Plug X malware

GPTKB entity

Statements (50)
Predicate Object
gptkbp:instance_of gptkb:virus
gptkbp:associated_with APT groups
gptkbp:available_at USB drives
drive-by downloads
gptkbp:can_be_used_to peer-to-peer communication
steal credentials
HTTP/ HTTPS protocols
install other malware
gptkbp:can_create backdoor access
gptkbp:can_detect gptkb:virus
gptkbp:can_download additional payloads
gptkbp:can_perform commands remotely
gptkbp:casualties government agencies
corporate networks
gptkbp:controls files on infected systems
gptkbp:developed_by gptkb:Chinese_hackers
gptkbp:discovered_by gptkb:2012
gptkbp:distribution phishing emails
malicious websites
gptkbp:has_ability gptkb:remote_control
data exfiltration
screen capturing
keylogging
gptkbp:has_variants Plug X 2.0
Plug X 3.0
https://www.w3.org/2000/01/rdf-schema#label Plug X malware
gptkbp:is_analyzed_in cybersecurity researchers
gptkbp:is_associated_with data breaches
gptkbp:is_considered a significant threat
a sophisticated threat
gptkbp:is_known_for stealth techniques
modular architecture
command and control servers
its persistence mechanisms
gptkbp:is_monitored_by threat intelligence platforms
gptkbp:is_often_delivered_via social engineering tactics
gptkbp:is_part_of cyber espionage campaigns
advanced persistent threat (APT) operations
gptkbp:is_related_to other RATs
gptkbp:is_used_in spear phishing attacks
gptkbp:prevention firewalls
endpoint protection solutions
gptkbp:reported_by security advisories
gptkbp:targets gptkb:operating_system
gptkbp:type remote access Trojan
gptkbp:uses encryption
DLL injection
gptkbp:written_in gptkb:C++
gptkbp:bfsParent gptkb:APT10
gptkbp:bfsLayer 6