How a new PlugX variant abuses DLL search order hijacking
A campaign targeting telecommunications and manufacturing sectors in Central and South Asian countries has been discovered, delivering a new PlugX variant. The campaign, active since 2022, shows overlaps with RainyDay and Turian backdoors, including the abuse of legitimate applications for DLL sideloading and shared encryption methods. The new PlugX variant's configuration format resembles that of RainyDay, suggesting attribution to Naikon. Analysis of victimology and technical implementation indicates a potential connection between Naikon and BackdoorDiplomacy, possibly sourcing tools from the same vendor. The malware families use similar infection chains, loaders, and shellcode structures, with shared RC4 keys for payload decryption. This campaign highlights the evolving tactics of Chinese-speaking threat actors and the potential convergence of previously distinct groups.
AI Analysis
Technical Summary
This threat involves a newly identified variant of the PlugX malware family, which is being deployed in a targeted campaign against telecommunications and manufacturing sectors primarily in Central and South Asian countries. The campaign has been active since 2022 and exhibits technical and operational overlaps with other malware families such as RainyDay and Turian. These overlaps include the abuse of legitimate applications for DLL search order hijacking (DLL sideloading), shared encryption methods (notably RC4 keys for payload decryption), and similar infection chains, loaders, and shellcode structures. The configuration format of this new PlugX variant closely resembles that of RainyDay, suggesting a common origin or shared development resources, attributed to the Chinese-speaking threat actor group Naikon. Furthermore, analysis indicates a potential connection between Naikon and another threat actor group known as BackdoorDiplomacy, possibly indicating that these groups source tools from the same vendor or collaborate. The malware leverages DLL search order hijacking, a technique where malicious DLLs are placed in locations that are loaded preferentially by legitimate applications, allowing stealthy execution of malicious code without raising immediate suspicion. The campaign’s use of sophisticated infection chains and shared cryptographic keys points to an evolution in tactics, techniques, and procedures (TTPs) among Chinese-speaking advanced persistent threat (APT) actors, demonstrating convergence and reuse of toolsets across previously distinct groups. The absence of known exploits in the wild suggests the infection vectors may rely on social engineering, spear-phishing, or exploitation of less-publicized vulnerabilities. The campaign’s focus on critical infrastructure sectors like telecommunications and manufacturing highlights its strategic intent, potentially for espionage or long-term access.
Potential Impact
For European organizations, particularly those in telecommunications and manufacturing sectors, this threat poses significant risks. If the malware were to spread or be adapted to target European entities, it could lead to unauthorized access, data exfiltration, espionage, and potential disruption of critical services. Telecommunications providers are integral to national infrastructure, and compromise could affect data confidentiality and integrity, impacting customer privacy and service reliability. Manufacturing firms, especially those involved in critical supply chains or advanced technologies, could face intellectual property theft and operational disruptions. The use of DLL hijacking allows the malware to evade traditional detection mechanisms, increasing the likelihood of prolonged undetected presence within networks. Given the malware’s sophisticated encryption and shared toolsets, incident response and forensic analysis could be complicated, delaying remediation. Additionally, the potential linkage to Chinese-speaking APT groups suggests a geopolitical dimension, where espionage motives could target European strategic industries or government-related telecommunications infrastructure. This threat could also be leveraged for supply chain attacks, given the interconnected nature of manufacturing and telecom sectors across Europe.
