A malicious marketing campaign has emerged, focusing on Chinese language-speaking customers by faux installers of common software program equivalent to WPS Workplace, Sogou, and DeepSeek.
This operation, attributed with medium confidence to the China-based adversary group Silver Fox, leverages phishing web sites that mimic legit software program portals to distribute malware payloads, primarily within the type of MSI information.

Subtle Phishing Marketing campaign
These misleading installers not solely set up the real software program to keep up an phantasm of legitimacy but additionally deploy the Sainbox RAT a variant of the notorious Gh0stRAT and a modified model of the open-source Hidden rootkit, enabling attackers to achieve stealthy, persistent management over compromised methods.
The an infection begins when unsuspecting customers go to counterfeit web sites designed to resemble official pages for extensively used Chinese language software program.
Upon clicking the obtain button, victims are redirected to a malicious URL that delivers a faux installer.

Netskope’s evaluation reveals that the majority of those installers are MSI information, with the WPS Workplace variant being a PE executable.
Specializing in the MSI information, the execution course of entails operating a legit binary named “Shine.exe,” which side-loads a malicious DLL referred to as “libcef.dll,” a counterfeit model of the Chromium Embedded Framework library. Concurrently, the real installer proceeds usually to keep away from suspicion.
Technical Breakdown of the An infection Chain
Throughout this course of, a file named “1.txt” is dropped, containing shellcode and a malware payload.
When Shine.exe calls the “cef_api_hash” operate within the malicious DLL, it units up persistence by including itself to the Home windows registry Run key underneath the title “Administration.”
It then reads the contents of “1.txt” into reminiscence, redirecting management to the shellcode a 0xc04-byte phase primarily based on the open-source sRDI instrument for reflective DLL injection.
This shellcode hundreds a hidden DLL named “Set up.dll” from inside 1.txt, invoking its exported operate “Shellex” to provoke the primary malicious exercise.
Additional examination by Netskope recognized the DLL payload as Sainbox RAT, which embeds one other PE binary in its .information part a rootkit driver derived from the Hidden mission.
This rootkit, put in as a service named “Sainbox” by way of the NtLoadDriver operate, employs mini-filters and kernel callbacks to cover processes, information, and registry entries, whereas additionally defending itself and related processes from termination.
This stealth mechanism ensures that the RAT can function undetected, granting attackers full management over the sufferer’s machine for actions like information exfiltration and extra payload deployment.
The usage of open-source instruments and commodity malware like Gh0stRAT variants highlights how adversaries can obtain refined assaults with minimal customized improvement.
Netskope Menace Labs continues to trace the evolution of Sainbox RAT and Silver Fox’s ways, methods, and procedures, noting the medium confidence attribution because of constant patterns in phishing infrastructure, focusing on, and tooling.
Whereas acknowledging the inherent challenges in definitive adversary identification because of potential false-flag operations and shared sources amongst risk teams.
This marketing campaign exemplifies the rising abuse of common software program manufacturers and AI instruments as lures in cybercrime, urging customers to stay vigilant and confirm obtain sources.
Discover this Information Fascinating! Comply with us on Google Information, LinkedIn, and X to Get Prompt Updates