

Rewterz Threat Advisory – Multiple Adobe InDesign Vulnerabilities
May 11, 2022
Rewterz Threat Advisory – CVE-2022-28819 – Adobe Character Animator Vulnerability
May 11, 2022
Rewterz Threat Advisory – Multiple Adobe InDesign Vulnerabilities
May 11, 2022
Rewterz Threat Advisory – CVE-2022-28819 – Adobe Character Animator Vulnerability
May 11, 2022Severity
High
Analysis Summary
DCRat – a Russian backdoor, was initially introduced in 2018, but rebuilt and relaunched a year later. The DCRat backdoor appears to be the product of a single threat actor who goes online with the pseudonyms of “boldenis44,” “crystalcoder,” and Кодер (“Coder”).
DCRat is one of the cheapest commercial RATs. For a two-month membership, the price starts at 500 RUB (less than 5 GBP/US$6), and it periodically drops even cheaper during special offers. This is written in .NET and features a modular structure, allowing affiliates to create their own plugins using DCRat Studio, a dedicated integrated development environment (IDE).
The malware’s modular architecture allows it to be extended for a variety of nefarious objectives, including surveillance, reconnaissance, data theft, DDoS attacks, and arbitrary code execution.
The DCRat consists of three parts:
- A stealer/client executable
- The command-and-control (C2) endpoint/ interface is a single PHP page
- An administrator tool
The malware is still in development, the author announces any news and updates through a dedicated Telegram channel with about 3k users updated with any news and changes.
Impact
- Unauthorized Remote Access
- Keylogging
- Information Theft
- Password Theft
Indicators of Compromise
Domain Name
- dcrat[.]ru
- crystalfiles[.]ru
MD5
- 15a1eb360159ae7906efb9562ee664cb
- 29fb61de3e11e1db3e65ca5fdef6e542
- 8a1764d0affe8740407b93040fc639d4
- 89bf0f7e9adf290c6d571eccf79206a9
- aa84f91edd922e7b3bb979e663c94f1a
- 569052631a6b80c1c6a336c10c978b02
- 9a2ea4da5eec75298f16ba444d3a98d6
- 0b4dbf61a98f3e34cdd3a1b08a6a4609
- bbc5441ecd131f5a98dff8be2ebc5294
- e8b39f250fb67e115e07e9eac5c99708
SHA-256
- 6014d44d8f7da00f03db051b3dcea9a03ec3837977118c69a4512ef558a6df2a
- 914cca033fc8ca52830a21b5dca55263cee1e74ab5571702906ee9c25aedafd7
- 812cd4b5e80bc4e83a2e01a6f3fb24346ecf57dcaf8ff6fc3e55a2a6b953da23
- b11ad1adfa96eacf5f18cf87785884947a6d35a1baebf4f20f16402b04d5109f
- 38274608d5a4b53ec22f8099f798ba46ce0ed41db65a33dfb3853f0dbf849f6f
- c41cd461470ff3c936e225cea37e5190cb06e3cd70a3d76ca8e5d3aceead5493
- 2293fe261d5c6f5f2a33004b11f068037677b7aa5a6f792031e31555f31f0d69
- e817802f166662a7df0b144571354d74b10e34d120f91ae9d84ca3ba925241c6
- 78684aea83b1a5c402a87ba0ce2e7ad5b0338462cc804e97369203ce53d29834
- d634cde09d1aa1320a1d4c589d35d306f8350129faf225b2bca394128c2c4442
SHA-1
- a229e40ceaa5d9f18d0e2fd9040caaa7330457f0
- 7101c467e214e39cebb281e98e8009b3f64ec411
- ea4e4925abf5d7d2e7488850efe8cecaaf8471ea
- 65f95791234ff93bc3e35f1d35d7a6664872dc56
- da46b9962a6c6cceef38c3e11b8b5bc9c1b536fa
- 4bc411b19536c90a6ea0917d7d93f3f6560ee6f0
- f4f790430556e36d418498cd2f3112d04dabf877
- 73587f1f5d040541b230513d22d696513dbd4cf9
- f90e309443dc760359e69102f366496a53c307d8
- 51bf6ab0baa3a4c6f45be46011baa8ccd7ceaf8f
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.