Hundreds of newly registered domains are actively targeting Chinese-speaking users with malware. This report analyzes this activity, detailing the range of deceptive lures employed, including imitations of messengers, browsers, VPNs, email services, and Adobe software.
Details
Since at least June of 2024, a cluster of over four hundred domains have been registered to host spoofed websites to deliver malware to Chinese-speaking users. Spoofed application download websites have included web browsers, VPNs, chat and email applications, as well as crypto wallet and online gambling related apps. These websites share several commonalities in registration details, backend infrastructure, website configurations, and theme. The following is a sampling of those domains.
Identified malware families have included Gh0stRAT, ValleyRAT, RemKos RAT, LummaStealer, RedLine and others.
Malicious domain kuailianlow[.]com, which spoofs as Kuailian Accelerator VPN (快连加速器)
Index.html
Both Download buttons contain an onclick=”down()” function call.
The down() function call is contained in a script within the HTML. Its purpose is to construct the file download path. To accomplish this it references a dictionary variable “window” to retrieve the value from the key “filename”.
The “filename.js” script is imported in the HTML and contains the window[‘filename’] value.
Expanding the search for similar websites and domain registration patterns identifies several spoofed VPN download websites.
Commonalities include the use of a filename.js to hold the malicious filename, and coding Chinese language text as opposed to the legitimate websites displaying content based on the language settings in the client’s browser settings. The latter suggests a preference for targeting Chinese language users.
Multiple spoofed VPNs such as LetsVPN appear in online guides as popular choices for bypassing the censorship of the Great Chinese Firewall.
A similar variation employs an additional imported JavaScript file to dynamically load the page content and button download actions.
Malicious domain, letscdn[.]world, which spoofs as LetsVPN
Excerpt from Index.html - File Download Buttons with href JavaScript function calls to onDownload()
Excerpt from Index.html - Importing “/assets/js/jquery.min.js” via script tags.
Excerpt from “/assets/js/jquery.min.js” - loads script “/assets/download/filename.js” and returns the download URL as “https[:]//” + “letscdn[.]world” + “/assets/download” + “letsvpn-latest.rar”
The value for the “window.filename” is contained in another imported JavaScript file: “/assets/download/filename.js”
Examples of fake login pages to deliver malware were also identified.
The following screenshot of malicious domains “xmengapp[.]top” and “xinmeng[.]xyz”, which spoof a company called Genting Trust Union, which is purportedly an enterprise management platform for businesses to engage customers, however no apparent legitimate company by the name was identified. It is suspected that this is a fabricated company and website to lure in prospective marketing and sales teams. The website purportedly offers several service and data integrator apps for marketing purposes but in fact only delivers trojans described below.
Included in the website’s imported JavaScript files is “/assets/js/ebzcecf9.js”, which contain login credentials for the website.
Logging into the application would load the following landing page:
Notably, the top bar “cloudtop” is a download button for a suspected malicious file but returns a 404.
The main section (right) is a range of services and tools related to online marketing and lead generation such as driving traffic to websites, automating tasks, managing multiple accounts, managing phone numbers for telemarketing, integrating proxies, overseas payments, AI tools for content creation and the like.
The left panel contains a page link for “User Management”.
Clicking the blue “Click verification” button shown in the screen capture above opens a pop up alert with the following message
"Detected that the bundled plugin is not installed. Please install and retry."
Clicking “OK”, opens a download prompt for the following .msi file. The msi file is bundled with multiple files including those that AV scanners tag as Gh0stRAT and Farfli trojans. A possible C2 was identified as “134.122.135[.]95”, which is a suspected ValleyRAT C2.
Associated malware, activity and methodologies appear to overlap closely with reporting by Knownsec 404 team and Fortinet of a suspected APT activity named “Silver Fox”.
Compendium of Chinese Malware Delivery Domains
The following are all examples of the spoofed websites for delivering malware utilized in this cluster of activity from at least June 2024 to January 2025. Example malware delivery domains and their respective malware download URLs and SHA256 hashes are provided as available for each example below. This listing is non-exhaustive of the variety of spoofed websites for delivering malware.
Spoofs as QuickQ, a network accelerator and encrypted traffic tool.
Spoof of Yuanqi, a website and app providing anime wallpapers without watermarks.
yqdesk[.]top
Spoof of KARIOS, which purports to be a “SMS Provider” such as sending text messages.
karlosqp[.]xyz
Spoofs as an unnamed merchant backend login page. Clicking login results in a popup with a “please install” link for a malicious file spoofing as a cryptokit_sando. Clicking OK directs to /update page with a banner to download the same file. This time spoofing as a Flashplayer update link.
Spoofs as Dex Screener, a cryptocurrency website. Clicking any buttons initiates a popup with download link spoofing as a Flashplayer update. It contains samples of Gh0stRAT and Blackmoon malware.
Spoofs of DeepL Pro, a machine translation company. The service purports to emphasize data security with end-to-end encryption and automatic deletion of translated text.
deepil[.]top
Spoofs of DeepL Pro, a machine translation company. The service purports to emphasize data security with end-to-end encryption and automatic deletion of translated text.
deeplx[.]top
Spoofs as 2345 Image King, software for viewing images.
2345ktws[.]xyz
Spoofs as Quark, AI. An AI-powered assistant application.
Spoofs as Enigma Messenger App, an end-to-end encrypted chat app.
immersivetranslate[.]top
Spoofs as a cryptocurrency exchange app.
tradingview[.]trade
Spoofs Signal messaging application, an end-to-end encrypted chat app.
signall[.]xyz
Spoofs Signal messaging application, an end-to-end encrypted chat app.
signel[.]top
Spoofs as AdsPower app, an anti-detect browser for managing multiple online accounts.
adspowerr[.]top
Spoofs as 360 Security Guard - Software Manager to download iTools app. iTools is used for managing Apple mobile devices.
i4app[.]top
Spoofs as FireFox browser download.
firefoxz[.]top
Spoofs of LianLian Pay application.
lianlianpoy[.]com
Spoofs as a financial payments management website.
shengfuton[.]com
Spoofs as a music streaming app.
wymusic[.]top
Spoofs as Snipaste, a screenshot and screen recording tool.
snipaste[.]top
Spoofs as Aurora PDF, a service for creating, editing and viewing PDF files.
jiguang[.]icu
Spoofs as Steam, a popular digital distribution platform for video games.
steams[.]top
Spoofs as 163 VPN built by NetEase, a Chinese tech company. 163 VPN is primarily designed for users within China to access websites blocked by the Great Firewall of China.
Spoofs of Google Play store to download a malicious application.
goople[.]top
Spoofs of Telegram messaging application.
telegrpcm[.]xyz
Conclusion
The spoofed malware delivery websites sampled in this report all share commonalities in configuration, domain registration patterns, and a suspected intent to target Chinese-speaking users. Indications suggest a broader target audience of Chinese language speakers outside of China including Malaysia and Hong Kong.
The majority of the malware identified being delivered by the spoofed websites were stealers and trojans with capabilities to steal credentials and provide remote access to compromised systems. All malware identified were intended for Windows operating systems. Among them were multiple samples AV vendors assessed to be Gh0stRAT, Lummanstealer, RedLine, Farfli and ValleyRAT. Of which, C2s were also identified as associated with ValleyRAT.
The activity and infrastructure of this cluster suggests a strong overlap with previously reported APT group SilverFox. Similarities include the spoofed websites, a focus on targeting Chinese-language speakers, and the use of ValleyRAT. Additionally, the overall volume, variety, and duration of the activity involved aligns with previous reports of SilverFox and suggests an organized and professional enterprise such as a commercial hack-for-hire or nation state sponsored contract.
While spoofing websites to deliver malware is nothing new, the sustained volume and consistency speaks to a larger systematic approach to target a specific demographic with an apparent intent on gaining access to Windows devices likely to initially steal credentials and provide continued access for follow-on engagements. In the past, speculation around similar campaigns involved acting as access brokers to sell to government organizations or other criminal groups. Another possibility may be the collateral targeting of a population to opportunistically compromise high-value targets. In other words, indiscriminate compromises until they strike gold on gaining access to, for example, a corporation’s system or credentials.
THE KNOWNSEC LEAK: Yet Another Leak of China’s Contractor-Driven Cyber-Espionage Ecosystem
Leaked Knownsec documents reveal China’s cyberespionage ecosystem. Analyze TargetDB, GhostX, and 404 Lab’s role in global reconnaissance and critical infrastructure targeting.
Learn More
Research
The APT35 Dump Episode 4: Leaking The Backstage Pass To An Iranian Intelligence Operation
APT35/Charming Kitten's leaked documents expose the financial machinery behind state-sponsored hacking. Learn how bureaucracy, crypto micro-payments, and administrative ledgers sustain Iranian cyber operations and link them to Moses Staff.
Learn More
Research
Chinese Malware Delivery Domains Part IV
Chinese Malware Delivery Domains Part IV uncovers 1,900+ new sites targeting Chinese-speaking users. Get a deep dive into infrastructure, TTPs, and AI-powered threat analysis.