

CVE-2025-24813 – Apache Tomcat Vulnerability
March 17, 2025
CVE-2024-57040 – TP-Link TL-WR845N Vulnerability
March 17, 2025
CVE-2025-24813 – Apache Tomcat Vulnerability
March 17, 2025
CVE-2024-57040 – TP-Link TL-WR845N Vulnerability
March 17, 2025Severity
High
Analysis Summary
DCRat, a Russian backdoor, was initially introduced in 2018 but rebuilt and relaunched a year later. The DCRat backdoor appears to be the product of a single threat actor who goes online with the pseudonyms of “boldenis44,” “crystalcoder,” and Кодер (“Coder”).
DCRat is one of the cheapest commercial RATs. For a two-month membership, the price starts at 500 RUB (less than 5 GBP/US $6), and it periodically drops even cheaper during special offers. This is written in .NET and features a modular structure, allowing affiliates to create their plugins using DCRat Studio, a dedicated integrated development environment (IDE).
The malware's modular architecture allows it to be extended for a variety of nefarious objectives, including surveillance, reconnaissance, data theft, DDoS attacks, and arbitrary code execution.
The DCRat consists of three parts:
- A stealer/client executable
- The command-and-control (C2) endpoint/ interface is a single PHP page
- An administrator tool
The malware is still in development, the author announces any news and updates through a dedicated Telegram channel with about 3k users updated with any news and changes.
To protect against the DarkCrystal RAT and similar threats, it is important to regularly update software and security patches, implement multi-factor authentication, be cautious when opening emails and attachments, and regularly back up important data. It is also important to run anti-virus software and to be aware of the signs of a RAT infection, such as unusual system activity or slow performance. If a system is suspected of being infected with the DarkCrystal RAT or any other RAT, it is important to take immediate action to isolate the system and to seek professional assistance in cleaning up the infection.
Impact
- Unauthorized Remote Access
- Keylogging
- Sensitive Information Theft
- Credential Theft
Indicators of Compromise
MD5
14d207455f3c58375386de4f35780f1f
9939a508443b50f3065506b3ef554c79
8799753790734ab065ddfdf5fadf4c9f
32f276ad6fdb00ff015b07cf5e90512d
SHA-256
36d52f4d3719a38a45bf61c75b32dd62db19375c0d85b54baa1a80c92865858c
2604fc4de987995cbc77b46bf86d49466fb65dd7dbee6b1b89fe343ef9b97617
c8af00d11b473b532868ad15bafda07122c04e69982c140533b693945b166090
ed5fba434b93f158f97cf4587bdfaa82dfc50090b6f05289d33d51d00dbb2bce
SHA1
e2e849dfd9bf2ec1bb270c035f0e60854ba84b56
5fae3003ff7f0930e51acad3d3f0cff25035c3ee
64bf9d7eadc069096c95fa363e36455545a529f1
27135104bd8ca4d107f7eda5b1fe1461c9e6e814
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.
- Patch and upgrade any platforms and software on time and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.