Back to reports
criticalAPT

ValleyRAT Surge: 20 Samples in 4 Days as Silver Fox Accelerates Campaign

PublishedMarch 12, 2026
Threat Actors:ProfileAssessmentTimeline (2024-2026)
aptdll-sideloadingphishingc2exploitspearphishing


title: "ValleyRAT Surge: 20 Samples in 4 Days as Silver Fox APT Accelerates Multi-Vector Campaign With BYOVD and DLL Sideloading" subtitle: "A DLL payload joins an unprecedented wave of ValleyRAT deployments across MSI installers, EXEs, and archives -- backed by 22 C2 IPs, the Winos 4.0 framework, and a vulnerable driver that kills Windows Defender" tags: ["ValleyRAT", "Silver-Fox", "DLL-sideloading", "BYOVD", "Winos", "APT", "China", "stealer"]

ValleyRAT Surge: 20 Samples in 4 Days as Silver Fox Accelerates Campaign

Twenty ValleyRAT samples submitted to MalwareBazaar in four days. DLLs, EXEs, MSI installers, ZIP archives -- every delivery vector in the playbook. This is not a drip campaign. This is Silver Fox APT flooding the zone.

A new DLL payload (SHA256: fa61bf2cdef96ac5cb948e0f69863c4b23b1f509ad7ce5b9b8b811faca5cfba2, 373KB) was uploaded on March 12, 2026. Cross-referencing with two prior Breakglass Intelligence investigations reveals it belongs to a unified March 2026 campaign wave that has deployed 22 unique C2 IP addresses and 30+ domains across Alibaba Cloud, Tencent Cloud, SpeedVM, Vultr, Cloud Innovation (Seychelles), and Microsoft Azure. The campaign uses the "codemark" builder variant, XOR-encrypted configs, DLL sideloading through legitimate applications (Douyin, Microsoft Teams, tax software), and a vulnerable driver (wsftprm.sys) that terminates Windows Defender at the kernel level.

Key Findings

  • 20 samples in 4 days (March 8-12): The highest upload velocity observed for ValleyRAT on MalwareBazaar, with 8 explicitly tagged SilverFox
  • DLL sideloading payload: 373KB DLL matches the documented tier0.dll / sscronet.dll pattern used with Douyin, Microsoft Teams, and tax software executables
  • BYOVD (Bring Your Own Vulnerable Driver): wsftprm.sys (Topaz OFD) driver kills Protected Process Light security agents including Windows Defender
  • 22 C2 IPs mapped across the broader campaign, with TEDDY2012 hostname OPSEC failure on Vultr Singapore node
  • Multi-provider infrastructure: Deliberate hosting diversification across 7+ cloud providers and 3+ registrars
  • Builder leak acceleration: Public leak of ValleyRAT builder on GitHub in March 2025 produced ~6,000 samples in 12 months, with 85% appearing in the latter half
  • Expanding targets: Chinese-speaking users, Taiwanese organizations (tax/e-invoice lures), and US/Canadian healthcare (trojanized DICOM viewers)

Attack Chain

[Initial Access]
  |-- SEO Poisoning (fake Chrome/Teams/Huorong AV)
  |-- Spearphishing (tax lures, payroll documents)
  |-- Trojanized software (Foxit Reader, WPS Office)
      |
      v
[DLL Sideloading]
  Legitimate .exe loads malicious DLL (tier0.dll, sscronet.dll, etc.)
      |
      v
[BYOVD: wsftprm.sys]
  Vulnerable Topaz OFD driver loaded via NtLoadDriver
  IOCTL calls kill PPL security processes (Windows Defender)
      |
      v
[XOR Config Decryption]
  Single-byte XOR (0x44 / 0xDC / 0x36 / 0x27)
  "codemark" campaign marker validation
      |
      v
[C2 Establishment]
  TCP port 6666 / 8888 / custom
  22 IPs across 7+ cloud providers
      |
      v
[Plugin Deployment]
  File management, screen capture, keylogger
  Registry-resident for fileless persistence

The BYOVD Problem

The campaign's most concerning capability is its integration of wsftprm.sys, a legitimately signed driver from Topaz OFD with a known vulnerability. The attack flow:

  1. Elevate privileges: UAC bypass via COM hijacking (ICMLuaUtil / CMSTP / fodhelper)
  2. Load vulnerable driver: NtLoadDriver via ntdll.dll native API resolution
  3. Kill security processes: IOCTL calls to terminate Protected Process Light agents
  4. Windows Defender dies: The primary consumer endpoint protection is eliminated before any malicious payload executes

This is not theoretical. The driver is signed, so Windows loads it without complaint. The IOCTL interface provides kernel-level process termination. And the technique has been active in the March 2026 campaign wave.

Infrastructure Scale

The March 2026 campaign uses deliberate hosting diversification:

ProviderIPsRegion
Alibaba Cloud4China
SpeedVM/ANTBOX3Asia
Tencent Cloud2China
Vultr1Singapore
Cloud Innovation1Seychelles
Microsoft Azure1Global
Cogent Communications1US

OPSEC failure: The Vultr Singapore node (207[.]148[.]123[.]69) has hostname TEDDY2012 -- a personal identifier that links across multiple C2 servers in the campaign.

Registrar clustering: Gname.com (Singapore) serves as the primary registrar with share-dns.net/share-dns.com nameservers, creating a fingerprint that connects 30+ domains to the same operator.

IOCs

Primary Sample:

TypeValue
SHA256fa61bf2cdef96ac5cb948e0f69863c4b23b1f509ad7ce5b9b8b811faca5cfba2
Size373,760 bytes
TypeDLL

Selected C2 IPs (from broader campaign):

207[.]148[.]123[.]69   # Vultr Singapore (TEDDY2012)
108[.]187[.]4[.]192    # Cross-investigation overlap
108[.]187[.]7[.]232    # Cross-investigation overlap

BYOVD Driver:

  • wsftprm.sys (Topaz OFD) -- legitimately signed, vulnerable to IOCTL-based process termination

MITRE ATT&CK

TechniqueIDApplication
DLL Side-LoadingT1574.002Legitimate apps load malicious DLLs
Exploitation for Defense EvasionT1211BYOVD wsftprm.sys kills Defender
Subvert Trust Controls: Code SigningT1553.002Signed vulnerable driver loaded by OS
UAC BypassT1548.002COM hijacking (ICMLuaUtil/CMSTP/fodhelper)
Modify RegistryT1112Registry-resident fileless plugins
Screen CaptureT1113Differential screen capture module
Input Capture: KeyloggingT1056.001SetWindowsHookEx keylogger
Application Layer ProtocolT1071.001HTTP/TCP C2 on multiple ports

Conclusion

Silver Fox is operating at a tempo that commodity malware operators would envy. Twenty samples in four days, 22 C2 IPs, 7+ hosting providers, multiple delivery vectors, and a BYOVD capability that neutralizes endpoint protection before the real payload runs. The public builder leak in March 2025 accelerated sample proliferation, but the coordinated infrastructure and consistent "codemark" builder variant indicate a centralized operation, not scattered copycats. The targeting expansion from Chinese-speaking populations to Taiwan, Japan, Malaysia, and US/Canadian healthcare makes this a global concern. Hunt for the wsftprm.sys driver load, monitor Gname.com-registered domains with share-dns.net nameservers, and track the TEDDY2012 hostname across your network logs.

Share