Uncategorized

Unleashing Threats – DeepSeek Installers Spread Sainbox RAT and Concealed Rootkit

A sophisticated new malware campaign has been uncovered by Netskope Threat Labs, targeting Chinese users through fake installers for popular software, including WPS Office, Sogou, and DeepSeek.

The attackers behind this operation deliver advanced threats, including the Sainbox Remote Access Trojan (RAT), a variant of Gh0stRAT, and a Hidden rootkit, disguised as genuine software.

Evidence suggests with medium confidence that the campaign is the work of the China-based Silver Fox threat group, renowned for targeting Chinese-speaking victims using consistent techniques, infrastructure, and tooling.

Technical Analysis: Delivery, Persistence, and Malicious Payload

The scheme begins on phishing websites that mimic official software providers, where victims are tricked into downloading malicious installers.

Netskope researchers observed that most installers were MSI files, with notable exceptions, such as the WPS Office download, which was a PE installer.

Once executed, these files typically run a seemingly legitimate executable named Shine.exe, which is used to sideload a malicious DLL called libcef.dll, while simultaneously installing the legitimate software a clever ruse to avoid detection.

libcef.dll, a counterfeit version of the Chromium Embedded Framework library, executes a multi-stage attack: first, it persists by adding Shine.exe to the Windows Run registry key under “Management.”

Next, it reads shellcode and a malware payload from a file named 1.txt, which, once loaded into memory, is executed as shellcode that reflectsively loads an obfuscated DLL. This payload, Install.dll, contains the Sainbox RAT, a Gh0stRAT variant.

A secondary PE binary embedded in the RAT’s data section is the Hidden rootkit driver.

The RAT delivers complete system control to attackers, enabling data theft, executing additional payloads, and conducting surveillance.

Meanwhile, the Hidden rootkit conceals malicious activities by hiding processes, files, and registry entries, making detection difficult for defenders and endpoint security solutions.

Implications and Ongoing Research

This campaign exemplifies the trend of adversaries leveraging legitimate software brands and open-source tools to deliver sophisticated threats with limited custom development.

The use of commodity RATs and rootkits not only empowers attackers with stealthy persistence but also complicates attribution due to overlapping tactics, techniques, and procedures (TTPs) across different threat groups.

RAT .data chunk containing the rootkit driver payload

Netskope Threat Labs continues to monitor the evolution of the Sainbox RAT and the activities of the Silver Fox group.

Attribution remains an ongoing challenge, as adversaries frequently mask their identities or employ false-flag operations.

For security teams and end users, vigilance against phishing sites, careful verification of installer sources, and prompt analysis of Indicators of Compromise (IOCs) are essential to mitigating such threats.

Indicators of Compromise (IOCs)

  • C2 addresses
45.207.12.71
154.23.221.136
206.119.124.126
  • MSI files (MD5)
F0893BBA522061E58299C295F5838DFC
BA6A4699F59E557537BCB6463B4BA75B
Priya

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago