BLACK FRIDAY: 2-for-1 offer NOVEMBER 20 - 26 See details

DarkCloud

81
Global rank
73 infographic chevron month
Month rank
85 infographic chevron week
Week rank
3193
IOCs

DarkCloud is an infostealer that focuses on collecting and exfiltrating browser data from the infected device. The malware is also capable of keylogging and crypto address swapping. DarkCloud is typically delivered to victims’ computers via phishing emails.

Stealer
Type
Unknown
Origin
1 November, 2022
First seen
2 May, 2024
Last seen

How to analyze DarkCloud with ANY.RUN

Type
Unknown
Origin
1 November, 2022
First seen
2 May, 2024
Last seen

IOCs

IP addresses
103.14.121.180
184.170.144.21
167.99.35.88
198.38.82.23
181.214.142.230
Hashes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mail.tefoc.com
ns3.colofreed.pl
ns1.rigreo.at
ns3.regioklous.at
ns2.fircitris.at
ns2.loklordg.at
ns1.flyopenvz.ru
ns4.esriolter.at
ns4.neongit.at
ns4.koncaved.ru
turkeyhotelnoslafas.su
itemsuofitquestumequequi.com
jgworldupd.com
petroilimos.su
alefistacorm.ru
arloeiffg.com
captioncodes.ru
red-stoneses.com
rastobona.com
lochjol.com
URLs
https://api.telegram.org/bot6107929879:AAHV6JwXs7rcYzMGLe3_opR5_gdKAC16Ye4/sendMessage
https://api.telegram.org/bot7148308455:AAGrdlRzhjt8mx31-dFYXt4kvhbFnphSlSg/sendMessage
https://api.telegram.org/bot7070490418:AAFJ-COsGzz3b8scJZVCXnt58-J1srUH5DQ/sendMessage
https://api.telegram.org/bot6771461481:AAH7vQEIoBDQr43Dx_zORT5cGMl9_tDt0L8/sendMessage
https://api.telegram.org/bot6361371678:AAH7b9uIkhwP1TBt8t78VwxXD7LXjsOcbYk /sendMessage
https://api.telegram.org/bot6746383234:AAHJ0bggxpanHasWvjMSekrXd1f03jgHZUM/sendMessage
https://api.telegram.org/bot6946449919:AAGrwsEUPXNuNb2IKsVchu8VgWMNPhHYEN8/sendMessage
https://api.telegram.org/bot6062190835:AAFarBYBv-mQ3aLxNEnTAnblGK2thSsO8vQ/sendMessage
https://api.telegram.org/bot6363864044:AAEOHd3rwToTFkGX2VcAe8RqOT15foqZ6jY/sendMessage
https://api.telegram.org/bot5723230539:AAHXr6rmQsEsq1CdwKBxLF-mnANEsBE4mYk/sendMessage
https://api.telegram.org/bot6361371678:AAH7b9uIkhwP1TBt8t78VwxXD7LXjsOcbYk/sendMessage
https://api.telegram.org/bot6361371678:AAH7b9uIkhwP1TBt8t78VwxXD7LXjOcbYk/sendMessage
https://api.telegram.org/bot5881209387:AAEYbMO86ewxRCF0hqbguD3F2NjXIQs4EJU/sendMessage
https://api.telegram.org/bot5637864859:AAHatMmLjO3i5zaPb5Ppy5_wDiRtKwQUbSU/sendMessage
https://api.telegram.org/bot6028253602:AAFFbacUfiOxmvzuo36D6g83Flf23bpPXYA/sendMessage
https://api.telegram.org/bot6342175884:AAGNYnOE8HN_cXImf1tA6GQfayeeb18yP84/sendMessage
https://api.telegram.org/bot6377977757:AAG-ibHXKoh6L404CY7qxnKiYoGRL9Y8Tiw/sendMessage
https://api.telegram.org/bot6169076497:AAF7nb28rkada8zJw_x9Td8BhpXF4n2feA/sendMessage
https://api.telegram.org/bot5962712783:AAFVWYP7zptQlynX_9COtuxYcx3Dl7EnfUQ/sendMessage
https://api.telegram.org/bot6361968859:AAE8jtQez0mj9cei6S5LDxJ6aEmWADhYLLc/sendMessage
Last Seen at

Recent blog posts

post image
Windows 11 UAC Bypass in Modern Malware
watchers 119
comments 0
post image
New Hijack Loader Variant: Uses Process Hollo...
watchers 326
comments 0
post image
A Guide to ANY.RUN’s YARA Search 
watchers 268
comments 0

What is DarkCloud malware?

DarkCloud is a stealer malware written in Visual Basic. The core functionality of the malicious software is collecting and exfiltrating sensitive information from infected machines. The type of data stolen by DarkCloud ranges from user credentials to credit card details in browsers.

The malware has been active since the end of 2022 and has been widely used in attacks in 2023. DarkCloud is sold by its creators on DarkNet forums who also provide customization options, including the additional clipper module, allowing the malware to monitor the content saved by victims to the clipboard.

The most common infection chain for DarkCloud is spam emails, targeting a variety of users. The malware is usually distributed in the form of a malicious attachment. Once downloaded and launched by the user, the malware gets installed on the device and begins its malicious activities.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Technical details of the DarkCloud malicious software

DarkCloud can engage in the following operations on the infected system:

  • Steal information: It can pull data from different browsers and FTP clients, as well as the clipboard.
  • Capture screenshots: DarkCloud can take screenshots of the user’s activities.
  • Record keystrokes: The malware has the keylogging capability, letting it keep track of everything typed on the keyboard by the victim.
  • Exfiltrate files: It is capable of grabbing files of different formats, such as .txt, .rtf, and .pdf.
  • Communicate with the C2: DarkCloud supports several communication protocols, including SMTP and via Telegram, used for relaying stolen data to the attacker.

Additionally, similar to LaplasClipper, DarkCloud is equipped with a crypto swapper, enabling it to replace the user’s crypto wallet addresses with those of the attacker.

The malware can create a Task Scheduler entry in order to gain persistence on the system.

Execution process of DarkCloud

In order to examine the entire execution chain of DarkCloud in more detail, we can upload its sample to the ANY.RUN sandbox.

As stealers strive to conceal their activities, the DarkCloud stealer employs a deliberately straightforward execution chain to minimize visibility. Consequently, the infected operating system experiences a limited number of processes, and the malware refrains from utilizing system tools. Once the payload infiltrates the compromised system, it promptly initiates its execution.

The analyzed sample injects the system binary "AppLaunch" and subsequently executes it. After initiating, DarkCloud employs time-based evasion techniques in an attempt to conceal itself from sandboxes. However, it was detected, and the configuration was successfully extracted. It then starts a process executing all malicious activities, encompassing data theft and communication with the Command and Control (C&C) server.

DarkCloud process graph shown in ANY.RUN DarkCloud's process graph demonstrated in ANY.RUN

Distribution methods of the DarkCloud malware

Just like in the case of other stealer malware, such as Formbook and Lokibot, the most common way used by attackers to distribute DarkCloud is via emails. In most cases, criminals employ social engineering and craft their messages to look legitimate. This is why victims often receive fake invoice payment requests and similar emails with files attached to them. Users who fail to recognize a scam end up downloading the malicious attachment and running it on their system, thus triggering the infection process.

Conclusion

In order to avoid falling victim to DarkCloud, it is vital to follow strict security practices. One of them is analyzing suspicious files and links in a malware sandbox. ANY.RUN is a cloud-based service that lets you investigate any email attachment or URL sent to you by an unknown sender and determine whether it poses any risk.

ANY.RUN’s interactive approach to malware analysis enables you to engage with the files and the system just like on your own computer, performing all the necessary actions to execute malicious software fully. The service provides you with comprehensive threat reports that contain details about the attack, indicators of compromise (IOCs), and other relevant information.

Try ANY.RUN for free – request a demo!

HAVE A LOOK AT

Adwind screenshot
Adwind
adwind trojan
Adwind RAT, sometimes also called Unrecom, Sockrat, Frutas, jRat, and JSocket, is a Malware As A Service Remote Access Trojan that attackers can use to collect information from infected machines. It was one of the most popular RATs in the market in 2015.
Read More
Agent Tesla screenshot
Agent Tesla
agenttesla trojan rat stealer
Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.
Read More
Amadey screenshot
Amadey
amadey
Amadey is a formidable Windows infostealer threat, characterized by its persistence mechanisms, modular design, and ability to execute various malicious tasks.
Read More
Arkei screenshot
Arkei
arkei stealer
Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
WarZone screenshot
WarZone
warzone avemaria stealer trojan rat
WarZone RAT is a remote access trojan, which is written in C++ and offered as a malware-as-a-service. It packs a wide range of capabilities, from stealing victims’ files and passwords to capturing desktop activities. WarZone RAT is primarily distributed via phishing emails and receives regular updates from its C2.
Read More

Our website uses cookies. By visiting the pages of the site, you agree to our Privacy Policy