Back to reports
highPhishing

MalwareBazaar Said Emotet. It Was a Chinese RAT Hiding Inside a Video Game.

PublishedMarch 12, 2026
Threat Actors:ProfileAssessment
phishingsocial-engineeringc2supply-chainapt

TL;DR: A 32MB Windows executable submitted to MalwareBazaar as "Arma SE7.exe" and tagged as Emotet/Heodo is not Emotet at all. It is a trojanized legitimate Arma 3 v2.20 server binary deployed by SilverFox, a Chinese-origin threat group, to deliver ValleyRAT (also known as Winos 4.0) -- a modular RAT framework with ties to Gh0stRAT and a documented history of targeting Chinese-speaking users. The binary retains full game server functionality while embedding anti-analysis TLS callbacks that inspect the PEB for debugger presence before the main entry point even executes. The sample successfully evaded 5 of 6 VirusTotal sandboxes and drew only a 20/76 detection rate. Meanwhile, 100+ related SilverFox samples are actively circulating on MalwareBazaar, backed by C2 infrastructure spanning Tencent Cloud, AWS Hong Kong, Vultr Singapore, and budget VPS providers. The Heodo tag on this sample is a false positive -- and a reminder that automated attribution is only as good as the heuristics behind it.


When the Label Does Not Match the Contents

This investigation began the way most of ours do: a fresh MalwareBazaar upload, a familiar tag, a quick glance. The sample was a 32MB executable called "Arma SE7.exe," and MalwareBazaar had tagged it Emotet/Heodo -- the banking trojan turned malware-distribution-as-a-service platform that has been the subject of multiple international law enforcement operations.

Emotet in a 32MB game server binary? That should have been the first red flag.

Emotet payloads are typically small -- DLLs in the hundreds of kilobytes, delivered via Office macros or ZIP attachments. They do not weigh 30 megabytes and they do not masquerade as Arma 3 dedicated server binaries. The Heodo signature in MalwareBazaar appears to have been triggered by generic behavioral heuristics -- likely the combination of anti-debugging techniques, process injection capabilities, and encrypted configuration data. These are behaviors shared by dozens of malware families, but the automated classification system matched them against Emotet's profile and called it a day.

The actual malware family is SilverFox/ValleyRAT/Winos 4.0 -- a Chinese-origin remote access trojan framework that has been active since at least late 2024 and targets Chinese-speaking users through trojanized software and social engineering. Not Emotet. Not even close.

This matters for two reasons. First, any organization that consumes MalwareBazaar intelligence feeds automatically would have ingested this IOC under the wrong family attribution, potentially triggering Emotet-specific playbooks and response procedures that are completely irrelevant to the actual threat. Second, the misattribution obscures the real campaign -- a Chinese threat group actively trojanizing legitimate game binaries, a technique that combines supply chain compromise with social engineering in a way that commodity banking trojans do not.

What Was Found vs. What Was Known

AspectMalwareBazaar AttributionBreakglass Findings
Malware FamilyEmotet / HeodoSilverFox / ValleyRAT / Winos 4.0
OriginUnknownChina (HIGH confidence)
TechniqueGeneric trojanTrojanized legitimate Arma 3 v2.20 server binary
C2 InfrastructureNot mapped7+ IPs across 5 ASNs, 1 .cn domain
Campaign Scale1 isolated sample100+ related samples in MalwareBazaar
Anti-AnalysisNot documentedTLS callback PEB checks, sandbox evasion, timing attacks
TargetingUnknownChinese-speaking users via trojanized software
Delivery MechanismWeb downloadLikely piracy/game cracking sites

The gap between the automated attribution and the reality is not subtle. This is a completely different threat actor, with a completely different motivation, operating in a completely different part of the world.

The Sample: A Real Game Server That Does More Than Serve Games

The binary is a genuine Arma 3 v2.20 dedicated server executable compiled on June 24, 2025. It contains Bohemia Interactive's internal build paths, their proprietary "Futura" engine references, their telemetry library. It is not a from-scratch build designed to look like Arma 3 -- it is Arma 3, with modifications.

AttributeValue
SHA-25666406a9f58f42fb6f7d1e31e3aee159641ca5e257521dc325e49ccaec4aeba22
MD5bc633b52efd493bf6be65099fcd89fbb
SHA-14e3e4f05c3c9ac911d948cd0f3e612d6497fe21e
Imphash1f1cdd23e3f42cade6020fa0bc6d76b5
File Size32,033,792 bytes (30.5 MB)
File TypePE32+ executable (GUI) x86-64, 7 sections
Compile Time2025-06-24 11:12:40 UTC
PDB PathO:\Arma3\Arma3Retail_Server_x64.pdb
Digitally SignedNo (legitimate Arma 3 binaries are signed by Bohemia Interactive)

The version information block reads like a legitimate product:

  • CompanyName: Bohemia Interactive
  • FileDescription: Arma 3
  • FileVersion: 2.20
  • ProductVersion: 2.20.0.152984
  • Copyright: 1996-2025 BOHEMIA INTERACTIVE a.s.

And the build environment artifacts confirm this was compiled from genuine Bohemia Interactive source code -- not reverse-engineered, not rebuilt, but the actual retail server binary:

H:\dev\Futura\extern\PhysX3\       -- BI internal game engine (codename "Futura")
H:\dev\StatisticsLibrary\StatsLib\  -- BI telemetry/stats library
O:\Arma3\Arma3Retail_Server_x64.pdb -- Release build PDB path

The question is not whether this was originally a legitimate binary -- it clearly was. The question is what was added to it, and how.

The Trojanization: What Changed

Four things distinguish this binary from the legitimate Arma 3 server executable it was built from.

1. The Missing Signature

Legitimate Arma 3 binaries are code-signed by Bohemia Interactive a.s. This sample is unsigned. The digital signature was stripped during post-compilation modification -- a necessary step because any modification to the binary would invalidate the original signature. This is the most basic indicator that something has been tampered with, and it is also the easiest to detect. Any environment that enforces code signing policies would reject this binary outright.

2. TLS Callbacks (Anti-Debug Before Main)

Two TLS (Thread Local Storage) callbacks execute before the main entry point -- before most debuggers even attach:

TLS Callback 0: RVA 0x1553B2C
TLS Callback 1: RVA 0x1553BA4

Both callbacks:
  mov rax, gs:[0x60]      ; Access PEB (Process Environment Block)
  movzx eax, [rax+0x02]   ; Read PEB.BeingDebugged
  test eax, eax            ; Check if debugger is attached
  jnz <evasion_routine>   ; If debugging detected, alter execution

TLS callbacks are a well-known anti-analysis technique, but they remain effective against casual analysis. An analyst who attaches a debugger and hits "Run" expecting to land at the entry point will instead trigger the evasion routine, which alters execution flow -- the malware goes dormant or crashes, producing no useful behavior. Both callbacks also access PEB offset 0x68 (NtGlobalFlag), which is set to specific values when a process is launched under a debugger. Belt and suspenders.

3. The Modified Export Table

The binary exports 43 functions, but only 6 are named -- the legitimate Arma 3 server exports. The remaining 37 exports are ordinal-only, with ordinals ranging from 11 to 4154. The gaps in the ordinal sequence and the absence of names indicate that these exports were added post-compilation. Ordinal-only exports are a common technique for hiding functionality from casual inspection, since most PE analysis tools display named exports prominently while ordinal exports require deliberate examination.

4. Encrypted Configuration in .data

Three 256-byte blocks in the .data section (offsets 0x4D00-0x4F00) have entropy exceeding 7.0 -- effectively random data in a section that should contain initialized variables and string literals. XOR brute-force and known-plaintext attacks did not yield readable content, suggesting AES or a custom encryption scheme. These blocks almost certainly contain C2 configuration, but without successfully executing the binary in a controlled environment, the encryption could not be broken during this investigation.

PE Section Layout

SectionVirtual SizeRaw SizeEntropyNotes
.text23,999,67624,000,0006.45Main code -- includes injected trojan code
.rdata5,334,1085,334,5285.74Read-only data
.data1,032,552585,7283.82Contains 3 high-entropy encrypted config blocks
.pdata1,155,8881,156,0966.85Exception handling data
_RDATA80,14480,3845.49Runtime data
.rsrc520,192520,1925.63Resources (PNGs, icons)
.reloc355,588355,8405.46Relocations

The section entropy values are consistent with a legitimate compiled binary -- no packed or fully encrypted sections. The trojanization was surgical: specific code additions and export table modifications rather than wholesale packing or section injection. This makes the binary harder to detect via entropy-based scanning because it still looks like a normal compiled executable.

Attack Chain

                        SILVERFOX / VALLEYRAT KILL CHAIN
 ============================================================================

 [1] DELIVERY                [2] SOCIAL ENGINEERING       [3] EXECUTION
 Piracy/crack site     --->  "Arma SE7.exe"        --->  User launches trojanized
 or phishing page            (trojanized Arma 3           game server binary
                              v2.20 server, 30.5MB)             |
                                                                |
                                                                v
 [6] C2 COMMUNICATION        [5] PAYLOAD DEPLOYMENT      [4] ANTI-ANALYSIS GATE
 ValleyRAT beacon      <---  Winos 4.0 framework   <---  TLS callbacks check
 to Tencent Cloud /          loads RAT modules            PEB.BeingDebugged +
 AWS HK / Vultr SG           (process injection,          NtGlobalFlag, timing
 on ports 447/6666/          privilege escalation,        checks, user input
 8888/821/822                registry persistence)        verification
                                                                |
                                                          [If analysis detected]
                                                                |
                                                                v
                                                          Crash / dormancy
                                                          (WerFault.exe)
                                                          5/6 sandboxes evaded

The delivery vector is inferred rather than confirmed. The filename "Arma SE7.exe" and the nature of the trojanization point toward distribution through piracy or game cracking communities. Arma 3 dedicated server binaries are commonly sought by players who want to host private or modified game servers, and cracking sites are a natural watering hole for this demographic. Related SilverFox samples use social engineering filenames in Chinese -- "Q1 2026 Internal Violators List Bulletin," "2025 Q2 Staff Violations List" -- suggesting the group maintains multiple delivery vectors for different target populations.

Sandbox Evasion: 5 of 6 Defeated

The anti-analysis techniques are effective. Across six VirusTotal sandboxes, the sample produced almost no useful behavioral data:

SandboxBehavior TagsC2 CommunicationWhat Happened
C2AENoneNone1 registry key set, nothing else
CAPEDETECT_DEBUG_ENVIRONMENT, OBFUSCATEDNoneDebug evasion detected, no execution
VT JujuboxNoneNoneIsDebuggerPresent + GetTickCount -- timing check
VT ObserverNoneNone3 files written, 1 registry key, no network
Yomi HunterNoneNoneComplete silence
ZenboxCHECKS_USER_INPUT, DETECT_DEBUG_ENVIRONMENT, LONG_SLEEPSDNS only (Microsoft CDN)Crashed to WerFault.exe

No sandbox captured C2 communication. The combination of TLS callback anti-debugging, GetTickCount timing checks, user input verification, and long sleep delays creates a layered evasion strategy that defeated automated analysis across the board. Only CAPE and Zenbox even detected the anti-analysis behavior -- the other four sandboxes saw nothing at all.

The Zenbox result is particularly informative: after detecting the sandbox environment, the binary crashed itself to WerFault.exe -- Windows Error Reporting. To a monitoring system watching process trees, this looks like a legitimate application crash rather than deliberate evasion. ANY.RUN's public analysis of this sample similarly reported "No threats detected."

One mutex was observed across sandbox runs: Global\6c333df7-4b9a-480e-ac10-afb3bf603d27. This is likely used to prevent multiple instances of the trojan from running simultaneously on a compromised host.

Import Table: Game APIs Mixed with Weaponry

The import table is where the trojanization becomes most visible. Alongside hundreds of legitimate game engine imports (DirectX, Winsock, multimedia APIs), the binary imports a constellation of functions that have no business being in a game server:

DLLSuspicious Imports
KERNEL32.dllVirtualAlloc, VirtualProtect, CreateProcessA/W, CreateToolhelp32Snapshot, Process32First/Next, WinExec, LoadLibraryA/W, GetProcAddress, IsDebuggerPresent
ADVAPI32.dllAdjustTokenPrivileges, CryptEncrypt, RegSetValueExA
SHELL32.dllShellExecuteA, ShellExecuteW

A game server has no reason to call AdjustTokenPrivileges (privilege escalation), CreateToolhelp32Snapshot with Process32First/Next (process enumeration), or CryptEncrypt (data encryption for exfiltration). The presence of WinExec alongside CreateProcessA/W suggests fallback execution paths -- if one process creation method is hooked or blocked, the malware has alternatives.

Infrastructure Analysis: Five ASNs, Two Continents, One Threat Actor

The C2 infrastructure mapped through ThreatFox correlation spans seven IPs across five autonomous systems and one domain, with a clear preference for Asian hosting providers:

C2 IP Infrastructure

IPPort(s)ASNProviderCountryStatusFirst Seen
43[.]133[.]39[.]21780AS132203Tencent CloudSGOFFLINE2025-09-24
150[.]109[.]127[.]175821, 822AS132203Tencent CloudHKOFFLINE2025-09-24
207[.]148[.]123[.]6980, 6666, 8888AS20473VultrSGOFFLINE2026-03-10
154[.]211[.]5[.]1766666, 8888AS329611Fastmos Co LtdHKUNKNOWN2026-03-10
108[.]187[.]7[.]20996, 997--SpeedVM NetworkUSUNKNOWN2026-03-10
108[.]187[.]4[.]221447--SpeedVM NetworkUSUNKNOWN2026-03-10
192[.]163[.]168[.]49447--SpeedVM NetworkUSUNKNOWN2026-03-10

Domain Infrastructure

DomainIPRegistrantRegistrarCreatedPurpose
cdklskjd[.]cn43[.]199[.]110[.]109 (AWS HK)Peng BenboHangzhou Yunji Communications2025-12-14ValleyRAT C2

Hosting Hierarchy

SILVERFOX C2 INFRASTRUCTURE MAP
================================

Tier 0: Primary C2 (Asian Cloud Providers)
  |
  +-- AS132203 (Tencent Cloud / TENCENT-NET-AP-CN, Shenzhen CN)
  |     +-- 43.133.39.217:80        [Singapore, OFFLINE since Sep 2025]
  |     +-- 150.109.127.175:821,822 [Hong Kong, OFFLINE since Sep 2025]
  |
  +-- AWS ap-east-1 (Hong Kong)
  |     +-- 43.199.110.109          [cdklskjd.cn, ValleyRAT C2]
  |
  +-- AS20473 (Vultr / Constant Company, Singapore)
  |     +-- 207.148.123.69:80,6666,8888 [OFFLINE, reported Mar 2026]
  |
  +-- AS329611 (Fastmos Co Limited, Hong Kong)
        +-- 154.211.5.176:6666,8888 [Status unknown]

Tier 1: Budget VPS (US-based)
  |
  +-- SpeedVM Network Group LLC (Los Angeles, US)
        +-- 108.187.7.20:996,997   [Status unknown]
        +-- 108.187.4.221:447      [Status unknown]
        +-- 192.163.168.49:447     [Status unknown]

Port Fingerprint

ValleyRAT/Winos 4.0 infrastructure uses a consistent and recognizable port selection that can serve as a network-level detection signature:

PortProtocolPurpose
447Modified HTTPSPrimary encrypted C2 (SpeedVM nodes)
6666Raw TCPC2 channel (Vultr, Fastmos nodes)
8888Raw TCPSecondary C2 channel
821/822Custom protocolTencent Cloud C2 (older infrastructure)
80HTTPC2 fallback (Tencent, Vultr)
996/997Custom protocolSpeedVM C2 channel

The port pattern is consistent enough across infrastructure nodes that it constitutes a behavioral fingerprint. Any environment monitoring outbound connections to ports 6666, 8888, or 447 -- particularly to Asian cloud providers -- should investigate those connections as potential ValleyRAT beacons.

The SilverFox Campaign: Bigger Than One Sample

This is not an isolated trojanized binary. MalwareBazaar contains 100+ samples tagged as SilverFox, with active submissions as recently as March 10, 2026. The campaign uses multiple malware families under a single operational umbrella:

SHA256 (truncated)FilenameSignatureFirst Seen
95e30af4...PoisonX.exePrivateLoader2026-03-10
cf4203625...jinyou.exeValleyRAT2026-03-10
525b4900f...Glnstaller.exeGh0stRAT2026-03-10
e9d138b69...2026 Q1 Internal Violators List.exeSliverFox2026-03-10
3c78c8b86...2025 Q2 Staff Violations List.exeSilverFox2026-03-10

The filenames tell a story. The Chinese-language social engineering documents -- "Q1 2026 Internal Violators List," "2025 Q2 Staff Violations List" -- suggest a parallel targeting track aimed at Chinese corporate environments, where a document purporting to list employees who violated company policy would be irresistible to open. Meanwhile, "PoisonX.exe" and "Glnstaller.exe" suggest distribution through gaming and software piracy channels, consistent with the Arma 3 trojanization vector.

The cross-tagging with Gh0stRAT is significant. Gh0stRAT is one of the oldest Chinese-origin RATs still in active use, and its codebase has been shared, forked, and evolved by multiple threat groups over the past decade. ValleyRAT/Winos 4.0 appears to be the next evolution in this lineage -- a modular framework that retains Gh0stRAT's operational concepts while updating the technical implementation.

Attribution: Five Lines to China

The attribution to a Chinese-origin threat group rests on five independent evidence chains:

1. C2 Infrastructure (Tencent Cloud) Two of the seven C2 IPs sit on AS132203, which is Tencent Cloud -- Tencent Building, Kejizhongyi Avenue, Hi-tech Park, Nanshan District, Shenzhen. This is not infrastructure you end up on accidentally. Tencent Cloud requires Chinese identity verification for account creation.

2. Domain Registration The domain cdklskjd[.]cn is registered to an individual named Peng Benbo, using the email address di823748@163[.]com. The .cn TLD requires Chinese identity documentation. The 163.com email domain belongs to NetEase, a Chinese internet services company -- it is the Chinese equivalent of using a Gmail address. The registrar, Hangzhou Yunji Communications, is a Chinese domain registrar.

3. Social Engineering Language Related samples use Chinese-language filenames targeting Chinese-speaking users. The social engineering themes (employee violation lists, internal bulletins) align with known Chinese corporate culture targeting techniques.

4. Malware Family Lineage ValleyRAT/Winos 4.0 is a documented Chinese-origin RAT framework. Its relationship to Gh0stRAT -- itself one of the most well-studied Chinese malware families in existence -- is well-established in threat intelligence literature.

5. Reporter Context The MalwareBazaar submission was made by a user named "CNGaoLing" -- the "CN" prefix is consistent with a Chinese researcher or analyst who discovered the sample in a Chinese-language context.

Attribution Confidence: HIGH

OPSEC Failures

For a group with medium-to-high technical sophistication, SilverFox makes some surprising operational security mistakes:

  1. Exposed domain registrant: The cdklskjd[.]cn WHOIS record contains a real name and email address. Whether this is the operator's actual identity or a purchased/stolen identity, it provides a pivot point for further investigation.

  2. Infrastructure provider concentration: The heavy reliance on Tencent Cloud creates a fingerprint. When you see ValleyRAT-like behavior beaconing to Tencent Cloud IPs on ports 6666/8888, you can attribute with reasonable confidence before even completing full analysis.

  3. Consistent port usage: The 6666/8888/447 port pattern is recognizable across infrastructure nodes and campaign periods. This should be rotated between operations but has remained stable.

  4. Unsigned binaries: Stripping the digital signature from a legitimately signed binary is a detectable modification. A more sophisticated approach would involve re-signing with a stolen or fraudulently obtained code signing certificate.

