BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
28
Global rank
54 infographic chevron month
Month rank
56
Week rank
694
IOCs

DarkComet RAT is a malicious program designed to remotely control or administer a victim's computer, steal private data and spy on the victim.

RAT
Type
France
Origin
12 February, 2008
First seen
13 May, 2024
Last seen
Also known as
Breut
Fynloski
klovbot

How to analyze DarkComet RAT with ANY.RUN

RAT
Type
France
Origin
12 February, 2008
First seen
13 May, 2024
Last seen

IOCs

IP addresses
193.161.193.99
45.74.4.244
78.163.16.186
193.149.180.137
176.108.108.71
75.4.61.28
223.244.83.13
140.82.13.202
46.2.15.197
151.236.21.83
185.60.133.214
80.85.154.180
80.85.156.184
40.76.20.9
88.169.146.156
79.143.38.55
78.190.191.194
45.32.255.220
109.61.248.34
37.1.217.131
Hashes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6.tcp.eu.ngrok.io
0.tcp.eu.ngrok.io
5.tcp.eu.ngrok.io
7.tcp.eu.ngrok.io
myhackth.myftp.org
4.tcp.eu.ngrok.io
dgorijan20785.hopto.org
2.tcp.eu.ngrok.io
eu-central-7075.packetriot.net
4.tcp.ngrok.io
6.tcp.ngrok.io
212.ip.ply.gg
b7r.duckdns.org
positive-be.at.playit.gg
smath79.ddns.net
whatis79.ddns.net
chrisle79.ddns.net
bonding79.ddns.net
goodgt79.ddns.net
jacknop79.ddns.net
URLs
tcp://6.tcp.eu.ngrok.io:11380/
http://glaucogeraint.pagekite.me/
http://glaucogeraint.pagekite.me/favicon.ico
Last Seen at

Recent blog posts

post image
How to Use Threat Intelligence Feeds
watchers 344
comments 0
post image
Tools and Technologies ANY.RUN Uses to Protec...
watchers 286
comments 0
post image
Release Notes: YARA Search, New Rules, Config...
watchers 972
comments 0

What is DarkComet RAT?

DarkComet is a remote access trojan developed by Jean-Pierre Lesueur in 2008. According to him, the program was never intended to be used illegally. But it got viral in 2012 after the Syrian incident: the government used the RAT to spy and destroy the protestor’s network.

It’s a standard remote control malware – a hacker rules over the infected computer and gets access to the camera and microphone. That is why DarkComet serves as a tool to monitor victims’ actions, take screenshots, do key-logging, or steal credentials.

The malware has had several versions, and DarkComet 5.3.1 is still available in 2022.

Crooks try to make targets download and run the RAT using different social engineering techniques. And in some cases, attackers use DarkComet to deliver other malicious programs to the infected machine. Hackers may involve the victim machine in a botnet scheme, such as sending spam.

DarkComet malware analysis

ANY.RUN allows researchers to analyze DarkComet samples and monitor the malware’s activity in real-time using an interactive sandbox

darkcomet rat process graph

Figure 1: Process graph of DarkComet execution generated by ANY.RUN

DarkComet Execution process

DarkComet has a typical RAT execution.

The infected system connects to the hacker’s computer and gives the attacker full access. Crooks may exploit all the system's features: the infected machine is ready to get packets and perform the commands.

Systems communicate via TCP to the chosen DarkComet malware port on the selected IP/domain. Then C&C traffic begins with RC4-256 encryption.

The execution process of the DarkComet varies depending on the sample and version. The most straightforward execution is just one process that makes all activities in the infected system.

In some cases, malware may use system utilities to defend against evasion or persistence. For example, in this task, it uses the T1564.001 technique: malware starts attrib.exe through cmd.exe to hide the main executable. In the system process, iexplorer was injected with malicious code and provided the main malicious activity afterward.

Distribution of DarkComet malware

To trick people into downloading and installing programs such as Quasar RAT, njRAT, and DarkComet cybercriminals use:

  • other trojans
  • suspicious file or software download channels
  • fake software updates and/or unofficial activation tools
  • phishing

Emails may include malicious content in various formats like Microsoft Office documents, PDF documents, .exe files, ZIP and RAR archives, JavaScript files, etc.

After a user is tricked into downloading and then opening a file, it installs other malware.

How to detect DarkComet using ANY.RUN?

darkcomet rat memory dump

Figure 2: DarkComet memory dump

ANY.RUN automatically creates a memory dump of the running process and matches it with the Yara rule. After DarkComet detection, its config is available to researchers for subsequent analysis in no time.

In our example, malware configuration was extracted just 10 seconds after the task launch.

Conclusion

Having DarkComet downloaded on your working station can cause severe issues. And it’s better to get rid of it immediately. Concerning the SOC’s specialists' goal, the analysis of the RAT’s infection should be carried out as soon as possible. And with ANY.RUN sandbox it’s easy to do.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy