DarkCloud Stealer: Comprehensive Analysis of a New Attack Chain That Employs AutoIt

Unit 42 researchers have identified a series of attacks distributing DarkCloud Stealer, an information-stealing malware that has been active since 2022. The latest attack chain incorporates AutoIt to evade detection and uses a file-sharing server to host the malware. The infection process begins with a phishing email containing a RAR archive or a PDF that downloads the archive. The archive contains an AutoIt-compiled executable that decrypts and executes the final DarkCloud Stealer payload. The malware steals sensitive data including browser passwords, credit card information, and email client credentials. It employs anti-analysis techniques and achieves persistence through registry modifications. The campaign has targeted various sectors, with a focus on government organizations, particularly in Poland. Author: AlienVault

Related Tags:
DarkCloud Stealer

anti-analysis

T1566.001

T1555

T1528

Poland

T1539

T1552

T1518

Associated Indicators:
BF3B43F5E4398AC810F005200519E096349B2237587D920D3C9B83525BB6BAFC

1269C968258999930B573682699FE72DE72D96401E3BEB314AE91BAF0E0E49E8

30738450F69C3DE74971368192A4A647E4ED9C658F076459E42683B110BAF371