BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details
28
Global rank
62 infographic chevron month
Month rank
58 infographic chevron week
Week rank
694
IOCs

DarkComet RAT is a malicious program designed to remotely control or administer a victim's computer, steal private data and spy on the victim.

RAT
Type
France
Origin
12 February, 2008
First seen
13 May, 2024
Last seen
Also known as
Breut
Fynloski
klovbot

How to analyze DarkComet RAT with ANY.RUN

RAT
Type
France
Origin
12 February, 2008
First seen
13 May, 2024
Last seen

IOCs

IP addresses
193.161.193.99
45.74.4.244
78.163.16.186
193.149.180.137
176.108.108.71
75.4.61.28
223.244.83.13
140.82.13.202
46.2.15.197
151.236.21.83
185.60.133.214
80.85.154.180
80.85.156.184
40.76.20.9
88.169.146.156
79.143.38.55
78.190.191.194
45.32.255.220
109.61.248.34
37.1.217.131
Hashes
76d3fd4463b6604c93fc4da02a1afde2b0d2ef2ed7a34b65e43cdf1a4b34223b
6d34ded00c0da9887ba752872093f59c649de72a1f629a32014f5ed8be509363
13d21c65715012f79b3440907b072af4a9cbd64ef6be57697ed60e4be66337a2
fa4b3d8ef845584fe46759cc00c0dd7bd1c2d99e228ed888c6f1d275f52a288a
86b31eb11b25d53e296392d498109ac76bf4b6b3ccb7bce663772f38946b77ba
67dc6cb6985adb0297fbd5539c28138a3b1af7d42889aeaafc2eb84bc598d84e
e78718830fa01076ce6746fd14b91217be174892e24e4c414c6878e17398f363
2c9590168831cc857fe526592a6665f9adb1f27344cbc4de162ca50c6737a878
e3be15e4275d998847b48f6bfcb144e71255f3521476ca798e4fa14f75e0813f
b200cfa59d0acbbb9a9f4fd4c81702ec0b2ba7ebf4882d9eeef6e6094bb5e0aa
9240df4b070c7c2e9216d7fc096c065d6a52338a43bf95d3f89ca19ad68f9b2c
9b53ca313c1e6f47dca3620933f13b15f6be5f4a1e831c82bf29df1e81e4108e
ef241f2bc4e968e7eefc3b42c4cd6504059f55eb4d6414c318bfd9d0789b35f1
0818868e13cd8c18824e49912fc9cb921548b3b1ff9c6540a279dabc8e45c90d
f7c2e27c1b226e0b070afde1578c2a819fa253f4419b03cd0b801ad626c1dd89
9adae85d400cbd54c51b887d7cc50c838bb54ae086c54a909d21867aae6ebe62
0d69b2b4536c894197676b7cdf54824d946c2dc2181884e0b058bfc9e614f44f
e7fd58290da0b5ef7c06e937639082d0c27a8c7d689d80285896aee5607fda71
024c810e04f1f01973cc6999d049b19aa1181682f10a03d922a8dd00846f2cc2
b18efeecc2528927c9b41478a9fe6e4d1cc976705458eba057d72b89b4766275
Domains
0.tcp.eu.ngrok.io
6.tcp.eu.ngrok.io
5.tcp.eu.ngrok.io
7.tcp.eu.ngrok.io
myhackth.myftp.org
4.tcp.eu.ngrok.io
dgorijan20785.hopto.org
2.tcp.eu.ngrok.io
eu-central-7075.packetriot.net
4.tcp.ngrok.io
6.tcp.ngrok.io
212.ip.ply.gg
b7r.duckdns.org
positive-be.at.playit.gg
smath79.ddns.net
whatis79.ddns.net
chrisle79.ddns.net
bonding79.ddns.net
goodgt79.ddns.net
jacknop79.ddns.net
URLs
tcp://6.tcp.eu.ngrok.io:11380/
http://glaucogeraint.pagekite.me/
http://glaucogeraint.pagekite.me/favicon.ico
Last Seen at

Recent blog posts

post image
Celebrate ANY.RUN’s 8th Birthday with Special...
watchers 10
comments 0
post image
How to Use Threat Intelligence Feeds
watchers 438
comments 0
post image
Tools and Technologies ANY.RUN Uses to Protec...
watchers 337
comments 0

What is DarkComet RAT?

DarkComet is a remote access trojan developed by Jean-Pierre Lesueur in 2008. According to him, the program was never intended to be used illegally. But it got viral in 2012 after the Syrian incident: the government used the RAT to spy and destroy the protestor’s network.

It’s a standard remote control malware – a hacker rules over the infected computer and gets access to the camera and microphone. That is why DarkComet serves as a tool to monitor victims’ actions, take screenshots, do key-logging, or steal credentials.

The malware has had several versions, and DarkComet 5.3.1 is still available in 2022.

Crooks try to make targets download and run the RAT using different social engineering techniques. And in some cases, attackers use DarkComet to deliver other malicious programs to the infected machine. Hackers may involve the victim machine in a botnet scheme, such as sending spam.

DarkComet malware analysis

ANY.RUN allows researchers to analyze DarkComet samples and monitor the malware’s activity in real-time using an interactive sandbox

darkcomet rat process graph

Figure 1: Process graph of DarkComet execution generated by ANY.RUN

DarkComet Execution process

DarkComet has a typical RAT execution.

The infected system connects to the hacker’s computer and gives the attacker full access. Crooks may exploit all the system's features: the infected machine is ready to get packets and perform the commands.

Systems communicate via TCP to the chosen DarkComet malware port on the selected IP/domain. Then C&C traffic begins with RC4-256 encryption.

The execution process of the DarkComet varies depending on the sample and version. The most straightforward execution is just one process that makes all activities in the infected system.

In some cases, malware may use system utilities to defend against evasion or persistence. For example, in this task, it uses the T1564.001 technique: malware starts attrib.exe through cmd.exe to hide the main executable. In the system process, iexplorer was injected with malicious code and provided the main malicious activity afterward.

Distribution of DarkComet malware

To trick people into downloading and installing programs such as Quasar RAT, njRAT, and DarkComet cybercriminals use:

  • other trojans
  • suspicious file or software download channels
  • fake software updates and/or unofficial activation tools
  • phishing

Emails may include malicious content in various formats like Microsoft Office documents, PDF documents, .exe files, ZIP and RAR archives, JavaScript files, etc.

After a user is tricked into downloading and then opening a file, it installs other malware.

How to detect DarkComet using ANY.RUN?

darkcomet rat memory dump

Figure 2: DarkComet memory dump

ANY.RUN automatically creates a memory dump of the running process and matches it with the Yara rule. After DarkComet detection, its config is available to researchers for subsequent analysis in no time.

In our example, malware configuration was extracted just 10 seconds after the task launch.

Conclusion

Having DarkComet downloaded on your working station can cause severe issues. And it’s better to get rid of it immediately. Concerning the SOC’s specialists' goal, the analysis of the RAT’s infection should be carried out as soon as possible. And with ANY.RUN sandbox it’s easy to do.

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy