BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
28
Global rank
62 infographic chevron month
Month rank
56
Week rank
694
IOCs

DarkComet RAT is a malicious program designed to remotely control or administer a victim's computer, steal private data and spy on the victim.

RAT
Type
France
Origin
12 February, 2008
First seen
20 May, 2024
Last seen
Also known as
Breut
Fynloski
klovbot

How to analyze DarkComet RAT with ANY.RUN

RAT
Type
France
Origin
12 February, 2008
First seen
20 May, 2024
Last seen

IOCs

IP addresses
193.161.193.99
45.74.4.244
78.163.16.186
193.149.180.137
176.108.108.71
75.4.61.28
223.244.83.13
140.82.13.202
46.2.15.197
151.236.21.83
185.60.133.214
80.85.154.180
80.85.156.184
40.76.20.9
88.169.146.156
79.143.38.55
78.190.191.194
45.32.255.220
109.61.248.34
37.1.217.131
Hashes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0.tcp.eu.ngrok.io
6.tcp.eu.ngrok.io
dgorijan20785.hopto.org
7.tcp.eu.ngrok.io
4.tcp.eu.ngrok.io
5.tcp.eu.ngrok.io
myhackth.myftp.org
2.tcp.eu.ngrok.io
eu-central-7075.packetriot.net
4.tcp.ngrok.io
6.tcp.ngrok.io
212.ip.ply.gg
b7r.duckdns.org
positive-be.at.playit.gg
smath79.ddns.net
whatis79.ddns.net
chrisle79.ddns.net
bonding79.ddns.net
goodgt79.ddns.net
jacknop79.ddns.net
URLs
tcp://6.tcp.eu.ngrok.io:11380/
http://glaucogeraint.pagekite.me/
http://glaucogeraint.pagekite.me/favicon.ico
Last Seen at

Recent blog posts

post image
Windows 11 UAC Bypass in Modern Malware
watchers 84
comments 0
post image
New Hijack Loader Variant: Uses Process Hollo...
watchers 255
comments 0
post image
A Guide to ANY.RUN’s YARA Search 
watchers 265
comments 0

What is DarkComet RAT?

DarkComet is a remote access trojan developed by Jean-Pierre Lesueur in 2008. According to him, the program was never intended to be used illegally. But it got viral in 2012 after the Syrian incident: the government used the RAT to spy and destroy the protestor’s network.

It’s a standard remote control malware – a hacker rules over the infected computer and gets access to the camera and microphone. That is why DarkComet serves as a tool to monitor victims’ actions, take screenshots, do key-logging, or steal credentials.

The malware has had several versions, and DarkComet 5.3.1 is still available in 2022.

Crooks try to make targets download and run the RAT using different social engineering techniques. And in some cases, attackers use DarkComet to deliver other malicious programs to the infected machine. Hackers may involve the victim machine in a botnet scheme, such as sending spam.

DarkComet malware analysis

ANY.RUN allows researchers to analyze DarkComet samples and monitor the malware’s activity in real-time using an interactive sandbox

darkcomet rat process graph

Figure 1: Process graph of DarkComet execution generated by ANY.RUN

DarkComet Execution process

DarkComet has a typical RAT execution.

The infected system connects to the hacker’s computer and gives the attacker full access. Crooks may exploit all the system's features: the infected machine is ready to get packets and perform the commands.

Systems communicate via TCP to the chosen DarkComet malware port on the selected IP/domain. Then C&C traffic begins with RC4-256 encryption.

The execution process of the DarkComet varies depending on the sample and version. The most straightforward execution is just one process that makes all activities in the infected system.

In some cases, malware may use system utilities to defend against evasion or persistence. For example, in this task, it uses the T1564.001 technique: malware starts attrib.exe through cmd.exe to hide the main executable. In the system process, iexplorer was injected with malicious code and provided the main malicious activity afterward.

Distribution of DarkComet malware

To trick people into downloading and installing programs such as Quasar RAT, njRAT, and DarkComet cybercriminals use:

  • other trojans
  • suspicious file or software download channels
  • fake software updates and/or unofficial activation tools
  • phishing

Emails may include malicious content in various formats like Microsoft Office documents, PDF documents, .exe files, ZIP and RAR archives, JavaScript files, etc.

After a user is tricked into downloading and then opening a file, it installs other malware.

How to detect DarkComet using ANY.RUN?

darkcomet rat memory dump

Figure 2: DarkComet memory dump

ANY.RUN automatically creates a memory dump of the running process and matches it with the Yara rule. After DarkComet detection, its config is available to researchers for subsequent analysis in no time.

In our example, malware configuration was extracted just 10 seconds after the task launch.

Conclusion

Having DarkComet downloaded on your working station can cause severe issues. And it’s better to get rid of it immediately. Concerning the SOC’s specialists' goal, the analysis of the RAT’s infection should be carried out as soon as possible. And with ANY.RUN sandbox it’s easy to do.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy