Recent from talks
Nothing was collected or created yet.
DarkComet
View on Wikipedia
| DarkComet | |
|---|---|
| Developer | Jean-Pierre Lesueur (DarkCoderSc) |
| Final release | 5.3.1
|
| Operating system | Microsoft Windows |
| Type | Remote Administration Tool |
| License | freeware |
| Website | https://www.darkcomet-rat.com/[1] |
DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur (known as DarkCoderSc[2]), an independent programmer and computer security coder from France. Although the RAT was developed back in 2008, it began to proliferate at the start of 2012. The program was discontinued, partially due to its use in the Syrian civil war to monitor activists but also due to its author's fear of being arrested for unnamed reasons.[1] As of August 2018, the program's development "has ceased indefinitely", and downloads are no longer offered on its official website.[3]
DarkComet allows a user to control the system with a graphical user interface. It has many features which allows a user to use it as administrative remote help tool; however, DarkComet has many features which can be used maliciously. DarkComet is commonly used to spy on the victims by taking screen captures, key-logging, or password stealing.
History of DarkComet
[edit]Syria
[edit]In 2011 to 2014, DarkComet was linked to the Syrian conflict. People in Syria began using secure connections to bypass the government's censorship and the surveillance of the internet. This caused the Syrian Government to resort to using RATs to spy on its civilians. Many believe that this is what caused the arrests of many activists within Syria.[1]
The RAT was distributed via a "booby-trapped Skype chat message" which consisted of a message with a Facebook icon which was actually an executable file that was designed to install DarkComet.[4] Once infected, the victim's machine would try to send the message to other people with the same booby-trapped Skype chat message.
Once DarkComet was linked to the Syrian regime, Lesueur stopped developing the tool, stating, “I never imagined it would be used by a government for spying,” he said. “If I had known that, I would never have created such a tool.”[1]
Target Gamers, Military and Governments
[edit]In 2012, Arbos Network company found evidence of DarkComet being used to target military and gamers by unknown hackers from Africa. At the time, they mainly targeted the United States.[5]
Je Suis Charlie
[edit]In the wake of the January 7, 2015, attack on the Charlie Hebdo magazine in Paris, hackers used the "#JeSuisCharlie" slogan to trick people into downloading DarkComet. DarkComet was disguised as a picture of a newborn baby whose wristband read "Je suis Charlie." Once the picture was downloaded, the users became compromised.[6] Hackers took advantage of the disaster to compromise as many systems as possible. DarkComet was spotted within 24 hours of the attack.
Architecture and Features
[edit]Architecture
[edit]DarkComet, like many other RATs, uses a reverse-socket architecture. The uninfected computer with a GUI enabling control of infected ones is the client, while the infected systems (without a GUI) are servers.[7]
When DarkComet executes, the server connects to the client and allows the client to control and monitor the server. At this point the client can use any of the features which the GUI contains. A socket is opened on the server and waits to receive packets from the controller, and executes the commands when received. In some cases, the malware may use system utilities to evade detection and gain persistence. For example, it can employ the T1564.001 technique by starting attrib.exe through cmd.exe to hide the main executable.
Features
[edit]The following list of features is not exhaustive but are the critical ones that make DarkComet a dangerous tool. Many of these features can be used to completely take over a system and allows the client full access when granted via UAC.
- Spy Functions
- Webcam Capture
- Sound Capture
- Remote Desktop
- Keylogger
- Network Functions
- Active Ports
- Network Shares
- Server Socks5
- LAN Computers
- Net Gateway
- IP Scanner
- Url Download
- Browse Page
- Redirect IP/Port
- WiFi Access Points
- Computer Power
- Poweroff
- Shutdown
- Restart
- Logoff
- Server Actions
- Lock Computer
- Restart Server
- Close Server
- Uninstall Server
- Upload and Execute
- Remote Edit Service
- Update Server
- From URL
- From File
DarkComet also has some "Fun Features".
- Fun Features
- Fun Manager
- Piano
- Message Box
- Microsoft Reader
- Remote Chat
Detection
[edit]DarkComet is a widely known piece of malware. If a user installs an antivirus, or a DarkComet remover, they can un-infect their computer quickly. Its target machines are typically anything from Windows XP, all the way up to Windows 10.
Common anti-virus tags for a DarkComet application are as follow:
- Trojan[Backdoor]/Win32.DarkKomet.xyk
- BDS/DarkKomet.GS
- Backdoor.Win32.DarkKomet!O
- RAT.DarkComet
When a computer is infected, it tries to create a connection via socket to the controller’s computer. Once the connection has been established the infected computer listens for commands from the controller, if the controller sends out a command, the infected computer receives it, and executes whatever function is sent.
References
[edit]- ^ a b c d McMillan, Robert. "How the Boy Next Door Accidentally Built a Syrian Spy Tool". Wired.
- ^ "DarkCoderSc | SOLDIERX.COM". SoldierX. Retrieved 13 October 2017.
- ^ "Project definitively closed since 2012".
DarkComet-RAT development has ceased indefinitely in July 2012. Since the [sic], we do not offer downloads, copies or support.
[permanent dead link] - ^ "Spy code creator kills project after Syrian abuse". BBC. 10 July 2012.
- ^ Wilson, Curt. "Exterminating the RAT Part I: Dissecting Dark Comet Campaigns". Arbor.
- ^ Vinton, Kate. "How Hackers Are Using #JeSuisCharlie To Spread Malware". Forbes.
- ^ Denbow, Shawn; Hertz, Jesse. "pest control: taming the rats" (PDF). Matasano. Archived from the original (PDF) on 2015-03-28. Retrieved 2015-05-05.
External links
[edit]- Official website (now defunct)
DarkComet
View on GrokipediaOrigins and Development
Creator Background
Jean-Pierre Lesueur, known online as DarkCoderSc, is a French software developer and independent programmer who created DarkComet, a remote access trojan (RAT), in 2008.[1] [6] Lesueur, born around 1990, specialized in computer security coding and developed the tool initially as a remote administration utility for system management, though it lacked robust safeguards against misuse.[2] [5] By 2012, Lesueur was employed as a Java programmer at a European telecommunications firm while residing outside Paris, balancing professional coding with personal security projects.[2] His background included self-taught expertise in malware analysis and defensive tools, reflecting a hobbyist approach to cybersecurity rather than formal institutional affiliation at the time.[3] Lesueur discontinued DarkComet in July 2012 after evidence emerged of its exploitation by Syrian authorities for surveillance during the civil war, prompting him to publicly retire the project and withdraw distribution to prevent further abuse.[5] [3] [7] Subsequently, he shifted focus to ethical malware research, earning Microsoft MVP status for security contributions and maintaining an active GitHub profile under DarkCoderSc, where he develops tools as a researcher affiliated with PHROZEN.[8]Initial Design and Intent
DarkComet was initially developed in 2008 by Jean-Pierre Lesueur, a French independent programmer operating under the pseudonym DarkCoderSC.[6] Lesueur, then in his early twenties and employed as a Java developer for a European company, drew from experience in underground programming forums to create the tool as a demonstration of his coding skills rather than for commercial gain.[2] He released it freely online, earning only modest fees—around €2,000—from optional technical support services.[2] The software was designed as a remote administration tool targeting Microsoft Windows systems, providing operators with extensive capabilities for authorized remote management.[9] Core features included over 60 server-side functions such as retrieving system information, controlling processes, enabling remote desktop viewing, initiating chat sessions, and file operations, all intended for legitimate uses like administering personal or networked devices.[9] Lesueur positioned it akin to open-source security testing frameworks, emphasizing that its legality depended on user authorization rather than inherent malice.[3] Lesueur explicitly marketed DarkComet as a utility distinct from trojans, though he recognized its detection by antivirus engines stemmed from unauthorized adoption by hackers.[9] He offered disclaimers on his website underscoring ethical boundaries, stating the tool was not built for illegal surveillance or intrusion.[3] This intent aligned with broader remote access paradigms, but the absence of robust access controls facilitated dual-use from inception.[2]Release and Early Adoption
DarkComet was initially released in 2008 by Jean-Pierre Lesueur, a French independent programmer operating under the pseudonym DarkCoderSc.[6][1] Lesueur developed the tool as a hobby project, distributing it freely through his personal website as a remote access utility intended for security testing and legitimate remote administration.[2] The RAT quickly gained traction in underground hacking forums and communities due to its comprehensive feature set, including webcam access, keylogging, and file manipulation, which rivaled paid alternatives like Poison Ivy or commercial remote tools without requiring licensing fees.[9] Early adopters, primarily cybercriminals and script kiddies, customized and deployed it for unauthorized system intrusions, leveraging its user-friendly builder interface to generate payloads tailored for social engineering attacks such as phishing or trojanized executables.[9] By late 2011, leaked databases and security analyses indicated hundreds of controllers actively managing infected systems worldwide, reflecting rapid proliferation beyond initial niche use, though Lesueur maintained it was not designed for malicious purposes.[4] This early ecosystem growth was facilitated by the absence of source code restrictions, enabling modifications and redistribution in malware-sharing networks.[10]Technical Architecture
Client-Server Framework
DarkComet operates on a client-server architecture typical of remote access trojans, where the server component—a customizable payload generated by the attacker's builder tool—is deployed on the victim's machine, while the client serves as the attacker's graphical control panel for issuing commands and receiving data. The builder allows configuration of parameters such as the command-and-control (C2) IP address or domain, port (defaulting to 1604), implant identifier, persistence mechanisms, and optional security passwords, producing executable files disguised with icons or extensions like .exe, .scr, or .pif.[9][11] Once executed on the victim system, the server establishes an outbound TCP connection to the specified C2 endpoint, beaconing periodically (every 20 seconds by default) to signal availability and maintain persistence against network interruptions via keepalive packets.[9][11] Communication between the server and client employs RC4 encryption with hardcoded keys such as "#KCMDDC4#-890" for version 4 or "#KCMDDC5#-890" appended with a configurable password, ensuring commands and responses remain obscured from network inspection; the client decrypts incoming data for display, including system metrics, screenshots, or keystrokes.[11][12] The server processes over 60 command types from the client, executing functions like file manipulation or webcam activation before encrypting and transmitting outputs back, while features such as process injection into legitimate processes (e.g., Internet Explorer) and mutex creation prevent multiple instances and aid firewall evasion.[9][12] Persistence is integrated into the framework via registry modifications, such as adding entries to HKLM\Software\Microsoft\Windows\CurrentVersion\Run or Userinit keys, ensuring the server relaunches on boot.[11] The client interface, typically DarkComet.exe augmented by DLLs like SQLite for local data storage, organizes connected victims into groups and logs interactions in a database schema tracking metadata such as user profiles and captured inputs, facilitating long-term monitoring across multiple infections.[4] This structure supports dynamic DNS for C2 resilience and plugin extensibility, though its reliance on operator-configured endpoints exposes it to takedowns if passwords or domains are compromised.[4][11]Communication Protocols
DarkComet utilizes a custom TCP-based protocol for command-and-control (C2) communications between the malware stub on infected systems and the operator's controller software. The stub initiates outbound TCP connections to a preconfigured C2 server address, which can be an IP address or domain name, often leveraging dynamic DNS services such as No-IP or DuckDNS for resilience against takedowns. This client-initiated approach allows the malware to evade inbound firewall restrictions, with connections typically established on configurable ports, including the default port 1604.[13][10] Upon connection, a handshake occurs where the stub authenticates the controller and transmits victim identification data, including the victim's IP address, a nonce, campaign ID, and system details, encoded in base64 prior to encryption. The protocol is password-protected, requiring a shared secret configured by the operator, which combines with a version-specific static key to derive the encryption parameters. All subsequent data exchanges employ RC4 stream cipher for confidentiality, protecting commands issued from the controller (e.g., for file uploads/downloads or screen captures) and responses carrying exfiltrated data such as keystrokes or screenshots. This custom binary protocol, distinct from standard HTTP, enables interactive remote control while minimizing detection through obfuscation techniques like domain string encoding in the malware binary.[13][14] Network signatures for DarkComet versions 5.0 and later reveal patterned traffic, including periodic beacons from stubs to maintain sessions and decode specific actions like binary execution or data uploads, often with metadata on execution mode. The protocol supports web service-like behaviors for C2 in some samples, facilitating data exfiltration to domains such as ngrok.io variants, though core operations remain TCP-centric rather than relying on higher-level application protocols. These mechanisms, analyzed through static disassembly and dynamic testing, underscore the malware's design for persistent, low-profile operator interaction across amateur and targeted deployments.[13][14]Persistence and Evasion Techniques
DarkComet achieves persistence on infected Windows systems primarily through modifications to registry keys that trigger execution upon user login or system startup. It commonly adds an entry toHKCU\Software\Microsoft\Windows\CurrentVersion\Run, such as naming it "MicroUpdate" and pointing to a copied executable in a user directory like C:\Users\[username]\Documents\MSDCSC\msdcsc.exe.[15] Additionally, it alters HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit to append the malware's path, ensuring execution during the Winlogon process.[15][12] The implant copies itself to customizable paths, often in Documents or AppData folders, and may create startup services or leverage process injection for sustained presence.[9][12]
To evade detection, DarkComet employs file attribute manipulation, setting dropped executables as hidden (+h) and system (+s) files via the attrib command, while avoiding alterations to file creation dates.[15] It creates a mutex, such as DC_MUTEX-[random string], to prevent multiple instances and potential behavioral anomalies that could alert security tools.[15][12] Process hiding is facilitated by injecting code into legitimate processes like iexplore.exe, allowing network communication to mimic benign browser traffic and bypass firewalls.[12][9]
Communication and configuration data are obfuscated using custom functions and RC4 encryption, with command-and-control (C2) details like domains masked to reduce signature-based detection.[15][12] The malware supports binary packing with tools like UPX or MPRESS and includes rootkit-like stealth features to conceal its presence from task managers and antivirus scans, contributing to historically low detection rates (e.g., 34 out of 43 engines in early samples).[9][12] Periodic beacons, sent every 20 seconds with encrypted payloads, enable ongoing access while minimizing footprint.[9] Privilege adjustments via Windows API calls like AdjustTokenPrivileges further aid in maintaining elevated operations without triggering alerts.[15]
Core Features and Capabilities
Remote Access Functions
DarkComet provides a remote desktop feature that streams the victim's screen in real-time to the operator's client interface, enabling visual monitoring of the infected system's desktop and applications.[9][16] This capability operates over the RAT's custom encrypted communication channel, typically beaconing updates every 20 seconds to maintain session persistence without noticeable latency on the victim machine.[9] Operators can seize interactive control through this remote desktop module, directing the mouse cursor, simulating clicks, and injecting keystrokes as if physically present at the console.[17][18] This functionality leverages Windows API calls for input simulation, allowing seamless takeover of user sessions for tasks such as navigation, application execution, or data manipulation.[9] Complementary input interception includes a built-in keylogger that captures keystrokes in real-time or via offline logging stored for later retrieval, often routed through FTP if configured.[17][18] While primarily for credential harvesting, this integrates with remote control by enabling operators to monitor and correlate typed inputs during live sessions.[9] Remote device access extends to peripherals, permitting webcam activation for video snapshots or streams and microphone hijacking for audio eavesdropping, thus broadening surveillance beyond the screen.[9][17] These features, implemented in the RAT's server component, require no additional payloads and execute stealthily by hooking into system drivers.[16]Information Gathering Tools
DarkComet incorporates multiple modules for surreptitiously collecting data from compromised Windows systems, enabling attackers to monitor victim behavior and harvest credentials or other sensitive information. These capabilities operate through commands sent from the attacker's client interface to the server component installed on the target machine, with data often logged locally or transmitted in real-time to a command-and-control (C2) server.[17][15] The keylogger records all keystrokes using Windows API functions such asGetKeyboardType(0) and VkKeyScanA, accommodating Unicode keyboards for broader language support. It supports active online mode for immediate transmission of logs and offline mode for periodic retrieval via the GetOfflineLogs command, allowing attackers to capture passwords, messages, and other typed content without alerting the user.[15][17]
Screen capture functionality enables periodic or on-demand screenshots of the desktop or active windows through the DESKTOPCAPTURE command, providing visual oversight of user actions such as browsing or document handling.[15][9][17]
Webcam access permits attackers to snap photographs or initiate live video streams via the WEBCAMLIVE command, exploiting device drivers to activate the camera covertly for surveillance purposes.[15][9][17]
Microphone recording allows interception of audio input, enabling eavesdropping on conversations or ambient sounds through direct hardware access.[9][17]
Clipboard monitoring extracts copied content, including text, URLs, or enhanced metafiles, via API calls like EnumDisplayDevicesA, which can reveal inadvertently shared sensitive data.[17][15]
Password recovery tools scan for and retrieve stored credentials from web browsers, system caches, or applications, with extracted data exfiltrated alongside other logs.[15][9]
Collected information is exfiltrated to the C2 server using commands such as UPLOADFILE or FTPFILEUPLOAD, often obfuscated through functions like sub_4735E8 to evade detection during transmission over TCP or FTP protocols.[15]
System Manipulation Options
DarkComet equips operators with capabilities to alter core system components, including direct editing of the Windows Registry to modify settings, enforce persistence through autostart entries (such as values added toHKEY_CURRENT_USER\Software\[Microsoft](/page/Microsoft)\Windows\CurrentVersion\Policies\System and HKEY_CURRENT_USER\Software\DC3_FEXEC), and evade defenses.[17][9][19]
Process management features permit enumeration, termination, and launching of running applications, alongside uninstallation of security software like antivirus programs to reduce detection risks.[9]
File system manipulation supports comprehensive operations such as browsing directories, uploading/downloading, creating, deleting, or modifying files, including changes to attributes for stealth.[9][19]
The RAT disables protective mechanisms, including Task Manager, Registry Editor, Folder Options, Windows Firewall, and User Account Control (UAC), hindering user recovery efforts.[16][20]
Basic system controls enable remote locking of the workstation, forced restarts, shutdowns, or toggling hardware like the CD/DVD tray.[9][16][20]
Additional options target interface elements via a "Fun Manager" module, allowing concealment of the desktop, taskbar, system tray, Start button, or icons to disorient users.[16]
It facilitates deployment of secondary payloads, such as other malware, and modifications to startup items, services, or the hosts file for further control or redirection.[9][20]
