Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

MIMICRAT: ClickFix Campaign Delivers Custom RAT via Compromised Legitimate Websites

0
Medium
Published: Fri Feb 20 2026 (02/20/2026, 14:51:41 UTC)
Source: AlienVault OTX General

Description

The MIMICRAT ClickFix campaign is a sophisticated multi-stage malware attack leveraging compromised legitimate websites to deliver a custom remote access trojan (RAT). It uses a complex five-stage PowerShell chain to evade detection and deploy a Lua-scripted shellcode loader. MIMICRAT, the final payload, is a native C++ RAT with advanced features including malleable command-and-control (C2) profiles, Windows token theft, and SOCKS5 proxy capabilities. The campaign targets multiple industries and geographies, employing obfuscated scripts and advanced evasion techniques. The attack chain exploits compromised legitimate sites, increasing the risk of widespread infection. Indicators include multiple domain names, IP addresses, and file hashes linked to the campaign. No known exploits in the wild or CVSS score are reported, but the threat poses a medium severity risk due to its complexity and capabilities. Organizations should prioritize detection of PowerShell abuse, monitor for unusual network proxy activity, and secure web assets to mitigate this threat.

AI-Powered Analysis

AILast updated: 02/20/2026, 22:01:41 UTC

Technical Analysis

The MIMICRAT ClickFix campaign represents a highly sophisticated cyberattack that compromises legitimate websites across various industries and regions to serve as infection vectors. The attack unfolds through a multi-stage process beginning with a five-stage PowerShell chain designed to bypass security controls and evade detection. This chain ultimately deploys a Lua-scripted shellcode loader, which then loads MIMICRAT, a custom-built native C++ remote access trojan. MIMICRAT is engineered with advanced capabilities including malleable C2 profiles that allow flexible command-and-control communication, Windows token theft to escalate privileges and impersonate users, and SOCKS5 proxy functionality enabling attackers to route traffic through infected hosts for stealth and lateral movement. The campaign leverages obfuscated scripts and multiple compromised websites, complicating detection and attribution. The use of legitimate websites for delivery increases the likelihood of successful infection as users and security tools may trust these sites. The campaign’s indicators include specific domains such as xmri.network, investonline.in, and wexmri.cc, along with numerous file hashes and an IP address (45.13.212.250). The attack techniques align with MITRE ATT&CK tactics including process injection (T1055), scheduled task execution (T1053), obfuscated files or information (T1562), and user execution (T1204). Despite no known exploits in the wild or CVSS score, the campaign’s operational sophistication and multi-stage evasion techniques mark it as a significant threat.

Potential Impact

Organizations worldwide face risks including unauthorized remote access, credential and token theft, and the potential for attackers to use infected systems as proxies for further attacks. The Windows token theft capability enables privilege escalation and lateral movement within networks, increasing the potential for data breaches and system compromise. The SOCKS5 proxy feature allows attackers to anonymize their traffic and pivot within victim environments, complicating incident response and forensic investigations. The use of compromised legitimate websites as infection vectors increases the risk of widespread exposure, especially to organizations that rely on these sites or have users who visit them. This campaign could disrupt business operations, lead to data exfiltration, and facilitate further malware deployment or espionage activities. The multi-stage nature and obfuscation techniques may delay detection, allowing attackers prolonged access and control. Industries with high reliance on web services and those with less mature endpoint detection capabilities are particularly vulnerable.

Mitigation Recommendations

Organizations should implement advanced PowerShell logging and monitoring to detect suspicious multi-stage script execution chains. Deploy endpoint detection and response (EDR) solutions capable of identifying obfuscated scripts and unusual process injection behaviors. Regularly audit and harden web-facing assets to prevent compromise, including timely patching and use of web application firewalls (WAFs). Monitor network traffic for anomalous SOCKS5 proxy connections or unusual outbound communications to known malicious domains or IPs such as those identified in this campaign. Employ strict application whitelisting and restrict PowerShell execution policies to limit unauthorized script execution. Conduct threat hunting using the provided indicators of compromise (IOCs) including domains, IP addresses, and file hashes. Educate users about risks of visiting compromised legitimate websites and enforce least privilege principles to minimize token theft impact. Incident response teams should prepare to investigate token theft and lateral movement scenarios. Collaboration with threat intelligence providers to stay updated on campaign developments is also recommended.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.elastic.co/security-labs/mimicrat-custom-rat-mimics-c2-frameworks"]
Adversary
null
Pulse Id
699874fdcc7eaabe6bb130ac
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainxmri.network
domaininvestonline.in
domainwexmri.cc
domainwww.investonline.in
domainwww.ndibstersoft.com

Hash

ValueDescriptionCopy
hash5d14aa8bbfb6c505800a5fe17769334a
hash9c48d9bf0b48260ce529156069eeb88d
hash472d725ae60c4ae141ff53fe175abb80f6f1d7af
hash5dc6a659001d320f42ed06401d15770c7c159031
hash5e0a30d8d91d5fd46da73f3e6555936233d870ac789ca7dd64c9d3cc74719f51
hasha508d0bb583dc6e5f97b6094f8f910b5b6f2b9d5528c04e4dee62c343fce6f4b
hash85eda483941b11ddcdad3d8b0cdfd702
hashc55a38222841ccdaa943c289ece55701
hash672da4a2fb54964ea52eba5e5e35b8e244f8567a
hashe2ac078090bb66be60344c5d0e74eb621d88d8de
hash055336daf2ac9d5bbc329fd52bb539085d00e2302fa75a0c7e9d52f540b28beb
hashbcc7a0e53ebc62c77b7b6e3585166bfd7164f65a8115e7c8bda568279ab4f6f1
hasha4ce2eaeb144328c973e99614662a772b998faf6
hash5d14aa8bbfb6c505800a5fe17769334a
MD5 of a508d0bb583dc6e5f97b6094f8f910b5b6f2b9d5528c04e4dee62c343fce6f4b
hash5dc6a659001d320f42ed06401d15770c7c159031
SHA1 of a508d0bb583dc6e5f97b6094f8f910b5b6f2b9d5528c04e4dee62c343fce6f4b
hasha508d0bb583dc6e5f97b6094f8f910b5b6f2b9d5528c04e4dee62c343fce6f4b

Ip

ValueDescriptionCopy
ip45.13.212.250

Yara

ValueDescriptionCopy
yaraa4ce2eaeb144328c973e99614662a772b998faf6

Threat ID: 6998d62bbe58cf853bbef474

Added to database: 2/20/2026, 9:46:19 PM

Last enriched: 2/20/2026, 10:01:41 PM

Last updated: 2/20/2026, 11:58:48 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats