For months, the cybersecurity community tracked what appeared to be a sophisticated cybercrime organization dubbed "Silver Fox". This threat actor had been ravaging multiple industries including finance, energy, e-commerce, education, and healthcare across China.
However, recent analysis of captured source code by the ThreatBook Research and Response Team has revealed a startling truth: Silver Fox is not a single organization at all, but rather a malware-as-a-service (MaaS) toolkit being used by multiple independent cybercrime groups.
This discovery fundamentally changes how we must approach Silver Fox detection and prevention. A single organization has finite resources and reach, but a widely distributed tool has unlimited potential for spread. Through analysis of the WinOS source code and extensive infrastructure mapping, researchers have identified at least five distinct threat groups (designated Silver Fox A through E) operating independently using variants of the same core toolkit.
The breakthrough came with the capture of Silver Fox's source code, marketed in underground forums as "WinOS version 4.0." This well-documented codebase revealed several critical insights:
The source code demonstrates professional development practices:
Analysis of Program Database (PDB) paths embedded in hundreds of Silver Fox samples revealed the malware ecosystem's structure:
Most Common Compiler Identities:
The default C&C domain hardcoded in the source (iamasbcx.asuscomm.com) matched previously identified infrastructure, confirming the code's authenticity.
WinOS source code is actively traded in Chinese cybercrime forums, with versions ranging from 4.0 to 5.26. Forum discussions reveal:
|
Threat Actor Profile |
|
|
Attribute |
Description |
|
Platform |
Windows-based |
|
Attack Targets |
All individuals, such as those in finance, education, and energy sectors |
|
Attack Region |
China |
|
Objectives |
Establish private procurement networks and sell high-value compromised hosts |
|
Tactics |
Impersonate legitimate websites and public services to deliver malicious payloads; employ a mix of white-hat and black-hat techniques |
|
Tools & Techniques |
Most operations utilize VMP for obfuscation |
Active Since: July 2021
Attack Vectors:
Infrastructure Characteristics:
Target Profile: Financial services, education, energy sector, and individual users
Notable Technique: Purchased search engine advertising to rank fake download sites for popular software
IOCs Analysis:
The associated C2 domains exhibit consistent patterns—DGA-like alphabetic strings with repeated letters, or multi-word tokens appended with numbers. In addition to the default iamasbcx.asuscomm.com, we also observed guduo.ga and guduo.xyz; the token “guduo” aligns with the pinyin of “谷堕” referenced in PDB strings within related binaries.
|
IOCs |
|
|
Category |
Examples |
|
DGA (Letters + Repeated Letters) |
kxyeeee.xyz |
|
Multiple Words + Numbers |
qiangsheng888.top |
|
Unusual Top-Level Domains |
jamasbcx.asuscomm.com |
Our analysis indicates that the domains guduo.ga and guduo.xyz were first observed in 2020. Based on their characteristics, we assess with moderate confidence that they are testbed domains—likely artifacts used by the developer/packer maintainer for anti-detection (AV evasion) testing during builds.
|
Threat Actor Profile |
|
|
Attribute |
Description |
|
Platform |
Windows |
|
Attack Targets |
Public infrastructure and designated industries, such as the design sector |
|
Attack Region |
China |
|
Objectives |
Establish private procurement networks and distribute high-value compromised hosts |
|
Tactics |
Initial delivery via obfuscated script files; utilization of both legitimate and illicit techniques |
|
Tools & Techniques |
Download encrypted payloads and perform in-memory decryption and injection for execution |
Active Since: April 2023
Attack Vectors:
Infrastructure Characteristics:
Target Profile: Design and manufacturing industries
Distinctive Feature: Heavy reliance on scripting languages for initial compromise, suggesting different technical capabilities than Silver Fox A
Malware Distribution: Primarily leverages phishing trojans masquerading as image files, design proposals, and similar document types.
These malicious attachments are distributed via instant messaging platforms. A schematic illustrating the relationship between select download-related IoCs and their corresponding sample filenames is shown below.
|
IOC (IP Address) |
Filename(s) |
|
164.155.255.55 |
28b66ffc375212d0489966e5508bd501b1d7acda6c0b51451618d6dcdfd4bee0.chm |
|
47.104.226.150 |
phish.zip |
|
47.97.203.112 |
proposal.zip |
|
118.31.114.222 |
image8.CHM |
|
47.104.242.248 |
image202305248.bat |
|
103.97.129.131 |
-252871022_150(1).CHM |
|
183.90.187.30 |
top.CHM |
These observed IoCs resolve to domains that exhibit distinct operation hallmarks, namely multiword-plus-numeric naming conventions and dynamically generated "ddo.jp" hostnames.
These domains are exclusively provisioned by the Silver Fox B campaign. All downstream payload modules are retrieved, decrypted in memory, and executed directly from this dedicated domain infrastructure.
|
Multi-word Numeric Subdomains |
Dynamic Domain Names |
|
haitang0001.com haitang0002.com benben0001.com buyu0001.com yifutong001.com |
admin8.ddo.jp juechen.ddo.jp
|
|
Threat Actor Profile |
|
|
Attribute |
Description |
|
Platform |
Windows |
|
Attack Targets |
All sectors and individuals, including financial and securities firms, operators, state-owned and government entities, education, healthcare, manufacturing, and design industries |
|
Attack Region |
China |
|
Objectives |
Establish proprietary procurement networks and deploy high-value compromised hosts |
|
Tactics |
Unusual memory injection |
|
Tools & Techniques |
Gh0st |
Active Since: Late 2022
Attack Vectors:
Infrastructure Characteristics:
Target Profile:
Distinctive Features:
Silver Fox C predominantly deploys phishing trojans themed around breaking news, mainstream software, and adult content via instant messaging platforms. The adversary has clearly invested considerable effort in constructing deceptive filenames to increase lure effectiveness.
IOCs Analysis:
Silver Fox C’s domain infrastructure displays highly distinctive naming conventions, typically employing multi-word domains or single words concatenated with repeated numerals. A subset of download-oriented domains is centered on Telegram, indicating that Silver Fox C has also executed Telegram-based phishing campaigns. As detailed in the table below:
|
IOC Categories |
||
|
Letters + Repeated Digits |
Multi-word + Repeated Digits |
Telegram Impersonation–Related |
|
hfs555.top hfs666.top hfs888.top hfs999.top
|
xinkehu888.top hainan66.top asdmt888.top heigou3344.xyz henande555.top haiwai2.xyz liangjiang11.top liangjiang22.top liangjiang33.top liangjiang44.top liangjiang3344.top |
telegramsu.top telegramsi.site telegramzh.cc |
|
Threat Actor Profile |
|
|
Attribute |
Description |
|
Platform |
Windows |
|
Attack Targets |
Sector-specific email attacks, including private enterprises, education, and manufacturing |
|
Attack Region |
China |
|
Objectives |
Establish proprietary procurement networks and deploy high-value compromised hosts |
|
Tactics |
Phishing emails |
|
Tools & Techniques |
Gh0st |
Active Since: Mid-April 2023
Attack Vectors:
Infrastructure Characteristics:
Target Profile: Private enterprises, education sector, manufacturing
Distinctive Features:
Notable: This group's proactive attack methodology and dispersed infrastructure further confirmed the hypothesis that Silver Fox was a shared toolkit rather than a unified organization
Silver Fox D targets the manufacturing and design sectors with phishing emails themed around “invoices,” “reports,” and “statements.” The filenames of the malicious attachments are listed in the table below.
|
Original Filename (Chinese) |
Translated Filename |
|
14号对账报表.exe |
Statement_No.14.exe |
|
下发通知更改以及费率调整.exe |
Notification_Update_and_Rate_Adjustment.exe |
|
【电子-发-票】.rar |
e-Invoice.rar |
|
客户资金充值异常解决方案.exe |
Client_Funds_Recharge_Anomaly_Resolution.exe |
|
对账报表.exe |
Account_Statement.exe |
|
税务自查系统.zip |
Tax_Self-Audit_System.zip |
|
5月工资清单核查 |
May_Payroll_List_Review.exe |
The domain fdsxcba.xyz (resolving to 107.148.15.197) was linked in May 2023 to a newly identified file (SHA-256: 2ac504585c99a9be8b92a09e293e30dec239bdf2e2d36af780876cd110396b2d). The final payload for this sample was compiled using the “GuDuo” build environment (Silver Fox A).
IOCs Analysis:
Silver Fox D predominantly utilizes randomly generated domains for C2 communications. These domains exhibit low consistency, incorporating arbitrary combinations of letters, numbers, or words, as illustrated below.
|
ghsknxks.xyz mrienban.top afengiwe.xyz afengsdjks.xyz buihgsvds.xyz cmakad3t.xyz dfj325.xyz dlzkwa.xyz faxkwa.xyz fdsxcba.xyz fsgsd324.club fsgsd324.xyz godaaddyy.xyz ituint.com jiulaoshiss.xyz kbsiejhgdf.xyz kehu-active.com kehu-lei.com kehustudent.top kkkong.xyz kklleecmcmaa.xyz yiqiaks.xyz |
ThreatBook pivoting identified a subset of domains whose patterns partially resemble Silver Fox A. As shown below, these domains appear to use a default-generated three-character prefix at registration, but the remaining label is a dictionary word—not the repeated-letter pattern typically seen in Silver Fox A registrations.
|
Silver Fox D — Letter/Digit Hybrids |
Silver Fox D — Random-Looking Domains |
Silver Fox A — Random-Looking Domains |
|
ss111heise.xyz ss222heise.xyz ss333heise.xyz ss444heise.xyz shunfeng666.xyz hetao101.info
|
xxerography.xyz xxenidium.xyz xxerantic.xyz xxeranthemum.xyz xxblloy.xyz xxkcau.xyz xxerocopy.xyz xxenogeneic.xyz xxenogenetic.xyz |
kkyeeee.xyz kkyiiii.pro kkyhhhh.pro kkyjjjj.com kkygggg.pro kkyffff.com |
|
Threat Actor Profile |
|
|
Attribute |
Description |
|
Platform |
Windows |
|
Attack Targets |
Sector-focused email campaigns against industries such as media/film and technology. |
|
Attack Region |
China |
|
Objectives |
Expand a botnet and broker/sell access to high-value compromised hosts. |
|
Tactics |
Phishing emails and invoice-themed phishing sites (link-in-email); living-off-the-land tools combined with malicious tooling. |
|
Tools & Techniques |
Gh0st RAT |
Active Since: September 2022
Attack Vectors:
Infrastructure Characteristics:
Target Profile: Film/entertainment industry, technology companies
Distinctive Features:
[a-z]{4,6}.sbs/home.html and [a-z]{4,6}.work/home.htmlIOC Analysis:
|
Phishing Web Pages |
Module Download Endpoints |
|
43.154.80.187:80 43.155.69.56:80 43.154.136.10:80 43.154.149.131:80 43.154.134.102:80 43.154.61.105:80 43.154.192.213:80 luthj.sbs pjuyt.sbs Phishing Domain Naming Conventions: [a-z]{4,6}.sbs/home.html [a-z]{4,6}.work/home.html |
nbs2012.novadector.xyz hashcache.novadector.xyz imgcache.novadector.xyz cloudv.novadector.xyz cloudcache.novadector.xyz vbne.microsoftmiddlename.tk department.microsoftmiddlename.tk datacache.cloudservicesdevc.tk imgcache.cloudservicesdevc.tk updates.microsoftupdatesoftware.ga xindajiema.info |
The predominant URI pattern uses the path picturess; representative URLs are shown below and include numerous component-download links.
|
Threat Group |
Attack Vector |
Target Sectors |
Key Features |
|
Silver Fox A |
Watering-hole compromise; IM tool propagation |
Finance, education, energy; individual users |
Fake software sites or IM lures; public-service-hosted Gh0st; multi-TLD hosting; targeted payload downloads |
|
Silver Fox B |
Phishing trojan attachments via IM platforms |
Design, manufacturing |
Script-based loader; fixed download domains; encrypted payload retrieval |
|
Silver Fox C |
Social-engineered script trojans via IM platforms |
Finance/securities, operators, SOEs & gov’t; education, healthcare, manufacturing & design; individuals |
Trojan lures themed on finance/software/news; custom MSXML staging; DGA plus Telegram-style domains |
|
Silver Fox D |
Password-protected archive attachments in phishing emails |
Private enterprises, education, manufacturing |
Invoice/report-themed malicious archives; HFS-hosted payloads; DGA-based C2 domains |
|
Silver Fox E |
Phishing emails with embedded download links |
Media, technology, corporate entities |
Invoice/tax-themed links to DGA-based .work/.sbs sites; drive-by download chain |
Regardless of the group, Silver Fox infections typically follow this pattern:
Initial Vector → Dropper/Loader → Payload Download → RAT Installation → C&C Communication
Stage 1: Initial Compromise
Stage 2: Loader Execution
Stage 3: Payload Retrieval
Stage 4: Persistence & Execution
Stage 5: Command & Control
What makes Silver Fox particularly dangerous is the sophisticated social engineering employed by these groups. Unlike automated malware campaigns, Silver Fox operators frequently take manual control of compromised systems to:
Real-World Example: The "Kick and Replace" Technique
In documented attacks against securities industry personnel:
Silver Fox operations follow a typical botnet monetization model:
Several factors contributed to Silver Fox's prevalence:
Unlike purely automated malware, Silver Fox campaigns often involve human operators who:
PDB path analysis revealed active development of:
Silver Fox A:
kkyeeee.xyz, kkyjjjj.com, kkygggg.prokk[y][repeated-letter].{tld}Silver Fox D:
ss111heise.xyz, ss222heise.xyzxxerography.xyz, xxenidium.xyzshunfeng666.xyz, hetao101.infoSilver Fox E:
luthj.sbs, pjuyt.sbsnbs2012.novadector.xyz, updates.microsoftupdatesoftware.gaHeavy use of cloud infrastructure in specific ranges:
Domain Pattern Matching:
Traffic Analysis:
PDB Path Analysis:
Behavioral Indicators:
File Characteristics:
Attachment Filtering:
Link Analysis:
Social Engineering Recognition:
Safe Download Practices:
Silver Fox represents a troubling trend in cybercrime:
Traditional approaches assuming a single threat actor are insufficient:
Silver Fox demonstrates how malware ecosystems function like legitimate software:
The revelation that Silver Fox is a toolkit rather than an organization fundamentally changes our understanding of this threat. With at least five confirmed independent groups operating globally, and the source code available in underground markets, the Silver Fox ecosystem will likely continue to grow.
Security teams must adapt their detection and response strategies to account for:
The most concerning aspect is not any single group's capabilities, but the unlimited scalability of a widely distributed toolkit. As more actors gain access to Silver Fox, we can expect:
Organizations should prioritize:
The Silver Fox case study demonstrates how modern cybercrime has evolved into a sophisticated ecosystem with specialized roles, shared tooling, and professional development practices. Only by understanding this ecosystem can we effectively defend against it.
Due to the extensive nature of Silver Fox infrastructure and the constant addition of new domains/IPs, organizations should:
For specific IOCs including domains, IP addresses, file hashes, and network signatures, refer to threat intelligence platforms and security vendor advisories that maintain updated Silver Fox indicators.