Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

DoorMe (Exploit Kit) – Malware

September 5, 2024
Reading Time: 2 mins read
in Malware
DoorMe (Exploit Kit) – Malware

DoorMe

Type of Malware

Exploit Kit

Targeted Countries

China

Targeted Countries

India
Brazil
United States
Russia
Taiwan
Japan

Date of Initial Activity

2022

Associated Groups

ChamelGang

Motivation

Espionage
Financial Gain
Cyberwarfare

Attack Vectors

Supply Chain
Phishing

Targeted Systems

Windows

Overview

DoorMe is a sophisticated and evasive remote access Trojan (RAT) designed to provide threat actors with extensive control over compromised systems. Leveraging a multi-layered approach to conceal its presence, DoorMe employs advanced obfuscation techniques and encrypted communications to evade detection and analysis. Once deployed, it establishes a persistent foothold by modifying system configurations and using covert channels to exfiltrate sensitive data. DoorMe’s versatility allows it to perform a range of malicious activities, including keylogging, credential theft, and remote command execution, making it a formidable tool in the arsenal of cybercriminals targeting both individuals and organizations.

Targets

Information Public Administration Manufacturing Health Care and Social Assistance Retail Trade Accommodation and Food Services

How they operate

Upon execution, DoorMe employs several methods to ensure persistence and evade detection. One of its primary techniques involves leveraging the Command and Scripting Interpreter, such as PowerShell, to execute its commands and scripts. The malware is often disguised using obfuscation techniques, making its detection and analysis more challenging. Additionally, DoorMe can modify system processes or registry run keys to maintain its presence even after a system reboot, which helps it establish a long-term foothold. Privilege escalation is another critical aspect of DoorMe’s operation. The malware frequently exploits known vulnerabilities or performs credential dumping to gain higher-level permissions on the infected system. By obtaining elevated privileges, DoorMe can access sensitive areas of the system and gather valuable information, such as credentials and system configurations, furthering its control over the compromised environment. DoorMe’s command and control (C2) operations are designed to facilitate communication between the malware and its operators. It often utilizes web services for C2 communications, allowing it to send and receive instructions covertly. The malware can stage data for exfiltration, transferring valuable information back to the attackers. This exfiltration is often conducted over secure C2 channels or alternative protocols to avoid detection. In terms of impact, DoorMe has the capability to cause significant disruption. It can delete or corrupt data, which impacts the integrity and availability of critical information. Moreover, it may perform system information discovery to gather intelligence on the infected network, aiding in further attacks or data theft.

MITRE Tactics and Techniques

Initial Access:
Phishing: T1566 Exploitation of Public-Facing Application: T1190
Execution:
Command and Scripting Interpreter: T1059 PowerShell: T1059.001
Persistence:
Registry Run Keys / Startup Folder: T1547.001 Create or Modify System Process: T1543.003
Privilege Escalation:
Exploitation for Privilege Escalation: T1068 Credential Dumping: T1003
Defense Evasion:
Obfuscated Files or Information: T1027 Software Packing: T1045
Credential Access:
Keylogging: T1056.001 Credential Dumping: T1003 Command and Control (C2): Command and Control Over Web Service: T1102 Data Staged: T1074
Exfiltration:
Exfiltration Over C2 Channel: T1041 Exfiltration Over Alternative Protocol: T1048
Impact:
Data Destruction: T1485 System Information Discovery: T1082
References
  • Update to the REF2924 intrusion set and related campaigns
Tags: DoorMeExploit KitMalwarePowerShellRATRemote Access TrojanTrojan
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

New Ransomware BERT Targets ESXi Systems

NordDragonScan Malware Steals Windows Data

AMOS Mac Stealer Adds Persistent Backdoor

APT36 Targets Indian Defense Linux Systems

hpingbot Botnet Uses Pastebin C2 Channel

Hackers Abuse Driver Signing For Malware

Subscribe to our newsletter

    Latest Incidents

    French Chip Firm Semco Hacked During IPO

    Louis Vuitton Korea Hit By Cyberattack

    Virginia School District Hit By Cyberattack

    Ransomware Attack Causes Outage at Ingram

    Call of Duty Players Hacked on Game Pass

    RansomHub Claims Theft of Coppell City Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial