New Infection Chain and ConfuserExBased Obfuscation for DarkCloud Stealer

Unit 42 researchers have observed changes in the distribution and obfuscation techniques of DarkCloud Stealer. The new infection chain, first seen in April 2025, involves ConfuserEx obfuscation and a final payload written in Visual Basic 6. The attack begins with a phishing email containing an archive file, which leads to the download and execution of a PowerShell script. This script then drops an executable protected by ConfuserEx, which ultimately injects the DarkCloud Stealer payload into a legitimate process. The malware employs various anti-analysis techniques, including encryption and obfuscation of strings. These changes highlight the evolving evasion strategies of cybercriminals and underscore the need for advanced, behavior-based threat detection approaches. Author: AlienVault

Related Tags:
visual basic 6

DarkCloud Stealer

process hollowing

T1553.002

infection chain

anti-analysis

T1573.001

T1036.005

T1027.002

Associated Indicators:
F6D9198BD707C49454B83687AF926CCB8D13C7E43514F59EAC1507467E8FB140

9588C9A754574246D179C9FB05FEA9DC5762C855A3A2A4823B402217F82A71C1

FA598E761201582D41A73D174EB5EDAD10F709238D99E0BF698DA1601C71D1CA

24552408D849799B2CAC983D499B1F32C88C10F88319339D0EEC00FB01BB19B4

6B8A4C3D4A4A0A3AEA50037744C5FEC26A38D3FB6A596D006457F1C51BBC75C7

2BD43F839D5F77F22F619395461C1EEAEE9234009B475231212B88BD510D00B7

CE3A3E46CA65D779D687C7E58FB4A2EB784E5B1B4CEBE33DBB2BF37CCCB6F194

72D3DE12A0AA8CE87A64A70807F0769C332816F27DCF8286B91E6819E2197AA8

1D30C31016760D6A14FEDE26F36BA97EF4B65A92