Mitigation Recommendations
European organizations should implement targeted mitigations beyond generic advice: 1) Conduct thorough application whitelisting and restrict execution of unauthorized DLLs, especially in critical systems, to prevent DLL hijacking. 2) Employ advanced endpoint detection and response (EDR) solutions capable of detecting anomalous DLL loading behaviors and suspicious process injections. 3) Regularly audit and harden the DLL search order on endpoints and servers by ensuring that application directories do not contain untrusted DLLs and that system PATH variables are secured. 4) Monitor network traffic for unusual encrypted communications or connections to known command and control (C2) infrastructure associated with Naikon or related APT groups. 5) Implement strict segmentation between corporate and operational technology (OT) networks in manufacturing environments to limit lateral movement. 6) Enhance phishing awareness training focused on spear-phishing tactics used by APT groups. 7) Collaborate with national cybersecurity centers and share threat intelligence related to Naikon and associated malware families to improve detection capabilities. 8) Perform regular threat hunting exercises focusing on indicators of DLL sideloading and RC4-encrypted payloads. 9) Maintain up-to-date backups and incident response plans tailored to advanced persistent threats targeting critical infrastructure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Finland
Indicators of Compromise
- hash: 421320ccf8972de50f8574a5b1c8d308
- hash: 547caf34217c17358783c5ab48681f9f
- hash: 7104f3dd3738b04df0bc6993045f3b21
- hash: de5baeb185484e99c83b46988a6002a4
- hash: bd45ab53d77d0252b5b0934e5ac90319243908d0
- hash: c068b3700b81e5b11194ba6f976e2a5731522598
- hash: d258d0102834c47e133002b212d5ea12ed4bac20
- hash: d91337af047c8b4f26e40ce8187910daf2d19a7d
- hash: 00dbc8a4b3121af5a19504a9d969e36e709556420a6117eb3533f1d2a8100fd9
- hash: 03cec3b010853893310fea486ecfddf09642a7a5c695c70db77d22bc7c402234
- hash: 0443289b1fc556c5ef4bbfa13774500e3936d965799a9c27be0601170601094d
- hash: 0ec83d1deb6065cac8ba8f849cdf5672da7313ec2e860a7d71bb7e397e661394
- hash: 10479191f2e06ff11797fc4dda2e38ae6667c9dc396fac32a6cf76965358ade6
- hash: 2755de59ef87f9f38c236ed860a1f6f41a1d864126f54c4c0a7f87d4b4f63b20
- hash: 3480613294bc1e1704616dbf5628b92d7186246b87dbef1c8c3dbae13fe35c8b
- hash: 42c9505c2c55b80e0e311cd6da6a5263b946c8ae8bd8162b0280a1e9be7f174b
- hash: 7b028a9bd2bc0c306ab6561cf702406f5925fc073f9d0d2d9408ceccd6907743
- hash: 906ff72d4ea9cd831c58dc009fb1bbe407e8f430208a63d3dffd3f8e1da73f6e
- hash: a12ed375965859d9434c9f651eef2f3663bb076963fec31723176c9083117671
- hash: a92ed5f831c99bb84208ef7d7c733e0183a79de40f9d3b3be54744951f0a1391
- hash: ab526d5ed335860ac2fe0adee26de1a95a3c528299800ddbb4d1e2dd91267252
- hash: aec2d0cbd2f195bf35e55019a29f0d6109451eb85dc7941b73e3b562b065a11c
- hash: b03fe49036c3830f149135068ff54f5c6c6622008a6fcb7edbf6b352e9a0acc0
- hash: b1ee96026a3fc0ee55dab3b73896e88760f909b3c52d4a0152288d90e63f2e63
- hash: b691b2c1846ea75bb5b07a21c8664ecdb6379685623ba45fe6ca552e94a58ebc
- hash: c91595edd1c9a0a2c1168e3bfa532e4a7dbb6b1380afd80ba445b728622798a4
- hash: e29767ffb75be9f363a39ba9b66785ecfc992e3d91ec9fc46515ef94c37dc0b6
- hash: f0ad27f8737ac1a079a52c91d8b5cdd554cd42dccc597de8337e0c25d5287dd2
- hash: fd6b1ca0f26e54fa9c97ea15c834e58ffb71798df38071ad00b14f19d6a4126c
- hash: fd87149d6b8fdcad5d84ba4a3ca52e1cef8f0c54cafca6dbbb5d156f313d79dd
- hash: fe4f88bdfff87a94bd57bc16c20d199ee548e551b4aca852bcc013d0955d7ce8
- ip: 103.136.45.108
- ip: 103.172.10.165
- ip: 103.9.14.218
- ip: 117.239.199.202
- ip: 117.254.105.200
- ip: 45.114.192.137
- domain: newsinfom.org
- domain: asp.asphspes.com
- domain: mailserver.kozow.com
- domain: pay.googleinstall.com
How a new PlugX variant abuses DLL search order hijacking
Description
A campaign targeting telecommunications and manufacturing sectors in Central and South Asian countries has been discovered, delivering a new PlugX variant. The campaign, active since 2022, shows overlaps with RainyDay and Turian backdoors, including the abuse of legitimate applications for DLL sideloading and shared encryption methods. The new PlugX variant's configuration format resembles that of RainyDay, suggesting attribution to Naikon. Analysis of victimology and technical implementation indicates a potential connection between Naikon and BackdoorDiplomacy, possibly sourcing tools from the same vendor. The malware families use similar infection chains, loaders, and shellcode structures, with shared RC4 keys for payload decryption. This campaign highlights the evolving tactics of Chinese-speaking threat actors and the potential convergence of previously distinct groups.
AI-Powered Analysis
Technical Analysis
This threat involves a newly identified variant of the PlugX malware family, which is being deployed in a targeted campaign against telecommunications and manufacturing sectors primarily in Central and South Asian countries. The campaign has been active since 2022 and exhibits technical and operational overlaps with other malware families such as RainyDay and Turian. These overlaps include the abuse of legitimate applications for DLL search order hijacking (DLL sideloading), shared encryption methods (notably RC4 keys for payload decryption), and similar infection chains, loaders, and shellcode structures. The configuration format of this new PlugX variant closely resembles that of RainyDay, suggesting a common origin or shared development resources, attributed to the Chinese-speaking threat actor group Naikon. Furthermore, analysis indicates a potential connection between Naikon and another threat actor group known as BackdoorDiplomacy, possibly indicating that these groups source tools from the same vendor or collaborate. The malware leverages DLL search order hijacking, a technique where malicious DLLs are placed in locations that are loaded preferentially by legitimate applications, allowing stealthy execution of malicious code without raising immediate suspicion. The campaign’s use of sophisticated infection chains and shared cryptographic keys points to an evolution in tactics, techniques, and procedures (TTPs) among Chinese-speaking advanced persistent threat (APT) actors, demonstrating convergence and reuse of toolsets across previously distinct groups. The absence of known exploits in the wild suggests the infection vectors may rely on social engineering, spear-phishing, or exploitation of less-publicized vulnerabilities. The campaign’s focus on critical infrastructure sectors like telecommunications and manufacturing highlights its strategic intent, potentially for espionage or long-term access.
Potential Impact
For European organizations, particularly those in telecommunications and manufacturing sectors, this threat poses significant risks. If the malware were to spread or be adapted to target European entities, it could lead to unauthorized access, data exfiltration, espionage, and potential disruption of critical services. Telecommunications providers are integral to national infrastructure, and compromise could affect data confidentiality and integrity, impacting customer privacy and service reliability. Manufacturing firms, especially those involved in critical supply chains or advanced technologies, could face intellectual property theft and operational disruptions. The use of DLL hijacking allows the malware to evade traditional detection mechanisms, increasing the likelihood of prolonged undetected presence within networks. Given the malware’s sophisticated encryption and shared toolsets, incident response and forensic analysis could be complicated, delaying remediation. Additionally, the potential linkage to Chinese-speaking APT groups suggests a geopolitical dimension, where espionage motives could target European strategic industries or government-related telecommunications infrastructure. This threat could also be leveraged for supply chain attacks, given the interconnected nature of manufacturing and telecom sectors across Europe.
Mitigation Recommendations
European organizations should implement targeted mitigations beyond generic advice: 1) Conduct thorough application whitelisting and restrict execution of unauthorized DLLs, especially in critical systems, to prevent DLL hijacking. 2) Employ advanced endpoint detection and response (EDR) solutions capable of detecting anomalous DLL loading behaviors and suspicious process injections. 3) Regularly audit and harden the DLL search order on endpoints and servers by ensuring that application directories do not contain untrusted DLLs and that system PATH variables are secured. 4) Monitor network traffic for unusual encrypted communications or connections to known command and control (C2) infrastructure associated with Naikon or related APT groups. 5) Implement strict segmentation between corporate and operational technology (OT) networks in manufacturing environments to limit lateral movement. 6) Enhance phishing awareness training focused on spear-phishing tactics used by APT groups. 7) Collaborate with national cybersecurity centers and share threat intelligence related to Naikon and associated malware families to improve detection capabilities. 8) Perform regular threat hunting exercises focusing on indicators of DLL sideloading and RC4-encrypted payloads. 9) Maintain up-to-date backups and incident response plans tailored to advanced persistent threats targeting critical infrastructure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://blog.talosintelligence.com/how-rainyday-turian-and-a-new-plugx-variant-abuse-dll-search-order-hijacking/"]
- Adversary
- Naikon
- Pulse Id
- 68d31c0c8c90127096487d05
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash421320ccf8972de50f8574a5b1c8d308 | — | |
hash547caf34217c17358783c5ab48681f9f | — | |
hash7104f3dd3738b04df0bc6993045f3b21 | — | |
hashde5baeb185484e99c83b46988a6002a4 | — | |
hashbd45ab53d77d0252b5b0934e5ac90319243908d0 | — | |
hashc068b3700b81e5b11194ba6f976e2a5731522598 | — | |
hashd258d0102834c47e133002b212d5ea12ed4bac20 | — | |
hashd91337af047c8b4f26e40ce8187910daf2d19a7d | — | |
hash00dbc8a4b3121af5a19504a9d969e36e709556420a6117eb3533f1d2a8100fd9 | — | |
hash03cec3b010853893310fea486ecfddf09642a7a5c695c70db77d22bc7c402234 | — | |
hash0443289b1fc556c5ef4bbfa13774500e3936d965799a9c27be0601170601094d | — | |
hash0ec83d1deb6065cac8ba8f849cdf5672da7313ec2e860a7d71bb7e397e661394 | — | |
hash10479191f2e06ff11797fc4dda2e38ae6667c9dc396fac32a6cf76965358ade6 | — | |
hash2755de59ef87f9f38c236ed860a1f6f41a1d864126f54c4c0a7f87d4b4f63b20 | — | |
hash3480613294bc1e1704616dbf5628b92d7186246b87dbef1c8c3dbae13fe35c8b | — | |
hash42c9505c2c55b80e0e311cd6da6a5263b946c8ae8bd8162b0280a1e9be7f174b | — | |
hash7b028a9bd2bc0c306ab6561cf702406f5925fc073f9d0d2d9408ceccd6907743 | — | |
hash906ff72d4ea9cd831c58dc009fb1bbe407e8f430208a63d3dffd3f8e1da73f6e | — | |
hasha12ed375965859d9434c9f651eef2f3663bb076963fec31723176c9083117671 | — | |
hasha92ed5f831c99bb84208ef7d7c733e0183a79de40f9d3b3be54744951f0a1391 | — | |
hashab526d5ed335860ac2fe0adee26de1a95a3c528299800ddbb4d1e2dd91267252 | — | |
hashaec2d0cbd2f195bf35e55019a29f0d6109451eb85dc7941b73e3b562b065a11c | — | |
hashb03fe49036c3830f149135068ff54f5c6c6622008a6fcb7edbf6b352e9a0acc0 | — | |
hashb1ee96026a3fc0ee55dab3b73896e88760f909b3c52d4a0152288d90e63f2e63 | — | |
hashb691b2c1846ea75bb5b07a21c8664ecdb6379685623ba45fe6ca552e94a58ebc | — | |
hashc91595edd1c9a0a2c1168e3bfa532e4a7dbb6b1380afd80ba445b728622798a4 | — | |
hashe29767ffb75be9f363a39ba9b66785ecfc992e3d91ec9fc46515ef94c37dc0b6 | — | |
hashf0ad27f8737ac1a079a52c91d8b5cdd554cd42dccc597de8337e0c25d5287dd2 | — | |
hashfd6b1ca0f26e54fa9c97ea15c834e58ffb71798df38071ad00b14f19d6a4126c | — | |
hashfd87149d6b8fdcad5d84ba4a3ca52e1cef8f0c54cafca6dbbb5d156f313d79dd | — | |
hashfe4f88bdfff87a94bd57bc16c20d199ee548e551b4aca852bcc013d0955d7ce8 | — |
Ip
Value | Description | Copy |
---|---|---|
ip103.136.45.108 | — | |
ip103.172.10.165 | — | |
ip103.9.14.218 | — | |
ip117.239.199.202 | — | |
ip117.254.105.200 | — | |
ip45.114.192.137 | — |
Domain
Value | Description | Copy |
---|---|---|
domainnewsinfom.org | — | |
domainasp.asphspes.com | — | |
domainmailserver.kozow.com | — | |
domainpay.googleinstall.com | — |
Threat ID: 68d3e458d2da9a2e8b223a09
Added to database: 9/24/2025, 12:30:16 PM
Last enriched: 9/24/2025, 12:34:13 PM
Last updated: 9/25/2025, 4:37:07 AM
Views: 10
Related Threats
ThreatFox IOCs for 2025-09-24
MediumUpdates Arsenal with BAITSWITCH and SIMPLEFIX
MediumTargets Government, Defense, and Technology Organizations
MediumNew macOS threat abuses ads and social media to spread malware
LowHidden WordPress Backdoors Creating Admin Accounts
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.