Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeThreat LibraryMalware
DTrack

DTrack Malware

Published: 11/07/25

Written by: Monica Burgess

Glitch effectGlitch effect

DTrack is a sophisticated Remote Access Trojan (RAT) used for espionage and reconnaissance. Primarily attributed to the Lazarus Group, this nasty piece of spyware is designed to infiltrate networks, steal sensitive information, and provide attackers with long-term access. It targets a wide range of industries, collecting system information, browsing history, and keylogs to send back to its operators.

What is DTrack?

DTrack is a versatile Remote Access Trojan (RAT) built for stealthy intelligence gathering. Unlike ransomware that loudly announces its presence, DTrack works in the shadows. Its main job is to give attackers a backdoor into a compromised system, allowing them to execute commands, upload and download files, and monitor user activity without being detected. It functions as a spy, collecting everything from system configurations and network details to sensitive files, essentially mapping out the victim's digital environment for future attacks.


When was DTrack First Discovered?

DTrack was first identified and detailed by cybersecurity researchers in September 2019. Its discovery came after it was found targeting nuclear power plants and research centers in India, highlighting the serious nature of its espionage capabilities from the get-go.


Who Created DTrack?

The creation of DTrack is widely attributed to the Lazarus Group, a notorious state-sponsored advanced persistent threat (APT) actor linked to North Korea. This group is known for a string of high-profile cyberattacks, including the Sony Pictures hack and the WannaCry ransomware campaign. DTrack shares significant code similarities with other malware in Lazarus's toolkit, solidifying the connection.


What Does DTrack Target?

Initially, DTrack was aimed at high-value targets in India, including nuclear, atomic energy, and scientific research sectors. However, its operations have since expanded globally, with infections detected across Europe and Latin America. The malware doesn't discriminate by industry, as its primary goal is information gathering, making any organization with valuable data a potential target.


DTrack Distribution Method

DTrack typically spreads through social engineering tactics, often arriving as a payload disguised as a legitimate document or installer. Attackers use spear-phishing emails or trick employees into running malicious executables. Once inside, it can use its reconnaissance capabilities to identify and move to other systems within the network, spreading its reach.


Technical Analysis of DTrack Malware

DTrack is a multi-stage malware designed for persistence and evasion. After the initial infection, it drops several components onto the system and establishes a foothold. It masquerades as legitimate software, often using names of common programs to avoid suspicion.

The malware’s core function is to connect to a command-and-control (C2) server to receive instructions and exfiltrate data. It can perform a wide range of actions, including:

  • System Reconnaissance: Gathers detailed information about the host, such as OS version, network configuration, running processes, and installed programs.

  • File Operations: Can list directories, download files from the C2 server, and upload stolen files from the victim’s machine.

  • Keystroke Logging: Captures everything the user types, including passwords and sensitive communications.

  • Process Execution: Can execute arbitrary commands and run other malicious tools provided by the attacker.

To maintain persistence, DTrack often creates scheduled tasks or modifies registry keys to ensure it runs automatically every time the system starts.


Tactics, Techniques & Procedures (TTPs)

DTrack employs several techniques mapped to the MITRE ATT&CK framework:

  • T1566.001 - Phishing: Spearphishing Attachment: Initial access is often gained by tricking users into opening malicious attachments.

  • T1059.003 - Command and Scripting Interpreter: Windows Command Shell: Executes commands to carry out its objectives.

  • T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder: Establishes persistence by modifying the registry.

  • T1057 - Process Discovery: Enumerates running processes to understand the system environment and avoid detection.

  • T1082 - System Information Discovery: Collects comprehensive details about the infected host.

  • T1071.001 - Application Layer Protocol: Web Protocols: Communicates with its C2 server using standard HTTP/HTTPS protocols to blend in with normal network traffic.


Indicators of Compromise (IoCs)

Defenders should monitor for the following IoCs associated with DTrack:

  • File Hashes (SHA-256):

    • 6a6b23b882b8898c8a77bab147076f87498305f28f117f300d831518b66e3b56

    • e2363db745a33a1e1e9cb14c45585675f92289f6bf839a9572e90e1b6b24d785

    • f5a6f95a04c114d691f17e33550e5885287f4c5417cb3475f4227f27e5e3b522

  • File Paths: Look for suspicious executables in common directories like C:\ProgramData\ or %APPDATA%.

  • Network Traffic: Monitor for unusual HTTP POST requests to unknown or hardcoded IP addresses.

  • Scheduled Tasks: Check for newly created scheduled tasks that execute suspicious binaries or scripts.


Malware Guide

Our malware guide shows you how to shut down those infiltration paths before they ever become a crisis.

Read the Malware Guideright arrow

How to Know if You’re Infected with DTrack?

Because DTrack is designed to be stealthy, it often shows no obvious symptoms. However, potential signs of an infection include:

  • Unexplained network activity, especially data being sent to unusual external IPs.

  • Unexpected system slowdowns or crashes.

  • Antivirus or security software being mysteriously disabled.

  • Presence of suspicious files or newly created scheduled tasks.

The most reliable way to know if you’re infected is through a robust endpoint detection and response (EDR) solution that can spot the malware's subtle behaviors.


DTrack Removal Instructions

Removing DTrack manually is a complex process that can cause more harm if not done correctly. The malware embeds itself deep within the system, and simply deleting the main executable won't be enough.

  • Isolate the System: Disconnect the infected machine from the network immediately to prevent it from spreading or communicating with its C2 server.

  • Identify and Kill Malicious Processes: Use a process monitoring tool to find and terminate any processes related to DTrack.

  • Remove Persistence Mechanisms: Check scheduled tasks, registry run keys, and startup folders for any entries created by the malware and remove them.

  • Delete Malicious Files: Remove all files and directories associated with the infection.

Given the complexity, we strongly recommend using an automated solution. A powerful EDR tool or a managed security platform like Huntress can effectively detect and remediate the infection by identifying the root cause and removing all malicious artifacts.


Is DTrack Still Active?

Yes, DTrack is still active. Security researchers continue to observe new campaigns and variants of the malware. The Lazarus Group is known for continuously updating its tools to bypass modern defenses, meaning DTrack remains a persistent threat to organizations worldwide. Its focus on espionage ensures it will be part of the threat landscape for the foreseeable future.


Mitigation & Prevention Strategies

Protecting your organization from DTrack requires a multi-layered security approach. Let’s not make it easy for the attackers, okay?

  • Security Awareness Training: Since DTrack often starts with a phishing email, training your team to spot and report suspicious messages is your first line of defense.

  • Patch Management: Keep your operating systems and software up to date. Attackers often exploit known vulnerabilities to gain a foothold.

  • Enforce MFA: Implement multi-factor authentication on all critical accounts to make it harder for attackers to move laterally even if they steal credentials.

  • Network Monitoring: Continuously monitor network traffic for suspicious connections to known malicious domains or unusual data exfiltration patterns.

  • Managed Detection and Response (MDR): The best defense is a good offense. A 24/7 security operations center (SOC) can proactively hunt for threats like DTrack. Huntress combines powerful EDR technology with human threat hunters to detect and stop attackers before they can do serious damage.

DTrack FAQs

DTrack is a Remote Access Trojan (RAT) created by the Lazarus Group. It works by secretly infiltrating a system to steal information, execute commands, and give attackers persistent access. It acts as a spy, collecting system data, logging keystrokes, and uploading and downloading files, all while remaining hidden.

DTrack typically infects systems through social engineering, most often via spear-phishing emails containing malicious attachments. An unsuspecting user is tricked into opening a file that looks legitimate but actually installs the malware. Once inside, it can spread to other computers on the same network.

Yes, DTrack remains an active and dangerous threat. The Lazarus Group continuously updates its malware to evade detection, and new campaigns are regularly discovered by security researchers. Its focus on espionage makes it a persistent risk for organizations with valuable data.

Protecting against DTrack requires a layered security strategy. Key steps include comprehensive security awareness training to prevent phishing, diligent patch management, enforcing multi-factor authentication (MFA), and deploying a managed detection and response (MDR) solution like Huntress for 24/7 threat monitoring and remediation.

Glitch effectBlurry glitch effect

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy