MIMICRAT: ClickFix Campaign Delivers Custom RAT via Compromised Legitimate Websites
The MIMICRAT ClickFix campaign is a sophisticated multi-stage malware attack leveraging compromised legitimate websites to deliver a custom remote access trojan (RAT). It uses a complex five-stage PowerShell chain to evade detection and deploy a Lua-scripted shellcode loader. MIMICRAT, the final payload, is a native C++ RAT with advanced features including malleable command-and-control (C2) profiles, Windows token theft, and SOCKS5 proxy capabilities. The campaign targets multiple industries and geographies, employing obfuscated scripts and advanced evasion techniques. The attack chain exploits compromised legitimate sites, increasing the risk of widespread infection. Indicators include multiple domain names, IP addresses, and file hashes linked to the campaign. No known exploits in the wild or CVSS score are reported, but the threat poses a medium severity risk due to its complexity and capabilities. Organizations should prioritize detection of PowerShell abuse, monitor for unusual network proxy activity, and secure web assets to mitigate this threat.
AI Analysis
Technical Summary
The MIMICRAT ClickFix campaign represents a highly sophisticated cyberattack that compromises legitimate websites across various industries and regions to serve as infection vectors. The attack unfolds through a multi-stage process beginning with a five-stage PowerShell chain designed to bypass security controls and evade detection. This chain ultimately deploys a Lua-scripted shellcode loader, which then loads MIMICRAT, a custom-built native C++ remote access trojan. MIMICRAT is engineered with advanced capabilities including malleable C2 profiles that allow flexible command-and-control communication, Windows token theft to escalate privileges and impersonate users, and SOCKS5 proxy functionality enabling attackers to route traffic through infected hosts for stealth and lateral movement. The campaign leverages obfuscated scripts and multiple compromised websites, complicating detection and attribution. The use of legitimate websites for delivery increases the likelihood of successful infection as users and security tools may trust these sites. The campaign’s indicators include specific domains such as xmri.network, investonline.in, and wexmri.cc, along with numerous file hashes and an IP address (45.13.212.250). The attack techniques align with MITRE ATT&CK tactics including process injection (T1055), scheduled task execution (T1053), obfuscated files or information (T1562), and user execution (T1204). Despite no known exploits in the wild or CVSS score, the campaign’s operational sophistication and multi-stage evasion techniques mark it as a significant threat.
Potential Impact
Organizations worldwide face risks including unauthorized remote access, credential and token theft, and the potential for attackers to use infected systems as proxies for further attacks. The Windows token theft capability enables privilege escalation and lateral movement within networks, increasing the potential for data breaches and system compromise. The SOCKS5 proxy feature allows attackers to anonymize their traffic and pivot within victim environments, complicating incident response and forensic investigations. The use of compromised legitimate websites as infection vectors increases the risk of widespread exposure, especially to organizations that rely on these sites or have users who visit them. This campaign could disrupt business operations, lead to data exfiltration, and facilitate further malware deployment or espionage activities. The multi-stage nature and obfuscation techniques may delay detection, allowing attackers prolonged access and control. Industries with high reliance on web services and those with less mature endpoint detection capabilities are particularly vulnerable.
Mitigation Recommendations
Organizations should implement advanced PowerShell logging and monitoring to detect suspicious multi-stage script execution chains. Deploy endpoint detection and response (EDR) solutions capable of identifying obfuscated scripts and unusual process injection behaviors. Regularly audit and harden web-facing assets to prevent compromise, including timely patching and use of web application firewalls (WAFs). Monitor network traffic for anomalous SOCKS5 proxy connections or unusual outbound communications to known malicious domains or IPs such as those identified in this campaign. Employ strict application whitelisting and restrict PowerShell execution policies to limit unauthorized script execution. Conduct threat hunting using the provided indicators of compromise (IOCs) including domains, IP addresses, and file hashes. Educate users about risks of visiting compromised legitimate websites and enforce least privilege principles to minimize token theft impact. Incident response teams should prepare to investigate token theft and lateral movement scenarios. Collaboration with threat intelligence providers to stay updated on campaign developments is also recommended.
Affected Countries
India, United States, United Kingdom, Germany, Australia, Canada, Netherlands, Singapore, France, Brazil
Indicators of Compromise
- domain: xmri.network
- hash: 5d14aa8bbfb6c505800a5fe17769334a
- hash: 9c48d9bf0b48260ce529156069eeb88d
- hash: 472d725ae60c4ae141ff53fe175abb80f6f1d7af
- hash: 5dc6a659001d320f42ed06401d15770c7c159031
- hash: 5e0a30d8d91d5fd46da73f3e6555936233d870ac789ca7dd64c9d3cc74719f51
- hash: a508d0bb583dc6e5f97b6094f8f910b5b6f2b9d5528c04e4dee62c343fce6f4b
- hash: 85eda483941b11ddcdad3d8b0cdfd702
- hash: c55a38222841ccdaa943c289ece55701
- hash: 672da4a2fb54964ea52eba5e5e35b8e244f8567a
- hash: e2ac078090bb66be60344c5d0e74eb621d88d8de
- hash: 055336daf2ac9d5bbc329fd52bb539085d00e2302fa75a0c7e9d52f540b28beb
- hash: bcc7a0e53ebc62c77b7b6e3585166bfd7164f65a8115e7c8bda568279ab4f6f1
- ip: 45.13.212.250
- hash: a4ce2eaeb144328c973e99614662a772b998faf6
- domain: investonline.in
- domain: wexmri.cc
- domain: www.investonline.in
- domain: www.ndibstersoft.com
- hash: 5d14aa8bbfb6c505800a5fe17769334a
- hash: 5dc6a659001d320f42ed06401d15770c7c159031
- hash: a508d0bb583dc6e5f97b6094f8f910b5b6f2b9d5528c04e4dee62c343fce6f4b
- yara: a4ce2eaeb144328c973e99614662a772b998faf6
MIMICRAT: ClickFix Campaign Delivers Custom RAT via Compromised Legitimate Websites
Description
The MIMICRAT ClickFix campaign is a sophisticated multi-stage malware attack leveraging compromised legitimate websites to deliver a custom remote access trojan (RAT). It uses a complex five-stage PowerShell chain to evade detection and deploy a Lua-scripted shellcode loader. MIMICRAT, the final payload, is a native C++ RAT with advanced features including malleable command-and-control (C2) profiles, Windows token theft, and SOCKS5 proxy capabilities. The campaign targets multiple industries and geographies, employing obfuscated scripts and advanced evasion techniques. The attack chain exploits compromised legitimate sites, increasing the risk of widespread infection. Indicators include multiple domain names, IP addresses, and file hashes linked to the campaign. No known exploits in the wild or CVSS score are reported, but the threat poses a medium severity risk due to its complexity and capabilities. Organizations should prioritize detection of PowerShell abuse, monitor for unusual network proxy activity, and secure web assets to mitigate this threat.
AI-Powered Analysis
Technical Analysis
The MIMICRAT ClickFix campaign represents a highly sophisticated cyberattack that compromises legitimate websites across various industries and regions to serve as infection vectors. The attack unfolds through a multi-stage process beginning with a five-stage PowerShell chain designed to bypass security controls and evade detection. This chain ultimately deploys a Lua-scripted shellcode loader, which then loads MIMICRAT, a custom-built native C++ remote access trojan. MIMICRAT is engineered with advanced capabilities including malleable C2 profiles that allow flexible command-and-control communication, Windows token theft to escalate privileges and impersonate users, and SOCKS5 proxy functionality enabling attackers to route traffic through infected hosts for stealth and lateral movement. The campaign leverages obfuscated scripts and multiple compromised websites, complicating detection and attribution. The use of legitimate websites for delivery increases the likelihood of successful infection as users and security tools may trust these sites. The campaign’s indicators include specific domains such as xmri.network, investonline.in, and wexmri.cc, along with numerous file hashes and an IP address (45.13.212.250). The attack techniques align with MITRE ATT&CK tactics including process injection (T1055), scheduled task execution (T1053), obfuscated files or information (T1562), and user execution (T1204). Despite no known exploits in the wild or CVSS score, the campaign’s operational sophistication and multi-stage evasion techniques mark it as a significant threat.
Potential Impact
Organizations worldwide face risks including unauthorized remote access, credential and token theft, and the potential for attackers to use infected systems as proxies for further attacks. The Windows token theft capability enables privilege escalation and lateral movement within networks, increasing the potential for data breaches and system compromise. The SOCKS5 proxy feature allows attackers to anonymize their traffic and pivot within victim environments, complicating incident response and forensic investigations. The use of compromised legitimate websites as infection vectors increases the risk of widespread exposure, especially to organizations that rely on these sites or have users who visit them. This campaign could disrupt business operations, lead to data exfiltration, and facilitate further malware deployment or espionage activities. The multi-stage nature and obfuscation techniques may delay detection, allowing attackers prolonged access and control. Industries with high reliance on web services and those with less mature endpoint detection capabilities are particularly vulnerable.
Mitigation Recommendations
Organizations should implement advanced PowerShell logging and monitoring to detect suspicious multi-stage script execution chains. Deploy endpoint detection and response (EDR) solutions capable of identifying obfuscated scripts and unusual process injection behaviors. Regularly audit and harden web-facing assets to prevent compromise, including timely patching and use of web application firewalls (WAFs). Monitor network traffic for anomalous SOCKS5 proxy connections or unusual outbound communications to known malicious domains or IPs such as those identified in this campaign. Employ strict application whitelisting and restrict PowerShell execution policies to limit unauthorized script execution. Conduct threat hunting using the provided indicators of compromise (IOCs) including domains, IP addresses, and file hashes. Educate users about risks of visiting compromised legitimate websites and enforce least privilege principles to minimize token theft impact. Incident response teams should prepare to investigate token theft and lateral movement scenarios. Collaboration with threat intelligence providers to stay updated on campaign developments is also recommended.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.elastic.co/security-labs/mimicrat-custom-rat-mimics-c2-frameworks"]
- Adversary
- null
- Pulse Id
- 699874fdcc7eaabe6bb130ac
- Threat Score
- null
Indicators of Compromise
Domain
| Value | Description | Copy |
|---|---|---|
domainxmri.network | — | |
domaininvestonline.in | — | |
domainwexmri.cc | — | |
domainwww.investonline.in | — | |
domainwww.ndibstersoft.com | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash5d14aa8bbfb6c505800a5fe17769334a | — | |
hash9c48d9bf0b48260ce529156069eeb88d | — | |
hash472d725ae60c4ae141ff53fe175abb80f6f1d7af | — | |
hash5dc6a659001d320f42ed06401d15770c7c159031 | — | |
hash5e0a30d8d91d5fd46da73f3e6555936233d870ac789ca7dd64c9d3cc74719f51 | — | |
hasha508d0bb583dc6e5f97b6094f8f910b5b6f2b9d5528c04e4dee62c343fce6f4b | — | |
hash85eda483941b11ddcdad3d8b0cdfd702 | — | |
hashc55a38222841ccdaa943c289ece55701 | — | |
hash672da4a2fb54964ea52eba5e5e35b8e244f8567a | — | |
hashe2ac078090bb66be60344c5d0e74eb621d88d8de | — | |
hash055336daf2ac9d5bbc329fd52bb539085d00e2302fa75a0c7e9d52f540b28beb | — | |
hashbcc7a0e53ebc62c77b7b6e3585166bfd7164f65a8115e7c8bda568279ab4f6f1 | — | |
hasha4ce2eaeb144328c973e99614662a772b998faf6 | — | |
hash5d14aa8bbfb6c505800a5fe17769334a | MD5 of a508d0bb583dc6e5f97b6094f8f910b5b6f2b9d5528c04e4dee62c343fce6f4b | |
hash5dc6a659001d320f42ed06401d15770c7c159031 | SHA1 of a508d0bb583dc6e5f97b6094f8f910b5b6f2b9d5528c04e4dee62c343fce6f4b | |
hasha508d0bb583dc6e5f97b6094f8f910b5b6f2b9d5528c04e4dee62c343fce6f4b | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip45.13.212.250 | — |
Yara
| Value | Description | Copy |
|---|---|---|
yaraa4ce2eaeb144328c973e99614662a772b998faf6 | — |
Threat ID: 6998d62bbe58cf853bbef474
Added to database: 2/20/2026, 9:46:19 PM
Last enriched: 2/20/2026, 10:01:41 PM
Last updated: 2/20/2026, 11:58:48 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
DNS Used to Hide Fake Investment Platform Schemes
MediumClickFix in action: how fake captcha can encrypt an entire company
MediumFake Homebrew Pages Deliver Cuckoo Stealer via ClickFix | macOS Threat Hunting Analysis
MediumThe Curious Case of the Triton Malware Fork
MediumInvitation to Trouble: The Rise of Calendar Phishing Attacks
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.