DarkComet RAT sample – DC_MUTEX-4Y37736

Are you searching for DarkComet RAT samples and mutexes?! Then stop your search and take a look at the “28e9360edf03c582eb04822e85354381” RAT example which has been identified by us on “ 30-Sep-14”. 

The DarkComet RAT is often used by script kiddies and cyber criminals to control multiple infected computers at once via a DarkComet RAT graphical user interface.

The DarkComet RAT allows the operator to fully control an infected computer. This is the information which we were able to collect from the “28e9360edf03c582eb04822e85354381 DarkComet RAT sample.

DarkComet RAT information which was identified on 30-Sep-14

MD5

 28e9360edf03c582eb04822e85354381

SHA256

 c394c2d9529adcc854aa0fc7e60f46ac8b2f339ec0b9c4daf7a3dee6f88e0de8

FILESIZE

 741376

FILETYPE

 PE32 executable (GUI) Intel 80386, for MS Windows

DC-MUTEX

 DC_MUTEX-4Y37736

DOMAIN

 darkbyte.zapto.org

IP

 No hosts contacted.

DARKCOMET RAT

DarkComet RAT capabilities

The capabilities of DarkComet RAT allow the operator to start the following functions on the infected device (not a full list):

  • Microphone
  • Webcam
  • Visit website
  • Navigate through folder

Additional notes

We do not have additional information for this sample.

virustotal scan

SCAN WITH VIRUSTOTAL

https://www.virustotal.com/en/url/submission/?force=1&url=darkbyte.zapto.org