Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

DarkCloud

87
Global rank
50 infographic chevron month
Month rank
43 infographic chevron week
Week rank
0
IOCs

DarkCloud is an infostealer that focuses on collecting and exfiltrating browser data from the infected device. The malware is also capable of keylogging and crypto address swapping. DarkCloud is typically delivered to victims’ computers via phishing emails.

Stealer
Type
Unknown
Origin
1 November, 2022
First seen
21 September, 2025
Last seen

How to analyze DarkCloud with ANY.RUN

Type
Unknown
Origin
1 November, 2022
First seen
21 September, 2025
Last seen

IOCs

IP addresses
103.14.121.180
184.170.144.21
167.99.35.88
176.65.142.190
172.245.152.196
107.173.47.156
198.38.82.23
181.214.142.230
Hashes
262531be1dc4d521469be8ff7591f9d40861bcf7de7ff4f8a0ee1ba542713c0d
9c641b87cd72d0e95757d12a7cc1f98fc4cb4fcfd1f8ec1feb8d442c9fb257f8
88752ea0bae8d2ad7c1af06034136c8e0b524c7c1e9fa8c9d3e8e55d20175612
9d16f030796c701a2fc2481bf376df82914d34581547795b81154e3f249f1549
216612bf6ed5af82680461d3da4d1b3ebcddc54b91ecfa07634b8a9ebf5623d9
b2c04121abc661593e04224fac33300c7ae0cab408676a750bcaad138da4b96a
57d099db06fe73ea759b399b8f6cd77ab83cd888452afc5c4c9f69c321df44d7
c8bbb6208a9ca69f2baebf0b426af881e58cca8f3fb2b76359a459b6b3df2e83
0ef8690ac5fbda00640852fe323d69dcc7df51d9a367070500d37529148a37df
0802c13f11828457c8cd914c34d00517fc2ddccfb9060f34d90d01c01db4e47e
f3ebad7ef91810023cfafc2074096387baf8812681fee4401ff9cdb074ee6837
315d85b36b382335d26d4c87d3d2a556343ad2777078855d1aeead851b8a49bc
ff4c6f9c1fcbf3f0281a74e174e9d9e0ed9946e22891622bb534397d85ee078f
7ca236bd101c4d2b4bdfe2fc0b914e58ea1acf122cdf18c807a2fee4d96a28bc
a540f9417751bf4d120f8c586b55961dd659ecab3045ac112c0057287d4816a2
72bf73d04a7f1fbb1d16cbd099aaa746aa9eb1484bcad12ca629fc0987809d74
5a1e4d4b7b9c90d311b5944f78ab8807f6c982441cc987d0d0aa0d5ccd13d5fe
a345d0b822b2ef2baffe88fc7084aa72e4bc90444337cd5bf7b828a94dbe805e
d4dacbc0546a45d26b7b9d58836b7905a919155b4063825988500e70c739d1f3
0fdf9c1958c63c90c129bee0e80b5e955d76f6a4b6a89d9e409cc9cb8a13a8b1
Domains
kbs-frb.cc
hbws.cc
meils.info
mail.vishnuraam.com
mail.debenhamfear.co.ke
mail.gruposinestesia.com
mail.gaorsaing.com
ftp.grupocasagrende.com
mail.oleonidas.gr
mail.hotelcalimareal.com
mail.rvoccte.com
mail.centrevisio.com
mail.sunclubhotelside.com
ftp.ercolina-usa.com
mail.hytgrup.com
mail.senlergida.com
a.kah.kz
32v235235n645645435.org
surheadquarters.com
homecafe.at
URLs
https://api.telegram.org/bot565024308:AAHsRcn1jhjDR5k3U3FDfpVJh0xrg3_DXV0/sendMessage
https://api.telegram.org/bot5671318275:AAGisFrFLqhVJjO72egJPifm2Q0ITZ6Nziw/sendMessage
https://api.telegram.org/bot5826043664:AAFEtRcET41Hv_Z8LOoaMk4g3v5U59LOKeU/sendMessage
https://api.telegram.org/bot5591938104:AAG3MveHdYmeWAzPZxA96RK2XyyoYB5Z-Gc/sendMessage
https://api.telegram.org/bot6220361269:AAGBxdMGbKgYomsopvpOOfxLM-AsLa8opRM/sendMessage
https://api.telegram.org/bot6179013510:AAEcFzYQte4j59p28OFVJ5I7TKu-BqJOCLM/sendMessage
https://api.telegram.org/bot6097322132:AAGWx5rAAi2ClESxyXA6dM4ExdX467M2mA/sendMessage
https://api.telegram.org/bot5646594587:AAFLtqpAq5c975sh1G5rvvfsgxXFzA9Q8h0/sendMessage
https://api.telegram.org/bot6398598832:AAHm_-Bk4WvgvnFiJw5HCNBQ9z3BfEFNArM/sendMessage
https://api.telegram.org/bot6201772437:AAE8z2HCV4dlViF8O7_bVozdyvuR6EkBCPA/sendMessage
https://api.telegram.org/bot6363864044:AAEOHd3rwToTFkGX2VcAe8RqOT15foqZ6jY/sendMessage
https://api.telegram.org/bot6392998330:AAEoU34KkrBXWdYsC0HHJhwWS-tXdCQBgic/sendMessage
https://api.telegram.org/bot5723230539:AAHXr6rmQsEsq1CdwKBxLF-mnANEsBE4mYk/sendMessage
https://api.telegram.org/bot6286742839:AAEBPY8dNKiSbc20pxOzagMixRMMK1n0Jro/sendMessage
https://api.telegram.org/bot5999088567:AAFfogTGnSNLKkr0mNG2Z64MEu1Zehill5s/sendMessage
https://api.telegram.org/bot6474909072:AAE35t_kjfFFVCPF7xcGUBipQxF6QCUotU/sendMessage
https://api.telegram.org/bot5916623582:AAFZM5JGZCLyDWkdZ_kMmYDDwIdN1CHdEo/sendMessage
https://api.telegram.org/bot1934251866:AAHQ4gMhLxMk3PU1o074pz2lcaY8-WjTQb4/sendMessage
https://api.telegram.org/bot5676971476:AAFdGsXW8kwzXNIluAGV-a4sJ2XBy68O9WI/sendMessage
https://api.telegram.org/bot5704903332:AAGQ75Wg6lHVUpPODprifDQYP0_98wUeols/sendMessage
Last Seen at
Last Seen at

Recent blog posts

post image
Efficient SOC: How to Detect and Solve Incide...
watchers 525
comments 0
post image
ANY.RUN & Palo Alto Networks Cortex XSOAR...
watchers 618
comments 0
post image
Lazarus Group Attacks in 2025: Here's Everyth...
watchers 3967
comments 0

What is DarkCloud malware?

DarkCloud is a stealer malware written in Visual Basic. The core functionality of the malicious software is collecting and exfiltrating sensitive information from infected machines. The type of data stolen by DarkCloud ranges from user credentials to credit card details in browsers.

The malware has been active since the end of 2022 and has been widely used in attacks in 2023. DarkCloud is sold by its creators on DarkNet forums who also provide customization options, including the additional clipper module, allowing the malware to monitor the content saved by victims to the clipboard.

The most common infection chain for DarkCloud is spam emails, targeting a variety of users. The malware is usually distributed in the form of a malicious attachment. Once downloaded and launched by the user, the malware gets installed on the device and begins its malicious activities.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Technical details of the DarkCloud malicious software

DarkCloud can engage in the following operations on the infected system:

  • Steal information: It can pull data from different browsers and FTP clients, as well as the clipboard.
  • Capture screenshots: DarkCloud can take screenshots of the user’s activities.
  • Record keystrokes: The malware has the keylogging capability, letting it keep track of everything typed on the keyboard by the victim.
  • Exfiltrate files: It is capable of grabbing files of different formats, such as .txt, .rtf, and .pdf.
  • Communicate with the C2: DarkCloud supports several communication protocols, including SMTP and via Telegram, used for relaying stolen data to the attacker.

Additionally, similar to LaplasClipper, DarkCloud is equipped with a crypto swapper, enabling it to replace the user’s crypto wallet addresses with those of the attacker.

The malware can create a Task Scheduler entry in order to gain persistence on the system.

Execution process of DarkCloud

In order to examine the entire execution chain of DarkCloud in more detail, we can upload its sample to the ANY.RUN sandbox.

As stealers strive to conceal their activities, the DarkCloud stealer employs a deliberately straightforward execution chain to minimize visibility. Consequently, the infected operating system experiences a limited number of processes, and the malware refrains from utilizing system tools. Once the payload infiltrates the compromised system, it promptly initiates its execution.

The analyzed sample injects the system binary "AppLaunch" and subsequently executes it. After initiating, DarkCloud employs time-based evasion techniques in an attempt to conceal itself from sandboxes. However, it was detected, and the configuration was successfully extracted. It then starts a process executing all malicious activities, encompassing data theft and communication with the Command and Control (C&C) server.

DarkCloud process graph shown in ANY.RUN DarkCloud's process graph demonstrated in ANY.RUN

Distribution methods of the DarkCloud malware

Just like in the case of other stealer malware, such as Formbook and Lokibot, the most common way used by attackers to distribute DarkCloud is via emails. In most cases, criminals employ social engineering and craft their messages to look legitimate. This is why victims often receive fake invoice payment requests and similar emails with files attached to them. Users who fail to recognize a scam end up downloading the malicious attachment and running it on their system, thus triggering the infection process.

Conclusion

In order to avoid falling victim to DarkCloud, it is vital to follow strict security practices. One of them is analyzing suspicious files and links in a malware sandbox. ANY.RUN is a cloud-based service that lets you investigate any email attachment or URL sent to you by an unknown sender and determine whether it poses any risk.

ANY.RUN’s interactive approach to malware analysis enables you to engage with the files and the system just like on your own computer, performing all the necessary actions to execute malicious software fully. The service provides you with comprehensive threat reports that contain details about the attack, indicators of compromise (IOCs), and other relevant information.

Try ANY.RUN for free – request a demo!

HAVE A LOOK AT

Xeno RAT screenshot
Xeno RAT
xenorat
Xeno RAT is an open-source malware mainly distributed through drive-by downloads. The core capabilities of this threat include remote control, keystroke logging, webcam and microphone access. Equipped with advanced utilities, such as Hidden Virtual Network Computing and Socks5 reverse proxy, Xeno RAT is most frequently used in attacks against individual users.
Read More
Latrodectus screenshot
Latrodectus
latrodectus
Latrodectus is a malicious loader that is used by threat actors to gain a foothold on compromised devices and deploy additional malware. It has been associated with the IcedID trojan and has been used by APT groups in targeted attacks. The malware can gather system information, launch executables, and detect sandbox environments. It uses encryption and obfuscation to evade detection and can establish persistence on the infected device.
Read More
Ramnit screenshot
Ramnit
ramnit
Ramnit is a highly modular banking trojan and worm that evolved from a file-infecting virus into a powerful cybercrime tool. It specializes in financial fraud, credential theft, remote access, and malware delivery, being a serious threat to businesses and individuals. First spotted in 2010, Ramnit became popular after the 2014 takedown of the GameOver Zeus botnet, as cybercriminals sought alternatives for banking fraud.
Read More
StrelaStealer screenshot
StrelaStealer
strela
StrelaStealer is a malware that targets email clients to steal login credentials, sending them back to the attacker’s command-and-control server. Since its emergence in 2022, it has been involved in numerous large-scale email campaigns, primarily affecting organizations in the EU and U.S. The malware’s tactics continue to evolve, with attackers frequently changing attachment file formats and updating the DLL payload to evade detection.
Read More
X-Files screenshot
X-Files
xfiles
X-FILES Stealer is a sophisticated malware designed to infiltrate systems and steal sensitive information, targeting login credentials for email, social media, and other personal accounts. It captures data and transmits it back to the attacker’s command-and-control server. X-FILES Stealer employs advanced evasion techniques to avoid detection, making it a persistent threat in the cyber landscape.
Read More
Play Ransomware screenshot
Play aka PlayCrypt ransomware group has been successfully targeting corporations, municipal entities, and infrastruction all over the world for about three years. It infiltrates networks via software vulnerabilities, phishing links and compromised websites. The ransomware abuses Windows system services to evade detection and maintain persistence. Play encrypts user files and steals sensitive data while demanding a ransom.
Read More