Breaking

DarkWatchman malware is sneaky and hides in the Windows Registry

Technical Researchers from Prevailion have discovered a new malware called ‘DarkWatchman’ that is highly-capable of JavaScript RAT along with a C# keylogger. This new malware is used by Russian actors targeting Russian entities. This malware was first discovered in November and was distributed using phishing campaigns.

The Modus Operandi of DarkWarchman malware

The phishing emails contained a ZIP document which had an EXE file but impersonated as a text document. This EXE file can auto-install itself and deploy the RAT and Keylogger. Once the victim opens the ZIP document, a popup message will be shown, displaying ‘Unknown Format’, while the malware is silently installed in the background.

The JavaScript RAT file is only 32 kb in size and thus a very light weight malware. The DarkWatchman malware uses the binaries and scripts to execute the stealthy mode data transfer between its modules. The malware also uses the Windows Registry fileless storage mechanism for the keylogger. There will be a scheduled task created to initiate the RAT every time without storing the keylogger in the desk.  

DarkWatchmen malware executes a PowerShell Script which will execute the .NET CSC.exe command and deploys it into the memory.

The Prevailion researchers said the following regarding they Keylogger and RAT combo,

“The keylogger is distributed as obfuscated C# source code that is processed and stored in the registry as a Base64-encoded PowerShell command. When the RAT is launched, it executes this PowerShell script which, in turn, compiles the keylogger (using CSC) and executes it. The keylogger itself does not communicate with the C2 or write to disk. Instead, it writes its keylog to a registry key that it uses as a buffer. During its operation, the RAT scrapes and clears this buffer before transmitting the logged keystrokes to the C2 server.”

Also the registry is used more than just hiding the exe file by acting as a temporary location by holding the stolen information until its been exported to the C2. The DarkWatchman malware uses domain generation algorithms (DGA) to generate 500 domains everyday.

DarkWatchman malware comes with several threats,

  • Capable of loading DLL files
  • Execute commands
  • Execute EXE files
  • Execute WSH commands
  • Export files to C2 server
  • Remote control and update over RAT and Keylogger
  • DGA for C2 resilience
  • Overrides admin permissions by deleting shadow copies using vssadmin.exe

DarkWatchman Malware and the ransomware suspicion

Prevailion mentions that DarkWatchman malware could be orchestrated by ransomware operators as they may need a sneaky assistance for their bigger missions. Since DarkWatchman can load more payloads and be used for ransomware deployments as well. With DarkWatchman malware ransomware attacks could become more sophisticated and it will be challenging to narrow down the suspects unless they make the claim themselves.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 weeks ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 weeks ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

3 weeks ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

4 weeks ago

IAM Software: Top 5 IAM Solutions for Enterprise Security

Find the top 5 IAM software solutions, explore their features, and find the best tools…

4 weeks ago

Top 5 MDM Tools for 2024 – Best Mobile Device Management Software

MDM software is used to manage smartphones, tablets, laptops, kiosk devices and iPads and more.…

4 weeks ago