Featured Image

DarkComet RAT 2.0 RC4

Family Name DarkComet RAT
Main Classification Remote Access
Release Version 2.0 RC4
Author DarkCoderSc
Origin France 🇫🇷
Language Delphi
Default Port 1604
Release Date Mar, 2010, 16 years, 1 month ago.

Historical Events / Facts

2017
DarkComet and the Umbrage Project

Leaked CIA documents published by WikiLeaks revealed that the agency's secretive "Umbrage" team actively collected and studied widespread malware, including the DarkComet RAT.

2015
Kevin Mitnick's DarkComet Live Demonstrations

Renowned hacker and cybersecurity consultant Kevin Mitnick frequently utilized the DarkComet RAT to conduct live hacking demonstrations during his security conferences, and was even willing to purchase the project's source code for his professional needs. One of his most notable public showcases took place at the CeBIT 2015 technology trade fair, where he used the tool to actively demonstrate real-world cyber threats to the audience.

2012
The RAT Weaponized Against Syrian Activists

Syrian government weaponized DarkComet to bypass encrypted communications and surveil activists during the civil war. DarkComet was distributed through malicious Skype messages disguised with a fake Facebook icon, secretly installing itself to monitor citizens and reportedly leading to widespread arrests. Upon discovering his tool was being exploited by the Assad regime for state-sponsored espionage, DarkComet's creator immediately and permanently halted the project's development.

Key Features

Feature Name Dangerousness Key Categories
Clipboard Manager logoClipboard Manager High Exfiltration, Credentials
File Manager logoFile Manager High Exfiltration, Disruption, Alteration, File System
Keylogger logoKeylogger High Credentials, Spy / Surveillance
Network Manager logoNetwork Manager High Exfiltration, Lateral Movements, Eavesdropping, Credentials, Disruption
Password Recovery logoPassword Recovery High Lateral Movements, Privilege Escalation, Credentials
Registry Manager logoRegistry Manager High Exfiltration, System Management, Credentials, Disruption, Alteration
Remote Desktop / Screen Capture logoRemote Desktop / Screen Capture High Assistance, Spy / Surveillance
Shell Access logoShell Access High System Management, Lateral Movements, Privilege Escalation
System Information Gathering logoSystem Information Gathering High Lateral Movements, Privilege Escalation, Spy / Surveillance
Voice Recorder logoVoice Recorder High Spy / Surveillance
Webcam Capture logoWebcam Capture High Spy / Surveillance
Process Manager logoProcess Manager Medium System Management, Disruption
Services Manager logoServices Manager Medium Privilege Escalation, Disruption, Assistance
Fun / Troll Functions logoFun / Troll Functions Low Disruption, Alteration

Malware Family References

Other Releases


Previous Release Next Release

});