< Back to blog
highπŸ”‘Stealer
publishedMarch 13, 2026

Untitled

A Chinese-language spear-phishing campaign distributing a custom C++ PE64 loader (tagged **SilverFox / SliverFox**) targeting Chinese-speaking organiz

Threat Actors:ProfileAssessment
#phishing#rat#loader#social-engineering#process-hollowing#c2

TL;DR: A Chinese-nexus threat actor distributed a sophisticated C++ loader (SilverFox/SliverFox) through HR-themed spear-phishing against Chinese-speaking organizations β€” and accidentally registered their C2 domain using a real name and personal email address, handing investigators a rare attribution anchor.


Executive Summary

On March 13, 2026, a sample arrived in MalwareBazaar with an innocuous-looking filename: 2026.03.13...δΊΊε‘˜εε•.exe β€” "Personnel Roster." Behind the HR lure was a professionally engineered PE64 loader with a full anti-analysis stack, process hollowing capability, BITS-based persistence, and a single C2 domain beaconing over TCP port 8880. Researchers tagged it SilverFox (also stylized SliverFox).

What made this campaign immediately stand out was not the malware's sophistication β€” it was the actor's sloppiness at domain registration. The C2 domain vbnghyyttz[.]cn was registered on January 6, 2026, under the name 彭本泒 (Peng Benbo) with the email address di823748[@]163[.]com β€” a real Chinese consumer email account on NetEase's 163.com platform. For a loader with this level of technical investment, the OPSEC failure is glaring, and it opens a direct pivot path to additional infrastructure operated by the same actor.

The campaign launched no later than March 11, 2026, with at least seven distinct binary variants β€” all sharing the same C2 endpoint. Delivery mechanisms include both spear-phishing with HR-themed lures and trojanized legitimate software (LEViewer.exe), suggesting an actor comfortable operating at multiple points of the initial access kill chain.


What Was Found vs. What Was Known

DimensionPreviously KnownThis Investigation
Malware familySilverFox tracked by CNGaoLing on MalwareBazaarFull static + behavioral analysis of primary sample
Campaign scopeIndividual samples surfaced7 campaign siblings confirmed, all sharing single C2
C2 infrastructureDomain observedFull WHOIS pivot: registrant name + email recovered
Delivery methodSpear-phishing suspectedConfirmed HR lures + trojanized LEViewer.exe variant
Anti-analysis depthGeneric AV labelsFull capability inventory: BP scan, PEB check, 14+ tool strings, geofencing, stealth timeout
PersistenceUnknownBITS + dual SoftwareProtectionPlatform scheduled tasks
TimelineSample-levelDomain registered 67 days before first sample β€” infrastructure pre-staging confirmed

Technical Analysis

The Loader Architecture

The primary sample is a 2.08 MB MSVC-compiled PE64 GUI executable built with Visual Studio 2017 (compiler version 19.16.27054). The PE timestamp reads 2026-03-13 05:36:08 UTC β€” approximately nine hours before first appearance on MalwareBazaar, and there is no evidence of timestamp spoofing, making this a reliable compilation anchor.

Six of the binary's PE section names are entirely blank β€” a deliberate stripping technique to defeat section-name-based YARA rules and automated signature scanners. Entropy values across sections range from 4.48 to 5.87, consistent with compiled native code and ruling out secondary packers like UPX. The binary ships ready to execute.

The static import table is intentionally sparse. Only three DLLs appear: KERNEL32.dll, USER32.dll, and SHELL32.dll. The KERNEL32 imports include the pair that matters most: GetProcAddress and LoadLibraryA. Paired with such a thin IAT, this confirms the loader resolves the majority of its functional API surface dynamically at runtime β€” a standard fingerprinting countermeasure that forces analysts to trace execution rather than read imports.

Anti-Analysis Stack (T1622, T1497.001, T1497.002, T1057)

SilverFox implements a layered anti-analysis stack that would frustrate both automated sandbox detonation and manual debugging:

Software Breakpoint Detection (B0001.025): The loader scans function bodies for 0xCC (INT3) and 0xCD 0x03 byte sequences in a loop. Any debugger that sets software breakpoints will be detected and the process terminates.

PEB BeingDebugged Check (B0001.035): The binary reads the BeingDebugged byte at PEB offset 0x02 via gs:[0x60] β€” a low-level check that operates below the API layer and is invisible to most automated sandbox instrumentation.

Analysis Tool Enumeration: The binary enumerates running processes via CreateToolhelp32Snapshot + Process32FirstW + Process32NextW (T1057) and terminates if any of the following process names are matched: ollydbg, ProcessHacker, ida, ida64, Wireshark, dumpcap, x64dbg, x32dbg, Fiddler, windbg, joeboxcontrol, LordPE, PETools, ImportREC, and additional entries. The actor's familiarity with this specific toolset is notable β€” it covers the standard reverse-engineering stack used by Windows malware analysts.

Stealth Timeout: Sandbox behavioral reports flag a "possible date expiration check, exits too soon after checking local time." The binary appears to have a hardcoded activation window and will silently exit outside of it β€” this explains the relatively low detection ratio of 23/76 at time of analysis, as many sandboxes would have reported a clean run.

Geofencing (T1614.001, T1082): The loader checks keyboard layout, queries system locale via the registry (HKLM\SYSTEM\ControlSet001\Control\Nls\CustomLocale\en-US and ExtendedLocale\en-US), and contains the embedded wide string zh-CHS β€” suggesting the payload activates specifically when Chinese Simplified locale is detected. A non-Chinese system may see no malicious behavior at all.

Dynamic Resolution and Runtime Linking (T1027, T1027.002, T1129)

Beyond the IAT-stripping technique, the binary implements direct PE export table walking β€” parsing IMAGE_EXPORT_DIRECTORY offsets (0x14, 0x18, 0x1C, 0x20, 0x24) to resolve function pointers from already-loaded modules without invoking GetProcAddress in the hot path. CAPA confirms 5+ functions resolved at runtime. This is consistent with a custom API hashing or PEB.Ldr walking routine designed to survive IAT-based detection even during dynamic analysis.

Injection and Execution (T1055.012)

The loader's payload delivery mechanism is process hollowing. Execution flow proceeds as follows: the binary creates a child process in suspended state (CREATE_SUSPENDED), calls VirtualProtect to mark a memory region PAGE_EXECUTE_READWRITE (0x40), writes shellcode or the final payload into the target process via WriteProcessMemory, and resumes the thread. Sandbox telemetry specifically records: "Process software.exe with process ID 6356 wrote to the memory of process handle 0x00000290" β€” with services.exe observed as the injection target.

The binary requires administrator privileges via manifest (requireAdministrator), meaning victims must either already run with elevated rights or explicitly grant UAC elevation. The HR-lure context makes social engineering for this grant plausible β€” a user opening what they believe is a personnel roster from a trusted sender is likely to click through a UAC prompt.

Cryptographic Primitives

Two cryptographic primitives are confirmed in the binary:

  • Mersenne Twister PRNG (C0021): Constants 0x6C078965, 0x9908B0DF, 0x9D2C5680, and 0xEFC60000 are confirmed. MT is likely used to seed session identifiers or generate encryption keys for the C2 channel β€” consistent with a custom binary protocol.
  • Luhn Algorithm (C0032.002): Credit card validation logic is present, raising the possibility that the final payload includes a financial data harvester. This warrants monitoring if the post-exploitation stage is ever recovered.

Persistence (T1197, T1053.005)

The loader establishes persistence through two mechanisms: it activates the BITS and WSearch services, and it creates scheduled tasks under:

C:\Windows\System32\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\
    SvcRestartTaskLogon
    SvcRestartTaskNetwork
    SvcRestartTask

Abusing the SoftwareProtectionPlatform task path is a known living-off-the-land persistence technique β€” it blends with legitimate Windows licensing infrastructure and may be overlooked by endpoint defenders scanning task folders.

Self-Deletion (T1070.004)

After injecting its payload, the binary executes:

C:\Windows\System32\cmd.exe /c timeout 2 & del /f /q "<binary_path>"

The two-second timeout ensures the parent process fully exits before deletion. This behavior was confirmed across all campaign samples β€” it is a hard-coded cleanup routine, not incidental.


Attack Chain

DELIVERY
Spear-phishing email β†’ HR lure attachment
"2026.03.13...δΊΊε‘˜εε•.exe" (Personnel Roster)
  β€” OR β€”
Trojanized legitimate software (LEViewer.exe)

        ↓

EXECUTION (T1566.001, T1036)
Victim launches binary, grants UAC elevation
Anti-debug + anti-VM + geofencing checks run
If any check fails: silent exit

        ↓

INJECTION (T1055.012)
CreateProcess(CREATE_SUSPENDED) β†’ VirtualProtect(RWX)
β†’ WriteProcessMemory β†’ ResumeThread
Target: services.exe / svchost.exe

        ↓

C2 BEACON (T1071.001)
DNS: vbnghyyttz[.]cn β†’ 18[.]163[.]176[.]215
TCP connect to 18[.]163[.]176[.]215:8880
Custom binary protocol (MT-seeded encryption suspected)

        ↓

PERSISTENCE (T1197, T1053.005)
BITS service activation + WSearch
SoftwareProtectionPlatform scheduled tasks written

        ↓

CLEANUP (T1070.004)
cmd.exe /c timeout 2 & del /f /q <binary>

        ↓

POST-EXPLOITATION
Awaiting operator tasking via C2

Infrastructure Analysis

The C2 Domain

vbnghyyttz[.]cn follows a DGA-pattern construction β€” high consonant density, no recognizable word roots, random character distribution. VirusTotal has independently tagged it with the dga label. The domain was registered January 6, 2026 β€” 67 days before the earliest known campaign sample on March 11. This pre-staging gap is an operational signature: the actor builds infrastructure well ahead of deployment, a pattern consistent with planned spear-phishing campaigns rather than opportunistic commodity malware distribution.

The single A record resolves to 18[.]163[.]176[.]215, an Amazon EC2 instance in the ap-east-1 (Hong Kong) region. AWS Hong Kong is a recurring infrastructure preference among Chinese-nexus threat actors due to low latency to mainland targets, regional trust assumptions in network monitoring, and the ease of provisioning cloud infrastructure.

Port 8880 is not a standard application port. The choice may reflect an attempt to blend with HTTP alternate-port traffic or to pass through firewall rules configured only around common web ports (80, 443, 8080). No TLS certificate transparency records exist for the domain, suggesting the C2 channel uses either a custom binary protocol or the loader's own encryption layer β€” with the Mersenne Twister seeded session key as the most probable candidate.

The Attribution Anchor

The registrant data for vbnghyyttz[.]cn represents an unusual and consequential OPSEC failure:

  • Registrant name: 彭本泒 (Peng Benbo)
  • Registrant email: di823748[@]163[.]com
  • Registrar: ζ­ε·žη”΅ε•†δΊ’θ”η§‘ζŠ€ζœ‰ι™ε…¬εΈ (Hangzhou e-commerce technology)
  • Nameservers: ns1[.]22[.]cn, ns2[.]22[.]cn

The 163.com domain is operated by NetEase and is one of the most common personal email providers in China. The use of a personal consumer email β€” rather than a privacy-protected registration or throwaway account β€” indicates either complacency or an assumption that .cn WHOIS data would not be scrutinized. The registrant name has the linguistic structure of a real Chinese personal name and should be treated as a genuine attribution lead.

Critical pivot: The email di823748[@]163[.]com should be queried against all accessible domain registrar WHOIS records, OSINT databases, and certificate transparency logs. If this email was used consistently across the actor's infrastructure registrations β€” even for domains that have since expired β€” it will map the full scope of SilverFox campaign infrastructure.


Defensive Recommendations

Network Controls:

  • Block outbound TCP to 18[.]163[.]176[.]215 on all ports, with priority on port 8880
  • DNS-block vbnghyyttz[.]cn at resolver level
  • Alert on outbound connections to any .cn TLD domain on non-standard ports (not 80/443)

Endpoint Detection:

  • Hunt for scheduled tasks under Microsoft\Windows\SoftwareProtectionPlatform\ β€” specifically SvcRestartTask* variants, which are not created by legitimate Windows components
  • Alert on cmd.exe spawned with arguments matching timeout * & del /f /q pattern β€” this is the self-deletion signature
  • Monitor for BITS service activation events paired with new scheduled task creation in the same session

Process Injection:

  • Alert on CREATE_SUSPENDED process creation followed by WriteProcessMemory into that process from a non-system parent
  • Monitor for VirtualProtect calls setting PAGE_EXECUTE_READWRITE originating from GUI-subsystem executables

File-based:

  • Block execution of PE files requiring requireAdministrator privilege from user-controlled directories (Desktop, Downloads, Temp)
  • Detect on blank PE section names combined with sparse import tables and GetProcAddress/LoadLibraryA presence

Threat Intelligence:

  • Pivot the email di823748[@]163[.]com against registrar WHOIS databases for additional infrastructure discovery
  • Monitor MalwareBazaar for new samples tagged SilverFox or SliverFox submitted by CNGaoLing

Indicators of Compromise

File Indicators

TypeValueContext
SHA-2561d0351d580e3c10a3178b614d70d1867cb003ff8da0a25fbeb1e8a75e0aad68aPrimary sample, 2026-03-13
SHA-1730dac84723982fe9bf65ac086ababb0bbea04c1Primary sample
MD5d9bdc7e6df3245feee2f9666e52ac922Primary sample
Imphash24587f39ebe7f0e9605e30bcc578e5dcShared across campaign variants
SHA-256d58d74c038f96715064d9f28ebb8a2e89c715e11fad04e3011fa76d693fdd296HR lure, 2026-03-11 (earliest known)
SHA-2567303323e80e09defe14742b7196ea1dea891eeb5e24ac88892cea4e9dcb1e4cbLEViewer[.]exe trojanized variant
SHA-256de77a2ad240ad63b1fd22f81bd74a52dc7a82dbf454d02c93bb4cfb50dadc5e2LEViewer[.]exe trojanized variant (higher detections)
SHA-2567c4bbb982d99092e3afa1ea99f0b5b4b24126800db166389f870a335c1ab55cdRandom-named variant (OvQSFwYzIy[.]exe)
SHA-256e84df040392614ea4da94fe085eb2f48afa88271419206fdd90b3cf0a4ac993cRandom-named variant (JeCKLggGkMha[.]exe)
SHA-256a85188389fe806216a778fa48b5dd1af1b41afcf735a10c8efa22784de801445Random-named variant (OTPyJgazJVHZ[.]exe)
Filename2026.03.13...δΊΊε‘˜εε•.exeHR lure: "Personnel Roster"
Filename2026.03.11...δΊΊε‘˜δΏ‘ζ―F@.exeHR lure: "Personnel Information"

Network Indicators

TypeValueContext
Domainvbnghyyttz[.]cnC2 domain, DGA-style, registered 2026-01-06
IP18[.]163[.]176[.]215C2 server, AWS ap-east-1 Hong Kong
IP:Port18[.]163[.]176[.]215:8880Primary C2 beacon endpoint
ASNAS16509Amazon.com, Inc.
PTRec2-18-163-176-215[.]ap-east-1[.]compute[.]amazonaws[.]comReverse DNS
Nameserverns1[.]22[.]cnC2 domain NS
Nameserverns2[.]22[.]cnC2 domain NS

Threat Actor Infrastructure

TypeValueContext
Emaildi823748[@]163[.]comWHOIS registrant β€” pivot target
Name彭本泒 (Peng Benbo)WHOIS registrant β€” attribution anchor
Domainvbnghyyttz[.]cnRegistered 67 days pre-campaign

Host-Based Indicators

TypeValueContext
Scheduled TaskMicrosoft\Windows\SoftwareProtectionPlatform\SvcRestartTaskLogonPersistence
Scheduled TaskMicrosoft\Windows\SoftwareProtectionPlatform\SvcRestartTaskNetworkPersistence
Scheduled TaskMicrosoft\Windows\SoftwareProtectionPlatform\SvcRestartTaskPersistence
ServiceBITSActivated for persistence
ServiceWSearchActivated during execution
Commandcmd.exe /c timeout 2 & del /f /q "<path>"Self-deletion signature
RegistryHKLM\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication\NameBinary name artifact
RegistryHKLM\SYSTEM\ControlSet001\Control\Nls\CustomLocale\en-USGeofence check
RegistryHKLM\SYSTEM\ControlSet001\Control\Nls\ExtendedLocale\en-USGeofence check

MITRE ATT&CK Coverage

TechniqueName
T1566.001Phishing: Spearphishing Attachment
T1059.003Command Shell (self-deletion)
T1055.012Process Injection: Process Hollowing
T1027 / T1027.002Obfuscated Files β€” dynamic import resolution, blank section names
T1129Shared Modules β€” runtime API resolution
T1497.001 / T1497.002Sandbox Evasion β€” system checks + date expiration
T1622Debugger Evasion
T1057Process Discovery
T1082System Information Discovery
T1614.001System Language Discovery
T1070.004Indicator Removal: File Deletion
T1071.001C2 via Application Layer Protocol
T1197BITS Jobs
T1053.005Scheduled Task/Job
T1583.001 / T1583.003Acquire Infrastructure: Domain + VPS
T1036 / T1036.005Masquerading

Conclusion

SilverFox is an active, technically competent campaign targeting Chinese-speaking organizations through HR-themed social engineering. The loader demonstrates investment in evasion β€” layered anti-debug, geofencing, stealth timeouts, dynamic API resolution, process hollowing β€” and the use of BITS plus SoftwareProtectionPlatform scheduled tasks for persistence shows awareness of common detection heuristics. The trojanized LEViewer.exe delivery path expands the attack surface beyond email, suggesting the operator is comfortable with software-based initial access alongside phishing.

But despite this technical maturity, the actor registered their sole C2 domain using what appears to be a real name and a personal Chinese email account. That single mistake collapses a significant portion of the attribution problem and, more practically, gives defenders a durable pivot point: every domain ever registered by di823748[@]163[.]com is now a potential infrastructure node for this campaign.

The domain was registered 67 days before the first known sample. Defenders who monitor WHOIS data for .cn registrations with active C2 patterns, unusual port usage, or DGA-style naming may have had an early detection opportunity here. That gap β€” between infrastructure acquisition and campaign launch β€” is where proactive hunting pays off most.

Organizations with Chinese-speaking employees, HR systems, or a presence in mainland China and Hong Kong should treat the IOCs in this report as active threats and review endpoint telemetry for the behavioral signatures described above, particularly the SoftwareProtectionPlatform task creation pattern and the cmd.exe timeout & del self-deletion chain.

Indicators submitted to MalwareBazaar and ThreatFox. Additional pivot research on di823748[@]163[.]com is ongoing.


Published by Breakglass Intelligence β€” March 13, 2026

Share: