Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

DarkCloud

85
Global rank
42 infographic chevron month
Month rank
40 infographic chevron week
Week rank
0
IOCs

DarkCloud is an infostealer that focuses on collecting and exfiltrating browser data from the infected device. The malware is also capable of keylogging and crypto address swapping. DarkCloud is typically delivered to victims’ computers via phishing emails.

Stealer
Type
Unknown
Origin
1 November, 2022
First seen
12 October, 2025
Last seen

How to analyze DarkCloud with ANY.RUN

Type
Unknown
Origin
1 November, 2022
First seen
12 October, 2025
Last seen

IOCs

IP addresses
103.14.121.180
184.170.144.21
167.99.35.88
176.65.142.190
107.173.47.156
198.38.82.23
181.214.142.230
Hashes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darkcloud.onlinewebshop.net
mail.apexpharmabd.com
meils.info
mail.vishnuraam.com
mail.debenhamfear.co.ke
mail.gruposinestesia.com
mail.gaorsaing.com
ftp.grupocasagrende.com
mail.oleonidas.gr
mail.hotelcalimareal.com
mail.rvoccte.com
mail.centrevisio.com
mail.sunclubhotelside.com
ftp.ercolina-usa.com
mail.hytgrup.com
mail.senlergida.com
a.kah.kz
32v235235n645645435.org
surheadquarters.com
homecafe.at
URLs
https://api.telegram.org/bot565024308:AAHsRcn1jhjDR5k3U3FDfpVJh0xrg3_DXV0/sendMessage
https://api.telegram.org/bot5671318275:AAGisFrFLqhVJjO72egJPifm2Q0ITZ6Nziw/sendMessage
https://api.telegram.org/bot5826043664:AAFEtRcET41Hv_Z8LOoaMk4g3v5U59LOKeU/sendMessage
https://api.telegram.org/bot5591938104:AAG3MveHdYmeWAzPZxA96RK2XyyoYB5Z-Gc/sendMessage
https://api.telegram.org/bot6220361269:AAGBxdMGbKgYomsopvpOOfxLM-AsLa8opRM/sendMessage
https://api.telegram.org/bot6179013510:AAEcFzYQte4j59p28OFVJ5I7TKu-BqJOCLM/sendMessage
https://api.telegram.org/bot6097322132:AAGWx5rAAi2ClESxyXA6dM4ExdX467M2mA/sendMessage
https://api.telegram.org/bot5646594587:AAFLtqpAq5c975sh1G5rvvfsgxXFzA9Q8h0/sendMessage
https://api.telegram.org/bot6398598832:AAHm_-Bk4WvgvnFiJw5HCNBQ9z3BfEFNArM/sendMessage
https://api.telegram.org/bot6201772437:AAE8z2HCV4dlViF8O7_bVozdyvuR6EkBCPA/sendMessage
https://api.telegram.org/bot6363864044:AAEOHd3rwToTFkGX2VcAe8RqOT15foqZ6jY/sendMessage
https://api.telegram.org/bot6392998330:AAEoU34KkrBXWdYsC0HHJhwWS-tXdCQBgic/sendMessage
https://api.telegram.org/bot5723230539:AAHXr6rmQsEsq1CdwKBxLF-mnANEsBE4mYk/sendMessage
https://api.telegram.org/bot6286742839:AAEBPY8dNKiSbc20pxOzagMixRMMK1n0Jro/sendMessage
https://api.telegram.org/bot5999088567:AAFfogTGnSNLKkr0mNG2Z64MEu1Zehill5s/sendMessage
https://api.telegram.org/bot6474909072:AAE35t_kjfFFVCPF7xcGUBipQxF6QCUotU/sendMessage
https://api.telegram.org/bot5916623582:AAFZM5JGZCLyDWkdZ_kMmYDDwIdN1CHdEo/sendMessage
https://api.telegram.org/bot1934251866:AAHQ4gMhLxMk3PU1o074pz2lcaY8-WjTQb4/sendMessage
https://api.telegram.org/bot5676971476:AAFdGsXW8kwzXNIluAGV-a4sJ2XBy68O9WI/sendMessage
https://api.telegram.org/bot5704903332:AAGQ75Wg6lHVUpPODprifDQYP0_98wUeols/sendMessage
Last Seen at

Recent blog posts

post image
How to Grow SOC Team Expertise for Ultimate T...
watchers 460
comments 0
post image
Phishing, Cloud Abuse, and Evasion: Advanced...
watchers 2516
comments 0
post image
Release Notes: Palo Alto Networks, Microsoft,...
watchers 5421
comments 0

What is DarkCloud malware?

DarkCloud is a stealer malware written in Visual Basic. The core functionality of the malicious software is collecting and exfiltrating sensitive information from infected machines. The type of data stolen by DarkCloud ranges from user credentials to credit card details in browsers.

The malware has been active since the end of 2022 and has been widely used in attacks in 2023. DarkCloud is sold by its creators on DarkNet forums who also provide customization options, including the additional clipper module, allowing the malware to monitor the content saved by victims to the clipboard.

The most common infection chain for DarkCloud is spam emails, targeting a variety of users. The malware is usually distributed in the form of a malicious attachment. Once downloaded and launched by the user, the malware gets installed on the device and begins its malicious activities.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Technical details of the DarkCloud malicious software

DarkCloud can engage in the following operations on the infected system:

  • Steal information: It can pull data from different browsers and FTP clients, as well as the clipboard.
  • Capture screenshots: DarkCloud can take screenshots of the user’s activities.
  • Record keystrokes: The malware has the keylogging capability, letting it keep track of everything typed on the keyboard by the victim.
  • Exfiltrate files: It is capable of grabbing files of different formats, such as .txt, .rtf, and .pdf.
  • Communicate with the C2: DarkCloud supports several communication protocols, including SMTP and via Telegram, used for relaying stolen data to the attacker.

Additionally, similar to LaplasClipper, DarkCloud is equipped with a crypto swapper, enabling it to replace the user’s crypto wallet addresses with those of the attacker.

The malware can create a Task Scheduler entry in order to gain persistence on the system.

Execution process of DarkCloud

In order to examine the entire execution chain of DarkCloud in more detail, we can upload its sample to the ANY.RUN sandbox.

As stealers strive to conceal their activities, the DarkCloud stealer employs a deliberately straightforward execution chain to minimize visibility. Consequently, the infected operating system experiences a limited number of processes, and the malware refrains from utilizing system tools. Once the payload infiltrates the compromised system, it promptly initiates its execution.

The analyzed sample injects the system binary "AppLaunch" and subsequently executes it. After initiating, DarkCloud employs time-based evasion techniques in an attempt to conceal itself from sandboxes. However, it was detected, and the configuration was successfully extracted. It then starts a process executing all malicious activities, encompassing data theft and communication with the Command and Control (C&C) server.

DarkCloud process graph shown in ANY.RUN DarkCloud's process graph demonstrated in ANY.RUN

Distribution methods of the DarkCloud malware

Just like in the case of other stealer malware, such as Formbook and Lokibot, the most common way used by attackers to distribute DarkCloud is via emails. In most cases, criminals employ social engineering and craft their messages to look legitimate. This is why victims often receive fake invoice payment requests and similar emails with files attached to them. Users who fail to recognize a scam end up downloading the malicious attachment and running it on their system, thus triggering the infection process.

Conclusion

In order to avoid falling victim to DarkCloud, it is vital to follow strict security practices. One of them is analyzing suspicious files and links in a malware sandbox. ANY.RUN is a cloud-based service that lets you investigate any email attachment or URL sent to you by an unknown sender and determine whether it poses any risk.

ANY.RUN’s interactive approach to malware analysis enables you to engage with the files and the system just like on your own computer, performing all the necessary actions to execute malicious software fully. The service provides you with comprehensive threat reports that contain details about the attack, indicators of compromise (IOCs), and other relevant information.

Try ANY.RUN for free – request a demo!

HAVE A LOOK AT

LockBit screenshot
LockBit
lockbit
LockBit, a ransomware variant, encrypts data on infected machines, demanding a ransom payment for decryption. Used in targeted attacks, It's a significant risk to organizations.
Read More
Cerber screenshot
Cerber
cerber
Cerber is a Ransomware-as-a-Service (RaaS) that appeared in 2016, spread quickly and has been evolving since. It became well-known for its file encryption, offline capabilities, and sophisticated evasion techniques. It primarily targets enterprises, financial institutions, and government entities, encrypting their data and demanding ransom payments in Bitcoin. It also targets everyday users encrypting personal files (photos, documents) with the risk of their permanent loss.
Read More
HijackLoader screenshot
HijackLoader
hijackloader
HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.
Read More
Black Basta screenshot
Black Basta
blackbasta
Black Basta is a ransomware-as-a-service operated by Storm-1811. It emerged in 2022 and uses double extortion tactics, encrypting data and stealing it for ransom. The malware often gains access through spear-phishing and uses tools like QakBot and Cobalt Strike. It's known for exploiting system vulnerabilities and using advanced obfuscation techniques.
Read More
PureCrypter screenshot
PureCrypter
purecrypter
First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system.
Read More
Adware screenshot
Adware
adware
Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.
Read More