Virus.MacOS.THIEFQUEST.A-O

 Analysis by: Bren Matthew Ebriega

 ALIASES:

Ransom:MacOS/Filecoder.YA!MTB (MICROSOFT); HEUR:Trojan-Ransom.OSX.FileCoder.gen (KASPERSKY)

 PLATFORM:

MacOS

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Virus

  • Destructiveness: No

  • Encrypted: No

  • In the wild: Yes

  OVERVIEW

Infection Channel:

Infects files


This Virus prepends its codes to target files. It adds infection markers to files.

It executes commands from a remote malicious user, effectively compromising the affected system.

It encrypts files with specific file extensions. It encrypts files found in specific folders.

  TECHNICAL DETAILS

File Size:

87,920 bytes

File Type:

Mach-O

Memory Resident:

Yes

Initial Samples Received Date:

01 Jul 2020

Payload:

Compromises system security, Connects to URLs/IPs, Displays windows, Displays message/message boxes

Arrival Details

This malware arrives via the following means:

  • It arrives on a system as part of an application bundle downloaded by users who look for pirated software installers.

Installation

This Virus drops the following files:

  • /private/var/root/.ncspot – text files containing a 43-byte string to be used by the Virus

It drops the following copies of itself into the affected system:

  • ~/Library/AppQuest/com.apple.questd
  • /Library/AppQuest/com.apple.questd
  • /private/var/root/Library/.{random generated string}
  • (Note: The character <~>indicates the main directory accessible to the current logged in user only. If the file path does not contain the character <~> specified file is located in the local main directory accessible to all users.)

File Infection

This Virus infects the following file types:

  • Mach-O Executable File

It prepends its codes to target files.

It searches for target files in the following folders:

  • /Users

It adds infection markers to files.

Backdoor Routine

This Virus executes the following commands from a remote malicious user:

  • Load and execute received data from memory
  • Save received data as specified file
  • Log keystrokes

It connects to the following URL(s) to send and receive commands from a remote malicious user:

  • {BLOCKED}.{BLOCKED}.237.219

Download Routine

This Virus accesses the following websites to download files:

  • http://andrewka6.{BLOCKED}anywhere.com/ret.txt → Contains specified C&C Server

Other Details

This Virus displays a pop-up window with the following message:


It does the following:

  • Installs the following autorun items:
    • ~/Library/LaunchAgents/com.apple.questd.plist
    • /Library/LaunchDaemons/com.apple.questd.plist
    • (Note: The character <~>indicates the main directory accessible to the current logged in user only. If the file path does not contain the character <~> specified file is located in the local directory accessible to all users.)
  • It avoids the Mach-O Executable files that are included in application bundles(.app file extension)
  • Infected files from this Virus will drop and execute its original code as a hidden file to deceive the user into thinking that the infected executed file was not affected while the malware performs its routines in the background.
  • It will first attempt to download the file to get the specified C&C. If unsuccessful it will instead use the IP Address as C&C Server.
  • It does not append a different file extension to the file name of the encrypted files. Instead, it leaves an encryption marker at the end each file.
  • It is capable of file exfiltration. It searches the following folder for files of interest to encode and send to the server:
    • /Users
  • It searches for files that match the following regular string expressions to encrypt:
    • *id_rsa*/i
    • *.pem/i
    • *.ppk/i
    • known_hosts/i
    • *.ca-bundle/i
    • *.crt/i
    • *.p7!/i
    • *.!er/i
    • *.pfx/i
    • *.p12/i
    • *key*.pdf/i
    • *wallet*.pdf/i
    • *key*.png/i
    • *wallet*.png/i
    • *key*.jpg/i
    • *wallet*.jpg/i
    • *key*.jpeg/i
    • *wallet*.jpeg/i

Ransomware Routine

This Virus encrypts files with the following extensions:

  • .tar
  • .rar
  • .tgz
  • .zip
  • .7z
  • .dmg
  • .gz
  • .jpg
  • .jpeg
  • .png
  • .gif
  • .psd
  • .eps
  • .mp4
  • .mp3
  • .mov
  • .avi
  • .mkv
  • .wav
  • .aif
  • .aiff
  • .ogg
  • .flac
  • .doc
  • .txt
  • .docx
  • .xls
  • .xlsx
  • .pages
  • .pdf
  • .rtf
  • .m4a
  • .csv
  • .djvu
  • .epub
  • .pub
  • .key
  • .dwg
  • .c
  • .cpp
  • .ovpn
  • .download
  • .pem
  • .numbers
  • .keynote
  • .ppt
  • .aspx
  • .html
  • .xml
  • .json
  • .js
  • .sqlite
  • .pptx
  • .pkg
  • .vb
  • .asp
  • .ppk
  • .crt
  • .p7
  • .pfx
  • .p12
  • .dat
  • .hpp
  • .ovpn
  • .download
  • .pem
  • .numbers
  • .keynote
  • .ppt
  • .aspx
  • .html
  • .xml
  • .json
  • .js
  • .pkg
  • .webarchive

It encrypts files found in the following folders:

  • /Users

It leaves text files that serve as ransom notes containing the following text:

  SOLUTION

Minimum Scan Engine:

9.850

FIRST VSAPI PATTERN FILE:

1.510.00

FIRST VSAPI PATTERN DATE:

02 Jul 2020

VSAPI OPR PATTERN File:

1.520.00

VSAPI OPR PATTERN Date:

08 Aug 2020

Scan your computer with your Trend Micro product to delete files detected as Virus.MacOS.THIEFQUEST.A-O. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:


Did this description help? Tell us how we did.