PlugX

PlugX is a remote access tool (RAT) with modular plugins that has been used by multiple threat groups.[1][2][3][4]

ID: S0013
Associated Software: Thoper, TVT, DestroyRAT, Sogu, Kaba, Korplug
Type: MALWARE
Platforms: Windows
Version: 3.1
Created: 31 May 2017
Last Modified: 10 April 2023

Associated Software Descriptions

Name Description
Thoper

[5]

TVT

[5]

DestroyRAT

[6]

Sogu

[1][2][6]

Kaba

[2]

Korplug

[1][6]

Techniques Used

Domain ID Name Use
Enterprise T1036 .004 伪装: Masquerade Task or Service

In one instance, menuPass added PlugX as a service with a display name of "Corel Writing Tools Utility."[7]

.005 伪装: Match Legitimate Name or Location

PlugX has been disguised as legitimate Adobe and PotPlayer files.[8]

Enterprise T1112 修改注册表

PlugX has a module to create, delete, or modify Registry keys.[6]

Enterprise T1543 .003 创建或修改系统进程: Windows Service

PlugX can be added as a service to establish persistence. PlugX also has a module to change service configurations as well as start, control, and delete services.[6][1][9][7][10]

Enterprise T1573 .001 加密通道: Symmetric Cryptography

PlugX can use RC4 encryption in C2 communications.[8]

Enterprise T1574 .001 劫持执行流: DLL Search Order Hijacking

PlugX has the ability to use DLL search order hijacking for installation on targeted systems.[8]

.002 劫持执行流: DLL Side-Loading

PlugX has used DLL side-loading to evade anti-virus.[2][4][11][9][12][13][14]

Enterprise T1140 反混淆/解码文件或信息

PlugX decompresses and decrypts itself using the Microsoft API call RtlDecompressBuffer.[6][13][8]

Enterprise T1127 .001 可信开发者工具代理执行: MSBuild

A version of PlugX loads as shellcode within a .NET Framework project using msbuild.exe, presumably to bypass application control techniques.[12]

Enterprise T1547 .001 启动或登录自动启动执行: Registry Run Keys / Startup Folder

PlugX adds Run key entries in the Registry to establish persistence.[1][9][6]

Enterprise T1059 .003 命令与脚本解释器: Windows Command Shell

PlugX allows actors to spawn a reverse shell on a victim.[4][6]

Enterprise T1113 屏幕捕获

PlugX allows the operator to capture screenshots.[6]

Enterprise T1071 .001 应用层协议: Web Protocols

PlugX can be configured to use HTTP for command and control.[4][8]

.004 应用层协议: DNS

PlugX can be configured to use DNS for command and control.[4]

Enterprise T1083 文件和目录发现

PlugX has a module to enumerate drives and find files recursively.[6][8]

Enterprise T1106 本机API

PlugX can use the Windows API functions GetProcAddress, LoadLibrary, and CreateProcess to execute another process.[1][8]

Enterprise T1012 查询注册表

PlugX can enumerate and query for information contained within the Windows Registry.[1][6]

Enterprise T1027 混淆文件或信息

PlugX can use API hashing and modify the names of strings to evade detection.[13][8]

Enterprise T1049 系统网络连接发现

PlugX has a module for enumerating TCP and UDP network connections and associated processes using the netstat command.[6]

Enterprise T1135 网络共享发现

PlugX has a module to enumerate network shares.[6]

Enterprise T1102 .001 网络服务: Dead Drop Resolver

PlugX uses Pastebin to store C2 addresses.[12]

Enterprise T1497 .001 虚拟化/沙盒规避: System Checks

PlugX checks if VMware tools is running in the background by searching for any process named "vmtoolsd".[15]

Enterprise T1105 输入工具传输

PlugX has a module to download and execute files on the compromised machine.[6][8]

Enterprise T1056 .001 输入捕获: Keylogging

PlugX has a module for capturing keystrokes per process including window titles.[6]

Enterprise T1057 进程发现

PlugX has a module to list the processes running on a machine.[6]

Enterprise T1564 .001 隐藏伪装: Hidden Files and Directories

PlugX can modify the characteristics of folders to hide them from the compromised user.[8]

Enterprise T1095 非应用层协议

PlugX can be configured to use raw TCP or UDP for command and control.[4]

Groups That Use This Software

References

  1. Vasilenko, R. (2013, December 17). An Analysis of PlugX Malware. Retrieved November 24, 2015.
  2. Scott, M.. (2014, June 10). Clandestine Fox, Part Deux. Retrieved January 14, 2016.
  3. Miller-Osborn, J., Grunzweig, J.. (2015, April). Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets. Retrieved November 4, 2015.
  4. Dell SecureWorks Counter Threat Unit Threat Intelligence. (2015, August 5). Threat Group-3390 Targets Organizations for Cyberespionage. Retrieved August 18, 2018.
  5. Novetta. (n.d.). Operation SMN: Axiom Threat Actor Group Report. Retrieved November 12, 2014.
  6. Computer Incident Response Center Luxembourg. (2013, March 29). Analysis of a PlugX variant. Retrieved November 5, 2018.
  7. FireEye iSIGHT Intelligence. (2017, April 6). APT10 (MenuPass Group): New Tools, Global Campaign Latest Manifestation of Longstanding Threat. Retrieved June 29, 2017.
  8. Raggi, M. et al. (2022, March 7). The Good, the Bad, and the Web Bug: TA416 Increases Operational Tempo Against European Governments as Conflict in Ukraine Escalates. Retrieved March 16, 2022.
  9. PwC and BAE Systems. (2017, April). Operation Cloud Hopper: Technical Annex. Retrieved April 13, 2017.
  10. Huss, D., et al. (2017, February 2). Oops, they did it again: APT Targets Russia and Belarus with ZeroT and PlugX. Retrieved April 5, 2018.
  11. Stewart, A. (2014). DLL SIDE-LOADING: A Thorn in the Side of the Anti-Virus Industry. Retrieved November 12, 2014.
  12. Lancaster, T. and Idrizovic, E.. (2017, June 27). Paranoid PlugX. Retrieved July 13, 2017.
  13. Lunghi, D. et al. (2020, February). Uncovering DRBControl. Retrieved November 12, 2021.
  14. Global Threat Center, Intelligence Team. (2020, December). APT27 Turns to Ransomware. Retrieved November 12, 2021.
  15. Lancaster, T., Idrizovic, E. (2017, June 27). Paranoid PlugX. Retrieved April 19, 2019.
  16. Threat Hunter Team. (2023, April 20). Daggerfly: APT Actor Targets Telecoms Company in Africa. Retrieved July 25, 2024.
  17. Mandiant. (n.d.). APT41, A DUAL ESPIONAGE AND CYBER CRIME OPERATION. Retrieved June 11, 2024.
  1. Fraser, N., et al. (2019, August 7). Double DragonAPT41, a dual espionage and cyber crime operation APT41. Retrieved September 23, 2019.
  2. Malwarebytes Threat Intelligence Team. (2020, June 4). New LNK attack tied to Higaisa APT discovered. Retrieved March 2, 2021.
  3. Counter Threat Unit Research Team. (2017, June 27). BRONZE UNION Cyberespionage Persists Despite Disclosures. Retrieved July 13, 2017.
  4. Pantazopoulos, N., Henry T. (2018, May 18). Emissary Panda – A potential new malicious tool. Retrieved June 25, 2018.
  5. SecureWorks. (n.d.). BRONZE STARLIGHT. Retrieved December 6, 2023.
  6. Cybereason Nocturnus. (2019, June 25). Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers. Retrieved July 18, 2019.
  7. Esler, J., Lee, M., and Williams, C. (2014, October 14). Threat Spotlight: Group 72. Retrieved January 14, 2016.
  8. United States District Court Southern District of New York (USDC SDNY) . (2018, December 17). United States of America v. Zhu Hua and Zhang Shilong. Retrieved April 17, 2019.
  9. Axel F. (2017, April 27). APT Targets Financial Analysts with CVE-2017-0199. Retrieved February 15, 2018.
  10. Lechtik, M, and etl. (2021, July 14). LuminousMoth APT: Sweeping attacks for the chosen few. Retrieved October 20, 2022.
  11. Botezatu, B and etl. (2021, July 21). LuminousMoth - PlugX, File Exfiltration and Persistence Revisited. Retrieved October 20, 2022.
  12. Kaspersky Lab's Global Research and Analysis Team. (2013, April 11). Winnti. More than just a game. Retrieved February 8, 2017.
  13. Meyers, A. (2018, June 15). Meet CrowdStrike’s Adversary of the Month for June: MUSTANG PANDA. Retrieved April 12, 2021.
  14. Anomali Threat Research. (2019, October 7). China-Based APT Mustang Panda Targets Minority Groups, Public and Private Sector Organizations. Retrieved April 12, 2021.
  15. Counter Threat Unit Research Team. (2019, December 29). BRONZE PRESIDENT Targets NGOs. Retrieved April 13, 2021.
  16. Hamzeloofard, S. (2020, January 31). New wave of PlugX targets Hong Kong | Avira Blog. Retrieved April 13, 2021.
  17. Insikt Group. (2020, July 28). CHINESE STATE-SPONSORED GROUP ‘REDDELTA’ TARGETS THE VATICAN AND CATHOLIC ORGANIZATIONS. Retrieved April 13, 2021.