Contact

New Infection Chain and ConfuserEx-Based Obfuscation for DarkCloud Stealer

NetmanageIT OpenCTI - opencti.netmanageit.com

New Infection Chain and ConfuserEx-Based Obfuscation for DarkCloud Stealer



SUMMARY :

Unit 42 researchers have identified a shift in the delivery method and obfuscation techniques used for distributing DarkCloud Stealer. The new infection chain, observed since April 2025, involves ConfuserEx obfuscation and a final payload written in Visual Basic 6. The attack begins with phishing emails containing compressed archives (TAR, RAR, or 7Z) that include JavaScript or Windows Script files. These files download and execute a PowerShell script, which then drops an executable protected by ConfuserEx. The final payload is a VB6 executable injected into a legitimate process using RunPE techniques. The malware employs various obfuscation methods, including anti-tampering, symbol renaming, and proxy call methods, to complicate analysis and evade detection.

OPENCTI LABELS :

process hollowing,infostealer,obfuscation,confuserex,darkcloud stealer,visual basic 6,runpe


Open in NetmanageIT OpenCTI Public Instance with below link!


Use public read only username and password on login page.

NOTE : Use Public READ only user credentials on login page banner.


New Infection Chain and ConfuserEx-Based Obfuscation for DarkCloud Stealer