Silver Fox Abuses Stolen EV Certificates in AtlasCross RAT Malware Campaign

In Cybersecurity News - Original News Source is cybersecuritynews.com by Blog Writer

The Chinese-nexus advanced persistent threat group Silver Fox, also tracked as Void Arachne and SwimSnake, is actively targeting Chinese-speaking users and professionals with a sophisticated AtlasCross RAT campaign.

Security researcher Maurice Fielenbach of Hexastrike found that threat actors leveraging typosquatted domains impersonating trusted software brands like Surfshark, Signal, and Zoom use stolen Extended Validation (EV) code-signing certificates to bypass automated security checks and establish deep persistence within enterprise networks.

The threat actors established an extensive infrastructure network to host polished landing pages mimicking legitimate application vendors. When victims attempt to download the software, they receive a ZIP archive containing a triple-nested Setup Factory installer.

To masquerade as legitimate software, the attackers signed the payloads using a stolen EV certificate issued to a Vietnamese entity, “DUC FABULOUS CO.,LTD,” which remains valid until May 2027.

Attack Flow (Source:Hexastrike)

Schools.exe, alongside legitimate decoy applications such as UltraViewer, to allay user suspicion.

Upon execution, the trojanized loader dynamically resolves its application programming interfaces (APIs) via Process Environment Block (PEB) walking and ROR13 hashing, effectively evading static analysis.

It then extracts an embedded Gh0st RAT-style configuration and retrieves a second-stage shellcode payload from its command-and-control (C2) server over raw TCP, Maurice Fielenbach added.

A reflective loader subsequently maps the AtlasCross RAT into memory, executing it entirely filelessly without writing the final payload to disk.

AtlasCross RAT and the PowerChell Framework

At the core of this operation is the AtlasCross RAT, equipped with a custom native C/C++ PowerShell execution engine named PowerChell. This framework directly hosts the .NET Common Language Runtime (CLR) within the malware process, allowing it to execute PowerShell scripts without ever spawning powershell.exe.

PowerChell systematically neuters host defenses by patching memory to disable the Antimalware Scan Interface (AMSI), disabling Event Tracing for Windows (ETW), bypassing Constrained Language Mode (CLM), and completely suppressing ScriptBlock logging.

The RAT maintains communication with its C2 infrastructure using ChaCha20 encryption, leveraging per-packet random keys generated by hardware random number generators.

To ensure operational longevity, AtlasCross actively terminates TCP connections established by popular Chinese security products, including 360 Total Security and Huorong.

This subtle disruption methodology prevents these tools from receiving cloud-based signature updates without conspicuously killing their host processes.

Additionally, the malware performs targeted DLL injection into WeChat (Wxfun.dll) for data harvesting and utilizes a bundled script leveraging tscon.exe to hijack active Remote Desktop Protocol (RDP) sessions.

Indicators of Compromise (IOCs)

Defense teams are advised to hunt for the following infrastructure and payload indicators observed between November 2025 and March 2026.

Indicator Type Value / Details Description
Stolen EV Certificate 2C1D12F8BBE0827400A8440AF74FFFA8DCC8097C DUC FABULOUS CO.,LTD (Valid through May 2027)
C2 Domain & IP bifa668.com / 61.111.250[.]139 Primary raw TCP C2 communication (Port 9899)
Malicious Network Beacon 53 46 75 63 6b 00 00 00 Hex value for “SFuck” sent during C2 handshake
Typosquatted Domain www-surfshark[.]com Surfshark VPN lure delivery domain
Typosquatted Domain signal-signal[.]com Signal encrypted messenger lure delivery domain
Staging Directory C:Program Files (x86)GitMndsetup Dropped payload and decoy application folder

Silver Fox’s transition from driver-based process termination to network-level security disruption showcases a rapidly maturing threat actor.

Security teams should proactively monitor for non-standard processes loading System.Management.Automation.dll and audit scheduled task creation under the MicrosoftWindowsAppID path to detect PowerChell execution within their environments.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.