#ClearFake variant is now spreading #Rhadamanthys Stealer via #Emmenhtal Loader.
cc @sekoia_io
1. ClearFake framework is injected on compromised WordPress and relies on EtherHiding
2. The #ClickFix lure uses a fake Cloudflare Turnstile with unusual web traffic
3. Malicious PowerShell command is copied into the user's clipboard data to be executed in the Run dialog box
4. Downloading Emmenhtal from:
bytes.microstorage.]shop (1st stage)
w66.discoverconicalcrouton.]shop (2nd stage)
5. Further downloading and executing Rhadamanthys from:
bytes.microstorage.]shop/code.bin (https://virustotal.com/gui/file/a88c153e1595f9d193b3f881ec77e0d7d338ae22c9f6e67ffdf39c3609fcdbf7)
6. Communicating with C2 at:
91.240.118.]2:9769
Public analysis of the recent ClearFake variant: https://security.szustak.pl/etherhide/etherhide.html