Plurox is a newly observed modular backdoor. It is written in C and complied with Mingw GCC. It appears to still be in active testing, with multiple variants seen in the wild.
It is unclear how Plurox is initially delivered to a target system, although there are unconfirmed reports indicating it may be delivered as a secondary payload by another piece of malware.
By default, Plurox can alter registry entries and edit, transfer or delete files, with plugins used to extend its functionality. These are either included with Plurox upon delivery or downloaded afterwards, with each individual plugin containing a command script as well as a configuration file. At the time of publication, only cryptocurrency mining plugins have been discovered, although it is likely that other plugins exist.
Plurox can also propagate laterally using the EternalBlue SMB and EternalSilence UPnP exploits. Using a separate plugin, it will enumerate the local network, scan for exposed ports 135 and 445, and send back any found ports to the C2 server. The attacker will then send a command back to Plurox to deploy the relevant exploit.
- Main body
- Trickster Worm module
UK based technology professional, with an interest in computer security and telecoms.