New Infection Chain and ConfuserEx-Based Obfuscation for DarkCloud Stealer
Unit 42 researchers have identified a shift in the delivery method and obfuscation techniques used for distributing DarkCloud Stealer. The new infection chain, observed since April 2025, involves ConfuserEx obfuscation and a final payload written in Visual Basic 6. The attack begins with phishing emails containing compressed archives (TAR, RAR, or 7Z) that include JavaScript or Windows Script files. These files download and execute a PowerShell script, which then drops an executable protected by ConfuserEx. The final payload is a VB6 executable injected into a legitimate process using RunPE techniques. The malware employs various obfuscation methods, including anti-tampering, symbol renaming, and proxy call methods, to complicate analysis and evade detection.
AI Analysis
Technical Summary
The DarkCloud Stealer malware campaign has evolved with a new infection chain and enhanced obfuscation techniques identified by Unit 42 researchers as of April 2025. The attack begins with phishing emails containing compressed archive files (TAR, RAR, or 7Z) that include malicious JavaScript or Windows Script files. When executed, these scripts download and run a PowerShell script which subsequently drops an executable protected by ConfuserEx, a popular .NET obfuscator. The final payload is a Visual Basic 6 (VB6) executable that is injected into a legitimate process using RunPE (Run Portable Executable) techniques, a form of process hollowing that allows the malware to run stealthily within a trusted process context. This campaign leverages multiple advanced obfuscation methods such as anti-tampering, symbol renaming, and proxy call methods to evade detection and complicate reverse engineering efforts. The use of ConfuserEx obfuscation protects the intermediate executable, while the VB6 payload’s injection into legitimate processes helps avoid behavioral detection by endpoint security solutions. The malware’s tactics align with several MITRE ATT&CK techniques including command and scripting interpreter abuse (T1059.001, T1059.007), user execution via phishing (T1204.002), process injection (T1055, T1055.012), persistence mechanisms (T1547.001), and obfuscation (T1027 and sub-techniques). Although no known exploits or CVEs are associated with this campaign, the infection chain’s complexity and stealth capabilities make it a significant threat for targeted environments. Indicators of compromise include multiple file hashes and an IP address linked to command and control infrastructure.
Potential Impact
For European organizations, the DarkCloud Stealer campaign poses a considerable risk primarily through information theft. The malware’s ability to stealthily inject into legitimate processes and evade detection means that sensitive data such as credentials, personal identifiable information (PII), and intellectual property could be exfiltrated without immediate detection. The phishing-based delivery vector exploits common user behaviors, increasing the likelihood of successful infection across diverse sectors including finance, healthcare, government, and critical infrastructure. The use of compressed archives and scripting files may bypass some email security filters if not properly configured. Additionally, the obfuscation and anti-analysis techniques complicate incident response and forensic investigations, potentially delaying mitigation and increasing exposure time. This threat could also facilitate lateral movement within networks, enabling attackers to escalate privileges or deploy additional payloads. The medium severity rating reflects the campaign’s moderate ease of exploitation combined with impactful data theft capabilities, which can lead to reputational damage, regulatory fines under GDPR, and operational disruptions.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to this threat’s infection chain and evasion techniques. Specifically: 1) Enhance email security by deploying advanced sandboxing and attachment inspection capable of unpacking compressed archives (TAR, RAR, 7Z) and analyzing embedded scripts. 2) Enforce strict PowerShell execution policies and enable logging and monitoring of PowerShell activity to detect suspicious script downloads and executions. 3) Deploy endpoint detection and response (EDR) solutions with capabilities to detect process injection and RunPE techniques, focusing on anomalous behavior within legitimate processes. 4) Use application whitelisting to restrict execution of unauthorized scripts and executables, especially those originating from email attachments or temporary directories. 5) Conduct targeted user awareness training emphasizing the risks of opening compressed attachments and executing unknown scripts. 6) Maintain up-to-date threat intelligence feeds to block known malicious hashes and IP addresses associated with this campaign. 7) Implement network segmentation and strict egress filtering to limit malware communication with command and control servers. 8) Regularly audit and harden persistence mechanisms to detect and remove unauthorized registry or service modifications. These measures go beyond generic advice by addressing the specific infection vectors, obfuscation methods, and stealth techniques used by DarkCloud Stealer.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland
Indicators of Compromise
- hash: 92f3a9cd6fdc829b5239fb60acfa619f
- hash: b953abe62f49a3fc099aee0ff1027609
- hash: e4f6fbf6b952148147b14df27b48c124
- hash: 6d57b5dbe9adc1ea7224c11637a45427d8ffbbdb
- hash: b90df42f2218e59097a1df29cf5b8c88bb2e7922
- hash: edc7abadae7adf88e99dc5fc52cbb736bf3b6bdd
- hash: 24552408d849799b2cac983d499b1f32c88c10f88319339d0eec00fb01bb19b4
- hash: 2bd43f839d5f77f22f619395461c1eeaee9234009b475231212b88bd510d00b7
- hash: 6b8a4c3d4a4a0a3aea50037744c5fec26a38d3fb6a596d006457f1c51bbc75c7
- hash: 72d3de12a0aa8ce87a64a70807f0769c332816f27dcf8286b91e6819e2197aa8
- hash: 9588c9a754574246d179c9fb05fea9dc5762c855a3a2a4823b402217f82a71c1
- hash: bd8c0b0503741c17d75ce560a10eeeaa0cdd21dff323d9f1644c62b7b8eb43d9
- hash: ce3a3e46ca65d779d687c7e58fb4a2eb784e5b1b4cebe33dbb2bf37cccb6f194
- hash: f6d9198bd707c49454b83687af926ccb8d13c7e43514f59eac1507467e8fb140
- hash: fa598e761201582d41a73d174eb5edad10f709238d99e0bf698da1601c71d1ca
- ip: 176.65.142.190
New Infection Chain and ConfuserEx-Based Obfuscation for DarkCloud Stealer
Description
Unit 42 researchers have identified a shift in the delivery method and obfuscation techniques used for distributing DarkCloud Stealer. The new infection chain, observed since April 2025, involves ConfuserEx obfuscation and a final payload written in Visual Basic 6. The attack begins with phishing emails containing compressed archives (TAR, RAR, or 7Z) that include JavaScript or Windows Script files. These files download and execute a PowerShell script, which then drops an executable protected by ConfuserEx. The final payload is a VB6 executable injected into a legitimate process using RunPE techniques. The malware employs various obfuscation methods, including anti-tampering, symbol renaming, and proxy call methods, to complicate analysis and evade detection.
AI-Powered Analysis
Technical Analysis
The DarkCloud Stealer malware campaign has evolved with a new infection chain and enhanced obfuscation techniques identified by Unit 42 researchers as of April 2025. The attack begins with phishing emails containing compressed archive files (TAR, RAR, or 7Z) that include malicious JavaScript or Windows Script files. When executed, these scripts download and run a PowerShell script which subsequently drops an executable protected by ConfuserEx, a popular .NET obfuscator. The final payload is a Visual Basic 6 (VB6) executable that is injected into a legitimate process using RunPE (Run Portable Executable) techniques, a form of process hollowing that allows the malware to run stealthily within a trusted process context. This campaign leverages multiple advanced obfuscation methods such as anti-tampering, symbol renaming, and proxy call methods to evade detection and complicate reverse engineering efforts. The use of ConfuserEx obfuscation protects the intermediate executable, while the VB6 payload’s injection into legitimate processes helps avoid behavioral detection by endpoint security solutions. The malware’s tactics align with several MITRE ATT&CK techniques including command and scripting interpreter abuse (T1059.001, T1059.007), user execution via phishing (T1204.002), process injection (T1055, T1055.012), persistence mechanisms (T1547.001), and obfuscation (T1027 and sub-techniques). Although no known exploits or CVEs are associated with this campaign, the infection chain’s complexity and stealth capabilities make it a significant threat for targeted environments. Indicators of compromise include multiple file hashes and an IP address linked to command and control infrastructure.
Potential Impact
For European organizations, the DarkCloud Stealer campaign poses a considerable risk primarily through information theft. The malware’s ability to stealthily inject into legitimate processes and evade detection means that sensitive data such as credentials, personal identifiable information (PII), and intellectual property could be exfiltrated without immediate detection. The phishing-based delivery vector exploits common user behaviors, increasing the likelihood of successful infection across diverse sectors including finance, healthcare, government, and critical infrastructure. The use of compressed archives and scripting files may bypass some email security filters if not properly configured. Additionally, the obfuscation and anti-analysis techniques complicate incident response and forensic investigations, potentially delaying mitigation and increasing exposure time. This threat could also facilitate lateral movement within networks, enabling attackers to escalate privileges or deploy additional payloads. The medium severity rating reflects the campaign’s moderate ease of exploitation combined with impactful data theft capabilities, which can lead to reputational damage, regulatory fines under GDPR, and operational disruptions.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to this threat’s infection chain and evasion techniques. Specifically: 1) Enhance email security by deploying advanced sandboxing and attachment inspection capable of unpacking compressed archives (TAR, RAR, 7Z) and analyzing embedded scripts. 2) Enforce strict PowerShell execution policies and enable logging and monitoring of PowerShell activity to detect suspicious script downloads and executions. 3) Deploy endpoint detection and response (EDR) solutions with capabilities to detect process injection and RunPE techniques, focusing on anomalous behavior within legitimate processes. 4) Use application whitelisting to restrict execution of unauthorized scripts and executables, especially those originating from email attachments or temporary directories. 5) Conduct targeted user awareness training emphasizing the risks of opening compressed attachments and executing unknown scripts. 6) Maintain up-to-date threat intelligence feeds to block known malicious hashes and IP addresses associated with this campaign. 7) Implement network segmentation and strict egress filtering to limit malware communication with command and control servers. 8) Regularly audit and harden persistence mechanisms to detect and remove unauthorized registry or service modifications. These measures go beyond generic advice by addressing the specific infection vectors, obfuscation methods, and stealth techniques used by DarkCloud Stealer.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://unit42.paloaltonetworks.com/new-darkcloud-stealer-infection-chain"]
- Adversary
- null
- Pulse Id
- 6895174a78ee95e9d1394374
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash92f3a9cd6fdc829b5239fb60acfa619f | — | |
hashb953abe62f49a3fc099aee0ff1027609 | — | |
hashe4f6fbf6b952148147b14df27b48c124 | — | |
hash6d57b5dbe9adc1ea7224c11637a45427d8ffbbdb | — | |
hashb90df42f2218e59097a1df29cf5b8c88bb2e7922 | — | |
hashedc7abadae7adf88e99dc5fc52cbb736bf3b6bdd | — | |
hash24552408d849799b2cac983d499b1f32c88c10f88319339d0eec00fb01bb19b4 | — | |
hash2bd43f839d5f77f22f619395461c1eeaee9234009b475231212b88bd510d00b7 | — | |
hash6b8a4c3d4a4a0a3aea50037744c5fec26a38d3fb6a596d006457f1c51bbc75c7 | — | |
hash72d3de12a0aa8ce87a64a70807f0769c332816f27dcf8286b91e6819e2197aa8 | — | |
hash9588c9a754574246d179c9fb05fea9dc5762c855a3a2a4823b402217f82a71c1 | — | |
hashbd8c0b0503741c17d75ce560a10eeeaa0cdd21dff323d9f1644c62b7b8eb43d9 | — | |
hashce3a3e46ca65d779d687c7e58fb4a2eb784e5b1b4cebe33dbb2bf37cccb6f194 | — | |
hashf6d9198bd707c49454b83687af926ccb8d13c7e43514f59eac1507467e8fb140 | — | |
hashfa598e761201582d41a73d174eb5edad10f709238d99e0bf698da1601c71d1ca | — |
Ip
Value | Description | Copy |
---|---|---|
ip176.65.142.190 | — |
Threat ID: 68951b7cad5a09ad00fd30cc
Added to database: 8/7/2025, 9:32:44 PM
Last enriched: 8/7/2025, 9:48:15 PM
Last updated: 8/25/2025, 7:46:52 PM
Views: 10
Related Threats
Not Safe for Work: Tracking and Investigating Stealerium and Phantom Infostealers
MediumEthereum smart contracts used to push malicious code on npm
MediumGoogle Salesforce Breach: A Deep dive into the chain and extent of the compromise
MediumNew malware campaign discovered via ManualFinder
MediumMalicious Campaign Targeting Diplomatic Assets
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.