The evolution of Dark Caracal tools: analysis of a campaign featuring Poco RAT

Authors:

Denis Kazakov
Cyberthreat Intelligence Specialist, Positive Technologies Expert Security Center

Sergey Samokhin
Junior Specialist of the Sophisticated Threat Research Group, Positive Technologies Expert Security Center

Summary

  • Dark Caracal has added a new weapon to its arsenal. Poco RAT extends a campaign that began in 2022, continuing its focus on Spanish-speaking targets in Latin America.
  • The group uses custom-built tools unavailable to other cybercriminals.
  • Dark Caracal uses a Bandook-based backdoor for mass distribution, while the original malware is reserved for select targets.
  • Dark Caracal sticks to familiar methods. Its attack chain has gone unchanged for years, still relying on legitimate services to deliver malicious payloads.

Introduction

In early 2024, analysts at the Positive Technologies Expert Security Center (PT ESC) discovered a malicious sample. The cybersecurity community named it Poco RAT after the POCO libraries in its C++ codebase. At the time of its discovery, the sample had not been linked to any known threat group.

The malware came loaded with a full suite of espionage features. It could upload files, capture screenshots, execute commands, and manipulate system processes.

Patterns in its tactics, techniques, and procedures linked it to a known player. Dark Caracal, the group behind Bandook, was a clear match. The dropper used in Poco RAT closely resembled Bandook's, reinforcing the connection

Detected attacks

Throughout 2024, PT ESC's cyber threat intelligence systems monitored a campaign deploying Poco RAT against corporate networks. The phishing emails and malicious attachments were written in Spanish, pointing to a clear focus on Spanish-speaking users. The attack chain is illustrated in the diagram below:

The Dark Caracal attack chain
Figure 1. The Dark Caracal attack chain

The victim receives an email claiming an outstanding invoice requires payment.

Phishing email with a PDF decoy
Figure 2. Phishing email with a PDF decoy

An analysis of the attached decoy documents identified the industries that attackers mimic to make their schemes more convincing.

Figure 3. Industries impersonated by decoy documents

The email attachment includes a decoy document, usually in PDF format, though HTML versions appear occasionally. It is designed to imitate documents from organizations in the targeted industries.

Tools such as Adobe Acrobat Pro DC and Canva are commonly used to create these files.

Metadata analysis has uncovered author and user names (PDF:Author), including "trabajo", Rene Perez, Keneddy Cedeño, and Mr. Pickles. Aside from "trabajo", which translates to "work" in Spanish, these names provide an easy way to identify decoy documents linked to the group.

Metadata of a decoy document
Figure 4. Metadata of a decoy document

Decoy documents often slip past antivirus detection. Their filenames mimic financial transaction records between the victim and the impersonated organization. Blurred or low-quality visuals are common, possibly to lure less experienced users into opening them.
Once opened, the file redirects the victim to a link that triggers the automatic download of a .rev archive from legitimate file-sharing services or cloud storage platforms. This approach makes it harder to detect and block the malware's source.

Files with the .rev extension are generated using WinRAR and were originally designed to reconstruct missing or corrupted volumes in multi-part archives. Threat actors repurpose them as stealthy payload containers, helping malware evade security detection.

Figure 5. Antivirus scan of the PDF decoy
Figure 5. Antivirus scan of the PDF decoy

Table 1. Examples of decoy document names

File nameTranslation
CONFIRMAR COMPROBANTE DE PAGO#00315.pdf Verify payment document
FACTURA Global Supply Services, C.A.pdfInvoice Global Supply Services, C.A
FACTURACION_DIGITALIZADA Industrias salineras c.a..pdfDigitized invoice of Industrias Salineras, c.a.
RETENCION FALTANTE DE ABRIL solimsa.pdfMissing deductions for April solimsa
Figure 6. Decoy document impersonating a file from the Venezuelan company Zoom
Figure 6. Decoy document impersonating a file from the Venezuelan company Zoom
Figure 7. Decoy document impersonating a file from the Venezuelan bank BBVA Provincial
Figure 7. Decoy document impersonating a file from the Venezuelan bank BBVA Provincial

The threat group distributes malicious .rev archives using several methods:

  • Cloud storage services such as Google Drive and Dropbox. Link-shortening services like bit.ly, is.gd, ja.cat, and Rebrandly are used to obfuscate URLs.
  • CDN storage solutions. Each attack uses a unique directory named after the impersonated organization or related documents. For example, a .rev archive labeled NUEVAFACTURA might be hosted at farmabienoctubre2024.b-cdn.net.

Inside these .rev archives, the dropper file mirrors the name of the decoy document, making it appear more legitimate to the victim.

Dropper: how Poco RAT slips through the cracks

Tucked inside the .rev archive, the dropper handles the heavy lifting. It launches Poco RAT while keeping a low profile, skipping the usual footprint by avoiding disk writes. This stealth-first approach makes it harder to catch. Built in Delphi, the dropper has stayed the same since its debut.

In 2024, they started tampering with executable metadata, swapping out copyright and product fields for names of well-known companies. Files that claim to be from Disney, Lockheed Martin, or Morgan Stanley might seem more trustworthy at a glance. The VersionInfo field became a social engineering tool, nudging victims into a false sense of security.

The most commonly impersonated industries include:

  • Technology companies—49%
  • Consulting firms—18%
  • Financial organizations—10%
  • Manufacturing enterprises—10%
  • Service sector organizations—7%
  • Retail companies—6%

Instead of launching Poco RAT the obvious way, the dropper injects it into a legitimate process (iexplore.exe and cttune.exe).

A close look at Bandook and Poco RAT droppers shows the same tricks at play. Both malware families use dynamic API resolution to make detection and debugging more difficult. The dropper deliberately accesses an invalid memory address, triggering an exception. The exception handler reroutes execution to a function already stored in the stack.

Control transfer to initialization function in Poco RAT dropper
Figure 8. Control transfer to initialization function in Poco RAT dropper
Control transfer to initialization function in Bandook dropper
Figure 9. Control transfer to initialization function in Bandook dropper

All embedded strings are encrypted with the Twofish algorithm and encoded in Base64. Each dropper build generates a unique encryption key, derived from a Ripemd-160 hash of a fixed string. An example of such a key:

VrKA9qz1ytZwY2sFxkQ0rE1FLrVW2T9fHYQeakW2rz9sLFxq4yGiCgA1KbFwZWfohs9Of.

The payload hidden in the resource section follows a similar process before execution, but with a separate decryption key.

Figure 10. Decryption of WinAPI functions in poco rat dropper
Figure 10. Decryption of WinAPI functions in poco rat dropper
Decryption of WinAPI Functions in Bandook Dropper
Figure 11. Decryption of WinAPI Functions in Bandook Dropper

Poco RAT in action

Poco RAT is a backdoor designed to give attackers full control over an infected system. It allows them to navigate the file system, execute OS commands, launch executable files, and take screenshots. Every analyzed Poco RAT build has been packed with UPX (Ultimate Packer for Executables), shrinking the average file size from 24 MB to 13 MB. The size increase comes from its use of POCO, an open-source C++ library set built for network and internet applications.

The malware keeps an eye on itself by running a separate monitoring thread. Its activity falls into two distinct states:

  • Checking time refers to monitoring how long the malware has been active, while collecting timestamps and assessing the system environment.
  • Disconnecting you now is the state in which the connection with the victim's system is severed. This could indicate that the malware is shutting down or trying to avoid detection.

Once deployed, Poco RAT determines which command and control (C2) server to connect to. After establishing a link, the server regularly pings the malware with heartbeat messages to maintain persistence. Poco RAT then pulls system information using standard WinAPI functions, gathering:

  • Username
  • Computer name
  • Windows OS version
  • Free disk space
  • Available physical memory (RAM)
  • Current system time

Before reporting back to its C2 server, the malware checks if it's running in a virtualized environment. It looks for VirtualBox by scanning the registry path SOFTWARE\Oracle\VirtualBox and probes port 0×5658, a telltale sign of VMware. If nothing raises red flags, it sends all collected data to the server.

The gathered information is packed into a structured buffer, separated by the delimiter @&). An example format looks like this:

N35*@&)username*@&)pc_name*@&)win_ver*@&)free_disk_space*@&)ram*@&)time*@&)

The table below outlines the full set of commands that Poco RAT can execute.

Table 2. Command list

IDDescription
T-01Send collected system data to the C2 server. This happens automatically when the malware starts.
T-02Retrieve and transmit the active window title to the C2 server.
T-03Download and execute an executable file on the compromised machine.
T-04Download a file to the compromised machine without executing it.
T-05Capture a screenshot and send it to the C2 server.
T-06Execute a command in cmd.exe and send the output to the C2 server.

Poco RAT does not come with a built-in persistence mechanism. Once initial reconnaissance is complete, the server likely issues a command to establish persistence, or attackers may use Poco RAT as a stepping stone to deploy the primary payload.

Network infrastructure analysis

An investigation into the campaign's network infrastructure uncovered the C2 servers communicating with the malware samples. Scanning results showed no open ports, active services, or linked domain names.

Table 3. C2 server activity

IP AddressFirst File Detection DateLast File Detection Date 
94.131.119.12624.01.202409.08.2024
185.216.68.12116.09.202411.11.2024
193.233.203.6313.11.202422.01.2025

Over the past year, analysis of malware samples interacting with these C2 servers has made it possible to track the threat group's movement from one server to the next.

Despite the absence of visible open ports, the malware establishes connections with C2 servers through specific ports:

  • 94.131.119.126 — 6541, 6542, 6543
  • 185.216.68.121 — 6212
  • 193.233.203.63 — 6215, 6211

Attack landscape

An analysis of Poco RAT uploads to public sandboxes highlights a clear regional focus. Most samples originated from Venezuela, the Dominican Republic, Colombia, and Chile. The high volume of activity in Latin America suggests that this campaign is specifically targeting the region.

Figure 12. Attack geography

Spain does not appear in the statistical data, but it remains a notable target in Poco RAT attacks. The connection is likely tied to language and business ties. Most affected countries are Spanish-speaking, and many Latin American service providers have headquarters in Spain.

For example, we identified decoy documents mimicking BBVA Provincial, a Venezuelan bank whose parent company, Banco Bilbao Vizcaya, is based in Spain. Corporate security solutions at these headquarters likely detect the malware and upload samples to public sandboxes, which could explain the high activity levels observed from Spain.

Who are Dark Caracal and what are they after

Dark Caracal has been in the cyber-mercenary business since 2012. It runs attacks for hire, going after government institutions, military organizations, activists, journalists, and commercial entities.

The group relies on Bandook, a remote access trojan that has seen multiple modifications over the years. It remains a flexible and effective tool for targeted operations. Unlike malware floating around underground forums, Bandook is off-limits to outsiders. Only Dark Caracal is known to use it.

A campaign linked to the group surfaced in 2023. It targeted Latin American countries, including Venezuela and the Dominican Republic. The operation followed a familiar pattern, continuing attacks that researchers had previously documented. In 2018, reports from EFF and Lookout exposed similar tactics.

Command-and-control server addresses linked to Dark Caracal are listed in the table below.

Table 4. Network infrastructure

IP AddressFirst File Detection DateLast File Detection Date
83.97.20.15317.02.202323.07.2023
45.67.34.21926.09.202320.11.2023
185.10.68.5205.07.202304.06.2024
77.91.100.23703.11.202323.02.2024
185.216.68.14306.02.202401.08.2024
194.48.248.7219.07.202426.09.2024

The network infrastructures behind Poco RAT and Bandook campaigns operated within the same Autonomous Systems (AS). This overlap reinforces the connection between the two malware families and their operators.

Table 5. AS overlap in campaigns

ASPoco RATBandook
200019, AlexHost SRL185.216.68.121, 193.233.203.63185.216.68.143, 194.48.248.72
44477, Stark Industries Ltd.94.131.119.12677.91.100.237, 45.67.34.219
Figure 13. Network activity of C2 servers in Bandook and Poco RAT campaigns
Figure 13. Network activity of C2 servers in Bandook and Poco RAT campaigns

The graph shows a clear pattern. As Bandook samples disappear, Poco RAT samples begin to surface, often using the same network infrastructure. The timing suggests more than just coincidence. Dark Caracal may have decided to swap out its old tool for something new.

Campaigns linked to Bandook and Poco RAT share a few signature traits. These include:

  • Blurred decoy documents and link-shortening services
  • Legitimate cloud storage services for payload distribution
  • A focus on Spanish-speaking countries in Latin America
  • Spanish-language content and financial transaction themes to make files look legitimate

Conclusion

Similarities in attack chains, malware functionality, and network infrastructure point to a clear conclusion. This campaign is a continuation of Dark Caracal's operations. The group appears to be adjusting its tactics to stay ahead of security measures.

Over an eight-month investigation from June 2024 to February 2025, researchers identified 483 malicious samples. This marks a sharp increase from the 355 Bandook samples detected between February 2023 and September 2024. The numbers suggest a shift in strategy, moving toward large-scale phishing campaigns powered by Poco RAT.

An analysis of decoy documents and impersonated industries reinforces another key takeaway. This isn't just about espionage. Financial motives are likely driving the campaign.

Detections

PT Sandbox

YARA rules

apt_win_ZZ_DarkCaracal__Dropper__Bandook

Behavioral rules (malware)

Trojan.Win32.Inject.a
Trojan.Win32.Generic.a
Trojan-Downloader.Win32.PocoRAT.n

Behavioral rules (suspicious)

Create.Process.Inject.ResumeThread
Write.Process.Inject.SetThreadContext

PT NAD

REMOTE [PTsecurity] PocoRAT checkin sid: 10011758
REMOTE [PTsecurity] Bandook sid: 10006891
REMOTE [PTsecurity] Bandook TCP CnC Beacon sid: 10002619
REMOTE [PTsecurity] Bandook CnC Beacon sid: 10004533

MaxPatrol SIEM

Run_Masquerading_Executable_File
Suspicious_Connection
Suspicious_Connection_After_Imageload
Suspicious_File_Creation_From_Messenger_Or_Mail
Malicious_Office_Document

MITRE ATT&CK MATRIX

IDTechniqueDescription
Resource Development
T1608.001Stage Capabilities: Upload MalwareDark Caracal uses legitimate cloud storage platforms, such as Dropbox, Amazon, and Google Drive, to store its malware.
T1583.003Acquire Infrastructure: Virtual Private ServerDark Caracal rents and configures a VPS-based command-and-control (C2) server running Windows with an RDP interface, hosted outside Latin America. Preferred providers include Stark Industries Solutions Ltd. and AlexHost SRL.
T1588.001Obtain Capabilities: MalwareDark Caracal uses a lightweight RAT based on Bandook. The group uses obfuscated PDF and HTML documents as bait to lure victims.
Initial Access
T1566.001Phishing: Spearphishing AttachmentDark Caracal sends phishing emails with lure documents containing links to download the malware.
Execution
T1204.002User Execution: Malicious FileThe group manipulates victims into launching Poco RAT by exploiting themes of financial obligations to an organization the group is impersonating.
T1059.003Command and Scripting Interpreter: Windows Command ShellPoco RAT uses the Windows command shell to execute remote commands.
Privilege Escalation
T1055Process InjectionDark Caracal injects malicious Poco RAT code into legitimate Windows processes, such as cttune.exe and iexplore.exe.
Defense Evasion
T1027.013Obfuscated Files or Information: Encrypted/Encoded FileDark Caracal encrypts Poco RAT using the Twofish algorithm.
T1027.002Obfuscated Files or Information: Software PackingDark Caracal uses UPX to pack Poco RAT.
T1055Process InjectionDark Caracal injects malicious code into legitimate Windows processes (cttune.exe and iexplore.exe).
Discovery
T1082System Information DiscoveryDark Caracal gathers detailed information about the infected system's operating system and hardware.
Command and Control
T1132.001Data Encoding: Standard EncodingDark Caracal exchanges encoded information about the infected system with the C2 server.
T1571Non-Standard PortDark Caracal uses non-standard network ports (6541, 6542, 6543, 6211, 6212, and 6215) on the C2 server to manage infected hosts and extract data.
T1665Hide InfrastructureDark Caracal uses URL shortening services, such as bit.ly, is.gd, ja.cat, and Rebrandly.

INDICATORS OF COMPROMISE

Network IoCs Poco RAT

IDPurpose
94.131.119.126C2 server
185.216.68.121C2 server
193.233.203.63C2 server

Network IoCs Bandook

IDPurpose
83.97.20.153C2 server
45.67.34.219C2 server
185.10.68.52C2 server
77.91.100.237C2 server
185.216.68.143C2 server
194.48.248.72C2 server

Poco RAT

MD5SHA-1SHA-256
a5073df86767ece0483da0316d66c15cd0661df945e8e36aa78472d4b60e181769a3f23b05bf7db7debfeb56702ef1b421a336d8431c3f7334187d2ccd6ba34816a3fd5a
2a0f523b9e52890105ec6fbccd207dcdf3a495225dc34cdeba579fb0152e4ccba2e0ad4208552f588eafceb0fa3117c99a0059fd06882a36cc162a01575926736d4a80eb
e0bf0aee954fd97457b28c9233253b0ace611811d9200613c1a1083e683faec5187a92800d6822c93cb78ad0d2ad34ba9057a6c9de8784f55caa6a8d8af77fed00f0da0a
ec8746a1412d1bd1013dfe51de4b9fd1f719b736ed6b3351d1846127afec8e0c68e54c1d0fe11d78990590652f4d0f3afba5670e030b8ab714db9083fd0a981e0f1f48f3
fea98ca977d35828e294b7b9cc55fea963b4d283eaf367122ce0dec9fc0e586e63ef0c780ffc7ae741bb90c7f8e442d89b985def9969ebf293442f751ab2e69f4df226a8
c41645cba3de5c25276650a2013cd32bd8021edcb42b6472dded45f7a028aff6dfe5aaa6121d941ba5a6ff8d99558e0919f49b926fbcd00e3007aad14ac85e799d55473c
8778b9430947c46f68043666a71a2214da3ea31e96fba64fcd840e930a99e705eb60c89b12e849ffba407d5db756879fd257c4b736eb4b6adac6320d2f1916d6a923fa46
d8ec2df77a01064244f376322ba5aaf1ce60069d5fdef4acced66e6fc049f351c465ee1e13306775fdf506b706693deccb44ec364fe04dbf3c471227c2439c2462e19080
bbfbd1ece4f4aa43d0c68a32d92b17e52ffdf164f6b8e2e403a86bd4d0f6260bf17fb1541786f16a50a4255df8aa32f2e21f2829b4f8aaba2ced3e4a7670846205b3ac70
32c6c0d29593810f69d7c52047e493734bf76e731d655f67c9e78a616cf8b21002a5340618ba3612b1f0dbd23f8ab39b2d096bab0ed3438b37932f473c787e24e57e8397

Bandook

MD5SHA1SHA256
a2ea38d11bde2a4483b86321960d63195240860d0db91bd8e13a150676a3ab1917312c5901e8536751080ea135c3ad7ae9187d06cdcccddfc89bc0d41ea4281eeb3e9fb4
e6f23ff5f55bcb05669732c6a519a75a6adc9cbcc5d3ce969d982f70728fd09ec3419a45032ff087debc175342e01a3bb205fbd7ab2e724babcb24cc4b66f1d8df783612
27fabcf160575efc9ff6b7c93b35edd01d1f21745a5ea01cc3387099caae111a3cb79e6b158255fa4a257953edf84323b4d7fef129ab55450919a66d6ce8bc9d78612230
8fe826ceee2242238f918e7bba5ba7e706813b2b554db0de2aa296d31f951fd0cccda7bb1e7d86f9ff5fd50aeeeb04040baad0ac0d84347d60e132458448096a758e9ace
a12d326845a96a03867b2b70ca8f12ee3b1264d2e156a09142847b6a18f70a3267c406e221ff46a6fc9173fcc147d7a5c603032c662c6c1f1b05c1bb1e30e20e168bb056
40776099cf9098a626bae58763a503f643fc1530db54c356831f4fd96b81c1548c6b1a05247b0725fc0935131537dd00eb454269f3dd5c8c94002448c7b3c27a9aafc75c
abe2aa641f49f924a8c5bed6915b33a6c02d9f23d6bf627b77e72cc55551aba15701945c26ee4581ec0d064a1296e8178b016249977a483fccb89dd55ab6634aac4faa0f
18d4b1fb0a643fa86e815a3464c48f658bddb48d29fb06b15a3314f2a1afc2839a22d5ce302c707321abc9eca4d14171a33c9c5207711d2a18acc81b31a40bb68d6bea99
5a21405b06a11ee03c24cc79ef910c3d388371ea56bd79813ef53152220d7c64396528ea3c099ec7363407c9fb742beca81f97ecca93807e0f4c7fe73e019a3ccedbd220
812267e367c58c04d7c4800aa0f64603dd75522dc6f64a9fa12723b8978cc682217056da3cc284cecc3a8513d8ba664f88c1164312c049822f9deb009fd0f63dd0c22801


 

Decoy documents

MD5SHA-1SHA-256
2ecada671f172d4142e66e40d6d70b1b2d30ce50578b95eed8feb093e0b8170a9d0b8994918309457c875042e044510966083575a1635e977f1baed76b4f35815d631da1
b179ead57646353b0460a578f206c9af256fca02ae02ffa70e6ea54e6cb43b877486ee6b0864b87a18356bbe93b2e10f1deee5d4b705fc824899d227ced25c96390b8a0d
5a4dd46d2eda27f97f88c2d4c57971144982c139f6627c991c426827088baf25f345ab9757358c9f7f38a9364884cdcc4919ec3f7c71f147e4329d72867f29f1828aac4e
26e11dfbfc87bed3a47099b0d4131868617d867fcf5919a33c7b402ea85c6dbc03075fc3e5ce11d9bdc7433f713a6f7bd1c05b0a98355ad8a9995e0b5349b10c9d0df1b1
a4a846ef5641949f1d6033537c719ffc6fc2f4194e65dc8e4a29e71ca87ba3960df60fbea6ac2fd5dc59f5300c930b3fd5ffd6ed6e4dc27a2707e0293d521c88de027d4b
f23043993fa2d4c4e4f04fb579c9745e859c391e2181034eadc4d07ac1a58b73e358432d8a0beec469a4373a2ebb4b21f013c33e3d2c539514462df5ff88dc8df9e87b3b
8daa10aa4ff65bb5e274a79df6aae004b4c0700a6d325c439ca48c570c6736f6b3fce308c8d20ae481f17de8606b92ab3170daea423081bf854d4b6957d7f2dd114a1f6a
f5297dde39cda6b8423131af8f9220bd11a892c4e2a67807ac161f9752a68f900dfb9b6a289757c325556561c88a3918f3cc04251dc1d2fe2dbfc24acf8e635da7982853
132a8a7c6a43ab61c6e9363f9c893905baa2a99c0d53241324505d435908acf9506774d6e5bc162807af900cf73a3f9a3e4cc1c5b10f774f44baa3632f4af6465c80c464
0c4f220e1c2fb895e0ca5cbdc17d202e605c4887f774e2f25d9601beea26ac383cd25293d633aeb1600c3d02bd21df94ee70fdf78d722e21df8d4ff473d24f7c84ea5c5a
Share this article:

Get in touch

Fill in the form and our specialists
will contact you shortly