Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
PlugX can be configured to use HTTP for command and control.[4][7] |
.004 | Application Layer Protocol: DNS |
PlugX can be configured to use DNS for command and control.[4] |
||
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
PlugX adds Run key entries in the Registry to establish persistence.[1][8][6] |
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
PlugX allows actors to spawn a reverse shell on a victim.[4][6] |
Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service |
PlugX can be added as a service to establish persistence. PlugX also has a module to change service configurations as well as start, control, and delete services.[6][1][8][9][10] |
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
PlugX decompresses and decrypts itself using the Microsoft API call RtlDecompressBuffer.[6][11][7] |
|
Enterprise | T1573 | .001 | Encrypted Channel: Symmetric Cryptography | |
Enterprise | T1083 | File and Directory Discovery |
PlugX has a module to enumerate drives and find files recursively.[6][7] |
|
Enterprise | T1564 | .001 | Hide Artifacts: Hidden Files and Directories |
PlugX can modify the characteristics of folders to hide them from the compromised user.[7] |
Enterprise | T1574 | .001 | Hijack Execution Flow: DLL Search Order Hijacking |
PlugX has the ability to use DLL search order hijacking for installation on targeted systems.[7] |
.002 | Hijack Execution Flow: DLL Side-Loading |
PlugX has used DLL side-loading to evade anti-virus.[2][4][12][8][13][11][14] |
||
Enterprise | T1105 | Ingress Tool Transfer |
PlugX has a module to download and execute files on the compromised machine.[6][7] |
|
Enterprise | T1056 | .001 | Input Capture: Keylogging |
PlugX has a module for capturing keystrokes per process including window titles.[6] |
Enterprise | T1036 | .004 | Masquerading: Masquerade Task or Service |
In one instance, menuPass added PlugX as a service with a display name of "Corel Writing Tools Utility."[9] |
.005 | Masquerading: Match Legitimate Name or Location |
PlugX has been disguised as legitimate Adobe and PotPlayer files.[7] |
||
Enterprise | T1112 | Modify Registry |
PlugX has a module to create, delete, or modify Registry keys.[6] |
|
Enterprise | T1106 | Native API |
PlugX can use the Windows API functions |
|
Enterprise | T1135 | Network Share Discovery | ||
Enterprise | T1095 | Non-Application Layer Protocol |
PlugX can be configured to use raw TCP or UDP for command and control.[4] |
|
Enterprise | T1027 | Obfuscated Files or Information |
PlugX can use API hashing and modify the names of strings to evade detection.[11][7] |
|
Enterprise | T1057 | Process Discovery |
PlugX has a module to list the processes running on a machine.[6] |
|
Enterprise | T1012 | Query Registry |
PlugX can enumerate and query for information contained within the Windows Registry.[1][6] |
|
Enterprise | T1113 | Screen Capture | ||
Enterprise | T1049 | System Network Connections Discovery |
PlugX has a module for enumerating TCP and UDP network connections and associated processes using the |
|
Enterprise | T1127 | .001 | Trusted Developer Utilities Proxy Execution: MSBuild |
A version of PlugX loads as shellcode within a .NET Framework project using msbuild.exe, presumably to bypass application control techniques.[13] |
Enterprise | T1497 | .001 | Virtualization/Sandbox Evasion: System Checks |
PlugX checks if VMware tools is running in the background by searching for any process named "vmtoolsd".[15] |
Enterprise | T1102 | .001 | Web Service: Dead Drop Resolver |
ID | Name | References |
---|---|---|
G1034 | Daggerfly | |
G0096 | APT41 |
APT41 used a variant of PlugX to connect to Windows and Linux systems via SSH and Samba/CIFS.[17][18] |
G0022 | APT3 | |
G0126 | Higaisa | |
G0027 | Threat Group-3390 | |
G1021 | Cinnamon Tempest | |
G0093 | GALLIUM | |
G0001 | Axiom | |
G0045 | menuPass | |
G0062 | TA459 | |
G1014 | LuminousMoth | |
G0017 | DragonOK | |
G0044 | Winnti Group | |
G0129 | Mustang Panda |