DarkCloud Infostealer Being Distributed via Spam Emails By ATCP Published: 2023-05-16 · Archived: 2026-04-05 22:52:07 UTC AhnLab Security Emergency response Center (ASEC) has recently discovered the DarkCloud malware being distributed via spam email. DarkCloud is an Infostealer that steals account credentials saved on infected systems, and the threat actor installed ClipBanker alongside DarkCloud. 1. Distribution Method The threat actor sent the following email to induce users to download and execute the attachment. https://asec.ahnlab.com/en/53128/ Page 1 of 7 The contents of this email prompt users to check the attached copy of the payment statement sent to the company account. When the attachment is uncompressed, normal users are likely to execute the contained malware as it is disguised with a PDF icon. The file attached to the email is a dropper that is responsible for generating and executing DarkCloud and ClipBanker. If a user downloads the attached file in the email and executes it after decompressing, various account credentials present on the infected system can be stolen. Additionally, if the user copies a cryptocurrency wallet address to their clipboard, there is a risk of it being replaced with the threat actor’s address, resulting in funds being sent to the threat actor’s wallet during transactions. 2. Malware Attachment The file attached to the email is a dropper that first copies itself to the %APPDATA%\Zwldpcobpfq\Gdktpnpm.exe path before registering itself to the Run key so that it can operate even after reboots. Afterward, it generates and executes two individual malware in the %TEMP% path. 2.1. ClipBanker “Lilgghom.exe”, which is the first malware generated and executed, is the ClipBanker. ClipBanker resides on the system and, when the user copies a Bitcoin or Ethereum cryptocurrency wallet address, it replaces it with the threat actor’s wallet address. A coin wallet address normally has a certain form, but it is difficult to memorize as the string is long and complicated. Hence, users are likely to copy and paste the address when using it. Should the https://asec.ahnlab.com/en/53128/ Page 2 of 7 wallet address change at this stage, users who want to deposit money to a certain wallet may end up depositing it to a different wallet because the address is changed to that of the attacker’s wallet. The ClipBanker used in the attack was created under the name “Get Cliboard Address.exe” and monitors the clipboard. When an entry that matches the following regular expressions is saved, it is changed to the wallet address defined by the threat actor. Bitcoin: “(?