
Key Alert:
A China-based threat group, identified as Silver Fox (also known as Void Arachne or The Great Thief of the Valley), is able to target the healthcare sector by distributing weaponized installers for Digital Imaging and Communications in Medicine (DICOM) viewers. These malicious installers deploy remote access trojans (RATs), creating backdoors that allow attackers to gain control over compromised systems.
Threat Overview:
- Targeted Component: Installers for DICOM viewers, specifically those mimicking legitimate applications like Philips DICOM viewers.
- Proof-of-Concept (PoC): Silver Fox has been observed distributing malware-laden installers that appear to be legitimate DICOM viewer applications. Upon installation, these programs deploy ValleyRAT malware, establishing unauthorized access to the system. The group employs tactics such as SEO poisoning, phishing, and social media manipulation to lure victims into downloading these malicious installers.
- Exploitation in the Wild: Active since at least December 2024, this campaign has involved 29 identified malware samples disguised as Philips DICOM viewers. While initial attacks focused on Chinese entities, Silver Fox has expanded its targets to include global healthcare organizations, aiming to steal sensitive data without engaging in extortion.
Healthcare Impacts:
- Unauthorized Data Access: Compromised systems may lead to unauthorized exposure of sensitive patient information and electronic health records (EHRs).
- Operational Disruption: Deployment of remote access trojans can disrupt healthcare operations, potentially compromising critical medical systems and devices.
- Incident Response Challenges: The stealthy nature of Silver Fox’s tactics complicates detection and remediation efforts, allowing prolonged unauthorized access to healthcare networks.
Exploitation Method:
Attackers distribute malicious installers masquerading as legitimate DICOM viewer applications. Upon installation, these programs deploy ValleyRAT malware, providing attackers with remote access to the system. The group utilizes various distribution methods, including SEO poisoning, phishing campaigns, and social media manipulation, to entice users into downloading the compromised software.
Affected Products and Versions:
- Installers purporting to be Philips DICOM viewers have been specifically targeted. However, other applications, such as EmEditor and various system drivers, have also been used as disguises for the malware.
- DICOM viewers are primarily used by patients to access medical imaging, which reduces—but does not eliminate—the risk of infection on hospital-exclusive endpoints. As healthcare delivery organizations (HDOs) expand their integration with remote patient care and hospital-at-home programs, the potential attack surface grows, increasing the risk of malware propagation into clinical networks.
Indicators of Compromise (IoCs):
- Unusual Network Activity: Unexpected outbound connections to external servers, particularly those associated with known malicious domains. C2 communications are included at the end with the C2 IP address and domain.
- Unauthorized File Modifications: Alterations to system files or the presence of unknown executables in directories associated with DICOM viewers.
- System Logs: Entries indicating the execution of unauthorized code or scripts, especially following the installation of DICOM viewer software.
First Stage Malware IoCs
6986a9a81b945e9ccfc434287bd9efd1daacc616a3104d05fd810b33d4d5d3f2 | MediaViewerLauncher.exe |
2074ec1d3f58b19bd398b45af71b9853d6c3a0fa7c7145d76208601cfb05d1d6 | MediaViewerLauncher.exe |
f06bd6e7a237c90800c09a584bd55ea5feaba92c29449c2bdfb8b93d0b830a78 | MediaViewerLauncher.exe |
8d5b4082253df5256772f0578a7f568b123d50e615cd76b9530dd80b29cb326a | MediaViewerLauncher.exe |
614d64e2128cd8fc169c27fe204b85bca59482d381ae1cbfe705498fe46b0a95 | MediaViewerLauncher.exe |
213ed93b19f0130313933a700cafbaa27bef8e1a60157b225959624a4c875068 | MediaViewerLauncher.exe |
67b1a2e2135e32521f5c73e609ea9b4880af7827e357e92689aa250d3849d7da | MediaViewerLauncher.exe |
62f43b9c64c262fb907a36f5d8af7d8e9515cabf3c5d2b522fe3e2d995056e90 | MediaViewerLauncher.exe |
9f24f06f4b2341d285a5c3aca32b2992628b43a16ad8db65d73148d190942194 | MediaViewerLauncher.exe |
70a5276147d9f07b886f8537c869d8983b75efaaffe47bdedaf1b5f4fbc8022f | MediaViewerLauncher.exe |
ce7a94842dab8193e49dc0cde2e7ba1444d447d62db10e46ef170914f657d1f5 | MediaViewerLauncher.exe |
f993e9a76b1a7a23443a6fa481bba54ec2ad97c4c30e2d7f753fc3d107b9653e | MediaViewerLauncher.exe |
d8f4ce58ecd7a79014f9f97998bc5d9ae4fa4616b6f023d7e42bd94f64776b4e | MediaViewerLauncher.exe |
32c451737246a8343d7975c5d6372f885e376339683bcfef25107226b10e6290 | MediaViewerLauncher.exe |
6e71e6b3a56db2c349c19cb20e5bc1eb87f98bd61af27887e73935bed3c5e2ac | MediaViewerLauncher.exe |
ff136fe84af8795f61581b70fbe2e9414785efa3c607fda5fcab90d54cd14c58 | MediaViewerLauncher.exe |
fa0834d1bfed5f3126549c5382ab0f4661a9acf10224ed06cdfa69b90d800283 | MediaViewerLauncher.exe |
d92850cc929423eab1da0022a4d8cc8394d44f1b3efd581ff9473cd38e81d4c5 | MediaViewerLauncher.exe |
84f7ca5e09b2b3a4da145b1d43f23e0d3e93c208cd0f22b8b08efe5d4c45f38b | MediaViewerLauncher.exe |
9fdbb9e0339723c090064c53e2233ff59f6af6a944d5dbfa856f9a7961081da5 | MediaViewerLauncher.exe |
ee4e724f76dbcce7cae2da7ece76312581199d02cfee92ddce9c5229e7f2ee5d | MediaViewerLauncher.exe |
445072e538481ea4d3b68474fdaf0a66d3c319bf17b5aa67762d2e8bbbc5c14c | MediaViewerLauncher.exe |
f5ee9514446bde4267ac1abcc6944c4abdbb384f00c4c5b9ca2e5444332b0d97 | MediaViewerLauncher.exe |
df1c6479002495d8d5b9cce0b0c333f4b653c78ac803ec4abd5031f920b3f1fa | MediaViewerLauncher.exe |
d36c6ed9da54a00013cbefe05027126d414061c5fab6751a82e28de4a2d44226 | MediaViewerLauncher.exe |
54ef199324122a373d4d5a1765565fc56a2781e7a6e622bd2a84a3dbac28031c | MediaViewerLauncher.exe |
8f1b46d88c5aed8c653f64d69b3acf04837e8b0df2a3d282b265cea7da324ca2 | MediaViewerLauncher.exe |
5dff4297730bbc999d7e25f9bf596048bd39e0acf17d842c03e34415e61a1747 | MediaViewerLauncher.exe |
Second Stage Malware IoCs
2d3c7fbb4fba459808f20fdc293cdc09951110302111526bc467f84a6f82f8f6 | a.gif |
5536f773a5f358f174026758ffae165d3a94c9c6a29471385a46c1598cfb2ad4 | b.gif |
7545ac54f4bdfe8a9a271d30a233f8717ca692a6797ca775de1b7d3eaab1e066 | c.gif |
6166ef3871e1952b05bce5a08a1db685e27bd83af83b0f92af20139dc81a4850 | d.gif |
6ebe9d4cffadf2566a960067fc226739dd74f361dca0b0809df66f1c7bb8049d | s.dat |
5207b0111dc5cc23da549559a8968ee36e39b5d8776e6f5b1e6bdc367937e7df | s.jpeg |
25b6f65c07b83293958c6f1e36d053b1d39c5dde864fde5cfc1834ecca591139 | 189atohci.sys |
b419964f0f219394bf9c6d5a9aa904796b14fdb2fe62b7079bbd0a48f4e902f1 | MsMpList.dat |
92f765df46c598c0f25ad69e862711565c6c23845ce2e4967ddde39ee1dd6c1d | WordPadFilter.db |
Final Stage Malware IoCs
a92b2727de7c14b63c50b7062b2fcf61098a5d4d8bf3f749444e72b0cfc45f2b | DLL |
81ff16aedf9c5225ce8a03c0608cc3ea417795d98345699f2c240a0d67c6c33d | f.dat |
48f258037be0ffe663da3bcd47dba22094cc31940083d9e18a71882bdc1ecdb8 | FOM-50.jpg |
a2065ea035c4e391c0fd897a932dcff34d2ccd34579844c732f3577bc443b196 | FOM-51.jpg |
