BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
28
Global rank
61 infographic chevron month
Month rank
52 infographic chevron week
Week rank
694
IOCs

DarkComet RAT is a malicious program designed to remotely control or administer a victim's computer, steal private data and spy on the victim.

RAT
Type
France
Origin
12 February, 2008
First seen
15 May, 2024
Last seen
Also known as
Breut
Fynloski
klovbot

How to analyze DarkComet RAT with ANY.RUN

RAT
Type
France
Origin
12 February, 2008
First seen
15 May, 2024
Last seen

IOCs

IP addresses
193.161.193.99
45.74.4.244
78.163.16.186
193.149.180.137
176.108.108.71
75.4.61.28
223.244.83.13
140.82.13.202
46.2.15.197
151.236.21.83
185.60.133.214
80.85.154.180
80.85.156.184
40.76.20.9
88.169.146.156
79.143.38.55
78.190.191.194
45.32.255.220
109.61.248.34
37.1.217.131
Hashes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4.tcp.eu.ngrok.io
0.tcp.eu.ngrok.io
6.tcp.eu.ngrok.io
5.tcp.eu.ngrok.io
7.tcp.eu.ngrok.io
myhackth.myftp.org
dgorijan20785.hopto.org
2.tcp.eu.ngrok.io
eu-central-7075.packetriot.net
4.tcp.ngrok.io
6.tcp.ngrok.io
212.ip.ply.gg
b7r.duckdns.org
positive-be.at.playit.gg
smath79.ddns.net
whatis79.ddns.net
chrisle79.ddns.net
bonding79.ddns.net
goodgt79.ddns.net
jacknop79.ddns.net
URLs
tcp://6.tcp.eu.ngrok.io:11380/
http://glaucogeraint.pagekite.me/
http://glaucogeraint.pagekite.me/favicon.ico
Last Seen at

Recent blog posts

post image
A Guide to ANY.RUN’s YARA Search 
watchers 83
comments 0
post image
Celebrate ANY.RUN’s 8th Birthday with Special...
watchers 116
comments 0
post image
How to Use Threat Intelligence Feeds
watchers 509
comments 0

What is DarkComet RAT?

DarkComet is a remote access trojan developed by Jean-Pierre Lesueur in 2008. According to him, the program was never intended to be used illegally. But it got viral in 2012 after the Syrian incident: the government used the RAT to spy and destroy the protestor’s network.

It’s a standard remote control malware – a hacker rules over the infected computer and gets access to the camera and microphone. That is why DarkComet serves as a tool to monitor victims’ actions, take screenshots, do key-logging, or steal credentials.

The malware has had several versions, and DarkComet 5.3.1 is still available in 2022.

Crooks try to make targets download and run the RAT using different social engineering techniques. And in some cases, attackers use DarkComet to deliver other malicious programs to the infected machine. Hackers may involve the victim machine in a botnet scheme, such as sending spam.

DarkComet malware analysis

ANY.RUN allows researchers to analyze DarkComet samples and monitor the malware’s activity in real-time using an interactive sandbox

darkcomet rat process graph

Figure 1: Process graph of DarkComet execution generated by ANY.RUN

DarkComet Execution process

DarkComet has a typical RAT execution.

The infected system connects to the hacker’s computer and gives the attacker full access. Crooks may exploit all the system's features: the infected machine is ready to get packets and perform the commands.

Systems communicate via TCP to the chosen DarkComet malware port on the selected IP/domain. Then C&C traffic begins with RC4-256 encryption.

The execution process of the DarkComet varies depending on the sample and version. The most straightforward execution is just one process that makes all activities in the infected system.

In some cases, malware may use system utilities to defend against evasion or persistence. For example, in this task, it uses the T1564.001 technique: malware starts attrib.exe through cmd.exe to hide the main executable. In the system process, iexplorer was injected with malicious code and provided the main malicious activity afterward.

Distribution of DarkComet malware

To trick people into downloading and installing programs such as Quasar RAT, njRAT, and DarkComet cybercriminals use:

  • other trojans
  • suspicious file or software download channels
  • fake software updates and/or unofficial activation tools
  • phishing

Emails may include malicious content in various formats like Microsoft Office documents, PDF documents, .exe files, ZIP and RAR archives, JavaScript files, etc.

After a user is tricked into downloading and then opening a file, it installs other malware.

How to detect DarkComet using ANY.RUN?

darkcomet rat memory dump

Figure 2: DarkComet memory dump

ANY.RUN automatically creates a memory dump of the running process and matches it with the Yara rule. After DarkComet detection, its config is available to researchers for subsequent analysis in no time.

In our example, malware configuration was extracted just 10 seconds after the task launch.

Conclusion

Having DarkComet downloaded on your working station can cause severe issues. And it’s better to get rid of it immediately. Concerning the SOC’s specialists' goal, the analysis of the RAT’s infection should be carried out as soon as possible. And with ANY.RUN sandbox it’s easy to do.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy