MIMICRAT: ClickFix Campaign Delivers Custom RAT via Compromised Legitimate Websites
A sophisticated ClickFix campaign has been uncovered, compromising legitimate websites to deliver a multi-stage malware chain. The attack culminates in MIMICRAT, a custom remote access trojan with advanced capabilities. The campaign uses compromised sites across industries and geographies for delivery, employing a five-stage PowerShell chain that bypasses security measures before deploying a Lua-scripted shellcode loader. MIMICRAT, the final payload, is a native C++ RAT featuring malleable C2 profiles, Windows token theft, and SOCKS5 proxy functionality. The attack chain involves multiple compromised websites, obfuscated scripts, and sophisticated evasion techniques, demonstrating a high level of operational sophistication.
AI Analysis
Technical Summary
The MIMICRAT ClickFix campaign represents a highly sophisticated cyberattack that compromises legitimate websites across various industries and regions to serve as infection vectors. The attack unfolds through a multi-stage process beginning with a five-stage PowerShell chain designed to bypass security controls and evade detection. This chain ultimately deploys a Lua-scripted shellcode loader, which then loads MIMICRAT, a custom-built native C++ remote access trojan. MIMICRAT is engineered with advanced capabilities including malleable C2 profiles that allow flexible command-and-control communication, Windows token theft to escalate privileges and impersonate users, and SOCKS5 proxy functionality enabling attackers to route traffic through infected hosts for stealth and lateral movement. The campaign leverages obfuscated scripts and multiple compromised websites, complicating detection and attribution. The use of legitimate websites for delivery increases the likelihood of successful infection as users and security tools may trust these sites. The campaign’s indicators include specific domains such as xmri.network, investonline.in, and wexmri.cc, along with numerous file hashes and an IP address (45.13.212.250). The attack techniques align with MITRE ATT&CK tactics including process injection (T1055), scheduled task execution (T1053), obfuscated files or information (T1562), and user execution (T1204). Despite no known exploits in the wild or CVSS score, the campaign’s operational sophistication and multi-stage evasion techniques mark it as a significant threat.
Potential Impact
Organizations worldwide face risks including unauthorized remote access, credential and token theft, and the potential for attackers to use infected systems as proxies for further attacks. The Windows token theft capability enables privilege escalation and lateral movement within networks, increasing the potential for data breaches and system compromise. The SOCKS5 proxy feature allows attackers to anonymize their traffic and pivot within victim environments, complicating incident response and forensic investigations. The use of compromised legitimate websites as infection vectors increases the risk of widespread exposure, especially to organizations that rely on these sites or have users who visit them. This campaign could disrupt business operations, lead to data exfiltration, and facilitate further malware deployment or espionage activities. The multi-stage nature and obfuscation techniques may delay detection, allowing attackers prolonged access and control. Industries with high reliance on web services and those with less mature endpoint detection capabilities are particularly vulnerable.
Mitigation Recommendations
Organizations should implement advanced PowerShell logging and monitoring to detect suspicious multi-stage script execution chains. Deploy endpoint detection and response (EDR) solutions capable of identifying obfuscated scripts and unusual process injection behaviors. Regularly audit and harden web-facing assets to prevent compromise, including timely patching and use of web application firewalls (WAFs). Monitor network traffic for anomalous SOCKS5 proxy connections or unusual outbound communications to known malicious domains or IPs such as those identified in this campaign. Employ strict application whitelisting and restrict PowerShell execution policies to limit unauthorized script execution. Conduct threat hunting using the provided indicators of compromise (IOCs) including domains, IP addresses, and file hashes. Educate users about risks of visiting compromised legitimate websites and enforce least privilege principles to minimize token theft impact. Incident response teams should prepare to investigate token theft and lateral movement scenarios. Collaboration with threat intelligence providers to stay updated on campaign developments is also recommended.
