Campaign Identifier: QuasarRAT-Xworm-PowerShell-Campaign
Last Updated: October 17, 2025
BLUF (Bottom Line Up Front)
Executive Summary
Business Impact Summary
The QuasarRAT + Xworm + PowerShell campaign represents a sophisticated multi-stage attack combining commodity remote access trojans with advanced fileless execution techniques. The attack systematically disables security controls and establishes persistent remote access, creating significant data theft and system control risks.
Key Risk Factors
| Risk Factor | Score | Business Impact |
|---|---|---|
| Security Control Disabling | 9/10 | Complete Microsoft Defender bypass enabling unrestricted malicious activity |
| Fileless Execution | 8/10 | Memory-based execution evades traditional file-based detection methods |
| Remote Access Trojans | 8/10 | Full system control with data theft, surveillance, and lateral movement capabilities |
| Persistence Mechanisms | 7/10 | Long-term unauthorized access with multiple RAT deployment options |
Recommended Actions
- ISOLATE potentially compromised systems from network immediately
- RESTORE Microsoft Defender functionality and remove all exclusions
- SCAN all systems for QuasarRAT and Xworm binaries
- AUDIT PowerShell execution logs for suspicious script blocks
- BLOCK access to known malicious infrastructure (dns4up.duckdns.org, 193.233.164.21)
- RESET all credentials for potentially compromised accounts
Table of Contents
- Quick Reference
- BLUF (Bottom Line Up Front)
- Technical Analysis
- Attack Tactics & Procedures
- Incident Response Procedures
- Operational Impact Assessment
- Long-term Defensive Strategy
- Frequently Asked Questions
- IOCs
- Detections
Quick Reference
Detections & IOCs:
Overview
This campaign combines commodity RATs (QuasarRAT and Xworm) with a VBScript + PowerShell loader.
The loader disguises its payload as an image (update.png) but actually downloads and executes a PowerShell script in memory.
That script disables Microsoft Defender by adding broad exclusions, then facilitates RAT deployment.
Loader Mechanism
- VBScript stager constructs a PowerShell command string.
- PowerShell execution uses
.NET System.Net.Http.HttpClientto fetchupdate.pngfrom a remote server. - Despite the
.pngextension, the file is a text‑based PowerShell script, not an image. - The script is read into memory, compiled into a
[ScriptBlock], and executed immediately with.Invoke().
Defense Evasion
The PowerShell payload disables Microsoft Defender by adding exclusions for:
- Entire
C:\drive. - Processes:
powershell.exe,wscript.exe,cmd.exe,cvtres.exe.
This effectively blinds Defender to subsequent malicious activity.
RAT Deployment
Once exclusions are in place, the loader hands off to RAT binaries:
- QuasarRAT: .NET‑based remote access trojan, ~2–3 MB, often with configs embedded in resources.
- Xworm: smaller (~70 KB), obfuscated strings, commodity RAT functionality.
Both provide persistence, remote control, and data theft capabilities.
Technical Analysis
Infrastructure Overview
| Infrastructure Component | Value | Role in Attack Chain |
|---|---|---|
| Dynamic DNS Domain | dns4up.duckdns[.]org | Primary C2 domain for RAT communication |
| Hosting IP | 193.233.164.21 | Infrastructure hosting malicious payloads |
| Payload Disguise | update.png | PowerShell script disguised as image file |
Attack Chain Components
| Component | Technology | Purpose |
|---|---|---|
| Initial Loader | VBScript | Constructs PowerShell execution command |
| Delivery Mechanism | PowerShell + .NET HttpClient | Downloads and executes malicious script in memory |
| Defense Evasion | PowerShell exclusions | Disables Microsoft Defender completely |
| Primary RAT | QuasarRAT (.NET) | Full-featured remote access trojan (~2-3 MB) |
| Secondary RAT | Xworm | Lightweight commodity RAT (~70 KB) |
Tactics, Techniques, and Procedures (TTPs)
- Fileless execution: PowerShell loads and executes script content directly in memory.
- Defense evasion: Microsoft Defender exclusions.
- Remote access: RAT deployment for persistence and control.
- Living off the land: Abuse of legitimate scripting engines (VBScript, PowerShell).
Pivoting Strategy
Analysts can pivot on:
- File names:
update.png,update.ps1. - Strings:
Add-MpPreference,ExclusionPath,HttpClient.GetAsync. - Domains/IPs: DuckDNS subdomains,
193.233.164.21. - Malware traits: QuasarRAT’s embedded configs, Xworm’s obfuscation patterns.
Final Summary
This campaign demonstrates a layered loader strategy:
- VBScript launches PowerShell.
- PowerShell fetches a disguised payload (
update.png). - Payload disables Defender and executes in memory.
- RATs (QuasarRAT, Xworm) are deployed for persistence and remote control.
Key insight: the .png extension is a deliberate misdirection — the payload is a PowerShell script, not an image.
This is a classic “living off the land” technique, leveraging native scripting tools for stealth and evasion.
Attack Tactics & Procedures
MITRE ATT&CK Mapping
| Tactic | Technique ID | Technique Name | Implementation |
|---|---|---|---|
| Execution | T1059.001 | PowerShell | Fileless PowerShell script execution in memory |
| Defense Evasion | T1562.001 | Disable or Modify Tools | Microsoft Defender exclusions via Add-MpPreference |
| Persistence | T1543.003 | Windows Service | RAT deployment for long-term access |
| Command and Control | T1071.001 | Application Layer Protocol: Web Protocols | HTTP/HTTPS communication with C2 infrastructure |
| Living off the Land | T1218.005 | System Tools | Abuse of legitimate VBScript and PowerShell |
Threat Hunting Indicators
| Indicator Type | Value | Hunting Method |
|---|---|---|
| File Names | update.png, update.ps1 | File system monitoring, EDR alerts |
| PowerShell Strings | Add-MpPreference, ExclusionPath, HttpClient.GetAsync | PowerShell logging, script block analysis |
| Network Indicators | dns4up.duckdns.org, 193.233.164.21 | DNS monitoring, network traffic analysis |
| Malware Signatures | QuasarRAT configs, Xworm obfuscation | Memory analysis, YARA rules |
Incident Response Procedures
Priority 1: Initial Response
- ISOLATE potentially compromised systems from network
- RESTORE Microsoft Defender functionality and remove all exclusions
- SCAN all systems for QuasarRAT and Xworm binaries
- AUDIT PowerShell execution logs for suspicious script blocks
- BLOCK access to known malicious infrastructure (dns4up.duckdns.org, 193.233.164.21)
- RESET all credentials for potentially compromised accounts
Priority 2: Investigation & Analysis
- FORENSIC ANALYSIS of PowerShell logs for script block execution
- MEMORY ANALYSIS for fileless execution artifacts
- NETWORK ANALYSIS for connections to C2 infrastructure
- MALWARE ANALYSIS of recovered RAT binaries
- THREAT HUNTING for additional compromised systems and lateral movement
Priority 3: Remediation & Recovery
- REBUILD compromised systems from known-good images
- RESET all credentials for potentially compromised accounts
- IMPLEMENT PowerShell logging and monitoring
- DEPLOY application whitelisting for script execution
- ESTABLISH enhanced endpoint detection and response capabilities
Operational Impact Assessment
Impact Scenarios
| Impact Category | Severity Level | Recovery Time |
|---|---|---|
| Data Compromise | HIGH | extended period |
| System Compromise | HIGH | several weeks |
| Operational Disruption | MEDIUM | several weeks |
| Security Control Recovery | HIGH | several weeks |
| Long-term Monitoring | MEDIUM | extended period |
| Compliance Impact | HIGH | extended period |
Operational Impact Timeline
- Immediate Response: System isolation, security control restoration, emergency response
- Investigation Phase: System rebuilding, enhanced monitoring deployment, credential rotation
- Recovery Phase: Process improvements, security hardening, user training
- Long-term Phase: Security architecture review, compliance activities
- Extended Phase: Ongoing monitoring and regulatory compliance
Operational Impact Timeline
- Immediate: System isolation, security control restoration, emergency response
- Short-term: System rebuilding, enhanced monitoring deployment
- Medium-term: Process improvements, security hardening
- Long-term: Security architecture review, compliance activities
Long-term Defensive Strategy
Technology Enhancements
- Endpoint Detection & Response (EDR) with fileless execution capabilities and behavioral analysis
- Application Control to prevent unauthorized script execution and unknown software deployment
- PowerShell Constrained Language Mode with restrictive execution policies and enhanced logging
- Advanced Threat Protection with real-time fileless attack detection and memory forensics
- Network Traffic Analysis for C2 communication detection and anomaly identification
- Security Information and Event Management (SIEM) with PowerShell integration and correlation rules
- Cloud Access Security Broker (CASB) for monitoring cloud-based exfiltration attempts
Process Improvements
- PowerShell Logging with script block logging, module logging, and transcription capabilities
- Application Whitelisting for script execution, file downloads, and PowerShell commands
- Regular Security Assessments including penetration testing of endpoint defenses and fileless attack simulations
- Incident Response Playbooks specific to fileless malware attacks and RAT remediation
- Change Management procedures with security approval requirements and rollback capabilities
- Threat Hunting Program with regular hunts for fileless attack indicators and RAT infrastructure
Organizational Measures
- Security Awareness Training on social engineering, malicious scripts, and RAT detection
- Regular Security Assessments including red team exercises and fileless attack scenarios
- Threat Intelligence Subscription for emerging fileless malware threats and RAT infrastructure monitoring
- Executive Security Briefings on living-off-the-land attack techniques and business impact
- Investment in Security Tools and personnel training for advanced threat detection and response
- Security Champions Program to promote security culture and incident reporting
Resource Investment Summary
- Technology Investment: EDR and advanced protection deployment across endpoints
- Training Investment: Security awareness and specialized training for personnel
- Process Investment: Security program development and maintenance activities
- Total Investment: Comprehensive fileless attack protection capabilities
- Expected Outcome: Prevention of fileless attack incidents and improved detection capabilities
Frequently Asked Questions
Technical Questions
Q: Why is fileless execution particularly dangerous?
A: It evades traditional file-based detection methods, leaves minimal forensic artifacts, and can bypass many security controls that rely on file scanning.
Q: How does PowerShell exclusion mechanism work?
A: The script uses Add-MpPreference to add exclusions for the entire C: drive and specific processes, effectively blinding Microsoft Defender to all subsequent activity.
Q: What makes the .png disguise effective?
A: Many security tools and network monitoring systems may not inspect files with image extensions as closely as executable files, allowing the PowerShell script to bypass initial filters.
Business Questions
Q: What are the regulatory implications of security control disabling?
A: Significant - disabling security controls can be considered willful negligence and may impact compliance with various security frameworks and regulations.
Q: Should we rebuild or patch compromised systems?
A: REBUILD is strongly recommended due to the sophistication of fileless attacks and the potential for additional hidden compromise mechanisms.
Q: How can we prevent similar fileless attacks?
A: Implement PowerShell logging, application control, endpoint detection with fileless execution capabilities, and user education on malicious scripts.
IOCs
Detections
License
© 2025 Joseph. All rights reserved.
Free to read, but reuse requires written permission.