Skip to content

21 results in Threat Encyclopedia: “TROJ_PLUGX”
Showing Results : 1 - 10
      NextNext Page
...non-malicious legitimate file named Nv.exe. It then loads the file {malware path}\Nv.mp3, detected by Trend Micro as TROJ_PLUGX.SME, and executes the code contained in it. As a result, malicious routines of the loaded file are exhibited on...
...malware: BKDR_PLUGX.AFOther DetailsThis Trojan requires the following additional components to properly run: {All User's Profile}\SxSv\rc.exe - normal file{All User's Profile}\SxSv\rc.hlp - detected as TROJ_PLUGX.SME
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
PLUGX is a remote access tool (RAT) used in targeted attacks aimed toward government-related institutions and key industries. It was utilized the same way as Poison Ivy, a RAT involved in a campaign dating back to 2008.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This malware is part of a targeted attack against certain entities in Taiwan on June 2014, utilizing not only PlugX RAT malware but also the use of Dropbox.
This Trojan may arrive bundled with malware packages as a malware component.It is used to load and execute a file.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan may be dropped by other malware.It does not have any propagation routine.It does not drop any other file.It does not have any downloading capability.
This Trojan may be dropped by other malware.It exports functions used by other malware. Arrival DetailsThis Trojan may be dropped by other malware.

Connect with us on