• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Malware   »   DarkComet Surfaced in the Targeted Attacks in Syrian Conflict

DarkComet Surfaced in the Targeted Attacks in Syrian Conflict

  • Posted on:February 23, 2012 at 7:24 pm
  • Posted in:Malware
  • Author:
    Kevin Stevens and Nart Villeneuve (Senior Threat Researchers)
4

The Internet has played a significant role in the current conflict in Syria. The opposition has made increasing use of platforms such as Facebook to organize and spread their message. In response, supporters of the regime like the “Syrian Electronic Army” have sought to disrupt these activities by defacing websites and spamming Facebook pages. Recently, this conflict took on a new dimension with reports that suggested targeted malware attacks were being used against supporters of the Syrian opposition movement.

Dark Comet RAT Used as “Syrian Spyware”

The malware used in the attacks reportedly spreads through Skype chats. Once users execute the malware, it connects to a C&C (command and control) server in Syria at {BLOCKED}.{BLOCKED}.0.28, which belongs to an IP range assigned to the Syrian Telecommunications Establishment. While the malware has been described as “complex” and “invisible”, it turns out that it is the widely available Remote Access Trojan (RAT) known as Dark Comet.

In our analysis, which confirms an earlier investigation by Telecomix, we found that the samples connecting to {BLOCKED}.{BLOCKED}.0.28 are instances of the DarkComet RAT versions 3.3 and 5. However, some samples are “downloaders” that connect to this same IP address via HTTP and download a encrypted “Update.bin” file, which is then decrypted and executed. The payload is the actual DarkComet RAT.

DarkComet is a full featured RAT that has the ability to take pictures via webcam, listen in on conversations via a microphone attached to a PC, and gain full control of the infected machine. But the features attracting most people using this RAT are the keylogging and file transfer functionality. This way, an attacker can load any files onto the infected machine or even steal documents.

DarkComet is still being developed and version 5 was released last January 15. It is created by a coder using the handle DarkCoderSc and was first coded in 2008. Since the reports of its use in connection with events in Syria, the author of DarkComet has expressed regret and while he will continue developing the RAT, he plans to make a DarkComet detector/remover available to the Syrian people.

Sample 1: Direct DarkComet download

The malware bearing a Facebook icon mentioned in the CNN article was reportedly distributed through Skype chats. This sample, which Trend Micro detects as BKDR_ZAPCHAST.SG, is DarkComet 5 and connects to {BLOCKED}.{BLOCKED}.0.28 on port 885. During our tests, we redirected the traffic from our test machine to another machine on which we were running the DarkComet 5 client. As you can see, we were able to obtain full control over our test machine.

Sample 2: DarkComet as second-stage malware

Another sample we have obtained behaves differently. The initial executable, which is detected by Trend Micro as BKDR_BREUT.A, drops two executable files. The first file is displayed to the compromised user as a Mac Address Changer tool.

This appears to be a simple decoy because while this is displayed, the second executable then connects to {BLOCKED}.6{BLOCKED}.0.28 over HTTP and downloads another file.

This is actually an earlier version of DarkComet (version 3.3), which connects to {BLOCKED}.{BLOCKED}.0.28 on port 778. Again, we redirected the network traffic from our test machine to another test machine running DarkComet 3.3 and we gained full control over the compromised machine.

To date, we have analyzed 10 samples that connect to the same IP address and display this type of functionality. While some are “downloaders” that display various decoy images (instead of the Mac Address Changer, see analysis of other samples here), the ultimate payload in these attacks is either DarkComet RAT version 3.3 or version 5.

These developments illustrate that targeted attacks can be conducted with widely available DIY malware tools. These tools possess all the “complex” functionality attackers need to compromise their targets.

Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Recent Posts

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits
  • August Patch Tuesday Fixes Critical IE, Important Windows Vulnerabilities Exploited in the Wild
  • Water Nue Phishing Campaign Targets C-Suite’s Office 365 Accounts

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.