Visible to the public To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild

TitleTo Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild
Publication TypeConference Paper
Year of Publication2017
AuthorsFarinholt, B., Rezaeirad, M., Pearce, P., Dharmdasani, H., Yin, H., Blond, S. L., McCoy, D., Levchenko, K.
Conference Name2017 IEEE Symposium on Security and Privacy (SP)
Date Publishedmay
ISBN Number 978-1-5090-5533-3
Keywordsbotnets, compositionality, darkcomet, DarkComet malware, Electronic mail, honeypot, human computer interaction, human operator interaction, interactive systems, invasive software, Metrics, Monitoring, pubcrawl, RAT, RAT malware, Rats, remote access trojan, remote access trojans, remote attackers interactive control, Resiliency, Tools, Trojan horses, Webcams

Remote Access Trojans (RATs) give remote attackers interactive control over a compromised machine. Unlike large-scale malware such as botnets, a RAT is controlled individually by a human operator interacting with the compromised machine remotely. The versatility of RATs makes them attractive to actors of all levels of sophistication: they've been used for espionage, information theft, voyeurism and extortion. Despite their increasing use, there are still major gaps in our understanding of RATs and their operators, including motives, intentions, procedures, and weak points where defenses might be most effective. In this work we study the use of DarkComet, a popular commercial RAT. We collected 19,109 samples of DarkComet malware found in the wild, and in the course of two, several-week-long experiments, ran as many samples as possible in our honeypot environment. By monitoring a sample's behavior in our system, we are able to reconstruct the sequence of operator actions, giving us a unique view into operator behavior. We report on the results of 2,747 interactive sessions captured in the course of the experiment. During these sessions operators frequently attempted to interact with victims via remote desktop, to capture video, audio, and keystrokes, and to exfiltrate files and credentials. To our knowledge, we are the first large-scale systematic study of RAT use.

Citation Keyfarinholt_catch_2017