Dark Crystal Remote Access Trojan
First observed in early 2020, Dark Crystal (also known as DCRat) is an advanced C# and .NET based remote access trojan.
Summary
First observed in early 2020, Dark Crystal (also known as DCRat) is an advanced C# and .NET based remote access trojan.
Affected platforms
The following platforms are known to be affected:
Threat details
Dark Crystal affiliate users purchase it through a bespoke website accessible via the Tor network. Similarly to other malware-as-a-service tools, users are actually buying a builder application for Dark Crystal that allows them to customise it's configuration and deployment parameters. The builder also supplies a PHP file that is used to set up a command and control (C2) server for Dark Crystal. At the time of publication, several spam campaigns have been observed delivering Dark Crystal
Once delivered to a system, Dark Crystal will attempt to ensure persistence by editing several registry keys and injecting itself into a running process. It will then connect to the specified C2 server and await further commands. By default, Dark Crystal is able to:
- collect system and user information
- download, install, edit, delete, or transfer files
- record audio, video, and user inputs (mouse/keyboard)
- enumerate network drive numbers
- execute shell commands
- spawn and terminate process
- open URLs
A number of additional plugins to enhance Dark Crystal's capabilities are also available for purchase through it's website.
Remediation steps
| Type | Step |
|---|---|
|
To prevent and detect a trojan infection, NHS Digital advises that:
Please note that NCSC maintains guidance for securely configuring a wide range of end user device (EUD) platforms. For further details refer to their end user device security guidance pages. |
Indicators of compromise
Last edited: 29 June 2021 12:01 pm