Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

DarkComet RAT Malware Hidden Inside Fake Bitcoin Tool

0
Medium
Published: Fri Nov 14 2025 (11/14/2025, 12:09:29 UTC)
Source: AlienVault OTX General

Description

DarkComet RAT malware has resurfaced disguised as a fake Bitcoin-related tool, distributed via a RAR archive containing a UPX-packed executable. Upon execution, it installs itself as 'explorer. exe' in the user's AppData folder and establishes persistence through a registry run key. The malware communicates with its command and control server at kvejo991. ddns. net on port 1604. It performs keylogging, storing captured keystrokes in a dedicated folder, and uses process injection into notepad. exe to evade detection. The malware also spawns multiple cmd. exe and conhost.

AI-Powered Analysis

AILast updated: 11/14/2025, 12:46:42 UTC

Technical Analysis

The DarkComet Remote Access Trojan (RAT), an older but still effective malware strain, has reemerged in a new campaign disguised as a fake Bitcoin-related application. The malware is distributed as a RAR archive containing a UPX-packed executable file, a packing method used to evade signature-based detection by antivirus solutions. Once the executable is unpacked and run, it installs itself under the name 'explorer.exe' within the user's AppData directory, a common tactic to blend with legitimate Windows processes. To maintain persistence, it creates a registry run key, ensuring execution upon system startup. The RAT establishes command and control (C2) communication with a server hosted at 'kvejo991.ddns.net' on port 1604, allowing attackers to remotely control infected machines. Functionally, DarkComet performs keylogging by capturing keystrokes and storing them in a 'dclogs' folder, enabling theft of sensitive information such as credentials. For stealth, it injects its payload into the legitimate notepad.exe process and spawns multiple cmd.exe and conhost.exe processes, complicating detection and analysis. The use of cryptocurrency-themed social engineering lures increases the likelihood of user interaction and infection. Although no new exploits or vulnerabilities are leveraged, the malware’s persistence and data exfiltration capabilities pose significant risks. Indicators of compromise include multiple file hashes and the C2 domain and URL. The malware’s tactics align with MITRE ATT&CK techniques such as T1056.001 (Keylogging), T1566.001 (Phishing), T1204 (User Execution), T1041 (Exfiltration Over C2 Channel), T1547.001 (Registry Run Keys), T1027.002 (Packing), and T1071.001 (Application Layer Protocol).

Potential Impact

For European organizations, the DarkComet RAT poses a medium to high risk, particularly for entities involved in cryptocurrency trading, financial services, or those with employees susceptible to social engineering attacks involving Bitcoin. The malware’s keylogging capability threatens confidentiality by capturing sensitive credentials and personal data. Its persistence mechanisms and process injection techniques can lead to prolonged undetected access, enabling attackers to conduct espionage, data theft, or further network compromise. The spawning of multiple system processes may degrade system performance and complicate incident response. Additionally, the malware’s C2 communications could facilitate lateral movement or deployment of additional payloads. Given the widespread interest and investment in cryptocurrency across Europe, users may be more likely to fall victim to such lures, increasing infection rates. The threat also undermines trust in digital financial tools and may cause reputational damage if breaches become public. While the malware itself does not exploit zero-day vulnerabilities, its effective evasion and persistence tactics can result in significant operational disruption and data loss if not promptly detected and remediated.

Mitigation Recommendations

European organizations should implement layered defenses tailored to this threat. First, deploy advanced endpoint detection and response (EDR) solutions capable of unpacking UPX-packed executables and detecting process injection behaviors, especially targeting notepad.exe and suspicious spawning of cmd.exe and conhost.exe processes. Monitor and alert on creation or modification of registry run keys in user AppData contexts to detect persistence attempts. Network defenses should include blocking and monitoring DNS queries and HTTP traffic to suspicious dynamic DNS domains such as 'kvejo991.ddns.net' and associated IP addresses on non-standard ports like 1604. User awareness training must emphasize the risks of downloading and executing unverified cryptocurrency tools and attachments, highlighting social engineering tactics. Implement strict application whitelisting to prevent execution of unauthorized binaries from user directories. Regularly audit and restrict user privileges to limit malware installation capabilities. Employ behavioral analytics to detect anomalous keylogging activities and unusual process behaviors. Finally, maintain updated threat intelligence feeds to identify and block known file hashes associated with this malware. Incident response plans should be prepared to isolate infected hosts and perform forensic analysis promptly.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.pointwild.com/threat-intelligence/darkcomet-rat-malware-hidden-inside-fake-bitcoin-tool"]
Adversary
null
Pulse Id
69171bf900fb2aed178f3e3b
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash46bcf4e361cd251c958720e1198e3f0a
hashd74ca6016bdde3df525d7c7651747336
hashdbedd5e7481b84fc5fa82d21aa20106f
hash57ab0765c97b230c615b43ee4ebc28b674887121
hash87a2425098d257f4c0450a0cf56d0209963096d4
hashdc56a542e3db56f1c7132d3e99c960c09396cde3
hash11bf1088d66bc3a63d16cc9334a05f214a25a47f39713400279e0823c97eb377
hash58c284e7bbeacb5e1f91596660d33d0407d138ae0be545f59027f8787da75eda
hash5b5c276ea74e1086e4835221da50865f872fe20cfc5ea9aa6a909a0b0b9a0554

Url

ValueDescriptionCopy
urlhttp://kvejo991.ddns.net:1604

Domain

ValueDescriptionCopy
domainkvejo991.ddns.net

Threat ID: 69172119dd0733879bf23f8b

Added to database: 11/14/2025, 12:31:21 PM

Last enriched: 11/14/2025, 12:46:42 PM

Last updated: 11/15/2025, 6:17:02 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats