Combine AI-driven security operations, multi-signal attack surface coverage and 24/7 Elite Threat Hunters to help you take your security program to the next level.
Get unlimited Incident Response with threat suppression guarantee - anytime, anywhere.
CTEM and advisory programs that identify security gaps and build proactive strategies to address them.
Multi-agent Generative AI system embedded across eSentire’s Security Operations platform to scale human expertise.
Extended Detection andOpen XDR with Agentic AI & machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Customer PortalSee what our SOC sees, review investigations, and see how we are protecting your business.
Platform IntegrationsSeamless integrations and threat investigation across your existing tech stack.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
Threat Response Unit (TRU)Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.
Cyber Resilience TeamExtend your team capabilities and prevent business disruption with expertise from eSentire.
Response and RemediationWe balance automated blocks with rapid human-led investigations to manage threats.
Flexible MDR pricing and packages that fit your unique security requirements.
Entry level foundational MDR coverage
Comprehensive Next Level eSentire MDR
Next Level eSentire MDR with Cyber Risk Advisors to continuously advance your security program
Stop ransomware before it spreads.
Identity ResponseStop identity-based cyberattacks.
Zero Day AttacksDetect and respond to zero-day exploits.
Cybersecurity ComplianceMeet regulatory compliance mandates.
Third-Party RiskDefend third-party and supply chain risk.
Cloud MisconfigurationEnd misconfigurations and policy violations.
Cyber RiskAdopt a risk-based security approach.
Mid-Market SecurityMid-market security essentials to prioritize.
Sensitive Data SecurityProtect your most sensitive data.
Cyber InsuranceMeet insurability requirements with MDR.
Cyber Threat IntelligenceOperationalize cyber threat intelligence.
Security LeadershipBuild a proven security program.
THE THREATOn September 25th, 2025, Cisco disclosed two zero-day vulnerabilities, CVE-2025-20333 (CVSS: 9.9) and CVE-2025-20362 (CVSS: 6.5), in Cisco Secure Firewall Adaptive Security…
THE THREAT On September 16th, 2025, a large-scale attack against npm was discovered, affecting 187 packages including several from CrowdStrike. The attack, attributed to the same threat…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
About Us Leadership CareersWe provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Multi-Signal MDR with 300+ technology integrations to support your existing investments.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
We offer three flexible MDR pricing packages that can be customized to your unique needs.
The latest security advisories, blogs, reports, industry publications and webinars published by TRU.
Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.
See why 2000+ organizations globally have chosen eSentire for their MDR Solution.
Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and Cyber Analysts who hunt, investigate, contain and respond to threats within minutes.
We have discovered some of the most dangerous threats and nation state attacks in our space – including the Kaseya MSP breach and the more_eggs malware.
Our Security Operations Centers are supported with Threat Intelligence, Tactical Threat Response and Advanced Threat Analytics driven by our Threat Response Unit – the TRU team.
In TRU Positives, eSentire’s Threat Response Unit (TRU) provides a summary of a recent threat investigation. We outline how we responded to the confirmed threat and what recommendations we have going forward.
Here’s the latest from our TRU Team…
In September 2025, eSentire's Threat Response Unit (TRU) detected a spear-phishing campaign targeting a customer in the manufacturing industry, which led to the attempted delivery of the DarkCloud information stealing malware. The phishing lure, laced with a malicious zip archive, was sent to the client's Zendesk support email and featured financial theming.
Formerly sold on the now-defunct hacking forum XSS.is and previously built in .NET, DarkCloud has received numerous updates, including a full stub re-write in VB6, string encryption, and evasion updates.
The malware targets browser passwords/credit cards/cookies, keystrokes, FTP credentials, clipboard contents, email clients, files, and cryptocurrency wallets. Stolen credentials/data are sent to attacker-controlled Telegram, FTP, SMTP, or Web Panel (PHP) endpoints.
The phishing lure, sent by "procure@bmuxitq[.]shop", features a banking-themed subject line "Swift Message MT103 Addiko Bank ad: FT2521935SVT" and message body that is designed to appear as legitimate financial correspondence.
A malicious zip archive was attached to the email named, "Swift Message MT103 FT2521935SVT.zip", and contained a packed sample of DarkCloud named "Swift Message MT103 FT2521935SVT.exe". The specific version in this case is an older version of DarkCloud, version 3.2, which was released earlier this year.
DarkCloud is currently being marketed through the website darkcloud.onlinewebshop[.]net and via Telegram by the user @BluCoder. Although the appearance of the site gives the impression that it is legitimate software, further analysis reveals this could not be further from the truth.
The website lists applications targeted, including web browsers, email clients, FTP clients, VPN clients, and more.
Scrolling down further on the website, we can see other features are described, including keystroke harvesting, web panel scripts (PHP-based), crypto-currency clipping, clipboard harvesting, file grabbing, crypto-current wallet harvesting, etc.
Technical analysis reveals that the DarkCloud builder requires users to install the Visual Basic 6 (VB6) IDE to compile the malware stub from locally sourced VB6 source code.
This local compilation approach introduces a significant security vulnerability for the malware author – similar to what occurred with Redline Stealer – and increases the probability of unauthorized versions of the software surfacing, increasing the likelihood of widespread abuse across the cybercriminal ecosystem.
The latest version of DarkCloud, version 4.2, supports string encryption (optional) that is essentially a Caesar cipher driven by VB6's random number generator and serves to conceal static strings like exfiltration credentials and other tell-tale strings in memory. The figure below highlights an example key string and hex-encoded ciphertext when viewed in a disassembler.
The key string is converted into a numeric value using a custom algorithm and is used as a seed for random number generation via VB6's Randomize function. The Rnd function is then called to compute values needed to reverse the shifted characters back to characters in the printable ASCII range (32-126). Because the VB6 random number generator algorithm is unique to VB6 alone, this creates a challenge to reverse the obfuscation in another programming language. Through reverse engineering the actual implementations of Randomize (rtcRandomize) and Rnd (rtcRandomNext) in msvbvm60.dll (Visual Basic Virtual Machine), and reimplementing the algorithms, we are successfully able to decrypt strings.
The figures below display the key instructions used by rtcRandomNext and rtcRandomize to generate random floating-point values between 0 and 1.
The rtcRandomNext function can be reproduced in python like so:
def rnd(self):
self.seed = (0xFFC39EC3 - (self.seed * 0x2BC03)) & 0xFFFFFF
rnd_value = self.seed / 16777216.0
return round(rnd_value, 7)
The rtcRandomize function can be reproduced in python like so:
def randomize(self, seed: float) -> int:
bits = struct.unpack('>Q', struct.pack('>d', seed))[0]
n = (bits >> 32) & 0xFFFFFFFF # Upper 32 bits
result = ((n << 8) ^ (n >> 8)) & 0xFFFF00
# Preserve low byte from existing seed
self.seed = result | (self.seed & 0xFF)
DarkCloud collects system information via WMI queries to retrieve the victim machine's processor name and operating system name and retrieves the victim's username and computer name via environment variables.
The malware uses a VBScript object to regex match stolen credit cards and associate each card with the card type, e.g. Amex Card.
The next figure shows a portion of the logic used for extracting contacts from victim machines, specifically for Thunderbird. DarkCloud also supports extraction of contact information from other email clients like MailMaster and eM Client.
Evasion
DarkCloud makes use of several techniques to avoid sandboxes and security researchers. The first check, "IsProcessListReliable" queries running processes via WMI and matches against the following blacklisted substrings.
It is worth noting that Joe Sandbox uses AutoIt and does not hide/rename the binary, therefore it is vulnerable to this check.
Additionally, if there are not more than 50 processes running, the check fails, though this is of course prone to false positives as there are plenty of real-world systems with less than 50 processes running.
The next check, "IsHardwareReliable" uses several WMI queries.
The next evasion method, "IsRunningInSandbox" checks the current process's file name to determine if it is only hex characters. If so, the malware exits.
Virtual machine detection capabilities exist in some variants that query WMI with the query, "Select * from Win32_ComputerSystem" and compare the model against the following strings:
And checking for the presence of the following files:
Persistence
Persistence is typically something handled by the crypter/packed executable, however DarkCloud does support persistence via the RunOnce registry key. It uses a list of random words to serve as the value name for the registry entry.
File Grabber
The malware supports generic collection of files matching the following paths and extensions.
Paths:
File extensions:
Crypto-Wallet Targeting
DarkCloud has been observed targeting the following crypto-wallet files/directories.
Log Structure
The format of stolen logs varies depending on the type of log. For example, for stolen passwords/credit cards, the log format resembles what is shown below.
DarkCloud supports exfiltration through SMTP, Telegram, FTP, and Web Panel, with each determining the specific method by which credentials and sensitive information are stolen and transmitted.
If configured to do so, DarkCloud will grab the victim's external IP address through showip[.]net and if that fails, the following URL is queried instead: hxxp://www[.]mediacollege[.]com/internet/utilities/show-ip.shtml.
SMTP
For SMTP, after authenticating successfully, DarkCloud sends stolen cookies and other data in JSON format as multipart/mixed messages. It is worth noting that DarkCloud was also recently updated to support SMTP over SSL.
The figure below displays mock stolen data being exfiltrated to threat actor email "mobile.mailer1@proton[.]me" and is available for further analysis by downloading the PCAP from VirusTotal's CAPE Sandbox for SHA256, 3ac8413215cec66aa18c0e530dbe6bf4cf64017763c9580cf787053689f36eaa.
This pattern continues for other stolen data, such as files collected by the file grabber feature.
Telegram
Exfiltration over Telegram follows a similar pattern – stolen credentials are sent in JSON format to the Telegram API with the victim username and computer name. This PCAP is available for download from VirusTotal's CAPE Sandbox, SHA256: 56089cda02771fd45bdd70071d144472f75047f8fa018092e2a21fe11baf9862.
FTP
Exfiltration of Firefox cookies over FTP (non-TLS) can be seen in the next figure:
eSentire has developed two tools for security researchers. The first tool extracts DarkCloud's malware configuration and is available here. The figure below displays the output of the tool against the sample observed in this case, highlighting how this variant of DarkCloud was set up to use SMTP for exfiltration to the host "mail.apexpharmabd[.]com".
The second tool is an IDA Python-based script that decrypts encrypted strings and comments them in IDA Pro and is available here. The figure below highlights how the tool adds comments where decrypted strings are found. In this case, the comment displays the bot token for a different sample that uses Telegram for exfiltration.
rule DarkCloud {
meta:
author = "YungBinary"
description = "Detects DarkCloud infostealer in memory"
strings:
$darkcloud1 = "===============DARKCLOUD===============" fullword wide
$creds1 = "@GateUrl" wide
$creds2 = "@StrFtpUser" wide
$creds3 = "@StrFtpPass" wide
$creds4 = "@StrFtpServer" wide
$creds5 = "@StrReceiver" wide
$creds6 = "@StrSmtpUser" wide
$creds7 = "@StrSmtpPass" wide
$sql1 = "SELECT item1 FROM metadata" wide
$sql2 = "SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards" wide
$sql3 = "SELECT hostname, encryptedUsername, encryptedPassword FROM moz_logins" wide
$sql4 = "SELECT address FROM ConversationRecipients" wide
$sql5 = "SELECT address FROM ConversationSenders" wide
$app1 = "Application : Pidgin" wide
$app2 = "Application: CoreFTP" wide
$app3 = "Application: WinSCP" wide
$app4 = "Application: Outlook" wide
$app5 = "Application : FileZilla" fullword wide
$fingerprint1 = "Computer Name: " fullword wide
$fingerprint2 = "OS FullName: " fullword wide
$fingerprint3 = "CPU: " fullword wide
$fingerprint4 = "SELECT * FROM Win32_Processor" fullword wide
$fingerprint5 = "SELECT * FROM Win32_OperatingSystem" fullword wide
condition:
uint16(0) == 0x5a4d and
(
$darkcloud1 and 1 of ($creds*) or
(3 of ($creds*) and 1 of ($sql*)) or
(2 of ($sql*) and 2 of ($app*)) or
(2 of ($creds*) and 2 of ($fingerprint*)) or
(2 of ($app*) and 2 of ($fingerprint*) and 1 of ($sql*))
)
}
To learn how your organization can build cyber resilience and prevent business disruption with eSentire’s Next Level MDR, connect with an eSentire Security Specialist now.
GET STARTEDThe eSentire Threat Response Unit (TRU) is an industry-leading threat research team committed to helping your organization become more resilient. TRU is an elite team of threat hunters and researchers that supports our 24/7 Security Operations Centers (SOCs), builds threat detection models across the eSentire XDR Cloud Platform, and works as an extension of your security team to continuously improve our Managed Detection and Response service. By providing complete visibility across your attack surface and performing global threat sweeps and proactive hypothesis-driven threat hunts augmented by original threat research, we are laser-focused on defending your organization against known and unknown threats.