

Multiple D-Link DIR-823G Vulnerabilities
March 18, 2025
Multiple Fortinet Products Vulnerabilities
March 18, 2025
Multiple D-Link DIR-823G Vulnerabilities
March 18, 2025
Multiple Fortinet Products Vulnerabilities
March 18, 2025Severity
High
Analysis Summary
DCRat, a Russian backdoor, was initially introduced in 2018 but rebuilt and relaunched a year later. The DCRat backdoor appears to be the product of a single threat actor who goes online with the pseudonyms of “boldenis44,” “crystalcoder,” and Кодер (“Coder”).
DCRat is one of the cheapest commercial RATs. For a two-month membership, the price starts at 500 RUB (less than 5 GBP/US $6), and it periodically drops even cheaper during special offers. This is written in .NET and features a modular structure, allowing affiliates to create their plugins using DCRat Studio, a dedicated integrated development environment (IDE).
The malware's modular architecture allows it to be extended for a variety of nefarious objectives, including surveillance, reconnaissance, data theft, DDoS attacks, and arbitrary code execution.
The DCRat consists of three parts:
- A stealer/client executable
- The command-and-control (C2) endpoint/ interface is a single PHP page
- An administrator tool
The malware is still in development, the author announces any news and updates through a dedicated Telegram channel with about 3k users updated with any news and changes.
To protect against the DarkCrystal RAT and similar threats, it is important to regularly update software and security patches, implement multi-factor authentication, be cautious when opening emails and attachments, and regularly back up important data. It is also important to run anti-virus software and to be aware of the signs of a RAT infection, such as unusual system activity or slow performance. If a system is suspected of being infected with the DarkCrystal RAT or any other RAT, it is important to take immediate action to isolate the system and to seek professional assistance in cleaning up the infection.
Impact
- Unauthorized Remote Access
- Keylogging
- Sensitive Information Theft
- Credential Theft
Indicators of Compromise
MD5
1f45c2c2a2d1dbc3ec38c7de02f19011
2eb7cb2b1baabe0024266117f2dc0813
ca62a529da1715bd5de1982b13cd0ad3
bef86ce54b4bbe943fff95ff99f9bf43
2734c888bc64fb6cf1735ecead80bb90
SHA-256
bfcf4676695d66eb01963947af8d3748acbeb8a06de09d9b68cc10c8febe8419
e6d3de7d47f77f881290176df9198f2ec32761d46bf199004d7f768c47d4a1b6
3b1ab73c9108c027dd9389c57ab3ea0997577a02b9eaf948c4d7167e627ecbcc
e7d5e70d29f3ff426d9920a854794485c06c3c475fe2d6f19622b5787689c0bf
cf54a78c779697f6951c256b1628d9f0a9e6a7ddeb3a2d2444a678c55a3c3034
SHA1
0402d0c2cb396b25d8b4e931a63913c266a5c189
34268f2cc1629ef532c725b831d9967f600ffd2d
0b9df1c1929ee38d2df09a6120e0e4eb49fb3b99
568e206e3e03bf3d7480435762a185e3835002dd
12763b80a59be9328ec05d10b3e5abb2d07912f6
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.
- Patch and upgrade any platforms and software on time and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.