To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild
Title | To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Farinholt, B., Rezaeirad, M., Pearce, P., Dharmdasani, H., Yin, H., Blond, S. L., McCoy, D., Levchenko, K. |
Conference Name | 2017 IEEE Symposium on Security and Privacy (SP) |
Date Published | may |
ISBN Number | 978-1-5090-5533-3 |
Keywords | botnets, compositionality, darkcomet, DarkComet malware, Electronic mail, honeypot, human computer interaction, human operator interaction, interactive systems, invasive software, Metrics, Monitoring, pubcrawl, RAT, RAT malware, Rats, remote access trojan, remote access trojans, remote attackers interactive control, Resiliency, Tools, Trojan horses, Webcams |
Abstract | Remote Access Trojans (RATs) give remote attackers interactive control over a compromised machine. Unlike large-scale malware such as botnets, a RAT is controlled individually by a human operator interacting with the compromised machine remotely. The versatility of RATs makes them attractive to actors of all levels of sophistication: they've been used for espionage, information theft, voyeurism and extortion. Despite their increasing use, there are still major gaps in our understanding of RATs and their operators, including motives, intentions, procedures, and weak points where defenses might be most effective. In this work we study the use of DarkComet, a popular commercial RAT. We collected 19,109 samples of DarkComet malware found in the wild, and in the course of two, several-week-long experiments, ran as many samples as possible in our honeypot environment. By monitoring a sample's behavior in our system, we are able to reconstruct the sequence of operator actions, giving us a unique view into operator behavior. We report on the results of 2,747 interactive sessions captured in the course of the experiment. During these sessions operators frequently attempted to interact with victims via remote desktop, to capture video, audio, and keystrokes, and to exfiltrate files and credentials. To our knowledge, we are the first large-scale systematic study of RAT use. |
URL | https://ieeexplore.ieee.org/document/7958609 |
DOI | 10.1109/SP.2017.48 |
Citation Key | farinholt_catch_2017 |
- Monitoring
- Webcams
- Trojan horses
- tools
- Resiliency
- remote attackers interactive control
- remote access trojans
- remote access trojan
- Rats
- RAT malware
- RAT
- pubcrawl
- botnets
- Metrics
- invasive software
- interactive systems
- human operator interaction
- human computer interaction
- honeypot
- Electronic mail
- DarkComet malware
- darkcomet
- Compositionality