| File name: | RAT.zip |
| Full analysis: | https://app.any.run/tasks/cb51095e-b2d5-411e-9313-d87fa6865c82 |
| Verdict: | Malicious activity |
| Threats: | DarkComet RAT is a malicious program designed to remotely control or administer a victim's computer, steal private data and spy on the victim. |
| Analysis date: | March 23, 2024, 16:51:19 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v4.5 to extract, compression method=deflate |
| MD5: | F3EECB42442E3DA5480E58B5FBA66EFD |
| SHA1: | 13CE038C499BAD488DD0602BFE6804EF4AB927FF |
| SHA256: | 1B8D5A8D61CA502589461A1D50D925CCBE747425C75E92BCB39E5F3BD8799C5E |
| SSDEEP: | 98304:YL5KE0tQhO9qhD4OI0LK/fe+yhYURtLH2xCc3QVlNnLKomQsjVs3DI8WG3FKrSUc:rJ19vq+rDIuCp/u8 |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 45 |
|---|---|
| ZipBitFlag: | 0x0800 |
| ZipCompression: | Deflated |
| ZipModifyDate: | 2024:03:18 19:01:10 |
| ZipCRC: | 0x00000000 |
| ZipCompressedSize: | 2 |
| ZipUncompressedSize: | - |
| ZipFileName: | RAT/ |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 120 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\RAT.zip" | C:\Program Files\WinRAR\WinRAR.exe | explorer.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| 448 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa120.18551\RAT\WarzoneRAT.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa120.18551\RAT\WarzoneRAT.exe | WinRAR.exe | ||||||||||||
User: admin Company: Corporate social responsibility. Integrity Level: MEDIUM Description: Moral responsibility Exit code: 0 Version: 31.0.0.0 Modules
| |||||||||||||||
| 480 | C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f | C:\Windows\System32\reg.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Registry Console Tool Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 532 | "C:\ProgramData\Hdlharas\dlrarhsiva.exe" | C:\ProgramData\Hdlharas\dlrarhsiva.exe | CrimsonRAT.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: dlrarhsiva Version: 1.0.0.0 Modules
| |||||||||||||||
| 948 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | — | WarzoneRAT.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: MSBuild.exe Exit code: 0 Version: 4.8.3761.0 built by: NET48REL1 Modules
| |||||||||||||||
| 952 | "C:\Windows\System32\rasphone.exe" | C:\Windows\System32\rasphone.exe | NetWire.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Remote Access Phonebook Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1112 | "C:\Users\admin\AppData\Local\Temp\Rar$EXa120.18367\RAT\Remcos.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXa120.18367\RAT\Remcos.exe | eventvwr.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 1288 | notepad | C:\Windows\System32\notepad.exe | Blackkomet.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1308 | C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f | C:\Windows\System32\reg.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Registry Console Tool Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1424 | notepad | C:\Windows\System32\notepad.exe | Blackkomet.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (120) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (120) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (120) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (120) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (120) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (120) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip | |||
| (PID) Process: | (120) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\RAT.zip | |||
| (PID) Process: | (120) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (120) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (120) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 120 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa120.18158\RAT\NetWire.doc | — | |
MD5:— | SHA256:— | |||
| 120 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa120.18295\RAT\NetWire.doc | — | |
MD5:— | SHA256:— | |||
| 120 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa120.18158\RAT\Remcos.exe | executable | |
MD5:FB598B93C04BAAFE98683DC210E779C9 | SHA256:C851749FD6C9FA19293D8EE2C5B45B3DC8561115DDFE7166FBAEFCB9B353B7C4 | |||
| 120 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa120.18158\RAT\RevengeRAT.exe | executable | |
MD5:1D9045870DBD31E2E399A4E8ECD9302F | SHA256:9B4826B8876CA2F1378B1DFE47B0C0D6E972BF9F0B3A36E299B26FBC86283885 | |||
| 120 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa120.18295\RAT\Blackkomet.exe | executable | |
MD5:C7DCD585B7E8B046F209052BCD6DD84B | SHA256:0E8336ED51FE4551CED7D9AA5CE2DDE945DF8A0CC4E7C60199C24DD1CF7CCD48 | |||
| 120 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa120.18367\RAT\NetWire.doc | — | |
MD5:— | SHA256:— | |||
| 120 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa120.18295\RAT\WarzoneRAT.exe | executable | |
MD5:600E0DBAEFC03F7BF50ABB0DEF3FB465 | SHA256:61E6A93F43049712B5F2D949FD233FA8015FE4BEF01B9E1285D3D87B12F894F2 | |||
| 120 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa120.18295\RAT\VanToM-Rat.bat | executable | |
MD5:3D4E3F149F3D0CDFE76BF8B235742C97 | SHA256:B15C7CF9097195FB5426D4028FD2F6352325400BEB1E32431395393910E0B10A | |||
| 120 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa120.18295\RAT\CobaltStrike.doc | document | |
MD5:96FF9D4CAC8D3A8E73C33FC6BF72F198 | SHA256:96DB5D52F4ADDF46B0A41D45351A52041D9E5368AEAD642402DB577BCB33CC3D | |||
| 120 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa120.18295\RAT\NJRat.exe | executable | |
MD5:29A37B6532A7ACEFA7580B826F23F6DD | SHA256:7A84DD83F4F00CF0723B76A6A56587BDCE6D57BD8024CC9C55565A442806CF69 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | unknown |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1836 | Blackkomet.exe | 193.242.166.48:1605 | — | Fop Iliushenko Volodymyr Olexandrovuch | UA | unknown |
3680 | Server.exe | 193.161.193.99:22603 | — | OOO Bitree Networks | RU | malicious |
2568 | MSBuild.exe | 168.61.222.215:5400 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | malicious |
2364 | NetWire.exe | 142.250.179.142:443 | drive.google.com | GOOGLE | US | whitelisted |
2364 | NetWire.exe | 142.251.39.97:443 | drive.usercontent.google.com | GOOGLE | US | whitelisted |
4036 | NetWire.exe | 142.250.179.142:443 | drive.google.com | GOOGLE | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
nickman12-46565.portmap.io |
| unknown |
drive.google.com |
| shared |
drive.usercontent.google.com |
| unknown |
tamerimia.ug |
| unknown |
startitit2-23969.portmap.host |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1080 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY DNS Query to a Reverse Proxy Service Observed |
1080 | svchost.exe | Misc activity | ET INFO DNS Query for Port Mapping/Tunneling Service Domain (.portmap .io) |
1080 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY DNS Query to a Reverse Proxy Service Observed |
1080 | svchost.exe | Misc activity | ET INFO DNS Query for Port Mapping/Tunneling Service Domain (.portmap .io) |
— | — | A Network Trojan was detected | ET MALWARE Backdoor.Win32.DarkComet Keepalive Outbound |
1080 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY DNS Query to a Reverse Proxy Service Observed |
1080 | svchost.exe | Misc activity | ET INFO DNS Query for Port Mapping/Tunneling Service Domain (.portmap .host) |
— | — | A Network Trojan was detected | ET MALWARE Backdoor.Win32.DarkComet Keepalive Outbound |
— | — | A Network Trojan was detected | ET MALWARE Backdoor.Win32.DarkComet Keepalive Outbound |