DarkComet RAT Malware Hidden Inside Fake Bitcoin Tool
Nov. 14, 2025, 12:46 p.m.
Description
A malware analysis reveals the reemergence of DarkComet RAT disguised as a Bitcoin-related application. The malware, packed with UPX to evade detection, is distributed as a RAR archive containing an executable file. Once unpacked, it installs itself as 'explorer.exe' in the user's AppData folder and creates a registry run key for persistence. The RAT's configuration shows its command and control server as 'kvejo991.ddns.net' on port 1604. It employs keylogging, storing captured keystrokes in a 'dclogs' folder. The malware's process behavior includes spawning multiple cmd.exe and conhost.exe processes, and injecting its payload into notepad.exe for stealth. Despite its age, DarkComet remains a potent threat, especially when combined with cryptocurrency lures.
Tags
Date
- Created: Nov. 14, 2025, 12:09 p.m.
- Published: Nov. 14, 2025, 12:09 p.m.
- Modified: Nov. 14, 2025, 12:46 p.m.
Indicators
- 5b5c276ea74e1086e4835221da50865f872fe20cfc5ea9aa6a909a0b0b9a0554
- 58c284e7bbeacb5e1f91596660d33d0407d138ae0be545f59027f8787da75eda
- 11bf1088d66bc3a63d16cc9334a05f214a25a47f39713400279e0823c97eb377
- http://kvejo991.ddns.net:1604
- kvejo991.ddns.net