New Clickfix variant 'CrashFix' deploying Python Remote Access Trojan
A new evolution in the ClickFix campaign, dubbed CrashFix, has been identified. This variant deliberately crashes victims' browsers and uses social engineering to lure users into executing malicious commands. The attack begins with a malicious ad redirecting users to install a harmful browser extension impersonating a legitimate ad blocker. The payload causes delayed browser issues and presents a fake security warning. It misuses the Windows utility finger.exe to execute malicious commands and downloads additional payloads, including a Python-based Remote Access Trojan (RAT). The RAT, named ModeloRAT, establishes persistence and performs extensive reconnaissance. The campaign targets domain-joined systems and employs multiple obfuscation techniques to evade detection.
AI Analysis
Technical Summary
CrashFix is a newly identified evolution of the ClickFix malware campaign that targets Windows domain-joined systems primarily through social engineering and browser-based infection vectors. The attack begins with malicious advertisements that redirect victims to install a fraudulent browser extension masquerading as a legitimate ad blocker. This extension deliberately causes browser instability and delayed crashes, subsequently displaying fake security warnings to trick users into executing malicious commands. The attackers leverage the Windows utility finger.exe, a legitimate but rarely used tool, to execute these commands, thereby bypassing some security controls and evading detection. Following initial compromise, the malware downloads and deploys ModeloRAT, a Python-based Remote Access Trojan. ModeloRAT establishes persistence on the infected system and conducts extensive reconnaissance activities, including gathering system information and network details. The campaign employs multiple obfuscation techniques to avoid signature-based detection and complicate forensic analysis. The use of a Python RAT indicates a flexible and potentially cross-platform capability, though current targeting focuses on Windows environments. The campaign’s focus on domain-joined systems suggests an emphasis on enterprise networks where lateral movement and credential theft can yield significant operational advantages for the adversary. Indicators of compromise include multiple file hashes, IP addresses, and a suspicious domain used in the attack infrastructure. Despite the absence of known exploits in the wild, the campaign’s social engineering component and abuse of legitimate utilities make it a credible threat vector.
Potential Impact
For European organizations, especially those operating Windows domain environments, CrashFix presents a significant risk to confidentiality and operational integrity. The social engineering aspect can lead to user-driven execution of malicious payloads, bypassing traditional perimeter defenses. The persistence mechanisms and reconnaissance capabilities of ModeloRAT enable attackers to maintain long-term access, potentially leading to credential theft, lateral movement, and data exfiltration. The abuse of legitimate Windows utilities complicates detection and response efforts, increasing dwell time and potential damage. Organizations in sectors with high reliance on browser extensions and remote work setups may face increased exposure. The campaign’s ability to cause browser crashes and fake warnings can disrupt user productivity and erode trust in security systems. While the severity is medium, the potential for escalation to more damaging attacks exists if the RAT is leveraged for further exploitation or ransomware deployment. The lack of known exploits in the wild suggests early-stage activity, but proactive defense is critical to prevent widespread impact.
Mitigation Recommendations
1. Implement strict policies to control browser extension installations, allowing only vetted and signed extensions through enterprise policy controls. 2. Monitor and restrict the use of rarely used Windows utilities like finger.exe via application whitelisting or endpoint detection rules to detect anomalous execution. 3. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying Python-based RAT behaviors, including suspicious network connections and persistence mechanisms. 4. Conduct user awareness training focused on recognizing social engineering tactics, especially fake security warnings and unsolicited prompts to execute commands. 5. Regularly audit domain-joined systems for unauthorized software and extensions, and maintain up-to-date inventories of installed applications. 6. Utilize network segmentation to limit lateral movement opportunities for compromised systems. 7. Employ threat intelligence feeds to update detection signatures with known hashes, IPs, and domains associated with CrashFix. 8. Enforce multi-factor authentication (MFA) to reduce the impact of credential theft. 9. Monitor for unusual network traffic patterns indicative of reconnaissance or data exfiltration. 10. Keep all systems and security tools updated with the latest patches and detection capabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Switzerland
Indicators of Compromise
- hash: 8c436bea0dd7bc4499f545de868008c6
- hash: cbf98b9760e468cc2625bfd73cc76a5e058fc039
- hash: 01eba1d7222c6d298d81c15df1e71a492b6a3992705883c527720e5b0bab701a
- hash: 37b547406735d94103906a7ade6e45a45b2f5755b9bff303ff29b9c2629aa3c5
- hash: 3a5a31328d0729ea350e1eb5564ec9691492407f9213f00c1dd53062e1de3959
- hash: 6461d8f680b84ff68634e993ed3c2c7f2c0cdc9cebb07ea8458c20462f8495aa
- hash: 6f7c558ab1fad134cbc0508048305553a0da98a5f2f5ca2543bc3e958b79a6a3
- hash: c46af9ae6ab0e7567573dbc950a8ffbe30ea848fac90cd15860045fe7640199c
- hash: c76c0146407069fd4c271d6e1e03448c481f0970ddbe7042b31f552e37b55817
- ip: 144.31.221.179
- ip: 144.31.221.197
- ip: 170.168.103.208
- ip: 199.217.98.108
- ip: 69.67.173.30
- domain: www.nexsnield.com
New Clickfix variant 'CrashFix' deploying Python Remote Access Trojan
Description
A new evolution in the ClickFix campaign, dubbed CrashFix, has been identified. This variant deliberately crashes victims' browsers and uses social engineering to lure users into executing malicious commands. The attack begins with a malicious ad redirecting users to install a harmful browser extension impersonating a legitimate ad blocker. The payload causes delayed browser issues and presents a fake security warning. It misuses the Windows utility finger.exe to execute malicious commands and downloads additional payloads, including a Python-based Remote Access Trojan (RAT). The RAT, named ModeloRAT, establishes persistence and performs extensive reconnaissance. The campaign targets domain-joined systems and employs multiple obfuscation techniques to evade detection.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CrashFix is a newly identified evolution of the ClickFix malware campaign that targets Windows domain-joined systems primarily through social engineering and browser-based infection vectors. The attack begins with malicious advertisements that redirect victims to install a fraudulent browser extension masquerading as a legitimate ad blocker. This extension deliberately causes browser instability and delayed crashes, subsequently displaying fake security warnings to trick users into executing malicious commands. The attackers leverage the Windows utility finger.exe, a legitimate but rarely used tool, to execute these commands, thereby bypassing some security controls and evading detection. Following initial compromise, the malware downloads and deploys ModeloRAT, a Python-based Remote Access Trojan. ModeloRAT establishes persistence on the infected system and conducts extensive reconnaissance activities, including gathering system information and network details. The campaign employs multiple obfuscation techniques to avoid signature-based detection and complicate forensic analysis. The use of a Python RAT indicates a flexible and potentially cross-platform capability, though current targeting focuses on Windows environments. The campaign’s focus on domain-joined systems suggests an emphasis on enterprise networks where lateral movement and credential theft can yield significant operational advantages for the adversary. Indicators of compromise include multiple file hashes, IP addresses, and a suspicious domain used in the attack infrastructure. Despite the absence of known exploits in the wild, the campaign’s social engineering component and abuse of legitimate utilities make it a credible threat vector.
Potential Impact
For European organizations, especially those operating Windows domain environments, CrashFix presents a significant risk to confidentiality and operational integrity. The social engineering aspect can lead to user-driven execution of malicious payloads, bypassing traditional perimeter defenses. The persistence mechanisms and reconnaissance capabilities of ModeloRAT enable attackers to maintain long-term access, potentially leading to credential theft, lateral movement, and data exfiltration. The abuse of legitimate Windows utilities complicates detection and response efforts, increasing dwell time and potential damage. Organizations in sectors with high reliance on browser extensions and remote work setups may face increased exposure. The campaign’s ability to cause browser crashes and fake warnings can disrupt user productivity and erode trust in security systems. While the severity is medium, the potential for escalation to more damaging attacks exists if the RAT is leveraged for further exploitation or ransomware deployment. The lack of known exploits in the wild suggests early-stage activity, but proactive defense is critical to prevent widespread impact.
Mitigation Recommendations
1. Implement strict policies to control browser extension installations, allowing only vetted and signed extensions through enterprise policy controls. 2. Monitor and restrict the use of rarely used Windows utilities like finger.exe via application whitelisting or endpoint detection rules to detect anomalous execution. 3. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying Python-based RAT behaviors, including suspicious network connections and persistence mechanisms. 4. Conduct user awareness training focused on recognizing social engineering tactics, especially fake security warnings and unsolicited prompts to execute commands. 5. Regularly audit domain-joined systems for unauthorized software and extensions, and maintain up-to-date inventories of installed applications. 6. Utilize network segmentation to limit lateral movement opportunities for compromised systems. 7. Employ threat intelligence feeds to update detection signatures with known hashes, IPs, and domains associated with CrashFix. 8. Enforce multi-factor authentication (MFA) to reduce the impact of credential theft. 9. Monitor for unusual network traffic patterns indicative of reconnaissance or data exfiltration. 10. Keep all systems and security tools updated with the latest patches and detection capabilities.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.microsoft.com/en-us/security/blog/2026/02/05/clickfix-variant-crashfix-deploying-python-rat-trojan"]
- Adversary
- ClickFix
- Pulse Id
- 6984f6ff578072f56d9160d2
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash8c436bea0dd7bc4499f545de868008c6 | — | |
hashcbf98b9760e468cc2625bfd73cc76a5e058fc039 | — | |
hash01eba1d7222c6d298d81c15df1e71a492b6a3992705883c527720e5b0bab701a | — | |
hash37b547406735d94103906a7ade6e45a45b2f5755b9bff303ff29b9c2629aa3c5 | — | |
hash3a5a31328d0729ea350e1eb5564ec9691492407f9213f00c1dd53062e1de3959 | — | |
hash6461d8f680b84ff68634e993ed3c2c7f2c0cdc9cebb07ea8458c20462f8495aa | — | |
hash6f7c558ab1fad134cbc0508048305553a0da98a5f2f5ca2543bc3e958b79a6a3 | — | |
hashc46af9ae6ab0e7567573dbc950a8ffbe30ea848fac90cd15860045fe7640199c | — | |
hashc76c0146407069fd4c271d6e1e03448c481f0970ddbe7042b31f552e37b55817 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip144.31.221.179 | — | |
ip144.31.221.197 | — | |
ip170.168.103.208 | — | |
ip199.217.98.108 | — | |
ip69.67.173.30 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainwww.nexsnield.com | — |
Threat ID: 698504d9f9fa50a62f3b1681
Added to database: 2/5/2026, 9:00:09 PM
Last enriched: 2/5/2026, 9:14:47 PM
Last updated: 3/23/2026, 1:45:40 AM
Views: 179
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.