1/ #QuasarRAT 🐀 was observed being delivered via #OneNote. Shoutout to @dr4k0nia for helping me with deobfuscating the "injector" ✏️ and showing me some .NET dark arts.
@dr4k0nia 3/ The cab file extracts and executes new.vbs file (MD5: f7e7099eea0cc25fc49d04cd53c573a1), which retrieves the PowerShell script from hxxps://transfer[.]sh/get/MHXbtP/ss.ps1 (404 now) but you can still grab the script from VT (MD5: 970aca768e68faa580f758a1a379686b)
@dr4k0nia 4/
The PS script contains the .NET payload that comes with QuasarRAT and the injector.
The VBS file is 300 MB and contains a lot of garbage data. My laptop CPU couldn't handle me scrolling down to find the right thing, so a bit of a struggle there 😄