{"id":45877,"date":"2022-03-25T00:00:00","date_gmt":"2022-03-25T00:00:00","guid":{"rendered":"urn:uuid:3a0ba19e-9a0f-65c4-9dff-c2cc12f9c034"},"modified":"2022-03-25T00:00:00","modified_gmt":"2022-03-25T00:00:00","slug":"purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/","title":{"rendered":"Purple Fox Uses New Arrival Vector and Improves Malware Arsenal"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/c\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/Purple%20Fox%20banner.png\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/c\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/Purple%20Fox%20banner.png\" class=\"ff-og-image-inserted\"><\/div>\n<div readability=\"33.5\">\n<div readability=\"12\">\n<p>In previous campaigns in 2019, HTTP file servers (HFS) were used by Purple Fox to run the C&amp;C servers that host files on the infected bots. In this most recent investigation, we found an exposed HFS that the Purple Fox group uses to host all the second stage samples with their update timestamps. We were able to track the frequency of the second stage updated packages pushed to this exposed server using the timestamp data. Figure 3 shows the number of different second stage malicious packages that received updates. They are still actively updating their components at the time of writing.&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"35\">\n<div readability=\"15\">\n<p><span class=\"body-subhead-title\">Notable Purple Fox tools and techniques<\/span><\/p>\n<p><b>Disguised packages and malicious components in svchost.txt<\/b><\/p>\n<p>We noted that some of the software they were impersonating were commonly used by Chinese users. The following list shows the recently used software and the corresponding malicious payload for the second stage of the infection. As mentioned above, the different payloads will be served by the C&amp;C upon execution based on the last character in the module filename.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"44.557956777996\">\n<div readability=\"34.656188605108\">\n<p>We tracked a server hosting the second stage payloads and saw a compressed RAR archive holding the second stage loaders along with the file <b>svchost.txt<\/b>, which contains all the malicious portable executable (PE) module components that will be dropped in the second stage.&nbsp; &nbsp;&nbsp;<\/p>\n<p>The order of the PE modules inside svchost.txt is dependent on the package requested by the malicious installers. As previously mentioned, the last character in the installer filename will determine the final set of the auxiliary modules that will be stuffed inside svchost.txt.<\/p>\n<p><b>Shellcode user-mode loader and anti-forensics methods<\/b><\/p>\n<p>A specific set of portable executable (PE) modules found in one of the most distributed clusters from the malware had a wide range of capabilities in terms of AV evasion. This cluster is noteworthy for various reasons as well \u2014 it has links to older families, it loaded a previously documented Purple Fox MSI installer, and it had different rootkit capabilities in the auxiliary PE modules. More details about this cluster can be found in our <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/c\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/Technical%20Brief%20-%20A%20Look%20Into%20Purple%20Fox%E2%80%99s%20New%20Arrival%20Vector.pdf\">technical brief<\/a>.&nbsp;<\/p>\n<p>After analyzing all the observed malicious execution parents delivering different clusters, we found that the shellcode component at the prologue of the dropped svchost.txt was similar across all the different variants, regardless of the actual payloads embedded after the shellcode. It has two different implementations across all the clusters.&nbsp;<\/p>\n<p>The first shellcode implements four main functions for the intended functionality, as shown in Figure 4.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"41.5\">\n<div readability=\"28\">\n<p>Meanwhile, the new shellcode is more minimalistic because it implements only important functionalities to load a PE in memory and parse several system APIs addresses. It resolves different system APIs from the first one we mentioned.&nbsp;<\/p>\n<p>One more thing to note: the Purple Fox group implements a customized user-mode shellcode loader that leaves little traces for cybersecurity forensics. It minimizes both the quantity and quality of the forensic evidence as the execution doesn\u2019t rely on the native loader and doesn&#8217;t respect the PE format for a successful execution.<\/p>\n<p><b>The use of FatalRAT and incremental updates<\/b><\/p>\n<p>After the shellcode loads and allocates memory for the PE modules inside svchost.txt, the execution flow will call into the first PE module found after the shellcode. This is a remote access trojan (RAT) that inherits its functionality from a malware known as FatalRAT, a sophisticated C++ RAT that implements a wide set of remote capabilities for the attackers.&nbsp;&nbsp;<\/p>\n<p>The executed FatalRAT variants shown in Figures 5 and 6 differ across each cluster, illustrating that the attackers are incrementally updating it.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"36\">\n<div readability=\"17\">\n<p>The RAT is responsible for loading and executing the auxiliary modules based on checks performed on the victim systems. Changes can happen if specific AV agents are running or if registry keys are found. The auxiliary modules are intended as support for the group\u2019s specific objectives.&nbsp;<\/p>\n<p><b>New capabilities to evade cybersecurity mechanisms&nbsp;<\/b><\/p>\n<p>One of the analyzed executables embedded in svchost.txt is a user-mode client used to interface with the accompanying rootkit module. This client supports five different commands, each command implements a specific functionality to be executed from the kernel driver with the appropriate input\/output control (IOCTL) interface exposed. Table 2 shows the details of each command:&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"38\">\n<div readability=\"21\">\n<p>The functionality to \u201ckill a mini-filter\u201d is notable in terms of AV evasion. File systems are targets for input-output (I\/O) operations to access files, and file system filtering is the mechanism by which the drivers can intercept calls sent to the file system \u2014 this specifically is useful for AV agents. The model called \u2018file system mini-filters\u2019 was developed to replace the legacy filter mechanism. Mini-filters are easier to write and are the preferred way to develop file system filtering drivers in almost all AV engines.<\/p>\n<p>We looked deeper into the mini-filter driver killer and how the attackers implemented this functionality. The driver first enumerates all the registered mini filter drivers on the system using the system API <b>FltEnumerateFilters<\/b>, then it gets the targeted mini-filter object information it is searching for by calling <b>FltGetFilterInformation<\/b>. Lastly, it creates a new system thread to unregister the mini-filter driver and terminate the created system thread (<b>PsCreateSystemThread<\/b>, <b>FltUnregisterFilter<\/b>).<\/p>\n<p>Figure 7 shows the specific call graph for the system APIs used for this functionality.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"52.332187857961\">\n<div readability=\"50.357388316151\">\n<p><b>The uses of revoked code signing certificates<\/b><\/p>\n<p>To control the quality of the code that runs in the address space of the kernel-land, Microsoft only allows signed drivers to run in kernel mode. They do this by enforcing kernel-mode code signing (KMCS) mechanisms.<\/p>\n<p>Due to performance issues and backward compatibility, Windows actually allows the loading of a kernel driver signed by a revoked code signing certificate. So, by testing a previous kernel driver and allowing it to be revoked, it can be loaded successfully. This design choice allows mature threat actors to chase and pursue any stolen code signing certificate and add it to their malware arsenal. If the malware authors acquire any certificate that has been verified by a trusted certificate authority and by Microsoft, even if it was revoked, attackers can use it for malicious purposes.<\/p>\n<p><span class=\"body-subhead-title\">Links to previous Purple Fox activities and artifacts&nbsp;<\/span><\/p>\n<p>Analyzing the artifacts dropped by this new infection chain, we first looked at the stolen code signing certificates used to sign the kernel drivers\u2019 modules. This led us to analyze other signed malicious samples in our malware repository, which revealed links to previously known intrusion sets.<\/p>\n<p>There were three different stolen code signing certificates confirmed to be related to this campaign with links to Purple Fox:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Hangzhou Hootian Network Technology Co., Ltd. &#8211; We found a strong connection to early activity of the Purple Fox botnet that <a href=\"https:\/\/www.guardicore.com\/labs\/the-nansh0u-campaign-hackers-arsenal-grows-stronger\/\" target=\"_blank\" rel=\"noopener\">started in 2019<\/a>.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Shanghai Oceanlink Software Technology Co. Ltd. &#8211; Analysis revealed several clusters of malicious kernel modules previously used in Purple Fox activities.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Shanghai easy kradar Information Consulting Co. Ltd. \u2013 This certificate overlaps with \u201cHangzhou Hootian Network\u201d in signing a common cluster of kernel drivers that was also previously seen in Purple Fox activities.<\/span><\/li>\n<\/ul>\n<p>This campaign is similar with earlier Purple Fox activities in other ways as well, namely, how the attack infrastructure is run and the malware hosted on their servers:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">The first stage C&amp;C server 202[.]8.123[.]98 links FatalRAT operators with the Purple Fox. The server was hosting the malicious compressed archives in this campaign and was used before by FatalRAT as their main C&amp;C server.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">One of the first stage servers (194.146.84.245) hosted an old module for the MSI installer for Purple Fox (e1f3ac7f.moe) that will eventually load the crypto miner discussed in the previous blogs.&nbsp;<\/span><\/li>\n<li><span class=\"rte-red-bullet\">The dropped FatalRAT from the malicious archive found on the first stage C&amp;C server revealed many code similarities with a previously documented info stealer known as <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/zegost-campaign-targets-internal-interests\" target=\"_blank\" rel=\"noopener\">Zegost<\/a>. We go into commonalities found between these Purple Fox campaign modules and the old Zegost samples in our technical brief.<\/span><\/li>\n<\/ul>\n<p><span class=\"body-subhead-title\">Conclusion<\/span><\/p>\n<p>Operators of the Purple Fox botnet are still active and consistently updating their arsenal with new malware, while also upgrading the malware variants they have. They are also trying to improve their signed rootkit arsenal for AV evasion and trying to bypass detection mechanisms by targeting them with customized signed kernel drivers.<\/p>\n<p>Abusing stolen code signing certificates and unprotected drivers are becoming more common with malicious actors. Software driver vendors should secure their code signing certificates and follow secure practices in the Windows kernel driver development process.&nbsp;<\/p>\n<p>For more details on this topic download our <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/c\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/Technical%20Brief%20-%20A%20Look%20Into%20Purple%20Fox%E2%80%99s%20New%20Arrival%20Vector.pdf\" target=\"_blank\" rel=\"noopener\">technical brief<\/a>&nbsp;and for the full list of the Indicators of Compromise download this <a href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/c\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/IOCs-Purple-Fox.txt\" target=\"_blank\" rel=\"noopener\">document<\/a>.&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p>Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/c\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Purple Fox is an old threat that has been making waves since 2018. This most recent investigation covers Purple Fox\u2019s new arrival vector and early access loaders. Users\u2019 machines seem to be targeted with malicious payloads masquerading as legitimate application installers. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":45878,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9521,9508,9513,9509],"class_list":["post-45877","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cyber-crime","tag-trend-micro-research-endpoints","tag-trend-micro-research-malware","tag-trend-micro-research-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Purple Fox Uses New Arrival Vector and Improves Malware Arsenal 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Purple Fox Uses New Arrival Vector and Improves Malware Arsenal 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-25T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/c\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/Purple%20Fox%20banner.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Purple Fox Uses New Arrival Vector and Improves Malware Arsenal\",\"datePublished\":\"2022-03-25T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\\\/\"},\"wordCount\":1444,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal.png\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Cyber Crime\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Malware\",\"Trend Micro Research : Research\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\\\/\",\"name\":\"Purple Fox Uses New Arrival Vector and Improves Malware Arsenal 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal.png\",\"datePublished\":\"2022-03-25T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal.png\",\"width\":641,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Purple Fox Uses New Arrival Vector and Improves Malware Arsenal\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Purple Fox Uses New Arrival Vector and Improves Malware Arsenal 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/","og_locale":"en_US","og_type":"article","og_title":"Purple Fox Uses New Arrival Vector and Improves Malware Arsenal 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-25T00:00:00+00:00","og_image":[{"url":"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/22\/c\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/Purple%20Fox%20banner.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Purple Fox Uses New Arrival Vector and Improves Malware Arsenal","datePublished":"2022-03-25T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/"},"wordCount":1444,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal.png","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Cyber Crime","Trend Micro Research : Endpoints","Trend Micro Research : Malware","Trend Micro Research : Research"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/","url":"https:\/\/www.threatshub.org\/blog\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/","name":"Purple Fox Uses New Arrival Vector and Improves Malware Arsenal 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal.png","datePublished":"2022-03-25T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal.png","width":641,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/purple-fox-uses-new-arrival-vector-and-improves-malware-arsenal\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Purple Fox Uses New Arrival Vector and Improves Malware Arsenal"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45877","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45877"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45877\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/45878"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45877"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45877"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45877"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}