Analysis of Multi-layer Concealed Payload Decryption and Driver-level Blinding Countermeasures | Technical and Tactical Tracking of “Swimming Snake” (Silver Fox)

1.Overview

Antiy CERT recently found that the “Swimming Snake (Silver Fox)” black production gang is tring to avoid anti-virus software detection through multi-stage load decryption and a variety of drive-level confrontation technology. It mainly involves two methods. the first kind of attack method is to complete hierarchical decryption and payload loading through different components, hide core malicious payload through multiple rounds of encryption processing, and at the same time, build 80 alternative C2 addresses for encrypted storage. In that invention, component collaboration and multi-layer concealment mechanism are combined to combat security software; and in the second type of attack method, attack components are released through multiple encrypted compressed package files. Blind EDR, terminate the designated security software process, hide the process and network connection, and execute Winos remote control Trojan in the mode of “white plus black.”

The “Swimming Snake” black production gang and other security enterprises, also known as “Silver Fox” and “Valley Gang,” mainly targeted at domestic users to carry out attacks and fraud activities. In the second half of 2022, Antiy discovered and analyzed the early activities of the snake group, including disguised as a common software download site, poisoning the search engine SEO and mass-sending of phishing emails. In the load execution stage, it is often executed in the “white plus black” mode, and further spread through instant messaging software (such as WeChat and enterprise WeChat). Its main way of profit is to induce users to join groups through instant messaging software to commit fraud, but also to the infected host computer to form the ability to steal secrets, possibly to conduct other activities such as data trafficking. The malicious files it spreads are characterized by a large number of variants, rapid iteration of kill-free technology, and the attack targets involve a large number of individual users and a number of industries, which pose a wide and serious threat.

The “Swimming Snake” gang is likely to operate under the cyber crime model of FaaS (Fraud as a Service), in the form of commodification and sale or rental on demand, Provide other criminals with attack methods, tools, and infrastructure that significantly lower the threshold for committing cyber fraud.

The terminal defense system (IEP) of Antiy has the driver-level main defense module, the detection capability based on AVL SDK and the defense points of kernel and application layer, which can effectively block the remote control Trojan attack chain.

Users can download and use the “Swimming Snake” special screening tool to detect such threats on the Antiy vertical response platform (https://vs2.antiy.cn).

2.Technical review

2.1  Poisoning of SEO Technology in Search Engine

“Swimming Snake (Silver Fox)” black production uses search engine SEO technology to carry on poison attack, make its build imitative download website in the search result the rank of be ahead. Identify phishing website please refer to the released report of Antiy “Swimming Snake (Silver Fox)” Black Production Intensive Phishing of All Kinds of Popular Applications: Anti-fake of WPS Download Site” for phishing website identification and prevention.

Figure 2-1 A malicious website that imitates “YouDao Dict”.

Figure 2-2 A malicious website that imitates “WPS”.

2.2  Sample execution process

After the first type of sample is run, the normal “NetEase translation installation software” is released, and the VBS script is executed covertly. The VBS script queries whether there are 360 * * * .exe, QQ * * * .exe and Hips * * * .exe processes by executing WMI, and selects different attack components according to the results. Although these attack components are different, they all use the same decryption means to decrypt the “_ 8” file to get the NHQDX. jpg file. The file decrypts the data at the specified offset to obtain the Gh0st remote control Trojan variant, and selects the corresponding 80 built-in C2 addresses according to the instal. ini configuration file to decrypt. Consysfun.png is a remote control plug-in that is encrypted and the attacker sends instructions to the remote control Trojan horse to call the specified function in the remote control Trojan horse plug-in “Consys21.dll.”

Figure 2-3 Flow chart of first type sample execution

After the second type of sample is run, the WPS installation program and the malicious program which execute normally are released, and the malicious program releases a plurality of attack components in a specified path, Blind EDR, terminate the designated security software process, hide the process and network connection, and execute Winos remote control Trojan in the mode of “white plus black.” Winos is a remote control Trojan with high frequency in the past two years, which is modified by Gh0st remote control and supports the execution of various function modules in the form of plug-in.

Figure 2-4 Flow Chart of Type II Sample Execution

3.Sample analysis

3.1 Method Analysis of Decrypting Multi-stage Load against Software

3.1.1 Initial decoy document

Table 3-1 Sample Label

Virus nameTrojan / Win32.SwimSnake
Original file nameOud _ fanyiKpi _ 2.0. msi
Md542ddb89706155089a04b9eba5e661516
Processor architectureIntel 386 or later processors and compatible processors
File size221 MB (232,657,920 bytes)
File formatWindows Installer
Time stampForgery
Digital signatureNone
Shell typeNone
Installation ProcedureMicrosoft Windows Installer

After youd _ fanyiKpi _ 2.0. msi runs, it will release the normal NetEase channel translation installation software to the path selected by the user for installation (default is “% appdata%\ Netyoydd”), and create a shortcut on the desktop. In C:\ ProgramData, a set of white and black component file are released for subsequent selection of attack payload therefrom.

The core components and functions involved in this sample are described in the following table:

Table 3-2 Description of Documents and Functions

Document nameFunctions
Binary. _ BF84D321CFCEFEA02F92AC3F19AB7EFDThe MSI installer obscures the VBS scripts that are executed
Xfyeck61gv.exe (white file)“White plus black” component, stardict-editor.dll decrypts the _ 8 file, and dll1.dll loads the decrypted payload.
Stardict-editor.dll
Dll 1.dll
_ 8Encrypted file: Encrypted first layer payload, decrypted is a DLL file named NHQDX. jpg, which contains encrypted remote Trojan payload and 80 encrypted C2 addresses. Remote control Trojan is a DLL file named NH. dat.
Instal.iniEncrypted file: This file contains the encrypted id value, and NHQDX. jpg selects the corresponding C2 address according to the value.
Consys21.pngEncrypted file: The encrypted remote control plug-in, after decryption, is a DLL file named Consys21.dll. The attacker sends an instruction to the remote control Trojan horse by calling the function specified in the plug-in.

3.1.2 Hidden execution of VBS script

In that installation process, the malicious MSI installation program covertly executes the VBS script, create specially named folders masquerading as system-related (including random character identification), And the released designated files will be copied to the system program directory, public document directory and other locations to complete the file landing and hiding deployment.

Figure 3-1 Create a Folder and Carry out a File Copy Operation

Inquire whether the target device has 360 security guard process (360 * * * .exe), QQ computer housekeeping process (QQ * * * .exe), and teflon security software process (Hips * * * .exe) through WMI; Execute different component files based on the above query results, and delete other subsequent useless files. Although these attack components differ, the core process for decrypting and executing remote control Trojans is the same.

Figure 3-2 4 types of malicious components involved in the sample

The first layer of payload is decrypted

The malicious DLL files in the four groups of malicious components adopt the same decryption logic (only the code implementation details are slightly different, and the first group is taken as an example below): The first DLL file reads the specified file first, and the “+” character is removed. Then perform subtraction and exclusive-OR operation on the content with 0x7E as the key, and then call the second DLL and transfer the decrypted data to the second DLL, which will perform PE parsing on the received content and find the export function corresponding to the file formerly named NHQDX. jpg. The load is finally completed.

Figure 3-3 Decrypting the _ 8 File by a stardict-editor.dll

Decipher remote control Trojan horse

Nhqdx. jpg copies the encrypted remote control plug-in to a specified location, and then the creating thread decrypts its own data by using the data at its own 0x282D0 offset as a key to decrypt its own content with a length of 0x10200 at its 0x180D0 offset, Finally, the remote control Trojan load is obtained and loaded.

Figure 3-4 Load the remote Trojan payload obtained by decryption and passes in the specified parameters

There are 80 encrypted C2 server address strings in the NHQDX. jpg file, which gets the value of its id by reading the instal. ini file, The id value (80 for this sample) is decoded and the corresponding C2 address therein is selected based on the value. The remote control Trojan receives the encrypted C2 address string when it is loaded, uses Base64 decoding to perform subtraction and exclusive OR operations, and restores the C2 address. The list of C2 addresses contained in NHQDX. jpg is shown below.

Figure 3-5 C2 Address List Obtained by Restoring

3.1.3 Remote control Trojan decryption and execution

The Method of Communication Encryption

The remote control Trojan NH.dat collects information such as system version, host name, running time and date, and running status of specific process according to a user-defined structure; first, the information is compressed by Zlib. Then the key “qQ996545” is encrypted by RC4 algorithm, and the total size of the packet and the original size of the original data are added before the processed packet.

Figure 3-6 Encryption Method for Communication Content by Remote Trojan

And the remote Trojan adds fixed 0x66 and 0x9c in the header when constructing the online package.

Figure 3-7 Decrypting the online package

Decrypt to get the remote control plug-in

The remote control Trojan file contains a DLL file whose file header is modified, and after the file header is restored, the DLL file decrypts “ConsysFun. png” to obtain the remote control Trojan plug-in originally called “Consys21.dll.”

Figure 3-8 Decrypting the ConsysFun .png file

The attacker sends instructions to the remote control Trojan horse, and calls the export function specified in the remote control Trojan horse plug-in “Consys21.dll.” Instructions and the corresponding functions called are shown in the following table.

Table 3-3 Instructions and Corresponding Functions and Functions

InstructionsCall the Consys21.dll functionFunctions
0, 0x20DllstartrunExecute the plug-in
1DllfileObtain the disk information and remaining space in the system
2DllscreenCapture screen
3DllvideoCamera video viewing
4DllkeyboKeylogger
5DllaudioVoice monitoring
6DllsysteGets information about the processes running in the system and their modules
7DllshellRemote execution of cmd commands
0x13DllmsgboxPops up a message box with the header and information specified by the attacker
0x15DllserstGet the server information
0x16DllsermaGet the service information in the system
0x17DllregRegistration Form
0x18DllddosopenPerform DDoS
0x19DllddosstopStop DDoS
0x1fDllproxyopenOpening agent
0x23DllscreenhiScreen monitoring of different function types
0x24Dllscreenhivr
0x25Dllscreenhis

3.2 Use of multiple groups of driver files to combat security software manipulation analysis

3.2.1 Initial Bait Document

Table 3-4 Label of Initial Bait Document Sample

Virus nameTrojan / Win32.SwimSnake
Original file nameWcnhguhyr.exe
Md505946b9848551eb738c9fdf748af0ff2
Processor architectureIntel 386 or later processors and compatible processors
File size106 MB (111,626,778 bytes)
File formatBinexecute / Microsoft.EXE [: X86]
Time stampForgery
Digital signatureNone
Shell typeNone
Installation ProcedureInno Setup Module (5.5.0)

The sample is packaged with InnoSetup, disguised as a WPS installer, and runs to release multiple files from the sample to C:\ ProgramData\ Windows Data.

Figure 3-9 Packing information

The funzip.U file contains the 7za decompression tool encoded by Base64, which decompresses the main.xml file with the password “htLcenyRFYwXsHFnUnqK,” and obtains the programs “men.exe” and “setup.exe.” the former is a malicious program. The latter is a normal WPS installer.

Figure 3-10 setup.exe is a normal WPS installer

3.2.2 Release the execution attack component

Men. exe executes the command to find and enable the network adapter on the computer that is currently disabled to confirm network connectivity.

Figure 3-11 Enable the network adapter in the disabled state

Subsequently, the men.exe program releases and decompresses more core malicious components in C:\ Users\ Public\ Documents\ Windows Data, including anti-component and remote control Trojan component of “white plus black.”

Figure 3-12 Release of multiple attack components

All core components and functions involved in this sample are described in the following table:

Table 3-5 Description of Documents and Functions

Document nameFunctions
Main.exeBlinding EDR: Use an open source project to clear multiple kernel callbacks to avoid monitoring and detection of specified security products.
Rwdriver. sys
Nvidia.exeTerminate the process related to designated security software: Use the driver file of a company’s software to terminate the process related to designated security products, such as 360, Velvet, and Tencent Computer Butler.
[Name randomly] .sys (white file)
Kgsekdkce.exeTerminate the processes related to the designated security software: Use a driver file (BdApiUtil64.sys) to terminate the designated process, and the target involves the processes related to the security products such as 360, Velvet, and Tencent Computer Butler.
Bdapiutil64.sys (white file)
Bypass.exeTools to bypass the UAC.
Nthandlecallback.exe (white file)“White plus black” attack component, log. dll is malicious DLL, Server. log is the online module of Winos remote control Trojan encrypted by RC4.
Log.dll
Server. log
Cndom6.sysProcess Hiding: Hook the relevant API, and return a custom function to achieve process hiding, prevent other processes from obtaining or copying the target process handle.
Xiaoh.sysProcess Hiding: To hide the network connection of the target process by performing nsiproxy.sys hook.

3.2.3 Functional Analysis of Core Components

Blind EDR (unable to monitor and respond properly)

Main.exe and rwdriver. sys adopt the open source project to clear a variety of kernel callbacks to shield the monitoring of process creation, thread creation, module loading, handle, registry, file reading and writing by designated security products. In order to circumvent that detection.

Figure 3-13 Blinding EDR

In that program, the name of the target drive file is Hash-processed to avoid the identification and killing of anti-virus software, Driver files related to security products such as Windows Defender, Kaspersky (Enterprise Edition), Velvet, Trend Micro, Qihoo 360, Tencent, and Qi-Anxin.

Figure 3-14 Target Drive File

Stop the specified security software process

The following two groups of components use BYOVD, an attack technique that bypasses system security by using legitimate but vulnerable driver files, aiming to exploit the kernel permissions of the driver files for malicious operations.

Component 1:

After NVIDIA .exe execution, a randomly named drive file, which belongs to a company software product and has a normal digital signature for that company, is released in the path% temp%.

Figure 3-15 Drive File Information for Malicious Use

The attacker takes advantage of the vulnerability of the driver file to hijack and sends control code to it to terminate relevant processes of designated security software. the target involves relevant processes of security products such as Qihoo 360, Velvet, and Tencent Computer Butler.

Figure 3-16 Hijack Driver File Termination Specified Target Process

Component 2:

Bdapiutil64.sys is a driver file with the company’s normal digital signature.

Figure 3-17 BdApiUtil64.sys File Information

Kgsekdkce.exe creates BdApiUtil64.sys as a service, and traverses the process to find out whether there is a designated security software process, and the target involves processes related to security products such as Qihoo 360, Velvet, and Tencent Computer Butler.

Figure 3-18 Target Process

Hijacking the drive file BdApiUtil64. sys sends it a control code 0x800024b4 to terminate the specified process as shown in the figure above.

Figure 3-19 Hijacking BdApiUtil64. sys Terminating the Specified Target Process

Stop the security software process by bypassing the UAC

Bypass. exe is a shortcut to C:\ Users\ Public\ Documents\ Windows Data\ NVIDIA .lnk by bypassing the UAC tool and calling the COM interface to create a right-lifting object.

Figure 3-20 Executing NVIDIA .lnk Shortcut

This shortcut is used to execute C:\ Users\ Public\ Documents\ Windows Data\ KGseKdKce.exe, which hijacks the BdApiUtil64.sys driver file to terminate the specified security software process.

Figure 3-21 NVIDIA .lnk for executing KGseKdKce.exe

“White plus black” remote control Trojan component

Using NtHandleCallback.exe, which has a normal digital signature, loads the malicious file log.dll, which executes 3 threads, and its overall function is as follows.

Figure 3-22 Overall Function of Malicious File Log.dll

Thread 1 of log.dll decrypts the Server. log file by RC4 using the decryption key “? Bid @ locale @ std,” obtains the online module of the Winos remote control Trojan and executes the module.

Figure 3-23 Decrypting and executing remote control Trojan horse

The online module of the Winos remote control Trojan horse contains the configuration information with inverted string, including the C2 address and port, grouping, version number, whether to enable some function, etc.

Figure 3-24 Configuration Information Used by the Sample

The online module will then inject the received login module into the tracerpt.exe system process.

Figure 3-25 Injecting the tracerpt.exe process

Use the driver file to hide the process

Thread 2 of log.dll hides and protects the target process and the network connection of the target process by using two driver files, Cndom6. sys and XiaoH. sys.

Figure 3-26 Main functions of the log.dll thread 2

Hide and protect that target proc

Cndom6.sys is a malicious driver file that contains an expired digital signature for a company. The attacker signs the drive file using an unrevoked certificate issued before July 29, 2015, so that the drive file will function properly with signature verification.

Figure 3-27 Expired Digital Signatures Used by Canndom6.sys

After log .dll loads Cndom6.sys, the driver file will perform Hook on the relevant API and return a custom function to hide the process and prevent other processes from obtaining or copying the target process handle. In order to prevent that target process from bee discovered or operated.

Figure 3-28 Hooks mainly for three APIs

Hook is perform on NtQuerySystemInformation (Windows system kernel API function, which is use to query system information), and if matching to that target process ID, the chain is broken to hide the process.

