Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

New Clickfix variant 'CrashFix' deploying Python Remote Access Trojan

0
Medium
Published: Thu Feb 05 2026 (02/05/2026, 20:01:03 UTC)
Source: AlienVault OTX General

Description

The CrashFix variant of the ClickFix campaign uses malicious ads to redirect users to install a fake ad blocker browser extension that causes browser crashes and fake security warnings. It abuses the Windows finger. exe utility to execute malicious commands and downloads a Python-based Remote Access Trojan (ModeloRAT) that establishes persistence and performs reconnaissance on domain-joined systems. The campaign uses social engineering and multiple obfuscation techniques to evade detection. It targets enterprise environments with domain-joined Windows systems. No CVSS score is available, but the threat poses a medium severity risk due to its impact on confidentiality and persistence capabilities. European organizations with significant Windows domain environments and reliance on browser extensions should be vigilant. Mitigations include restricting extension installs, monitoring finger. exe usage, and enhancing endpoint detection for Python RAT activity.

AI-Powered Analysis

AILast updated: 02/05/2026, 21:14:47 UTC

Technical Analysis

CrashFix is a newly identified evolution of the ClickFix malware campaign that targets Windows domain-joined systems primarily through social engineering and browser-based infection vectors. The attack begins with malicious advertisements that redirect victims to install a fraudulent browser extension masquerading as a legitimate ad blocker. This extension deliberately causes browser instability and delayed crashes, subsequently displaying fake security warnings to trick users into executing malicious commands. The attackers leverage the Windows utility finger.exe, a legitimate but rarely used tool, to execute these commands, thereby bypassing some security controls and evading detection. Following initial compromise, the malware downloads and deploys ModeloRAT, a Python-based Remote Access Trojan. ModeloRAT establishes persistence on the infected system and conducts extensive reconnaissance activities, including gathering system information and network details. The campaign employs multiple obfuscation techniques to avoid signature-based detection and complicate forensic analysis. The use of a Python RAT indicates a flexible and potentially cross-platform capability, though current targeting focuses on Windows environments. The campaign’s focus on domain-joined systems suggests an emphasis on enterprise networks where lateral movement and credential theft can yield significant operational advantages for the adversary. Indicators of compromise include multiple file hashes, IP addresses, and a suspicious domain used in the attack infrastructure. Despite the absence of known exploits in the wild, the campaign’s social engineering component and abuse of legitimate utilities make it a credible threat vector.

Potential Impact

For European organizations, especially those operating Windows domain environments, CrashFix presents a significant risk to confidentiality and operational integrity. The social engineering aspect can lead to user-driven execution of malicious payloads, bypassing traditional perimeter defenses. The persistence mechanisms and reconnaissance capabilities of ModeloRAT enable attackers to maintain long-term access, potentially leading to credential theft, lateral movement, and data exfiltration. The abuse of legitimate Windows utilities complicates detection and response efforts, increasing dwell time and potential damage. Organizations in sectors with high reliance on browser extensions and remote work setups may face increased exposure. The campaign’s ability to cause browser crashes and fake warnings can disrupt user productivity and erode trust in security systems. While the severity is medium, the potential for escalation to more damaging attacks exists if the RAT is leveraged for further exploitation or ransomware deployment. The lack of known exploits in the wild suggests early-stage activity, but proactive defense is critical to prevent widespread impact.

Mitigation Recommendations

1. Implement strict policies to control browser extension installations, allowing only vetted and signed extensions through enterprise policy controls. 2. Monitor and restrict the use of rarely used Windows utilities like finger.exe via application whitelisting or endpoint detection rules to detect anomalous execution. 3. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying Python-based RAT behaviors, including suspicious network connections and persistence mechanisms. 4. Conduct user awareness training focused on recognizing social engineering tactics, especially fake security warnings and unsolicited prompts to execute commands. 5. Regularly audit domain-joined systems for unauthorized software and extensions, and maintain up-to-date inventories of installed applications. 6. Utilize network segmentation to limit lateral movement opportunities for compromised systems. 7. Employ threat intelligence feeds to update detection signatures with known hashes, IPs, and domains associated with CrashFix. 8. Enforce multi-factor authentication (MFA) to reduce the impact of credential theft. 9. Monitor for unusual network traffic patterns indicative of reconnaissance or data exfiltration. 10. Keep all systems and security tools updated with the latest patches and detection capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.microsoft.com/en-us/security/blog/2026/02/05/clickfix-variant-crashfix-deploying-python-rat-trojan"]
Adversary
ClickFix
Pulse Id
6984f6ff578072f56d9160d2
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash8c436bea0dd7bc4499f545de868008c6
hashcbf98b9760e468cc2625bfd73cc76a5e058fc039
hash01eba1d7222c6d298d81c15df1e71a492b6a3992705883c527720e5b0bab701a
hash37b547406735d94103906a7ade6e45a45b2f5755b9bff303ff29b9c2629aa3c5
hash3a5a31328d0729ea350e1eb5564ec9691492407f9213f00c1dd53062e1de3959
hash6461d8f680b84ff68634e993ed3c2c7f2c0cdc9cebb07ea8458c20462f8495aa
hash6f7c558ab1fad134cbc0508048305553a0da98a5f2f5ca2543bc3e958b79a6a3
hashc46af9ae6ab0e7567573dbc950a8ffbe30ea848fac90cd15860045fe7640199c
hashc76c0146407069fd4c271d6e1e03448c481f0970ddbe7042b31f552e37b55817

Ip

ValueDescriptionCopy
ip144.31.221.179
ip144.31.221.197
ip170.168.103.208
ip199.217.98.108
ip69.67.173.30

Domain

ValueDescriptionCopy
domainwww.nexsnield.com

Threat ID: 698504d9f9fa50a62f3b1681

Added to database: 2/5/2026, 9:00:09 PM

Last enriched: 2/5/2026, 9:14:47 PM

Last updated: 2/6/2026, 12:00:07 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats