The Latest PlugX Variant Executed by STATICPLUGIN
In January 2026, a new variant of the PlugX malware was observed being used in targeted attacks. Analysis suggests involvement of the UNC6384 APT group, linked to Mustang Panda, targeting government agencies in Southeast Asia. The malware uses a browser updater disguise to download and execute a malicious MSI file, leading to PlugX infection. The STATICPLUGIN downloader uses a revoked code-signing certificate from a Chinese company. The PlugX variant employs DLL sideloading and shellcode execution techniques. Its configuration is encrypted using RC4 and custom encoding. C2 servers were identified as fruitbrat[.]com and 108.165.255[.]97:443. The ongoing improvements to PlugX indicate its continued use in targeted attacks by APT groups.
AI Analysis
Technical Summary
In early 2026, cybersecurity researchers identified a new variant of the PlugX malware being deployed in targeted attacks, primarily against government entities in Southeast Asia. The threat actor behind this campaign is UNC6384, an APT group linked to Mustang Panda, known for espionage activities. The infection chain begins with the STATICPLUGIN downloader, which disguises itself as a legitimate browser updater to trick victims into executing a malicious MSI installer. This MSI file installs the PlugX malware variant, which leverages DLL sideloading—a technique where a legitimate DLL is replaced or loaded with a malicious one—to bypass security controls. Additionally, the malware executes shellcode directly in memory, complicating detection by traditional antivirus solutions. The configuration data for PlugX is protected using RC4 encryption combined with custom encoding methods, making reverse engineering more difficult. The malware communicates with command and control servers hosted at fruitbrat.com and the IP address 108.165.255.97 over HTTPS (port 443), facilitating stealthy data exfiltration and command execution. The STATICPLUGIN downloader notably uses a revoked code-signing certificate issued to a Chinese company, which may help evade some security checks but also signals potential attribution clues. Although no public exploits are currently known, the continuous enhancements to PlugX demonstrate its role as a persistent tool for espionage by sophisticated APT groups. The campaign's indicators of compromise include multiple file hashes and IP addresses, which can assist defenders in detection and response efforts.
Potential Impact
This PlugX variant poses a significant threat to targeted organizations, especially government agencies in Southeast Asia. Successful infection can lead to unauthorized access, data theft, espionage, and potential disruption of critical government operations. The use of DLL sideloading and shellcode execution increases the malware's stealth and persistence, making detection and removal challenging. The encrypted configuration and use of revoked code-signing certificates complicate forensic analysis and attribution. Organizations compromised by this malware may suffer loss of sensitive information, damage to national security interests, and erosion of trust in their cybersecurity posture. The targeted nature of the attacks suggests a high level of adversary sophistication and intent, increasing the risk of prolonged campaigns and lateral movement within networks. While no widespread outbreaks are reported, the threat remains active and could expand to other sectors or regions if not mitigated effectively.
Mitigation Recommendations
Organizations should implement a multi-layered defense strategy tailored to this threat. First, enforce strict application whitelisting and monitor for unauthorized MSI installations, especially those masquerading as browser updates. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting DLL sideloading and in-memory shellcode execution. Validate all code-signing certificates and block binaries signed with revoked or suspicious certificates. Network defenses should include monitoring and blocking communications to known malicious domains and IP addresses such as fruitbrat.com and 108.165.255.97. Employ network segmentation to limit lateral movement and restrict administrative privileges to reduce attack surface. Regularly update and patch software to close vulnerabilities that could be exploited for initial access. Conduct threat hunting exercises using the provided file hashes and indicators of compromise to identify potential infections. User awareness training should emphasize the risks of executing unsolicited updates or installers. Finally, maintain robust incident response plans to quickly isolate and remediate infections.
Affected Countries
Vietnam, Thailand, Malaysia, Singapore, Indonesia, Philippines
Indicators of Compromise
- ip: 45.251.243.210
- hash: 19c4e403846640def976af31f03105ae
- hash: 741cda9ec9c8b55eba74a48ecf25e998
- hash: 9f2445970118960bddeafa3020b5c7f6e07ed53d
- hash: b51d16398ac8b3cfd6a24caedd8cddecc4ef3493
- hash: 106f46375d8497d353c22c98f72ab15a9bb87beba4585d5a492fd11edc288b0b
- hash: 22014e2d31197dddc2c451ed475aede3d21ca99784973bdcfd9c3a7d9aaa1999
- hash: 4cd81d26289c4d8383a0ffa34397f0b03941554eac04f1b420269b831accf90e
- hash: 4ee6bd5a5701853402a08640f531e1be937d0c1f497e3fc255c9ea3e943ecf42
- hash: 79af67ed343bc45b6a19e4836ebb83f1130243ff98f48465f9a7a807ba4bfa91
- hash: a7161c9a7c54a47d27459655725d2ade242d0931d6272c75a36f07df45220b08
- hash: d4bc21e12360af2f2cb55872a90b62805150d498c452b2b1c6a05a806cbb3187
- hash: f9c4df5f5dafdb548fddf9e7e6f07cef8eca7930de7eba385e81dc072bc50113
- ip: 108.165.255.97
- url: http://fruitbrat.com:443
- domain: fruitbrat.com
The Latest PlugX Variant Executed by STATICPLUGIN
Description
In January 2026, a new variant of the PlugX malware was observed being used in targeted attacks. Analysis suggests involvement of the UNC6384 APT group, linked to Mustang Panda, targeting government agencies in Southeast Asia. The malware uses a browser updater disguise to download and execute a malicious MSI file, leading to PlugX infection. The STATICPLUGIN downloader uses a revoked code-signing certificate from a Chinese company. The PlugX variant employs DLL sideloading and shellcode execution techniques. Its configuration is encrypted using RC4 and custom encoding. C2 servers were identified as fruitbrat[.]com and 108.165.255[.]97:443. The ongoing improvements to PlugX indicate its continued use in targeted attacks by APT groups.
AI-Powered Analysis
Technical Analysis
In early 2026, cybersecurity researchers identified a new variant of the PlugX malware being deployed in targeted attacks, primarily against government entities in Southeast Asia. The threat actor behind this campaign is UNC6384, an APT group linked to Mustang Panda, known for espionage activities. The infection chain begins with the STATICPLUGIN downloader, which disguises itself as a legitimate browser updater to trick victims into executing a malicious MSI installer. This MSI file installs the PlugX malware variant, which leverages DLL sideloading—a technique where a legitimate DLL is replaced or loaded with a malicious one—to bypass security controls. Additionally, the malware executes shellcode directly in memory, complicating detection by traditional antivirus solutions. The configuration data for PlugX is protected using RC4 encryption combined with custom encoding methods, making reverse engineering more difficult. The malware communicates with command and control servers hosted at fruitbrat.com and the IP address 108.165.255.97 over HTTPS (port 443), facilitating stealthy data exfiltration and command execution. The STATICPLUGIN downloader notably uses a revoked code-signing certificate issued to a Chinese company, which may help evade some security checks but also signals potential attribution clues. Although no public exploits are currently known, the continuous enhancements to PlugX demonstrate its role as a persistent tool for espionage by sophisticated APT groups. The campaign's indicators of compromise include multiple file hashes and IP addresses, which can assist defenders in detection and response efforts.
Potential Impact
This PlugX variant poses a significant threat to targeted organizations, especially government agencies in Southeast Asia. Successful infection can lead to unauthorized access, data theft, espionage, and potential disruption of critical government operations. The use of DLL sideloading and shellcode execution increases the malware's stealth and persistence, making detection and removal challenging. The encrypted configuration and use of revoked code-signing certificates complicate forensic analysis and attribution. Organizations compromised by this malware may suffer loss of sensitive information, damage to national security interests, and erosion of trust in their cybersecurity posture. The targeted nature of the attacks suggests a high level of adversary sophistication and intent, increasing the risk of prolonged campaigns and lateral movement within networks. While no widespread outbreaks are reported, the threat remains active and could expand to other sectors or regions if not mitigated effectively.
Mitigation Recommendations
Organizations should implement a multi-layered defense strategy tailored to this threat. First, enforce strict application whitelisting and monitor for unauthorized MSI installations, especially those masquerading as browser updates. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting DLL sideloading and in-memory shellcode execution. Validate all code-signing certificates and block binaries signed with revoked or suspicious certificates. Network defenses should include monitoring and blocking communications to known malicious domains and IP addresses such as fruitbrat.com and 108.165.255.97. Employ network segmentation to limit lateral movement and restrict administrative privileges to reduce attack surface. Regularly update and patch software to close vulnerabilities that could be exploited for initial access. Conduct threat hunting exercises using the provided file hashes and indicators of compromise to identify potential infections. User awareness training should emphasize the risks of executing unsolicited updates or installers. Finally, maintain robust incident response plans to quickly isolate and remediate infections.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://sect.iij.ad.jp/blog/2026/02/plugx-executed-via-staticplugin/"]
- Adversary
- UNC6384
- Pulse Id
- 699edea96aa1a8d035261fc9
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip45.251.243.210 | — | |
ip108.165.255.97 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash19c4e403846640def976af31f03105ae | — | |
hash741cda9ec9c8b55eba74a48ecf25e998 | — | |
hash9f2445970118960bddeafa3020b5c7f6e07ed53d | — | |
hashb51d16398ac8b3cfd6a24caedd8cddecc4ef3493 | — | |
hash106f46375d8497d353c22c98f72ab15a9bb87beba4585d5a492fd11edc288b0b | — | |
hash22014e2d31197dddc2c451ed475aede3d21ca99784973bdcfd9c3a7d9aaa1999 | — | |
hash4cd81d26289c4d8383a0ffa34397f0b03941554eac04f1b420269b831accf90e | — | |
hash4ee6bd5a5701853402a08640f531e1be937d0c1f497e3fc255c9ea3e943ecf42 | — | |
hash79af67ed343bc45b6a19e4836ebb83f1130243ff98f48465f9a7a807ba4bfa91 | — | |
hasha7161c9a7c54a47d27459655725d2ade242d0931d6272c75a36f07df45220b08 | — | |
hashd4bc21e12360af2f2cb55872a90b62805150d498c452b2b1c6a05a806cbb3187 | — | |
hashf9c4df5f5dafdb548fddf9e7e6f07cef8eca7930de7eba385e81dc072bc50113 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://fruitbrat.com:443 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainfruitbrat.com | — |
Threat ID: 699ee338b7ef31ef0b0201e6
Added to database: 2/25/2026, 11:55:36 AM
Last enriched: 2/25/2026, 12:10:47 PM
Last updated: 2/26/2026, 7:32:20 AM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-02-25
MediumMedical Device Maker UFP Technologies Hit by Cyberattack
MediumMaltrail IOC for 2026-02-25
MediumMercenary Akula Hits Ukraine-Supporting Financial...
MediumThreatFox IOCs for 2026-02-24
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.