Silver Fox’s Dual-Pronged Strategy: Dissecting the ValleyRAT Distribution Campaign

The Silver Fox APT group employs a sophisticated, hybrid distribution strategy to maximize the reach of their custom-built ValleyRAT trojan, primarily aimed at Chinese-speaking victims. Rather than relying on a singly infection method, the group employs a multi-medium strategy to achieve both precision and scale.

On one front, Silver Fox executes highly targeted phishing operations, carefully timed to coincide with regional tax deadlines in Southeast Asia. Simultaneously, they operate widespread malvertising campaigns intended to infect Chinese-speaking users seeking to download trusted utilities such as Zoom, ToDesk and Notepad++. This duality enables the group to pursue specific high-value targets while passively accumulating a broader victim pool.

This blog analyses the technical, multi-stage infection chains observed in recent attacks – ranging from opportunistic infections via trojanised installers to targeted corporate tax -themed phishing.  

Casting a Wide Net: Opportunistic Infection via Watering Hole Attacks

Silver Fox has conducted multiple watering hole attacks since 2023, weaponising trusted brands to deliver their final-stage payload, ValleyRAT. These campaigns leverage trojanised installers impersonating widely used applications, promoted via malicious advertisements (malvertising) for opportunistic, widespread infection.

Infection Chain 1: The Trojanised Zoom Installer

Initially, we observed Silver Fox pushing trojanised versions of the Zoom installers; resulting in a multi-stage infection flow to deploy the final ValleyRAT payload.

Figure: Zoom Installer Payload (ZoomInstallerFull_dll_vocfk_pl.msi  b28731f2782b77e6651260d40247b8d6119236d2361daba7c95a4d7d3c9a94c9)

During its installation process, the dropped MSI file loads a malicious DLL file, EnumW.dll (c23b2ca4318d65734d545de49623c158b7f995cfaf627ab57fff5ef836dc2975).

Figure: MSI Custom Action to load EnuW.dll  

Upon being loaded, EnumW.dll drops multiple encrypted files to %Programdata%\Data_Xowlls\temp_data_{1-55}, and subsequently decrypts each file via a custom XOR routine and concatenates the decrypted data into an archive file; ProgramData%\emoji.dat (0be98eebe044dab704e435a1cd71f348e31508b8c423e7bc09ba84f113a000d1).

The malware then extracts the contents of this archive; a collation of benign system files, shellcode, and a malicious DLL. 

Figure: emoji.dat archive contents

It then executes the legitimate file edr09.exe, which is vulnerable to DLL sideloading, to load the malicious file vsdtdib.dll. The DLL drops another archive file, C:\Users\{user}\resource.dat:

Subsequently, it reads the shellcode from C:\Users\{user}\zndiouasnd{9 random number}\emjio.tmp and creates the following registry:

  • Key: HKCU\Software\DeepSer
    • Data: OpenAi_Service
      • Value:  %appdata%\Nxonq1284_QUC\rhabarbaric.exe
    • MyData
      • Value: {shell code}
    • Onload1
      • Value: C:\Users\{user}\zndiouasnd{9 random number}\edr09.exe

Figure: Registry Key Creation

To establish persistence, the payload modifies the Startup registry value in  “HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\Startup” to “C:\ProgramData\Venlnk\”. This ensures its components are automatically executed at startup.

It subsequently drops the following LNK file; C:\ProgramData\Venlnk\GooglUpdata.lnk – a shortcut LNK that executes %appdata%\Nxonq1284_QUC\rhabarbaric.exe.

Figure: GooglUpdata.lnk executes rhabarbaric.exe

Finally, the malware creates an explorer.exe process in a suspended state and injects the malicious shellcode stored in the registry (HKCU\Software\DeepSer\MyData) via process hollowing.

Figure: Process Hollowing

This complex chain results in the delivery and execution of the final-stage payload, ValleyRAT, which then attempts to establish connection to the attacker-controlled C2 server (154.82.85[.]102:5178).

Figure: C2 Connection

Infection Chain 2: The Malicious ToDesk Installer

In another campaign, we observed the delivery of ValleyRAT via a trojanised installer for ToDesk, a remote desktop application popular in Chinese-language communities. The use of this software and phishing content written in Simplified Chinese indicates this campaign specifically targeted Chinese-speaking users.

Figure: ToDesk phishing site (tdzbx1[.]top)

Figure: ToDesk_4.8.1.2.exe (e7d58498dd29791c65df464fb2b87ec01f50cd74)

Upon execution, the malware runs the following commands to exclude its directories from antivirus scanning and to execute a malicious DLL:

cmd.exe /C powershell.exe -ExecutionPolicy Bypass -Command Add-MpPreference -ExclusionPath C:\, D:\;

rundll32.exe  C:\Users\infect_Win7\AppData\Roaming\TrustAsia\intel.dll,DllRegisterServer

Figure: PowerShell process and execution of intel.dll

The malicious DLL (intel.dll – 5515b1dd851a6817b1923116bcb5cda3d23e7eec) reads shellcode from a local configuration file (Config2.json or Config.json) in the current directory and proceeds to attempt connection to  161.248.15[.]109:18852 to retrieve the final payload. Notably, we observed intel.dll signed by 湖南南澳网络科技有限公司; an organisation repeatedly associated with infrastructure serving other malware strains, such as PlugX and malicious Android Package Kit (APK) files.

Figure: intel.dll attempts C2 connection

The C2 server responds with a shellcode that contains the final payload, ValleyRAT.

Figure: Shellcode containing ValleyRAT

Upon retrieval and execution, ValleyRAT establishes connection to its primary C2 (161.248.15[.]109:5050) and awaits further commands from the actor.

Infection Chain 3: Notepad++

Most recently, we tracked an ongoing campaign delivering ValleyRAT via a trojanised Notepad++ installer. Whilst the language options indicate continued targeting against Chinese-speaking audiences, we observe via the availability of English as well as telemetry data that the infrastructure associated with the active campaign has reached international audiences.

Figure: Notepad++12.21.zip (af41142a512ff7cbefee6c2fb8a8151be8c33b2fd8694765b3eb5d62ab6280d3)

Silver Fox’s Regional Tax Tour

In parallel, during our routine threat hunting for active phishing campaigns targeting Hong Kong citizens, we uncovered a more deliberate strategy behind ValleyRAT distribution. Differing from the wide-net, opportunistic approach seen with the trojanised Zoom and ToDesk installers, this vector demonstrated a level of precision and forethought indicative of a more sophisticated operation.

Instead of targeting individual users, these campaigns were meticulously crafted to infiltrate specific corporate entities. By spoofing regional government tax authorities and creating highly convincing lures themed around urgent tax compliance matters, Silver Fox aimed its attacks directly at employees in finance or compliance roles. This tactic was designed to pressure these specific personnel into taking immediate action, effectively bypassing typical user skepticism and leading directly to the compromise of high-value corporate networks for the likely purpose of espionage or financial theft.

Infection Chain 4: The Tailored Tax Lures

In October 2025, Silver Fox actively spoofed the Hong Kong Inland Revenue Department (HKIRD), which led us to identify additional phishing sites impersonating Singapore’s Inland Revenue Authority (IRAS). Notably, both sets of sites were  hosted via the same IP address 154.9.24[.]93, suggesting a coordinated campaign operating within the same attack window.

Figure: Sample phishing pages

Victims were directed to these sites via phishing emails containing a PDF claiming in the country’s native language: “Translated: This notice informs you that your company must complete all compliance matters required by the above notice within three [3] days of receiving this letter”.

Figure: PDF sample containing malicious link directing to hxxp[:]//zhenkinyszd[.]host

Clicking on the embedded link directs the victim to their malicious domain (hxxp[:]//zhenkinyszd[.]host), which then redirects the victim to a Chinese cloud storage platform, vip.123pan[.]cn.

The victim downloads the shared archive file (7e5552daba7a05f26ee5ac22d22ff09f8087d8cf63e2e972d7235e31237b9a24), which contains the ValleyRAT malware binary disguised as   “審核通告.exe (translated: audit.exe)” (af95ba66cde0562bbe69a4fef1e37916f2e1e6226f98052c9044732ca423eb08).

The Payload: A Closer Look at ValleyRAT

The primary payload delivered in these campaigns is ValleyRAT (a.k.a. WinOS), a multi-stage Windows-based Remote Access Trojan (RAT). First observed in early 2023, ValleyRAT has undergone multiple enhancements, exhibiting advanced evasion mechanisms and several functions for full system control. ValleyRAT is reported to be developed and exclusively used by the Silver Fox APT group to facilitate long-term persistence and data exfiltration.

The malware leverages a multi-layered infection chain, evidenced above, to maximise stealth. Once executed, ValleyRAT establishes a connection to its C2 servers, and extracts the following system information:

  • /config/info
  • /api/encrypt/_rsa_public_key
  • /api/filedistribution/_file_distribution_by_uid
  • /api/encrypt/_secret_key
  • /operation/terminal_load
  • /terminal/info
  • /flow/is_approver
  • /flow_task_notice/_real_notice_by_uid
  • /work_order_notice/_all_notice_by_user
  • /task_manager/_all_task_manager_pending
  • /config/info
  • /monitor/record
  • /terminal/basicinfo
  • /terminal/packedinfo
  • /app/iconset

With an established foothold, it grants the attacker extensive control over the compromised host, including:

  • Reconnaissance: Harvesting system information, user lists, and installed software.
  • Keylogging: Taking screenshots, screen recording, and capturing keystrokes.
  • File Manipulation: Uploading, downloading, and executing further payloads.
  • Persistence: Modifying registry keys to ensure the malware survives reboots.
  • C2 Communication: Communicating with Command and Control servers via HTTP/TCP sockets to receive instructions.

A snippet of its backdoor commands is provided below:

CommandsDescription
0x00Return Sucess
0x01Save plugin information to registry and load the plugin
0x02Load the plugin
0x04Reconnect
0x05Updates host info in INI file
0x0ASaves C2 server info to registry
0x0BUpdate connection information
0x0CShow MessageBox
0x0DCDownloads and executes file
0x0FExecute Commands
0x10Start USDT/ETH Clipboard Monitoring
0x11Stop USDT/ETH Clipboard Monitoring

Figure: Snippet of Backdoor Commands

Outlook: Predicting Silver Fox’s Next Moves

From mid-November to the end of December 2025, we observed Silver Fox’s tax lures reach a new audience; India. This was discovered via the registration of cbicgov[.]com, a domain impersonating the Indian tax department, hosted on an IP (192.151.255[.]215) historically used for Hong Kong tax-themed phishing domains (e.g., irdtci.hk.cn). Public reporting of these attacks confirmed that Silver Fox reused the lure of company tax compliance issues, with phishing content written in Hindi.

Figure: cbicgov[.]com impersonating Indian tax department

This pattern led to our hypothesis that the timing of Silver Fox’s country-specific campaigns is highly intentional and closely aligned with local tax deadlines. Backtracking to early 2025, Taiwan was the first reported target of this “Regional Tax Tour”.[1] Taiwanese organisations were hit with similar “subject to tax audit” notifications in January 2025, which closely aligned with the peak period for closing out the previous year’s books. History has since repeated itself, with Taiwanese organisations again facing the tax-themed traps in January 2026.[2]

Based on the statutory tax calendars of major APAC economies, we hypothesised earlier this year that Silver Fox would likely pivot their infrastructure to target (or re-target) Taiwan, Japan, Indonesia, and/or South Korea in the first half of 2026. This has already been the case in terms of Taiwan, leading us to further hypothesise that previously hit locales such as Singapore, Hong Kong, and India are most likely face (repeated) targeting as the next round of deadlines approach. Defenders in these locales should heighten vigilance and raise user awareness of tax-related phishing attempts in the months prior to key taxation deadlines.

On the flipside, we observe via our continuous tracking and open-source reporting that Silver Fox’s watering hole attacks persist, with a plenitude of brands serving as their trojan horse for infection. We anticipate that Silver Fox will routinely launch opportunistic campaigns to passively widen their victim base, broadly focusing on Chinese-speaking audiences in Southeast Asia.

On the flipside, we observe via our continuous tracking and open-source reporting that Silver Fox’s watering hole attacks persist, with a plenitude of brands serving as their trojan horse for infection. We anticipate that Silver Fox will routinely launch opportunistic campaigns to passively widen their victim base, broadly focusing on Chinese-speaking audiences in Southeast Asia.

Conclusion

Silver Fox’s latest campaign demonstrates a notable evolution in their operational maturity and flexibility. The group operates a dual-pronged distribution strategy to meet diversified objectives.

The tax-themed phishing campaigns represent a highly targeted, intelligence-driven approach. They are carefully timed to coincide with regional tax deadlines, localized in native languages, and aimed at finance and compliance personnel within specific geographies. This precision suggests a primary objective of espionage and data exfiltration from organisations of strategic interest.

In contrast, the concurrent distribution of ValleyRAT via trojanized Zoom and ToDesk installers reflects a more opportunistic, wide-net strategy. By leveraging malvertising and popular software lures, Silver Fox casts a broader net, indiscriminately compromising victims who are simply seeking to download legitimate applications. This opportunistic vector points to secondary motives that may include financial gain through credential theft, cryptocurrency mining, or the sale of access to compromised networks.

The coexistence of these two distinct approaches demonstrates Silver Fox’s operational flexibility. It serves as a critical reminder for defenders that threat actor motives can be multifaceted. Organisations must recognize that even if they are outside a group’s apparent geographic or industrial focus for targeted attacks, they may still fall victim through the more indiscriminate malvertising vector.

Recommendations

Preventive
  • Harden Email Gateway: enforce SPF/DKIM/DMARC, enable URL rewriting and sandboxing for attachments, and block or sandbox MSI/EXE attachments.
  • User Awareness: Finance and HR departments in the forecasted regions should be briefed on the common reuse of tax and “Urgent Compliance” themes, including advice on how to verify links, and how may they report suspected phishing emails. Consider running tailored phishing simulation tests two-months prior to key tax deadlines.
  • Brand Reputation Monitoring: conduct 24×7 young domain monitoring to proactively uncover potential phishing campaigns impersonating your organisation.

Detective
  • Security Operations Centre (SOC) Monitoring: Perform 24×7 SOC monitoring to detect for anomalous behavioural patterns such as unauthorised software installations, outbound traffic to untrusted cloud storage platforms, DLL sideloading and/or process hollowing attempts, etc.
  • Endpoint Hardening: Ensure EDR solutions are configured to flag the specific process hollowing techniques (e.g., injections into explorer.exe) and registry modifications (User Shell Folders) detailed in this report.
    • For example,  Alert on process hollowing, creation of suspended explorer.exe, and unusual DLL sideloading (e.g., edr09.exevsdtdib.dll). Hunt for registry keys: HKCU\Software\DeepSer and Startup path changes to C:\ProgramData\Venlnk\.
    • Detect LNK files in C:\ProgramData that execute AppData binaries (e.g., GooglUpdata.lnkrhabarbaric.exe).
  • Network Security: Monitor outbound connections to unusual TCP ports and the C2 IPs above; flag long‑lived HTTP/TCP sessions and beaconing patterns.
  • Security Information and Event Management (SIEM): Create SIEM queries for DNS requests to newly registered tax‑like domains and for downloads of .msi/.exe from external webmail or short URLs.

Indicators of Compromise

IOCType
www[.]sgaporein[.]xyzDomain
www[.]uiwszxc[.]xyzDomain
www[.]sting[.]xyzDomain
zhenkinyszd[.]hostDomain
irdtci[.]hk[.]cnDomain
www[.]irdtci[.]hk[.]cnDomain
irassg[.]cnDomain
cbicgov.comDomain
irdghk.xyzDomain
vip.123pan[.]cn/1851739265/23766152URL
vip.123pan[.]cn/1851739265/23837948URL
206.238.220[.]215IP Address
154.9.24[.]93IP Address
154.82.85[.]102IP Address
161.248.15[.]109IP Address
192.151.255[.]215IP Address
5515b1dd851a6817b1923116bcb5cda3d23e7eecSHA1
7e5552daba7a05f26ee5ac22d22ff09f8087d8cf63e2e972d7235e31237b9a24SHA256
01487c0a98d57ab74390cd4313f554c2c84ae974631e8ae4d1eab4d349fc9896SHA256
a7704876121825ee323cf2ecfe78302bfef83874f098cbbd80cec55926b041eeSHA256
b28731f2782b77e6651260d40247b8d6119236d2361daba7c95a4d7d3c9a94c9SHA256
c23b2ca4318d65734d545de49623c158b7f995cfaf627ab57fff5ef836dc2975SHA256
0be98eebe044dab704e435a1cd71f348e31508b8c423e7bc09ba84f113a000d1SHA256
7e5552daba7a05f26ee5ac22d22ff09f8087d8cf63e2e972d7235e31237b9a24SHA256
af95ba66cde0562bbe69a4fef1e37916f2e1e6226f98052c9044732ca423eb08SHA256
hxxps://m76.cdn-ccdown[.]com/Notepad++12.21.zipURL
hxxps://m76.cdn-ccdown[.]com/Notepad++12.21.zipURL
hxxps://github.zh-cns[.]top/down/latestURL
hxxps://github.zh-cns[.]top/down/latestURL
b94c54290015ed751c84d0a9bfa6e63481c72c0d7528b4b65a2816f72ea5c994SHA256
hxxps://m76.cdn-ccdown[.]com/Notepad++.zipURL
72578780c616b66e10d46de44e21fffc319207dd727653a211cd63727885cc3dSHA256
hxxps://jm2026118.tos-cn-beijing.volces[.]com/tax_RX3000.rarURL
jcfash.hk[.]cnDomain
sgowin[.]cnDomain
sginxg[.]xyzDomain
sgaporein[.]xyzDomain
f107c32b4df3be98560da44c4eb2c3a94e49c95b13815df284b81437735e2dfbSHA256
192.238.180[.]163IP Address

YARA Rules

rule Obfuscated_ValleyRat
{
meta:
author = "PwC Darklab"
description = "Detects the obfuscation use by the SilverFox malware"
hash1="af95ba66cde0562bbe69a4fef1e37916f2e1e6226f98052c9044732ca423eb08"
hash2="c23b2ca4318d65734d545de49623c158b7f995cfaf627ab57fff5ef836dc2975"
target_entity = "file"
strings:
$a1 = "Reconsider your life choices"
$a2 = "Stop reversing the binary"
$a3 = "And go touch some grass"
//dummy funcs
$b1 = {CC CC CC CC B0 02 C3 CC CC CC CC}
$b2 = {CC CC CC CC 32 C0 C3 CC CC CC CC}
$b3 = {CC CC CC CC B0 03 C3 CC CC CC CC}
$b4 = {CC CC CC CC B0 06 C3 CC CC CC CC}
$b5 = {CC CC CC CC B0 07 C3 CC CC CC CC}
$b6 = {CC CC CC CC B0 09 C3 CC CC CC CC}
condition:
all of ($a*) or all of ($b*)
}

rule ValleyRat_Loader
{
meta:
author = "PwC Darklab"
description = "Detects the ValleyRat Loader"
hash1="2b2e3840daa587f5e3deca46ce2a5d6a5d5fb08a60445fb045b6bb29ed3a7094"
hash2="c89b43e4cff3ad2d7cb7a80e5a929266d7614e4f21a03d0f7ab5ea6ea58ed69b"
target_entity = "file"
strings:
$a1 = ",10231,109,112,46,97" //mutex
$a2 = {5C 54 72 75 [0-10] 73 74 41 73 } //TrustAsia
$a3 = {43 6F 6E 66 [0-10] 69 67 2E 6A } //Config.json
$a4 = {43 6F 6E 66 [0-10] 69 67 32 2E } //Config2.json
$b1 = "ZwCreateSection"
$b2= "ZwMapViewOfSection"
$b3= "CreateProcessA"
$b4= "GetThreadContext"
$b5= "SetThreadContext"
$b6= "ResumeThread"
//Software\DeepSer
$b7 = {53 00 6F 00 00 00 00 00 66 00 74 00 00 00 00 00
77 00 61 00 72 00 00 00 65 00 5C 00 44 00 65 00
65 00 70 00 00 00 00 00 53 00 65 00 72 00 00 00
4D 00 79 00 44 00 61 00 74 00 61 00 00}
condition:
all of ($a*) or all of ($b*)
}

rule ValleyRat_Shellcode
{
meta:
author = "PwC Darklab"
description = "Detects the ValleyRat Shellcode"
hash1="38830f4c54f0caa60187e67c80e4e9dddf103d02fae8aae8fe9b43fcf08c4677"
hash2="c250783846d5de0379e2da6286f554f516f2a3b7ce585c44036d2739be5d396e"
target_entity = "file"
strings:
$a1 = "\\Release\\Code_Shellcode"
$a2 = {81 EC 14 01 00 00 53 55 56 57 6A 6B 58 6A 65 66 89 84 24 CC 00 00 00 33 ED 58 6A 72 59 6A 6E 5B 6A} //forming kernel32 string
$c1 ={48 89 5c 24 08 48 89 6c 24 10 48 89 74 24 18 57 41 56 41 57 48 81 ec 00 05 00 00 33 ff 48 8b d9 39 b9 38 02 00 00 0f 84 ce 00 00 00 4c 8b 41 28 48 8b 91 88 00 00 00 e8} // start of shellcode
condition:
all of ($a*) or $c1
}

Further Information

We are committed to protecting our clients and the wider community against the latest threats through our dedicated research and the integrated efforts of our red team, blue team, incident response, and threat intelligence capabilities. Feel free to contact us at [darklab dot cti at hk dot pwc dot com] for any further information.

Phishing Vessels

Loki Bot campaign targets maritime industry

DarkLab intelligence analysts detected a Loki Bot phishing campaign targeting the maritime and engineering sectors in Europe, Asia and the US from spoofed email addresses of legitimate organisations in Asia.

Figure 1 – Countries of origin of phishing recipients (blue) and legitimate organisations’ spoofed addresses (red)

Recipients of phishing emails – hard to see in the map above – were also located in Singapore.

The earliest phishing email detected dates back to October 2019. However, our previous research indicates that this threat actor is using maritime themes in their phishing campaigns since at least 2018, and is linked to other malware families including Pony.

The 2019 email was sent from a likely compromised subdomain of an Indonesian company and contained a malicious archive (.rar) attachment purportedly pertaining to a purchase order, a common theme of spam emails.

Since then, the actor behind the campaign refocused their phishing lures by spoofing emails of legitimate organisations linked to the maritime industry, and by referring to vessels and other naval themes in their emails.

