Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Botnet Trojan delivered through ClickFix and EtherHiding

0
Medium
Published: Fri Feb 27 2026 (02/27/2026, 09:28:41 UTC)
Source: AlienVault OTX General

Description

A sophisticated phishing campaign impersonating Tesseract OCR was discovered, utilizing typosquatting and ClickFix techniques. The attack chain, named OCRFix, employed multi-stage malware deployments with heavy obfuscation and defense evasion techniques, including EtherHiding. The campaign used BNB Smart Chain TestNet to hide C2 domains through smart contracts. The malware delivery process involved three stages: a loader, a secondary loader for persistence, and a bot listener. The final payload connected to a bot control panel, allowing attackers to manage infected hosts and deploy additional malware. The campaign demonstrated a combination of simple initial access methods with complex delivery chains, highlighting the ongoing effectiveness of techniques like ClickFix and the importance of robust phishing defenses.

AI-Powered Analysis

AILast updated: 02/27/2026, 10:14:43 UTC

Technical Analysis

The OCRFix campaign is a multi-stage malware attack delivered through a sophisticated phishing campaign that impersonates the legitimate Tesseract OCR project. Attackers use typosquatting domains closely resembling the legitimate Tesseract OCR domain to trick victims into downloading malicious payloads. The campaign employs ClickFix, a technique that manipulates user clicks to initiate malware downloads, combined with EtherHiding, a novel defense evasion method that leverages the BNB Smart Chain TestNet blockchain to obscure command and control (C2) domains within smart contracts, making detection and takedown more difficult. The malware deployment chain consists of three stages: an initial loader that executes on the victim's machine, a secondary loader that establishes persistence, and a bot listener that connects to a remote control panel. This control panel enables attackers to manage infected hosts, deploy additional malware, and potentially orchestrate botnet activities. The campaign uses heavy obfuscation and anti-analysis techniques to evade detection by traditional security tools. Indicators of compromise include numerous file hashes, suspicious URLs, and typosquatted domains. While no active exploits have been observed in the wild, the campaign's use of blockchain for C2 domain hiding and multi-stage loaders represents an evolution in malware delivery and evasion tactics. The attack chain leverages common phishing methods but combines them with advanced technical mechanisms, underscoring the need for layered defenses.

Potential Impact

This threat poses a medium-level risk with potentially significant impacts on confidentiality, integrity, and availability for affected organizations. Successful infection can lead to unauthorized remote control of compromised systems, enabling attackers to deploy additional malware, exfiltrate sensitive data, or incorporate infected hosts into a botnet for further malicious activities such as distributed denial-of-service (DDoS) attacks or spam campaigns. The use of blockchain-based domain hiding complicates detection and mitigation efforts, potentially prolonging infection duration and increasing operational impact. Organizations with users susceptible to phishing or those lacking robust endpoint detection capabilities are at higher risk. The persistence mechanisms and multi-stage loaders increase the difficulty of complete eradication once infected. Although no known exploits are currently active in the wild, the campaign's sophistication suggests it could be adapted for broader or more damaging attacks, especially targeting organizations relying on OCR technologies or related software. The stealth and evasion techniques may also allow attackers to maintain long-term access, increasing the risk of data breaches and operational disruption.

Mitigation Recommendations

1. Implement advanced phishing defenses including user training focused on recognizing typosquatting domains and suspicious email content. 2. Deploy email filtering solutions that detect and block phishing attempts leveraging typosquatting and ClickFix techniques. 3. Monitor network traffic for connections to suspicious domains and URLs identified in the indicators, especially those related to the BNB Smart Chain TestNet. 4. Utilize endpoint detection and response (EDR) tools capable of identifying multi-stage loaders and obfuscated malware behaviors. 5. Conduct regular threat hunting exercises focusing on the hashes and domains associated with OCRFix to identify potential infections early. 6. Restrict execution of unknown or unsigned binaries and scripts, particularly those downloaded from email or web sources. 7. Employ DNS filtering and domain reputation services to block access to known malicious typosquatted domains. 8. Monitor blockchain activity related to smart contracts used for C2 domain hiding to detect emerging threats. 9. Maintain up-to-date backups and incident response plans to enable rapid recovery if infection occurs. 10. Collaborate with threat intelligence providers to receive timely updates on new indicators and tactics related to this campaign.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.cyjax.com/resources/blog/ocrfix-botnet-trojan-delivered-through-clickfix-and-etherhiding"]
Adversary
null
Pulse Id
69a163c992e9afc70efc55d7
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash20b8714b6e0f2459a21b8e315b79d290
hash3536f953ee2381215ecc1001653b03c2
hashb5ad76ef744401aa648f56a83e0db00c
hashe2d8dac1c3fe671f4244198953759827
hash4496afeb004df243b656d620f76ffdceef00b345
hash507e814c39b200b05f596d9569675aeb6c25ab4a
hash96f2c607aec4432ccc7b762f9927c91ee04fb0e3
hashaf6bbae2933e65d632f4f4624315c00d205bf6f7
hashc519a422d68e8d93f2b98ecb3fa064398045535e
hash82220e03c9b50959fda633576869c2744c3d45b77b7638b3e975ecaa5d2a6a64
hasha6f7210ecc4769228081f0ea8b74d4d4c2b73baff05ec46e87cba996f04d296b
hashc637ad6ad634f77f83a78302a0bfec8a21afe8f1852b3db262a76202bf118eb1
hashe1016ff75db679ddb522f7e0e5321525f0dc22e2626b193680ce4389fcfb63ae

Url

ValueDescriptionCopy
urlhttp://dltruek.com/data
urlhttp://dltruek.com/helpU.php
urlhttp://dltruek.com/test.php

Domain

ValueDescriptionCopy
domaincheckpointviewzen.com
domaindltruek.com
domaindltucra.com
domainldture.com
domainldveriz.com
domainoklefe.com
domainopsecdefcloud.com
domaintesseract-ocr.com
domainbsc-testnet.publicnode.com

Threat ID: 69a16a0332ffcdb8a2171d3e

Added to database: 2/27/2026, 9:55:15 AM

Last enriched: 2/27/2026, 10:14:43 AM

Last updated: 2/28/2026, 4:07:05 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses