Chasing the Silver Fox: Cat & Mouse in Kernel Shadows

Aug. 28, 2025, 1:45 p.m.

Description

Check Point Research uncovered an ongoing campaign by the Silver Fox APT group exploiting a previously unknown vulnerable driver to evade endpoint protection. The attackers used a Microsoft-signed WatchDog Antimalware driver to terminate protected processes on fully updated Windows systems. A dual-driver strategy ensured compatibility across Windows versions. Following disclosure, the vendor released a patched driver, but attackers quickly adapted by modifying it to bypass blocklists while preserving its valid signature. The campaign delivered ValleyRAT as the final payload, demonstrating sophisticated evasion techniques and highlighting the growing trend of weaponizing signed-but-vulnerable drivers to bypass security measures.

Date

  • Created: Aug. 28, 2025, 1:26 p.m.
  • Published: Aug. 28, 2025, 1:26 p.m.
  • Modified: Aug. 28, 2025, 1:45 p.m.

Indicators

  • fc97ad46767a45f4e59923f96d15ec5b680a33f580af7cc4e320fb9963933f26
  • d24fffc34e45c168ea4498f51a7d9f7f074d469c8d4317e8e2205c33a99b5364
  • baccea051dc6bb1731fa2bc97c5e0cc2cd37463e83bf73a400451ad7ba00a543
  • b26aecc21da159c0073ecde31cc292d87c8674af8c312776d2cc9827e5c1ad6a
  • 9e72b958b4ad9fdf64b6f12a89eb2bae80097a65dc8899732bce9dafda622148
  • 9c394dcab9f711e2bf585edf0d22d2210843885917d409ee56f22a4c24ad225e
  • 5f23694d44850c1963b38d8eab638505d14c5605e9623fb98e9455795fa33321
  • 5af1dae21425dda8311a2044209c308525135e1733eeff5dd20649946c6e054c
  • 57f37bc0519557cf3f4c375fd04900a4d5afb82e3b723c6b9d0f96dc08eea84d
  • 35ccb9c521c301e416a3ea0c0292ae93914fe165eb45f749c16de03a99f5fa8e
  • 2f0e34860194ccd232f7c8c27fefe44c96b63468e8581f93c38767725255f945
  • 0be8483c2ea42f1ce4c90e84ac474a4e7017bc6d682e06f96dc1e31922a07b10
  • 12b3d8bc5cc1ea6e2acd741d8a80f56cf2a0a7ebfa0998e3f0743fcf83fabb9e
  • 09587073acbfec909eea69aa49774b3fdaa681db9cec7cb20a4143050897c393
  • 156.241.144.66
  • 156.234.58.194

Attack Patterns

Additional Informations

  • China