DarkComet RAT Malware Hidden Inside Fake Bitcoin Tool

Nov. 14, 2025, 12:46 p.m.

Description

A malware analysis reveals the reemergence of DarkComet RAT disguised as a Bitcoin-related application. The malware, packed with UPX to evade detection, is distributed as a RAR archive containing an executable file. Once unpacked, it installs itself as 'explorer.exe' in the user's AppData folder and creates a registry run key for persistence. The RAT's configuration shows its command and control server as 'kvejo991.ddns.net' on port 1604. It employs keylogging, storing captured keystrokes in a 'dclogs' folder. The malware's process behavior includes spawning multiple cmd.exe and conhost.exe processes, and injecting its payload into notepad.exe for stealth. Despite its age, DarkComet remains a potent threat, especially when combined with cryptocurrency lures.

Date

  • Created: Nov. 14, 2025, 12:09 p.m.
  • Published: Nov. 14, 2025, 12:09 p.m.
  • Modified: Nov. 14, 2025, 12:46 p.m.

Indicators

  • 5b5c276ea74e1086e4835221da50865f872fe20cfc5ea9aa6a909a0b0b9a0554
  • 58c284e7bbeacb5e1f91596660d33d0407d138ae0be545f59027f8787da75eda
  • 11bf1088d66bc3a63d16cc9334a05f214a25a47f39713400279e0823c97eb377
  • http://kvejo991.ddns.net:1604
  • kvejo991.ddns.net

Attack Patterns