Analytics Story: Quasar RAT
Description
Leverage searches that help you detect and investigate unusual activities potentially associated with Quasar RAT. These includes processes accessing FileZilla XML configuration files (which may store FTP credentials for exfiltration), loading Mozilla NSS and Mozglue libraries (often targeted for DLL side-loading attacks to evade detection), steal credential via browsers and accessing Intelliform Storage Registry keys used by Internet Explorer (which can contain saved credentials and autocomplete data valuable for credential theft).
Why it matters
Quasar RAT is an open-source remote access Trojan (RAT) written in .NET, widely used by both cybercriminals and advanced threat actors for espionage, credential theft, and lateral movement. First appearing around 2014, Quasar offers a rich feature set including remote desktop control, file management, keylogging, and password dumping. Its open-source nature makes it easy for attackers to customize and rebrand, complicating attribution efforts. Quasar is often delivered through phishing emails, malicious attachments, or cracked software, establishing persistence via registry keys or scheduled tasks. Once installed, it communicates with command-and-control servers over configurable ports, often using encrypted channels to evade network detection.
Detections
Data Sources
Name | Platform | Sourcetype | Source |
---|---|---|---|
CrowdStrike ProcessRollup2 | N/A | crowdstrike:events:sensor |
crowdstrike |
Powershell Script Block Logging 4104 | XmlWinEventLog |
XmlWinEventLog:Microsoft-Windows-PowerShell/Operational |
|
Sysmon EventID 1 | XmlWinEventLog |
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
|
Sysmon EventID 11 | XmlWinEventLog |
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
|
Sysmon EventID 13 | XmlWinEventLog |
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
|
Sysmon EventID 22 | XmlWinEventLog |
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
|
Sysmon EventID 23 | XmlWinEventLog |
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
|
Sysmon EventID 7 | XmlWinEventLog |
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
|
Windows Event Log Security 4663 | XmlWinEventLog |
XmlWinEventLog:Security |
|
Windows Event Log Security 4688 | XmlWinEventLog |
XmlWinEventLog:Security |
|
Windows Event Log Security 4698 | XmlWinEventLog |
XmlWinEventLog:Security |
|
Windows Event Log Security 4700 | XmlWinEventLog |
XmlWinEventLog:Security |
|
Windows Event Log Security 4702 | XmlWinEventLog |
XmlWinEventLog:Security |
References
- https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
- https://www.proofpoint.com/us/blog/threat-insight/around-world-90-days-state-sponsored-actors-try-clickfix
Source: GitHub | Version: 1