This article was originally published on ThreatChain — decentralized threat intelligence.
A modular RAT that's been around for years and keeps evolving. Latest tricks inside.
Picture this: you download what looks like a normal program — maybe a game crack, a free tool, or a file that came attached to a convincing email. Nothing seems wrong. Your computer doesn't slow down. No scary pop-ups. But from that moment on, someone on the other side of the world can see everything on your screen, read every password you type, and quietly rummage through your files like a burglar who moved into your attic.
That's what DCRat does. And a fresh sample just showed up on threat tracking platforms, flagged by 58 out of 76 antivirus engines — meaning even with that level of detection, it's still actively being distributed and it's still catching people off guard.
What Is DCRat, Exactly?
DCRat (short for "Dark Crystal RAT") is a remote access trojan — a type of malware that gives an attacker full remote control of your computer. Think of it like someone installing a hidden TeamViewer on your machine without your knowledge or permission.
What makes DCRat especially alarming isn't its sophistication. It's its accessibility. DCRat has been sold on underground forums for as little as $5. That means the person targeting you doesn't need to be a skilled hacker. They could be a teenager, a low-level scammer, or anyone with a few dollars and a YouTube tutorial. The malware comes with a slick control panel — point and click — and a plugin system that lets buyers add features like a menu at a fast-food restaurant. Want to steal browser passwords? There's a plugin. Want to record keystrokes? Plugin. Want to deploy ransomware? Plugin for that too.
This isn't theoretical. DCRat has been linked to thousands of infections worldwide, and it keeps evolving.
This Specific Sample: What We Know
ThreatChain flagged a new DCRat sample on April 6, 2026, originating from infrastructure in the Netherlands. Here's a quick snapshot:
| Detail | Value |
|---|---|
| File type | Windows .exe (32-bit, built with .NET) |
| File size | ~848 KB |
| Detection rate | 58 out of 76 antivirus engines flagged it |
| Threat label | trojan.dcrat/msil |
| SHA-256 | ecbbd25448979c877212160fc82b92a1aa2c5cf1f0f525632100a5435138b48e |
The file has appeared under multiple names — mswinruntime.exe, RamDyn.exe, libGLESv2.dll, among others — which tells us the people distributing it are disguising it as different things to trick different victims. One name mimics a Microsoft Windows component. Another mimics a graphics library used by Chrome and other browsers. The idea is simple: if the file name looks familiar and legitimate, you're less likely to question it.
How It Gets Past Your Defenses
This sample uses a couple of clever tricks worth understanding.
First: obfuscation with .NET Reactor. The malware is written in C# (a common programming language), and its code has been scrambled using a tool called .NET Reactor. Imagine someone wrote a letter in English, then ran it through a cipher so it looks like gibberish — but your computer can still "read" it just fine. This makes it harder for security researchers and antivirus programs to quickly understand what the code actually does.
Second: PowerShell and command-line abuse. Once running, the malware uses PowerShell — a powerful built-in Windows tool that IT admins use every day — to execute hidden commands. It's like a burglar using your own tools from the garage to break into your safe. Because PowerShell is a legitimate Windows feature, many security tools don't automatically block it.
Third: persistence. One of the detection tags on this sample is auto-sch, which points to the malware creating scheduled tasks — basically telling Windows, "Hey, run this program again every time the computer starts up, or every few minutes." It's the digital equivalent of the burglar making a copy of your house key. You can close the front door, but they're coming back in.
What Can DCRat Actually Do to You?
Once installed, DCRat can:
- Log every keystroke — capturing passwords, credit card numbers, private messages, everything you type
- Take screenshots of your desktop at regular intervals
- Steal saved passwords and cookies from your browsers — potentially giving attackers access to your email, bank accounts, and social media
- Access your files — downloading documents, photos, or anything else on your hard drive
- Install additional malware — including ransomware (digital kidnapping of your files for money)
- Use your webcam and microphone — yes, they can watch and listen
For a small business, this could mean stolen client data, compromised financial accounts, or a ransomware attack that halts operations for days. For an individual, it could mean drained bank accounts, identity theft, or deeply invasive surveillance.
The detection tag VECT_Ransomware on this sample is a red flag that this particular build may include ransomware capabilities or be used as a first stage — the attacker gets in with DCRat, looks around, and then deploys ransomware when they're ready.
Who's at Risk?
Honestly? Almost anyone running Windows. But DCRat tends to spread through:
- Pirated software and game cracks — far and away the most common delivery method
- Phishing emails with attachments or links disguised as invoices, shipping notices, or job offers
- Fake downloads on sketchy websites promising free versions of paid tools
- Discord and Telegram — the malware has been distributed through links in group chats and direct messages
If you're a small business without a dedicated IT security team, you're in the sweet spot of DCRat's target audience. You have valuable data, and you may not have the monitoring in place to catch a quiet infection.
What You Can Do Right Now
You don't need an enterprise security budget to protect yourself from DCRat. Here are five concrete steps:
Don't download pirated software. Period. This is the number-one way DCRat spreads. That "free" Photoshop crack could cost you everything on your hard drive. If a deal looks too good to be true, it's probably malware in a trench coat.
Keep Windows and your antivirus updated. This sample is detected by 58 out of 76 engines — that's most major antivirus programs. But only if they're up to date. Turn on automatic updates for both Windows and your security software.
Be skeptical of email attachments and unexpected files. Even if an email looks like it's from someone you know, if you weren't expecting an attachment, verify before opening. A quick phone call or text could save you weeks of cleanup.
Back up your files regularly — and keep backups disconnected. If DCRat drops ransomware, your backup is your lifeline. Use an external drive or a cloud backup service, and make sure at least one copy isn't permanently connected to your computer (so the malware can't encrypt it too).
Check your scheduled tasks occasionally. On Windows, you can open Task Scheduler (just search for it in the Start menu) and look for anything unfamiliar that's set to run automatically. If you see entries you don't recognize — especially ones running
.exefiles from unusual locations likeAppDataorTempfolders — investigate or ask someone who can help.
The Bottom Line
DCRat isn't the most advanced malware out there. It doesn't need to be. Its power comes from being cheap, easy to use, and endlessly customizable — a toolkit that puts serious hacking capabilities in the hands of anyone willing to spend a few dollars. This specific sample, wrapped in layers of obfuscation and disguised under trusted-sounding file names, is a reminder that the most dangerous threats are often the ones designed to look completely ordinary.
Stay curious, stay cautious, and when in doubt — don't click.
Have questions about this sample or want to look it up yourself? Search for SHA-256 ecbbd25448979c877212160fc82b92a1aa2c5cf1f0f525632100a5435138b48e on VirusTotal or check the ANY.RUN analysis for a detailed behavioral breakdown.
Top comments (0)