To Catch a Ratter: Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild Brown Farinholt , Mohammad Rezaeirad , Paul Pearce § , Hitesh Dharmdasani , Haikuo Yin Stevens Le Blond , Damon McCoy †† , Kirill Levchenko University of California, San Diego George Mason University § University of California, Berkeley Informant Networks EPFL and MPI-SWS †† New York University Abstract—Remote Access Trojans (RATs) give remote attack- ers interactive control over a compromised machine. Unlike large- scale malware such as botnets, a RAT is controlled individually by a human operator interacting with the compromised machine remotely. The versatility of RATs makes them attractive to actors of all levels of sophistication: they’ve been used for espionage, information theft, voyeurism and extortion. Despite their increas- ing use, there are still major gaps in our understanding of RATs and their operators, including motives, intentions, procedures, and weak points where defenses might be most effective. In this work we study the use of DarkComet, a popular commercial RAT. We collected 19,109 samples of DarkComet malware found in the wild, and in the course of two, several- week-long experiments, ran as many samples as possible in our honeypot environment. By monitoring a sample’s behavior in our system, we are able to reconstruct the sequence of operator actions, giving us a unique view into operator behavior. We report on the results of 2,747 interactive sessions captured in the course of the experiment. During these sessions operators frequently attempted to interact with victims via remote desktop, to capture video, audio, and keystrokes, and to exfiltrate files and credentials. To our knowledge, we are the first large-scale systematic study of RAT use. I. I NTRODUCTION Recent events indicate that malware usage has started to shift from large-scale threats like botnets to lower-volume threats designed to spy on specific users or systems (e.g. [10], [20], [35], [51]). In a botnet, each machine is an indistinguishable bundle of resources. Though imposing in size, the use of botnets was banal—spamming, click fraud, and the like. Low-volume threats, on the other hand, aim to extract something of greater value from each infection. In this regime, the preferred tool for exploiting individual infections is a RAT (Remote Access Trojan or Remote Administration Tool), malware that gives a human user interactive remote access to an infected machine. Because of their great flexibility, RATs have been used by a broad range of actors. For example, intelligence agencies and governments use RATs to spy on dissidents, journalists, and other governments [10], [35], [51]; while voyeurs use these tools to spy on victims, collecting pictures stored on the computer, capturing live webcam images, and recording audio [17], [20]. The latter’s intentions range from pure voyeurism to extortion and blackmail, with victims from celebrities like Miss Teen USA [20] to countless unnamed users worldwide. The subject of this work is the behavior of amateur RAT operators in newly infected machines. Though use of RATs is well documented, knowledge of how they are used by these actors is limited. Indeed, studying RATs presents its unique challenges. The first of these is procuring fresh malware samples that are still in operation. In practice, low-volume malware typically does not have the same broad distribution as, say, a botnet executable. An attacker often infects the intended victims by sending them an email message with a malicious attachment or luring them to a Web page that exploits a browser vulnerability. To obtain such samples, researchers must obtain them from victims or a vantage point between attackers and victims, and before they cease operating. We obtain our samples from VirusTotal [24], an online virus scanner. VirusTotal is often used to check a suspicious file or URL received via email, social media, etc., and thus provides a unique vantage point for studying low-volume malware. For example, recent related work leveraged VirusTotal to measure and analyze malicious documents employed in targeted attacks against two ethnic groups and 12 countries spanning three continents [32]. In this work, we show that we can rely on VirusTotal to collect fresh RAT samples and leverage con- trollers’ aliveness to monitor them while they are in operation. The second challenge in studying RATs is monitoring what the attacker does when connected. Attackers expect a successful infection to give them access to a victim’s computer. Preliminary experiments showed that executing a RAT in a typical VM used to study malware may lure the attacker to connect, but will quickly give away the setup when examined more closely. To elicit natural behavior, we disguised our machines as real users’ PCs, suitably personalized, though not linked to a real user. Finally, we need to capture the activity of the RAT operators to reliably reconstruct their behaviors. In this work, we obtained 19,109 samples of DarkComet, a popular RAT used by threat actors of all levels of sophisti- cation. In most cases, our sample was the result of running a dropper executable that may have been dropped itself. Based on the primary infection vectors, at least some of the instances appear to be genuine attempts to infect a victim. We took each sample we obtained, ran it in a Cuckoo sandbox [25], and recorded all commands issued to the RAT by the controller. We then used the data collected to reconstruct the behavior of the operator in our system and carry out our analysis. 2017 IEEE Symposium on Security and Privacy © 2017, Brown Farinholt. Under license to IEEE. DOI 10.1109/SP.2017.48 770