Skip to content

24 results in Threat Encyclopedia: “TROJ_PLUGX”
Showing Results : 1 - 10
      NextNext Page
...decryption. The file {malware path}\MpClient.dll, detected as BKDR_PLUGX.SFI, is used to decrypt and load TROJ_PLUGX.SFI. It does not have rootkit capabilities. It does not exploit any vulnerability.
...non-malicious legitimate file named Nv.exe. It then loads the file {malware path}\Nv.mp3, detected by Trend Micro as TROJ_PLUGX.SME, and executes the code contained in it. As a result, malicious routines of the loaded file are exhibited on...
...malware: BKDR_PLUGX.AFOther DetailsThis Trojan requires the following additional components to properly run: {All User's Profile}\SxSv\rc.exe - normal file{All User's Profile}\SxSv\rc.hlp - detected as TROJ_PLUGX.SME
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
PLUGX is a remote access tool (RAT) used in targeted attacks aimed toward government-related institutions and key industries. It was utilized the same way as Poison Ivy, a RAT involved in a campaign dating back to 2008.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This malware is part of a targeted attack against certain entities in Taiwan on June 2014, utilizing not only PlugX RAT malware but also the use of Dropbox.
This Trojan may arrive bundled with malware packages as a malware component.It is used to load and execute a file.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Connect with us on