ClickFix Gets Creative: Malware Buried in Images
A multi-stage malware execution chain originating from a ClickFix lure has been discovered, leading to the delivery of infostealing malware like LummaC2 and Rhadamanthys. The campaign utilizes steganography to hide malicious code within PNG images. Two distinct ClickFix lures were observed: a standard 'Human Verification' and a convincing fake Windows Update screen. The execution chain involves mshta.exe, PowerShell, and .NET assemblies, ultimately extracting and injecting shellcode into target processes. The steganographic technique encodes malicious data directly into image pixel data, using specific color channels for payload reconstruction and decryption in memory. This sophisticated approach helps evade signature-based detection and complicates analysis.
AI Analysis
Technical Summary
The ClickFix malware campaign represents a sophisticated multi-stage attack chain beginning with social engineering lures that impersonate legitimate prompts such as 'Human Verification' or a Windows Update screen. Victims are tricked into executing malicious content that initiates a chain involving mshta.exe, PowerShell scripts, and .NET assemblies. The core innovation lies in the use of steganography to embed malicious code within PNG images by encoding payload data into specific color channels of the image pixels. This payload is not directly executable but is reconstructed and decrypted in memory during runtime, which helps evade signature-based antivirus and endpoint detection systems. The final payloads delivered include infostealing malware families LummaC2 and Rhadamanthys, which are capable of harvesting credentials and sensitive data from compromised systems. The malware injects shellcode into legitimate processes to maintain stealth and persistence. Indicators of compromise include specific hashes, IP addresses, and a wide range of suspicious domains primarily with .su and other less common TLDs. While no known exploits are currently active in the wild, the campaign’s use of legitimate Windows tools and advanced evasion techniques makes it a credible threat. The campaign leverages multiple MITRE ATT&CK techniques such as T1204.002 (User Execution), T1106 (Execution through API), T1140 (Deobfuscate/Decode Files or Information), T1055 (Process Injection), and T1547.001 (Registry Run Keys / Startup Folder), highlighting its complexity and stealth.
Potential Impact
For European organizations, the impact of this malware campaign could be significant, particularly for enterprises relying heavily on Windows environments and those with users vulnerable to social engineering. The infostealing payloads LummaC2 and Rhadamanthys can lead to credential theft, unauthorized access, and data exfiltration, potentially compromising sensitive corporate and personal data. The use of steganography complicates detection and forensic investigation, increasing dwell time and risk of lateral movement within networks. Organizations in sectors with high-value data such as finance, healthcare, government, and critical infrastructure could face operational disruption, reputational damage, and regulatory penalties under GDPR if personal data is compromised. The campaign’s reliance on user interaction and legitimate Windows tools means that phishing and social engineering defenses are critical. The presence of multiple suspicious domains and IPs also indicates a broad infrastructure that could be leveraged for command and control or further attacks, increasing the threat surface.
Mitigation Recommendations
1. Enhance user awareness training focusing on recognizing social engineering lures, especially fake verification prompts and Windows update screens. 2. Implement strict application control policies to monitor and restrict the execution of mshta.exe, PowerShell scripts, and suspicious .NET assemblies, especially those launched from untrusted sources or unusual contexts. 3. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting steganographic payloads and anomalous in-memory code execution and process injection behaviors. 4. Monitor network traffic for connections to known malicious domains and IP addresses associated with this campaign, and block or quarantine suspicious communications. 5. Use threat intelligence feeds to update detection rules with the provided indicators of compromise (hashes, domains, IPs). 6. Employ multi-factor authentication (MFA) to reduce the impact of credential theft. 7. Regularly audit and harden registry run keys and startup folders to detect unauthorized persistence mechanisms. 8. Conduct regular memory forensics and behavioral analysis to identify stealthy malware activity that bypasses signature detection. 9. Maintain up-to-date backups and incident response plans to quickly recover from potential infections. 10. Consider network segmentation to limit lateral movement if a system is compromised.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Greece
Indicators of Compromise
- hash: cd8302542f494f4d8fbcb2d21425b316
- ip: 192.124.176.103
- ip: 81.90.29.64
- ip: 94.74.164.136
- url: http://bendavo.su/asdsa
- url: http://conxmsw.su/vcsf
- url: http://corezea.com/ebc
- url: http://exposqw.su/casc
- url: http://narroxp.su/rewd
- url: http://ozonelf.su/asd
- url: http://squatje.su/asdasd
- url: http://squeaue.su/qwe
- url: http://vicareu.su/bcdf
- domain: bendavo.su
- domain: cmevents.live
- domain: conxmsw.su
- domain: corezea.com
- domain: exposqw.su
- domain: galaxyswapper.pro
- domain: groupewadesecurity.com
- domain: hypudyk.shop
- domain: narroxp.su
- domain: ozonelf.su
- domain: securitysettings.live
- domain: sportsstories.gr
- domain: squatje.su
- domain: squeaue.su
- domain: vicareu.su
- domain: virhtechgmbh.com
- domain: xcvcxoipoeww.site
- domain: xmcniiadpwqw.site
- domain: xoiiasdpsdoasdpojas.com
- domain: xpoalswwkjddsljsy.com
ClickFix Gets Creative: Malware Buried in Images
Description
A multi-stage malware execution chain originating from a ClickFix lure has been discovered, leading to the delivery of infostealing malware like LummaC2 and Rhadamanthys. The campaign utilizes steganography to hide malicious code within PNG images. Two distinct ClickFix lures were observed: a standard 'Human Verification' and a convincing fake Windows Update screen. The execution chain involves mshta.exe, PowerShell, and .NET assemblies, ultimately extracting and injecting shellcode into target processes. The steganographic technique encodes malicious data directly into image pixel data, using specific color channels for payload reconstruction and decryption in memory. This sophisticated approach helps evade signature-based detection and complicates analysis.
AI-Powered Analysis
Technical Analysis
The ClickFix malware campaign represents a sophisticated multi-stage attack chain beginning with social engineering lures that impersonate legitimate prompts such as 'Human Verification' or a Windows Update screen. Victims are tricked into executing malicious content that initiates a chain involving mshta.exe, PowerShell scripts, and .NET assemblies. The core innovation lies in the use of steganography to embed malicious code within PNG images by encoding payload data into specific color channels of the image pixels. This payload is not directly executable but is reconstructed and decrypted in memory during runtime, which helps evade signature-based antivirus and endpoint detection systems. The final payloads delivered include infostealing malware families LummaC2 and Rhadamanthys, which are capable of harvesting credentials and sensitive data from compromised systems. The malware injects shellcode into legitimate processes to maintain stealth and persistence. Indicators of compromise include specific hashes, IP addresses, and a wide range of suspicious domains primarily with .su and other less common TLDs. While no known exploits are currently active in the wild, the campaign’s use of legitimate Windows tools and advanced evasion techniques makes it a credible threat. The campaign leverages multiple MITRE ATT&CK techniques such as T1204.002 (User Execution), T1106 (Execution through API), T1140 (Deobfuscate/Decode Files or Information), T1055 (Process Injection), and T1547.001 (Registry Run Keys / Startup Folder), highlighting its complexity and stealth.
Potential Impact
For European organizations, the impact of this malware campaign could be significant, particularly for enterprises relying heavily on Windows environments and those with users vulnerable to social engineering. The infostealing payloads LummaC2 and Rhadamanthys can lead to credential theft, unauthorized access, and data exfiltration, potentially compromising sensitive corporate and personal data. The use of steganography complicates detection and forensic investigation, increasing dwell time and risk of lateral movement within networks. Organizations in sectors with high-value data such as finance, healthcare, government, and critical infrastructure could face operational disruption, reputational damage, and regulatory penalties under GDPR if personal data is compromised. The campaign’s reliance on user interaction and legitimate Windows tools means that phishing and social engineering defenses are critical. The presence of multiple suspicious domains and IPs also indicates a broad infrastructure that could be leveraged for command and control or further attacks, increasing the threat surface.
Mitigation Recommendations
1. Enhance user awareness training focusing on recognizing social engineering lures, especially fake verification prompts and Windows update screens. 2. Implement strict application control policies to monitor and restrict the execution of mshta.exe, PowerShell scripts, and suspicious .NET assemblies, especially those launched from untrusted sources or unusual contexts. 3. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting steganographic payloads and anomalous in-memory code execution and process injection behaviors. 4. Monitor network traffic for connections to known malicious domains and IP addresses associated with this campaign, and block or quarantine suspicious communications. 5. Use threat intelligence feeds to update detection rules with the provided indicators of compromise (hashes, domains, IPs). 6. Employ multi-factor authentication (MFA) to reduce the impact of credential theft. 7. Regularly audit and harden registry run keys and startup folders to detect unauthorized persistence mechanisms. 8. Conduct regular memory forensics and behavioral analysis to identify stealthy malware activity that bypasses signature detection. 9. Maintain up-to-date backups and incident response plans to quickly recover from potential infections. 10. Consider network segmentation to limit lateral movement if a system is compromised.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.huntress.com/blog/clickfix-malware-buried-in-images"]
- Adversary
- null
- Pulse Id
- 6924c9a94b1c7374cf444b82
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hashcd8302542f494f4d8fbcb2d21425b316 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip192.124.176.103 | — | |
ip81.90.29.64 | — | |
ip94.74.164.136 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://bendavo.su/asdsa | — | |
urlhttp://conxmsw.su/vcsf | — | |
urlhttp://corezea.com/ebc | — | |
urlhttp://exposqw.su/casc | — | |
urlhttp://narroxp.su/rewd | — | |
urlhttp://ozonelf.su/asd | — | |
urlhttp://squatje.su/asdasd | — | |
urlhttp://squeaue.su/qwe | — | |
urlhttp://vicareu.su/bcdf | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainbendavo.su | — | |
domaincmevents.live | — | |
domainconxmsw.su | — | |
domaincorezea.com | — | |
domainexposqw.su | — | |
domaingalaxyswapper.pro | — | |
domaingroupewadesecurity.com | — | |
domainhypudyk.shop | — | |
domainnarroxp.su | — | |
domainozonelf.su | — | |
domainsecuritysettings.live | — | |
domainsportsstories.gr | — | |
domainsquatje.su | — | |
domainsqueaue.su | — | |
domainvicareu.su | — | |
domainvirhtechgmbh.com | — | |
domainxcvcxoipoeww.site | — | |
domainxmcniiadpwqw.site | — | |
domainxoiiasdpsdoasdpojas.com | — | |
domainxpoalswwkjddsljsy.com | — |
Threat ID: 6925732e7e8c0fda07ba7658
Added to database: 11/25/2025, 9:13:18 AM
Last enriched: 11/25/2025, 9:28:41 AM
Last updated: 1/19/2026, 2:10:47 AM
Views: 393
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-01-18
MediumThreatFox IOCs for 2026-01-17
MediumLOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing
MediumGootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade Detection
MediumThreatFox IOCs for 2026-01-16
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.