\" alt=\"\" border=\"0\" data-original-height=\"470\" data-original-width=\"900\"\/><\/a><\/p>\n<p>The threat actor known as <strong>Silver Fox<\/strong> has been spotted orchestrating a false flag operation to mimic a Russian threat group in attacks targeting organizations in China.<\/p>\n<p>The search engine optimization (SEO) poisoning campaign leverages Microsoft Teams lures to trick unsuspecting users into downloading a malicious setup file that leads to the deployment of <a href=\"https:\/\/thehackernews.com\/2025\/10\/silver-fox-expands-winos-40-attacks-to.html\" rel=\"noopener nofollow\" target=\"_blank\">ValleyRAT<\/a> (Winos 4.0), a known malware associated with the Chinese cybercrime group. The activity has been underway since November 2025.<\/p>\n<p>&#8220;This campaign targets Chinese-speaking users, including those within Western organizations operating in China, using a modified &#8216;ValleyRAT&#8217; loader containing Cyrillic elements \u2013 likely an intentional move to mislead attribution,&#8221; ReliaQuest researcher Hayden Evans <a href=\"https:\/\/reliaquest.com\/blog\/threat-spotlight-silver-foxs-russian-ruse-fake-microsoft-teams-attack\" rel=\"noopener nofollow\" target=\"_blank\">said<\/a> in a report shared with The Hacker News.<\/p>\n<p>ValleyRAT, a variant of Gh0st RAT, allows threat actors to remotely control infected systems, exfiltrate sensitive data, execute arbitrary commands, and maintain long-term persistence within targeted networks. It&#8217;s worth noting that the use of Gh0st RAT is primarily attributed to Chinese hacking groups.<\/p>\n<p><a href=\"https:\/\/thehackernews.uk\/ransomware_dragon_d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/12\/ransomware_dragon_d.png\" width=\"729\" height=\"91\"\/><\/a><\/p>\n<p>The use of Teams for the SEO poisoning campaign marks a departure from prior efforts that have leveraged other popular programs like Google Chrome, Telegram, WPS Office, and DeepSeek to activate the infection chain.<\/p>\n<p>The SEO campaign is meant to redirect users to a bogus website that features an option to download the supposed Teams software. In reality, a ZIP file named &#8220;MST\u0447amsSetup.zip&#8221; is retrieved from an Alibaba Cloud URL. The archive utilizes Russian linguistic elements to confuse attribution efforts.<\/p>\n<p>Present within the file is &#8220;Setup.exe,&#8221; a trojanized version of Teams that&#8217;s engineered to scan running processes for binaries related to 360 Total Security (&#8220;360tray.exe&#8221;), configure Microsoft Defender Antivirus exclusions, and write the trojanized version of the Microsoft installer (&#8220;Verifier.exe&#8221;) to the &#8220;AppData\\Local\\&#8221; path and execute it.<\/p>\n<p>The malware proceeds to write additional files, including &#8220;AppData\\Local\\Profiler.json,&#8221; &#8220;AppData\\Roaming\\Embarcadero\\GPUCache2.xml,&#8221; &#8220;AppData\\Roaming\\Embarcadero\\GPUCache.xml,&#8221; and &#8220;AppData\\Roaming\\Embarcadero\\AutoRecoverDat.dll.&#8221;<\/p>\n<p>In the next step, it loads data from &#8220;Profiler.json&#8221; and &#8220;GPUcache.xml,&#8221; and launches the malicious DLL into the memory of &#8220;rundll32.exe,&#8221; a legitimate Windows process, so as to fly under the radar. The attack moves to the final stage with the malware establishing a connection to an external server to fetch the final payload to facilitate remote control.<\/p>\n<p>&#8220;Silver Fox&#8217;s objectives include financial gain through theft, scams, and fraud, alongside the collection of sensitive intelligence for geopolitical advantage,&#8221; ReliaQuest said. &#8220;Targets face immediate risks such as data breaches, financial losses, and compromised systems, while Silver Fox maintains plausible deniability, allowing it to operate discreetly without direct government funding.&#8221;<\/p>\n<p>The disclosure comes as Nextron Systems highlighted another ValleyRAT attack chain that uses a trojanized Telegram installer as the starting point to kick off a multi-stage process that ultimately delivers the trojan. This attack is also notable for leveraging the Bring Your Own Vulnerable Driver (<a href=\"https:\/\/thehackernews.com\/2025\/09\/silver-fox-exploits-microsoft-signed.html\" rel=\"noopener nofollow\" target=\"_blank\">BYOVD<\/a>) technique to load &#8220;NSecKrnl64.sys&#8221; and terminate security solution processes.<\/p>\n<p><a href=\"https:\/\/thehackernews.uk\/ai-security-insights-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/12\/zz-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/p>\n<p>&#8220;This installer sets a dangerous Microsoft Defender exclusion, stages a password-protected archive together with a renamed 7-Zip binary, and then extracts a second-stage executable,&#8221; security researcher Maurice Fielenbach <a href=\"https:\/\/www.nextron-systems.com\/2025\/11\/28\/thor-vs-silver-fox-uncovering-and-defeating-a-sophisticated-valleyrat-campaign\/\" rel=\"noopener nofollow\" target=\"_blank\">said<\/a>.<\/p>\n<p>&#8220;That second-stage orchestrator, men.exe, deploys additional components into a folder under the public user profile, manipulates file permissions to resist cleanup, and sets up persistence through a scheduled task that runs an encoded VBE script. This script in turn launches a vulnerable driver loader and a signed binary that sideloads the ValleyRAT DLL.&#8221;<\/p>\n<p><a href=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/12\/victim.png\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ie\/wp-content\/uploads\/2025\/12\/victim.png\" alt=\"\" border=\"0\" data-original-height=\"1060\" data-original-width=\"1200\"\/><\/a><\/p>\n<p>Men.exe is also responsible for enumerating running processes to identify endpoint security-related processes, as well as loading the vulnerable &#8220;NSecKrnl64.sys&#8221; driver using &#8220;NVIDIA.exe&#8221; and executing ValleyRAT. Furthermore, one of the key components dropped by the orchestrator binary is &#8220;bypass.exe,&#8221; which enables privilege escalation by means of a User Account Control (<a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/security\/application-security\/application-control\/user-account-control\/\" rel=\"noopener nofollow\" target=\"_blank\">UAC<\/a>) bypass.<\/p>\n<p>&#8220;On the surface, victims see a normal installer,&#8221; Fielenbach said. &#8220;In the background, the malware stages files, deploys drivers, tampers with defenses, and finally launches a ValleyRat beacon that keeps long-term access to the system.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"The threat actor known as Silver Fox has been spotted orchestrating a false flag operation to mimic a&hellip;\n","protected":false},"author":2,"featured_media":215426,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[74],"tags":[21715,21710,21703,21702,21704,21705,21706,3600,18,21707,21708,21712,19,21713,17,11951,21711,21709,82,21714],"class_list":{"0":"post-215425","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-computer-security","9":"tag-cyber-attacks","10":"tag-cyber-news","11":"tag-cyber-security-news","12":"tag-cyber-security-news-today","13":"tag-cyber-security-updates","14":"tag-cyber-updates","15":"tag-data-breach","16":"tag-eire","17":"tag-hacker-news","18":"tag-hacking-news","19":"tag-how-to-hack","20":"tag-ie","21":"tag-information-security","22":"tag-ireland","23":"tag-network-security","24":"tag-ransomware-malware","25":"tag-software-vulnerability","26":"tag-technology","27":"tag-the-hacker-news"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@ie\/115662533613411581","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/215425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/comments?post=215425"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/posts\/215425\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media\/215426"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/media?parent=215425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/categories?post=215425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ie\/wp-json\/wp\/v2\/tags?post=215425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}