SADBRIDGE Loader Unveils GOSAR Backdoor in Recent Cyberattacks

Cyberattack Disrupts Online Services at Sarapu Town Hall

### #GolangMalware #GOSAR #REF3864

Summary: The emergence of GOSAR, a Golang-based variant of the QUASAR RAT, marks a significant evolution in malware development, particularly targeting Chinese-speaking regions. This new malware leverages advanced techniques for evasion and cross-platform functionality, enhancing its capabilities beyond its predecessor.

Threat Actor: REF3864 | REF3864
Victim: Chinese-speaking users | Chinese-speaking users

Key Point :

  • GOSAR is a Golang rewrite of the QUASAR RAT, discovered during investigations into campaigns using the SADBRIDGE loader.
  • The malware features advanced capabilities such as keylogging, clipboard monitoring, and Hidden VNC operations.
  • GOSAR targets both Windows and Linux systems, utilizing DLL side-loading and injection techniques for deployment.
  • Low detection rates are achieved through the use of Golang, complicating signature-based detection methods.
  • Attackers distribute malicious MSI installers via fake landing pages, mimicking legitimate software platforms.
  • Advanced evasion tactics include API patching, sandbox avoidance, and encryption of configurations and payloads.

Elastic Security Labs has revealed a significant evolution in malware development with the discovery of GOSAR, a Golang-based rewrite of the widely recognized QUASAR Remote Access Trojan (RAT). This newly developed variant surfaced during investigations into campaigns targeting Chinese-speaking regions, where attackers used SADBRIDGE, a custom malware loader, to deploy GOSAR backdoor.

GOSAR represents a strategic shift in malware development. Elastic reports: โ€œThis is our teamโ€™s first time observing a rewrite of QUASAR in the Golang programming language.โ€ The transition to Golang, a modern programming language, offers cross-platform capabilities, reduced detection rates, and added functionality.

The campaigns, attributed to threat group REF3864, focus on Chinese-speaking users. Attackers use malicious installers disguised as legitimate software, such as Telegram or Opera GX. A sophisticated loader leveraging DLL side-loading and injection techniques, SADBRIDGE deploys GOSAR while evading detection. GOSAR extends QUASARโ€™s functionality with features such as information gathering, keylogging, clipboard logging, and even Hidden VNC (HVNC) operations.

Elastic emphasizes the significance of this evolution: โ€œA rewrite in Golang might capitalize on institutional knowledge gained over [QUASARโ€™s] period of use, allowing for additional capabilities without extensive retraining of previously effective tactics, techniques, and procedures (TTPs).โ€

The Attack Chain

  1. Initial Access:
    • Malicious MSI installers are distributed through fake landing pages mimicking legitimate platforms like Telegram.
    • Once executed, these installers use DLL side-loading with SADBRIDGE to begin the infection.
  2. SADBRIDGE Execution:
    • SADBRIDGE leverages legitimate applications like x64dbg.exe to load malicious DLLs, executing encrypted payloads in memory.
    • Privilege escalation is achieved using techniques like UAC bypass and abuse of the Windows Task Scheduler.
  3. GOSAR Deployment:
    • GOSAR is injected into system processes like svchost.exe or dllhost.exe.
    • The malware communicates with command-and-control (C2) servers, collecting data and executing commands.

GOSAR backdoor builds on QUASARโ€™s core capabilities while introducing:

  • Cross-Platform Support: GOSAR targets both Windows and Linux systems, reflecting the flexibility of Golang.
  • Keylogging and Clipboard Monitoring: These services are initiated immediately upon connection to the C2.
  • Networking Enhancements: The malware adds firewall rules and configures HTTP listeners, signaling ongoing development.
  • Low Detection Rates: The use of Golang complicates signature-based detection. Elastic highlights: โ€œThis variant supports multiple platforms, including ELF binaries for Linux systems and traditional PE files for Windows. This cross-platform capability aligns with the adaptability of Go, making it more versatile than the original .NET-based QUASAR.โ€

SADBRIDGE and GOSAR employ several advanced evasion tactics:

  • API Patching: Disables Windows security mechanisms like AMSI and Event Tracing for Windows (ETW).
  • Sandbox Avoidance: Uses long Sleep API calls to thwart automated analysis.
  • Encryption and Obfuscation: Configurations and payloads are encrypted, ensuring stealth.

Elastic notes: โ€œThe generic lure websites, and lack of additional targeting information, or actions on the objective, leave us with insufficient evidence to identify attacker motivation(s).โ€ However, the transition to Golang and multi-platform targeting indicates a broader scope of potential victims and objectives.

Related Posts:

Source: https://securityonline.info/sadbridge-loader-unveils-gosar-backdoor-in-cyber-attacks