Figure 3-29 Hidden Target Processes

Hook that NtOpenProcess (Window system kernel API function, used to open the handle of the process object and set the access right), and if match the target process ID, return 0xc0000022 to prevent other processes from obtaining the target process handle.

Figure 3-30 Block other processes from obtaining a target process handle

Hook that NtDuplicateObject (Window system kernel API function for copy object handle) and returns 0xc0000022 to prevent other process from copying the target process handle if it matches the target process ID.

Figure 3-31 Preventing other processes from copying the target process handle

Hide the network connection of the target process

Xiaoh. sys is a malicious driver file that contains an expired digital signature of a company. The attacker also signs the drive file with an unrevoked certificate issued before July 29, 2015, so that the drive file can run properly through signature verification.

Figure 3-32 Expired Digital Signatures Used by XiaoH. sys

After log .dll loads XiaoH. sys, the driver file obtains its driver object and performs HOOK on IRP _ MJ _ DEVICE _ CONTROL for the system driver file of nsiproxy.sys, thereby hiding the network connection of the target process.

Figure 3-33 Hidden target process network connection

Adds the specified path to the Microsoft Defender exclusion

Thread 3 of log.dll executes the PowerShell command to add the specified path to the Microsoft Defender exclusion.

Figure 3-34 Adding a Specified Path to a Microsoft Defender Exclusion

4. Use tools to check the threat of “Swimming Snake (Silver Fox)

Users can download and use the special screening tool “Swimming Snake” on the Antiy vertical response platform (https://vs2.antiy.cn) for screening. The “Swimming Snake” special troubleshooting tool can be used to troubleshoot the loaders placed by the “Swimming Snake” gang in attack activities and remote control Trojans loaded into memory.

Figure 4-1 Safety Vertical Response Platform

In order to more accurately and comprehensively eliminate the threats existing in the victim host, customers may contact Antiy’s emergency response team (cert @ antiy.cn) after using the special screening tool to detect the threats.

Figure 4-2 Malicious process injected into remote control Trojan detected by the “Swimming Snake” special troubleshooting tool

5.The Antiy IEP terminal defense system helps users defend against the Swimming Snake threat

As an enterprise-level terminal security protection product for office machines, servers and other terminals, the Terminal Defense System of Antiy IEP helps users effectively protect against snake attacks through multi-dimensional protection against the attack characteristics of snake viruses.

5.1 Based on Antiy AVL SDK threat detection engine, the virus will be killed upon landing

IEP is embedded into Antiy AVL SDK anti-virus engine to scan file objects, storage objects, sector objects, memory objects and registry data objects, and judge whether the detection objects are known or suspected viruses. In order to realize accurate judgment, investigation and killing. In particular, it can nest and scan that compressed package object, and scan the memory object based on the memory map, so that a variety of camouflage and kill-free methods can not be hidden. In case 1 and case 2, when the user stores the malicious files youd _ fanyiKП _ 2.0. msi and Wcnhguhyr.exe locally, an alarm will be generated immediately, and the malicious files will be cleared, without giving the chance to start the virus.

Figure 5-1 Alarm and Automatic Elimination of Virus Immediately upon Landing

5.2 Based on the core-level active defense capability, real-time interception of attacks or high-risk behaviors

The core active defense module of Antiy IEP can monitor the whole process of process startup in real time, detect and judge the risk of process behaviors and parameters, and especially intercept high-risk operations implemented by system processes. In that case of this second case, When a malicious program registers a load driver through the sc create rwdriver binPath = “C:\Users\Public\Documents\WindowsData\rwdriver.sys” type = kernel start = demand, The module accurately identifies its driver registration behavior, and after verification, finds that the reputation of the directory where the target driver is located is high-risk and lacks valid digital signature, and then blocks the registration and loading process, and successfully blocks the implantation of malicious drivers.

Figure 5-2 Intercept when a malicious program loads a driver

In addition, IEP has a registry protection module to monitor key registry entries in real time. In this case 2, the intellectual will monitor the creation of HKLM\ System\ CurrentControlSet\ Services, and perform depth detection on the ImagePath pointing files of all services registered under the path. Once a document is determined to be a risk-driven document based on multi-dimensional risk assessment such as document path characteristics, attribute information and signature validity, the registration of the document to the system service shall be rejected immediately. Form a double defensive closed loop of “process behavior interception + registry source control.”

Figure 5-3 Defense against abnormal registry operations detected by IEP

IEP can also monitor the execution behavior of program commands in real time, determine whether there is safety risk in the execution of commands by analyzing the contents of commands and the maliciousness of the execution program, and intercept the risk behavior immediately. In this case 2, the malicious program’s attempt to add itself to the Windows Defender exclusion list through the PowerShell command will be perceived by the defense rule in real time. The system will conduct risk assessment in combination with the parent process directory, file characteristics, attribute information, signature information and other dimensions, and once it determines that there is a risk, the system will immediately stop the PowerShell operation and terminate the parent process.

Figure 5-4 Immediately Intercept when Dangerous Command is Executed

IEP has special download protection functions for downloading files, including prohibiting the execution of executable program of the IM directory, blocking invalid signature files downloaded by the browser, and blocking the operation of files with dual extension. And restrict the execution of files such as PE and LNK by specific directories to form a layered protection system. In this case 2, the malicious file NtHandleCallback.exe is released to the C:\ Users\ Public\ Documents\ directory. When the conventional virus detection fails to identify the threat, the control strategy of IEP is triggered immediately, according to the rule that “Documents directory is the file storage area, and executable files are usually not stored.” Directly block the execution of any PE file under the directory, so that the malicious program is effectively blocked by the protection of the policy layer outside the detection mechanism

Figure 5-5 The downloading protection function of the intelligent armor blocks the abnormal activation behavior

IEP has memory protection capabilities, which can monitor system memory variables in real time. In the events of Case One and Case Two, when the attacker writes shellcode into the memory, the active defense will detect it. When this memory is executed, the detection mechanism will be triggered. If malicious behavior is found, it will proactively notify the user and stop the program from continuing to execute.

Figure 5-6 Abnormal behavior of memory detected by memory protection function of IEP

IEP can effectively protect remote control Trojan, malicious C2 access and other behaviors through distributed firewall module, and IEP can monitor network traffic in and out of stack data in real time. In combination with accurate detection of threat intelligence, malicious address are intercepted to form a low-level network protection screen.

Figure 5-7 Real-time detection of the access address of the program, and once the access malicious address is found, it is immediately intercepted

5.3 Provide a unified management platform to help administrators efficiently carry out security management

IEP also provides a unified management platform for users, through which administrators can view details of threats within the network in a centralized manner and handle them in batches, thus improving the efficiency of terminal security operation and maintenance.

Figure 5-8 Provide a unified management platform, and remotely handle threats with one click

6. IoCs

IoCs
05946b9848551eb738c9fdf748af0ff2
Ddb9a28b72098ee0ec2308d90f2e0334
E4234abffc87519afac9705ca73b7c30
04264646287bb028ad5280cf4da39358
Da0d77e9ac7a60f67d55256e55307713
0d9b54b8bfe67ce90a98102d763345f9
5231a08c5286803e300ac657e37272f8
8a7442439ef37055d790a724ba48bee0
C2a1e8510738ddf23b839eef223f7bec
893edfa3a3a71d71ca670424e554e04c
C416a4664a84a5bd4f8f032472e56cdd
0462f77ae086e8cdc48f9a21758fd67e
212fc4b489c15436de3e34ac96e1207b
08cfaac200ed8052a63020f115c6a75a
07c8b3bf5ef18bdd646980f765de0fc6
E059cf1f916302a0ff91b0061da1c14
42ddb89706155089a04b9eba5e661516
234ccbcb8460721aa990a350d2237036
0d7d0cf8a31422cd9a88fa90ad7560eb
B6ede7ecbb980723ec43c7b1bde059b9
8dc9c86cf33fc0cbc20cfd3cb6f5d3a3
1c993a7b64d9e7c3379ab8849d6f17d4
B6ede7ecbb980723ec43c7b1bde059b9
0d7d0cf8a31422cd9a88fa90ad7560eb
0c9b34b15361b87b738dc06fc4194086
5b81e82e3c4594d82085f6a0e0563a07
18a4dff46a1bae8e317a999a1837f8f2
154.86.0 [.] 40: 443
Https [:] / / www.bg-wps.com
Https [:] / / pub-3d7ecf8d8ed94374b9fb10d61138bd72.r2.dev / Wjfrpsl.zip
Ydbao6 [.] you: 9000

Since 2022, Antiy CERT has released 17 analysis reports on “Swimming Snake” related activities.



List of Antiy’s historical reports on the threat of “Swimming Snake”.


 [1] Analysis of attacks on remote control Trojans placed by falsifying Chinese Telegram websites [R/OL]. (2022-10-24)

Https: / / www.antiy.cn / research / notice & report / research _ report / 20221024.html

[2] Analysis of attacks on remote control Trojan delivered by cloud note-taking platform [R/OL]. (2023-03-24)

Https: / / www.antiy.cn / research / notice & report / research _ report / 20230324.html

[3] Analysis of gangs using cloud note-taking platform to deliver remote-controlled Trojans [R/OL]. (2023-03-30)

Https: / / www.antiy.cn / research / notice & report / research _ report / 20230330.html

[4] Analysis of large-scale attacks launched by “snake-swimming” gangs against domestic users [R/OL]. (2023-05-18)

Https: / / www.antiy.cn / research / notice & report / research _ report / 20230518.html

[5] Analysis of recent fishing attacks by “snake swimming” gangs [R/OL]. (2023-07-11)

Https: / / www.antiy.cn / research / notice & report / research _ report / TrojanControl _ Analysis.html

[6] Analysis of the activities of the “Snake Runner” gang in using WeChat to spread malicious codes [R/OL]. (2023-08-22)

Https: / / www.antiy.cn / research / notice & report / research _ report / SnakeTrojans _ Analysis.html

[7] Special Analysis Report on “Swimming Snakes” and Black Producers [R/OL]. (2023-10-12)

Https: / / www.antiy.cn / research / notice & report / research _ report / SwimSnakeTrojans _ Analysis.html

[8] Analysis of the new round of attacks against financial personnel and e-commerce customer service by the “Snake Swimming” gang [R/OL]. (2023-11-11-11)

Https: / / www.antiy.cn / research / notice & report / research _ report / SwimSnake _ Analysis.html

[9] Analysis of the recent attack activities of the “Swimming Snake” black farm [R/OL]. (2024-04-07)

Https: / / www.antiy.cn / research / notice & report / research _ report / SwimSnake _ Analysis _ 202404.html

[10] Analysis of phishing attacks by “snake-swimming” gangs using malicious documents [R/OL]. (2024-06-21)

Https: / / www.antiy.cn / research / notice & report / research _ report / SwimSnake _ Analysis _ 202406.html

[11] The phishing download website spreads the threat of “Swimming Snake,” and the malicious installer hides the remote control Trojan [R/OL]. (2024-12-20)

Https: / / www.antiy.cn / research / notice & report / research _ report / SwimSnake _ Analysis _ 202412.html

[12] “Swimming Snake” attacks wreak havoc with black products, and quick start special investigation and handling [R/OL]. (2025-04-23) https: / / www.antiy.cn / research / notice & report / research _ report / research _ report / SwimSnake _ Analysis _ 202504.html

[13] The black production of “Snake” uses fake WPS Office download stations to spread remote control Trojan horses [R/OL]. (2025-05-15)

Https: / / www.antiy.cn / research / notice & report / research _ report / SwimSnake _ Analysis _ 202505.html

[14] “Swimming Snake (Silver Fox)” attacks by the latest variety of black production [R/OL]. (2025-08-17)

Https: / / www.antiy.cn / research / notice & report / research _ report / SwimSnake _ Analysis _ 202508.html

[15] The spreading of black products and continuous tracking of techniques and tactics of snake (Silver Fox): Analysis of attack methods of imitation FinalShell management software [R/OL]. (2025-09-19)

Https: / / www.antiy.cn / research / notice & report / research _ report / SwimSnake _ Analysis _ 202509.html

[16] Snake Runner (Silver Fox) “Black production intensive imitation of all kinds of popular applications: Wps download station anti-fake album [R/OL]. (2025-10-10)

Https: / / www.antiy.cn / research / notice & report / research _ report / SwimSnake _ Analysis _ 202510.html

[17] Delete such files immediately upon receipt! Avoid falling into the trap of “Swimming Snake” [R/OL]. (2025-10-23)

Https: / / www.antiy.cn / research / notice & report / research _ report / SwimSnake _ Report _ 202510.html