Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

ClickFix Gets Creative: Malware Buried in Images

0
Medium
Published: Mon Nov 24 2025 (11/24/2025, 21:10:01 UTC)
Source: AlienVault OTX General

Description

A multi-stage malware execution chain originating from a ClickFix lure has been discovered, leading to the delivery of infostealing malware like LummaC2 and Rhadamanthys. The campaign utilizes steganography to hide malicious code within PNG images. Two distinct ClickFix lures were observed: a standard 'Human Verification' and a convincing fake Windows Update screen. The execution chain involves mshta.exe, PowerShell, and .NET assemblies, ultimately extracting and injecting shellcode into target processes. The steganographic technique encodes malicious data directly into image pixel data, using specific color channels for payload reconstruction and decryption in memory. This sophisticated approach helps evade signature-based detection and complicates analysis.

AI-Powered Analysis

AILast updated: 11/25/2025, 09:28:41 UTC

Technical Analysis

The ClickFix malware campaign represents a sophisticated multi-stage attack chain beginning with social engineering lures that impersonate legitimate prompts such as 'Human Verification' or a Windows Update screen. Victims are tricked into executing malicious content that initiates a chain involving mshta.exe, PowerShell scripts, and .NET assemblies. The core innovation lies in the use of steganography to embed malicious code within PNG images by encoding payload data into specific color channels of the image pixels. This payload is not directly executable but is reconstructed and decrypted in memory during runtime, which helps evade signature-based antivirus and endpoint detection systems. The final payloads delivered include infostealing malware families LummaC2 and Rhadamanthys, which are capable of harvesting credentials and sensitive data from compromised systems. The malware injects shellcode into legitimate processes to maintain stealth and persistence. Indicators of compromise include specific hashes, IP addresses, and a wide range of suspicious domains primarily with .su and other less common TLDs. While no known exploits are currently active in the wild, the campaign’s use of legitimate Windows tools and advanced evasion techniques makes it a credible threat. The campaign leverages multiple MITRE ATT&CK techniques such as T1204.002 (User Execution), T1106 (Execution through API), T1140 (Deobfuscate/Decode Files or Information), T1055 (Process Injection), and T1547.001 (Registry Run Keys / Startup Folder), highlighting its complexity and stealth.

Potential Impact

For European organizations, the impact of this malware campaign could be significant, particularly for enterprises relying heavily on Windows environments and those with users vulnerable to social engineering. The infostealing payloads LummaC2 and Rhadamanthys can lead to credential theft, unauthorized access, and data exfiltration, potentially compromising sensitive corporate and personal data. The use of steganography complicates detection and forensic investigation, increasing dwell time and risk of lateral movement within networks. Organizations in sectors with high-value data such as finance, healthcare, government, and critical infrastructure could face operational disruption, reputational damage, and regulatory penalties under GDPR if personal data is compromised. The campaign’s reliance on user interaction and legitimate Windows tools means that phishing and social engineering defenses are critical. The presence of multiple suspicious domains and IPs also indicates a broad infrastructure that could be leveraged for command and control or further attacks, increasing the threat surface.

Mitigation Recommendations

1. Enhance user awareness training focusing on recognizing social engineering lures, especially fake verification prompts and Windows update screens. 2. Implement strict application control policies to monitor and restrict the execution of mshta.exe, PowerShell scripts, and suspicious .NET assemblies, especially those launched from untrusted sources or unusual contexts. 3. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting steganographic payloads and anomalous in-memory code execution and process injection behaviors. 4. Monitor network traffic for connections to known malicious domains and IP addresses associated with this campaign, and block or quarantine suspicious communications. 5. Use threat intelligence feeds to update detection rules with the provided indicators of compromise (hashes, domains, IPs). 6. Employ multi-factor authentication (MFA) to reduce the impact of credential theft. 7. Regularly audit and harden registry run keys and startup folders to detect unauthorized persistence mechanisms. 8. Conduct regular memory forensics and behavioral analysis to identify stealthy malware activity that bypasses signature detection. 9. Maintain up-to-date backups and incident response plans to quickly recover from potential infections. 10. Consider network segmentation to limit lateral movement if a system is compromised.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.huntress.com/blog/clickfix-malware-buried-in-images"]
Adversary
null
Pulse Id
6924c9a94b1c7374cf444b82
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashcd8302542f494f4d8fbcb2d21425b316

Ip

ValueDescriptionCopy
ip192.124.176.103
ip81.90.29.64
ip94.74.164.136

Url

ValueDescriptionCopy
urlhttp://bendavo.su/asdsa
urlhttp://conxmsw.su/vcsf
urlhttp://corezea.com/ebc
urlhttp://exposqw.su/casc
urlhttp://narroxp.su/rewd
urlhttp://ozonelf.su/asd
urlhttp://squatje.su/asdasd
urlhttp://squeaue.su/qwe
urlhttp://vicareu.su/bcdf

Domain

ValueDescriptionCopy
domainbendavo.su
domaincmevents.live
domainconxmsw.su
domaincorezea.com
domainexposqw.su
domaingalaxyswapper.pro
domaingroupewadesecurity.com
domainhypudyk.shop
domainnarroxp.su
domainozonelf.su
domainsecuritysettings.live
domainsportsstories.gr
domainsquatje.su
domainsqueaue.su
domainvicareu.su
domainvirhtechgmbh.com
domainxcvcxoipoeww.site
domainxmcniiadpwqw.site
domainxoiiasdpsdoasdpojas.com
domainxpoalswwkjddsljsy.com

Threat ID: 6925732e7e8c0fda07ba7658

Added to database: 11/25/2025, 9:13:18 AM

Last enriched: 11/25/2025, 9:28:41 AM

Last updated: 1/19/2026, 2:10:47 AM

Views: 393

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats