Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

DCRat

23
Global rank
14 infographic chevron month
Month rank
15
Week rank
0
IOCs

DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common.

RAT
Type
ex-USSR
Origin
1 July, 2018
First seen
28 October, 2025
Last seen
Also known as
Dark Crystal RAT

How to analyze DCRat with ANY.RUN

RAT
Type
ex-USSR
Origin
1 July, 2018
First seen
28 October, 2025
Last seen

IOCs

IP addresses
79.137.248.10
46.246.82.12
46.246.84.4
192.169.69.26
46.246.84.5
18.158.249.75
18.231.93.153
46.246.84.11
54.94.248.37
3.125.102.39
46.246.4.12
46.246.84.2
46.246.84.12
46.246.84.8
46.246.82.5
193.161.193.99
141.95.84.40
46.246.6.6
18.229.146.63
3.131.147.49
Hashes
9efb48310fa619073974a5f84862a0b94f22e16316f2d2be2f5169473fd51aa6
71a7cf2805bff765a69cac1bbab13e52e84a5c9144680c165c0900a12241b56f
4e1742205a1c552dc1978d9b2bd12354ca58095c3c5588539383555f406b9504
5d5c7957342dd3060c72914767f812943f19b6f3815c5bc06331ba7b6bf8c1f9
a798c49ced9c0257bcde5ed1a09d4b07f64c0c41f5027c5cf7cf65fc7b1c9cc4
7489a38119ed1842deea4e4def8c9fa8129b5d652bf4e6bc76e7ada9f8c0367d
9c87ade4ce7abb2983a8925810ef2c85eb73dc99dfebee2d0ee4dfcb720a4757
7dd2fed0e0b6881c15345028d63ca5e4f2364e6d59602f0a4bb60dc10feddb64
663064253d950f0bf09872b96f7ae51b34d146a38a09501e0bf69e0ab1a9410b
90daa21921c8ca1eabcbb3e6c957d912c80809050537e688530b202bd81bfc57
70ed31ade19e8fd3b30e4559fe0bb638c90d62a4a46c63f73f3e864f8a450e35
5a4da648e73e933df3992ef57b48cf382ba9b5630a5aa2b08c561bd603f3792f
b3b75160d70e5544ef4b2616868e37690524c38081b9605942ebdb5237e0908b
344b141fa49480280ec4d213e9a5aaebb79fbf3c8bd34f3e31752589760b38c2
6bff81787fb052dc05af00f565f8dd6391082d592a0aa06c2cdac4bb00f1467f
55e30365b67cab253ec7b5d2c18020f459bedeee895e0f9b5eb13f8b0d359668
6f4b751127c49c951b738f2e3a655ce8f0bac20eba86d3920c0d8b0bdc77ef66
0381298b78d11d3142eea5db3729688fcec55f79308acdc7556944dfb82a1a02
620bdfd77953d3ad34213b83374fead5b8b4de88170d95ad450b98078393704d
11badbbb08b354996847fd42b2eb36d08ba78a3022c66ab4032b611cb90c3fad
Domains
qweiozmnxvla.click
qwenmzlxktyu.click
8hdfiqowchq.click
plmzxqwieruo.click
zxvnqwejlkgh.click
confirm-id17.com
zmxncvaoiwqe.click
hacvietsherwin.com
capitalestates.es
8fnuawbfuac.click
8eh18dhq9wd.click
manitouturkiye.com
8nioqhxciwoqc.click
hkfasfsafg.click
8fhd2idhacas.click
tridevresins.com
maltashopping24.com
brokaflex.com
ktc2005.com
qowuensmzxcv.click
URLs
http://77.91.77.81/Kiru9gu/index.php
http://f0313002.xsph.ru/i8o3dpqzfhi0h1zuwbs87cozkck4pi7dsxtwlxnya97sv/vjewqv5vpf4bzled3my19s6feqn0re0bj37ik4iw/a6og1in0rwvrufpq62df5c5/4252effa0748f9143bb1dc7393f7d3a4.php
http://f0313002.xsph.ru/i8o3dpqzfhi0h1zuwbs87cozkck4pi7dsxtwlxnya97sv/vjewqv5vpf4bzled3my19s6feqn0re0bj37ik4iw/d35e350f7ff23054dccf4d29e28adb71b4eb540f.php
http://f0313002.xsph.ru/i8o3dpqzfhi0h1zuwbs87cozkck4pi7dsxtwlxnya97sv/vjewqv5vpf4bzled3my19s6feqn0re0bj37ik4iw/a6og1in0rwvrufpq62df5c5/552b13e67562d7b564b8a0ac9f35c735d17c786b.05dd3a5fef160cec39ca4febe43825be
http://89.185.85.106/External48Poll/better72/eternal24Temporary/BaseBaseauth/BetterApipoll/_/Cpu0Httptrack/windowsTestcentral.php
http://46.149.77.33/vmAsync/GamevmLongpoll/Track/79Poll/7/Image/2LongpollBetter/Eternal/VoiddbSecure/packetpollProcess/voiddblongpoll1Image/central/Js8Server2/Sqluniversal/trafficdefault/Low_/temporaryCpu/GameLineCpuGame/Linuxlocal.php
http://149688.clmonth.nyashteam.top/nyashsupport.php
http://61839.clmonth.nyashteam.ru/nyashsupport.php
http://9463949.clmonth.whiteproducts.ru/WhiteProducts.php
http://78.153.145.153/AuthtrafficWp.php
http://212.109.194.187/RequestUpdatedefaultDownloads.php
http://92.63.107.12/Poll/Phptrack8request/6python7Uploads/Lowtemporarypoll0/public/Proton/0Default/videoflower.php
http://896447.clmonth.nyashteam.top/nyashsupport.php
http://ct40343.tw1.ru/_Defaultwindows.php
http://a0816539.xsph.ru/_Defaultwindows.php
http://217.196.96.4/db0/authserverHttp1/MariadbDle/Temp/WpJs/better/better4/_/1/privateWpauth/ProcessorVoiddb57/processor/SecureDatalife/Pollgeotemp.php
http://night79.site/Flowerlocal.php
http://night79.site/Imagevmbigload/aaa48e48a10aeefea9610a67d4846b46208c7562-bb1e3415a4f66b9cd4262f4421b173b3f2ed3d69
http://802772.clmonth.nyashteam.top/nyashsupport.php
http://37.46.130.13/FlowerVideo21/apiMulti/voiddb3/httpprivatepacketCentral/WindowsDumpjavascriptDb/Lineapigenerator1/93DatalifeLocal/64Geojavascript/locallow66/Async/tempdownloads.php
Last Seen at
Last Seen at

Recent blog posts

post image
5 SOC Challenges and How Threat Intelligence...
watchers 220
comments 0
post image
ANY.RUN Recognized as Threat Intelligence Com...
watchers 550
comments 0
post image
ANY.RUN & ThreatQ: Boost Detection Rate,...
watchers 504
comments 0

What is DCRat malware?

DCRat, also known as Dark Crystal RAT, is a remote access trojan (RAT) that lets threat actors take control over an infected machine and extract users’ data, such as the information copied to the clipboard and personal credentials from apps. The malware is known for its stealthiness and its ability to evade detection by security software. DCrat has been in operation since 2018, yet it regularly undergoes changes aimed at advancing and expanding its capabilities.

The malware consists of several components each responsible for a certain type of malicious activity, including stealing of cryptocurrency and keylogging. On top of that, the authors of DCrat have published a special software called DCRat Studio, which serves as a tool for developing new modules for the malware.

DCrat's popularity can be attributed in part to its low cost. Its one-month license goes for a mere $5, while a lifetime one is available for $40. This is a stark contrast to other malware-as-a-service options. For instance, a lifetime AgentTesla subscription will require forking out $120. According to researchers, such prices are due to the malware being simply a pet project of a single developer, who does not work on it full-time. The developer is likely based in the ex-USSR region.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Technical details of the DCRat malicious software

Although back in 2018, the malicious program utilized Java, it switched to C# in 2019. As a result, nowadays, the majority of Dark Crystal RAT’s modules are written in the C# programming language. However, the administrative server for this malware is developed with JPHP, which is an implementation of PHP that relies on the Java Virtual Machine.

Different samples of the malware have been observed to be outfitted with evasion and obfuscation techniques. For instance, in order to create a layer of protection against malware analysts’ attempts to reverse engineer its code, DCrat’s payload can be obfuscated with Enigma Protector.

The standard set of tools available to threat actors using DCrat includes:

  • DCRat can record the victim's keystrokes, which can be used to steal passwords and other sensitive information.
  • The separate CryptoStealer module of the malware allows attackers to get access to users’ crypto wallet information.
  • It can collect information about the system (CPU and GPU stats, etc.)
  • It can take screenshots of the victim's computer, which can be used to monitor their activity.
  • DCRat can exfiltrate information from browsers, such as session cookies, auto-fill credentials, and credit card details.
  • The malware can transmit the contents of the victim's clipboard to its command-and-control server (C&C).
  • It can hijack Telegram, Steam, Discord accounts.
  • DCrat can function as a loader, dropping other types of malware on the infected computer.

Additionally, DCrat can execute a persistence algorithm to retain control over the system. For instance, the malware can copy itself to a random running process and to the root directory (C:). It then can create shortcuts to these copies in the user's Startup folder. It can also add registry values that point to these shortcuts. This allows DCrat to start automatically when the computer boots up.

It is important to note that Dark Crystal RAT is polymorphic, meaning that attackers can use its builder functionality to add changes to the malware’s code to make it difficult to detect using traditional methods, such as file hash.

Execution process of DCRat

Uploading Dark Crystal RAT to the ANY.RUN sandbox lets you quickly see the malicious activities triggered by the malware. Here is a sample of DCrat executed in the interactive sandbox.

DCrat's flexibility makes it challenging to handle, but there are things that can help us pinpoint it. For example, DCrat rarely produces malicious activity in its current process. Like most malware, it prefers to create large process trees and then infiltrate a harmless process at some point to detonate later. By using ANY.RUN, we can easily identify the process targeted by the malware.

DCRat process tree DCRat's process tree

On top of that, it can delay execution for a period of time after the infection, drop executables, run embedded payloads, and use WMI queries to detect a virtualized environment or or to gain persistence in the system.

DCRat process tree DCRat's WMI queries

Distribution methods of the DCRat malware

Since Dark Crystal RAT is sold openly on the Internet, cyber criminals of all skill levels have access to it. Subsequently, there are many different methods they implement to drop the payload on victims’ computers. Yet, as is the case with most remote access trojans, including Vidar, njRAT, and QuasarRAT, DCrat’s main way of infecting a system is via phishing emails.

Threat actors devise sophisticated multi-staged attacks intended to manipulate the victim into believing that the fake email is actually legitimate and the attachment file it contains is safe to open. These downloadable files are usually in an office suite format, such as .docx or .xls, and have built-in macros or other mechanisms that can trigger the chain reaction which will result in DCRat being dropped onto the system.

There are also accounts of users unsuspectingly downloading a DCrat executable from websites distributing torrent files. In such cases, the malware can be disguised as a legitimate program. Once executed, the program installs the malicious program and runs it, stealing the user’s data often without them being aware of it.

Conclusion

Dark Crystal RAT is a remote access trojan that constitutes a significant concern for organizations and individuals worldwide. The malware’s low price tag and modular design make it an in-demand tool among cyber criminals. To protect your system from DCrat, you should be very careful about opening links or attachments from unknown senders.

Instead of taking the risk of downloading and opening potentially harmful files or clicking on malicious links, you can first analyze them in a sandbox environment like ANY.RUN. This will allow you to quickly and safely determine whether the file is malicious or not. ANY.RUN will also provide you with a detailed report about the malware, including its indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs). This information can be used to protect your organization from future attacks.

Try ANY.RUN for free – request a demo!

HAVE A LOOK AT

MassLogger screenshot
MassLogger
masslogger
MassLogger is a credential stealer and keylogger first identified in April 2020. It has been actively used in cyber campaigns to exfiltrate sensitive information from compromised systems. It is designed for easy use by less tech-savvy actors and is prominent for the capability of spreading via USB drives. It targets both individuals and organizations in various industries, mostly in Europe and the USA.
Read More
XRed screenshot
XRed
xred
XRed operates as a stealthy backdoor, enabling cybercriminals to gain unauthorized remote access to infected systems. XRed has gained particular notoriety for its distribution through trojanized legitimate software and hardware drivers, making it exceptionally dangerous due to its ability to masquerade as trusted applications.
Read More
Jigsaw screenshot
Jigsaw
jigsaw
The Jigsaw ransomware, initially detected in 2016, encrypts files on compromised systems and requires a ransom payment in Bitcoin. If the ransom is not paid, the malware starts deleting files, increasing the pressure on victims to comply. Its source code is publicly accessible, allowing various threat actors to customize and repurpose the malware for different objectives.
Read More
SSLoad screenshot
SSLoad
ssload
SSLoad is a malicious loader or downloader that is used to infiltrate target systems through phishing emails, perform reconnaissance and transmit it back to its operators delivering malicious payloads. To avoid detection, SSLoad employs various encryption methods and delivery techniques highlighting its versatile nature and complexity. It is believed to be a part of Malware-as-a-Service (MaaS) operation given its diverse delivery methods and implemented techniques.
Read More
Sality screenshot
Sality
sality
Sality is a highly sophisticated malware known for infecting executable files and rapidly spreading across networks. It primarily creates a peer-to-peer botnet that is used for malicious activities such as spamming, data theft, and downloading additional malware. Sality has strong persistence mechanisms, including disabling security software, making it difficult to remove. Its ability to spread quickly and silently, along with its polymorphic nature, allows it to evade detection by traditional antivirus solutions.
Read More
ACR Stealer screenshot
ACR Stealer is a modern information-stealing malware designed to harvest sensitive data from infected devices. Like other infostealers, it targets credentials, financial details, browser data, and files, enabling cybercriminals to monetize stolen information through direct fraud or underground market sales.
Read More