Summary

  • The DarkCloud information stealer is being distributed via a multi-stage attack chain that starts with a phishing email with a PDF that leads to a file sharing service, followed by a RAR file that contains an AutoIt compiled executable.
  • Upon execution, this malware performs multiple obfuscated functions and downloads a second executable that is the final DarkCloud Stealer payload.
  • This payload is a data-stealing malware that captures sensitive browser data like credit card information, login credentials, and personal data.
  • This analysis highlights the intricacies of this campaign, along with methods for detection and prevention.
  • You can also review the associated bear book here.

By Pranay Kumar Chhaparwal and Benjamin Chang

Original Article