DarkComet RAT Malware Hidden Inside Fake Bitcoin Tool
DarkComet RAT malware has resurfaced disguised as a fake Bitcoin-related tool, distributed via a RAR archive containing a UPX-packed executable. Upon execution, it installs itself as 'explorer. exe' in the user's AppData folder and establishes persistence through a registry run key. The malware communicates with its command and control server at kvejo991. ddns. net on port 1604. It performs keylogging, storing captured keystrokes in a dedicated folder, and uses process injection into notepad. exe to evade detection. The malware also spawns multiple cmd. exe and conhost.
AI Analysis
Technical Summary
The DarkComet Remote Access Trojan (RAT), an older but still effective malware strain, has reemerged in a new campaign disguised as a fake Bitcoin-related application. The malware is distributed as a RAR archive containing a UPX-packed executable file, a packing method used to evade signature-based detection by antivirus solutions. Once the executable is unpacked and run, it installs itself under the name 'explorer.exe' within the user's AppData directory, a common tactic to blend with legitimate Windows processes. To maintain persistence, it creates a registry run key, ensuring execution upon system startup. The RAT establishes command and control (C2) communication with a server hosted at 'kvejo991.ddns.net' on port 1604, allowing attackers to remotely control infected machines. Functionally, DarkComet performs keylogging by capturing keystrokes and storing them in a 'dclogs' folder, enabling theft of sensitive information such as credentials. For stealth, it injects its payload into the legitimate notepad.exe process and spawns multiple cmd.exe and conhost.exe processes, complicating detection and analysis. The use of cryptocurrency-themed social engineering lures increases the likelihood of user interaction and infection. Although no new exploits or vulnerabilities are leveraged, the malware’s persistence and data exfiltration capabilities pose significant risks. Indicators of compromise include multiple file hashes and the C2 domain and URL. The malware’s tactics align with MITRE ATT&CK techniques such as T1056.001 (Keylogging), T1566.001 (Phishing), T1204 (User Execution), T1041 (Exfiltration Over C2 Channel), T1547.001 (Registry Run Keys), T1027.002 (Packing), and T1071.001 (Application Layer Protocol).
Potential Impact
For European organizations, the DarkComet RAT poses a medium to high risk, particularly for entities involved in cryptocurrency trading, financial services, or those with employees susceptible to social engineering attacks involving Bitcoin. The malware’s keylogging capability threatens confidentiality by capturing sensitive credentials and personal data. Its persistence mechanisms and process injection techniques can lead to prolonged undetected access, enabling attackers to conduct espionage, data theft, or further network compromise. The spawning of multiple system processes may degrade system performance and complicate incident response. Additionally, the malware’s C2 communications could facilitate lateral movement or deployment of additional payloads. Given the widespread interest and investment in cryptocurrency across Europe, users may be more likely to fall victim to such lures, increasing infection rates. The threat also undermines trust in digital financial tools and may cause reputational damage if breaches become public. While the malware itself does not exploit zero-day vulnerabilities, its effective evasion and persistence tactics can result in significant operational disruption and data loss if not promptly detected and remediated.
Mitigation Recommendations
European organizations should implement layered defenses tailored to this threat. First, deploy advanced endpoint detection and response (EDR) solutions capable of unpacking UPX-packed executables and detecting process injection behaviors, especially targeting notepad.exe and suspicious spawning of cmd.exe and conhost.exe processes. Monitor and alert on creation or modification of registry run keys in user AppData contexts to detect persistence attempts. Network defenses should include blocking and monitoring DNS queries and HTTP traffic to suspicious dynamic DNS domains such as 'kvejo991.ddns.net' and associated IP addresses on non-standard ports like 1604. User awareness training must emphasize the risks of downloading and executing unverified cryptocurrency tools and attachments, highlighting social engineering tactics. Implement strict application whitelisting to prevent execution of unauthorized binaries from user directories. Regularly audit and restrict user privileges to limit malware installation capabilities. Employ behavioral analytics to detect anomalous keylogging activities and unusual process behaviors. Finally, maintain updated threat intelligence feeds to identify and block known file hashes associated with this malware. Incident response plans should be prepared to isolate infected hosts and perform forensic analysis promptly.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Switzerland
Indicators of Compromise
- hash: 46bcf4e361cd251c958720e1198e3f0a
- hash: d74ca6016bdde3df525d7c7651747336
- hash: dbedd5e7481b84fc5fa82d21aa20106f
- hash: 57ab0765c97b230c615b43ee4ebc28b674887121
- hash: 87a2425098d257f4c0450a0cf56d0209963096d4
- hash: dc56a542e3db56f1c7132d3e99c960c09396cde3
- hash: 11bf1088d66bc3a63d16cc9334a05f214a25a47f39713400279e0823c97eb377
- hash: 58c284e7bbeacb5e1f91596660d33d0407d138ae0be545f59027f8787da75eda
- hash: 5b5c276ea74e1086e4835221da50865f872fe20cfc5ea9aa6a909a0b0b9a0554
- url: http://kvejo991.ddns.net:1604
- domain: kvejo991.ddns.net
DarkComet RAT Malware Hidden Inside Fake Bitcoin Tool
Description
DarkComet RAT malware has resurfaced disguised as a fake Bitcoin-related tool, distributed via a RAR archive containing a UPX-packed executable. Upon execution, it installs itself as 'explorer. exe' in the user's AppData folder and establishes persistence through a registry run key. The malware communicates with its command and control server at kvejo991. ddns. net on port 1604. It performs keylogging, storing captured keystrokes in a dedicated folder, and uses process injection into notepad. exe to evade detection. The malware also spawns multiple cmd. exe and conhost.
AI-Powered Analysis
Technical Analysis
The DarkComet Remote Access Trojan (RAT), an older but still effective malware strain, has reemerged in a new campaign disguised as a fake Bitcoin-related application. The malware is distributed as a RAR archive containing a UPX-packed executable file, a packing method used to evade signature-based detection by antivirus solutions. Once the executable is unpacked and run, it installs itself under the name 'explorer.exe' within the user's AppData directory, a common tactic to blend with legitimate Windows processes. To maintain persistence, it creates a registry run key, ensuring execution upon system startup. The RAT establishes command and control (C2) communication with a server hosted at 'kvejo991.ddns.net' on port 1604, allowing attackers to remotely control infected machines. Functionally, DarkComet performs keylogging by capturing keystrokes and storing them in a 'dclogs' folder, enabling theft of sensitive information such as credentials. For stealth, it injects its payload into the legitimate notepad.exe process and spawns multiple cmd.exe and conhost.exe processes, complicating detection and analysis. The use of cryptocurrency-themed social engineering lures increases the likelihood of user interaction and infection. Although no new exploits or vulnerabilities are leveraged, the malware’s persistence and data exfiltration capabilities pose significant risks. Indicators of compromise include multiple file hashes and the C2 domain and URL. The malware’s tactics align with MITRE ATT&CK techniques such as T1056.001 (Keylogging), T1566.001 (Phishing), T1204 (User Execution), T1041 (Exfiltration Over C2 Channel), T1547.001 (Registry Run Keys), T1027.002 (Packing), and T1071.001 (Application Layer Protocol).
Potential Impact
For European organizations, the DarkComet RAT poses a medium to high risk, particularly for entities involved in cryptocurrency trading, financial services, or those with employees susceptible to social engineering attacks involving Bitcoin. The malware’s keylogging capability threatens confidentiality by capturing sensitive credentials and personal data. Its persistence mechanisms and process injection techniques can lead to prolonged undetected access, enabling attackers to conduct espionage, data theft, or further network compromise. The spawning of multiple system processes may degrade system performance and complicate incident response. Additionally, the malware’s C2 communications could facilitate lateral movement or deployment of additional payloads. Given the widespread interest and investment in cryptocurrency across Europe, users may be more likely to fall victim to such lures, increasing infection rates. The threat also undermines trust in digital financial tools and may cause reputational damage if breaches become public. While the malware itself does not exploit zero-day vulnerabilities, its effective evasion and persistence tactics can result in significant operational disruption and data loss if not promptly detected and remediated.
Mitigation Recommendations
European organizations should implement layered defenses tailored to this threat. First, deploy advanced endpoint detection and response (EDR) solutions capable of unpacking UPX-packed executables and detecting process injection behaviors, especially targeting notepad.exe and suspicious spawning of cmd.exe and conhost.exe processes. Monitor and alert on creation or modification of registry run keys in user AppData contexts to detect persistence attempts. Network defenses should include blocking and monitoring DNS queries and HTTP traffic to suspicious dynamic DNS domains such as 'kvejo991.ddns.net' and associated IP addresses on non-standard ports like 1604. User awareness training must emphasize the risks of downloading and executing unverified cryptocurrency tools and attachments, highlighting social engineering tactics. Implement strict application whitelisting to prevent execution of unauthorized binaries from user directories. Regularly audit and restrict user privileges to limit malware installation capabilities. Employ behavioral analytics to detect anomalous keylogging activities and unusual process behaviors. Finally, maintain updated threat intelligence feeds to identify and block known file hashes associated with this malware. Incident response plans should be prepared to isolate infected hosts and perform forensic analysis promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.pointwild.com/threat-intelligence/darkcomet-rat-malware-hidden-inside-fake-bitcoin-tool"]
- Adversary
- null
- Pulse Id
- 69171bf900fb2aed178f3e3b
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash46bcf4e361cd251c958720e1198e3f0a | — | |
hashd74ca6016bdde3df525d7c7651747336 | — | |
hashdbedd5e7481b84fc5fa82d21aa20106f | — | |
hash57ab0765c97b230c615b43ee4ebc28b674887121 | — | |
hash87a2425098d257f4c0450a0cf56d0209963096d4 | — | |
hashdc56a542e3db56f1c7132d3e99c960c09396cde3 | — | |
hash11bf1088d66bc3a63d16cc9334a05f214a25a47f39713400279e0823c97eb377 | — | |
hash58c284e7bbeacb5e1f91596660d33d0407d138ae0be545f59027f8787da75eda | — | |
hash5b5c276ea74e1086e4835221da50865f872fe20cfc5ea9aa6a909a0b0b9a0554 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://kvejo991.ddns.net:1604 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainkvejo991.ddns.net | — |
Threat ID: 69172119dd0733879bf23f8b
Added to database: 11/14/2025, 12:31:21 PM
Last enriched: 11/14/2025, 12:46:42 PM
Last updated: 11/15/2025, 6:17:02 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
New Security Tools Target Growing macOS Threats
MediumThreatFox IOCs for 2025-11-14
MediumOperation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown
MediumNorth Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
MediumNovaStealer - Apple Intelligence is leaving a plist.. it is legit, right?
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.