Affected Countries
India, United States, United Kingdom, Germany, Australia, Canada, Netherlands, Singapore, France, Brazil
Indicators of Compromise
- domain: xmri.network
- hash: 5d14aa8bbfb6c505800a5fe17769334a
- hash: 9c48d9bf0b48260ce529156069eeb88d
- hash: 472d725ae60c4ae141ff53fe175abb80f6f1d7af
- hash: 5dc6a659001d320f42ed06401d15770c7c159031
- hash: 5e0a30d8d91d5fd46da73f3e6555936233d870ac789ca7dd64c9d3cc74719f51
- hash: a508d0bb583dc6e5f97b6094f8f910b5b6f2b9d5528c04e4dee62c343fce6f4b
- hash: 85eda483941b11ddcdad3d8b0cdfd702
- hash: c55a38222841ccdaa943c289ece55701
- hash: 672da4a2fb54964ea52eba5e5e35b8e244f8567a
- hash: e2ac078090bb66be60344c5d0e74eb621d88d8de
- hash: 055336daf2ac9d5bbc329fd52bb539085d00e2302fa75a0c7e9d52f540b28beb
- hash: bcc7a0e53ebc62c77b7b6e3585166bfd7164f65a8115e7c8bda568279ab4f6f1
- ip: 45.13.212.250
- hash: a4ce2eaeb144328c973e99614662a772b998faf6
- domain: investonline.in
- domain: wexmri.cc
- domain: www.investonline.in
- domain: www.ndibstersoft.com
- hash: 5d14aa8bbfb6c505800a5fe17769334a
- hash: 5dc6a659001d320f42ed06401d15770c7c159031
- hash: a508d0bb583dc6e5f97b6094f8f910b5b6f2b9d5528c04e4dee62c343fce6f4b
- yara: a4ce2eaeb144328c973e99614662a772b998faf6
MIMICRAT: ClickFix Campaign Delivers Custom RAT via Compromised Legitimate Websites
Description
A sophisticated ClickFix campaign has been uncovered, compromising legitimate websites to deliver a multi-stage malware chain. The attack culminates in MIMICRAT, a custom remote access trojan with advanced capabilities. The campaign uses compromised sites across industries and geographies for delivery, employing a five-stage PowerShell chain that bypasses security measures before deploying a Lua-scripted shellcode loader. MIMICRAT, the final payload, is a native C++ RAT featuring malleable C2 profiles, Windows token theft, and SOCKS5 proxy functionality. The attack chain involves multiple compromised websites, obfuscated scripts, and sophisticated evasion techniques, demonstrating a high level of operational sophistication.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The MIMICRAT ClickFix campaign represents a highly sophisticated cyberattack that compromises legitimate websites across various industries and regions to serve as infection vectors. The attack unfolds through a multi-stage process beginning with a five-stage PowerShell chain designed to bypass security controls and evade detection. This chain ultimately deploys a Lua-scripted shellcode loader, which then loads MIMICRAT, a custom-built native C++ remote access trojan. MIMICRAT is engineered with advanced capabilities including malleable C2 profiles that allow flexible command-and-control communication, Windows token theft to escalate privileges and impersonate users, and SOCKS5 proxy functionality enabling attackers to route traffic through infected hosts for stealth and lateral movement. The campaign leverages obfuscated scripts and multiple compromised websites, complicating detection and attribution. The use of legitimate websites for delivery increases the likelihood of successful infection as users and security tools may trust these sites. The campaign’s indicators include specific domains such as xmri.network, investonline.in, and wexmri.cc, along with numerous file hashes and an IP address (45.13.212.250). The attack techniques align with MITRE ATT&CK tactics including process injection (T1055), scheduled task execution (T1053), obfuscated files or information (T1562), and user execution (T1204). Despite no known exploits in the wild or CVSS score, the campaign’s operational sophistication and multi-stage evasion techniques mark it as a significant threat.
Potential Impact
Organizations worldwide face risks including unauthorized remote access, credential and token theft, and the potential for attackers to use infected systems as proxies for further attacks. The Windows token theft capability enables privilege escalation and lateral movement within networks, increasing the potential for data breaches and system compromise. The SOCKS5 proxy feature allows attackers to anonymize their traffic and pivot within victim environments, complicating incident response and forensic investigations. The use of compromised legitimate websites as infection vectors increases the risk of widespread exposure, especially to organizations that rely on these sites or have users who visit them. This campaign could disrupt business operations, lead to data exfiltration, and facilitate further malware deployment or espionage activities. The multi-stage nature and obfuscation techniques may delay detection, allowing attackers prolonged access and control. Industries with high reliance on web services and those with less mature endpoint detection capabilities are particularly vulnerable.
Mitigation Recommendations
Organizations should implement advanced PowerShell logging and monitoring to detect suspicious multi-stage script execution chains. Deploy endpoint detection and response (EDR) solutions capable of identifying obfuscated scripts and unusual process injection behaviors. Regularly audit and harden web-facing assets to prevent compromise, including timely patching and use of web application firewalls (WAFs). Monitor network traffic for anomalous SOCKS5 proxy connections or unusual outbound communications to known malicious domains or IPs such as those identified in this campaign. Employ strict application whitelisting and restrict PowerShell execution policies to limit unauthorized script execution. Conduct threat hunting using the provided indicators of compromise (IOCs) including domains, IP addresses, and file hashes. Educate users about risks of visiting compromised legitimate websites and enforce least privilege principles to minimize token theft impact. Incident response teams should prepare to investigate token theft and lateral movement scenarios. Collaboration with threat intelligence providers to stay updated on campaign developments is also recommended.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.elastic.co/security-labs/mimicrat-custom-rat-mimics-c2-frameworks"]
- Adversary
- null
- Pulse Id
- 699874fdcc7eaabe6bb130ac
- Threat Score
- null
Indicators of Compromise
Domain
| Value | Description | Copy |
|---|---|---|
domainxmri.network | — | |
domaininvestonline.in | — | |
domainwexmri.cc | — | |
domainwww.investonline.in | — | |
domainwww.ndibstersoft.com | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash5d14aa8bbfb6c505800a5fe17769334a | — | |
hash9c48d9bf0b48260ce529156069eeb88d | — | |
hash472d725ae60c4ae141ff53fe175abb80f6f1d7af | — | |
hash5dc6a659001d320f42ed06401d15770c7c159031 | — | |
hash5e0a30d8d91d5fd46da73f3e6555936233d870ac789ca7dd64c9d3cc74719f51 | — | |
hasha508d0bb583dc6e5f97b6094f8f910b5b6f2b9d5528c04e4dee62c343fce6f4b | — | |
hash85eda483941b11ddcdad3d8b0cdfd702 | — | |
hashc55a38222841ccdaa943c289ece55701 | — | |
hash672da4a2fb54964ea52eba5e5e35b8e244f8567a | — | |
hashe2ac078090bb66be60344c5d0e74eb621d88d8de | — | |
hash055336daf2ac9d5bbc329fd52bb539085d00e2302fa75a0c7e9d52f540b28beb | — | |
hashbcc7a0e53ebc62c77b7b6e3585166bfd7164f65a8115e7c8bda568279ab4f6f1 | — | |
hasha4ce2eaeb144328c973e99614662a772b998faf6 | — | |
hash5d14aa8bbfb6c505800a5fe17769334a | MD5 of a508d0bb583dc6e5f97b6094f8f910b5b6f2b9d5528c04e4dee62c343fce6f4b | |
hash5dc6a659001d320f42ed06401d15770c7c159031 | SHA1 of a508d0bb583dc6e5f97b6094f8f910b5b6f2b9d5528c04e4dee62c343fce6f4b | |
hasha508d0bb583dc6e5f97b6094f8f910b5b6f2b9d5528c04e4dee62c343fce6f4b | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip45.13.212.250 | — |
Yara
| Value | Description | Copy |
|---|---|---|
yaraa4ce2eaeb144328c973e99614662a772b998faf6 | — |
Threat ID: 6998d62bbe58cf853bbef474
Added to database: 2/20/2026, 9:46:19 PM
Last enriched: 2/20/2026, 10:01:41 PM
Last updated: 4/4/2026, 6:11:54 AM
Views: 188
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.