Skip to main content

FileFix in the wild! New FileFix campaign goes beyond POC and leverages steganography

Medium
Published: Tue Sep 16 2025 (09/16/2025, 14:29:35 UTC)
Source: AlienVault OTX General

Description

A sophisticated FileFix attack campaign has been discovered, marking the first use of this technique beyond proof-of-concept. The attack employs a complex phishing infrastructure, including a multilingual site mimicking Facebook security. It uses steganography to conceal malicious code in images, with a multistage payload delivery system featuring layered obfuscation and evasion techniques. The final payload deploys a StealC infostealer targeting various applications and credentials. The campaign has evolved rapidly over two weeks, indicating a global targeting strategy with potential victims in multiple countries. This attack represents a significant advancement in *Fix attack sophistication, combining FileFix with advanced tradecraft to maximize both evasion and impact.

AI-Powered Analysis

AILast updated: 09/16/2025, 14:34:29 UTC

Technical Analysis

The FileFix campaign represents a sophisticated malware attack that has transitioned from proof-of-concept to active exploitation in the wild. This campaign employs a complex phishing infrastructure, including multilingual phishing websites that impersonate Facebook security pages to lure victims. A notable technical advancement in this campaign is the use of steganography to conceal malicious code within images, which helps evade traditional detection mechanisms. The attack utilizes a multistage payload delivery system characterized by layered obfuscation and evasion techniques, making it difficult for security tools to detect and analyze the malware at early stages. The final payload deployed is the StealC infostealer, which targets a broad range of applications and credentials, aiming to exfiltrate sensitive user data such as login credentials, session tokens, and potentially other personal or corporate information. The campaign has evolved rapidly over a short period (two weeks), indicating an agile threat actor employing advanced tradecraft to maximize evasion and impact. Indicators of compromise include multiple file hashes, IP addresses, and domains associated with the phishing infrastructure and malware delivery. The attack techniques align with several MITRE ATT&CK tactics and techniques, including credential dumping (T1003), phishing (T1566.002), obfuscated files or information (T1027), process injection (T1055), and use of steganography (T1001.003). The campaign's global targeting strategy suggests potential victims across multiple countries, with confirmed activity in Germany. The combination of social engineering, advanced obfuscation, and steganography marks a significant evolution in FileFix attack sophistication, posing a serious threat to organizations relying on user vigilance and traditional detection methods.

Potential Impact

For European organizations, the FileFix campaign poses a significant risk to confidentiality and integrity of sensitive information. The use of phishing to gain initial access exploits human factors, which remain a primary vulnerability in many organizations. Once infected, the StealC infostealer can exfiltrate credentials and other sensitive data, potentially leading to further compromise such as unauthorized access to corporate networks, financial fraud, or intellectual property theft. The multistage and obfuscated nature of the payload complicates detection and response efforts, increasing dwell time and potential damage. Given the campaign’s rapid evolution and multilingual phishing sites, organizations across Europe, especially those with employees using Facebook or related services, are at risk. The attack can disrupt business operations by compromising user accounts and potentially enabling lateral movement within networks. Additionally, the use of steganography to hide malicious code in images challenges conventional security controls, requiring more advanced detection capabilities. The campaign’s targeting of credentials also threatens the security of cloud services, email systems, and other critical infrastructure commonly used by European enterprises.

Mitigation Recommendations

1. Enhance phishing detection and user awareness training with a focus on identifying sophisticated phishing sites, especially those impersonating trusted brands like Facebook. 2. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting obfuscated and multistage payloads, including behavioral analysis to identify steganography-based code execution. 3. Implement strict email filtering and URL reputation services to block access to known malicious domains and IPs associated with this campaign (e.g., facebook.meta-software-worldwide.com, facebook.windows-software-updates.com). 4. Enforce multi-factor authentication (MFA) across all user accounts to mitigate the impact of credential theft. 5. Monitor network traffic for unusual outbound connections, especially to the identified IP 77.90.153.225 and suspicious domains. 6. Regularly update and patch all software and systems to reduce attack surface, even though no specific vulnerable versions are listed for this campaign. 7. Use threat intelligence feeds to incorporate the provided hashes and indicators of compromise into detection tools. 8. Conduct regular credential audits and implement least privilege access controls to limit the damage from stolen credentials. 9. Employ steganography detection tools or services to analyze inbound images and attachments for hidden code. 10. Establish incident response plans that include rapid containment and eradication procedures for multistage malware infections.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.acronis.com/en/tru/posts/filefix-in-the-wild-new-filefix-campaign-goes-beyond-poc-and-leverages-steganography/"]
Adversary
null
Pulse Id
68c9744f0aaab46e25efb97d
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash3344a2d675911a0136199004cf8ec059
hash4e2ff4d859e04af8d01fd961ab56163736a731f9
hashc2423a732cbbc194edfc0f17145896309598ac37
hash06471e1f500612f44c828e5d3453e7846f70c2d83b24c08ac9193e791f1a8130
hash08fd6813f58da707282915139db973b2dbe79c11df22ad25c99ec5c8406b234a
hash1801da172fae83cee2cc7c02f63e52d71f892d78e547a13718f146d5365f047c
hash1d9543f7c0039f6f44c714fe8d8fd0a3f6d52fcae2a70b4bc442f38e01e14072
hash2654d6f8d6c93c7af7b7b31a89ebf58348a349aa943332ebb39ce552dde81fc8
hash7022f91f0534d980a4d77df20bea1ae53ee02f7c490efbfae605961f5170a580
hash70ae293eb1c023d40a8a48d6109a1bf792e1877a72433bcc89613461cffc7b61
hashb3ce10cc997cd60a48a01677a152e21d4aa36ab5b2fd3718c04edef62662cea1
hashfd30a2c90384bdb266971a81f97d80a2c42b4cec5762854224e1bc5c006d007a

Ip

ValueDescriptionCopy
ip77.90.153.225

Domain

ValueDescriptionCopy
domainelprogresofood.com
domainmastercompu.com
domainthanjainatural.com
domainfacebook.meta-software-worldwide.com
domainfacebook.windows-software-downloads.com
domainfacebook.windows-software-updates.cc
domainfacebook.windows-software-updates.com

Threat ID: 68c97556c5f0f7930cac8160

Added to database: 9/16/2025, 2:33:58 PM

Last enriched: 9/16/2025, 2:34:29 PM

Last updated: 9/17/2025, 7:10:31 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats