Detecting possible PlugX activity on an endpoint is a serious matter, as PlugX is a well-known remote access Trojan (RAT) often used by cybercriminals for malicious purposes. If you suspect PlugX activity on an endpoint, here are some steps you can take to investigate and mitigate the situation:
1. Isolate the Endpoint: Disconnect the affected endpoint from the network to prevent further communication with the attacker or the command and control server.
2. Collect Evidence: Gather as much information as possible about the suspected activity. This may include logs, system snapshots, and unusual files or processes. Key indicators to look for include:
- Unusual network traffic patterns.
- Unfamiliar or suspicious processes running in memory.
- Unusual or unauthorized files and registry entries.
- Unexplained system behaviour or performance issues
- Review the defender logs
3. Analyze the Endpoint: Use antivirus or anti-malware software to perform a thorough scan of the endpoint. Be sure to keep the software and signatures updated to ensure it detects the latest threats.
4. Check for Persistence Mechanisms: PlugX often uses persistence mechanisms to survive system reboots. Look for suspicious autostart entries in the Windows Registry, scheduled tasks, and service configurations. You can use tools like Autoruns to help with this.
5. Review Network Traffic: Analyze network traffic logs to identify any suspicious connections or traffic patterns. Pay attention to outgoing traffic, as PlugX communicates with a command and control server.
6. Identify Artifacts: Examine the endpoint for any artifacts such as PlugX droppers, configuration files, and binaries. Be cautious while handling these artifacts, as they may contain malware.
7. Document Findings: Document all findings, including timestamps, file names, IP addresses, and any other relevant information. This documentation will be important for further analysis and incident response.
8. Incident Response: If you confirm the presence of PlugX or any other malware, inform the IT security team. Isolate the affected system from the network and consider reimaging the endpoint to ensure the complete malware removal.
Indicator of Compromise from IP - 160[.]20[.]147[.]254
File name | SHA256 | Detection name |
---|---|---|
x32dbg.exe | aec5cf913773459da0fd30bb282fb0144b85717aa6coe660e81a0bad24a2f23e15 | Legitimate Windows debugger |
x32bridge.dll | 0490ceace858ff7949b90ab4acf4867878815d2557089c179c9971b2dd0918b9 | Trojan.Win32.KORPLUG.AJ |
akm.dat | 0e9071714a4af0be1f96cffc3b0e58520b827d9e58297cb0e02d97551eca3799 | Trojan.Win32.KORPLUG.AJ |
x32bridge.dat | e72e49dc1d95efabc2c12c46df373173f2e20dab715caf58b1be9ca41aec0e172 | Trojan.Win32.KORPLUG.AJ.enc |
DismCore.dll | b4f1cae6622cd459388294afb418cb0af7a5cb82f367933e57ab8c1fb0a8a8a7 | Trojan.Win32.KORPLUG.AJ |
Groza_1.dat | 553ff37a1eb7e8dc226a83fa143d6aab8a305771bf0cec7b94f4202dcd1f55b2 | Trojan.Win32.KORPLUG.AJ.enc |