Researchers has shared their findings about an operation responding to a Black Basta ransomware compromise has revealed the use of a new wormable PlugX malware variant that can automatically infect any attached removable USB media devices.
This PlugX malware also hides attacker files in a USB device with a novel technique, which makes the malicious files only viewable on a *nix OS or by mounting the USB device in a forensic tool. Due to this ability to evade detection, the PlugX malware can continue to spread and potentially jump to air-gapped networks.
It is a modular malware framework, supporting an evolving set of capabilities throughout the years according to the researchers, PlugX is a second-stage implant, is used by multiple groups with a Chinese nexus as well as several cybercrime groups.
PlugX is around for over a decade and has been observed in some high-profile cyber-attacks, including the U.S. Government Office of Personnel Management (OPM) breach in 2015
The connection between the malware tool and Black Basta derives from the fact that the Brute Ratel post-exploitation tool used in these attacks is the same badger payload previously reported by Trend Micro and associated with the ransomware group.
The researchers also discovered a similar variant of PlugX with the added capability of copying all Adobe PDF and Microsoft Word documents from the infected host to the USB device’s hidden folder created by the PlugX malware.
The discovery of these samples indicates PlugX development is still alive and well among at least some technically skilled attackers, and it remains an active threat.
This research was documented by researchers from Palo Alto Unit 42
Indicators of Compromise
Known PlugX Samples:
Known File Directories
- C:\Users\Public\Public Mediae\
- <usb volume>:\u00A0\u00A0\RECYCLER.BIN\files
- <usb volume>:\u00A0\u00A0\RECYCLER.BIN\files\da520e5
Known Windows Mutex Names
Known PlugX Encrypted Payload File Names
Known Windows Scheduled Task Names
Known Windows Process Names