APT Silver Fox Utilizing Stock Investment Decoy and Undocumented Windows API to Evade Detection

APT Silver Fox Utilizing Stock Investment Decoy and Undocumented Windows API to Evade Detection
The article provides a detailed analysis of ValleyRAT, a remote access Trojan used by the Silver Fox threat organization. The malware employs various techniques, including deploying both a Trojan and a decoy PDF, to deceive victims while establishing a connection to a command and control server. The analysis highlights the malware’s methods of evading detection and executing its payload. Affected: ValleyRAT, Silver Fox threat organization, user systems

Keypoints :

  • ValleyRAT is a remote access Trojan used by the Silver Fox threat organization.
  • Analyzed sample shows it releases a Trojan named “moomoo x64.exe” and a decoy PDF file “UUU.pdf.”
  • The decoy PDF aims to distract victims while the Trojan operates in the background.
  • Communication between the Trojan and the server involves connecting to a specific IP address and port.
  • The malware employs shellcode for operations that include modifying memory permissions.
  • Multiple undocumented Windows API functions are utilized for evading detection.
  • The code implements anti-debug techniques to deter analysis by researchers.
  • A pseudo-random value is generated from system information for additional security measures.
  • Unused URL addresses were cleared at the end of the malware’s operation process.
  • The report concludes that ValleyRAT remains a hidden threat that requires continued observation.

MITRE Techniques :

  • T1071: Application Layer Protocol – The malware uses HTTP for communication with its command and control server.
  • T1059: Command and Scripting Interpreter – Executes shellcode to manipulate memory and launch processes.
  • T1203: Exploitation for Client Execution – Deployment of a decoy PDF to lure victims and facilitate exploitation.
  • T1070: Indicator Removal on Host – The malware clears unused URLs from memory to avoid detection.
  • T1411: Scheduled Task/Job – Contains loops in its code to simulate delays, possibly for anti-debugging.

Indicator of Compromise :

  • [MD5] ValleyRAT md5: 6923AB76F93C6D48B025D27A37E20D14
  • [MD5] moomoo x64.exe md5: 11B499CC40D08A10C107A6FB55A31B65
  • [MD5] UUD.pdf md5: C4FD1E5F9DF850878E7B770F50031FD2
  • [IP Address] 104[.]219[.]214[.]206
  • [URL] hxxps[:]//www[.]baidu[.]com/


Full Story: https://malwareanalysisspace.blogspot.com/2025/02/the-valleyrat-trojan-of-silver-fox-and.html