Available

Velociraptor Malware Analysis – Threat Hunting QuasarRAT

Velociraptor Malware Analysis – Threat Hunting QuasarRAT

Velociraptor Malware Analysis – Threat Hunting QuasarRAT

Personal Research Project

2025

Dynamic Malware Analysis and Persistence Detection

  1. Project Overview


This project focused on detecting and analyzing QuasarRAT, a remote access trojan, in a controlled home lab environment. The goal was to use Velociraptor DFIR to identify persistence mechanisms, indicators of compromise (IoCs), and command-and-control (C2) activity. I set up an isolated lab with a Windows endpoint, a Velociraptor server, and supporting tools to emulate real-world conditions safely.

Please View the Full Project Here:

nguye340.github.io/velociraptor-endpoint-detection-report-QuasarRAT-infection/


  1. Approach


I deployed Velociraptor agents on the Windows VM and configured a Velociraptor server to collect endpoint artifacts. To trigger malicious activity, I introduced a QuasarRAT sample and used INetSim to simulate internet services, allowing the malware to attempt communication with a fake C2 server. Wireshark was used to capture and analyze network traffic, while Velociraptor focused on endpoint-level artifacts such as persistence entries, registry changes, and process execution.


  1. Challenges and Solutions


One challenge was that QuasarRAT would not exhibit its full behavior without internet connectivity. To solve this, I integrated INetSim to safely emulate external services, which allowed the malware to perform beaconing as if it were online. Another difficulty was correlating endpoint artifacts with network traffic. I addressed this by running Velociraptor queries in parallel with Wireshark captures, which made it possible to confirm that persistence changes aligned with observed C2 beaconing.


  1. Key Findings


- Identified persistence mechanisms used by QuasarRAT, including registry-based autoruns.

- Observed and documented network beaconing patterns consistent with RAT communication attempts.

- Extracted IoCs such as process names, registry keys, and C2 traffic signatures.

- Confirmed Velociraptor’s effectiveness in collecting forensic artifacts that complemented network-level analysis.


  1. Outcome


The project demonstrated how Velociraptor can be used alongside supporting tools to detect and analyze advanced threats in a safe environment. I successfully documented IoCs, persistence behaviors, and network activity of QuasarRAT, producing a structured report that could guide future detection and response workflows. This project strengthened my practical skills in DFIR, threat hunting, and lab-based malware analysis, while also highlighting the importance of correlating endpoint and network data during investigations.



Let's Connect!

Let's Connect!

Let's Connect!

© Copyright 2023. All rights Reserved.

Made by

© Copyright 2023. All rights Reserved.

Made by

Available for Work

Available for Work