Resubmissions
11/03/2022, 16:25
220311-txctgaaca7 1011/03/2022, 16:25
220311-tw47bsdcdm 1008/11/2021, 16:32
211108-t2f2pacfg7 1008/11/2021, 16:30
211108-tzsygahgcn 1008/11/2021, 16:22
211108-tvqybahgbp 10Analysis
-
max time kernel
10s -
max time network
14s -
platform
macos_amd64 -
resource
macos -
submitted
08/11/2021, 16:22
Static task
static1
General
-
Target
evilquest
-
Size
85KB
-
MD5
322f4fb8f257a2e651b128c41df92b1d
-
SHA1
efbb681a61967e6f5a811f8649ec26efe16f50ae
-
SHA256
5a024ffabefa6082031dccdb1e74a7fec9f60f257cd0b1ab0f698ba2a5baca6b
-
SHA512
33c8cf815e4b37a3481c0ba4dfb14a4735a46575f6f70d5b351a8595e4ec8886224577c89c80d726f2e3d7cf2460d0cdd983379acb5fda0a9b7310f86c988e53
Malware Config
Signatures
-
EvilQuest Payload 24 IoCs
resource yara_rule behavioral1/files/0x0000000300088700-0.dat family_evilquest behavioral1/files/0x0000000300088702-1.dat family_evilquest behavioral1/files/0x0000000300088704-2.dat family_evilquest behavioral1/files/0x0000000300088700-7.dat family_evilquest behavioral1/files/0x0000000300088704-8.dat family_evilquest behavioral1/files/0x0000000300088702-10.dat family_evilquest behavioral1/files/0x0000000300088718-11.dat family_evilquest behavioral1/files/0x0000000300088702-12.dat family_evilquest behavioral1/files/0x000000030008871a-13.dat family_evilquest behavioral1/files/0x0000000300088702-14.dat family_evilquest behavioral1/files/0x0000000300088692-16.dat family_evilquest behavioral1/files/0x0000000300088692-17.dat family_evilquest behavioral1/files/0x0000000300088700-18.dat family_evilquest behavioral1/files/0x0000000300088692-19.dat family_evilquest behavioral1/files/0x0000000300087d49-20.dat family_evilquest behavioral1/files/0x0000000300088692-21.dat family_evilquest behavioral1/files/0x0000000300088704-22.dat family_evilquest behavioral1/files/0x0000000300088692-23.dat family_evilquest behavioral1/files/0x0000000300082e25-24.dat family_evilquest behavioral1/files/0x0000000300088692-27.dat family_evilquest behavioral1/files/0x0000000300088700-28.dat family_evilquest behavioral1/files/0x0000000300087d49-29.dat family_evilquest behavioral1/files/0x0000000300088704-30.dat family_evilquest behavioral1/files/0x0000000300082e25-32.dat family_evilquest -
suricata: ET MALWARE ThiefQuest CnC Domain in DNS Lookup
suricata: ET MALWARE ThiefQuest CnC Domain in DNS Lookup
Processes
-
/bin/shsh -c "sudo /Users/run/evilquest"1⤵PID:484
-
/bin/bashsh -c "sudo /Users/run/evilquest"1⤵PID:484
-
/usr/bin/sudosudo /Users/run/evilquest1⤵PID:484
-
/Users/run/evilquest/Users/run/evilquest2⤵PID:487
-
-
/bin/shsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:499
-
/bin/bashsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:499
-
/usr/bin/osascriptosascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges"1⤵PID:499
-
/usr/libexec/xpcproxyxpcproxy com.apple.security.authtrampoline1⤵PID:501
-
/System/Library/Frameworks/Security.framework/authtrampoline/System/Library/Frameworks/Security.framework/authtrampoline1⤵PID:501
-
/bin/sh/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:502
-
/bin/bash/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:502
-
/bin/launchctllaunchctl load -w /Library/LaunchDaemons/com.apple.questd.plist2⤵PID:503
-
-
/bin/launchctllaunchctl start questd2⤵PID:505
-
-
/usr/libexec/xpcproxyxpcproxy questd1⤵PID:504
-
/usr/bin/sudosudo /Library/AppQuest/com.apple.questd --silent1⤵PID:504
-
/Library/AppQuest/com.apple.questd/Library/AppQuest/com.apple.questd --silent2⤵PID:507
-
-
/bin/shsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:506
-
/bin/bashsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:506
-
/usr/bin/osascriptosascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges"1⤵PID:506
-
/bin/sh/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:508
-
/bin/bash/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:508
-
/bin/launchctllaunchctl load -w /Library/LaunchDaemons/com.apple.questd.plist2⤵PID:509
-
-
/bin/launchctllaunchctl start questd2⤵PID:510
-
-
/bin/shsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:511
-
/bin/bashsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:511
-
/usr/bin/osascriptosascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges"1⤵PID:511
-
/bin/sh/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:512
-
/bin/bash/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:512
-
/bin/launchctllaunchctl load -w /Library/LaunchDaemons/com.apple.questd.plist2⤵PID:513
-
-
/bin/launchctllaunchctl start questd2⤵PID:514
-
-
/bin/shsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:515
-
/bin/bashsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:515
-
/usr/bin/osascriptosascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges"1⤵PID:515
-
/bin/sh/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:516
-
/bin/bash/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:516
-
/bin/launchctllaunchctl load -w /Library/LaunchDaemons/com.apple.questd.plist2⤵PID:517
-
-
/bin/launchctllaunchctl start questd2⤵PID:518
-