Campaign Timeline

DateEvent
2025-06-24Arma 3 v2.20 server binary compiled by Bohemia Interactive (legitimate)
2025-09-24First SilverFox C2 IOCs reported to ThreatFox (Tencent Cloud IPs)
2025-12-14cdklskjd[.]cn domain registered via Hangzhou Yunji Communications
2026-03-08Trojanized "Arma SE7.exe" submitted to MalwareBazaar, tagged as Emotet
2026-03-1010+ fresh SilverFox samples submitted to MalwareBazaar, new C2 IOCs reported
2026-03-10Breakglass Intelligence investigation confirms misattribution

The nine-month gap between the binary's compile date (June 2025) and its submission to MalwareBazaar (March 2026) raises questions. Was the binary trojanized shortly after compilation and circulated privately for months before detection? Or was it trojanized more recently from an older build? The compile timestamp belongs to the legitimate Arma 3 binary, not the modification, so the actual trojanization date remains unknown.

MITRE ATT&CK Mapping

TacticTechniqueIDImplementation
Initial AccessSupply Chain Compromise: SoftwareT1195.002Trojanized Arma 3 v2.20 server binary
ExecutionUser Execution: Malicious FileT1204.002Victim launches game server expecting normal functionality
Defense EvasionMasquerading: Match Legitimate Name/LocationT1036.005Valid Bohemia Interactive version info, Arma 3 PDB path
Defense EvasionDebugger EvasionT1622TLS callback PEB.BeingDebugged + NtGlobalFlag checks
Defense EvasionVirtualization/Sandbox Evasion: System ChecksT1497.001GetTickCount timing, user input verification, long sleeps
Defense EvasionObfuscated Files or InformationT1027AES/custom-encrypted .data section config blocks
PersistenceBoot or Logon Autostart: Registry Run KeysT1547.001RegSetValueExA import capability
DiscoveryProcess DiscoveryT1057CreateToolhelp32Snapshot + Process32First/Next
Privilege EscalationAccess Token Manipulation: Token ImpersonationT1134.001AdjustTokenPrivileges import
Command and ControlNon-Standard PortT1571Ports 447, 6666, 8888, 821, 822, 996, 997

Detection

VirusTotal Coverage (20/76)

As of investigation time, only 20 of 76 AV engines detected this sample -- a 26% detection rate for a binary that is actively being distributed as part of a campaign with 100+ related samples.

VendorDetection Name
KasperskyTrojan.Win64.Agent.smfrau
ReversingLabsWin64.Trojan.Malgent
MicrosoftTrojan:Win32/Malgent!MSR
YOROIMalicious File (1.00)

Notable absences: CrowdStrike Falcon, SentinelOne, and Palo Alto did not flag this sample. The generic detection names ("Agent," "Malgent," "Malicious File") confirm that no vendor has correctly attributed this to SilverFox/ValleyRAT -- they are detecting it on behavioral heuristics alone, without family identification.

YARA Detection

The following YARA signatures provide detection coverage for this sample and related SilverFox/ValleyRAT binaries:

rule SilverFox_TrojanizedArma3 {
    meta:
        description = "Detects trojanized Arma 3 binaries used by SilverFox group"
        author = "Breakglass Intelligence"
        date = "2026-03-10"
        reference = "emotet-march10 investigation"
        tlp = "WHITE"
        hash = "66406a9f58f42fb6f7d1e31e3aee159641ca5e257521dc325e49ccaec4aeba22"

    strings:
        $pdb = "Arma3Retail_Server_x64.pdb" ascii
        $company = "Bohemia Interactive" wide
        $futura = "\\dev\\Futura\\extern\\PhysX3\\" ascii
        $mutex = "6c333df7-4b9a-480e-ac10-afb3bf603d27" ascii wide

        // TLS callback PEB check pattern
        $tls_peb = { 65 48 8B 04 25 60 00 00 00 0F B6 40 02 }

        // Unsigned binary indicator (no Authenticode signature)
        $no_sig = { 00 00 00 00 00 00 00 00 } at (pe.data_directories[pe.IMAGE_DIRECTORY_ENTRY_SECURITY].virtual_address)

    condition:
        uint16(0) == 0x5A4D and
        filesize > 30MB and
        $pdb and
        $company and
        ($mutex or $tls_peb or $futura) and
        pe.number_of_exports > 30 and
        pe.number_of_signatures == 0
}

rule ValleyRAT_PortPattern_C2 {
    meta:
        description = "Detects ValleyRAT/Winos 4.0 C2 port patterns in PE strings"
        author = "Breakglass Intelligence"
        date = "2026-03-10"

    strings:
        $port_6666 = ":6666" ascii wide
        $port_8888 = ":8888" ascii wide
        $port_447 = ":447" ascii wide
        $cn_domain = ".cn" ascii wide
        $tencent_range = "43.133." ascii
        $tencent_range2 = "150.109." ascii

    condition:
        uint16(0) == 0x5A4D and
        2 of ($port_*) and
        ($cn_domain or $tencent_range or $tencent_range2)
}

Suricata Rules

# SilverFox/ValleyRAT C2 Communication Detection

# Detect connections to known ValleyRAT non-standard ports
alert tcp $HOME_NET any -> $EXTERNAL_NET 6666 (
    msg:"ET MALWARE Possible ValleyRAT/SilverFox C2 Beacon (Port 6666)";
    flow:established,to_server;
    threshold:type both, track by_src, count 3, seconds 300;
    classtype:trojan-activity;
    sid:2026031001; rev:1;
    metadata:created_at 2026_03_10, updated_at 2026_03_10;
)

alert tcp $HOME_NET any -> $EXTERNAL_NET 8888 (
    msg:"ET MALWARE Possible ValleyRAT/SilverFox C2 Beacon (Port 8888)";
    flow:established,to_server;
    threshold:type both, track by_src, count 3, seconds 300;
    classtype:trojan-activity;
    sid:2026031002; rev:1;
    metadata:created_at 2026_03_10, updated_at 2026_03_10;
)

alert tcp $HOME_NET any -> $EXTERNAL_NET 447 (
    msg:"ET MALWARE Possible ValleyRAT/SilverFox Modified HTTPS C2 (Port 447)";
    flow:established,to_server;
    classtype:trojan-activity;
    sid:2026031003; rev:1;
    metadata:created_at 2026_03_10, updated_at 2026_03_10;
)

# Detect DNS query for known SilverFox C2 domain
alert dns $HOME_NET any -> any any (
    msg:"ET MALWARE SilverFox/ValleyRAT C2 Domain (cdklskjd.cn)";
    dns.query; content:"cdklskjd"; content:".cn"; distance:0;
    classtype:trojan-activity;
    sid:2026031004; rev:1;
    metadata:created_at 2026_03_10, updated_at 2026_03_10;
)

# Detect connections to known SilverFox Tencent Cloud C2 IPs
alert ip $HOME_NET any -> [43.133.39.217,150.109.127.175] any (
    msg:"ET MALWARE SilverFox/ValleyRAT Known Tencent Cloud C2";
    classtype:trojan-activity;
    sid:2026031005; rev:1;
    metadata:created_at 2026_03_10, updated_at 2026_03_10;
)

Behavioral Detection Opportunities

Beyond signature-based detection, defenders should monitor for the following behavioral patterns:

  1. Unsigned Arma 3 executables: Any arma3server_x64.exe or similarly named binary without a valid Bohemia Interactive code signature should be investigated immediately.

  2. Process ancestry anomalies: A game server binary spawning cmd.exe, powershell.exe, or making outbound connections to Chinese cloud providers is not normal game server behavior.

  3. Mutex creation: Global\6c333df7-4b9a-480e-ac10-afb3bf603d27 -- this exact GUID can be used as a host-based IOC for hunting.

  4. Network connections on port 6666/8888/447: Outbound TCP connections to these ports, particularly to Asian IP ranges (Tencent Cloud AS132203, AWS ap-east-1), should trigger investigation.

Indicators of Compromise

File Indicators

# Trojanized Arma 3 Server Binary (SilverFox/ValleyRAT)
SHA256: 66406a9f58f42fb6f7d1e31e3aee159641ca5e257521dc325e49ccaec4aeba22
SHA1:   4e3e4f05c3c9ac911d948cd0f3e612d6497fe21e
MD5:    bc633b52efd493bf6be65099fcd89fbb

# PE Metadata
Imphash:      1f1cdd23e3f42cade6020fa0bc6d76b5
Rich PE Hash: 9289e886a688cd18c5d917d4ddcaecb3
SSDeep:       393216:7tKMmQIrNrO5h/E0omQBFviP92cveWRe7CXLvhHJxZpZ2Sh7/Blqi8bo2X:PArFB4C
TLSH:         T110676C0272B011D4D169D5398B0BD957EB713AAA0F71D7CB12A0D65AAFB79F01CFE220

