Silver Fox Hackers Exploit Weaponized Google Translate Tools to Deliver Windows Malware
The Knownsec 404 Advanced Threat Intelligence Team has lately discovered increased activity from the Silver Fox cybercrime gang, which has been using fake versions of popular programs as weapons to spread malware in a complex cyber threat landscape.
Tracing back to 2024, these attacks often masquerade as legitimate Google Translate interfaces, employing deceptive JavaScript redirects that trigger upon any user interaction on the phishing page.
This interaction prompts a fabricated alert claiming an outdated Adobe Flash Player version, coercing users to download a malicious installer.
Emerging Phishing Campaigns
Upon execution, the payload infiltrates the host system, enabling remote control and data exfiltration.
The gang’s tactics extend beyond translation tools, incorporating search engine optimization (SEO) poisoning and spoofed websites mimicking national institutions, thereby contaminating the broader Chinese internet ecosystem with Trojan-laden downloads.
A typical attack chain involves luring victims to these decoy sites via poisoned search results or phishing emails, followed by the deployment of installers that embed the Winos remote access Trojan (RAT), a core component of the Silver Fox family.
Since its emergence in 2022, the Silver Fox group has evolved from a singular entity into a prolific malware family, fueled by the underground leakage of source code like Winos 4.0.
This has allowed cybercriminals and advanced persistent threat (APT) actors to repurpose the code for diverse campaigns, distributing it through emails, instant messaging, and fabricated download portals.
Recent discoveries include phishing domains impersonating Google Translate, currency converters, and even the official WPS Office site, where embedded scripts facilitate seamless redirection to attacker-controlled servers hosting MSI or EXE installers.

In-Depth Malware Dissection
Technical dissection of the Silver Fox Trojan reveals a multi-stage infection process. For instance, the MSI package releases a suite of files, including aicustact.dll, which dynamically loads attacker-specified payloads from a Property table.
Concurrently, an update.bat script executes legitimate installation routines while surreptitiously launching malicious components.
Persistence is achieved via javaw.exe, which injects Microsoftdata.exe a Golang-compiled binary mimicking official Microsoft nomenclature into the Windows registry for auto-start.
This executable decrypts and executes shellcode from an embedded Xps.dtd file, which in turn loads a portable executable (PE) bearing PDB strings like “RexRat4.0.3,” ultimately invoking the Winos RAT.
Winos boasts modular plugins for advanced espionage, including real-time screenshot capture, keystroke logging, and clipboard data harvesting, granting attackers granular control over compromised endpoints.
Expanding the hunt, researchers identified additional decoys such as fake Easy Translation, Youdao Translation, Bit Browser, and LetsVPN installers, all funneling victims toward Winos deployment.
This modularity underscores Silver Fox’s adaptability, with perpetrators iterating on evasion techniques like code obfuscation, forged digital signatures, and cloud sandbox bypassing to maximize infection rates at minimal cost.
APT groups, including Golden Eye Dog, have repurposed these tools for targeted intrusions, amplifying risks to personal privacy and corporate data integrity across the Chinese digital sphere.
Silver Fox represents a rampant malware cluster eroding user trust in everyday applications. To mitigate, users should verify sources rigorously, prioritize official downloads, and maintain updated security postures. Enhanced vigilance is crucial to counter these pervasive threats.
Indicators of Compromise (IOC)
Type | IOC Value |
---|---|
Hash (SHA-256) | 38bdef0bdf05adeefb1d4ba04296c757eb8cdfb9be958e4c0d544764564df177 |
Hash (SHA-256) | b5e0893617a6a1b5e5f3c0c85fa82eaa9c6e66a511ca3974e35d6a466b52642a |
Hash (SHA-256) | cf17ce1d9a3f0151afd129823303aa949f6c7d71692dff5f6c39bcef03c8dadc |
Hash (SHA-256) | cdd221dfe3d856aae18cd5af30fd771df44441c35383278a1559438c3e708cfd |
Hash (SHA-256) | 4d0ccef5969d7733fc633570d80dfff8ac2362789572c9df8a0320eede2b3284 |
Hash (SHA-256) | 1ce6518a4f31b1d1b500df7966c0a2e93e7a4b728b402727071d7b2d5b2cf5b6 |
Hash (SHA-256) | 42dd5c61c3490447d0b217eca6c1aad9cd9e636fd3b034138a12596d0b03eced |
Hash (SHA-256) | 61f860c3241f13c9e2a290c14a74ad9d0f018fe36f2ed9e260907b7c12ecb393 |
Hash (SHA-256) | 0d171b33d1a22b2e1e2fb1638295c40f67c4ac40d771e732de2c0e01fd6cd79e |
Phishing Website | 192.252.181.55 |
Phishing Website | www.ggfanyi.com |
Phishing Website | 185.202.101.114 |
C2 Server | 8.218.115.90:8080 |
C2 Server | 8.218.115.90:8081 |
C2 Server | 154.91.66.58:8088 |
C2 Server | 154.91.66.58:8089 |
C2 Server | 103.116.246.234:6234 |
C2 Server | 43.250.174.49:1989 |
C2 Server | 154.222.24.214:886 |
C2 Server | 154.222.24.214:668 |
C2 Server | 206.119.167.191:8003 |
C2 Server | 206.119.167.191:8004 |
C2 Server | 1.94.163.46:666 |
C2 Server | 203.160.55.201:1860 |
C2 Server | 154.94.232.242:8888 |
C2 Server | 154.94.232.242:6666 |
Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!
Source link