Home / malware Backdoor:Win32/Plugx.X!lnk
First posted on 26 October 2016.
Source: MicrosoftAliases :
There are no other names known for Backdoor:Win32/Plugx.X!lnk.
Explanation :
Installation
This threat is dropped as a Word document link file contained in RAR compressed files.
Payload
This threat downloads the files in the background using BITS transfer jobs:
- hxp://www
hanksmilk com/2 txt - saved as 2.PS1 in %TEMP% folder - hxp://www
hanksmilk com/v3 txt - saved as V3.TXT in %TEMP% folder
The link file executes 2.PS1 to decode the file inside V3.TXT. The decoded file is saved and executed in %TEMP% directory as H.EXE. This executable file is detected as Backdoor:Win32/Plugx.X.
Analysis by Zarestel FerrerLast update 26 October 2016