Verticals Targeted: Consumer Services
What is DcRAT?
DcRAT is a clone of AsyncRAT and is used for remote access and stealing information. It also has ransomware capabilities. DcRAT has distributed via adult content-themed lures, including lures for OnlyFans pages. Lure file names suggest the victims were lured with the promise of photos or OnlyFans content for adult film actresses.
Victims of the attack were lured into downloading Zip files that contained a VBScript loader. The file must be manually executed. The VBScript loader uses a legitimate printer-related Windows script that is modified to hide the loader. The loader contains the DcRAT payload and shellcode. The payload is injected into RegAsm.exe.
While DcRAT is based on AsyncRAT, it includes multiple plugins to extend functionality. DcRAT capabilities include keylogging, remote access, webcam monitoring, file manipulation, a stealer that targets browser credentials and cookies, a Discord token stealer, and a ransomware plugin. Files encrypted by the ransomware plugin are appended with the DcRat extension. The ransomware plugin also drops a ransom note.
IOCs
PolySwarm has multiple samples associated with DcRAT.
Da642fc983f09b106c32181f7e66d0cad426924650594ca613e5ce5b25b71493
2d2211d9266e7080e6e12d150829935a3f0794e4d499199f9c7480de02b458d7
c344723295279aaaf2a4220a77d74db903985264cf3adfba5015f9f31f0dddec
You can use the following CLI command to search for all DcRAT samples in our portal:
$ polyswarm link list -f DcRAT
Don’t have a PolySwarm account? Go here to sign up for a free Community plan or to subscribe.
Contact us at hivemind@polyswarm.io | Check out our blog | Subscribe to our reports