Threat Advisories:
Hive Pro recognized in Gartner® Magic Quadrant™ for Exposure Assessment Platform, 2025 Watch platform in action

Silver Fox Slips ValleyRAT Into India Through Fake Tax Notices

Red | Attack Report
Download PDF

Silver Fox APT Targets India with Tax-Themed Phishing Campaign Deploying ValleyRAT

Silver Fox, a Chinese-aligned advanced persistent threat group also known as Void Arachne, has executed a highly sophisticated phishing campaign against Indian organizations in December 2025 by impersonating official Income Tax Department communications. This Silver Fox cyber espionage operation represents the first confirmed instance of tax-themed phishing being attributed to the Silver Fox threat actor group, marking a significant tactical evolution in their targeting of Indian enterprises.

The Silver Fox attack campaign deploys the modular ValleyRAT malware through a carefully orchestrated multi-stage infection chain designed for stealth and persistence on compromised Windows systems. Silver Fox operatives utilize phishing emails carrying malicious PDFs crafted to resemble legitimate tax communications from India’s Income Tax Department. The Silver Fox ValleyRAT deployment leverages advanced techniques including registry-based persistence mechanisms, tiered command-and-control infrastructure with failover capabilities, and a plugin-driven architecture enabling credential theft, keylogging, and sophisticated defense evasion.

The Silver Fox Indian campaign specifically targets enterprise, finance, medical, and technology sectors across India, demonstrating the threat actor’s strategic focus on high-value organizations. The ValleyRAT malware deployed by Silver Fox utilizes Donut loaders, DLL hijacking, Windows Update disablement, and process hollowing techniques to maintain covert presence on victim systems. This Silver Fox operation underscores the group’s high operational maturity and evolving cyber-espionage capabilities targeting Indian critical infrastructure and sensitive sectors.

Attack Details

Silver Fox Tax-Themed Phishing Operation Mechanics

Initial Silver Fox Compromise Vector

Silver Fox, the Chinese-aligned advanced persistent threat group, executed a highly refined phishing operation against Indian organizations by masquerading as legitimate correspondence from India’s Income Tax Department. This Silver Fox tax-themed phishing activity marks the first confirmed instance of tax-themed social engineering being attributed to the Silver Fox APT group, representing a significant tactical shift in their Indian targeting operations.

The Silver Fox operation unfolds as a carefully staged intrusion designed for stealth and long-term persistence on compromised Indian enterprise systems. Silver Fox operatives initiate the attack with convincing phishing emails carrying malicious PDFs meticulously crafted to resemble official tax communications from India’s Income Tax Department. When targeted Indian users open the Silver Fox phishing document, it silently initiates the download of a rogue executable named “tax affairs.exe” packaged as a Nullsoft Scriptable Install System installer, serving as the critical entry point for the Silver Fox ValleyRAT deployment.

Sophisticated Silver Fox Infection Chain

From the initial Silver Fox compromise, the campaign escalates through a sophisticated multi-stage infection chain demonstrating advanced adversary tradecraft. The Silver Fox installer exploits DLL hijacking techniques within legitimate software to evade detection, strategically disables Windows Update functionality to weaken host defenses and prevent security patching, and deploys a Donut loader only after conducting extensive anti-analysis and anti-sandbox checks to ensure the Silver Fox malware is operating in a genuine victim environment rather than a security research sandbox.

The Silver Fox malware then employs process hollowing techniques to inject its final ValleyRAT payload into legitimate Windows processes, effectively concealing the Silver Fox malicious presence from traditional security monitoring tools. This Silver Fox process injection approach enables the threat actor to execute malicious code within the security context of trusted system processes.

ValleyRAT Core Capabilities in Silver Fox Operations

At the core of the Silver Fox intrusion is ValleyRAT, a modular remote access trojan specifically engineered for persistence and operational adaptability. The Silver Fox ValleyRAT maintains covert communication with external command-and-control servers built with tiered infrastructure architecture and failover resilience capabilities, ensuring Silver Fox operators maintain persistent access even if primary C2 servers are disrupted or blocked.

The Silver Fox ValleyRAT plugin-based design allows Silver Fox operators to selectively deploy specific capabilities tailored to each compromised Indian organization, including keylogging for credential capture, comprehensive credential theft from browsers and applications, and advanced defense evasion techniques. This modular Silver Fox architecture ensures sustained and flexible control over compromised Indian systems while minimizing the malware footprint and reducing detection probability during the Silver Fox cyber-espionage operations.

Recommendations

Monitor Registry Abuse as Silver Fox Persistence Mechanism

Implement continuous monitoring specifically targeting executable REG_BINARY values and anomalous registry entries under non-standard Windows registry paths such as HKCU\Console*, with particular scrutiny on registry keys written by user-level processes rather than trusted system components. Silver Fox leverages registry-based persistence as a primary mechanism for maintaining long-term access to compromised Indian systems.

Hunt for Silver Fox Signed Binary Abuse with DLL Hijacking

Correlate execution of signed executables launched from temporary or user-writable directories with the loading of unsigned local DLLs, particularly when followed by immediate thread creation or abnormal execution flow patterns characteristic of Silver Fox operations. This detection approach identifies Silver Fox DLL hijacking attempts used to execute ValleyRAT while evading application whitelisting and signature-based detection.

Instrument Memory Permission and Silver Fox Injection Anomalies

Alert on processes allocating PAGE_EXECUTE_READWRITE memory permissions followed by remote or local thread creation, especially when these suspicious actions occur inside normally benign processes such as explorer.exe. This detection strategy identifies Silver Fox process hollowing and in-memory payload staging techniques used to inject ValleyRAT into legitimate Windows processes.

Endpoint and Network Defense Enhancements Against Silver Fox

Deploy endpoint detection and response tools specifically tuned to identify Silver Fox tradecraft including DLL sideloading and process injection attempts characteristic of ValleyRAT deployment. Monitor for suspicious persistence methods employed by Silver Fox including Windows services, scheduled tasks, and registry entries. Inspect network traffic for command-and-control activity patterns associated with Silver Fox ValleyRAT infrastructure, focusing on the tiered C2 architecture with failover capabilities used by this threat actor group.

MITRE ATT&CK TTPs

  • T1566: Phishing
  • T1566.001: Spearphishing Attachment
  • T1204: User Execution
  • T1204.002: Malicious File
  • T1059: Command and Scripting Interpreter
  • T1106: Native API
  • T1129: Shared Modules
  • T1620: Reflective Code Loading
  • T1547: Boot or Logon Autostart Execution
  • T1547.001: Registry Run Keys / Startup Folder
  • T1112: Modify Registry
  • T1574: Hijack Execution Flow
  • T1574.001: DLL
  • T1218: System Binary Proxy Execution
  • T1027: Obfuscated Files or Information
  • T1497: Virtualization/Sandbox Evasion
  • T1562: Impair Defenses
  • T1562.001: Disable or Modify Tools
  • T1489: Service Stop
  • T1057: Process Discovery
  • T1082: System Information Discovery
  • T1056: Input Capture
  • T1056.001: Keylogging
  • T1071: Application Layer Protocol
  • T1071.001: Web Protocols
  • T1095: Non-Application Layer Protocol
  • T1105: Ingress Tool Transfer
  • T1573: Encrypted Channel
  • T1008: Fallback Channels
  • T1041: Exfiltration Over C2 Channel

Indicators of Compromise (IoCs)

SHA256 Hashes:

  • 77ea62ff74a66f61a511eb6b6edac20be9822fa9cc1e7354a8cd6379c7b9d2d2
  • fa388a6cdd28ad5dd83acd674483828251f21cbefaa801e839ba39af24a6ac19
  • f74017b406e993bea5212615febe23198b09ecd73ab79411a9f6571ba1f94cfa
  • 068e49e734c2c7be4fb3f01a40bb8beb2d5f4677872fabbced7741245a7ea97c

Malicious Domains: ggwk[.]cc, b[.]yuxuanow[.]top, itdd[.]club, xzghjec[.]com, gov-a[.]work, gov-a[.]fit, gvo-b[.]club, gov-c[.]club, gov-a[.]club, govk[.]club, dingtalki[.]cn, hhiioo[.]cn, kkyui[.]club, hhimm[.]work, swjc2025bjkb[.]cn, 2025swmm[.]cn, hhiioo[.]work

C2 IP Addresses: 45[.]207[.]231[.]94, 103[.]20[.]195[.]147, 45[.]207[.]231[.]107, 8[.]217[.]9[.]165, 160[.]124[.]9[.]103, 47[.]239[.]225[.]43, 43[.]100[.]22[.]158, 43[.]100[.]123[.]207, 43[.]100[.]63[.]145

References

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox