Budget-priced RAT is surprisingly effective tool for hackers, say BlackBerry researchers

Share post:

One of the reasons the number of cyberattacks keeps escalating is the cost of hacking tools for threat actors keeps dropping. Software-as-a-service offerings are common, but some crooked developers keep the price of their tools low. According to researchers at BlackBerry, one is an inexpensive remote access trojan (RAT) that has been primarily sold on Russian language underground forums for over two years. Called DarkCrystal RAT (or DCRat for short), it’s a “surprisingly effective homemade tool for opening backdoors on a budget,” they said. “DCRat is one of the cheapest commercial RATs we’ve ever come across,” the researchers said in a blog released on Monday. “The price for this backdoor starts at 500 RUB (less than US$6) for a two-month subscription, and occasionally dips even lower during special promotions. No wonder it’s so popular with professional threat actors as well as script kiddies.” The blog is a backgrounder on the trojan, which includes details and indicators of compromise that threat hunters could find valuable. DCRat appears to have been developed and maintained by a single person going by the pseudonyms of “boldenis44,” “crystalcoder,” and Кодер (“Coder”), the researchers said. It includes a keylogger, and can also steal browser cookies, browser stored passwords, browser stored form content , stored credit cards (via Windows DPAPI & Chrome SQLite Database), clipboard contents, Discord tokens and more. There are also plugins available that enable data exfiltration/credential stealing, system manipulation and cryptocurrency mining. It also includes what BlackBerry calls primitive, multi-threaded code to perform different forms of denial of service attacks – including HTTP(S) POST, UDP and TCP – to a specific host and endpoint combination. DCRat’s modular architecture and bespoke plugin framework make it a very flexible option, the researchers said, helpful for a range of nefarious uses. This includes surveillance, reconnaissance, information theft, DDoS attacks, as well as dynamic code execution in a variety of different languages. Affiliates can generate their own client plugins, which can be downloaded and used by subscribers. The DCRat product itself consists of three components:
  • a stealer/client executable;
  • a single PHP page, serving as the command-and-control (C2) endpoint/interface;
  • an administrator tool. The administrator tool is a standalone executable written in the JPHP programming language, an obscure implementation of PHP that runs on a Java virtual machine.
The administrator tool and the backdoor/client are regularly updated with bug fixes and new features. During recent months, the researchers have often seen DCRat clients being deployed with the use of Cobalt Strike beacons through the Prometheus TDS (traffic direction system). Prometheus is a subscription-based malware service that has been used in many high-profile attacks, the blog says, including campaigns against U.S. government institutions in 2021. “The biggest, flashiest threat groups might get their name in lights, but they aren’t necessarily the cybercriminals that keep security practitioners up at night,” said BlackBerry. “Miscreants with too much time on their hands can often cause just as much hassle.” The post Budget-priced RAT is surprisingly effective tool for hackers, say BlackBerry researchers first appeared on IT World Canada.
Howard Solomon
Howard Solomonhttps://www.itworldcanada.com
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways