Botnet Trojan delivered through ClickFix and EtherHiding
A sophisticated phishing campaign impersonating Tesseract OCR was discovered, utilizing typosquatting and ClickFix techniques. The attack chain, named OCRFix, employed multi-stage malware deployments with heavy obfuscation and defense evasion techniques, including EtherHiding. The campaign used BNB Smart Chain TestNet to hide C2 domains through smart contracts. The malware delivery process involved three stages: a loader, a secondary loader for persistence, and a bot listener. The final payload connected to a bot control panel, allowing attackers to manage infected hosts and deploy additional malware. The campaign demonstrated a combination of simple initial access methods with complex delivery chains, highlighting the ongoing effectiveness of techniques like ClickFix and the importance of robust phishing defenses.
AI Analysis
Technical Summary
The OCRFix campaign is a multi-stage malware attack delivered through a sophisticated phishing campaign that impersonates the legitimate Tesseract OCR project. Attackers use typosquatting domains closely resembling the legitimate Tesseract OCR domain to trick victims into downloading malicious payloads. The campaign employs ClickFix, a technique that manipulates user clicks to initiate malware downloads, combined with EtherHiding, a novel defense evasion method that leverages the BNB Smart Chain TestNet blockchain to obscure command and control (C2) domains within smart contracts, making detection and takedown more difficult. The malware deployment chain consists of three stages: an initial loader that executes on the victim's machine, a secondary loader that establishes persistence, and a bot listener that connects to a remote control panel. This control panel enables attackers to manage infected hosts, deploy additional malware, and potentially orchestrate botnet activities. The campaign uses heavy obfuscation and anti-analysis techniques to evade detection by traditional security tools. Indicators of compromise include numerous file hashes, suspicious URLs, and typosquatted domains. While no active exploits have been observed in the wild, the campaign's use of blockchain for C2 domain hiding and multi-stage loaders represents an evolution in malware delivery and evasion tactics. The attack chain leverages common phishing methods but combines them with advanced technical mechanisms, underscoring the need for layered defenses.
Potential Impact
This threat poses a medium-level risk with potentially significant impacts on confidentiality, integrity, and availability for affected organizations. Successful infection can lead to unauthorized remote control of compromised systems, enabling attackers to deploy additional malware, exfiltrate sensitive data, or incorporate infected hosts into a botnet for further malicious activities such as distributed denial-of-service (DDoS) attacks or spam campaigns. The use of blockchain-based domain hiding complicates detection and mitigation efforts, potentially prolonging infection duration and increasing operational impact. Organizations with users susceptible to phishing or those lacking robust endpoint detection capabilities are at higher risk. The persistence mechanisms and multi-stage loaders increase the difficulty of complete eradication once infected. Although no known exploits are currently active in the wild, the campaign's sophistication suggests it could be adapted for broader or more damaging attacks, especially targeting organizations relying on OCR technologies or related software. The stealth and evasion techniques may also allow attackers to maintain long-term access, increasing the risk of data breaches and operational disruption.
Mitigation Recommendations
1. Implement advanced phishing defenses including user training focused on recognizing typosquatting domains and suspicious email content. 2. Deploy email filtering solutions that detect and block phishing attempts leveraging typosquatting and ClickFix techniques. 3. Monitor network traffic for connections to suspicious domains and URLs identified in the indicators, especially those related to the BNB Smart Chain TestNet. 4. Utilize endpoint detection and response (EDR) tools capable of identifying multi-stage loaders and obfuscated malware behaviors. 5. Conduct regular threat hunting exercises focusing on the hashes and domains associated with OCRFix to identify potential infections early. 6. Restrict execution of unknown or unsigned binaries and scripts, particularly those downloaded from email or web sources. 7. Employ DNS filtering and domain reputation services to block access to known malicious typosquatted domains. 8. Monitor blockchain activity related to smart contracts used for C2 domain hiding to detect emerging threats. 9. Maintain up-to-date backups and incident response plans to enable rapid recovery if infection occurs. 10. Collaborate with threat intelligence providers to receive timely updates on new indicators and tactics related to this campaign.
Affected Countries
United States, China, India, Germany, United Kingdom, South Korea, Japan, Russia, Brazil, Canada, Australia, France, Netherlands
Indicators of Compromise
- hash: 20b8714b6e0f2459a21b8e315b79d290
- hash: 3536f953ee2381215ecc1001653b03c2
- hash: b5ad76ef744401aa648f56a83e0db00c
- hash: e2d8dac1c3fe671f4244198953759827
- hash: 4496afeb004df243b656d620f76ffdceef00b345
- hash: 507e814c39b200b05f596d9569675aeb6c25ab4a
- hash: 96f2c607aec4432ccc7b762f9927c91ee04fb0e3
- hash: af6bbae2933e65d632f4f4624315c00d205bf6f7
- hash: c519a422d68e8d93f2b98ecb3fa064398045535e
- hash: 82220e03c9b50959fda633576869c2744c3d45b77b7638b3e975ecaa5d2a6a64
- hash: a6f7210ecc4769228081f0ea8b74d4d4c2b73baff05ec46e87cba996f04d296b
- hash: c637ad6ad634f77f83a78302a0bfec8a21afe8f1852b3db262a76202bf118eb1
- hash: e1016ff75db679ddb522f7e0e5321525f0dc22e2626b193680ce4389fcfb63ae
- url: http://dltruek.com/data
- url: http://dltruek.com/helpU.php
- url: http://dltruek.com/test.php
- domain: checkpointviewzen.com
- domain: dltruek.com
- domain: dltucra.com
- domain: ldture.com
- domain: ldveriz.com
- domain: oklefe.com
- domain: opsecdefcloud.com
- domain: tesseract-ocr.com
- domain: bsc-testnet.publicnode.com
Botnet Trojan delivered through ClickFix and EtherHiding
Description
A sophisticated phishing campaign impersonating Tesseract OCR was discovered, utilizing typosquatting and ClickFix techniques. The attack chain, named OCRFix, employed multi-stage malware deployments with heavy obfuscation and defense evasion techniques, including EtherHiding. The campaign used BNB Smart Chain TestNet to hide C2 domains through smart contracts. The malware delivery process involved three stages: a loader, a secondary loader for persistence, and a bot listener. The final payload connected to a bot control panel, allowing attackers to manage infected hosts and deploy additional malware. The campaign demonstrated a combination of simple initial access methods with complex delivery chains, highlighting the ongoing effectiveness of techniques like ClickFix and the importance of robust phishing defenses.
AI-Powered Analysis
Technical Analysis
The OCRFix campaign is a multi-stage malware attack delivered through a sophisticated phishing campaign that impersonates the legitimate Tesseract OCR project. Attackers use typosquatting domains closely resembling the legitimate Tesseract OCR domain to trick victims into downloading malicious payloads. The campaign employs ClickFix, a technique that manipulates user clicks to initiate malware downloads, combined with EtherHiding, a novel defense evasion method that leverages the BNB Smart Chain TestNet blockchain to obscure command and control (C2) domains within smart contracts, making detection and takedown more difficult. The malware deployment chain consists of three stages: an initial loader that executes on the victim's machine, a secondary loader that establishes persistence, and a bot listener that connects to a remote control panel. This control panel enables attackers to manage infected hosts, deploy additional malware, and potentially orchestrate botnet activities. The campaign uses heavy obfuscation and anti-analysis techniques to evade detection by traditional security tools. Indicators of compromise include numerous file hashes, suspicious URLs, and typosquatted domains. While no active exploits have been observed in the wild, the campaign's use of blockchain for C2 domain hiding and multi-stage loaders represents an evolution in malware delivery and evasion tactics. The attack chain leverages common phishing methods but combines them with advanced technical mechanisms, underscoring the need for layered defenses.
Potential Impact
This threat poses a medium-level risk with potentially significant impacts on confidentiality, integrity, and availability for affected organizations. Successful infection can lead to unauthorized remote control of compromised systems, enabling attackers to deploy additional malware, exfiltrate sensitive data, or incorporate infected hosts into a botnet for further malicious activities such as distributed denial-of-service (DDoS) attacks or spam campaigns. The use of blockchain-based domain hiding complicates detection and mitigation efforts, potentially prolonging infection duration and increasing operational impact. Organizations with users susceptible to phishing or those lacking robust endpoint detection capabilities are at higher risk. The persistence mechanisms and multi-stage loaders increase the difficulty of complete eradication once infected. Although no known exploits are currently active in the wild, the campaign's sophistication suggests it could be adapted for broader or more damaging attacks, especially targeting organizations relying on OCR technologies or related software. The stealth and evasion techniques may also allow attackers to maintain long-term access, increasing the risk of data breaches and operational disruption.
Mitigation Recommendations
1. Implement advanced phishing defenses including user training focused on recognizing typosquatting domains and suspicious email content. 2. Deploy email filtering solutions that detect and block phishing attempts leveraging typosquatting and ClickFix techniques. 3. Monitor network traffic for connections to suspicious domains and URLs identified in the indicators, especially those related to the BNB Smart Chain TestNet. 4. Utilize endpoint detection and response (EDR) tools capable of identifying multi-stage loaders and obfuscated malware behaviors. 5. Conduct regular threat hunting exercises focusing on the hashes and domains associated with OCRFix to identify potential infections early. 6. Restrict execution of unknown or unsigned binaries and scripts, particularly those downloaded from email or web sources. 7. Employ DNS filtering and domain reputation services to block access to known malicious typosquatted domains. 8. Monitor blockchain activity related to smart contracts used for C2 domain hiding to detect emerging threats. 9. Maintain up-to-date backups and incident response plans to enable rapid recovery if infection occurs. 10. Collaborate with threat intelligence providers to receive timely updates on new indicators and tactics related to this campaign.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.cyjax.com/resources/blog/ocrfix-botnet-trojan-delivered-through-clickfix-and-etherhiding"]
- Adversary
- null
- Pulse Id
- 69a163c992e9afc70efc55d7
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash20b8714b6e0f2459a21b8e315b79d290 | — | |
hash3536f953ee2381215ecc1001653b03c2 | — | |
hashb5ad76ef744401aa648f56a83e0db00c | — | |
hashe2d8dac1c3fe671f4244198953759827 | — | |
hash4496afeb004df243b656d620f76ffdceef00b345 | — | |
hash507e814c39b200b05f596d9569675aeb6c25ab4a | — | |
hash96f2c607aec4432ccc7b762f9927c91ee04fb0e3 | — | |
hashaf6bbae2933e65d632f4f4624315c00d205bf6f7 | — | |
hashc519a422d68e8d93f2b98ecb3fa064398045535e | — | |
hash82220e03c9b50959fda633576869c2744c3d45b77b7638b3e975ecaa5d2a6a64 | — | |
hasha6f7210ecc4769228081f0ea8b74d4d4c2b73baff05ec46e87cba996f04d296b | — | |
hashc637ad6ad634f77f83a78302a0bfec8a21afe8f1852b3db262a76202bf118eb1 | — | |
hashe1016ff75db679ddb522f7e0e5321525f0dc22e2626b193680ce4389fcfb63ae | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://dltruek.com/data | — | |
urlhttp://dltruek.com/helpU.php | — | |
urlhttp://dltruek.com/test.php | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaincheckpointviewzen.com | — | |
domaindltruek.com | — | |
domaindltucra.com | — | |
domainldture.com | — | |
domainldveriz.com | — | |
domainoklefe.com | — | |
domainopsecdefcloud.com | — | |
domaintesseract-ocr.com | — | |
domainbsc-testnet.publicnode.com | — |
Threat ID: 69a16a0332ffcdb8a2171d3e
Added to database: 2/27/2026, 9:55:15 AM
Last enriched: 2/27/2026, 10:14:43 AM
Last updated: 2/28/2026, 4:07:05 AM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Maltrail IOC for 2026-02-28
MediumThreatFox IOCs for 2026-02-27
MediumMaltrail IOC for 2026-02-27
MediumFake Fedex Email Delivers Donuts!, (Fri, Feb 27th)
MediumNew Dohdoor malware campaign targets education and health care
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.