Skip to main content

How a new PlugX variant abuses DLL search order hijacking

Medium
Published: Tue Sep 23 2025 (09/23/2025, 22:15:40 UTC)
Source: AlienVault OTX General

Description

A campaign targeting telecommunications and manufacturing sectors in Central and South Asian countries has been discovered, delivering a new PlugX variant. The campaign, active since 2022, shows overlaps with RainyDay and Turian backdoors, including the abuse of legitimate applications for DLL sideloading and shared encryption methods. The new PlugX variant's configuration format resembles that of RainyDay, suggesting attribution to Naikon. Analysis of victimology and technical implementation indicates a potential connection between Naikon and BackdoorDiplomacy, possibly sourcing tools from the same vendor. The malware families use similar infection chains, loaders, and shellcode structures, with shared RC4 keys for payload decryption. This campaign highlights the evolving tactics of Chinese-speaking threat actors and the potential convergence of previously distinct groups.

AI-Powered Analysis

AILast updated: 09/24/2025, 12:34:13 UTC

Technical Analysis

This threat involves a newly identified variant of the PlugX malware family, which is being deployed in a targeted campaign against telecommunications and manufacturing sectors primarily in Central and South Asian countries. The campaign has been active since 2022 and exhibits technical and operational overlaps with other malware families such as RainyDay and Turian. These overlaps include the abuse of legitimate applications for DLL search order hijacking (DLL sideloading), shared encryption methods (notably RC4 keys for payload decryption), and similar infection chains, loaders, and shellcode structures. The configuration format of this new PlugX variant closely resembles that of RainyDay, suggesting a common origin or shared development resources, attributed to the Chinese-speaking threat actor group Naikon. Furthermore, analysis indicates a potential connection between Naikon and another threat actor group known as BackdoorDiplomacy, possibly indicating that these groups source tools from the same vendor or collaborate. The malware leverages DLL search order hijacking, a technique where malicious DLLs are placed in locations that are loaded preferentially by legitimate applications, allowing stealthy execution of malicious code without raising immediate suspicion. The campaign’s use of sophisticated infection chains and shared cryptographic keys points to an evolution in tactics, techniques, and procedures (TTPs) among Chinese-speaking advanced persistent threat (APT) actors, demonstrating convergence and reuse of toolsets across previously distinct groups. The absence of known exploits in the wild suggests the infection vectors may rely on social engineering, spear-phishing, or exploitation of less-publicized vulnerabilities. The campaign’s focus on critical infrastructure sectors like telecommunications and manufacturing highlights its strategic intent, potentially for espionage or long-term access.

Potential Impact

For European organizations, particularly those in telecommunications and manufacturing sectors, this threat poses significant risks. If the malware were to spread or be adapted to target European entities, it could lead to unauthorized access, data exfiltration, espionage, and potential disruption of critical services. Telecommunications providers are integral to national infrastructure, and compromise could affect data confidentiality and integrity, impacting customer privacy and service reliability. Manufacturing firms, especially those involved in critical supply chains or advanced technologies, could face intellectual property theft and operational disruptions. The use of DLL hijacking allows the malware to evade traditional detection mechanisms, increasing the likelihood of prolonged undetected presence within networks. Given the malware’s sophisticated encryption and shared toolsets, incident response and forensic analysis could be complicated, delaying remediation. Additionally, the potential linkage to Chinese-speaking APT groups suggests a geopolitical dimension, where espionage motives could target European strategic industries or government-related telecommunications infrastructure. This threat could also be leveraged for supply chain attacks, given the interconnected nature of manufacturing and telecom sectors across Europe.

Mitigation Recommendations

European organizations should implement targeted mitigations beyond generic advice: 1) Conduct thorough application whitelisting and restrict execution of unauthorized DLLs, especially in critical systems, to prevent DLL hijacking. 2) Employ advanced endpoint detection and response (EDR) solutions capable of detecting anomalous DLL loading behaviors and suspicious process injections. 3) Regularly audit and harden the DLL search order on endpoints and servers by ensuring that application directories do not contain untrusted DLLs and that system PATH variables are secured. 4) Monitor network traffic for unusual encrypted communications or connections to known command and control (C2) infrastructure associated with Naikon or related APT groups. 5) Implement strict segmentation between corporate and operational technology (OT) networks in manufacturing environments to limit lateral movement. 6) Enhance phishing awareness training focused on spear-phishing tactics used by APT groups. 7) Collaborate with national cybersecurity centers and share threat intelligence related to Naikon and associated malware families to improve detection capabilities. 8) Perform regular threat hunting exercises focusing on indicators of DLL sideloading and RC4-encrypted payloads. 9) Maintain up-to-date backups and incident response plans tailored to advanced persistent threats targeting critical infrastructure.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://blog.talosintelligence.com/how-rainyday-turian-and-a-new-plugx-variant-abuse-dll-search-order-hijacking/"]
Adversary
Naikon
Pulse Id
68d31c0c8c90127096487d05
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash421320ccf8972de50f8574a5b1c8d308
hash547caf34217c17358783c5ab48681f9f
hash7104f3dd3738b04df0bc6993045f3b21
hashde5baeb185484e99c83b46988a6002a4
hashbd45ab53d77d0252b5b0934e5ac90319243908d0
hashc068b3700b81e5b11194ba6f976e2a5731522598
hashd258d0102834c47e133002b212d5ea12ed4bac20
hashd91337af047c8b4f26e40ce8187910daf2d19a7d
hash00dbc8a4b3121af5a19504a9d969e36e709556420a6117eb3533f1d2a8100fd9
hash03cec3b010853893310fea486ecfddf09642a7a5c695c70db77d22bc7c402234
hash0443289b1fc556c5ef4bbfa13774500e3936d965799a9c27be0601170601094d
hash0ec83d1deb6065cac8ba8f849cdf5672da7313ec2e860a7d71bb7e397e661394
hash10479191f2e06ff11797fc4dda2e38ae6667c9dc396fac32a6cf76965358ade6
hash2755de59ef87f9f38c236ed860a1f6f41a1d864126f54c4c0a7f87d4b4f63b20
hash3480613294bc1e1704616dbf5628b92d7186246b87dbef1c8c3dbae13fe35c8b
hash42c9505c2c55b80e0e311cd6da6a5263b946c8ae8bd8162b0280a1e9be7f174b
hash7b028a9bd2bc0c306ab6561cf702406f5925fc073f9d0d2d9408ceccd6907743
hash906ff72d4ea9cd831c58dc009fb1bbe407e8f430208a63d3dffd3f8e1da73f6e
hasha12ed375965859d9434c9f651eef2f3663bb076963fec31723176c9083117671
hasha92ed5f831c99bb84208ef7d7c733e0183a79de40f9d3b3be54744951f0a1391
hashab526d5ed335860ac2fe0adee26de1a95a3c528299800ddbb4d1e2dd91267252
hashaec2d0cbd2f195bf35e55019a29f0d6109451eb85dc7941b73e3b562b065a11c
hashb03fe49036c3830f149135068ff54f5c6c6622008a6fcb7edbf6b352e9a0acc0
hashb1ee96026a3fc0ee55dab3b73896e88760f909b3c52d4a0152288d90e63f2e63
hashb691b2c1846ea75bb5b07a21c8664ecdb6379685623ba45fe6ca552e94a58ebc
hashc91595edd1c9a0a2c1168e3bfa532e4a7dbb6b1380afd80ba445b728622798a4
hashe29767ffb75be9f363a39ba9b66785ecfc992e3d91ec9fc46515ef94c37dc0b6
hashf0ad27f8737ac1a079a52c91d8b5cdd554cd42dccc597de8337e0c25d5287dd2
hashfd6b1ca0f26e54fa9c97ea15c834e58ffb71798df38071ad00b14f19d6a4126c
hashfd87149d6b8fdcad5d84ba4a3ca52e1cef8f0c54cafca6dbbb5d156f313d79dd
hashfe4f88bdfff87a94bd57bc16c20d199ee548e551b4aca852bcc013d0955d7ce8

Ip

ValueDescriptionCopy
ip103.136.45.108
ip103.172.10.165
ip103.9.14.218
ip117.239.199.202
ip117.254.105.200
ip45.114.192.137

Domain

ValueDescriptionCopy
domainnewsinfom.org
domainasp.asphspes.com
domainmailserver.kozow.com
domainpay.googleinstall.com

Threat ID: 68d3e458d2da9a2e8b223a09

Added to database: 9/24/2025, 12:30:16 PM

Last enriched: 9/24/2025, 12:34:13 PM

Last updated: 9/25/2025, 4:37:07 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats