Skip to main content

New Infection Chain and ConfuserEx-Based Obfuscation for DarkCloud Stealer

Medium
Published: Thu Aug 07 2025 (08/07/2025, 21:14:50 UTC)
Source: AlienVault OTX General

Description

Unit 42 researchers have identified a shift in the delivery method and obfuscation techniques used for distributing DarkCloud Stealer. The new infection chain, observed since April 2025, involves ConfuserEx obfuscation and a final payload written in Visual Basic 6. The attack begins with phishing emails containing compressed archives (TAR, RAR, or 7Z) that include JavaScript or Windows Script files. These files download and execute a PowerShell script, which then drops an executable protected by ConfuserEx. The final payload is a VB6 executable injected into a legitimate process using RunPE techniques. The malware employs various obfuscation methods, including anti-tampering, symbol renaming, and proxy call methods, to complicate analysis and evade detection.

AI-Powered Analysis

AILast updated: 08/07/2025, 21:48:15 UTC

Technical Analysis

The DarkCloud Stealer malware campaign has evolved with a new infection chain and enhanced obfuscation techniques identified by Unit 42 researchers as of April 2025. The attack begins with phishing emails containing compressed archive files (TAR, RAR, or 7Z) that include malicious JavaScript or Windows Script files. When executed, these scripts download and run a PowerShell script which subsequently drops an executable protected by ConfuserEx, a popular .NET obfuscator. The final payload is a Visual Basic 6 (VB6) executable that is injected into a legitimate process using RunPE (Run Portable Executable) techniques, a form of process hollowing that allows the malware to run stealthily within a trusted process context. This campaign leverages multiple advanced obfuscation methods such as anti-tampering, symbol renaming, and proxy call methods to evade detection and complicate reverse engineering efforts. The use of ConfuserEx obfuscation protects the intermediate executable, while the VB6 payload’s injection into legitimate processes helps avoid behavioral detection by endpoint security solutions. The malware’s tactics align with several MITRE ATT&CK techniques including command and scripting interpreter abuse (T1059.001, T1059.007), user execution via phishing (T1204.002), process injection (T1055, T1055.012), persistence mechanisms (T1547.001), and obfuscation (T1027 and sub-techniques). Although no known exploits or CVEs are associated with this campaign, the infection chain’s complexity and stealth capabilities make it a significant threat for targeted environments. Indicators of compromise include multiple file hashes and an IP address linked to command and control infrastructure.

Potential Impact

For European organizations, the DarkCloud Stealer campaign poses a considerable risk primarily through information theft. The malware’s ability to stealthily inject into legitimate processes and evade detection means that sensitive data such as credentials, personal identifiable information (PII), and intellectual property could be exfiltrated without immediate detection. The phishing-based delivery vector exploits common user behaviors, increasing the likelihood of successful infection across diverse sectors including finance, healthcare, government, and critical infrastructure. The use of compressed archives and scripting files may bypass some email security filters if not properly configured. Additionally, the obfuscation and anti-analysis techniques complicate incident response and forensic investigations, potentially delaying mitigation and increasing exposure time. This threat could also facilitate lateral movement within networks, enabling attackers to escalate privileges or deploy additional payloads. The medium severity rating reflects the campaign’s moderate ease of exploitation combined with impactful data theft capabilities, which can lead to reputational damage, regulatory fines under GDPR, and operational disruptions.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy tailored to this threat’s infection chain and evasion techniques. Specifically: 1) Enhance email security by deploying advanced sandboxing and attachment inspection capable of unpacking compressed archives (TAR, RAR, 7Z) and analyzing embedded scripts. 2) Enforce strict PowerShell execution policies and enable logging and monitoring of PowerShell activity to detect suspicious script downloads and executions. 3) Deploy endpoint detection and response (EDR) solutions with capabilities to detect process injection and RunPE techniques, focusing on anomalous behavior within legitimate processes. 4) Use application whitelisting to restrict execution of unauthorized scripts and executables, especially those originating from email attachments or temporary directories. 5) Conduct targeted user awareness training emphasizing the risks of opening compressed attachments and executing unknown scripts. 6) Maintain up-to-date threat intelligence feeds to block known malicious hashes and IP addresses associated with this campaign. 7) Implement network segmentation and strict egress filtering to limit malware communication with command and control servers. 8) Regularly audit and harden persistence mechanisms to detect and remove unauthorized registry or service modifications. These measures go beyond generic advice by addressing the specific infection vectors, obfuscation methods, and stealth techniques used by DarkCloud Stealer.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://unit42.paloaltonetworks.com/new-darkcloud-stealer-infection-chain"]
Adversary
null
Pulse Id
6895174a78ee95e9d1394374
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash92f3a9cd6fdc829b5239fb60acfa619f
hashb953abe62f49a3fc099aee0ff1027609
hashe4f6fbf6b952148147b14df27b48c124
hash6d57b5dbe9adc1ea7224c11637a45427d8ffbbdb
hashb90df42f2218e59097a1df29cf5b8c88bb2e7922
hashedc7abadae7adf88e99dc5fc52cbb736bf3b6bdd
hash24552408d849799b2cac983d499b1f32c88c10f88319339d0eec00fb01bb19b4
hash2bd43f839d5f77f22f619395461c1eeaee9234009b475231212b88bd510d00b7
hash6b8a4c3d4a4a0a3aea50037744c5fec26a38d3fb6a596d006457f1c51bbc75c7
hash72d3de12a0aa8ce87a64a70807f0769c332816f27dcf8286b91e6819e2197aa8
hash9588c9a754574246d179c9fb05fea9dc5762c855a3a2a4823b402217f82a71c1
hashbd8c0b0503741c17d75ce560a10eeeaa0cdd21dff323d9f1644c62b7b8eb43d9
hashce3a3e46ca65d779d687c7e58fb4a2eb784e5b1b4cebe33dbb2bf37cccb6f194
hashf6d9198bd707c49454b83687af926ccb8d13c7e43514f59eac1507467e8fb140
hashfa598e761201582d41a73d174eb5edad10f709238d99e0bf698da1601c71d1ca

Ip

ValueDescriptionCopy
ip176.65.142.190

Threat ID: 68951b7cad5a09ad00fd30cc

Added to database: 8/7/2025, 9:32:44 PM

Last enriched: 8/7/2025, 9:48:15 PM

Last updated: 8/25/2025, 7:46:52 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats