Posted in

DarkComet RAT Disguised as Bitcoin Apps Targets Crypto Users

As cryptocurrency continues to grow in popularity, cybercriminals are aggressively shifting their tactics to exploit enthusiasts searching for new tools, wallets, and mining apps. One of the latest threats involves attackers disguising the DarkComet remote access trojan (RAT) as Bitcoin-related software—tricking unwary users into installing a highly dangerous piece of malware.

Security researchers at Point Wild recently uncovered a malicious campaign where DarkComet was bundled inside fake cryptocurrency utilities. Despite being an older malware strain, DarkComet remains powerful, flexible, and effective—especially when paired with modern social engineering techniques.


A Classic RAT Resurfaces With a Cryptocurrency Twist

DarkComet RAT, though discontinued years ago, still thrives in underground cybercrime communities. It provides attackers with a full suite of surveillance and control capabilities, including:

  • Keystroke logging (keylogging)
  • File theft and exfiltration
  • Webcam and microphone spying
  • Remote desktop access
  • System manipulation and command execution

For cryptocurrency users, these capabilities pose extreme danger—stolen keystrokes or screenshots can expose private wallet keys, exchange credentials, seed phrases, or two-factor authentication codes.


The Malware Is Delivered as a Fake Bitcoin Wallet

Researchers found that the rogue file was distributed as a RAR archive, falsely labeled as:

“94k BTC wallet.exe”

This tactic provides several advantages for attackers:

  • Helps bypass email filters
  • Decreases antivirus detection
  • Appears legitimate to users searching for Bitcoin tools
  • Adds an extra step (extraction), increasing trust

The executable inside was packed using UPX (Ultimate Packer for Executables), a known technique for evading detection by compressing and obfuscating the malware’s internal code structure.

Once executed, the file does not launch any type of cryptocurrency function. Instead, it immediately deploys the full DarkComet RAT payload.


Technical Breakdown: Persistence, Injection, and C2 Activity

1. Persistence Mechanism

Upon execution, the malware copies itself to:

%AppData%\Roaming\MSDCSC\explorer.exe

It then creates a Windows registry entry at:

HKCU\Software\Microsoft\Windows\CurrentVersion\Run

This ensures DarkComet launches automatically at every system startup, maintaining long-term access.


2. UPX Packing and Hidden Structure

Inside the RAR archive, the executable displayed classic UPX packing. After unpacking, analysts found standard PE file sections such as:

  • .text
  • .data
  • .idata

These are commonly seen in trojans built for stealth and modularity.


3. Embedded Configuration and Mutex

The sample’s configuration file contains critical operational data, including the mutex:

DC_MUTEX-ARULYYD

This prevents multiple malware instances from running simultaneously on the same system.


4. Command-and-Control (C2) Communication

Network monitoring showed repeated attempts to connect to the attacker-controlled C2 server:

kvejo991.ddns.net
TCP port 1604

Although the server appeared offline during analysis, these persistent outbound requests clearly indicated DarkComet’s beaconing behavior.


5. Process Injection for Stealth

To avoid detection, the malware injects its malicious components into legitimate Windows processes such as:

notepad.exe

From there, it performs keylogging, screen capturing, and file manipulation.

Captured keystrokes are logged into files resembling:

“2025-10-29-4.dc”

These logs are later exfiltrated to the attacker’s server.


Known File Hashes for Detection

Compressed RAR Archive (SHA256):
11bf1088d66bc3a63d16cc9334a05f214a25a47f39713400279e0823c97eb377

Packed Executable (SHA256):
5b5c276ea74e1086e4835221da50865f872fe20cfc5ea9aa6a909a0b0b9a0554

Security tools and threat intelligence platforms can use these hashes to identify the malicious files and block infection attempts.


How Users Can Protect Themselves

Cryptocurrency users are high-value targets for cybercriminals. To stay safe:

✔ Avoid downloading Bitcoin tools from unknown websites

Use official wallet apps, trusted exchanges, and reputable crypto software only.

✔ Keep security software updated

Modern antivirus platforms can detect DarkComet variants—if they’re up to date.

✔ Treat “too good to be true” crypto tools as suspicious

Anything offering massive Bitcoin returns or exclusive wallets is a red flag.

✔ Disable macros and block unknown executables

Basic system hygiene can prevent trojans from launching.

✔ Watch for unusual system behavior

Unexpected pop-ups, slow performance, or unknown processes can indicate an infection.


Final Thoughts

This malware campaign highlights a growing trend: old threats repackaged with new lures. Cybercriminals understand the value of cryptocurrency and are exploiting user curiosity, greed, and inexperience to deploy powerful remote-access trojans like DarkComet.

As crypto adoption expands, so does the need for cybersecurity awareness. Only download tools from trusted sources—and stay alert for suspicious files disguised as Bitcoin apps.

Leave a Reply

Your email address will not be published. Required fields are marked *