MirageFox

Malware Profile Updated 3 months ago
Download STIX
Preview STIX
MirageFox is a sophisticated malware, believed to be an updated version of the Remote Access Trojan (RAT) known as Mirage, which originated in 2012. The malware has been attributed with high confidence to Advanced Persistent Threat group 15 (APT15), due to code and other similarities found in the MirageFox binaries. Interestingly, the name MirageFox was derived from a string found in the Export directory for the modules, labeled as "MirageFox_Server.dat". This suggests that this new variant is not just an upgrade, but a distinct entity within the same family. In a recent campaign involving MirageFox, researchers discovered a binary uploaded on June 8, 2018, which was almost identical to a RAT mentioned in the RoyalAPT report related to the 2017 campaign. This binary was barely detected, with only 7 out of 66 detections on VirusTotal. The MirageFox binaries export a function called dll_wWinMain, similar to a module by McAfee. This strongly indicates some form of DLL hijacking, where a legitimate McAfee binary is likely distributed with MirageFox to load the DLL properly into a seemingly legitimate process. MirageFox operates similarly to previous malware created by APT15, initially collecting information about the targeted computer, such as the username, CPU information, and architecture. The malware then uses this information for various malicious activities, including data theft and disruption of operations. Given its sophistication and ability to evade detection, MirageFox poses a significant threat to cybersecurity.
What's your take? (Question 1 of 3)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
APT15
1
APT15, also known as Vixen Panda, Nickel, Flea, KE3CHANG, Royal APT, and Playful Dragon, is a threat actor group suspected to be of Chinese origin. The group targets global sectors including trade, economic and financial, energy, and military, aligning with the interests of the Chinese government. I
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Rat
Malware
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
RoyalAPTUnspecified
1
None
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Source Document References
Information about the MirageFox Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
MITRE
a year ago
MirageFox: APT15 Resurfaces With New Tools Based On Old Ones - Intezer