Network Indicators

# C2 IPs (defanged)
43[.]133[.]39[.]217:80             (Tencent Cloud, Singapore)
150[.]109[.]127[.]175:821,822      (Tencent Cloud, Hong Kong)
207[.]148[.]123[.]69:80,6666,8888  (Vultr, Singapore)
154[.]211[.]5[.]176:6666,8888      (Fastmos, Hong Kong)
108[.]187[.]7[.]20:996,997         (SpeedVM, US)
108[.]187[.]4[.]221:447            (SpeedVM, US)
192[.]163[.]168[.]49:447           (SpeedVM, US)
43[.]199[.]110[.]109               (AWS Hong Kong -- cdklskjd[.]cn)

# C2 Domains (defanged)
cdklskjd[.]cn

Behavioral Indicators

# Mutex
Global\6c333df7-4b9a-480e-ac10-afb3bf603d27

# PDB Path (embedded in binary)
O:\Arma3\Arma3Retail_Server_x64.pdb

# Export Name
Arma3Retail_Server_x64.exe

Registration Data

# Domain registrant (cdklskjd[.]cn)
Registrant:  Peng Benbo
Email:       di823748@163[.]com
Registrar:   Hangzhou Yunji Communications
NS:          ns1.22.cn
Created:     2025-12-14

Immediate (24-48 hours)

  • Block all listed C2 IPs at the network perimeter, proxy, and DNS sinkhole
  • Deploy the YARA rules above to endpoint detection platforms
  • Deploy the Suricata rules to network IDS/IPS
  • Search historical logs for the SHA256, MD5, and imphash values
  • Hunt for the mutex Global\6c333df7-4b9a-480e-ac10-afb3bf603d27 across endpoints
  • Search for any unsigned Arma 3 executables in the environment

Short-term (1-2 weeks)

  • Monitor cdklskjd[.]cn for infrastructure changes (new IPs, subdomains)
  • Search netflow data for outbound connections to ports 447, 6666, and 8888
  • Submit indicators to organizational threat sharing platforms (MISP, STIX/TAXII feeds, relevant ISACs)
  • Review game server hosting environments for unsigned or modified binaries

Medium-term (1-3 months)

  • Monitor MalwareBazaar's SilverFox tag for new submissions
  • Track the registrant email di823748@163[.]com for additional domain registrations
  • Monitor Tencent Cloud IP ranges (AS132203) for new C2 infrastructure
  • Audit software distribution channels for trojanized legitimate binaries
  • Consider code signing enforcement policies for server environments

The Misattribution Problem

This investigation highlights a systemic issue in automated threat intelligence. MalwareBazaar is an invaluable resource -- one of the most important public malware repositories in existence. But its tagging relies on a combination of automated signature matching, YARA rule hits, and community submissions. When those heuristics produce a false positive, the wrong label propagates through every downstream feed, SIEM integration, and threat report that consumes the data.

An organization that ingested this sample's IOCs as Emotet indicators would have:

  • Applied Emotet-specific detection rules (designed for small DLLs delivered via Office macros, not 30MB trojanized game binaries)
  • Searched for Emotet-associated infrastructure (European bulletproof hosting, not Tencent Cloud)
  • Missed the actual C2 infrastructure entirely (ValleyRAT's port 6666/8888/447 pattern is not in any Emotet playbook)
  • Failed to look for related SilverFox samples (100+ additional IOCs sitting in the same repository, tagged correctly)

The corrective action is straightforward: verify automated attributions against the actual sample characteristics before propagating them into detection infrastructure. A 30-second check -- file size, compile target, version information, import table -- would have flagged this as inconsistent with Emotet. Automation is a force multiplier, but it is not a substitute for analysis.

References


Published by Breakglass Intelligence. Investigation conducted 2026-03-10. 1 misattributed sample corrected. 7 C2 IPs mapped. 100+ related samples identified. 5 of 6 sandboxes evaded. Classification: TLP:CLEAR

Share