Blog | ThreatBook

Silver Fox: Not an Organization, But a Tool - Uncovering the Underground Ecosystem

Written by ThreatBook Research Team | 1 July 2023, 07:07 AM

Executive Summary

For months, the cybersecurity community tracked what appeared to be a sophisticated cybercrime organization dubbed "Silver Fox". This threat actor had been ravaging multiple industries including finance, energy, e-commerce, education, and healthcare across China.

However, recent analysis of captured source code by the ThreatBook Research and Response Team has revealed a startling truth: Silver Fox is not a single organization at all, but rather a malware-as-a-service (MaaS) toolkit being used by multiple independent cybercrime groups.

This discovery fundamentally changes how we must approach Silver Fox detection and prevention. A single organization has finite resources and reach, but a widely distributed tool has unlimited potential for spread. Through analysis of the WinOS source code and extensive infrastructure mapping, researchers have identified at least five distinct threat groups (designated Silver Fox A through E) operating independently using variants of the same core toolkit.

 

The Discovery: WinOS Source Code

The breakthrough came with the capture of Silver Fox's source code, marketed in underground forums as "WinOS version 4.0." This well-documented codebase revealed several critical insights:

Code Quality and Origins

The source code demonstrates professional development practices:

  • Clean, organized module structure typical of remote access trojans (RATs)
  • Comprehensive comments and function documentation
  • Evidence of skilled developers with strong coding discipline
  • Based on the open-source Gh0st RAT framework

Compilation Metadata Analysis

Analysis of Program Database (PDB) paths embedded in hundreds of Silver Fox samples revealed the malware ecosystem's structure:

Most Common Compiler Identities:

  1. "Asus" - Most prevalent version
  2. "brian" - Secondary distribution
  3. "谷堕" (GuDuo) - Original developer identifier
  4. "admin" - Generic builds
  5. "现金" (Cash) - Monetization-focused variant

The default C&C domain hardcoded in the source (iamasbcx.asuscomm.com) matched previously identified infrastructure, confirming the code's authenticity.

Underground Distribution

WinOS source code is actively traded in Chinese cybercrime forums, with versions ranging from 4.0 to 5.26. Forum discussions reveal:

  • Continuous development and feature updates
  • Active efforts to evade sandbox detection (including specific references to bypassing security vendor detection)
  • Pricing and distribution models suggesting widespread availability

 

The Five Silver Fox Groups: A Comparative Analysis

 

Silver Fox A: The Original (aka "GuDuo", "SPEED")

 

Threat Actor Profile

Attribute

Description

Platform

Windows-based

Attack Targets

All individuals, such as those in finance, education, and energy sectors

Attack Region

China

Objectives

Establish private procurement networks and sell high-value compromised hosts

Tactics

Impersonate legitimate websites and public services to deliver malicious payloads; employ a mix of white-hat and black-hat techniques

Tools & Techniques

Most operations utilize VMP for obfuscation

 

Active Since: July 2021

Attack Vectors:

  • SEM (Search Engine Marketing) poisoning via fake software downloads
  • Watering hole attacks using compromised or lookalike legitimate websites
  • Social engineering via gaming cheats and VPN software

Infrastructure Characteristics:

  • Phishing/Impersonation Sites
  • Public cloud services for malware hosting
  • Heavily packed executables
  • Specific domain patterns for payload delivery

Target Profile: Financial services, education, energy sector, and individual users

Notable Technique: Purchased search engine advertising to rank fake download sites for popular software

IOCs Analysis:

The associated C2 domains exhibit consistent patterns—DGA-like alphabetic strings with repeated letters, or multi-word tokens appended with numbers. In addition to the default iamasbcx.asuscomm.com, we also observed guduo.ga and guduo.xyz; the token guduo aligns with the pinyin of “谷堕” referenced in PDB strings within related binaries.

IOCs

Category

Examples

DGA (Letters + Repeated Letters)

kxyeeee.xyz
kkyiiii.pro
kkkyhhhh.pro
kkkyijii.com
kkkyuuuu.com
kkybbbb.online
kkydddd.com
kkkygggg.pro
kkkyffff.com
huzonskkkk.cn
huzonsjjjj.cn

Multiple Words + Numbers

qiangsheng888.top
jingshauchuanmei1.com
jingshauchuanmei2.com
jingshauchuanmei3.com
jingshauchuanmei4.com

Unusual Top-Level Domains

jamasbcx.asuscomm.com
youbi.co
yiyunchuanmei.com
quduo.ga
quduo.xyz

 

Our analysis indicates that the domains guduo.ga and guduo.xyz were first observed in 2020. Based on their characteristics, we assess with moderate confidence that they are testbed domains—likely artifacts used by the developer/packer maintainer for anti-detection (AV evasion) testing during builds.

 

Silver Fox B: The Manufacturer Hunter

 

Threat Actor Profile

Attribute

Description

Platform

Windows

Attack Targets

Public infrastructure and designated industries, such as the design sector

Attack Region

China

Objectives

Establish private procurement networks and distribute high-value compromised hosts

Tactics

Initial delivery via obfuscated script files; utilization of both legitimate and illicit techniques

Tools & Techniques

Download encrypted payloads and perform in-memory decryption and injection for execution

 

Active Since: April 2023

Attack Vectors:

  • Social engineering via instant messaging platforms (WeChat, QQ)
  • Script-based loaders (primary infection vector)

Infrastructure Characteristics:

  • Script files as initial droppers
  • Secondary payload download from controlled infrastructure

Target Profile: Design and manufacturing industries

Distinctive Feature: Heavy reliance on scripting languages for initial compromise, suggesting different technical capabilities than Silver Fox A

Malware Distribution: Primarily leverages phishing trojans masquerading as image files, design proposals, and similar document types.

These malicious attachments are distributed via instant messaging platforms. A schematic illustrating the relationship between select download-related IoCs and their corresponding sample filenames is shown below.

IOC (IP Address)

Filename(s)

164.155.255.55

28b66ffc375212d0489966e5508bd501b1d7acda6c0b51451618d6dcdfd4bee0.chm

47.104.226.150

phish.zip
-252871022_150(1).CHM
proposalA2023050101221.chm

47.97.203.112

proposal.zip
generated_file.CHM
image8.CHM
image2.CHM
image9.zip

118.31.114.222

image8.CHM
image2.CHM
image9.CHM
image9.zip
generated_file.CHM

47.104.242.248

image202305248.bat

103.97.129.131

-252871022_150(1).CHM
image.CHM
05150.com
image165.vbe
proposal.zip
image20230522.zip
image_homepage1.iso

183.90.187.30

top.CHM

 

These observed IoCs resolve to domains that exhibit distinct operation hallmarks, namely multiword-plus-numeric naming conventions and dynamically generated "ddo.jp" hostnames.

These domains are exclusively provisioned by the Silver Fox B campaign. All downstream payload modules are retrieved, decrypted in memory, and executed directly from this dedicated domain infrastructure.

Multi-word Numeric Subdomains

Dynamic Domain Names

haitang0001.com

haitang0002.com

benben0001.com

buyu0001.com

yifutong001.com

admin8.ddo.jp

juechen.ddo.jp

 

 

Silver Fox C: The Targeted Operator

 

Threat Actor Profile

Attribute

Description

Platform

Windows

Attack Targets

All sectors and individuals, including financial and securities firms, operators, state-owned and government entities, education, healthcare, manufacturing, and design industries

Attack Region

China

Objectives

Establish proprietary procurement networks and deploy high-value compromised hosts

Tactics

Unusual memory injection
Download and load core payloads for execution
Blend legitimate and illicit techniques

Tools & Techniques

Gh0st

 

Active Since: Late 2022

Attack Vectors:

  • Highly targeted social engineering
  • Memory injection techniques
  • Instant messaging platform distribution

Infrastructure Characteristics:

  • Same source code base as Silver Fox A
  • Completely different deployment methods
  • More sophisticated sample naming and lure documents

Target Profile:

  • Financial services and securities
  • Telecommunications operators
  • State-owned enterprises and government units
  • Education, healthcare, design, and manufacturing
  • Individual users

Distinctive Features:

  • Most diverse target set
  • Highly contextual and industry-specific lure documents
  • Advanced memory injection loaders
  • Evidence of significant social engineering research

Silver Fox C predominantly deploys phishing trojans themed around breaking news, mainstream software, and adult content via instant messaging platforms. The adversary has clearly invested considerable effort in constructing deceptive filenames to increase lure effectiveness.

IOCs Analysis:

Silver Fox C’s domain infrastructure displays highly distinctive naming conventions, typically employing multi-word domains or single words concatenated with repeated numerals. A subset of download-oriented domains is centered on Telegram, indicating that Silver Fox C has also executed Telegram-based phishing campaigns. As detailed in the table below:

IOC Categories

Letters + Repeated Digits

Multi-word + Repeated Digits

Telegram Impersonation–Related

hfs555.top

hfs666.top

hfs888.top

hfs999.top

 

xinkehu888.top

hainan66.top

asdmt888.top

heigou3344.xyz

henande555.top

haiwai2.xyz

liangjiang11.top

liangjiang22.top

liangjiang33.top

liangjiang44.top

liangjiang3344.top

telegramsu.top

telegramsi.site

telegramzh.cc

 

Silver Fox D: The Red Team Impersonator

 

Threat Actor Profile

Attribute

Description

Platform

Windows

Attack Targets

Sector-specific email attacks, including private enterprises, education, and manufacturing

Attack Region

China

Objectives

Establish proprietary procurement networks and deploy high-value compromised hosts

Tactics

Phishing emails
HFS-hosted malicious payload distribution
Combination of legitimate (“white-hat”) and illicit (“black-hat”) techniques

Tools & Techniques

Gh0st

 

Active Since: Mid-April 2023

Attack Vectors:

  • Spear-phishing emails with malicious attachments
  • Direct payload delivery (no secondary download)

Infrastructure Characteristics:

  • Domain Generation Algorithm (DGA) domains
  • Same source code compiler as Silver Fox A
  • Scattered and distributed infrastructure

Target Profile: Private enterprises, education sector, manufacturing

Distinctive Features:

  • Invoice and tax-themed lures
  • Aggressive phishing campaigns
  • Direct attachment delivery model

Notable: This group's proactive attack methodology and dispersed infrastructure further confirmed the hypothesis that Silver Fox was a shared toolkit rather than a unified organization

Silver Fox D targets the manufacturing and design sectors with phishing emails themed around “invoices,” “reports,” and “statements.” The filenames of the malicious attachments are listed in the table below.

Original Filename (Chinese)

Translated Filename

14号对账报表.exe

Statement_No.14.exe

下发通知更改以及费率调整.exe

Notification_Update_and_Rate_Adjustment.exe

【电子-发-票】.rar

e-Invoice.rar

客户资金充值异常解决方案.exe

Client_Funds_Recharge_Anomaly_Resolution.exe

对账报表.exe

Account_Statement.exe

税务自查系统.zip

Tax_Self-Audit_System.zip

5月工资清单核查

May_Payroll_List_Review.exe

 

The domain fdsxcba.xyz (resolving to 107.148.15.197) was linked in May 2023 to a newly identified file (SHA-256: 2ac504585c99a9be8b92a09e293e30dec239bdf2e2d36af780876cd110396b2d). The final payload for this sample was compiled using the “GuDuo” build environment (Silver Fox A).

 

IOCs Analysis:

Silver Fox D predominantly utilizes randomly generated domains for C2 communications. These domains exhibit low consistency, incorporating arbitrary combinations of letters, numbers, or words, as illustrated below.

ghsknxks.xyz

mrienban.top

afengiwe.xyz

afengsdjks.xyz

buihgsvds.xyz

cmakad3t.xyz

dfj325.xyz

dlzkwa.xyz

faxkwa.xyz

fdsxcba.xyz

fsgsd324.club

fsgsd324.xyz

godaaddyy.xyz

ituint.com

jiulaoshiss.xyz

kbsiejhgdf.xyz

kehu-active.com

kehu-lei.com

kehustudent.top

kkkong.xyz

kklleecmcmaa.xyz

yiqiaks.xyz

 

ThreatBook pivoting identified a subset of domains whose patterns partially resemble Silver Fox A. As shown below, these domains appear to use a default-generated three-character prefix at registration, but the remaining label is a dictionary word—not the repeated-letter pattern typically seen in Silver Fox A registrations.

Silver Fox D Letter/Digit Hybrids

Silver Fox D Random-Looking Domains

Silver Fox A Random-Looking Domains

ss111heise.xyz

ss222heise.xyz

ss333heise.xyz

ss444heise.xyz

shunfeng666.xyz

hetao101.info

 

xxerography.xyz

xxenidium.xyz

xxerantic.xyz

xxeranthemum.xyz

xxblloy.xyz

xxkcau.xyz

xxerocopy.xyz

xxenogeneic.xyz

xxenogenetic.xyz

kkyeeee.xyz

kkyiiii.pro

kkyhhhh.pro

kkyjjjj.com

kkygggg.pro

kkyffff.com

 

Silver Fox E: The Invoice Scammer (aka "游蛇" - Swimming Snake)

 

Threat Actor Profile

Attribute

Description

Platform

Windows

Attack Targets

Sector-focused email campaigns against industries such as media/film and technology.

Attack Region

China

Objectives

Expand a botnet and broker/sell access to high-value compromised hosts.

Tactics

Phishing emails and invoice-themed phishing sites (link-in-email); living-off-the-land tools combined with malicious tooling.

Tools & Techniques

Gh0st RAT

 

Active Since: September 2022

Attack Vectors:

  • Phishing emails with malicious links (not attachments)
  • Landing pages mimicking invoice/tax document repositories
  • White-list bypass techniques

Infrastructure Characteristics:

  • Short, randomly generated domains (.work and .sbs TLDs)
  • Separate infrastructure for phishing pages vs. payload delivery
  • Module download domains mimicking legitimate services (e.g., variations of "novadector", "microsoftmiddlename", "cloudservicesdevc")

Target Profile: Film/entertainment industry, technology companies

Distinctive Features:

  • Two-stage infrastructure (phishing landing page → payload download)
  • Domain regex patterns: [a-z]{4,6}.sbs/home.html and [a-z]{4,6}.work/home.html
  • Heavy use of cloud infrastructure (43.154.x.x ranges)

IOC Analysis:

Phishing Web Pages

Module Download Endpoints

43.154.80.187:80

43.155.69.56:80

43.154.136.10:80

43.154.149.131:80

43.154.134.102:80

43.154.61.105:80

43.154.192.213:80

luthj.sbs

pjuyt.sbs

Phishing Domain Naming Conventions:

[a-z]{4,6}.sbs/home.html

[a-z]{4,6}.work/home.html

nbs2012.novadector.xyz

hashcache.novadector.xyz

imgcache.novadector.xyz

cloudv.novadector.xyz

cloudcache.novadector.xyz

vbne.microsoftmiddlename.tk

department.microsoftmiddlename.tk

datacache.cloudservicesdevc.tk

imgcache.cloudservicesdevc.tk

updates.microsoftupdatesoftware.ga

xindajiema.info

The predominant URI pattern uses the path picturess; representative URLs are shown below and include numerous component-download links.

 

Summary:

 

Threat Group

Attack Vector

Target Sectors

Key Features

Silver Fox A

Watering-hole compromise; IM tool propagation

Finance, education, energy; individual users

Fake software sites or IM lures; public-service-hosted Gh0st; multi-TLD hosting; targeted payload downloads

Silver Fox B

Phishing trojan attachments via IM platforms

Design, manufacturing

Script-based loader; fixed download domains; encrypted payload retrieval

Silver Fox C

Social-engineered script trojans via IM platforms

Finance/securities, operators, SOEs & gov’t; education, healthcare, manufacturing & design; individuals

Trojan lures themed on finance/software/news; custom MSXML staging; DGA plus Telegram-style domains

Silver Fox D

Password-protected archive attachments in phishing emails

Private enterprises, education, manufacturing

Invoice/report-themed malicious archives; HFS-hosted payloads; DGA-based C2 domains

Silver Fox E

Phishing emails with embedded download links

Media, technology, corporate entities

Invoice/tax-themed links to DGA-based .work/.sbs sites; drive-by download chain

 

Technical Deep Dive: Attack Methodology

Multi-Stage Infection Chain

Regardless of the group, Silver Fox infections typically follow this pattern:

Initial Vector → Dropper/Loader → Payload Download → RAT Installation → C&C Communication

Stage 1: Initial Compromise

  • Phishing email attachment
  • Social engineering via instant messaging
  • Drive-by download from compromised/fake websites

Stage 2: Loader Execution

  • Script-based loaders (PowerShell, VBS, BAT)
  • Packed executable droppers
  • Memory injection techniques
  • DLL side-loading (white-list bypass)

Stage 3: Payload Retrieval

  • Download from attacker-controlled infrastructure
  • Multiple fallback domains
  • Encryption/encoding of traffic

Stage 4: Persistence & Execution

  • Registry modification
  • Scheduled tasks
  • Service installation
  • Startup folder placement

Stage 5: Command & Control

  • Gh0st RAT protocol variations
  • Multiple C&C domains with failover
  • Traffic mimicking legitimate applications

 

Social Engineering: The Force Multiplier

What makes Silver Fox particularly dangerous is the sophisticated social engineering employed by these groups. Unlike automated malware campaigns, Silver Fox operators frequently take manual control of compromised systems to:

  1. Build Trust Networks: After initial compromise, attackers control victims' WeChat/QQ accounts
  2. Expand Reach: Create group chats pulling in contacts and clients
  3. Impersonation: Remove original account owner and assume their identity
  4. Secondary Distribution: Leverage trusted relationships to spread malware further

Real-World Example: The "Kick and Replace" Technique

In documented attacks against securities industry personnel:

  1. Attacker gains control of victim's WeChat account
  2. Creates group chats with victim's contacts
  3. Removes victim from the group
  4. Renames attacker's account to match victim's details
  5. Distributes malware to group members who trust the "familiar" sender
  6. Malware often disguised as "Account Information", "Tax Materials", or other business documents

Monetization Strategies

Silver Fox operations follow a typical botnet monetization model:

  1. Mass Infection: Cast wide net using various distribution methods
  2. Host Profiling: Identify high-value compromised systems
  3. Targeted Exploitation:
    • Corporate espionage
    • Financial fraud
    • Credential theft
    • Information sale on underground markets
  4. Network Expansion: Use compromised accounts for further distribution

 

Why Silver Fox Spread So Rapidly

Several factors contributed to Silver Fox's prevalence:

1. Comprehensive Distribution Strategy

  • All major malware distribution vectors covered
  • SEM poisoning for passive victims
  • Phishing emails for targeted attacks
  • Social engineering for network propagation

2. Human-Operated Attacks

Unlike purely automated malware, Silver Fox campaigns often involve human operators who:

  • Adapt to target environments
  • Perform reconnaissance
  • Execute custom social engineering
  • Manually expand within compromised networks

3. Toolkit Availability

  • Source code trading in underground forums
  • Continuous updates and improvements
  • Low barrier to entry for new operators
  • Shared infrastructure knowledge

4. Evasion Capabilities

PDB path analysis revealed active development of:

  • Sandbox evasion techniques
  • Specific bypasses for major security vendors
  • Anti-analysis features
  • Polymorphic variations

 

Infrastructure Analysis

Domain Patterns by Group

Silver Fox A:

  • Random character generation with repeated letters
  • Examples: kkyeeee.xyz, kkyjjjj.com, kkygggg.pro
  • Pattern: kk[y][repeated-letter].{tld}

Silver Fox D:

  • Mixed patterns combining:
    • Pinyin double-letter prefixes: ss111heise.xyz, ss222heise.xyz
    • Dictionary words with xx prefix: xxerography.xyz, xxenidium.xyz
    • Delivery terms: shunfeng666.xyz, hetao101.info

Silver Fox E:

  • Short random strings: luthj.sbs, pjuyt.sbs
  • Legitimate service impersonation: nbs2012.novadector.xyz, updates.microsoftupdatesoftware.ga

IP Address Clustering

Heavy use of cloud infrastructure in specific ranges:

  • 43.154.x.x (Tencent Cloud)
  • 43.155.x.x (Tencent Cloud)
  • Distributed globally to avoid detection patterns

 

Detection and Prevention Strategies

Network-Level Indicators

  1. Domain Pattern Matching:

    • Monitor for domains matching Silver Fox group patterns
    • Track newly registered domains in common TLDs (.xyz, .pro, .work, .sbs)
    • Flag domains with repeated character patterns
  2. Traffic Analysis:

    • Gh0st RAT protocol signatures
    • Unusual outbound connections to cloud infrastructure
    • Download patterns matching multi-stage loader behavior

Endpoint Detection

  1. PDB Path Analysis:

    • Monitor for executables with suspicious PDB paths
    • Flag compilation metadata matching known Silver Fox patterns
  2. Behavioral Indicators:

    • Script execution from unexpected locations
    • DLL side-loading attempts
    • Unexpected process injection
    • Persistence mechanism installation
  3. File Characteristics:

    • Heavy packing/obfuscation
    • Fake software installers
    • Documents with embedded executables

Email Security

  1. Attachment Filtering:

    • Block executable attachments from external sources
    • Sandbox all attachments before delivery
    • Verify document authenticity for invoice/tax materials
  2. Link Analysis:

    • Check URLs against known Silver Fox infrastructure
    • Analyze landing pages for phishing indicators
    • Block access to malicious download sites

User Awareness

  1. Social Engineering Recognition:

    • Train users on Silver Fox's "kick and replace" technique
    • Verify unexpected file shares via out-of-band communication
    • Question urgent requests for downloading files
  2. Safe Download Practices:

    • Only download software from official sources
    • Verify file hashes before execution
    • Use sandbox/VM environments for testing unknown files

 

The Broader Implications

Malware-as-a-Service Evolution

Silver Fox represents a troubling trend in cybercrime:

  • Democratization of advanced malware capabilities
  • Lower barriers to entry for cybercriminals
  • Difficulty in traditional attribution and tracking
  • Multiple independent operators increasing overall threat volume

Defense Paradigm Shift Required

Traditional approaches assuming a single threat actor are insufficient:

  • Must track multiple distinct groups simultaneously
  • Infrastructure can't be cleanly attributed to one entity
  • Tactics, techniques, and procedures (TTPs) vary by operator
  • Takedown efforts against one group don't affect others

The Supply Chain Problem

Silver Fox demonstrates how malware ecosystems function like legitimate software:

  • Active development and versioning
  • Community-driven improvements
  • Distribution through underground markets
  • Customer support and documentation

 

Conclusion

The revelation that Silver Fox is a toolkit rather than an organization fundamentally changes our understanding of this threat. With at least five confirmed independent groups operating globally, and the source code available in underground markets, the Silver Fox ecosystem will likely continue to grow.

Security teams must adapt their detection and response strategies to account for:

  • Multiple independent operators with varying skill levels
  • Continuous toolkit evolution and improvement
  • Diverse targeting across all industries and geographies
  • Sophisticated social engineering as a force multiplier

The most concerning aspect is not any single group's capabilities, but the unlimited scalability of a widely distributed toolkit. As more actors gain access to Silver Fox, we can expect:

  • Increased attack volume and frequency
  • Wider geographic distribution
  • Novel attack variations as different operators experiment
  • Greater difficulty in comprehensive threat tracking

Organizations should prioritize:

  1. Multi-layered defense strategies
  2. User security awareness training
  3. Network segmentation to limit lateral movement
  4. Behavioral analysis rather than signature-based detection
  5. Incident response plans accounting for human-operated attacks

The Silver Fox case study demonstrates how modern cybercrime has evolved into a sophisticated ecosystem with specialized roles, shared tooling, and professional development practices. Only by understanding this ecosystem can we effectively defend against it.

 

Indicators of Compromise (IOCs)

Due to the extensive nature of Silver Fox infrastructure and the constant addition of new domains/IPs, organizations should:

  • Integrate threat intelligence feeds covering Silver Fox groups
  • Monitor for the domain and IP patterns described above
  • Implement behavior-based detection rather than relying solely on static IOCs
  • Correlate multiple weak signals rather than waiting for definitive matches

For specific IOCs including domains, IP addresses, file hashes, and network signatures, refer to threat intelligence platforms and security vendor advisories that maintain updated Silver Fox indicators.