ThiefQuest is a virus, data stealer, and wiper that presents itself as ransomware targeting macOS systems. ThiefQuest was first seen in 2020 distributed via trojanized pirated versions of popular macOS software on Russian forums sharing torrent links.[1] Even though ThiefQuest presents itself as ransomware, since the dynamically generated encryption key is never sent to the attacker it may be more appropriately thought of as a form of wiper malware.[2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1554 | 主机软件二进制文件妥协 |
ThiefQuest searches through the |
|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
ThiefQuest prepends a copy of itself to the beginning of an executable file while maintaining the name of the executable.[2][3] |
| Enterprise | T1543 | .001 | 创建或修改系统进程: Launch Agent |
ThiefQuest installs a launch item using an embedded encrypted launch agent property list template. The plist file is installed in the |
| .004 | 创建或修改系统进程: Launch Daemon |
When running with root privileges after a Launch Agent is installed, ThiefQuest installs a plist file to the |
||
| Enterprise | T1620 | 反射性代码加载 |
ThiefQuest uses various API functions such as |
|
| Enterprise | T1059 | .002 | 命令与脚本解释器: AppleScript |
ThiefQuest uses AppleScript's |
| Enterprise | T1562 | .001 | 妨碍防御: Disable or Modify Tools |
ThiefQuest uses the function |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
ThiefQuest uploads files via unencrypted HTTP. [2][3] |
| Enterprise | T1486 | 数据加密以实现影响 |
ThiefQuest encrypts a set of file extensions on a host, deletes the original files, and provides a ransom note with no contact information.[2] |
|
| Enterprise | T1106 | 本机API |
ThiefQuest uses various API to perform behaviors such as executing payloads and performing local enumeration.[2] |
|
| Enterprise | T1497 | .003 | 虚拟化/沙盒规避: Time Based Evasion |
ThiefQuest invokes |
| Enterprise | T1622 | 调试器规避 |
ThiefQuest uses a function named |
|
| Enterprise | T1518 | .001 | 软件发现: Security Software Discovery |
ThiefQuest uses the |
| Enterprise | T1105 | 输入工具传输 |
ThiefQuest can download and execute payloads in-memory or from disk.[2] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging |
ThiefQuest uses the |
| Enterprise | T1057 | 进程发现 |
ThiefQuest obtains a list of running processes using the function |
|
| Enterprise | T1041 | 通过C2信道渗出 |
ThiefQuest exfiltrates targeted file extensions in the |
|
| Enterprise | T1564 | .001 | 隐藏伪装: Hidden Files and Directories |
ThiefQuest hides a copy of itself in the user's |