Featured Image

DarkComet RAT 1.3

Family Name DarkComet RAT
Main Classification Remote Access
Release Version 1.3
Author DarkCoderSc
Origin France 🇫🇷
Default Port 1604
Release Date Nov, 2009, 16 years, 5 months ago.

Historical Events / Facts

2017
DarkComet and the Umbrage Project

Leaked CIA documents published by WikiLeaks revealed that the agency's secretive "Umbrage" team actively collected and studied widespread malware, including the DarkComet RAT.

2015
Kevin Mitnick's DarkComet Live Demonstrations

Renowned hacker and cybersecurity consultant Kevin Mitnick frequently utilized the DarkComet RAT to conduct live hacking demonstrations during his security conferences, and was even willing to purchase the project's source code for his professional needs. One of his most notable public showcases took place at the CeBIT 2015 technology trade fair, where he used the tool to actively demonstrate real-world cyber threats to the audience.

2012
The RAT Weaponized Against Syrian Activists

Syrian government weaponized DarkComet to bypass encrypted communications and surveil activists during the civil war. DarkComet was distributed through malicious Skype messages disguised with a fake Facebook icon, secretly installing itself to monitor citizens and reportedly leading to widespread arrests. Upon discovering his tool was being exploited by the Assad regime for state-sponsored espionage, DarkComet's creator immediately and permanently halted the project's development.

Key Features

Feature Name Dangerousness Key Categories
Clipboard Manager logoClipboard Manager High Credentials, Exfiltration
File Manager logoFile Manager High Disruption, Exfiltration, Alteration, File System
Keylogger logoKeylogger High Spy / Surveillance, Credentials
Password Recovery logoPassword Recovery High Credentials, Lateral Movements, Privilege Escalation
Registry Manager logoRegistry Manager High Exfiltration, Disruption, System Management, Credentials, Alteration
Remote Desktop / Screen Capture logoRemote Desktop / Screen Capture High Spy / Surveillance, Assistance
Shell Access logoShell Access High Lateral Movements, Privilege Escalation, System Management
System Information Gathering logoSystem Information Gathering High Spy / Surveillance, Lateral Movements, Privilege Escalation
Webcam Capture logoWebcam Capture High Spy / Surveillance
Process Manager logoProcess Manager Medium Disruption, System Management
Fun / Troll Functions logoFun / Troll Functions Low Disruption, Alteration

Malware Family References

Other Releases


Previous Release Next Release

});