Figure 2 – Example of phishing email spoofing a Singapore-based shipping company

Figure 3 – Example of phishing email sent to a Switzerland-based maritime consultancy

Some phishing emails showed a good knowledge of the shipping industry, including believable details of existing ships and ports locations.

Figure 4 – Example of phishing email sent to a Japanese shipping company

Figure 4 – Example of phishing email sent to an Italian engineering contractor, purporting to be from a Chinese port authority

For instance, both vessels mentioned in the email above, Glovis Crown and Glovis Splendor, are 200m long cargo ships registered in the Marshall Islands. It remains unclear how criminals managed to obtain such details, although it seems likely that they derive from previously hijacked communications of potentially unrelated victims.

This second wave of phishing emails has been active between February and late June 2020, suggesting the campaign is likely still active.

Phishing emails switched to a malicious Microsoft Excel (.xlsx) attachment containing an exploit for CVE-2017-11882. This vulnerability in Microsoft Equation Editor lets attackers run remote code on a vulnerable machine when the victim opens a document. The exploit has been actively used by multiple cybercriminal groups due to the level of access it grants to the victim machine and the lack of user interaction needed.

Figure 5 – Screenshot of malicious xlsx attachment to email in Figure 4 [MD5: e7bb1284bf0e723b47435b0f70504b3f]

The malicious documents are downloaders for Loki Bot, an information stealer first seen in 2015. The malicious payloads observed, and additional ones found by pivoting on the attack infrastructure, are downloaded from duckdns.org subdomains likely created with domain generation algorithms (DGA).

The payload, Loki Bot, can steal credentials from browsers and email clients, among other programs, and has keylogging capabilities. The malware also sends identifying information about the victim’s hosts to a C2 to inform threat actors of the successful infection.

The current Loki Bot campaign highlights the ongoing threat of commodity malware and widespread phishing to organisations in the maritime and engineering sectors. Although the campaign exploits well-known threat vectors, lack of widespread adoption of anti-spoofing technologies like SPF and DMARC, or their incorrect implementation,  means that criminals can continue sending credible phishing emails apparently from legitimate domains.

Indicators of Compromise

Emails Sender’s IP

103.253.115[.]37

Downloader Domains

russchine2specialplumbingwsdymaterialgh3.duckdns[.]org

chneswealthandorganisationstdy7joppl.duckdns[.]org

12chnesstdywealthandmoduleorganisationrn.duckdns[.]org

chnes14wealthandstdymoduleorganisationoo.duckdns[.]org

chnthreewealthsndy3andreinforcementagenc.duckdns[.]org

20chneswealthandsndymoduleorganisationvz.duckdns[.]org

chnes29sndyqudusisabadassniggainthebba.duckdns[.]org

united32wsdyfrkesokoriorimistreetsjkjd.duckdns[.]org

russchine2sndymapanxmenischangedone14ajb.duckdns[.]org

sndychnesprvlandofglorylandoflifeforle.duckdns[.]org

greenpegheedahatakankeadeshnaajaotawsdy.duckdns[.]org

sndychnesprvlandofglorylandoflifeforle.duckdns[.]org

Payloads

4ae5c9c199377980ebc558d27e7855960c69167138951378666421b9b3db09de

bcc826091ec71230947aa1916263434935a58ffe5977cf415b1d970633939652

58e0c4eef4236380167e9ea679e7885aebb5319dd0ea17365b90b5867cae7ff8

49107c228e38638d3b241bb5c4aa93ef68db20cc0c5a4157e00fc027635418bf

9ea2966982206d42cd8ad215f7a408bf7c1964134e3bef967e7bb93df6dc1f1a

b48f93828a970b7f2122b098cade1e1ab488ef557cf11ae0c44f5690f6c45185

83ba255722d5c337ce128b5e216fc1a4010849b3b4ac3e4841458d371ed757d6

Feel free to contact us at [darklab dot cti at hk dot pwc dot com] for any further information.