Help
  • FAQ
    browse most common questions
  • Live Chat
    talk with our online service
  • Email
    contact your dedicated sales:
0

Security Analysis of Query and SMS Bombing

Author : AIVON March 02, 2026

Content

 

Theoretical background

1. Malware classification

1.1 Remote-control trojans: can remotely control infected hosts to perform monitoring, file operations, network attacks, and other functions.

1.2 Password-stealing trojans: steal passwords or account information by logging keystrokes or capturing screenshots.

1.3 Phishing trojans: impersonate bank or e-commerce sites to trick users into revealing sensitive information.

1.4 Ransomware: encrypts user files and demands payment for decryption.

1.5 Downloader trojans: download other malicious software onto the infected host, such as adware.

2. Remote-access trojans

These can provide interactive access to target machines (real-time or non-real-time), accept commands to trigger malicious functions, and collect various data from the target. Interaction is bidirectional between the attacker and the controlled host.

3. Threat intelligence IOCs

IOCs are often domains, IPs, or URLs (sometimes SSL certificates, hashes, etc.). These IOCs can be distributed to security devices such as NGFW, IPS, and SIEM for detection, alerting, or real-time blocking. IOC feeds normally include severity, threat actor, malware family, and contextual data to help prioritize incidents and guide response activities. A common use is using IOC feeds to detect compromised internal hosts via log analysis.

4. DarkComet

DarkComet is a remote-access trojan (RAT) developed by Jean-Pierre Lesueur (aka DarkCoderSc). It began spreading in early 2012 and has been used in many targeted attacks. It can capture webcam images or screenshots, record audio via a connected microphone, and gain full control of infected machines.

5. DarkComet main capabilities

Remote control, user-behavior monitoring, installing a SYSTEM-level backdoor for attackers, stealing and exfiltrating user information, and downloading additional malware.

 

Basic analysis

The sample file is not large and is not digitally signed.

Static analysis shows the sample was developed in Delphi. Delphi remains present in some legacy internal tools and systems, so its use suggests older development environments.

Analysis also shows the sample does not depend on third-party DLL modules, so most functionality is implemented within the malicious EXE itself.

Static analysis has limited visibility into runtime behavior, so next we perform dynamic analysis on the EXE sample.

 

Dynamic analysis

1. Hidden startup

When the malicious sample is executed, it first renames the original program to ._cache_[original].exe and sets that file as hidden, then runs the infected EXE. The ._cache_ file is the original, uninfected program.

2. Dropping files

After startup, the sample creates folders at specified paths and drops its payload files into those folders.

3. Setting persistence

The sample writes application information to the registry path HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run to achieve autostart behavior.

4. Launching helper programs

The sample executes a BAT file which starts three application components.

The main application claims to query QQ-related information and to perform SMS-bombing against specified phone numbers.

5. Query and SMS-bombing features

QQ-related queries are implemented by calling QQ-related APIs to fetch information.

The SMS-bombing function cycles a configured list of domains and repeatedly attempts to register users with a target phone number on those domains to trigger mass SMS messages.

 

Function analysis

1. Infection mechanism

The sample searches the Desktop, Downloads, and Documents directories for EXE files. It checks whether those EXEs contain EXEVSNX or EXERESX sections; if present, it infects those applications for propagation.

2. Setting hidden attributes

It calls the system API SetFileAttributesA to set files as hidden. If the hidden attribute is enabled, the application will not be visible unless hidden files are shown.

Setting hidden attributes

3. Environment data collection

The malware collects system and hardware information from the infected computer and uploads it to its command-and-control servers.

4. Keylogging

It installs a keyboard hook via SetWindowsHookExA to monitor keystrokes and upload captured input.

Keylogging

 

5. Email exfiltration

The sample uses Delphi's built-in email library and sends mail through smtp.gmail.com to the address xredlinel@gmail.com.

Email exfiltration

 

IOCs

The domain xred.mooo.com was extracted from the sample and is classified as malicious.

3dc7e86e-45ff-11ee-a2ef-92fbcf53809c.png

One server IP found in the sample: 124.222.126.226, which is also recorded as a threat indicator.

 

Mitigation and recommendations

Practical security recommendations:

  1. Do not download or run applications from untrusted sources or social platforms.
  2. Install and keep antivirus/endpoint protection up to date with the latest signature feeds.
  3. Before running an installer, verify file size and digital signature and scan with antivirus tools.

Suggested remediation steps for infected systems (automation via antivirus tools or scripted remediation is recommended):

  1. Use updated antivirus/EDR tools to detect and remove infected applications and perform repair actions.
  2. Manually remove registry entries that set programs to autostart and terminate malicious processes if necessary.
  3. Manually inspect Desktop, Downloads, and Documents for EXE files. Use PE-section inspection tools to check for EXEVSNX or EXERESX sections; infected files should be removed. Alternatively, disable hidden-file filtering and search for files prefixed with ._cache_ to locate original saved binaries.

2026 AIVON.COM All Rights Reserved
Intellectual Property Rights | Terms of Service | Privacy Policy | Refund Policy