Silver Fox Hackers Exploit Weaponized Google Translate Tools to Deliver Windows Malware

Silver Fox Hackers Exploit Weaponized Google Translate Tools to Deliver Windows Malware

The Knownsec 404 Advanced Threat Intelligence Team has lately discovered increased activity from the Silver Fox cybercrime gang, which has been using fake versions of popular programs as weapons to spread malware in a complex cyber threat landscape.

Tracing back to 2024, these attacks often masquerade as legitimate Google Translate interfaces, employing deceptive JavaScript redirects that trigger upon any user interaction on the phishing page.

This interaction prompts a fabricated alert claiming an outdated Adobe Flash Player version, coercing users to download a malicious installer.

Emerging Phishing Campaigns

Upon execution, the payload infiltrates the host system, enabling remote control and data exfiltration.

Attack chain

The gang’s tactics extend beyond translation tools, incorporating search engine optimization (SEO) poisoning and spoofed websites mimicking national institutions, thereby contaminating the broader Chinese internet ecosystem with Trojan-laden downloads.

A typical attack chain involves luring victims to these decoy sites via poisoned search results or phishing emails, followed by the deployment of installers that embed the Winos remote access Trojan (RAT), a core component of the Silver Fox family.

Since its emergence in 2022, the Silver Fox group has evolved from a singular entity into a prolific malware family, fueled by the underground leakage of source code like Winos 4.0.

This has allowed cybercriminals and advanced persistent threat (APT) actors to repurpose the code for diverse campaigns, distributing it through emails, instant messaging, and fabricated download portals.

Recent discoveries include phishing domains impersonating Google Translate, currency converters, and even the official WPS Office site, where embedded scripts facilitate seamless redirection to attacker-controlled servers hosting MSI or EXE installers.

Silver Fox Hackers
Fake Google Translate

In-Depth Malware Dissection

Technical dissection of the Silver Fox Trojan reveals a multi-stage infection process. For instance, the MSI package releases a suite of files, including aicustact.dll, which dynamically loads attacker-specified payloads from a Property table.

Concurrently, an update.bat script executes legitimate installation routines while surreptitiously launching malicious components.

Persistence is achieved via javaw.exe, which injects Microsoftdata.exe a Golang-compiled binary mimicking official Microsoft nomenclature into the Windows registry for auto-start.

This executable decrypts and executes shellcode from an embedded Xps.dtd file, which in turn loads a portable executable (PE) bearing PDB strings like “RexRat4.0.3,” ultimately invoking the Winos RAT.

Winos boasts modular plugins for advanced espionage, including real-time screenshot capture, keystroke logging, and clipboard data harvesting, granting attackers granular control over compromised endpoints.

Expanding the hunt, researchers identified additional decoys such as fake Easy Translation, Youdao Translation, Bit Browser, and LetsVPN installers, all funneling victims toward Winos deployment.

This modularity underscores Silver Fox’s adaptability, with perpetrators iterating on evasion techniques like code obfuscation, forged digital signatures, and cloud sandbox bypassing to maximize infection rates at minimal cost.

APT groups, including Golden Eye Dog, have repurposed these tools for targeted intrusions, amplifying risks to personal privacy and corporate data integrity across the Chinese digital sphere.

Silver Fox represents a rampant malware cluster eroding user trust in everyday applications. To mitigate, users should verify sources rigorously, prioritize official downloads, and maintain updated security postures. Enhanced vigilance is crucial to counter these pervasive threats.

Indicators of Compromise (IOC)

Type IOC Value
Hash (SHA-256) 38bdef0bdf05adeefb1d4ba04296c757eb8cdfb9be958e4c0d544764564df177
Hash (SHA-256) b5e0893617a6a1b5e5f3c0c85fa82eaa9c6e66a511ca3974e35d6a466b52642a
Hash (SHA-256) cf17ce1d9a3f0151afd129823303aa949f6c7d71692dff5f6c39bcef03c8dadc
Hash (SHA-256) cdd221dfe3d856aae18cd5af30fd771df44441c35383278a1559438c3e708cfd
Hash (SHA-256) 4d0ccef5969d7733fc633570d80dfff8ac2362789572c9df8a0320eede2b3284
Hash (SHA-256) 1ce6518a4f31b1d1b500df7966c0a2e93e7a4b728b402727071d7b2d5b2cf5b6
Hash (SHA-256) 42dd5c61c3490447d0b217eca6c1aad9cd9e636fd3b034138a12596d0b03eced
Hash (SHA-256) 61f860c3241f13c9e2a290c14a74ad9d0f018fe36f2ed9e260907b7c12ecb393
Hash (SHA-256) 0d171b33d1a22b2e1e2fb1638295c40f67c4ac40d771e732de2c0e01fd6cd79e
Phishing Website 192.252.181.55
Phishing Website www.ggfanyi.com
Phishing Website 185.202.101.114
C2 Server 8.218.115.90:8080
C2 Server 8.218.115.90:8081
C2 Server 154.91.66.58:8088
C2 Server 154.91.66.58:8089
C2 Server 103.116.246.234:6234
C2 Server 43.250.174.49:1989
C2 Server 154.222.24.214:886
C2 Server 154.222.24.214:668
C2 Server 206.119.167.191:8003
C2 Server 206.119.167.191:8004
C2 Server 1.94.163.46:666
C2 Server 203.160.55.201:1860
C2 Server 154.94.232.242:8888
C2 Server 154.94.232.242:6666

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!


Source link