DarkCloud Stealer: Comprehensive Analysis of a New Attack Chain That Employs AutoIt
May 21, 2025, 8:05 p.m.
Description
Unit 42 researchers have identified a series of attacks distributing DarkCloud Stealer, an information-stealing malware that has been active since 2022. The latest attack chain incorporates AutoIt to evade detection and uses a file-sharing server to host the malware. The infection process begins with a phishing email containing a RAR archive or a PDF that downloads the archive. The archive contains an AutoIt-compiled executable that decrypts and executes the final DarkCloud Stealer payload. The malware steals sensitive data including browser passwords, credit card information, and email client credentials. It employs anti-analysis techniques and achieves persistence through registry modifications. The campaign has targeted various sectors, with a focus on government organizations, particularly in Poland.
Tags
Date
- Created: May 14, 2025, 4:58 p.m.
- Published: May 14, 2025, 4:58 p.m.
- Modified: May 21, 2025, 8:05 p.m.
Indicators
- bf3b43f5e4398ac810f005200519e096349b2237587d920d3c9b83525bb6bafc
- 9940de30f3930cf0d0e9e9c8769148594240d11242fcd6c9dd9e9f572f68ac01
- 30738450f69c3de74971368192a4a647e4ed9c658f076459e42683b110baf371
- 1269c968258999930b573682699fe72de72d96401e3beb314ae91baf0e0e49e8
Additional Informations
- Telecommunications
- Government
- Poland