ClickFix Gets Creative: Malware Buried in Images
The ClickFix malware campaign employs sophisticated multi-stage execution leveraging steganography to hide malicious payloads within PNG images. It uses social engineering lures mimicking 'Human Verification' and fake Windows Update screens to trick users into initiating the infection chain. The attack chain involves legitimate Windows tools like mshta. exe, PowerShell, and . NET assemblies to extract and inject shellcode into processes, evading traditional signature-based detection. The hidden payloads include infostealers such as LummaC2 and Rhadamanthys, designed to exfiltrate sensitive information. This technique complicates detection and forensic analysis due to the payload being embedded in image pixel data and reconstructed only in memory. Although no active exploits are reported in the wild yet, the campaign's complexity and stealth pose a significant risk. European organizations, especially those with Windows environments and users susceptible to social engineering, are potential targets. Mitigation requires enhanced user awareness, monitoring of mshta and PowerShell usage, and advanced detection capabilities for steganographic payloads.
AI Analysis
Technical Summary
The ClickFix malware campaign represents a sophisticated multi-stage attack chain beginning with social engineering lures that impersonate legitimate prompts such as 'Human Verification' or a Windows Update screen. Victims are tricked into executing malicious content that initiates a chain involving mshta.exe, PowerShell scripts, and .NET assemblies. The core innovation lies in the use of steganography to embed malicious code within PNG images by encoding payload data into specific color channels of the image pixels. This payload is not directly executable but is reconstructed and decrypted in memory during runtime, which helps evade signature-based antivirus and endpoint detection systems. The final payloads delivered include infostealing malware families LummaC2 and Rhadamanthys, which are capable of harvesting credentials and sensitive data from compromised systems. The malware injects shellcode into legitimate processes to maintain stealth and persistence. Indicators of compromise include specific hashes, IP addresses, and a wide range of suspicious domains primarily with .su and other less common TLDs. While no known exploits are currently active in the wild, the campaign’s use of legitimate Windows tools and advanced evasion techniques makes it a credible threat. The campaign leverages multiple MITRE ATT&CK techniques such as T1204.002 (User Execution), T1106 (Execution through API), T1140 (Deobfuscate/Decode Files or Information), T1055 (Process Injection), and T1547.001 (Registry Run Keys / Startup Folder), highlighting its complexity and stealth.
Potential Impact
For European organizations, the impact of this malware campaign could be significant, particularly for enterprises relying heavily on Windows environments and those with users vulnerable to social engineering. The infostealing payloads LummaC2 and Rhadamanthys can lead to credential theft, unauthorized access, and data exfiltration, potentially compromising sensitive corporate and personal data. The use of steganography complicates detection and forensic investigation, increasing dwell time and risk of lateral movement within networks. Organizations in sectors with high-value data such as finance, healthcare, government, and critical infrastructure could face operational disruption, reputational damage, and regulatory penalties under GDPR if personal data is compromised. The campaign’s reliance on user interaction and legitimate Windows tools means that phishing and social engineering defenses are critical. The presence of multiple suspicious domains and IPs also indicates a broad infrastructure that could be leveraged for command and control or further attacks, increasing the threat surface.
Mitigation Recommendations
1. Enhance user awareness training focusing on recognizing social engineering lures, especially fake verification prompts and Windows update screens. 2. Implement strict application control policies to monitor and restrict the execution of mshta.exe, PowerShell scripts, and suspicious .NET assemblies, especially those launched from untrusted sources or unusual contexts. 3. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting steganographic payloads and anomalous in-memory code execution and process injection behaviors. 4. Monitor network traffic for connections to known malicious domains and IP addresses associated with this campaign, and block or quarantine suspicious communications. 5. Use threat intelligence feeds to update detection rules with the provided indicators of compromise (hashes, domains, IPs). 6. Employ multi-factor authentication (MFA) to reduce the impact of credential theft. 7. Regularly audit and harden registry run keys and startup folders to detect unauthorized persistence mechanisms. 8. Conduct regular memory forensics and behavioral analysis to identify stealthy malware activity that bypasses signature detection. 9. Maintain up-to-date backups and incident response plans to quickly recover from potential infections. 10. Consider network segmentation to limit lateral movement if a system is compromised.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Greece
Indicators of Compromise
- hash: cd8302542f494f4d8fbcb2d21425b316
- ip: 192.124.176.103
- ip: 81.90.29.64
- ip: 94.74.164.136
- url: http://bendavo.su/asdsa
- url: http://conxmsw.su/vcsf
- url: http://corezea.com/ebc
- url: http://exposqw.su/casc
- url: http://narroxp.su/rewd
- url: http://ozonelf.su/asd
- url: http://squatje.su/asdasd
- url: http://squeaue.su/qwe
- url: http://vicareu.su/bcdf
- domain: bendavo.su
- domain: cmevents.live
- domain: conxmsw.su
- domain: corezea.com
- domain: exposqw.su
- domain: galaxyswapper.pro
- domain: groupewadesecurity.com
- domain: hypudyk.shop
- domain: narroxp.su
- domain: ozonelf.su
- domain: securitysettings.live
- domain: sportsstories.gr
- domain: squatje.su
- domain: squeaue.su
- domain: vicareu.su
- domain: virhtechgmbh.com
- domain: xcvcxoipoeww.site
- domain: xmcniiadpwqw.site
- domain: xoiiasdpsdoasdpojas.com
- domain: xpoalswwkjddsljsy.com
ClickFix Gets Creative: Malware Buried in Images
Description
The ClickFix malware campaign employs sophisticated multi-stage execution leveraging steganography to hide malicious payloads within PNG images. It uses social engineering lures mimicking 'Human Verification' and fake Windows Update screens to trick users into initiating the infection chain. The attack chain involves legitimate Windows tools like mshta. exe, PowerShell, and . NET assemblies to extract and inject shellcode into processes, evading traditional signature-based detection. The hidden payloads include infostealers such as LummaC2 and Rhadamanthys, designed to exfiltrate sensitive information. This technique complicates detection and forensic analysis due to the payload being embedded in image pixel data and reconstructed only in memory. Although no active exploits are reported in the wild yet, the campaign's complexity and stealth pose a significant risk. European organizations, especially those with Windows environments and users susceptible to social engineering, are potential targets. Mitigation requires enhanced user awareness, monitoring of mshta and PowerShell usage, and advanced detection capabilities for steganographic payloads.
AI-Powered Analysis
Technical Analysis
The ClickFix malware campaign represents a sophisticated multi-stage attack chain beginning with social engineering lures that impersonate legitimate prompts such as 'Human Verification' or a Windows Update screen. Victims are tricked into executing malicious content that initiates a chain involving mshta.exe, PowerShell scripts, and .NET assemblies. The core innovation lies in the use of steganography to embed malicious code within PNG images by encoding payload data into specific color channels of the image pixels. This payload is not directly executable but is reconstructed and decrypted in memory during runtime, which helps evade signature-based antivirus and endpoint detection systems. The final payloads delivered include infostealing malware families LummaC2 and Rhadamanthys, which are capable of harvesting credentials and sensitive data from compromised systems. The malware injects shellcode into legitimate processes to maintain stealth and persistence. Indicators of compromise include specific hashes, IP addresses, and a wide range of suspicious domains primarily with .su and other less common TLDs. While no known exploits are currently active in the wild, the campaign’s use of legitimate Windows tools and advanced evasion techniques makes it a credible threat. The campaign leverages multiple MITRE ATT&CK techniques such as T1204.002 (User Execution), T1106 (Execution through API), T1140 (Deobfuscate/Decode Files or Information), T1055 (Process Injection), and T1547.001 (Registry Run Keys / Startup Folder), highlighting its complexity and stealth.
Potential Impact
For European organizations, the impact of this malware campaign could be significant, particularly for enterprises relying heavily on Windows environments and those with users vulnerable to social engineering. The infostealing payloads LummaC2 and Rhadamanthys can lead to credential theft, unauthorized access, and data exfiltration, potentially compromising sensitive corporate and personal data. The use of steganography complicates detection and forensic investigation, increasing dwell time and risk of lateral movement within networks. Organizations in sectors with high-value data such as finance, healthcare, government, and critical infrastructure could face operational disruption, reputational damage, and regulatory penalties under GDPR if personal data is compromised. The campaign’s reliance on user interaction and legitimate Windows tools means that phishing and social engineering defenses are critical. The presence of multiple suspicious domains and IPs also indicates a broad infrastructure that could be leveraged for command and control or further attacks, increasing the threat surface.
Mitigation Recommendations
1. Enhance user awareness training focusing on recognizing social engineering lures, especially fake verification prompts and Windows update screens. 2. Implement strict application control policies to monitor and restrict the execution of mshta.exe, PowerShell scripts, and suspicious .NET assemblies, especially those launched from untrusted sources or unusual contexts. 3. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting steganographic payloads and anomalous in-memory code execution and process injection behaviors. 4. Monitor network traffic for connections to known malicious domains and IP addresses associated with this campaign, and block or quarantine suspicious communications. 5. Use threat intelligence feeds to update detection rules with the provided indicators of compromise (hashes, domains, IPs). 6. Employ multi-factor authentication (MFA) to reduce the impact of credential theft. 7. Regularly audit and harden registry run keys and startup folders to detect unauthorized persistence mechanisms. 8. Conduct regular memory forensics and behavioral analysis to identify stealthy malware activity that bypasses signature detection. 9. Maintain up-to-date backups and incident response plans to quickly recover from potential infections. 10. Consider network segmentation to limit lateral movement if a system is compromised.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.huntress.com/blog/clickfix-malware-buried-in-images"]
- Adversary
- null
- Pulse Id
- 6924c9a94b1c7374cf444b82
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hashcd8302542f494f4d8fbcb2d21425b316 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip192.124.176.103 | — | |
ip81.90.29.64 | — | |
ip94.74.164.136 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://bendavo.su/asdsa | — | |
urlhttp://conxmsw.su/vcsf | — | |
urlhttp://corezea.com/ebc | — | |
urlhttp://exposqw.su/casc | — | |
urlhttp://narroxp.su/rewd | — | |
urlhttp://ozonelf.su/asd | — | |
urlhttp://squatje.su/asdasd | — | |
urlhttp://squeaue.su/qwe | — | |
urlhttp://vicareu.su/bcdf | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainbendavo.su | — | |
domaincmevents.live | — | |
domainconxmsw.su | — | |
domaincorezea.com | — | |
domainexposqw.su | — | |
domaingalaxyswapper.pro | — | |
domaingroupewadesecurity.com | — | |
domainhypudyk.shop | — | |
domainnarroxp.su | — | |
domainozonelf.su | — | |
domainsecuritysettings.live | — | |
domainsportsstories.gr | — | |
domainsquatje.su | — | |
domainsqueaue.su | — | |
domainvicareu.su | — | |
domainvirhtechgmbh.com | — | |
domainxcvcxoipoeww.site | — | |
domainxmcniiadpwqw.site | — | |
domainxoiiasdpsdoasdpojas.com | — | |
domainxpoalswwkjddsljsy.com | — |
Threat ID: 6925732e7e8c0fda07ba7658
Added to database: 11/25/2025, 9:13:18 AM
Last enriched: 11/25/2025, 9:28:41 AM
Last updated: 12/5/2025, 12:38:18 AM
Views: 242
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-12-04
MediumQilin Ransomware Claims Data Theft from Church of Scientology
MediumNorth Korean State Hacker's Device Infected with LummaC2 Infostealer Shows Links to $1.4B ByBit Breach, Tools, Specs and More
HighSilver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
MediumNew Android malware lets criminals control your phone and drain your bank account
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.