901330243ef0f7f0aae4f610693da751873e5b632e5f39b98e3db64859d78cbc | FOM-52.jpg |
f919634ac7e0877663fff06ea9e430b530073d6e79eee543d02331f4dff64375 | FOM-53.jpg |
cbf556ebc3ed7d3d3ddcd399f1a1f4212251b151f52cdafc60c4676dc4df60ab | tbcore3.dll |
4556d5d106adbd9e1c5627940bd2314ca59b2cc8c01359680ca70928b6bafc50 | log.src |
2da901c7e1441286d7e90d6a9f114ebb020e56d6f2200ea68111a691f29ff71b | Keylogger |
e26d5e23bee9695b05323928f66cec4d969178ebfc00e9930b71c356c5d37167 | Crypto miner |
15e272118e984d2bdeaec7e1f72a6568eb0a82e1d0431c5d824ced33120c706e | utils.vcxproj |
vien3h.oss-cn-beijing.aliyuncs[.]com | Staging Domain |
8.217.60[.]40:8917 | Defunct Alibaba Cloud C2 |
Tactics, Techniques, and Procedures (TTPs):
Tactics | Techniques |
---|---|
Initial Access | T1566.001 (Spear Phishing Attachment) |
Execution | T1203 (Exploitation for Client Execution) |
Persistence | T1547.001 (Registry Run Keys / Startup Folder) |
Privilege Escalation | T1068 (Exploitation for Privilege Escalation) |
Defense Evasion | T1218.005 (Mshta) |
Credential Access | T1555.003 (Credentials from Web Browsers) |
Command and Control | T1071.001 (Web Protocols) |
Recommendations for Healthcare Organizations:
Immediate Actions:
- Verify Software Authenticity: Ensure that all DICOM viewer software and other critical applications are downloaded directly from official and reputable sources.
- Apply Security Patches: Keep all systems and software up to date with the latest security patches to mitigate known vulnerabilities.
- Monitor Network Activity: Implement continuous monitoring for unusual outbound connections, especially those to unfamiliar external servers.
Long-Term Defense:
- User Training: Educate staff on the risks of downloading software from unverified sources and recognizing phishing attempts.
- Advanced Threat Protection: Deploy advanced security solutions capable of detecting and preventing the execution of unauthorized code.
- Regular Audits: Conduct periodic security assessments of all systems, focusing on the integrity of medical imaging software and associated devices.
Leadership Guidance:
This finding underscores the necessity for robust cybersecurity measures within healthcare environments. Leadership should prioritize the implementation of strict software procurement policies, regular staff training on cybersecurity best practices, and investment in advanced threat detection solutions to protect sensitive patient data and maintain operational continuity.
Blackwell Security MHXDR Customers:
Blackwell Threat Analysts currently assess the Silver Fox APT as a low-risk threat to Blackwell clients, as there have been no confirmed attacks targeting entities within the United States using this specific malware. However, given Silver Fox’s objectives and capabilities, the potential for targeting U.S. entities, particularly within the healthcare sector, remains a concern, as the industry is a lucrative target for financially motivated threat actors. While the immediate risk is considered low, Blackwell’s Managed Healthcare Extended Detection and Response (MHXDR) systems are actively monitoring for indicators associated with this threat. To mitigate potential risks, organizations should ensure all software installations are sourced exclusively from verified, official channels. Blackwell Security’s automated and manual threat analysis tools are fully equipped to detect and respond to suspicious activities related to this campaign, providing an additional layer of protection to safeguard critical healthcare operations.