Python-Based Loader Masquerading As OneDrive Utilities To Drop Multiple RATs

skywatcg-alert-2

  • ransom-4

    TLP-GREEN


Researchers discovered a phishing campaign dubbed MULTISTORM that deploys commodity malware such as Warzone RAT and QuasarRAT using a custom Python-based downloader.

The campaign relies on OneDrive to store the malicious software and hide network traffic from security analysts.

The malicious software collected and exfiltrated sensitive information to command-and-control servers.

SkyWatchSM Alert Legend

  • small-bell

    Warning

  • active-threat0-lt-green

    Active Threat

  • malware-lt-green

    Malware

  • ransome-lt-green

    Ransomware

  • warning-green

    Phishing

  • file-green

    Network/IOT

Glesec Information Sharing Protocol

GLESEC CYBER SECURITY INCIDENT REPORTS are in compliance with the U.S. Department of Homeland Security (DHS) Traffic-Light Protocol (TLP).

  • TLP-White

    Disclosure is Not Limited.

  • TLP-Green

    Limited Disclosure, Restricted Only to the Community.

  • TLP-Amber

    Limited Disclosure, restricted to the Participant's Organization.

  • TLP-Red

    Not for Disclosure, Restricted/ Classified - Only Shared with US DHS.

Discover Glesec.

Authority. Consistency.

Sign-up today for SkywatchSM Alerts.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.