New Infection Chain and ConfuserEx-Based Obfuscation for DarkCloud Stealer

Aug. 10, 2025, 7:40 p.m.

Description

Unit 42 researchers have observed changes in the distribution and obfuscation techniques of DarkCloud Stealer. The new infection chain, first seen in April 2025, involves ConfuserEx obfuscation and a final payload written in Visual Basic 6. The attack begins with a phishing email containing an archive file, which leads to the download and execution of a PowerShell script. This script then drops an executable protected by ConfuserEx, which ultimately injects the DarkCloud Stealer payload into a legitimate process. The malware employs various anti-analysis techniques, including encryption and obfuscation of strings. These changes highlight the evolving evasion strategies of cybercriminals and underscore the need for advanced, behavior-based threat detection approaches.

Date

  • Created: Aug. 8, 2025, 8 a.m.
  • Published: Aug. 8, 2025, 8 a.m.
  • Modified: Aug. 10, 2025, 7:40 p.m.

Indicators

  • fa598e761201582d41a73d174eb5edad10f709238d99e0bf698da1601c71d1ca
  • f6d9198bd707c49454b83687af926ccb8d13c7e43514f59eac1507467e8fb140
  • ce3a3e46ca65d779d687c7e58fb4a2eb784e5b1b4cebe33dbb2bf37cccb6f194
  • 72d3de12a0aa8ce87a64a70807f0769c332816f27dcf8286b91e6819e2197aa8
  • bd8c0b0503741c17d75ce560a10eeeaa0cdd21dff323d9f1644c62b7b8eb43d9
  • 9588c9a754574246d179c9fb05fea9dc5762c855a3a2a4823b402217f82a71c1
  • 6b8a4c3d4a4a0a3aea50037744c5fec26a38d3fb6a596d006457f1c51bbc75c7
  • 2bd43f839d5f77f22f619395461c1eeaee9234009b475231212b88bd510d00b7
  • 24552408d849799b2cac983d499b1f32c88c10f88319339d0eec00fb01bb19b4
  • 176.65.142.190

Attack Patterns