MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4e57af02f430ffdacb81b8b597b251bac12de9c0703fb5325411dc83ca8d8e11. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DarkComet


Vendor detections: 20


Intelligence 20 IOCs YARA 41 File information Comments

SHA256 hash: 4e57af02f430ffdacb81b8b597b251bac12de9c0703fb5325411dc83ca8d8e11
SHA3-384 hash: 1dd9be2b6937e2548cd795e54b5a2e4035d2d4a64391f6fe9e02281ff360d4c109b402b6872d771a478ccd0532fb06fc
SHA1 hash: 7960e61fd077596e7d9630fe579ace4842a344e7
MD5 hash: ce84b5ced6719ef6680c681e46014400
humanhash: golf-michigan-august-seven
File name:Extreme Injector v4.exe
Download: download sample
Signature DarkComet
File size:10'008'064 bytes
First seen:2025-12-05 21:01:22 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9222d372923baed7aa9dfa28449a94ea (11 x AsyncRAT, 10 x RedLineStealer, 9 x NanoCore)
ssdeep 98304:0bCTz8+F7j9+U22ihIYgOeieNEVJyZlng4p2V:0KzpFOJIEYEVcn1p
Threatray 19 similar samples on MalwareBazaar
TLSH T115A6E1447551BE5EC3E68C32E4FA1C1C933098A61743E30B653AF695EC5F2B66E803E6
TrID 30.4% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
17.3% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
13.0% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
11.2% (.EXE) UPX compressed Win32 Executable (27066/9/6)
11.0% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4)
Magika pebin
Reporter burger
Tags:DarkComet exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
113
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
darkcomet
ID:
1
File name:
Extreme Injector v4.exe
Verdict:
Malicious activity
Analysis date:
2025-12-05 20:58:59 UTC
Tags:
darkcomet rat github upx delphi backdoor

