Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now
45
Global rank
35 infographic chevron month
Month rank
25 infographic chevron week
Week rank
0
IOCs

DarkComet RAT is a malicious program designed to remotely control or administer a victim's computer, steal private data and spy on the victim.

RAT
Type
France
Origin
12 February, 2008
First seen
11 February, 2026
Last seen
Also known as
Breut
Fynloski
klovbot

How to analyze DarkComet RAT with ANY.RUN

RAT
Type
France
Origin
12 February, 2008
First seen
11 February, 2026
Last seen

IOCs

IP addresses
8.8.8.8
193.161.193.99
138.197.139.130
193.201.225.52
223.244.83.13
195.123.221.123
104.22.48.74
78.163.16.186
185.60.133.214
89.46.100.217
80.79.114.172
91.207.61.175
80.241.222.33
70.70.19.220
37.203.214.28
172.94.18.243
37.1.222.208
37.1.217.131
192.121.87.80
212.3.223.227
Hashes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aski.eating-organic.net
0.tcp.ngrok.io
subdomain-dns.duckdns.org
hoslowhabboz.ddns.net
nene.linkpc.net
kvejo991.ddns.net
botnet.no-ip.info
0.tcp.eu.ngrok.io
rtts.ddns.net
seguridadsocial.ddns.net
2.tcp.eu.ngrok.io
dark12345555.duckdns.org
gameservice.ddns.net
2.tcp.ngrok.io
4.tcp.ngrok.io
myhackth.myftp.org
4.tcp.eu.ngrok.io
eu-central-7075.packetriot.net
morifc.ddnsfree.com
6.tcp.ngrok.io
URLs
tcp://6.tcp.eu.ngrok.io:11380/
http://glaucogeraint.pagekite.me/
http://glaucogeraint.pagekite.me/favicon.ico
Last Seen at

Recent blog posts

post image
Emerging Ransomware BQTLock & GREENBLOOD...
watchers 67
comments 0
post image
How to Build Threat Hunting that Defends Your...
watchers 318
comments 0
post image
How Threat Intelligence Helps Protect Financi...
watchers 674
comments 0

What is DarkComet RAT?

DarkComet is a remote access trojan developed by Jean-Pierre Lesueur in 2008. According to him, the program was never intended to be used illegally. But it got viral in 2012 after the Syrian incident: the government used the RAT to spy and destroy the protestor’s network.

It’s a standard remote control malware – a hacker rules over the infected computer and gets access to the camera and microphone. That is why DarkComet serves as a tool to monitor victims’ actions, take screenshots, do key-logging, or steal credentials.

The malware has had several versions, and DarkComet 5.3.1 is still available in 2022.

Crooks try to make targets download and run the RAT using different social engineering techniques. And in some cases, attackers use DarkComet to deliver other malicious programs to the infected machine. Hackers may involve the victim machine in a botnet scheme, such as sending spam.

DarkComet malware analysis

ANY.RUN allows researchers to analyze DarkComet samples and monitor the malware’s activity in real-time using an interactive sandbox

darkcomet rat process graph

Figure 1: Process graph of DarkComet execution generated by ANY.RUN

DarkComet Execution process

DarkComet has a typical RAT execution.

The infected system connects to the hacker’s computer and gives the attacker full access. Crooks may exploit all the system's features: the infected machine is ready to get packets and perform the commands.

Systems communicate via TCP to the chosen DarkComet malware port on the selected IP/domain. Then C&C traffic begins with RC4-256 encryption.

The execution process of the DarkComet varies depending on the sample and version. The most straightforward execution is just one process that makes all activities in the infected system.

In some cases, malware may use system utilities to defend against evasion or persistence. For example, in this task, it uses the T1564.001 technique: malware starts attrib.exe through cmd.exe to hide the main executable. In the system process, iexplorer was injected with malicious code and provided the main malicious activity afterward.

Distribution of DarkComet malware

To trick people into downloading and installing programs such as Quasar RAT, njRAT, and DarkComet cybercriminals use:

  • other trojans
  • suspicious file or software download channels
  • fake software updates and/or unofficial activation tools
  • phishing

Emails may include malicious content in various formats like Microsoft Office documents, PDF documents, .exe files, ZIP and RAR archives, JavaScript files, etc.

After a user is tricked into downloading and then opening a file, it installs other malware.

How to detect DarkComet using ANY.RUN?

darkcomet rat memory dump

Figure 2: DarkComet memory dump

ANY.RUN automatically creates a memory dump of the running process and matches it with the Yara rule. After DarkComet detection, its config is available to researchers for subsequent analysis in no time.

In our example, malware configuration was extracted just 10 seconds after the task launch.

Conclusion

Having DarkComet downloaded on your working station can cause severe issues. And it’s better to get rid of it immediately. Concerning the SOC’s specialists' goal, the analysis of the RAT’s infection should be carried out as soon as possible. And with ANY.RUN sandbox it’s easy to do.

HAVE A LOOK AT

Salvador Stealer screenshot
Salvador Stealer
salvador
Salvador Stealer is a powerful, information-stealing Android malware designed to silently infiltrate systems, extract sensitive data, and exfiltrate it to cybercriminals. Often sold on underground forums, it is part of the growing ecosystem of “stealers-as-a-service” (SaaS) tools that target individuals and organizations alike.
Read More
Lynx screenshot
Lynx
lynx
Lynx is a double extortion ransomware: attackers encrypt important and sensitive data and demand a ransom for decryption simultaneously threatening to publish or sell the data. Active since mid-2024. Among techniques are terminating processes and services, privilege escalation, deleting shadow copies. Distribution by phishing, malvertising, exploiting vulnerabilities.
Read More
Cactus Ransomware screenshot
Cactus ransomware-as-a-service (RaaS) was first caught in March 2023 targeting corporate networks. It became known for its self-encrypting payload and double extortion tactics. Cactus primarily targets large enterprises across industries in finance, manufacturing, IT, and healthcare. It is known for using custom encryption techniques, remote access tools, and penetration testing frameworks to maximize damage.
Read More
HijackLoader screenshot
HijackLoader
hijackloader
HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.
Read More
BTMOB RAT screenshot
BTMOB RAT
btmob
BTMOB RAT is a remote access Trojan (RAT) designed to give attackers full control over infected devices. It targets Windows and Android endpoints. Its modular structure allows operators to tailor capabilities, making it suitable for espionage, credential theft, financial fraud, and establishing long-term footholds in corporate networks.
Read More
DeerStealer screenshot
DeerStealer
deerstealer
DeerStealer is an information-stealing malware discovered in 2024 by ANY.RUN, primarily targeting sensitive data such as login credentials, browser history, and cryptocurrency wallet details. It is often distributed through phishing campaigns and fake Google ads that mimic legitimate platforms like Google Authenticator. Once installed, it exfiltrates the stolen data to a remote command and control (C2) server. DeerStealer’s ability to disguise itself as legitimate downloads makes it particularly dangerous for unsuspecting users.
Read More