BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details

DCRat

18
Global rank
11 infographic chevron month
Month rank
11 infographic chevron week
Week rank
6455
IOCs

DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common.

Remote Access Trojan
Type
ex-USSR
Origin
1 July, 2018
First seen
27 July, 2024
Last seen
Also known as
Dark Crystal RAT

How to analyze DCRat with ANY.RUN

Remote Access Trojan
Type
ex-USSR
Origin
1 July, 2018
First seen
27 July, 2024
Last seen

IOCs

IP addresses
79.137.248.10
121.127.232.86
89.23.101.37
31.172.66.22
147.185.221.19
194.59.31.109
179.13.4.125
121.127.232.87
177.255.88.252
190.211.255.106
185.43.220.45
45.144.154.62
93.115.10.211
94.124.192.220
162.212.158.246
103.74.101.154
51.103.218.125
147.189.168.82
83.229.83.102
40.114.223.144
Hashes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169833cm.nyashka.top
204949.clmonth.nyashteam.top
309245cm.nyashka.top
126433cm.nyashka.top
080099cm.nyashka.top
314957cm.nyashka.top
208659cm.nyashka.top
335980cm.nyashka.top
023119cm.nyashka.top
196419cm.nyashka.top
271910cm.nyashka.top
078519cm.nyashka.top
281363cm.nyashka.top
306577cm.nyashka.top
318239cm.nyashka.top
388876cm.nyashka.top
344958cm.nyashka.top
186014cm.nyashka.top
193046cm.nyashka.top
000366cm.nyashka.top
URLs
http://a1008296.xsph.ru/2259cd8f.php
http://frrvoavx.beget.tech/320a7884.php
http://frrvoavx.beget.tech/320a7884
http://cz41806.tw1.ru/L1nc0In.php
http://ozero.top/pythonPhp_cpubase.php
http://papka.top/PythonDefaultSqlBasetrackcentral.php
http://729231cm.n9shteam1.top/nyashsupport
http://fqq121.beget.tech/L1nc0In
http://a1008296.xsph.ru/2259cd8f
https://pastebin.com/raw/0QRAyVfa
http://178.208.86.27/3/BaseVoiddbCentral/1/baseMulti/privateLongpoll/_to/8linuxwordpressvm/DbSecure/5db/62mariadb/55PipeImage/2AuthProtectupdate/8updateDatalife/externalVmtoSecureApiLinuxflowerGeneratorPrivatetemp.php
http://a0583448.xsph.ru/HttpCpu.php
http://a1010258.xsph.ru/f8e0e5d4.php
http://a1010258.xsph.ru/f8e0e5d4
http://cr87986.tw1.ru/L1nc0In.php
http://cz41806.tw1.ru/L1nc0In
http://a1008223.xsph.ru/5df1b3cb.php
http://a0643994.xsph.ru/Multiprotectprivate.php
http://128538cm.n9shteam3.top/VmPipepacketupdateflowerAsyncDatalifeTempuploads
http://128538cm.n9shteam3.top/VmPipepacketupdateflowerAsyncDatalifeTempuploads.php
Last Seen at

Recent blog posts

post image
See Malicious Process Relationships on a Vis...
watchers 185
comments 0
post image
Brute Ratel C4 Badger Used to Load Latrodectu...
watchers 1028
comments 0
post image
Find Threats Exploiting CrowdStrike Outage w...
watchers 3021
comments 0

What is DCRat malware?

DCRat, also known as Dark Crystal RAT, is a remote access trojan (RAT) that lets threat actors take control over an infected machine and extract users’ data, such as the information copied to the clipboard and personal credentials from apps. The malware is known for its stealthiness and its ability to evade detection by security software. DCrat has been in operation since 2018, yet it regularly undergoes changes aimed at advancing and expanding its capabilities.

The malware consists of several components each responsible for a certain type of malicious activity, including stealing of cryptocurrency and keylogging. On top of that, the authors of DCrat have published a special software called DCRat Studio, which serves as a tool for developing new modules for the malware.

DCrat's popularity can be attributed in part to its low cost. Its one-month license goes for a mere $5, while a lifetime one is available for $40. This is a stark contrast to other malware-as-a-service options. For instance, a lifetime AgentTesla subscription will require forking out $120. According to researchers, such prices are due to the malware being simply a pet project of a single developer, who does not work on it full-time. The developer is likely based in the ex-USSR region.

Get started today for free

Easily analyze emerging malware with ANY.RUN interactive online sandbox

Register for free

Technical details of the DCRat malicious software

Although back in 2018, the malicious program utilized Java, it switched to C# in 2019. As a result, nowadays, the majority of Dark Crystal RAT’s modules are written in the C# programming language. However, the administrative server for this malware is developed with JPHP, which is an implementation of PHP that relies on the Java Virtual Machine.

Different samples of the malware have been observed to be outfitted with evasion and obfuscation techniques. For instance, in order to create a layer of protection against malware analysts’ attempts to reverse engineer its code, DCrat’s payload can be obfuscated with Enigma Protector.

The standard set of tools available to threat actors using DCrat includes:

  • DCRat can record the victim's keystrokes, which can be used to steal passwords and other sensitive information.
  • The separate CryptoStealer module of the malware allows attackers to get access to users’ crypto wallet information.
  • It can collect information about the system (CPU and GPU stats, etc.)
  • It can take screenshots of the victim's computer, which can be used to monitor their activity.
  • DCRat can exfiltrate information from browsers, such as session cookies, auto-fill credentials, and credit card details.
  • The malware can transmit the contents of the victim's clipboard to its command-and-control server (C&C).
  • It can hijack Telegram, Steam, Discord accounts.
  • DCrat can function as a loader, dropping other types of malware on the infected computer.

Additionally, DCrat can execute a persistence algorithm to retain control over the system. For instance, the malware can copy itself to a random running process and to the root directory (C:). It then can create shortcuts to these copies in the user's Startup folder. It can also add registry values that point to these shortcuts. This allows DCrat to start automatically when the computer boots up.

It is important to note that Dark Crystal RAT is polymorphic, meaning that attackers can use its builder functionality to add changes to the malware’s code to make it difficult to detect using traditional methods, such as file hash.

Execution process of DCRat

Uploading Dark Crystal RAT to the ANY.RUN sandbox lets you quickly see the malicious activities triggered by the malware. Here is a sample of DCrat executed in the interactive sandbox.

DCrat's flexibility makes it challenging to handle, but there are things that can help us pinpoint it. For example, DCrat rarely produces malicious activity in its current process. Like most malware, it prefers to create large process trees and then infiltrate a harmless process at some point to detonate later. By using ANY.RUN, we can easily identify the process targeted by the malware.

DCRat process tree DCRat's process tree

On top of that, it can delay execution for a period of time after the infection, drop executables, run embedded payloads, and use WMI queries to detect a virtualized environment or or to gain persistence in the system.

DCRat process tree DCRat's WMI queries

Distribution methods of the DCRat malware

Since Dark Crystal RAT is sold openly on the Internet, cyber criminals of all skill levels have access to it. Subsequently, there are many different methods they implement to drop the payload on victims’ computers. Yet, as is the case with most remote access trojans, including Vidar, njRAT, and QuasarRAT, DCrat’s main way of infecting a system is via phishing emails.

Threat actors devise sophisticated multi-staged attacks intended to manipulate the victim into believing that the fake email is actually legitimate and the attachment file it contains is safe to open. These downloadable files are usually in an office suite format, such as .docx or .xls, and have built-in macros or other mechanisms that can trigger the chain reaction which will result in DCRat being dropped onto the system.

There are also accounts of users unsuspectingly downloading a DCrat executable from websites distributing torrent files. In such cases, the malware can be disguised as a legitimate program. Once executed, the program installs the malicious program and runs it, stealing the user’s data often without them being aware of it.

Conclusion

Dark Crystal RAT is a remote access trojan that constitutes a significant concern for organizations and individuals worldwide. The malware’s low price tag and modular design make it an in-demand tool among cyber criminals. To protect your system from DCrat, you should be very careful about opening links or attachments from unknown senders.

Instead of taking the risk of downloading and opening potentially harmful files or clicking on malicious links, you can first analyze them in a sandbox environment like ANY.RUN. This will allow you to quickly and safely determine whether the file is malicious or not. ANY.RUN will also provide you with a detailed report about the malware, including its indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs). This information can be used to protect your organization from future attacks.

Try ANY.RUN for free – request a demo!

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More