""ET TROJAN DarkCrystal Rat Stealer Data Exfiltration Activity""

SID: 2037132

Revision: 2

Class Type: trojan-activity

Metadata: affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, attack_target Client_Endpoint, created_at 2022_06_27, deployment Perimeter, deployment SSLDecrypt, malware_family DarkCrystal, signature_severity Major, updated_at 2023_04_04, reviewed_at 2024_01_02

Reference:

Protocol: tcp

Source Network: $HOME_NET

Source Port: any

Destination Network: $EXTERNAL_NET

Destination Port: $HTTP_PORTS

Flow: established,to_server

Contents:

  • Value: "POST"

  • Value: "|2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d|WebKitFormBoundary" Depth: 30

  • Value: "|0a 0d 0a 50 4b 03 04|"

  • Value: "Information|20 5b|"

  • Value: "|5d 2e|txt"

  • Value: "Screenshots|2f|Screenshot|23|DISPLAY"

Within: 200

PCRE: "/[A-Za-z0-9]{16}\x0d\x0a/Content|2d|Disposition|3a|/R"

Special Options:

  • http_method

  • file_data

source