Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

ClickFix Gets Creative: Malware Buried in Images

0
Medium
Published: Mon Nov 24 2025 (11/24/2025, 21:10:01 UTC)
Source: AlienVault OTX General

Description

The ClickFix malware campaign employs sophisticated multi-stage execution leveraging steganography to hide malicious payloads within PNG images. It uses social engineering lures mimicking 'Human Verification' and fake Windows Update screens to trick users into initiating the infection chain. The attack chain involves legitimate Windows tools like mshta. exe, PowerShell, and . NET assemblies to extract and inject shellcode into processes, evading traditional signature-based detection. The hidden payloads include infostealers such as LummaC2 and Rhadamanthys, designed to exfiltrate sensitive information. This technique complicates detection and forensic analysis due to the payload being embedded in image pixel data and reconstructed only in memory. Although no active exploits are reported in the wild yet, the campaign's complexity and stealth pose a significant risk. European organizations, especially those with Windows environments and users susceptible to social engineering, are potential targets. Mitigation requires enhanced user awareness, monitoring of mshta and PowerShell usage, and advanced detection capabilities for steganographic payloads.

AI-Powered Analysis

AILast updated: 11/25/2025, 09:28:41 UTC

Technical Analysis

The ClickFix malware campaign represents a sophisticated multi-stage attack chain beginning with social engineering lures that impersonate legitimate prompts such as 'Human Verification' or a Windows Update screen. Victims are tricked into executing malicious content that initiates a chain involving mshta.exe, PowerShell scripts, and .NET assemblies. The core innovation lies in the use of steganography to embed malicious code within PNG images by encoding payload data into specific color channels of the image pixels. This payload is not directly executable but is reconstructed and decrypted in memory during runtime, which helps evade signature-based antivirus and endpoint detection systems. The final payloads delivered include infostealing malware families LummaC2 and Rhadamanthys, which are capable of harvesting credentials and sensitive data from compromised systems. The malware injects shellcode into legitimate processes to maintain stealth and persistence. Indicators of compromise include specific hashes, IP addresses, and a wide range of suspicious domains primarily with .su and other less common TLDs. While no known exploits are currently active in the wild, the campaign’s use of legitimate Windows tools and advanced evasion techniques makes it a credible threat. The campaign leverages multiple MITRE ATT&CK techniques such as T1204.002 (User Execution), T1106 (Execution through API), T1140 (Deobfuscate/Decode Files or Information), T1055 (Process Injection), and T1547.001 (Registry Run Keys / Startup Folder), highlighting its complexity and stealth.

Potential Impact

For European organizations, the impact of this malware campaign could be significant, particularly for enterprises relying heavily on Windows environments and those with users vulnerable to social engineering. The infostealing payloads LummaC2 and Rhadamanthys can lead to credential theft, unauthorized access, and data exfiltration, potentially compromising sensitive corporate and personal data. The use of steganography complicates detection and forensic investigation, increasing dwell time and risk of lateral movement within networks. Organizations in sectors with high-value data such as finance, healthcare, government, and critical infrastructure could face operational disruption, reputational damage, and regulatory penalties under GDPR if personal data is compromised. The campaign’s reliance on user interaction and legitimate Windows tools means that phishing and social engineering defenses are critical. The presence of multiple suspicious domains and IPs also indicates a broad infrastructure that could be leveraged for command and control or further attacks, increasing the threat surface.

Mitigation Recommendations

1. Enhance user awareness training focusing on recognizing social engineering lures, especially fake verification prompts and Windows update screens. 2. Implement strict application control policies to monitor and restrict the execution of mshta.exe, PowerShell scripts, and suspicious .NET assemblies, especially those launched from untrusted sources or unusual contexts. 3. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting steganographic payloads and anomalous in-memory code execution and process injection behaviors. 4. Monitor network traffic for connections to known malicious domains and IP addresses associated with this campaign, and block or quarantine suspicious communications. 5. Use threat intelligence feeds to update detection rules with the provided indicators of compromise (hashes, domains, IPs). 6. Employ multi-factor authentication (MFA) to reduce the impact of credential theft. 7. Regularly audit and harden registry run keys and startup folders to detect unauthorized persistence mechanisms. 8. Conduct regular memory forensics and behavioral analysis to identify stealthy malware activity that bypasses signature detection. 9. Maintain up-to-date backups and incident response plans to quickly recover from potential infections. 10. Consider network segmentation to limit lateral movement if a system is compromised.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.huntress.com/blog/clickfix-malware-buried-in-images"]
Adversary
null
Pulse Id
6924c9a94b1c7374cf444b82
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashcd8302542f494f4d8fbcb2d21425b316

Ip

ValueDescriptionCopy
ip192.124.176.103
ip81.90.29.64
ip94.74.164.136

Url

ValueDescriptionCopy
urlhttp://bendavo.su/asdsa
urlhttp://conxmsw.su/vcsf
urlhttp://corezea.com/ebc
urlhttp://exposqw.su/casc
urlhttp://narroxp.su/rewd
urlhttp://ozonelf.su/asd
urlhttp://squatje.su/asdasd
urlhttp://squeaue.su/qwe
urlhttp://vicareu.su/bcdf

Domain

ValueDescriptionCopy
domainbendavo.su
domaincmevents.live
domainconxmsw.su
domaincorezea.com
domainexposqw.su
domaingalaxyswapper.pro
domaingroupewadesecurity.com
domainhypudyk.shop
domainnarroxp.su
domainozonelf.su
domainsecuritysettings.live
domainsportsstories.gr
domainsquatje.su
domainsqueaue.su
domainvicareu.su
domainvirhtechgmbh.com
domainxcvcxoipoeww.site
domainxmcniiadpwqw.site
domainxoiiasdpsdoasdpojas.com
domainxpoalswwkjddsljsy.com

Threat ID: 6925732e7e8c0fda07ba7658

Added to database: 11/25/2025, 9:13:18 AM

Last enriched: 11/25/2025, 9:28:41 AM

Last updated: 12/5/2025, 12:38:18 AM

Views: 242

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats