DEEP # DOOR: the back door in Python that operates in memory, avoids forensic signals and uses bore.pub for C2

Published 4 min de lectura 134 reading

Cybersecurity researchers have documented a Python-based back door frame that deserves attention for its combination of sigil, persistence and spying range: known in reports as DEEP # DOOR, is installed from a dropper in batch that deactivates security controls and takes out a payload in time of execution Python embedded, which drastically reduces the classic engagement signals on disk.

The technique of embed the implant into the installation script and reconstruct it in memory is important because it turns the attack into a low-profile operation: less calls to external infrastructure and fewer artifacts that defenders can analyze after the fact. The Python component provides complete capabilities of Remote Access Trojan, including remote execution, key capture, clipboard monitoring, screenshots, access to webcam and microphone, and theft of browser credentials, SSH keys and credentials in public clouds such as AWS, GCP and Azure.

DEEP # DOOR: the back door in Python that operates in memory, avoids forensic signals and uses bore.pub for C2
Image generated with IA.

Another element that increases the risk is the use of public tunelization services (in this case it is communicated with bore.pub) for the control and control channel, which allows the operator to avoid the need for its own infrastructure and to have the malicious traffic mixed with legitimate traffic. At the same time, malware implements multiple persistence mechanisms - Start folder, Registry Run keys, programmed tasks and WMI subscriptions - and even a "watch dog" mechanism that recites artifacts if they are deleted, complicating the remediation.

DEEP # DOOR also incorporates a wide range of avoidance and anti-analysis techniques: detection of sandboxes and virtual machines, AMSI and ETW patching, NTDLL unhook, Microsoft Defender handling, SmartScreen bypass, PowerShell looms suppression, deleted from the command and track history of timstamps and records. These measures seek reduce forensic visibility and make it difficult to detect by traditional solutions and by incident response teams.

The implications for organizations and professionals are clear: these types of frameworks reinforce the trend towards "fileless" or script-based intrusions that exploit native system components and languages interpreted as Python, which forces the defenses to be adapted beyond simple file scanning. It is recommended to map these techniques against reference frameworks such as MITRE ATT & CK to prioritize effective detections and mitigation; this resource can be consulted at https: / / attack.mitre.org /.

DEEP # DOOR: the back door in Python that operates in memory, avoids forensic signals and uses bore.pub for C2
Image generated with IA.

In terms of concrete measures, it is essential to force mechanisms to limit the execution of unmanaged scripts and binary (AppLocker or Windows Defender Application Control), to enable and protect anti-tampering functions in endpoint products (for example, the Microsoft Defender Handling Protection available at Microsoft documentation), and set up a mandatory registration and telemetry for PowerShell and other interpreters to avoid the deletion of login. At the network level, controlling and blocking known tunelization services and restricting outflow by domain / port reduces the attacker's ability to establish C2.

If you suspect commitment, the response must assume persistent access and exfiltration of credentials: isolate the equipment, preserve volatile memory for analysis, review programmed tasks, Run keys, Start folder and any watchdog that recreates persistence; audit credentials repositories, SSH keys and cloud accounts and consider forced rotation of secrets and revocation of affected keys / credentials. In order to understand the scope of the intrusion and to tighten the position, it is appropriate to rely on IR specialists and EDR controls that detect hooking / unhooking techniques and telemetry handling.

DEEP # DOOR is a reminder that adversaries today prioritize evasion and operational resilience over exotic sophistication: the combination of osfussed scripts, regular interpreters and public routing services creates a practical and difficult threat to track. Effective defence requires applying classic principles - less privileges, network segmentation, visibility and execution control - but adapted to the modern picture of scripts-based threats, as well as integrating continuous monitoring and response supported by threat intelligence and good digital hygiene practices.

Coverage

Related

More news on the same subject.