Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

PlugX Meeting Invitation via MSBuild and GDATA

0
Medium
Published: Sun Mar 01 2026 (03/01/2026, 05:26:46 UTC)
Source: AlienVault OTX General

Description

A recent PlugX campaign utilized phishing emails with a 'Meeting Invitation' lure to deploy malware through DLL side-loading. The infection chain begins with a zip file containing a malicious .csproj file and MSBuild executable. The .csproj file downloads three components: a legitimate G DATA Antivirus executable, a malicious Avk.dll (PlugX variant), and an encrypted AVKTray.dat file. The malware uses DLL side-loading, API hashing, and XOR encryption for obfuscation. It establishes persistence via the Run registry key and communicates with a command and control server. The campaign showcases PlugX's continued evolution while maintaining its core characteristics, highlighting its ongoing relevance in cyber-espionage operations.

AI-Powered Analysis

AILast updated: 03/02/2026, 12:10:47 UTC

Technical Analysis

This PlugX campaign leverages phishing emails themed as 'Meeting Invitations' to trick victims into opening a zip archive containing a malicious MSBuild project (.csproj) file and the MSBuild executable. When executed, the .csproj file downloads three components: a legitimate G DATA Antivirus executable, a malicious DLL (Avk.dll) variant of PlugX, and an encrypted data file (AVKTray.dat). The malware abuses DLL side-loading by loading the malicious DLL in place of a legitimate one, allowing execution under the guise of a trusted process. It uses API hashing to obscure API calls and XOR encryption to protect its payload and configuration data, complicating detection and analysis. Persistence is achieved by adding entries to the Windows Run registry key, ensuring the malware runs on system startup. The malware establishes communication with a command and control (C2) server to receive commands and exfiltrate data. This campaign demonstrates PlugX's adaptability, combining traditional infection vectors with modern obfuscation and evasion techniques, underscoring its continued use in targeted cyber-espionage operations. The infection chain requires user interaction to open the zip and execute the project file but does not require prior authentication on the victim system.

Potential Impact

Organizations worldwide face risks including unauthorized remote access, data exfiltration, espionage, and potential lateral movement within networks. The use of legitimate software (G DATA Antivirus executable) for DLL side-loading complicates detection, increasing the likelihood of prolonged undetected presence. The malware's persistence mechanism ensures it survives reboots, enabling long-term access. Sensitive information, intellectual property, and confidential communications may be compromised. The campaign's phishing vector can lead to widespread infection if users are not vigilant. Additionally, the malware's modular design and encrypted payloads allow attackers to update capabilities dynamically, increasing the threat's adaptability and potential damage. This can disrupt organizational operations, damage reputations, and incur significant remediation costs.

Mitigation Recommendations

1. Implement advanced email filtering to detect and quarantine phishing emails with suspicious attachments or links, especially those mimicking meeting invitations. 2. Educate users to recognize and avoid opening unexpected zip files or project files from unknown or untrusted sources. 3. Monitor and restrict the use of MSBuild.exe and .csproj files, especially from non-standard locations, using application whitelisting or endpoint detection and response (EDR) solutions. 4. Employ behavioral analytics to detect DLL side-loading attempts and anomalous process behaviors, particularly involving legitimate antivirus executables. 5. Regularly audit and monitor Run registry keys and other persistence mechanisms for unauthorized modifications. 6. Deploy network monitoring to identify suspicious outbound connections to known or suspected C2 domains (e.g., decoorat.net, decoraat.net, onedow.gesecole.net). 7. Use threat intelligence feeds to update detection signatures with the provided hashes and domains. 8. Enforce the principle of least privilege to limit user permissions and reduce the impact of successful infections. 9. Maintain up-to-date endpoint protection solutions capable of detecting obfuscated malware techniques such as API hashing and XOR encryption. 10. Conduct regular incident response drills to prepare for rapid containment and remediation of infections.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://lab52.io/blog/plugx-meeting-invitation-via-msbuild-and-gdata"]
Adversary
null
Pulse Id
69a3ce16b33dca316675f3f3
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash381247c1d4c68a406237d7d3aa030930
hash769687f93869a70511aac1ef7c752455
hash7a75e713db41c28378e823322fdea0fd
hash9f331a11a054f33664fe86543fc34cf0
hashe7cb954f4bbdbadbd2c0206577621683
hash1151100a0aa1ed88f7897709444fd3b3b1044c10
hash2336c9a20ecd53ec1be468282bae94c8160eb93a
hashad833604d230b241e180950980ea462b3812f82a
hashd1a86ed06b18efef5ce724d2129cf1583b779b44
hashf06da8e29c3f0fafabfc3a524ae8b21730b57ed3
hash29cd44aa2a51a200d82cca578d97dc13241bc906ea6a33b132c6ca567dc8f3ad
hash46314092c8d00ab93cbbdc824b9fc39dec9303169163b9625bae3b1717d70ebc
hash5f9af68db10b029453264cfc9b8eee4265549a2855bb79668ccfc571fb11f5fc
hash6df8649bf4e233ee86a896ee8e5a3b3179c168ef927ac9283b945186f8629ee7
hash8421e7995778faf1f2a902fb2c51d85ae39481f443b7b3186068d5c33c472d99
hashd293ded5a63679b81556d2c622c78be6253f500b6751d4eeb271e6500a23b21e
hashde8ddc2451fb1305d76ab20661725d11c77625aeeaa1447faf3fbf56706c87f1
hashe7ed0cd4115f3ff35c38d36cc50c6a13eba2d845554439a36108789cd1e05b17

Domain

ValueDescriptionCopy
domaindecoorat.net
domaindecoraat.net
domainonedow.gesecole.net

Threat ID: 69a57ab332ffcdb8a20f871d

Added to database: 3/2/2026, 11:55:31 AM

Last enriched: 3/2/2026, 12:10:47 PM

Last updated: 3/2/2026, 9:49:47 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses