{"id":4911,"date":"2025-07-25T14:55:31","date_gmt":"2025-07-25T14:55:31","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=4911"},"modified":"2025-07-25T14:55:31","modified_gmt":"2025-07-25T14:55:31","slug":"hackers-use-weaponized-hta-recordsdata-to-infect-victims-with-crimson-ransomware","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=4911","title":{"rendered":"Hackers Use Weaponized .HTA Recordsdata to Infect Victims with Crimson Ransomware"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>CloudSEK\u2019s TRIAD crew uncovered an energetic growth website deploying Clickfix-themed malware linked to the Epsilon Crimson ransomware.<\/p>\n<p>This variant deviates from conventional clipboard-based command injection ways by directing victims to a secondary web page on the identical area, the place malicious shell instructions are executed silently by way of ActiveXObject(\u201cWScript.Shell\u201d) to facilitate payload supply. <\/p>\n<p>The script leverages Home windows Command Shell (cmd.exe) for hidden execution, switching to the consumer\u2019s house listing with \u201ccd \/D %userprofile%\u201d, adopted by a silent curl command to obtain a binary from an attacker-controlled IP (155.94.155.227:2269) and put it aside as a.exe, which is then run invisibly with the parameter \u20180\u2019 to suppress any window.<\/p>\n<p>This culminates within the deployment of Epsilon Crimson ransomware, recognized by its MD5 hash 98107c01ecd8b7802582d404e007e493. <\/p>\n<h2 class=\"wp-block-heading\"><strong>Superior Clickfix Malware Marketing campaign<\/strong><\/h2>\n<p>To boost deception, the script shows a faux verification message by way of \u201cecho Your Verificatification Code Is: PC-19fj5e9i-cje8i3e4 &amp;&amp; pause\u201d, full with an intentional typo to imitate amateurish, non-threatening habits, conserving the command immediate open for consumer interplay and reinforcing the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/over-2000-devices-compromised-by-weaponized-social-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">social engineering lure<\/a>.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEikvKiirnstKa7meuSqc3hFt_7NMFmDyt09hGQbnXiAYTNrtGSUm9J73lD5Ti7o6-qtsVCeoPwxSxAf9-aZVdjTVxkUoLyet_FBxr-XdTwlXD0jCdQj27OpNVtW_mcCv1QZuavs2R7Xjw0da3i6CaExX6e4cACT5bNXD5kaKpCbMMiq6LqT0EAaVbt3h8g\/s16000\/Displays%20a%20Fake%20Verification%20Message.webp'\" alt=\"Red Ransomware\"\/><figcaption class=\"wp-element-caption\"><strong>Shows a Pretend Verification Message<\/strong><\/figcaption><\/figure>\n<\/div>\n<p>Pivoting by way of related infrastructure revealed a broader ecosystem of impersonations, together with faux variations of the Discord Captcha Bot (captcha.bot), streaming platforms like Kick, Twitch, Rumble, and OnlyFans, in addition to romance-themed relationship lures, all designed to ship Home windows payloads by way of Clickfix mechanisms. <\/p>\n<p>These websites exploit consumer belief in acquainted companies, urging clicks on verification buttons that set off JavaScript-based command execution with out overt interplay, aligning with MITRE ATT&amp;CK strategies similar to T1189 (Drive-by Compromise) for preliminary entry, T1059.003 (Home windows Command Shell) and T1059.005 (JavaScript\/VBScript) for execution, and T1204.001 (Malicious Hyperlink) for consumer manipulation. <\/p>\n<p>Protection evasion is achieved by way of T1027 (Obfuscated Recordsdata or Data) with silent downloads and T1036 (Masquerading) by way of benign-themed interfaces, whereas anticipated persistence includes T1053.005 (Scheduled Job\/Job). Command and management happens over T1071.001 (Internet Protocols) utilizing HTTP, resulting in T1486 (Information Encrypted for Influence) within the ransomware section.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Mitigation Methods<\/strong><\/h2>\n<p>Attributed to Epsilon Crimson, first noticed in 2021, this ransomware attracts unfastened inspiration from REvil in its ransom observe styling, that includes minor grammatical refinements however missing deeper tactical or infrastructural overlaps. <\/p>\n<p>The marketing campaign\u2019s sophistication lies in abusing ActiveX for distant code execution straight from browser periods, bypassing standard obtain safeguards and enabling endpoint compromise that precedes lateral motion and full encryption. <\/p>\n<p>In accordance with a CloudSek <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.cloudsek.com\/blog\/threat-actors-lure-victims-into-downloading-hta-files-using-clickfix-to-spread-epsilon-red-ransomware\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">report<\/a>, model impersonation considerably lowers consumer suspicion, growing an infection charges, whereas persistent reuse of themed supply pages signifies a well-planned, long-term operation.<\/p>\n<p>Further indicators embrace domains like twtich.cc internet hosting .HTA recordsdata and capchabot.cc for normal Clickfix supply, alongside a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/threat-actors-using-bat-files\/\" target=\"_blank\" rel=\"noreferrer noopener\">Quasar RAT<\/a> variant (MD5: 2db32339fa151276d5a40781bc8d5eaa) tied to a different C2 IP (213.209.150.188:8112).<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhL3lJYbmjkzyRapYKeDdmbQCsVYuqD6KQCb7w0MdVgWKScuYdVjGRULYhauzjI1UZIMAA2R7xjbu0n2Wl_uL9tFh3ASSMwK-25hfb08RMX-RD3tQqvL8jT8tC2BVV32D6ita026e4YM0jvHsJTvX6cbstb0rxdODXZWQ7se6LsBb8VwTkSDjsUKiX9OAY\/s16000\/clickfix%20themed%20malware%20delivery%20page.webp\" alt=\"Red Ransomware\"\/><figcaption class=\"wp-element-caption\">clickfix themed malware supply web page<\/figcaption><\/figure>\n<\/div>\n<p>To mitigate, organizations ought to disable ActiveX and Home windows Script Host by way of Group Insurance policies to dam legacy execution vectors. <\/p>\n<p>Integrating risk feeds for IP and area blacklisting, together with Indicators of Future Assault from Clickfix campaigns, is essential. <\/p>\n<p>Deploy endpoint detection and response guidelines to watch hidden executions, silent curl downloads, and anomalous browser-spawned processes. <\/p>\n<p>Lastly, conduct safety consciousness coaching simulating impersonated companies to construct consumer resilience towards these socially engineered threats.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Indicators of Compromise (IOCs)<\/strong><\/h2>\n<figure class=\"wp-block-table is-style-stripes\">\n<table class=\"has-fixed-layout\">\n<thead>\n<tr>\n<th>Indicator Sort<\/th>\n<th>Worth<\/th>\n<th>Notes<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>MD5<\/td>\n<td>98107c01ecd8b7802582d404e007e493<\/td>\n<td>Epsilon Crimson Ransomware<\/td>\n<\/tr>\n<tr>\n<td>Area<\/td>\n<td>twtich[.]cc<\/td>\n<td>Clickfix Supply [.hta]<\/td>\n<\/tr>\n<tr>\n<td>IP:Port<\/td>\n<td>155.94.155[.]227:2269<\/td>\n<td>Command and Management<\/td>\n<\/tr>\n<tr>\n<td>MD5<\/td>\n<td>2db32339fa151276d5a40781bc8d5eaa<\/td>\n<td>Quasar RAT Malware<\/td>\n<\/tr>\n<tr>\n<td>Area<\/td>\n<td>capchabot[.]cc<\/td>\n<td>Clickfix Supply [regular]<\/td>\n<\/tr>\n<tr>\n<td>IP:Port<\/td>\n<td>213.209.150[.]188:8112<\/td>\n<td>Command and Management<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p class=\"has-text-align-center has-background\" style=\"background:linear-gradient(135deg,rgb(238,238,238) 100%,rgb(169,184,195) 100%)\"><strong><strong><code><strong>Discover this Information Fascinating! Observe us on\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.google.com\/publications\/CAAqKAgKIiJDQklTRXdnTWFnOEtEV2RpYUdGamEyVnljeTVqYjIwb0FBUAE?hl=en-IN&amp;gl=IN&amp;ceid=IN%3Aen\" target=\"_blank\" rel=\"noreferrer noopener\">Google Information<\/a>,\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/cybersecurity-news\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a>, &amp;\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/The_Cyber_News\" target=\"_blank\" rel=\"noreferrer noopener\">X<\/a>\u00a0to Get Instantaneous Updates<\/strong>!<\/code><\/strong><\/strong><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>CloudSEK\u2019s TRIAD crew uncovered an energetic growth website deploying Clickfix-themed malware linked to the Epsilon Crimson ransomware. This variant deviates from conventional clipboard-based command injection ways by directing victims to a secondary web page on the identical area, the place malicious shell instructions are executed silently by way of ActiveXObject(\u201cWScript.Shell\u201d) to facilitate payload supply. The [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4913,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[4266,129,554,832,500,2501,4267,3590],"class_list":["post-4911","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-hta","tag-files","tag-hackers","tag-infect","tag-ransomware","tag-red","tag-victims","tag-weaponized"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/4911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4911"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/4911\/revisions"}],"predecessor-version":[{"id":4912,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/4911\/revisions\/4912"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/4913"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-06 21:18:33 UTC -->