Skip to content

26 results in Threat Encyclopedia: “TROJ_PLUGX”
Showing Results : 1 - 10
      NextNext Page
...decryption. The file {malware path}\MpClient.dll, detected as BKDR_PLUGX.SFI, is used to decrypt and load TROJ_PLUGX.SFI. It does not have rootkit capabilities. It does not exploit any vulnerability.
...malware: BKDR_PLUGX.AFOther DetailsThis Trojan requires the following additional components to properly run: {All User's Profile}\SxSv\rc.exe - normal file{All User's Profile}\SxSv\rc.hlp - detected as TROJ_PLUGX.SME
...non-malicious legitimate file named Nv.exe. It then loads the file {malware path}\Nv.mp3, detected by Trend Micro as TROJ_PLUGX.SME, and executes the code contained in it. As a result, malicious routines of the loaded file are exhibited on...
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This malware is part of a targeted attack against certain entities in Taiwan on June 2014, utilizing not only PlugX RAT malware but also the use of Dropbox.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
PLUGX is a remote access tool (RAT) used in targeted attacks aimed toward government-related institutions and key industries. It was utilized the same way as Poison Ivy, a RAT involved in a campaign dating back to 2008.
This Trojan may arrive bundled with malware packages as a malware component.It is used to load and execute a file.

Connect with us on