Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

DoorMe (Exploit Kit) – Malware

September 5, 2024
Reading Time: 2 mins read
in Malware
DoorMe (Exploit Kit) – Malware

DoorMe

Type of Malware

Exploit Kit

Targeted Countries

China

Targeted Countries

India
Brazil
United States
Russia
Taiwan
Japan

Date of Initial Activity

2022

Associated Groups

ChamelGang

Motivation

Espionage
Financial Gain
Cyberwarfare

Attack Vectors

Supply Chain
Phishing

Targeted Systems

Windows

Overview

DoorMe is a sophisticated and evasive remote access Trojan (RAT) designed to provide threat actors with extensive control over compromised systems. Leveraging a multi-layered approach to conceal its presence, DoorMe employs advanced obfuscation techniques and encrypted communications to evade detection and analysis. Once deployed, it establishes a persistent foothold by modifying system configurations and using covert channels to exfiltrate sensitive data. DoorMe’s versatility allows it to perform a range of malicious activities, including keylogging, credential theft, and remote command execution, making it a formidable tool in the arsenal of cybercriminals targeting both individuals and organizations.

Targets

Information Public Administration Manufacturing Health Care and Social Assistance Retail Trade Accommodation and Food Services

How they operate

Upon execution, DoorMe employs several methods to ensure persistence and evade detection. One of its primary techniques involves leveraging the Command and Scripting Interpreter, such as PowerShell, to execute its commands and scripts. The malware is often disguised using obfuscation techniques, making its detection and analysis more challenging. Additionally, DoorMe can modify system processes or registry run keys to maintain its presence even after a system reboot, which helps it establish a long-term foothold. Privilege escalation is another critical aspect of DoorMe’s operation. The malware frequently exploits known vulnerabilities or performs credential dumping to gain higher-level permissions on the infected system. By obtaining elevated privileges, DoorMe can access sensitive areas of the system and gather valuable information, such as credentials and system configurations, furthering its control over the compromised environment. DoorMe’s command and control (C2) operations are designed to facilitate communication between the malware and its operators. It often utilizes web services for C2 communications, allowing it to send and receive instructions covertly. The malware can stage data for exfiltration, transferring valuable information back to the attackers. This exfiltration is often conducted over secure C2 channels or alternative protocols to avoid detection. In terms of impact, DoorMe has the capability to cause significant disruption. It can delete or corrupt data, which impacts the integrity and availability of critical information. Moreover, it may perform system information discovery to gather intelligence on the infected network, aiding in further attacks or data theft.

MITRE Tactics and Techniques

Initial Access:
Phishing: T1566 Exploitation of Public-Facing Application: T1190
Execution:
Command and Scripting Interpreter: T1059 PowerShell: T1059.001
Persistence:
Registry Run Keys / Startup Folder: T1547.001 Create or Modify System Process: T1543.003
Privilege Escalation:
Exploitation for Privilege Escalation: T1068 Credential Dumping: T1003
Defense Evasion:
Obfuscated Files or Information: T1027 Software Packing: T1045
Credential Access:
Keylogging: T1056.001 Credential Dumping: T1003 Command and Control (C2): Command and Control Over Web Service: T1102 Data Staged: T1074
Exfiltration:
Exfiltration Over C2 Channel: T1041 Exfiltration Over Alternative Protocol: T1048
Impact:
Data Destruction: T1485 System Information Discovery: T1082
References
  • Update to the REF2924 intrusion set and related campaigns
Tags: DoorMeExploit KitMalwarePowerShellRATRemote Access TrojanTrojan
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

Winos 4.0 Malware Hits Taiwan Via Tax Phish

New Amatera Stealer Delivered By ClearFake

New Godfather Trojan Hijacks Banking Apps

Fake Minecraft Mods On GitHub Spread Malware

Fake Invoices Deliver Sorillus RAT In Europe

Russian Phishing Scam Bypasses Google 2FA

Subscribe to our newsletter

    Latest Incidents

    Massive Leak Exposes 16 Billion Credentials

    Tonga Health System Down After Ransomware

    Chinese Spies Target Satellite Giant Viasat

    German Dealer Leymann Hacked Closes Stores

    Hacker Mints $27M From Meta Pool Gets 132K

    UBS and Pictet Hit By Vendor Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial