Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family PlugX
This detection indicates a concrete identification of Trojan:Win32/PlugX!pz, a sophisticated Remote Access Trojan (RAT). PlugX leverages various techniques for execution (e.g., mshta, regsvr32, rundll32, PowerShell), persistence (e.g., scheduled tasks, BITS jobs, remote services), evasion (e.g., API hooking), C2 communication, and data exfiltration, granting attackers extensive control over the compromised system.
Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForSoftwarePacking.C!pli (PEHSTR_EXT)
8b644efdbe9255fa517a5112985957b3aad7d4759e448cc09f65c612f620d2b05ed5c489debe7fa5ab1d2ac6ef325d8e04c6eba4d2e7b9352978fc046d6d0a40Immediately isolate the infected host from the network. Conduct a full system scan with updated security software, investigate for persistence mechanisms (e.g., registry run keys, scheduled tasks, services), and analyze network logs for command-and-control (C2) communication. Reset all potentially compromised credentials and, if full eradication cannot be confirmed, consider re-imaging the affected system.