Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

The Latest PlugX Variant Executed by STATICPLUGIN

0
Medium
Published: Wed Feb 25 2026 (02/25/2026, 11:36:09 UTC)
Source: AlienVault OTX General

Description

In January 2026, a new variant of the PlugX malware was observed being used in targeted attacks. Analysis suggests involvement of the UNC6384 APT group, linked to Mustang Panda, targeting government agencies in Southeast Asia. The malware uses a browser updater disguise to download and execute a malicious MSI file, leading to PlugX infection. The STATICPLUGIN downloader uses a revoked code-signing certificate from a Chinese company. The PlugX variant employs DLL sideloading and shellcode execution techniques. Its configuration is encrypted using RC4 and custom encoding. C2 servers were identified as fruitbrat[.]com and 108.165.255[.]97:443. The ongoing improvements to PlugX indicate its continued use in targeted attacks by APT groups.

AI-Powered Analysis

AILast updated: 02/25/2026, 12:10:47 UTC

Technical Analysis

In early 2026, cybersecurity researchers identified a new variant of the PlugX malware being deployed in targeted attacks, primarily against government entities in Southeast Asia. The threat actor behind this campaign is UNC6384, an APT group linked to Mustang Panda, known for espionage activities. The infection chain begins with the STATICPLUGIN downloader, which disguises itself as a legitimate browser updater to trick victims into executing a malicious MSI installer. This MSI file installs the PlugX malware variant, which leverages DLL sideloading—a technique where a legitimate DLL is replaced or loaded with a malicious one—to bypass security controls. Additionally, the malware executes shellcode directly in memory, complicating detection by traditional antivirus solutions. The configuration data for PlugX is protected using RC4 encryption combined with custom encoding methods, making reverse engineering more difficult. The malware communicates with command and control servers hosted at fruitbrat.com and the IP address 108.165.255.97 over HTTPS (port 443), facilitating stealthy data exfiltration and command execution. The STATICPLUGIN downloader notably uses a revoked code-signing certificate issued to a Chinese company, which may help evade some security checks but also signals potential attribution clues. Although no public exploits are currently known, the continuous enhancements to PlugX demonstrate its role as a persistent tool for espionage by sophisticated APT groups. The campaign's indicators of compromise include multiple file hashes and IP addresses, which can assist defenders in detection and response efforts.

Potential Impact

This PlugX variant poses a significant threat to targeted organizations, especially government agencies in Southeast Asia. Successful infection can lead to unauthorized access, data theft, espionage, and potential disruption of critical government operations. The use of DLL sideloading and shellcode execution increases the malware's stealth and persistence, making detection and removal challenging. The encrypted configuration and use of revoked code-signing certificates complicate forensic analysis and attribution. Organizations compromised by this malware may suffer loss of sensitive information, damage to national security interests, and erosion of trust in their cybersecurity posture. The targeted nature of the attacks suggests a high level of adversary sophistication and intent, increasing the risk of prolonged campaigns and lateral movement within networks. While no widespread outbreaks are reported, the threat remains active and could expand to other sectors or regions if not mitigated effectively.

Mitigation Recommendations

Organizations should implement a multi-layered defense strategy tailored to this threat. First, enforce strict application whitelisting and monitor for unauthorized MSI installations, especially those masquerading as browser updates. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting DLL sideloading and in-memory shellcode execution. Validate all code-signing certificates and block binaries signed with revoked or suspicious certificates. Network defenses should include monitoring and blocking communications to known malicious domains and IP addresses such as fruitbrat.com and 108.165.255.97. Employ network segmentation to limit lateral movement and restrict administrative privileges to reduce attack surface. Regularly update and patch software to close vulnerabilities that could be exploited for initial access. Conduct threat hunting exercises using the provided file hashes and indicators of compromise to identify potential infections. User awareness training should emphasize the risks of executing unsolicited updates or installers. Finally, maintain robust incident response plans to quickly isolate and remediate infections.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://sect.iij.ad.jp/blog/2026/02/plugx-executed-via-staticplugin/"]
Adversary
UNC6384
Pulse Id
699edea96aa1a8d035261fc9
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip45.251.243.210
ip108.165.255.97

Hash

ValueDescriptionCopy
hash19c4e403846640def976af31f03105ae
hash741cda9ec9c8b55eba74a48ecf25e998
hash9f2445970118960bddeafa3020b5c7f6e07ed53d
hashb51d16398ac8b3cfd6a24caedd8cddecc4ef3493
hash106f46375d8497d353c22c98f72ab15a9bb87beba4585d5a492fd11edc288b0b
hash22014e2d31197dddc2c451ed475aede3d21ca99784973bdcfd9c3a7d9aaa1999
hash4cd81d26289c4d8383a0ffa34397f0b03941554eac04f1b420269b831accf90e
hash4ee6bd5a5701853402a08640f531e1be937d0c1f497e3fc255c9ea3e943ecf42
hash79af67ed343bc45b6a19e4836ebb83f1130243ff98f48465f9a7a807ba4bfa91
hasha7161c9a7c54a47d27459655725d2ade242d0931d6272c75a36f07df45220b08
hashd4bc21e12360af2f2cb55872a90b62805150d498c452b2b1c6a05a806cbb3187
hashf9c4df5f5dafdb548fddf9e7e6f07cef8eca7930de7eba385e81dc072bc50113

Url

ValueDescriptionCopy
urlhttp://fruitbrat.com:443

Domain

ValueDescriptionCopy
domainfruitbrat.com

Threat ID: 699ee338b7ef31ef0b0201e6

Added to database: 2/25/2026, 11:55:36 AM

Last enriched: 2/25/2026, 12:10:47 PM

Last updated: 2/26/2026, 7:32:20 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats