Targeting WeChat, DingTalk and Other Tools for Remote Access Trojan Deployment | Tracking the Tactics and Techniques of SwimSnake (Silver Fox)

The original report is in Chinese, and this version is an AI-translated edition.

Targeting WeChat, DingTalk and Other Tools for Remote Access Trojan Deployment | Tracking the Tactics and Techniques of SwimSnake (Silver Fox)

1.Overview

Antiy CERT recently detected the “SwimSnake (Silver Fox)” gang targeting social media tools such as WeChat and DingTalk with precise malware attacks. This gang uses a fake Baidu Netdisk installation package to deliver malicious payloads that have been upgraded to bypass antivirus detection. To evade security software detection, the gang abandoned its traditional method of loading malicious DLLs in the same directory, instead abusing Windows system executables such as rundll32.exe and regsvr32.exe to load malicious modules and release two sets of Trojan programs with different functions. This attack employs a triggered deployment strategy: when an infected device is detected to have instant messaging processes such as WeChat, DingTalk, Telegram, or WhatsApp, a WinOS remote access Trojan is released. This Trojan allows for remote access of the infected device, leveraging the social attributes of these chat tools to initiate actions such as adding users to groups and targeted forwarding, achieving efficient internal spread rather than indiscriminate deployment. This strategy improves the efficiency of attack propagation and reduces the likelihood of being detected by security products through a precise triggering mechanism. If the device does not have the aforementioned chat tools, only another set of basic functional Trojans is deployed, responsible for maintaining communication with the remote C2 server, downloading malicious components, and transmitting relevant device information back.

The “SwimSnake” cybercrime group, also known by other security companies as “Silver Fox” and “Valley Thief”, primarily targets domestic users with attacks and fraudulent activities. Antiy Labs discovered and analyzed the early activities of SwimSnake group in the second half of 2022, including disguising themselves as popular software download sites, conducting SEO poisoning of search engines, and sending large numbers of phishing emails. During the payload execution phase, they often use a “white-and-black” approach, further spreading through instant messaging software (WeChat, WeChat Work, etc.). Their main profit-making method is to lure users into joining groups via instant messaging software for fraud, while also gaining the ability to steal data from infected hosts, potentially for data trafficking and other activities. The malicious files they spread are characterized by a large number of variants and rapidly evolving evasion techniques, targeting a large number of individual users and multiple industries, posing a widespread and serious threat.

The “SwimSnake” gang likely operates under a Fraud as a Service (FaaS) cybercrime model, commoditizing and selling or leasing attack methods, tools, and infrastructure to other criminals, thereby significantly lowering the barrier to entry for committing cyber fraud.

Antiy Intelligent Endpoint Protection System (IEP) has a driver-level main defense module, which, based on the detection capabilities of AVL SDK and defense points at the kernel and application layers, can effectively block the operation of this remote access Trojan.

Users can download and use the “SwimSnake” special investigation tool from the Antiy Vertical Response Platform (https://vs2.antiy.cn) to investigate such threats.

2. Technical Overview

2.1 Google Search Engine SEO Poisoning Techniques

The “SwimSnake (Silver Fox)” phishing website attack uses Google search engine SEO techniques to make its fake download websites rank higher in search results. To identify these fake websites, please refer to Antiy’s previous analysis report, “The SwimSnake Cybercriminal Group Distributes Remote Access Trojans by Leveraging Counterfeit WPS Office Download Sites”, for phishing website identification and prevention.

Figure 2-1 Google Search Engine Results

Figure 2-2 Malicious Websites Impersonating “Baidu Netdisk”

2.2  Sample Execution Flow

After the sample runs, it simultaneously deploys and launches a legitimate Baidu Netdisk installer and a malicious payload. The malicious payload loads and executes a malicious DLL via the system’s built-in program rundll32.exe. This DLL reads and decrypts encrypted files in the same directory, generating and launching the first set of Trojans, which connects to the C2 server 202.95.16.100:80. Subsequently, the component downloads a set of malicious modules from the C2 server. These modules scan system processes (including instant messaging processes such as WeChat, DingTalk, Telegram, and WhatsApp). If any of these processes are found, the module creates a marker file under %APPDATA%\Embarcadero. Upon detecting this marker file, the attacker uses the system process regsvr32.exe to re-execute the malicious DLL, causing it to decrypt/download and deploy a WinOS remote access Trojan, which connects to the C2 server 27.124.45.66:80. The entire component involves multiple encrypted components that utilize decryption, memory loading, and disabling network connections of security software to evade detection.

Figure 2-3 Sample Execution Flowchart

3.Sample Analysis

3.1 Initial Decoy File and File Function Overview

Table 3-1 Sample Labels

Virus NameTrojan/Win32.SwimSnake
Original FilenameBaidu-2025102902.exe
MD5D56FDF251110FBAD9064DA33CDD51E54
Processor ArchitectureAMD64
File Size501.15 MB (525,494,999 bytes)
File FormatWin32 EXE
TimestampCounterfeiting
Digital SignatureNone
Packing TypeNone
InstallerInstall Builder

After running, Baidu-2025102902.exe will extract the normal “Baidu Netdisk installation software” installation package to the C:\Program Files directory and execute the installer. It will also create a shortcut on the desktop and release multiple malicious payloads in multiple system installation paths for subsequent selection of attack payloads.

The core components and functions involved in this sample are described in the table below:

Table 3-2 File and Function Description

File NameFunction
xmplay.exeDetection evasion : The NSIS -packaged loader is used to release and execute subsequent malicious samples, using PowerShell commands to add specified drive letters to Defender ‘s exclusion list.
Verifier.exeThe shellcode loader decrypts the Profiler.json file in the same directory to obtain shellcode , and then decrypts it a second time to obtain Single.dll.
Profiler.json
Single.dllDetection evasion: Privilege escalation, modification of the TCP connection table, and severing network communication between the security software process and its remote server.
AutoRecoverDat.dllThe shellcode loader decrypts GPUCache.xml and GPUCache2.xml files in the same directory.
GPUCache.xml
GPUCache2.xml
APTBIN_Main.dllCreate a scheduled task to connect to the C2 server 202.95.16.100:18852 and download the VFPower_32.dll file.
VFPower_32.dllConnect to C2 server 202.95.16.100:80 to download the UserInfoPlugin.dll file and establish a heartbeat with the C2 server.
UserInfoPlugin.dllThe system collects system information and detects current IM applications. If an IM application is found, it uses regsvr32.exe to re-execute AutoRecoverDat.dll. This DLL reads and decrypts GPUCache2.xml to obtain the Code_Shellcode backdoor.dll.
Code_Shellcode backdoor.dll​The memory loader connects to the second C2 server 27.124.45.66:443 to download the online module.dll.
Online module.dllUsing the configuration information, poll the C2 address 27.124.45.66 , with ports 80 , 58600 , and 1433 , to establish a heartbeat with the C2 server.
Login module.dllIt features basic functions such as keystroke logging, clipboard monitoring, and screenshot capture, and supports receiving and executing various remote access commands.

3.2 Sample Analysis

3.2.1 Initial Malicious Payload Deployment Analysis

The initial malicious payload sample was packaged using the Install Builder tool. This payload was created on November 19, 2025.

Figure 3-1 Packaging Using InstallBuilder Tool

The initial malicious payload’s function is to extract the normal Baidu Netdisk installation package to C:\Program Files, extract the malicious payload xmplay.exe to the user’s directory, create a shortcut to Baidu Netdisk and execute its installation package program, and finally execute the main malicious payload xmplay.exe.

Figure 3-2 Execution of Malicious Payload

3.2.2 Second-Layer Payload Analysis

The xmplay.exe malicious payload is actually an NSIS packager containing multiple malicious files. Upon startup, it executes PowerShell commands to add the specified drive to Defender’s system protection exclusion list, allowing malicious programs to enter the system and thus reducing the user’s system’s security capabilities.

Figure 3-3 Using PowerShell Commands to Reduce Protection

Then copy multiple encrypted data files from the TEMP directory to the system path, as shown in the table below.

Table 3-3 Encrypted Data Replacement to System Path

Files in the TEMP DirectorySystem Path
temp_k.txt%LOCALAPPDATA%\Temp\temp_k.txt
lic.dat%LOCALAPPDATA%\Verifier.exe
Profilerjson%LOCALAPPDATA%\Profiler.json
GPUCachexml%APPDATA%\Embarcadero\GPUCache.xml %APPDATA%\GPUCache.xml
GPUCache2xml%APPDATA%\Embarcadero\GPUCache2.xml %APPDATA%\GPUCache2.xml
Auto.dat%APPDATA%\Embarcadero\AutoRecoverDat.dll
miuahfzc%LOCALAPPDATA%\miuahfzc
zwa%LOCALAPPDATA%\zwa

The malicious payload xmplay.exe uses DcryptDll.dll to decrypt the aforementioned file and generate a malicious component, then uses nsExec.dll to execute cmd commands. First, it executes the first malicious component, Verifier.exe (loaded by shellcode), and then executes the malicious component AutoRecoverDat.dll via the system’s built-in rundll32.exe.

Figure 3-4 First Execution of the Malicious Component AutoRecoverDat.dll

3.2.3 Shellcode Loading and Decryption

The malicious component Verifier.exe first reads the Profiler.json file in the same directory and decrypts it into shellcode.

Figure 3-5 Reading the Profiler.json File and Decrypting It into Shellcode

Then, the shellcode is decrypted a second time to obtain the Single.dll file.

Figure 3-6 The Second Decryption Yields Single.dll.

➢ Block Security Software Network Connection

The Single.dll file iterates through the specified security software process, repeatedly enumerates the security software’s TCP connection table, and cuts off network communication between the security software process and its remote server in order to circumvent protection.

Figure 3-7 Block Security Software Network Connection

3.2.4 Analysis of the First Group of Trojan Programs

The second layer of payload, xmplay.exe, initially uses cmd.exe to call the rundll32.exe system file to execute the AutoRecoverDat.dll file, decrypts it to obtain shellcode, and then decrypts it a second time to obtain the APTBIN_Main.dll file, which is finally injected into the memory of rundll32.exe for execution.

Figure 3-8 The Second Decryption Yields APTBIN_Main.dll

➢ Download Remote Access Trojan Component

APTBIN_Main.dll creates two threads, whose functions include terminating security software processes and creating scheduled tasks. It then connects to the C2 server 202.95.16.100:18852 to download the VFPower_32.dll file.

Figure 3-9 Downloading the VFPower_32.dll File [Screenshot from Antiy MAE Integrated Analysis Environment]

➢ Create Scheduled Tasks

Create two scheduled tasks to log in and execute AutoRecoverDat.dll and Verifier.exe respectively to load shellcode.

Figure 3-10 Creating a Scheduled Task to Execute a Malicious File

➢ Connect to C2 Server

The downloaded VFPower_32.dll file will connect to the C2 server address 202.95.16.100:80, download the UserInfoPlugin.dll file (to collect system information and precisely target remote access), and use the string “YourSharedSecretKey” as the heartbeat packet content.

Figure 3-11 Connecting to the C2Server

➢ Collect Information to Download Winos Remote Access Trojans

UserInfoPlugin.dll collects a large amount of system, user, installed application, and permission information, and detects whether specific instant messaging processes (WeChat, DingTalk, Telegram, WhatsApp, etc.) are running on the system. If any of these processes are detected, the component creates a marker file in a specific directory. After detecting this marker file, the attack chain uses the system process regsvr32.exe to execute AutoRecoverDat.dll. This DLL is decrypted to generate a module named “Code_Shellcode backdoor.dll” and downloads the WinOS remote access Trojan from the C2 server. Subsequently, WinOS is injected into the system regsvr32.exe process and executed.

Figure 3-12 Detecting the Existence of Known IM Software

[Screenshot from Antiy MAE Integrated Analysis Environment]

➢ Traverse and Terminate the Security Process

Traverse the processes and detect the following security software process names, then terminate any processes currently listed in the table.

Table 3-4 Security Software and Related Process Names

3.2.5 Analysis of WinOS Remote Access Trojans

The released Code_Shellcode backdoor.dll is actually a memory loader. Its main function is to connect to a remote host (27.124.45.66:443), receive the WinOS remote access Trojan “online module.dll” and execute it.

Figure 3-13 Downloading and Deploying the Module

[Screenshot from Antiy MAE Integrated Analysis Environment]

➢ The Online Module Uses Configuration Information to Connect to the C2 Address.

The WinOS remote access Trojan’s online module contains configuration information, including the preferred and backup C2 addresses and ports, groups, version numbers, and whether certain functions are enabled. It will poll the C2 address based on the configuration information to download the “login module.dll” and establish a heartbeat.

Figure 3-14 Configuration Information in the Online Module

➢ Check Security Analysis Tools and Terminate

The login module creates a thread to attempt to log in to the remote access server (27.124.45.66). This DLL has basic functions such as keylogging, clipboard monitoring, and screenshotting, and supports receiving and executing various remote access commands. It also checks if the title of each visible window contains a series of tool names such as “monitoring/analysis/security” and terminates the connection.

Figure 3-15 Check Security Analysis Tools and Terminate

4. Use Tools to Investigate SwimSnake

Users can download and use the “SwimSnake” special investigation tool from the Antiy Vertical Response Platform (https://vs2.antiy.cn) to conduct investigations. The “SwimSnake” special investigation tool can be used to investigate loaders and remote access Trojans loaded into memory by “SwimSnake” cybercriminal group during their attack activities.

Figure 4-1 Antiy Vertical Response Platform

To more accurately and comprehensively eliminate threats on compromised hosts, customers can contact the Antiy Emergency Response Team (cert@antiy.cn) after detecting threats using specialized screening tools.

Figure 4-2 The “SwimSnake” Special Screening Tool Detected Malicious Processes Injected with Remote Access Trojans

5. Antiy Intelligent Endpoint Protection System Helps Users Defend Against SwimSnake Threats

Enterprise users are advised to deploy professional endpoint security products to perform real-time detection of newly added and launched files locally, and to periodically scan the network for viruses. Antiy Intelligent Endpoint Protection System series products (hereinafter referred to as “IEP”) rely on Antiy’s self-developed threat detection engine, combined with kernel-level proactive defense capabilities including file defense, process defense, memory protection, and enhanced download protection, to effectively defend against SwimSnake virus in this incident.

IEP can monitor the local disk in real time, automatically perform virus detection on newly added files, and send alerts and take action immediately upon detecting a virus to prevent malicious code from starting. For example, in this incident, when the malicious file Single.dll was downloaded, IEP immediately issued an alert and removed the malicious file.

Figure 5-1 Immediate Alert upon Virus Detection

Furthermore, IEP’s proactive defense capabilities monitor local process behavior in real time, tracking and analyzing abnormal file releases, file operations, command execution, abnormal behavior, and network activity. It immediately intercepts any high-risk behavior detected. In this incident, IEP immediately issued an alert when xmplay.exe released files to a sensitive directory.

Figure 5-2 Immediate Interception upon Detection of Abnormal Behavior

IEP also features memory protection capabilities, enabling real-time monitoring of the memory environment, detection of data in memory, and interception of abnormal memory operations. In this incident, IEP was able to immediately intercept the execution of shellcode by the file Verifier.exe.

Figure 5-3 Immediately Detect and Remove Malicious Code Found in Memory

In response to the frequent use case of users downloading software through browsers or instant messaging software, Antiy Intelligent Endpoint Protection System product (hereinafter referred to as “IEP”) provides users with enhanced download protection functions. Through identification and protection mechanisms such as “source tracing – file verification – anti-spoofing”, it strictly controls downloaded software, effectively reducing the possibility of externally downloaded and exchanged files entering the endpoint. In this incident, when the user downloaded a disguised installation package to their local machine, IEP immediately sent a risk warning.

Figure 5-4 Sending Risk Warnings for Abnormal Downloaded Installation Packages

6. IoC

baiduwangpan[.]cc
https://sen.s-ed1.cloud.gcore.lu/Baidu-2025102902[.]zip
202.95.16[.]100
27.124.45[.]66
D56FDF251110FBAD9064DA33CDD51E54
821E5293B5815F35E9BA9A9E4B93F858
9147C33F1F46151389EEDB5F29CA800A
67E41CB7C6D1A5C891A4CF0BA974929C
4A955BF9245FFECC34A1D3698438BF15
15E01F2C420720F1534C1168E01F2541
7CE0EAE4DB7930357DBDF9A34FEBFEF4
A49A6F85F7E638A2BD1580C78203B49A
D7E3FC5162E22DFD62670A845426298E
D9FEECFDB4B4F5663BDBC8EA395A9E81
9B2919C90ECCDB4B9D1A0B5D4FCE790D
1854962AD353F485E314F60881B7F9CB


List of Historical Analysis Reports on SwimSnake by Antiy

Since 2022, Antiy CERT has published 18 analysis reports on “SwimSnake” activities.

[1] Analysis of the Attack Activity of Delivering Remote Access Trojans Through the Fake Chinese Version of Telegram Website [R/OL].(2022-10-24)

https://www.antiy.cn/research/notice&report/research_report/20221024.html

[2] Analysis of Attack Activities Using Cloud Note Platforms to Deliver Remote Access Trojans [R/OL].(2023-03-24)

https://www.antiy.cn/research/notice&report/research_report/20230324.html

[3] Analysis of a Cybercrime Group Using Cloud Notes Platform to Deliver Remote Access Trojans [R/OL].(2023-03-30)

https://www.antiy.cn/research/notice&report/research_report/20230330.html

[4] Analysis of the Large-Scale Attack Activities Launched by the “SwimSnake” Cybercrime Group Against Domestic Users [R/OL].(2023-05-18)

https://www.antiy.cn/research/notice&report/research_report/20230518.html

[5] Analysis of Recent Phishing Attacks by the “SwimSnake” Cybercrime Group [R/OL].(2023-07-11)

https://www.antiy.cn/research/notice&report/research_report/TrojanControl_Analysis.html

[6] Activity Analysis of Malicious Code Spread by the SwimSnake Cybercrime Group Using WeChat [R/OL].(2023-08-22)

https://www.antiy.cn/research/notice&report/research_report/SnakeTrojans_Analysis.html

[7] Special Analysis Report on the SwimSnake Cybercrime Group [R/OL].(2023-10-12)

https://www.antiy.cn/research/notice&report/research_report/SwimSnakeTrojans_Analysis.html

[8] Analysis of the New Round of Attacks by the “SwimSnake” Cybercrime Group Against Financial Personnel and E-Commerce Customer Service [R/OL].(2023-11-11)

https://www.antiy.cn/research/notice&report/research_report/SwimSnake_Analysis.html

[9] Analysis of Recent Attacks by the “SwimSnake” Cybercrime Group [R/OL].(2024-04-07)

https://www.antiy.cn/research/notice&report/research_report/SwimSnake_Analysis_202404.html

[10] Analysis of the “SwimSnake” Cybercrime Group’s Phishing Attack Activities Using Malicious Documents [R/OL].(2024-06-21)

https://www.antiy.cn/research/notice&report/research_report/SwimSnake_Analysis_202406.html

[11] Phishing Download Website Spreads the Threat of “SwimSnake”, Malicious Installer Contains Remote Access Trojan [R/OL].(2024-12-20)

https://www.antiy.cn/research/notice&report/research_report/SwimSnake_Analysis_202412.html

[12] “SwimSnake” Cybercriminal Operations Rampant! Launch Special Inspection and Handling Immediately! [R/OL].(2025-04-23)

https://www.antiy.cn/research/notice&report/research_report/SwimSnake_Analysis_202504.html

[13] The SwimSnake Cybercriminal Group Distributes Remote Access Trojans by Leveraging Counterfeit WPS Office Download Sites [R/OL].(2025-05-15)

https://www.antiy.cn/research/notice&report/research_report/SwimSnake_Analysis_202505.html

[14] SwimSnake (Silver Fox) Cybercrime Group’s Latest Variant Attack Campaign [R/OL].(2025-08-17)

https://www.antiy.cn/research/notice&report/research_report/SwimSnake_Analysis_202508.html

[15] Continuous Tracking of the Dissemination and Tactics of the SwimSnake (Silver Fox) Cybercrime Group: Analysis of the Attack Methods of the Counterfeit Finalshell Management Software [R/OL].(2025-09-19)

https://www.antiy.cn/research/notice&report/research_report/SwimSnake_Analysis_202509.html

[16] How to Crack Down on Fake WPS Download Sites: A Special Report on the “SwimSnake (Silver Fox) [R/OL].(2025-10-10)

https://www.antiy.cn/research/notice&report/research_report/SwimSnake_Analysis_202510.html

[17] Targeting WeChat, DingTalk and Other Tools for Remote Access Trojan Deployment | Tracking the Tactics and Techniques of SwimSnake (Silver Fox) [R/OL].(2025-10-23)

https://www.antiy.cn/research/notice&report/research_report/SwimSnake_Report_202510.html

[18] Analysis of Multi-layer Concealed Payload Decryption and Driver-level Blinding Countermeasures | Technical and Tactical Tracking of “SwimSnake” (Silver Fox)  [R/OL].(2025-11-20)

https://www.antiy.cn/research/notice&report/research_report/SwimSnake_Analysis_202511.html