This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
      • Netwitness XDR
      • EC-Council Training
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
    • Role-Based Training
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
NetWitness Discussions
  • NetWitness Community
  • Discussions
  • PlugX APT Malware
  • Options
    • Subscribe to RSS Feed
    • Mark Topic as New
    • Mark Topic as Read
    • Float this Topic for Current User
    • Bookmark
    • Subscribe
    • Mute
    • Printer Friendly Page

PlugX APT Malware

NortonSantos
NortonSantos Beginner
Beginner
Options
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Report Inappropriate Content

‎2016-01-22 01:59 PM

Information

 

Malware Family/Aliases: PlugX

Malware Type: Trojan/Backdoor:Win32

Platform: Windows

 

MD5:   b9501109bd94ac243f22aec5aca65ace
SHA1: b2b2a14983b13f966b3bfeb2ba33c3dd64a69ded      
SHA256: a3c4cb110064086fd7491d9cf5ffd7552384916c92effca20c8b16dfc625f37b

 

Discovery Date: 2008

 

Summary

 

PlugX is a RAT (Remote Access Trojan) malware family that is around since 2008 and is used as a backdoor to fully control the victim's machine. Once the machine is infected, a cybercriminal can remotely execute several kinds of commands on the affected system.

 

Notable features of this malware family is the ability to execute commands on the affected machine in order to retrieve machine information, capture the screen, send keyboard and mouse events, key logger, reboot the system, manage processes (create, kill and enumerate), manage services (create, start, stop, etc.), manage Windows registry entries, open a shell, etc.

 

The malware also logs its own events in a text log file, probably in an attempt to enhance itself.

 

Malware Installation

 

This sample is a Windows Self-Extracting Archive that contains a legitimate PDF document file along with the malware dropper (a regular PE32 executable file for MS Windows).

 

Once executed, the sample extracts the PDF document and the dropper file to the temp folder:

 

  • %Temp%\1.pdf
  • %Temp%\1.exe

 

The malware then opens and displays the legitimate PDF document, making the victim believe that this is the only content and purpose of the self-extracting file:

pastedImage_17.png

 

Right after that, the dropper file is executed. It drops the following files on the affected system:

 

  • %ALLUSERSPROFILE%\SxSi\rc.exe
  • %ALLUSERSPROFILE%\SxSi\rcdll.dll
  • %ALLUSERSPROFILE%\SxSi\rc.hlp

 

And creates a new instance of %WINDIR%\system32\svchost.exe (Windows generic host process for services that run from dynamic-link libraries), which creates an instance of %WINDIR%\system32\msiexec.exe (Windows installer component).

 

The dropper then executes %ALLUSERSPROFILE%\SxSi\rc.exe, a clean and legitimate signed executable file - which loads %ALLUSERSPROFILE%\SxSi\rcdll.dll, a malicious dynamic-link library used as a loader. The loader decrypts the encrypted payload in the malicious binary file %ALLUSERSPROFILE%\SxSi\rc.hlp and injects it in both newly created %WINDIR%\system32\svchost.exe and %\system32\msiexec.exe processes.

 

As result, malicious code is injected and running in system processes:

 

pastedImage_20.png

 

Once running, the malware creates a hidden log file to trace information and errors during its execution, probably in an attempt by the authors to enhance it:

 

  •   %ALLUSERSPROFILE%\SxSi\bug.log

pastedImage_26.png

 

It is worth to mention that malware installation procedures, filenames, locations and other details may vary depending on the analyzed sample.

 

Malware Persistency Techniques

 

The malware installs itself as a Windows service and is configured to automatically start during Windows startup (start type equals to “2”) to make itself persistent:

 

HKLM\SYSTEM\ControlSet001\Services\SxSi\Start: 0x00000002

HKLM\SYSTEM\ControlSet001\Services\SxSi\ImagePath: ""C:\Documents and Settings\All Users\SxSi\rc.exe" 200 0"

HKLM\SYSTEM\ControlSet001\Services\SxSi\DisplayName: "SxSi"

HKLM\SYSTEM\ControlSet001\Services\SxSi\ObjectName: "LocalSystem"

HKLM\SYSTEM\ControlSet001\Services\SxSi\Description: "SxSi"

HKLM\SYSTEM\CurrentControlSet\Services\SxSi\Start: 0x00000002

HKLM\SYSTEM\CurrentControlSet\Services\SxSi\ImagePath: ""C:\Documents and Settings\All Users\SxSi\rc.exe" 200 0"

HKLM\SYSTEM\CurrentControlSet\Services\SxSi\DisplayName: "SxSi"

HKLM\SYSTEM\CurrentControlSet\Services\SxSi\ObjectName: "LocalSystem"

HKLM\SYSTEM\CurrentControlSet\Services\SxSi\Description: "SxSi"

Malware Protective Mechanisms

 

To protect the dropped files, the malware installs itself as a hidden Windows service/driver:

pastedImage_36.png

pastedImage_37.png

pastedImage_38.png

 

As result, the malware will run as a service and automatically start during Windows startup, however the victim will not be able to see it in the list of running services.

 

The malware also drops three files, including a legitimate signed executable files that loads the encrypted malicious code, thus making it difficult to be detected by AV.

 

Finally, the malware keeps all its related files encrypted while in the disk, only being unencrypted in the memory when injected in system processes, making it difficult to be detected by static analysis tools.

 

Method of Infection

 

The malware spreads through phishing attacks by email containing malicious attachments.

 

 

pastedImage_46.png

 

Network Behavior

 

The malware can communicate to the server using TCP, UDP and HTTP protocols. Data sent to the server is encrypted.

 

The malware also uses GET and POST requests as following:

 

POST /729B25885FCE4CEBF4D6F20C HTTP/1.1

Accept: */*

IXP: 0

IXL: 0

IXK: 61456

IXN: 1

User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1)

Host: jessler.memsanyber.net

Content-Length: 0

Connection: Keep-Alive

Cache-Control: no-cache

 

POST /C377A9DC73D84FEF7349A58C HTTP/1.1

Accept: */*

HHV1: 0

HHV2: 0

HHV3: 61456

HHV4: 1

User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1)

Host: scqf.bacguarp.com:443

Content-Length: 0

Connection: Keep-Alive

Cache-Control: no-cache

 

POST /update?id=000f9098 HTTP/1.1

Accept: */*

X-Session: 0

X-Status: 0

X-Size: 61456

X-Sn: 1

User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1)

Host: vip.kavupdate.com:443

Content-Length: 0

Connection: Keep-Alive

Cache-Control: no-cache

 

POST /13A993D31022841E6C9C4EB6 HTTP/1.1

Accept: */*

HIV: 0

HIVV: 0

HIVVV: 61456

HIVVVV: 1

User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1)

Host: msn.catalogipdate.com:53

Content-Length: 0

Connection: Keep-Alive

Cache-Control: no-cache

 

POST /090DB573674F2C559858D073 HTTP/1.1

Accept: */*

ASH-1.0: 0

ASH-1.1: 0

ASH-1.2: 61456

ASH-1.3: 1

User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1)

Host: syesv.qpoe.com

Content-Length: 0

Connection: Keep-Alive

Cache-Control: no-cache

 

GET /gamedownloader/000045/dlpacker_ver.txt?time=1449142606 HTTP/1.1

Host: servers.youxi.xunlei.com

Cache-Control: no-cache

GET /DPV?gs=minidownloader&op=1&pid=&gameid=000045&src=0&time=1449142603 HTTP/1.1

Host: gamestat.youxi.xunlei.com

Cache-Control: no-cache

GET /mmpdd/sites/default/files/field/moigov.exe HTTP/1.1

Accept: */*

Accept-Encoding: gzip, deflate

User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0)

Host: www.moi.gov.mm

Connection: Keep-Alive

Security Analytics Solution

 

More details can be found here.

 

Researchers

 

Norton Santos

  • apt
  • Community Thread
  • Discussion
  • firstwatch
  • Forum Thread
  • Malware
  • NetWitness
  • NW
  • NWP
  • plugx
  • RSA NetWitness
  • RSA NetWitness Platform
  • rsa_firstwatch
2 Likes
Share
Reply
  • All forum topics
  • Previous Topic
  • Next Topic
0 REPLIES 0
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.