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
darkkomet emotet
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-12-05T18:22:00Z UTC
Last seen:
2025-12-07T04:50:00Z UTC
Hits:
~10
Detections:
Trojan-Spy.Win32.Xegumumune.sbc HEUR:Trojan.Win32.NanoBot.gen Backdoor.Win32.DarkKomet.eku BSS:Trojan.Win32.Generic.nblk BSS:Trojan.Win32.Generic HEUR:Backdoor.Win32.DarkKomet.gen BSS:Trojan.Win32.ImSKP.am HEUR:Trojan.Win32.Generic HEUR:Trojan.MSIL.DInvoke.gen Backdoor.Win32.DarkKomet.aagt BSS:Worm.Win32.BSS.ScreenLock BSS:Exploit.Win32.Generic.nblk HackTool.Win32.Binder.bs Backdoor.Win32.Finlosky.bf Backdoor.Win32.DarkKomet.b not-a-virus:VHO:RiskTool.MSIL.Generic not-a-virus:RiskTool.MSIL.Injector.v not-a-virus:VHO:RiskTool.MSIL.Convagent.gen not-a-virus:VHO:RiskTool.MSIL.Injecter.gen Backdoor.Agent.TCP.C&C Backdoor.DarkKomet.TCP.C&C PDM:Trojan.Win32.Generic
Malware family:
Extreme Injector
Verdict:
Malicious
Result
Threat name:
Binder HackTool, DarkComet, PureLog Stea
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to log keystrokes
Contains functionality to register a low level keyboard hook
Contains functionalty to change the wallpaper
Creates a thread in another existing process (thread injection)
Found malware configuration
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Uses cmd line tools excessively to alter registry or file data
Writes to foreign memory regions
Yara detected Binder HackTool
Yara detected DarkComet
Yara detected PureLog Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1827720 Sample: Extreme Injector v4.exe Startdate: 05/12/2025 Architecture: WINDOWS Score: 100 49 raw.githubusercontent.com 2->49 55 Suricata IDS alerts for network traffic 2->55 57 Found malware configuration 2->57 59 Malicious sample detected (through community Yara rule) 2->59 61 8 other signatures 2->61 10 Extreme Injector v4.exe 3 2->10         started        signatures3 process4 file5 41 C:\Users\user\...XTREME INJECTOR V4.EXE, PE32 10->41 dropped 43 C:\Users\user\AppData\Local\...\DENEME1.EXE, PE32 10->43 dropped 13 EXTREME INJECTOR V4.EXE 3 10->13         started        16 DENEME1.EXE 2 10->16         started        process6 file7 45 C:\Users\user\...XTREME INJECTOR V3.EXE, PE32 13->45 dropped 47 C:\Users\user\AppData\Local\Temp\DARK.EXE, PE32 13->47 dropped 18 DARK.EXE 2 13->18         started        22 EXTREME INJECTOR V3.EXE 14 3 13->22         started        24 WerFault.exe 16->24         started        process8 dnsIp9 51 38.19.198.245, 1604, 49689 COGENT-174US United States 18->51 63 Antivirus detection for dropped file 18->63 65 Contains functionalty to change the wallpaper 18->65 67 Contains functionality to capture and log keystrokes 18->67 69 7 other signatures 18->69 26 cmd.exe 18->26         started        29 cmd.exe 18->29         started        31 notepad.exe 18->31         started        53 raw.githubusercontent.com 185.199.109.133, 443, 49691 FASTLYUS Netherlands 22->53 signatures10 process11 signatures12 71 Uses cmd line tools excessively to alter registry or file data 26->71 33 conhost.exe 26->33         started        35 attrib.exe 26->35         started        37 conhost.exe 29->37         started        39 attrib.exe 29->39         started        process13
Verdict:
Malware
YARA:
12 match(es)
Tags:
.Net .Net Obfuscator .Net Reactor Executable Managed .NET PDB Path PE (Portable Executable) PE File Layout SOS: 0.85 SOS: 0.92 Win 32 Exe x86
Threat name:
Win32.Ransomware.DarkyLock
Status:
Malicious
First seen:
2025-12-05 21:00:46 UTC
File Type:
PE (Exe)
Extracted files:
65
AV detection:
35 of 38 (92.11%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
.NET Reactor proctector
Checks computer location settings
Executes dropped EXE
Verdict:
Malicious
Tags:
apt darkcomet Win.Trojan.Darkkomet-6745294-0
YARA:
ProjectM_DarkComet_1
Unpacked files
SH256 hash:
3f40cb58533ab12cc14a9bfe38a96c40f004023a5b8bb83ece870bd5607ac921
MD5 hash:
a3815a5808090379dd6a40fa70dd996c
SHA1 hash:
e6b36e3d31ebefd6e3a9e85395d05001086f1afe
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24 INDICATOR_EXE_Packed_DotNetReactor
SH256 hash:
6c0fbb4d58a32ed951aa33e14cd29c0f1d76bd5307bc0e818d54caac6af5e4e2
MD5 hash:
1e8f3a768321e7739b3b588dcb98ac1f
SHA1 hash:
0cb440d93f86900aa8a3ce60eed5ef575092999f
Detections:
win_darkcomet_g0 win_darkcomet_a0 win_darkcomet_auto Malware_QA_update RAT_DarkComet MALWARE_Win_DarkComet
SH256 hash:
4e57af02f430ffdacb81b8b597b251bac12de9c0703fb5325411dc83ca8d8e11
MD5 hash:
ce84b5ced6719ef6680c681e46014400
SHA1 hash:
7960e61fd077596e7d9630fe579ace4842a344e7
Detections:
win_darkcomet_g0
Malware family:
DarkComet
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:Check_OutputDebugStringA_iat
Rule name:CMD_Ping_Localhost
Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:crime_win32_ransom_avaddon_1
Author:@VK_Intel
Description:Detects Avaddon ransomware
Reference:https://twitter.com/VK_Intel/status/1300944441390370819
Rule name:darkcomet_v1
Author:RandomMalware
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_EXE_Packed_Dotfuscator
Author:ditekSHen
Description:Detects executables packed with Dotfuscator
Rule name:INDICATOR_EXE_Packed_DotNetReactor
Author:ditekSHen
Description:Detects executables packed with unregistered version of .NET Reactor
Rule name:INDICATOR_EXE_Packed_Goliath
Author:ditekSHen
Description:Detects executables packed with Goliath
Rule name:Intezer_Vaccine_DarkComet
Author:Intezer Labs
Description:Automatic YARA vaccination rule created based on the file's genes
Reference:https://analyze.intezer.com
Rule name:Lumma_Stealer_Detection
Author:ashizZz
Description:Detects a specific Lumma Stealer malware sample using unique strings and behaviors
Reference:https://seanthegeek.net/posts/compromized-store-spread-lumma-stealer-using-fake-captcha/
Rule name:Malware_QA_update
Author:Florian Roth (Nextron Systems)
Description:VT Research QA uploaded malware - file update.exe
Reference:VT Research QA
Rule name:Malware_QA_update_RID2DAD
Author:Florian Roth
Description:VT Research QA uploaded malware - file update.exe
Reference:VT Research QA
Rule name:MALWARE_Win_CelestyBinderLoader
Author:ditekSHen
Description:Detects Celesty Binder loader
Rule name:MALWARE_Win_DarkComet
Author:ditekSHen
Description:Detects DarkComet
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:ProjectM_DarkComet_1
Author:Florian Roth (Nextron Systems)
Description:Detects ProjectM Malware
Reference:http://researchcenter.paloaltonetworks.com/2016/03/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe/
Rule name:ProjectM_DarkComet_1_RID2E9E
Author:Florian Roth
Description:Detects ProjectM Malware
Reference:http://researchcenter.paloaltonetworks.com/2016/03/unit42-projectm-link-found-between-pakistani-actor-and-operation-transparent-tribe/
Rule name:RAT_DarkComet
Author:Kevin Breen <kevin@techanarchy.net>
Description:Detects DarkComet RAT
Reference:http://malwareconfig.com/stats/DarkComet
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:UPX20030XMarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXProtectorv10x2
Author:malware-lu
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9
Rule name:Windows_Trojan_Darkcomet_1df27bcc
Author:Elastic Security
Rule name:win_darkcomet_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:xtreme_rat
Author:Kevin Falcoz
Description:Xtreme RAT

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments