Silver Fox Hackers Use Malicious Google Translate Tools to Deploy Windows Malware

An uptick in attack activity by the Silver Fox cybercrime group has been detected across the Chinese internet since early 2024, leveraging counterfeit versions of popular tools such as Google Translate to distribute malware.

Security researchers at Knownsec 404 Advanced Threat Intelligence Team report that attackers are creating persuasive fake websites mimicking legitimate downloads, including translation utilities and office suites, luring users into installing trojans that can compromise their devices.

These elaborate phishing campaigns begin with lookalike websites for widely-used applications—such as Google Translate, currency converters, and even well-known Chinese utilities such as WPS Office and Bit Browser.

Silver Fox Hackers
Fake Google Translate

Users visiting these fraudulent pages are often met with unexpected prompts, for example, warnings about outdated Flash Player versions, which redirect them to attacker-controlled download servers.

When users install the offered packages, malicious payloads are quietly deployed, setting the stage for system compromise.

Modular Payload Delivery

The typical infection chain, as analyzed by researchers, employs MSI or EXE installation packages that both ultimately drop the same core Trojan: a derivative of the “Winos” remote control malware.

Silver Fox Hackers
Attack chain

The MSI installer, for example, executes auxiliary components and batch scripts that deploy and persistently run the main payload, impersonating legitimate system processes such as javaw.exe and Microsoftdata.exe.

These payloads are designed for stealth and persistence. Once installed, the malware modifies the Windows registry to ensure continued execution on reboot, and further leverages loader DLLs and encrypted configuration files such as Xps.dtd to execute second-stage shellcode.

The decrypted code typically loads further payloads, with internal identifiers referencing variants like “RexRat4.0.3”, though analysis confirms the principal functions remain aligned with the Winos Trojan family.

Winos is distinguished by its highly modular framework, supporting a suite of plugins designed for extensive surveillance and data exfiltration.

Capabilities include capturing screenshots, logging keystrokes, and harvesting clipboard contents from infected systems.

The malware’s adaptability has allowed criminal operators, and even advanced persistent threat (APT) actors, to repeatedly repurpose and repackage the core code for new phishing campaigns, typically focused on achieving broad distribution by hijacking the branding of trusted applications.

Growing Ecosystem

The continuous evolution of Silver Fox’s malicious toolkit is a direct result of leaked source code for Winos and similar remote access trojans circulated in underground forums.

This has enabled a wider array of threat actors to customize and distribute the malware, creating an aggressive ecosystem where fake application downloads, SEO poisoning, and fraudulent institutional websites routinely appear in the wild.

Researchers emphasize that users must exercise increased vigilance installing software only from official sources, avoiding cracked or third-party installers, and keeping security protocols up to date.

With Silver Fox’s operations deeply eroding trust in the broader internet download environment, the burden of defense now rests equally on end users, organizations, and security vendors to counter these threats.

Indicators of Compromise (IOC)

CategoryValue
Hashes38bdef0bdf05adeefb1d4ba04296c757eb8cdfb9be958e4c0d544764564df177
b5e0893617a6a1b5e5f3c0c85fa82eaa9c6e66a511ca3974e35d6a466b52642a
cf17ce1d9a3f0151afd129823303aa949f6c7d71692dff5f6c39bcef03c8dadc
cdd221dfe3d856aae18cd5af30fd771df44441c35383278a1559438c3e708cfd
4d0ccef5969d7733fc633570d80dfff8ac2362789572c9df8a0320eede2b3284
1ce6518a4f31b1d1b500df7966c0a2e93e7a4b728b402727071d7b2d5b2cf5b6
42dd5c61c3490447d0b217eca6c1aad9cd9e636fd3b034138a12596d0b03eced
61f860c3241f13c9e2a290c14a74ad9d0f018fe36f2ed9e260907b7c12ecb393
0d171b33d1a22b2e1e2fb1638295c40f67c4ac40d771e732de2c0e01fd6cd79e
Phishing domains192.252.181[.]55, www.ggfanyi[.]com, 185.202.101[.]114
C2 servers8.218.115.90:8080, 8.218.115.90:8081, 154.91.66.58:8088,
154.91.66.58:8089, 103.116.246.234:6234, 43.250.174.49:1989,
154.222.24.214:886, 154.222.24.214:668, 206.119.167.191:8003,
206.119.167.191:8004, 1.94.163.46:666, 203.160.55.201:1860,
154.94.232.242:8888, 154.94.232.242:6666

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here