{"id":104711,"date":"2025-02-24T01:00:57","date_gmt":"2025-02-24T09:00:57","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=104711"},"modified":"2025-02-25T12:43:52","modified_gmt":"2025-02-25T20:43:52","slug":"healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/","title":{"rendered":"Healthcare Malware Hunt, Part 1: Silver Fox APT Targets Philips DICOM Viewers"},"content":{"rendered":"<h2>Part 1: Silver Fox APT Abuses Philips DICOM Viewer to Deliver RAT for Backdoor Access<\/h2>\n<p><strong>Summary<\/strong><\/p>\n<ul>\n<li>Healthcare remains a top target for ransomware. <strong>However,<\/strong><strong> threats to the sector extend beyond ransomware.<\/strong><\/li>\n<li>We identified a campaign by the China-based APT Silver Fox, which exploited Philips DICOM viewers to deploy a backdoor, keylogger, and a crypto miner on victim computers.<\/li>\n<\/ul>\n<p><strong>Mitigation Recommendations for Healthcare Delivery Organizations (HDOs)<\/strong><\/p>\n<ul>\n<li>Avoid downloading software or files from untrusted sources, including patient devices.<\/li>\n<li>Implement network segmentation to isolate untrusted devices\/networks from internal systems.<\/li>\n<li>Run up-to-date antivirus or endpoint detection and response (EDR) solutions.<\/li>\n<li>Continuously monitor all network traffic and endpoint telemetry to detect the IoCs listed below.<\/li>\n<\/ul>\n<p><strong>UPDATE:<\/strong> <em>Forescout Research \u2013 Vedere Labs has no evidence that Philips or Philips medical devices were hacked to distribute malicious versions of their DICOM Viewer. The threat actor involved in this campaign is known for using techniques, such as phishing and watering holes to distribute malware. <a href=\"https:\/\/isc.sans.edu\/diary\/31188\" target=\"_blank\" rel=\"noopener\">Past campaigns<\/a> targeting DICOM viewers (not from Philips) used the same techniques.<\/em><\/p>\n<hr style=\"height: 1px; background-color: #d9dde0; border-top: 0;\" \/>\n<p>Healthcare was the <a href=\"\/research-labs\/2024-threat-roundup\/\">most targeted critical infrastructure<\/a> sector in both 2023 and 2024. While many of those attacks <a href=\"\/blog\/ransomware-in-healthcare-lessons-learned-from-interlock-attacks\/\">involved ransomware<\/a>, impacting data availability and potentially disrupting patient care, other threats to healthcare organizations directly exploit medical applications.<\/p>\n<p>During a threat hunt for new malicious software, we identified a cluster of 29 malware samples masquerading as Philips DICOM viewers. These samples deployed <a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.valley_rat\" target=\"_blank\" rel=\"noopener\">ValleyRAT<\/a>, a backdoor remote access tool (RAT) used by the Chinese threat actor Silver Fox to gain control of victim computers. In addition to the backdoor, victims were also infected with a keylogger and a crypto miner, a behavior not previously associated with this threat actor.<\/p>\n<p>Below, we provide a detailed analysis of this new Silver Fox campaign and outline mitigation strategies to reduce risk.<\/p>\n<h2>Identified Malware Cluster<\/h2>\n<p>The malware cluster we uncovered contained trojanized versions of <code>MediaViewerLauncher.exe<\/code>, the primary executable for the <a href=\"https:\/\/www.philips.com\/c-dam\/b2bhc\/master\/sites\/netforum\/Philips_DICOM_Viewer_-_download_version_R3.0_SP15.pdf\" target=\"_blank\" rel=\"noopener\">Philips DICOM viewer<\/a>. All identified samples were submitted to VirusTotal from the United States or Canada between December 2024 and January 2025.<\/p>\n<p>Pivoting off the initial 29 samples, we identified numerous additional instances masquerading as other types of software. These samples (collected between July 2024 and January 2025) exhibit common traits, such as PowerShell defense evasion techniques, distinctive process execution patterns, and shared file system artifacts.<\/p>\n<p>Notably, the samples demonstrate evolutionary behavior, suggesting ongoing malware development:<\/p>\n<ul>\n<li><strong>July 2024<\/strong>: 12 samples exhibited basic defense evasion, employing a single PowerShell exclusion command, simple process chains, and minimal use of system utilities.<\/li>\n<li><strong>August 2024<\/strong>: 13 samples introduced multiple PowerShell exclusion commands, more complex process chains, and expanded use of system utilities.<\/li>\n<li><strong>October 2024 &#8211; December 2024<\/strong>: 3 samples indicated further advancements incorporating additional exclusion paths and new file system actions.<\/li>\n<li><strong>January 2025<\/strong>: 2 samples demonstrated multiple layers of PowerShell commands, reflecting advanced evasion techniques.<\/li>\n<\/ul>\n<p>The latest malware samples masquerade as legitimate software, including <code>MediaViewerLauncher.exe<\/code> for the DICOM Viewer and <code>emedhtml.exe<\/code> for EmEditor. Additionally, some samples were disguised as system drivers and utilities, such as <code>x64DrvFx.exe<\/code>.<\/p>\n<h2>Silver Fox ATP History<\/h2>\n<p>Silver Fox, also known as <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/f\/behind-the-great-wall-void-arachne-targets-chinese-speaking-user.html\" target=\"_blank\" rel=\"noopener\">Void Arachne<\/a> and <a href=\"https:\/\/www.zscaler.com\/it\/blogs\/security-research\/technical-analysis-latest-variant-valleyrat\" target=\"_blank\" rel=\"noopener\">The Great Thief of Valley<\/a>, is an APT that has historically targeted Chinese-speaking victims and has been highly active since 2024. Over the past year the group has demonstrated evolving tactics, techniques, and procedures (TTPs) shifting its focus to a broader range of targets:<\/p>\n<ul>\n<li><strong>June<\/strong><strong> 2024:<\/strong> <a href=\"https:\/\/thehackernews.com\/2024\/06\/void-arachne-uses-deepfakes-and-ai-to.html\" target=\"_blank\" rel=\"noopener\">Silver Fox was first identified<\/a> targeting Chinese victims with malware that downloaded the trojan Winos 4.0, also known as ValleyRAT. This campaign leveraged SEO poisoning, social media and messaging platforms to distribute malware disguised as AI applications or VPN software.<\/li>\n<li><strong>June<\/strong><strong> 2024:<\/strong> Later that month, the group was observed deploying a <a href=\"https:\/\/www.zscaler.com\/it\/blogs\/security-research\/technical-analysis-latest-variant-valleyrat\" target=\"_blank\" rel=\"noopener\">modified version of ValleyRAT<\/a> incorporating DLL sideloading, process injection, and an HTTP File Server (HFS) for download and command-and-control (C2).<\/li>\n<li><strong>July 2024:<\/strong> A <a href=\"https:\/\/medium.com\/@knownsec404team\/analysis-of-the-suspected-apt-attack-activities-by-silver-fox-25781647da2b\" target=\"_blank\" rel=\"noopener\">new analysis<\/a> suggested that Silver Fox may be an APT masquerading as cybercriminals, as its targeting shifted to governmental institutions and cybersecurity companies.<\/li>\n<li><strong>August 2024:<\/strong> A <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/valleyrat-campaign-targeting-chinese-speakers\" target=\"_blank\" rel=\"noopener\">further campaign<\/a> targeted e-commerce, finance, sales, and management enterprises.<\/li>\n<li><strong>September 2024:<\/strong> The group <a href=\"https:\/\/www.huorong.cn\/document\/tech\/vir_report\/1772\" target=\"_blank\" rel=\"noopener\">was observed<\/a> using a TrueSight driver to disable antivirus software.<\/li>\n<li><strong>November 2024:<\/strong> Silver Fox <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/threat-campaign-spreads-winos4-through-game-application\" target=\"_blank\" rel=\"noopener\">shifted its Winos\/ValleyRAT distribution methods<\/a>, leveraging gaming applications as a new delivery mechanism.<\/li>\n<li><strong>January 2025:<\/strong> The <a href=\"https:\/\/intezer.com\/blog\/malware-analysis\/weaponized-software-targets-chinese\/\" target=\"_blank\" rel=\"noopener\">PNGPlug loader<\/a> was first identified as part of the group\u2019s TTPs.<\/li>\n<li><strong>February 2025:<\/strong> A <a href=\"https:\/\/hackread.com\/valleyrat-malware-variant-fake-chrome-downloads\/\" target=\"_blank\" rel=\"noopener\">new campaign was identified<\/a> targeting finance, accounting and sales professionals, aiming to steal sensitive data.<\/li>\n<\/ul>\n<p>The new malware cluster we identified, which includes filenames mimicking healthcare applications, English-language executables, and file submissions from the United States and Canada, suggests that the group may be expanding its targeting to new regions and sectors. Additionally, the group\u2019s use of a crypto miner, detailed below, indicates the introduction of new TTPs into their campaigns.<\/p>\n<h2>Overview of Malware Behavior: From DICOM Viewer to ValleyRAT<\/h2>\n<p>The samples in this cluster, including <code>MediaViewerLauncher.exe<\/code>, function as first-stage payloads that may be delivered through multiple vectors. While we cannot confirm the exact distribution method, Silver Fox has a history of using SEO poisoning and phishing to propagate its malware.<\/p>\n<p>The figure below illustrates the malware\u2019s execution flow, from the initial infection stage to the deployment of its final payloads. A detailed breakdown of its behavior follows in the next section.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-104766 size-full\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Silver-Fox-ATP-activity-diagram.webp\" alt=\"\" width=\"1920\" height=\"2062\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Silver-Fox-ATP-activity-diagram.webp 1920w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Silver-Fox-ATP-activity-diagram-279x300.webp 279w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Silver-Fox-ATP-activity-diagram-953x1024.webp 953w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Silver-Fox-ATP-activity-diagram-768x825.webp 768w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Silver-Fox-ATP-activity-diagram-1430x1536.webp 1430w, https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/Silver-Fox-ATP-activity-diagram-1907x2048.webp 1907w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><\/p>\n<p>The first-stage malware performs two key preparatory functions before executing additional payloads:<\/p>\n<ul>\n<li><strong>Beaconing and Reconnaissance:<\/strong> It runs native Windows utilities such as <code>ping.exe<\/code>, <code>find.exe<\/code>, <code>cmd.exe<\/code> and <code>ipconfig.exe<\/code> to check if the system can reach the C2 server.<\/li>\n<li>Security Evasion via PowerShell Exclusions:\n<ul>\n<li><strong>August 2024:<\/strong> Introduced PowerShell commands to exclude certain paths from Windows Defender scanning, preparing the system for further malware stages.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"padding-left: 40px;\"><code>Add-MpPreference -ExclusionPath 'C:\\ProgramData','C:\\Users\\Public' -Force<\/code><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>December 2024 &#8211; January 2025:<\/strong> Expanded exclusions to additional system directories, increasing stealth:<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"padding-left: 40px;\"><code>Add-MpPreference -ExclusionPath 'C:\\','C:\\ProgramData','C:\\Users','C:\\Program Files (x86)' -Force<\/code><\/p>\n<p>After executing these preparatory steps, the first stage contacts an Alibaba Cloud bucket to download several encrypted payloads disguised as image files. These payloads, detailed at the end of this report, include:<\/p>\n<ul>\n<li><a href=\"https:\/\/github.com\/MaorSabag\/TrueSightKiller\" target=\"_blank\" rel=\"noopener\">TrueSightKiller<\/a><\/li>\n<li>A <a href=\"https:\/\/en.wikipedia.org\/wiki\/CYREN\" target=\"_blank\" rel=\"noopener\">Cyren<\/a> AV DLL and executable<\/li>\n<li>Other auxiliary files and shellcode<\/li>\n<\/ul>\n<p>Once downloaded, the malware decrypts the payloads and generates a malicious executable (second-stage malware) which is registered as a Windows scheduled task. This task executes immediately and is configured to run at every user login, ensuring persistence on the infected system.<\/p>\n<p>The second-stage malware loads the Cyren AV DLL containing injected code designed to evade debugging. It then enumerates system processes to identify various security software (detailed at the end of this report) and terminates them using TrueSightKiller.<\/p>\n<p>Once security defenses are disabled, the second stage downloads an encrypted file, decrypting it into the third-stage payload, the ValleyRAT backdoor and loader module, which communicates with a C2 server hosted in Alibaba Cloud. ValleyRAT then retrieves additional encrypted payloads which, once decrypted, function as a keylogger and a crypto miner. All three final payloads (backdoor, keylogger and crypto miner) achieve persistence on the victim through scheduled tasks.<\/p>\n<p>At the time of this analysis, the Alibaba Cloud storage buckets remained accessible, but the C2 server was already offline.<\/p>\n<p>Each stage of the malware incorporates encryption, obfuscation and evasion techniques to resist detection and analysis. These include:<\/p>\n<ul>\n<li><strong>Obfuscation Methods:<\/strong>\n<ul>\n<li>API hashing to conceal function calls.<\/li>\n<li>Indirect API retrieval to avoid static analysis.<\/li>\n<li>Indirect control flow manipulation to hinder debugging and reverse engineering.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Evasion Techniques:<\/strong>\n<ul>\n<li>Long sleep intervals to delay execution and evade sandbox detection.<\/li>\n<li>System fingerprinting to tailor execution based on the target environment.<\/li>\n<li>Masked DLL loading to avoid security monitoring.<\/li>\n<li>RPC-based task scheduling and driver loading to bypass standard process monitoring.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Additionally, the malware also adds random bytes to both dropped and loaded files, making detection and file hash-based hunting significantly more challenging.<\/p>\n<h2>Detailed Malware Analysis<\/h2>\n<p>The following analysis was conducted on an individual malware <a href=\"https:\/\/www.virustotal.com\/gui\/file\/36e0f8704377fd238792cce9ca9349ed13e5044bbad69324d01ed424c99d8361\" target=\"_blank\" rel=\"noopener\">sample<\/a>, so the filenames and hashes presented here are specific to that sample. While other samples in the cluster use different filenames, their overall behavior remains consistent.<\/p>\n<p>The first-stage malware downloads an initial encrypted file named <code>i.dat<\/code> from an Alibaba Cloud bucket at <code>vien3h[.]oss-cn-beijing[.]aliyuncs[.]com<\/code>. The <code>i.dat<\/code> file contains URLs for six additional files hosted in the same cloud bucket, which for the analyzed sample were named <code>a.gif<\/code>, <code>b.gif<\/code>, <code>c.gif<\/code>, <code>d.gif<\/code>, <code>s.dat<\/code> and <code>s.jpeg<\/code>. These files are downloaded, decrypted and saved on the filesystem with new filenames. In the analyzed sample, the decrypted filenames were <code>install.exe<\/code>, <code>vselog.dll<\/code>, <code>WordPadFilter.db<\/code>, <code>MsMpList.dat<\/code> and <code>189atohci.sys<\/code>. The <code>s.jpeg<\/code>\u00a0 file was not decrypted into a separate file, but was directly processed as shellcode in memory.<\/p>\n<p>The shellcode begins by scanning process memory for <code>kernel32.dll:GetProcAddress<\/code> (hash: <code>0x1ab9b854<\/code>). It then uses <code>GetProcAddress<\/code> to retrieve the addresses of the following critical functions: <code>LoadLibraryA<\/code>, <code>VirtualAlloc<\/code>, <code>VirtualFree<\/code> and <code>lstrcmpiA<\/code>. Next the malware loads <code>ntdll<\/code> and retrieves from it the address of <code>RtlZeroMemory<\/code> and <code>RtlMoveMemory<\/code>. These functions are subsequently used for memory manipulation and payload unpacking. The shellcode then calls <code>VirtualAlloc<\/code> to allocate memory and unpacks a malicious DLL that will later be used for RPC-based task scheduling of malicious binaries.<\/p>\n<p>The shellcode then loads <code>RPCRT4.dll<\/code> and retrieves references for RPC-related functions <code>RpcBindingFromStringBindingW<\/code>, <code>RpcStringFreeW<\/code>, <code>RpcBindingComposeW<\/code>, <code>NdrClientCall3<\/code> and <code>RpcBindingSetAuthInfoExA<\/code>. Additionally, it loads <code>KERNEL32.dll<\/code> and retrieves references for <code>HeapAlloc<\/code> and <code>HeapFree<\/code>. The malware leverages a function from the persistence DLL that utilizes the named pipe <code>\\\\pipe\\atsvc<\/code> to create a string binding in the form <code>ncacn_np:[\\\\\\pipe\\\\\\\\atsvc]<\/code>. It then creates an RPC binding and executes <code>NdrClinetCall3<\/code> with the following XML task description:<\/p>\n<div style=\"padding: 10px; border: solid 1px black;\"><code><br \/>\n&lt;?xml version=\"10\" encoding=\"UTF-16\"?&gt;<br \/>\n&lt;Task version=\"12\"<br \/>\nxmlns=\"http:\/\/schemasmicrosoft.com\/windows\/2004\/02\/mit\/task\"&gt;<br \/>\n&lt;RegistrationInfo&gt;<br \/>\n&lt;Description&gt;&lt;\/Description&gt;<br \/>\n&lt;\/RegistrationInfo&gt;<br \/>\n&lt;Triggers&gt;<br \/>\n&lt;LogonTrigger&gt;<br \/>\n&lt;Enabled&gt;true&lt;\/Enabled&gt;<br \/>\n&lt;\/LogonTrigger&gt;<br \/>\n&lt;RegistrationTrigger&gt;<br \/>\n&lt;Enabled&gt;true&lt;\/Enabled&gt;<br \/>\n&lt;\/RegistrationTrigger&gt;<br \/>\n&lt;TimeTrigger&gt;<br \/>\n&lt;Repetition&gt;<br \/>\n&lt;Interval&gt;PT1M&lt;\/Interval&gt;<br \/>\n&lt;StopAtDurationEnd&gt;false&lt;\/StopAtDurationEnd&gt;<br \/>\n&lt;\/Repetition&gt;<br \/>\n&lt;StartBoundary&gt;2011-04-23T00:00:00&lt;\/StartBoundary&gt;<br \/>\n&lt;Enabled&gt;true&lt;\/Enabled&gt;<br \/>\n&lt;\/TimeTrigger&gt;<br \/>\n&lt;\/Triggers&gt;<br \/>\n&lt;Principals&gt;<br \/>\n&lt;Principal id=\"Author\"&gt;<br \/>\n&lt;GroupId&gt;S-1-5-32-545&lt;\/GroupId&gt;<br \/>\n&lt;RunLevel&gt;HighestAvailable&lt;\/RunLevel&gt;<br \/>\n&lt;\/Principal&gt;<br \/>\n&lt;\/Principals&gt;<br \/>\n&lt;Settings&gt;<br \/>\n&lt;MultipleInstancesPolicy&gt;IgnoreNew&lt;\/MultipleInstancesPolicy&gt;<br \/>\n&lt;DisallowStartIfOnBatteries&gt;false&lt;\/DisallowStartIfOnBatteries&gt;<br \/>\n&lt;StopIfGoingOnBatteries&gt;true&lt;\/StopIfGoingOnBatteries&gt;<br \/>\n&lt;AllowHardTerminate&gt;false&lt;\/AllowHardTerminate&gt;<br \/>\n&lt;StartWhenAvailable&gt;true<br \/>\n&lt;\/StartWhenAvailable&gt;<br \/>\n&lt;RunOnlyIfNetworkAvailable&gt;false&lt;\/RunOnlyIfNetworkAvailable&gt;<br \/>\n&lt;IdleSettings&gt;<br \/>\n&lt;StopOnIdleEnd&gt;true&lt;\/StopOnIdleEnd&gt;<br \/>\n&lt;RestartOnIdle&gt;false&lt;\/RestartOnIdle&gt;<br \/>\n&lt;\/IdleSettings&gt;<br \/>\n&lt;AllowStartOnDemand&gt;true&lt;\/AllowStartOnDemand&gt;<br \/>\n&lt;Enabled&gt;true&lt;\/Enabled&gt;<br \/>\n&lt;Hidden&gt;true&lt;\/Hidden&gt;<br \/>\n&lt;RunOnlyIfIdle&gt;false&lt;\/RunOnlyIfIdle&gt;<br \/>\n&lt;WakeToRun&gt;false&lt;\/WakeToRun&gt;<br \/>\n&lt;ExecutionTimeLimit&gt;PT0S&lt;\/ExecutionTimeLimit&gt;<br \/>\n&lt;Priority&gt;4&lt;\/Priority&gt;<br \/>\n&lt;\/Settings&gt;<br \/>\n&lt;Actions Context=\"Author\"&gt;<br \/>\n&lt;Exec&gt;<br \/>\n&lt;Command&gt;C:\\Users\\REDACTED\\Documents\\TO7RUF.exe&lt;\/Command&gt;<br \/>\n&lt;WorkingDirectory&gt;C:\\Users\\REDACTED\\Documents\\&lt;\/WorkingDirectory&gt;<br \/>\n&lt;Arguments&gt;&lt;\/Arguments&gt;<br \/>\n&lt;\/Exec&gt;<br \/>\n&lt;\/Actions&gt;undefined<br \/>\n&lt;\/Task&gt;<br \/>\n<\/code><\/div>\n<p>&nbsp;<\/p>\n<p>This schedules a Windows task to execute <code>TO7RUF.exe<\/code>, which corresponds to the Cyren AV executable (<code>vseamps.exe<\/code> or <code>install.exe<\/code>.) This task is configured to run immediately upon scheduling and then every time the current user logs in, ensuring persistence. After scheduling the task, the first-stage malware cleans all dynamically allocated memory and exits, effectively transitioning execution to the second stage.<\/p>\n<p>The second-stage malware begins by loading <code>vselog.dll<\/code> and jumping to its <code>DLLMain<\/code> function to check for the presence of a debugger and evade analysis. It also checks for the presence of <code>MsMpList.dat<\/code>, a key indicator used for further execution logic.<\/p>\n<p>Analyzing the second-stage payload requires setting a breakpoint on <code>RtlUserThreadStart<\/code> and monitoring the <code>RCX<\/code> parameter passed to that function. Once executed, the malware loads and decrypts <code>WordPadFilter.db<\/code> and <code>MsMpList.dat<\/code>, writes both files into its own process memory using <code>WriteProcessMemory<\/code> and calls <code>DisableThreadLibraryCalls<\/code> to prevent the debugger from intercepting DLL loading.<\/p>\n<p>Execution then transitions to the decrypted shellcode from <code>WordPadFilter.db<\/code> and <code>MsMpList.dat<\/code> shellcode, which scans for installed security software. If security software is detected, the malware uses RPC calls to load the <code>TrueSightKiller<\/code> driver from <code>189atohci.sys<\/code>, executes <code>DeviceIoControl<\/code> to request IOCTL number <code>0x22e044<\/code> with parameter <code>MsMpEng<\/code> and <code>NisSrv.exe<\/code> effectively terminating Windows Defender and disabling Windows native network monitoring, allowing the malware to operate undetected.<\/p>\n<p>After disabling security defenses, the malware reconnects to the same Alibaba Cloud bucket and downloads four additional encrypted payloads named <code>FOM-50.jpg<\/code>, <code>FOM-51.jpg<\/code>, <code>FOM-52.jpg<\/code> and <code>FOM-53.jpg<\/code>. These files are decrypted into <code>OKSave.exe<\/code> (produced in memory from a benign <code>uninstall.exe<\/code> component of Internet Explorer), <code>tbcore3U.dll<\/code>, <code>log.src<\/code> and <code>utils.vcxproj<\/code>. The execution flow proceeds as follows; <code>OKSave.exe<\/code> loads <code>tbcore3U.dll<\/code>, which in turn unpacks and executes malware from <code>log.src<\/code> and <code>utils.vcxproj<\/code>, deploying both a crypto miner and a keylogger, which stores logs in <code>C:\\xxxx.in<\/code>.<\/p>\n<p>At this stage, three persistent malicious executables reside on the system: the <code>ValleyRAT<\/code> backdoor, the keylogger and the crypto miner. These malware components are scheduled to run either at system boot or upon scheduled task creation. The malware communicates with its C2 server hosted on Alibaba Cloud at <code>8.217.60[.]40:8917<\/code>.<\/p>\n<h2>Conclusion and Mitigation Recommendations<\/h2>\n<p>Our investigation uncovered a new campaign involving sophisticated and rapidly evolving malware deployed by a Chinese threat actor. This campaign leverages trojanized DICOM viewers as lures to infect victim systems with a backdoor (ValleyRAT) for remote access and control, a keylogger to capture user activity and credentials, and a crypto miner to exploit system resources for financial gain.<\/p>\n<p>While these DICOM viewers likely target patients rather than hospitals directly, as patients often use these applications to view their own medical images, the risk to HDOs remains significant. In scenarios where patients bring infected devices into hospitals for diagnosis, or emerging scenarios, such as <a href=\"https:\/\/www.aha.org\/hospitalathome\" target=\"_blank\" rel=\"noopener\">hospital-at-home<\/a> programs, which rely on patient-owned technology, these infections could spread beyond individual patient devices, allowing threat actors to potentially gain an initial foothold within healthcare networks.<\/p>\n<p>To minimize risk and prevent unauthorized access, HDOs should implement the following risk mitigation measures:<\/p>\n<ul>\n<li>Avoid downloading software or files from untrusted sources.<\/li>\n<li>Prohibit loading of files from patient devices onto healthcare workstations or other network-connected equipment.<\/li>\n<li>Implement strong network segmentation to isolate untrusted devices and networks (e.g. guest Wi-Fi) from internal hospital infrastructure.<\/li>\n<li>Ensure all endpoints are protected with up-to-date antivirus or EDR solutions.<\/li>\n<li>Continuously monitor all network traffic and endpoint telemetry for suspicious activity.<\/li>\n<li>Proactively hunt for malicious activity that aligns with known threat actor behavior, ensuring early detection and response.<\/li>\n<\/ul>\n<h2>IoCs and Further Details<\/h2>\n<p>The indicators of compromise (IoCs) associated with this campaign are available on the Forescout Vedere Labs <a href=\"https:\/\/forescout.vederelabs.com\/register\" target=\"_blank\" rel=\"noopener\">threat feed<\/a>.<\/p>\n<div class=\"c-responsive-table td-min-width-0 padding-slim th-no-wrap\" style=\"overflow-wrap: anywhere;\">\n<table>\n<tbody>\n<tr>\n<th><strong>IoC<\/strong><\/th>\n<th><strong>Description<\/strong><\/th>\n<\/tr>\n<tr>\n<td>abd903bad26d190210954cac00f5d96d43fcb4a89823337e1669977b50a122f8<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>6986a9a81b945e9ccfc434287bd9efd1daacc616a3104d05fd810b33d4d5d3f2<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>2074ec1d3f58b19bd398b45af71b9853d6c3a0fa7c7145d76208601cfb05d1d6<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>f06bd6e7a237c90800c09a584bd55ea5feaba92c29449c2bdfb8b93d0b830a78<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>8d5b4082253df5256772f0578a7f568b123d50e615cd76b9530dd80b29cb326a<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>614d64e2128cd8fc169c27fe204b85bca59482d381ae1cbfe705498fe46b0a95<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>213ed93b19f0130313933a700cafbaa27bef8e1a60157b225959624a4c875068<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>67b1a2e2135e32521f5c73e609ea9b4880af7827e357e92689aa250d3849d7da<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>62f43b9c64c262fb907a36f5d8af7d8e9515cabf3c5d2b522fe3e2d995056e90<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>9f24f06f4b2341d285a5c3aca32b2992628b43a16ad8db65d73148d190942194<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>70a5276147d9f07b886f8537c869d8983b75efaaffe47bdedaf1b5f4fbc8022f<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>ce7a94842dab8193e49dc0cde2e7ba1444d447d62db10e46ef170914f657d1f5<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>f993e9a76b1a7a23443a6fa481bba54ec2ad97c4c30e2d7f753fc3d107b9653e<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>d8f4ce58ecd7a79014f9f97998bc5d9ae4fa4616b6f023d7e42bd94f64776b4e<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>32c451737246a8343d7975c5d6372f885e376339683bcfef25107226b10e6290<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>6e71e6b3a56db2c349c19cb20e5bc1eb87f98bd61af27887e73935bed3c5e2ac<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>ff136fe84af8795f61581b70fbe2e9414785efa3c607fda5fcab90d54cd14c58<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>fa0834d1bfed5f3126549c5382ab0f4661a9acf10224ed06cdfa69b90d800283<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>d92850cc929423eab1da0022a4d8cc8394d44f1b3efd581ff9473cd38e81d4c5<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>84f7ca5e09b2b3a4da145b1d43f23e0d3e93c208cd0f22b8b08efe5d4c45f38b<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>9fdbb9e0339723c090064c53e2233ff59f6af6a944d5dbfa856f9a7961081da5<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>ee4e724f76dbcce7cae2da7ece76312581199d02cfee92ddce9c5229e7f2ee5d<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>445072e538481ea4d3b68474fdaf0a66d3c319bf17b5aa67762d2e8bbbc5c14c<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>f5ee9514446bde4267ac1abcc6944c4abdbb384f00c4c5b9ca2e5444332b0d97<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>df1c6479002495d8d5b9cce0b0c333f4b653c78ac803ec4abd5031f920b3f1fa<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>d36c6ed9da54a00013cbefe05027126d414061c5fab6751a82e28de4a2d44226<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>54ef199324122a373d4d5a1765565fc56a2781e7a6e622bd2a84a3dbac28031c<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>8f1b46d88c5aed8c653f64d69b3acf04837e8b0df2a3d282b265cea7da324ca2<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>5dff4297730bbc999d7e25f9bf596048bd39e0acf17d842c03e34415e61a1747<\/td>\n<td>MediaViewerLauncher.exe<\/td>\n<\/tr>\n<tr>\n<td>31adb4043339320c360d43686ace3736bac87df27dc309c7c544820acdb34a93<\/td>\n<td>i.dat<\/td>\n<\/tr>\n<tr>\n<td>2d3c7fbb4fba459808f20fdc293cdc09951110302111526bc467f84a6f82f8f6<\/td>\n<td>a.gif<\/td>\n<\/tr>\n<tr>\n<td>5536f773a5f358f174026758ffae165d3a94c9c6a29471385a46c1598cfb2ad4<\/td>\n<td>b.gif<\/td>\n<\/tr>\n<tr>\n<td>7545ac54f4bdfe8a9a271d30a233f8717ca692a6797ca775de1b7d3eaab1e066<\/td>\n<td>c.gif<\/td>\n<\/tr>\n<tr>\n<td>6166ef3871e1952b05bce5a08a1db685e27bd83af83b0f92af20139dc81a4850<\/td>\n<td>d.gif<\/td>\n<\/tr>\n<tr>\n<td>6ebe9d4cffadf2566a960067fc226739dd74f361dca0b0809df66f1c7bb8049d<\/td>\n<td>s.dat<\/td>\n<\/tr>\n<tr>\n<td>5207b0111dc5cc23da549559a8968ee36e39b5d8776e6f5b1e6bdc367937e7df<\/td>\n<td>s.jpeg<\/td>\n<\/tr>\n<tr>\n<td>25b6f65c07b83293958c6f1e36d053b1d39c5dde864fde5cfc1834ecca591139<\/td>\n<td>189atohci.sys<\/td>\n<\/tr>\n<tr>\n<td>b419964f0f219394bf9c6d5a9aa904796b14fdb2fe62b7079bbd0a48f4e902f1<\/td>\n<td>MsMpList.dat<\/td>\n<\/tr>\n<tr>\n<td>92f765df46c598c0f25ad69e862711565c6c23845ce2e4967ddde39ee1dd6c1d<\/td>\n<td>WordPadFilter.db<\/td>\n<\/tr>\n<tr>\n<td>0e66d7ec29ad8b088971d337db79bc916c219e523bd538f5a9dc7e0179c2547a<\/td>\n<td>DLL<\/td>\n<\/tr>\n<tr>\n<td>a92b2727de7c14b63c50b7062b2fcf61098a5d4d8bf3f749444e72b0cfc45f2b<\/td>\n<td>DLL<\/td>\n<\/tr>\n<tr>\n<td>81ff16aedf9c5225ce8a03c0608cc3ea417795d98345699f2c240a0d67c6c33d<\/td>\n<td>f.dat<\/td>\n<\/tr>\n<tr>\n<td>48f258037be0ffe663da3bcd47dba22094cc31940083d9e18a71882bdc1ecdb8<\/td>\n<td>FOM-50.jpg<\/td>\n<\/tr>\n<tr>\n<td>a2065ea035c4e391c0fd897a932dcff34d2ccd34579844c732f3577bc443b196<\/td>\n<td>FOM-51.jpg<\/td>\n<\/tr>\n<tr>\n<td>901330243ef0f7f0aae4f610693da751873e5b632e5f39b98e3db64859d78cbc<\/td>\n<td>FOM-52.jpg<\/td>\n<\/tr>\n<tr>\n<td>f919634ac7e0877663fff06ea9e430b530073d6e79eee543d02331f4dff64375<\/td>\n<td>FOM-53.jpg<\/td>\n<\/tr>\n<tr>\n<td>cbf556ebc3ed7d3d3ddcd399f1a1f4212251b151f52cdafc60c4676dc4df60ab<\/td>\n<td>tbcore3.dll<\/td>\n<\/tr>\n<tr>\n<td>4556d5d106adbd9e1c5627940bd2314ca59b2cc8c01359680ca70928b6bafc50<\/td>\n<td>log.src<\/td>\n<\/tr>\n<tr>\n<td>2da901c7e1441286d7e90d6a9f114ebb020e56d6f2200ea68111a691f29ff71b<\/td>\n<td>Keylogger<\/td>\n<\/tr>\n<tr>\n<td>e26d5e23bee9695b05323928f66cec4d969178ebfc00e9930b71c356c5d37167<\/td>\n<td>Crypto miner<\/td>\n<\/tr>\n<tr>\n<td>15e272118e984d2bdeaec7e1f72a6568eb0a82e1d0431c5d824ced33120c706e<\/td>\n<td>utils.vcxproj<\/td>\n<\/tr>\n<tr>\n<td>vien3h.oss-cn-beijing.aliyuncs.com<\/td>\n<td>Domain name of\u00a0 Alibaba cloud bucket hosting the loader and \u00a0final payload stages.<\/td>\n<\/tr>\n<tr>\n<td>8.217.60[.]40:8917<\/td>\n<td>Defunct Alibaba cloud C2<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>List of security software explicitly checked for by the second-stage executable:<\/p>\n<p><code>[\"HipsMain.exe\", \"HipsTray.exe\", \"HipsDaemon.exe\", \"360Safe.exe\", \"360tray.exe\", \"360sd.exe\", \"MsMpEng.exe\", \"NisSrv.exe\", \"ZhuDongFangYu.exe\", \"SecurityHealthSystray.exe\", \"kscan.exe\", \"kwsprotect64.exe\", \"kxescore.exe\", \"kxetray.exe\", \"kxemain.exe\", \"ksetupwiz.exe\", \"QMDL.exe\", \"QMPersonalCenter.exe\", \"QQPCPatch.exe\", \"QQPCRealTimeSpeedup.exe\", \"QQPCRTP.exe\", \"QQPCTray.exe\", \"QQRepair.exe\", \"QQPCMgrUpdate.exe\", \"KSafeTray.exe\", \"mpcopyaccelerator.exe\", \"UnThreat.exe\", \"K7TSecurity.exe\", \"ad-watch.exe\", \"PSafeSysTray.exe\", \"vsserv.exe\", \"remupd.exe\", \"rtvscan.exe\", \"ashDisp.exe\", \"avcenter.exe\", \"TMBMSRV.exe\", \"knsdtray.exe\", \"avp.exe\", \"avpui.exe\", \"avgwdsvc.exe\", \"AYAgent.aye\", \"V3Svc.exe\", \"mssecess.exe\", \"QUHLPSVC.EXE\", \"RavMonD.exe\", \"KvMonXP.exe\", \"baiduSafeTray.exe\", \"BaiduSd.exe\", \"LAVService.exe\", \"LenovoTray.exe\", \"LenovoPcManagerService.exe\", \"LISFService.exe\", \"LnvSvcFdn.exe\", \"wsctrl10.exe\", \"wsctrl11.exe\", \"wsctrlsvc.exe\", \"wsctrl.exe\", \"Bka.exe\", \"BkavService.exe\", \"BkavSystemServer.exe\", \"BkavSystemService.exe\", \"BkavSystemService64.exe\", \"BkavUtil.exe\", \"BLuPro.exe\", \"BluProService.exe\", \"cefutil.exe\", \"PopWndLog.exe\", \"PromoUtil.exe\", \"QHActiveDefense.exe\", \"QHSafeMain.exe\", \"QHSafeScanner.exe\", \"QHSafeTray.exe\", \"QHWatchdog.exe\"]<\/code><\/p>\n<p>The table below summarizes the files downloaded by the first and second-stage malware, both before and after decryption. At the time of analysis, none of these files were detected as malicious by antivirus solutions prior to decryption. However, as of this writing, three files (<code>vselog.dll<\/code>, <code>189atohci.sys<\/code> and <code>FOM-51.jpg<\/code>) have been flagged as malicious after decryption. It is important to note that not every file listed should be considered malicious, only those explicitly identified in the IoC table above.<\/p>\n<div class=\"c-responsive-table td-min-width-0 padding-slim th-no-wrap\" style=\"overflow-wrap: anywhere;\">\n<table>\n<tbody>\n<tr>\n<th>Name<\/th>\n<th>SHA256<\/th>\n<th>Decrypts into<\/th>\n<\/tr>\n<tr>\n<td>i.dat<\/td>\n<td>31adb4043339320c360d43686ace3736bac87df27dc309c7c544820acdb34a93<\/td>\n<td>URLs for a.gif, b.gif, c.gif, d.gif, s.jpeg and the strings for their decrypted filenames<br \/>\ninstall.exe, vselog.dll, WordPadFilter.db, MsMpList.dat and 189atohci.sys.<\/td>\n<\/tr>\n<tr>\n<td>a.gif<\/td>\n<td>2d3c7fbb4fba459808f20fdc293cdc09951110302111526bc467f84a6f82f8f6<\/td>\n<td>vseamps.exe\/install.exe\/random.exe. Part of Cyren AV, benign file used for DLL injection. SHA256:<br \/>\nd2537dc4944653efcd48de73961034cfd64fb7c8e1ba631a88bba62cccc11948<\/td>\n<\/tr>\n<tr>\n<td>b.gif<\/td>\n<td>5536f773a5f358f174026758ffae165d3a94c9c6a29471385a46c1598cfb2ad4<\/td>\n<td>vselog.dll. SHA256:\n<p>A6BB2CE9688620E6335F39124A08718A623E3A71A0E9953104FCFC54BA05856B<\/td>\n<\/tr>\n<tr>\n<td>c.gif<\/td>\n<td>7545ac54f4bdfe8a9a271d30a233f8717ca692a6797ca775de1b7d3eaab1e066<\/td>\n<td>WordPadFilter.db. SHA256: 92f765df46c598c0f25ad69e862711565c6c23845ce2e4967ddde39ee1dd6c1d\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td>d.gif<\/td>\n<td>6166ef3871e1952b05bce5a08a1db685e27bd83af83b0f92af20139dc81a4850<\/td>\n<td>MsMpList.dat. SHA256:\n<p>B419964F0F219394BF9C6D5A9AA904796B14FDB2FE62B7079BBD0A48F4E902F1<\/td>\n<\/tr>\n<tr>\n<td>s.dat<\/td>\n<td>6ebe9d4cffadf2566a960067fc226739dd74f361dca0b0809df66f1c7bb8049d<\/td>\n<td>189atohci.sys, TrueSightKiller driver used to disable antivirus. SHA256:\n<p>25b6f65c07b83293958c6f1e36d053b1d39c5dde864fde5cfc1834ecca591139<\/td>\n<\/tr>\n<tr>\n<td>s.jpeg<\/td>\n<td>5207b0111dc5cc23da549559a8968ee36e39b5d8776e6f5b1e6bdc367937e7df<\/td>\n<td>Shellcode that is executed in a dynamically allocated memory region set to PAGE_EXECUTE_READWRITE.<br \/>\nIt unpacks a DLL for persistence by RPC task scheduling. SHA256:<br \/>\n0E66D7EC29AD8B088971D337DB79BC916C219E523BD538F5A9DC7E0179C2547A<br \/>\nIt unpacks a DLL with SHA256: a92b2727de7c14b63c50b7062b2fcf61098a5d4d8bf3f749444e72b0cfc45f2b<\/td>\n<\/tr>\n<tr>\n<td>f.dat<\/td>\n<td>81FF16AEDF9C5225CE8A03C0608CC3EA417795D98345699F2C240A0D67C6C33D<\/td>\n<td rowspan=\"5\">Payloads that once processed will produce\n<p>OkSave.exe starting from a benign uninstall.exe file that is part of Internet Explorer. It will<br \/>\nload\u00a0 tbcore3U.dll with SHA256:\n<p>cbf556ebc3ed7d3d3ddcd399f1a1f4212251b151f52cdafc60c4676dc4df60ab<\/p>\n<p>&nbsp;<\/p>\n<p>utils.vcxproj with SHA256:<br \/>\n15e272118e984d2bdeaec7e1f72a6568eb0a82e1d0431c5d824ced33120c706e\n<p>and log.src with SHA256:<\/p>\n<p>4556D5D106ADBD9E1C5627940BD2314CA59B2CC8C01359680CA70928B6BAFC50<\/p>\n<p>&nbsp;<\/p>\n<p>OkSave.exe will use utils.vcxproj and log.src to drop Crypto-miner with SHA256:<\/p>\n<p>E26D5E23BEE9695B05323928F66CEC4D969178EBFC00E9930B71C356C5D37167<\/p>\n<p>&nbsp;<\/p>\n<p>Keylogger and trojan horse with SHA256:<\/p>\n<p>2da901c7e1441286d7e90d6a9f114ebb020e56d6f2200ea68111a691f29ff71b<\/td>\n<\/tr>\n<tr>\n<td>FOM-50.jpg<\/td>\n<td>48F258037BE0FFE663DA3BCD47DBA22094CC31940083D9E18A71882BDC1ECDB8<\/td>\n<\/tr>\n<tr>\n<td>FOM-51.jpg<\/td>\n<td>a2065ea035c4e391c0fd897a932dcff34d2ccd34579844c732f3577bc443b196<\/td>\n<\/tr>\n<tr>\n<td>FOM-52.jpg<\/td>\n<td>901330243EF0F7F0AAE4F610693DA751873E5B632E5F39B98E3DB64859D78CBC<\/td>\n<\/tr>\n<tr>\n<td>FOM-53.jpg<\/td>\n<td>F919634AC7E0877663FFF06EA9E430B530073D6E79EEE543D02331F4DFF64375<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Our series on threat hunting for malware in healthcare cybersecurity uncovers Silver Fox APT\u2019s use of a Philips DICOM Viewer for backdoor access.<\/p>\n","protected":false},"author":180,"featured_media":104768,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[540],"tags":[],"coauthors":[747,748,438,542],"class_list":["post-104711","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-research-and-cyber-alerts"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Healthcare Malware Hunt, Part 1: Philips DICOM Viewers<\/title>\n<meta name=\"description\" content=\"Our series on threat hunting for malware in healthcare cybersecurity uncovers Silver Fox APT\u2019s use of a Philips DICOM Viewer for backdoor access.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Healthcare Malware Hunt, Part 1: Philips DICOM Viewers\" \/>\n<meta property=\"og:description\" content=\"Our series on threat hunting for malware in healthcare cybersecurity uncovers Silver Fox APT\u2019s use of a Philips DICOM Viewer for backdoor access.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-24T09:00:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-25T20:43:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/VL-Medical-Hunt-Part-1-Nav-V1A.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Amine Amri, Sai Molige, Daniel dos Santos, Forescout Research - Vedere Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/\"},\"author\":{\"name\":\"Amine Amri\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/00806b9503b71dff7fae4cf1d99fd334\"},\"headline\":\"Healthcare Malware Hunt, Part 1: Silver Fox APT Targets Philips DICOM Viewers\",\"datePublished\":\"2025-02-24T09:00:57+00:00\",\"dateModified\":\"2025-02-25T20:43:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/\"},\"wordCount\":3557,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/VL-Medical-Hunt-Part-1-Nav-V1A.webp\",\"articleSection\":[\"Research &amp; Cyber Alerts\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/\",\"name\":\"Healthcare Malware Hunt, Part 1: Philips DICOM Viewers\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/VL-Medical-Hunt-Part-1-Nav-V1A.webp\",\"datePublished\":\"2025-02-24T09:00:57+00:00\",\"dateModified\":\"2025-02-25T20:43:52+00:00\",\"description\":\"Our series on threat hunting for malware in healthcare cybersecurity uncovers Silver Fox APT\u2019s use of a Philips DICOM Viewer for backdoor access.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/VL-Medical-Hunt-Part-1-Nav-V1A.webp\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/VL-Medical-Hunt-Part-1-Nav-V1A.webp\",\"width\":1201,\"height\":629},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Healthcare Malware Hunt, Part 1: Silver Fox APT Targets Philips DICOM Viewers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/00806b9503b71dff7fae4cf1d99fd334\",\"name\":\"Amine Amri\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/e447c627681d4bf5e7a06ed2177f5428\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/24a25bccb60b5113681d3332a08966e783bbb20407020ddf7531d5affd5c5ada?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/24a25bccb60b5113681d3332a08966e783bbb20407020ddf7531d5affd5c5ada?s=96&d=mm&r=g\",\"caption\":\"Amine Amri\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Healthcare Malware Hunt, Part 1: Philips DICOM Viewers","description":"Our series on threat hunting for malware in healthcare cybersecurity uncovers Silver Fox APT\u2019s use of a Philips DICOM Viewer for backdoor access.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/","og_locale":"en_US","og_type":"article","og_title":"Healthcare Malware Hunt, Part 1: Philips DICOM Viewers","og_description":"Our series on threat hunting for malware in healthcare cybersecurity uncovers Silver Fox APT\u2019s use of a Philips DICOM Viewer for backdoor access.","og_url":"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2025-02-24T09:00:57+00:00","article_modified_time":"2025-02-25T20:43:52+00:00","og_image":[{"width":1201,"height":629,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/VL-Medical-Hunt-Part-1-Nav-V1A.webp","type":"image\/webp"}],"author":"Amine Amri, Sai Molige, Daniel dos Santos, Forescout Research - Vedere Labs","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/"},"author":{"name":"Amine Amri","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/00806b9503b71dff7fae4cf1d99fd334"},"headline":"Healthcare Malware Hunt, Part 1: Silver Fox APT Targets Philips DICOM Viewers","datePublished":"2025-02-24T09:00:57+00:00","dateModified":"2025-02-25T20:43:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/"},"wordCount":3557,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/VL-Medical-Hunt-Part-1-Nav-V1A.webp","articleSection":["Research &amp; Cyber Alerts"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/","url":"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/","name":"Healthcare Malware Hunt, Part 1: Philips DICOM Viewers","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/VL-Medical-Hunt-Part-1-Nav-V1A.webp","datePublished":"2025-02-24T09:00:57+00:00","dateModified":"2025-02-25T20:43:52+00:00","description":"Our series on threat hunting for malware in healthcare cybersecurity uncovers Silver Fox APT\u2019s use of a Philips DICOM Viewer for backdoor access.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/VL-Medical-Hunt-Part-1-Nav-V1A.webp","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/VL-Medical-Hunt-Part-1-Nav-V1A.webp","width":1201,"height":629},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Healthcare Malware Hunt, Part 1: Silver Fox APT Targets Philips DICOM Viewers"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/00806b9503b71dff7fae4cf1d99fd334","name":"Amine Amri","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/e447c627681d4bf5e7a06ed2177f5428","url":"https:\/\/secure.gravatar.com\/avatar\/24a25bccb60b5113681d3332a08966e783bbb20407020ddf7531d5affd5c5ada?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/24a25bccb60b5113681d3332a08966e783bbb20407020ddf7531d5affd5c5ada?s=96&d=mm&r=g","caption":"Amine Amri"}}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/02\/VL-Medical-Hunt-Part-1-Nav-V1A.webp","is_file":false,"excerpt_manually_set":true,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/104711","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/180"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=104711"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/104711\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/104768"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=104711"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=104711"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=104711"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=104711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}