How the Silver Fox Group Deploys the ABCDoor Backdoor: A Step-by-Step Breakdown of the Attack Chain

By

Overview

In late 2025 and early 2026, the Silver Fox threat group launched a sophisticated phishing campaign targeting organizations in India and Russia. By impersonating tax authorities, they tricked victims into downloading a malicious archive that initiated a multi-stage attack chain. The final payload was a previously undocumented Python backdoor named ABCDoor. This guide dissects each step of the operation, providing security teams with a clear understanding of the adversary's tactics, techniques, and procedures (TTPs). By following these steps, analysts can better detect, respond to, and mitigate similar attacks.

How the Silver Fox Group Deploys the ABCDoor Backdoor: A Step-by-Step Breakdown of the Attack Chain
Source: securelist.com

What You Need

Step 1: Recognize the Phishing Email Template

The attack begins with a spear-phishing email crafted to appear as official correspondence from a tax authority. For the Indian campaign (December 2025), the sender spoofed the Income Tax Department and used subjects like "Tax Audit Notice" or "List of Tax Violations." In the Russian campaign (January 2026), the emails mimicked the Federal Tax Service (ФНС). Both variants leveraged the urgency of tax compliance to pressure recipients into opening attachments or links.

The use of PDF links instead of direct executables helps bypass email security gateways, as the malicious content requires user interaction to fetch.

Step 2: Extract the Initial Payload from the Phishing Artifact

Once the victim opens the attachment or clicks the link, they download a ZIP or RAR archive. Inside this archive is the first-stage payload: a modified version of the open-source Rust-based loader called RustSL (publicly available on GitHub). The loader file may be named Click File.exe (India) or фнс.exe (Russia) and often bears a fake PDF icon to deceive users.

Step 3: Analyze the RustSL Loader's Behavior

When executed, the RustSL loader performs the following actions:

  1. Establishes an HTTP connection to the C2 server (e.g., abc.haijing88[.]com).
  2. Downloads the second-stage payload: the ValleyRAT backdoor (a well-known remote access trojan).
  3. Injects or executes ValleyRAT in memory to avoid writing to disk.

To detect this step, monitor for outbound HTTP requests to suspicious domains and unexpected child processes spawned from the RustSL executable.

Step 4: Observe ValleyRAT's Installation and Plugin Delivery

ValleyRAT is a modular backdoor that can accept plugins. During the Silver Fox campaign, the attackers deployed a new plugin that acts as a loader for a custom Python-based backdoor. This plugin is retrieved from the same C2 infrastructure and loaded into the ValleyRAT process.

How the Silver Fox Group Deploys the ABCDoor Backdoor: A Step-by-Step Breakdown of the Attack Chain
Source: securelist.com

Step 5: Identify and Analyze the ABCDoor Backdoor

Once the ValleyRAT plugin executes, it drops and runs a Python script or compiled Python binary that we have named ABCDoor. This backdoor was first observed in late 2024 and has been used in real-world attacks from Q1 2025 onward. ABCDoor provides persistent remote access and can:

To analyze ABCDoor, locate the Python bytecode or script (often hidden in temp directories or embedded in the plugin). Decompile if necessary, and extract embedded C2 addresses and encryption keys.

Step 6: Trace the Full Attack Chain and Identify IoCs

Combine the evidence from the previous steps to reconstruct the complete infection chain:

  1. Phishing email → PDF/archive → RustSL loader
  2. RustSL → download ValleyRAT
  3. ValleyRAT → plugin → ABCDoor Python backdoor

Collect all indicators of compromise (IoCs):

Tips for Detection and Mitigation

Related Articles

Recommended

Discover More

AI Debate Turns Violent: Musk-Altman Feud Highlights Growing ExtremismUnlocking Local AI: How NVIDIA and Google's Gemma 4 Brings Agentic Intelligence to Your DeviceSecuring Your cPanel Server Against Critical Authentication Flaws: A Step-by-Step Update GuideExpedited Python Releases: 3.14.2 and 3.13.11 Address Regressions and Security IssuesNew Cybercrime Syndicates Unleash Fast-Paced Vishing and SSO Attacks Against SaaS Platforms