BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
33
Global rank
51
Month rank
38 infographic chevron week
Week rank
0
IOCs

DarkComet RAT is a malicious program designed to remotely control or administer a victim's computer, steal private data and spy on the victim.

RAT
Type
France
Origin
12 February, 2008
First seen
19 September, 2024
Last seen
Also known as
Breut
Fynloski
klovbot

How to analyze DarkComet RAT with ANY.RUN

RAT
Type
France
Origin
12 February, 2008
First seen
19 September, 2024
Last seen

IOCs

IP addresses
193.161.193.99
45.74.4.244
78.163.16.186
193.149.180.137
176.108.108.71
75.4.61.28
223.244.83.13
140.82.13.202
46.2.15.197
151.236.21.83
185.60.133.214
80.85.154.180
80.85.156.184
40.76.20.9
88.169.146.156
79.143.38.55
78.190.191.194
45.32.255.220
109.61.248.34
37.1.217.131
Hashes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0.tcp.eu.ngrok.io
4.tcp.eu.ngrok.io
4.tcp.ngrok.io
7.tcp.eu.ngrok.io
5.tcp.eu.ngrok.io
eu-central-7075.packetriot.net
2.tcp.eu.ngrok.io
6.tcp.ngrok.io
positive-be.at.playit.gg
papka142.ddns.net
dgorijan20785.hopto.org
6.tcp.eu.ngrok.io
myhackth.myftp.org
212.ip.ply.gg
b7r.duckdns.org
whatis79.ddns.net
chrisle79.ddns.net
goodgt79.ddns.net
smath79.ddns.net
jacknop79.ddns.net
URLs
tcp://6.tcp.eu.ngrok.io:11380/
http://glaucogeraint.pagekite.me/
http://glaucogeraint.pagekite.me/favicon.ico
Last Seen at

Recent blog posts

post image
What is Spearphishing: Definition, Techniques...
watchers 944
comments 0
post image
How to Collect Threat Intelligence Using Sear...
watchers 1397
comments 0
post image
ANY.RUN Now Integrates with Splunk!
watchers 664
comments 0

What is DarkComet RAT?

DarkComet is a remote access trojan developed by Jean-Pierre Lesueur in 2008. According to him, the program was never intended to be used illegally. But it got viral in 2012 after the Syrian incident: the government used the RAT to spy and destroy the protestor’s network.

It’s a standard remote control malware – a hacker rules over the infected computer and gets access to the camera and microphone. That is why DarkComet serves as a tool to monitor victims’ actions, take screenshots, do key-logging, or steal credentials.

The malware has had several versions, and DarkComet 5.3.1 is still available in 2022.

Crooks try to make targets download and run the RAT using different social engineering techniques. And in some cases, attackers use DarkComet to deliver other malicious programs to the infected machine. Hackers may involve the victim machine in a botnet scheme, such as sending spam.

DarkComet malware analysis

ANY.RUN allows researchers to analyze DarkComet samples and monitor the malware’s activity in real-time using an interactive sandbox

darkcomet rat process graph

Figure 1: Process graph of DarkComet execution generated by ANY.RUN

DarkComet Execution process

DarkComet has a typical RAT execution.

The infected system connects to the hacker’s computer and gives the attacker full access. Crooks may exploit all the system's features: the infected machine is ready to get packets and perform the commands.

Systems communicate via TCP to the chosen DarkComet malware port on the selected IP/domain. Then C&C traffic begins with RC4-256 encryption.

The execution process of the DarkComet varies depending on the sample and version. The most straightforward execution is just one process that makes all activities in the infected system.

In some cases, malware may use system utilities to defend against evasion or persistence. For example, in this task, it uses the T1564.001 technique: malware starts attrib.exe through cmd.exe to hide the main executable. In the system process, iexplorer was injected with malicious code and provided the main malicious activity afterward.

Distribution of DarkComet malware

To trick people into downloading and installing programs such as Quasar RAT, njRAT, and DarkComet cybercriminals use:

  • other trojans
  • suspicious file or software download channels
  • fake software updates and/or unofficial activation tools
  • phishing

Emails may include malicious content in various formats like Microsoft Office documents, PDF documents, .exe files, ZIP and RAR archives, JavaScript files, etc.

After a user is tricked into downloading and then opening a file, it installs other malware.

How to detect DarkComet using ANY.RUN?

darkcomet rat memory dump

Figure 2: DarkComet memory dump

ANY.RUN automatically creates a memory dump of the running process and matches it with the Yara rule. After DarkComet detection, its config is available to researchers for subsequent analysis in no time.

In our example, malware configuration was extracted just 10 seconds after the task launch.

Conclusion

Having DarkComet downloaded on your working station can cause severe issues. And it’s better to get rid of it immediately. Concerning the SOC’s specialists' goal, the analysis of the RAT’s infection should be carried out as soon as possible. And with ANY.RUN sandbox it’s easy to do.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More