Deep#Door malware uses Python backdoor to steal passwords, cloud tokens and SSH keys


Security researchers have detailed a new Windows malware framework called Deep#Door that combines a Python-based backdoor with broad credential theft and surveillance features.

The malware uses an obfuscated batch script to deploy an embedded Python payload. This design helps it reduce external downloads, hide activity, and keep its attack chain compact.

Once active, Deep#Door can steal browser passwords, cloud credentials, SSH keys, Wi-Fi credentials, clipboard data, screenshots, webcam images, microphone recordings, and system information.

What is Deep#Door?

Deep#Door is a Python-based remote access trojan analyzed by Securonix Threat Research. It targets Windows systems and gives attackers persistent remote control after the initial script runs.

The infection starts with a batch file named install_obf.bat. The script disables security controls, extracts an embedded Python payload named svc.py, and prepares the system for long-term access.

Securonix said the malware does not appear to be part of a large public campaign at this stage. Current evidence suggests limited or targeted use, but the framework could be adapted by other attackers.

At a glance

CategoryDetails
Malware nameDeep#Door
PlatformWindows
Main languagePython
Initial loaderObfuscated batch script
Observed loader nameinstall_obf.bat
Embedded payloadsvc.py
C2 methodbore.pub TCP tunneling service
Main risksCredential theft, surveillance, remote access, persistence, and lateral movement

How the attack starts

The attack begins when a victim runs the malicious batch file. Securonix assessed that the file may be delivered through common methods such as phishing, although the full distribution method remains unclear.

Unlike many loaders, Deep#Door does not need to fetch its main backdoor from an external server. The Python implant is already embedded inside the batch file.

The loader reads its own contents, extracts the hidden payload, writes it to the system, and executes it. This self-contained method can reduce network indicators during the early stage of infection.

Why the embedded Python payload matters

Embedding the implant inside the loader gives attackers a smaller and quieter delivery chain. Security tools may miss the attack if they only look for executable downloads or suspicious remote payload retrieval.

Python also gives the malware flexibility. Attackers can add functions, run commands, collect data, and perform surveillance without relying on a traditional compiled Windows executable.

This makes Deep#Door part of a wider trend where attackers use scripts, interpreted languages, and trusted system components to blend into normal activity.

Deep#Door capabilities

  • Remote command execution
  • Reverse shell access
  • System reconnaissance
  • Keylogging
  • Clipboard monitoring
  • Screenshot capture
  • Webcam capture
  • Microphone recording
  • Browser credential theft
  • Cloud credential theft
  • SSH key extraction
  • Windows Credential Manager access

How Deep#Door stays on a system

Deep#Door uses several persistence methods so it can survive reboots and cleanup attempts. It creates Startup folder scripts, Registry Run entries, scheduled tasks, and optional WMI event subscriptions.

The malware also includes watchdog behavior. If a persistence mechanism gets removed, the implant can recreate it, making full remediation harder for security teams.

This matters because removing the visible script or killing one process may not end the compromise. Defenders need to inspect all persistence locations and verify that the malware cannot restart.

How it weakens Windows defenses

Before and during deployment, Deep#Door tampers with several Windows security and logging features. Securonix reported activity linked to Windows Defender tampering, SmartScreen bypass, PowerShell logging suppression, event log clearing, and firewall logging changes.

Process flow (Source – Securonix)

The malware also uses anti-analysis checks, including sandbox, debugger, and virtual machine detection. These checks help it avoid running in research environments.

Deep#Door further uses AMSI and ETW patching, ntdll unhooking, command-line wiping, and timestamp changes. These techniques can reduce visibility for endpoint tools and make forensic analysis more difficult.

Defense evasion techniques

TechniquePurpose
AMSI patchingReduces script inspection by Windows security controls.
ETW patchingLimits telemetry that defenders use for detection.
ntdll unhookingAttempts to remove security tool hooks from system functions.
SmartScreen bypassWeakens Windows download and execution warnings.
Event log clearingRemoves evidence of execution and system changes.
Command-line wipingHides runtime arguments from security tools and investigators.

Credential theft is the biggest risk

Deep#Door targets data that attackers can reuse after the malware is removed. That includes browser credentials, cloud tokens, SSH keys, Wi-Fi credentials, and Windows Credential Manager entries.

Browser-stored passwords can give attackers access to email, admin portals, cloud dashboards, developer tools, and internal services. Cloud tokens can create an even bigger risk if they allow direct access to AWS, Azure, or Google Cloud resources.

SSH keys are also dangerous because they may unlock remote servers without a password. If attackers steal them, they can move deeper into infrastructure and maintain access through legitimate authentication.

What data Deep#Door targets

Data typeWhy attackers want it
Browser passwordsThey can unlock personal, business, and admin accounts.
Browser cookiesThey may help attackers reuse active sessions.
Cloud credentialsThey can expose cloud consoles, storage, workloads, and secrets.
SSH keysThey can give attackers direct access to servers.
Wi-Fi credentialsThey can help with local network access and future intrusion attempts.
Clipboard dataIt may contain copied passwords, tokens, commands, or documents.

Public tunneling makes C2 harder to spot

Deep#Door communicates through bore.pub, a public TCP tunneling service. This lets attackers reach compromised systems without exposing a dedicated command-and-control server.

Using a public tunneling service can help malicious traffic blend with legitimate traffic. It can also make infrastructure takedown harder because the attacker does not need to maintain a normal C2 host.

Securonix recommends monitoring for unusual TCP connections across dynamic port ranges, especially repeated attempts around ports 41234 through 41243.

Why defenders should take it seriously

Deep#Door combines several high-impact capabilities in one framework. It can persist, steal credentials, monitor users, execute commands, and weaken host telemetry.

The malware also creates risk after the infected machine is cleaned. Stolen cloud tokens, passwords, browser sessions, and SSH keys may continue to give attackers access unless organizations rotate them.

That means response teams should treat a Deep#Door infection as an identity and infrastructure incident, not only as a malware cleanup task.

What organizations should do now

  • Block or closely monitor script files from email, shared links, and untrusted downloads.
  • Investigate suspicious .BAT, .CMD, PowerShell, and Python execution.
  • Enable PowerShell Script Block Logging and command-line process logging.
  • Monitor Startup folders, Registry Run keys, scheduled tasks, and WMI event subscriptions.
  • Watch for Python execution from unusual locations such as local app data folders.
  • Alert on Defender tampering, AMSI patching, ETW patching, and event log clearing.
  • Monitor outbound traffic to tunneling services such as bore.pub.
  • Rotate browser passwords, cloud tokens, SSH keys, and Wi-Fi credentials after suspected compromise.
  • Use endpoint detection tools that can flag behavior, not only known file hashes.

FAQ

What is Deep#Door?

Deep#Door is a Python-based Windows backdoor and credential stealer analyzed by Securonix Threat Research. It can persist on a system, run attacker commands, monitor users, and steal sensitive credentials.

How does Deep#Door infect a system?

The infection starts when a user runs an obfuscated batch script. The script extracts an embedded Python payload and sets up persistence on the Windows machine.

What credentials can Deep#Door steal?

Deep#Door can target browser passwords, browser cookies, cloud credentials, SSH keys, Wi-Fi credentials, and Windows Credential Manager data.

Does Deep#Door use a normal command-and-control server?

It uses bore.pub, a public TCP tunneling service, to support remote access. This can make its traffic harder to separate from legitimate tunneling activity.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages