On this page:
Attack Spotlight
May 29, 2025
Tricking users with ClickFix to deliver DCRat via fake email thread
We recently saw an attack that used a nifty little JavaScript trick to try to deliver a DCRat malware payload with some help from the user. The attack started with a fake email thread about a potential upcoming apartment rental. The attacker indicates that a colleague of theirs started to book a rental apartment, but then got ill, so they handed the job off (to the attacker).
The attacker indicates that while looking for an accommodation policy, Booking[.]com mentioned an accommodation surcharge. They wanted to confirm that this surcharge information information was indeed accurate, so their message includes a link to Booking[.]com’s “Accommodation Rules” page for the target to review. This is a malicious link.
The malicious link (which has since been flagged by Cloudflare) takes the target to a Cloudflare Turnstile CAPTCHA.
After the real CAPTCHA comes a fake CAPTCHA. The favicon and tab title reflect Booking[.]com, but the CAPTCHA is a JavaScript-powered payload delivery system. When a user clicks the checkbox to confirm their non-robot status…
…the following code snippet is automatically copied to their clipboard:
This script has simple obfuscation. With the formatting cleaned up, it looks like:
At this point, the CAPTCHA window changes to include two “Verification Steps” for the target:
If the target follows those steps, they’ll paste the command into a Run window.
If they click OK, they’re taken to a Windows PowerShell UAC window.
This PowerShell will then run in the background kicking off the script.
Once run, the script reaches out to a server with the following HTTP request:
The response from the server is:
The script is a simple PowerShell script designed to download and execute a malicious file.
The downloaded file (ckjg.exe - 08037de4a729634fa818ddf03ddd27c28c89f42158af5ede71cf0ae2d78fa198
) is DCRat (DarkCrystal), a commonly observed malicious .Net-based remote access trojan (RAT) that has been observed since 2019. DCRat supports functions commonly observed by RATs such as executing shell commands, keylogging, exfiltration of files, browser cookies, saved passwords, and clipboard contents.
It has been widely used by both cybercrime and nation state actors. As DCRat has been documented many times we will skip the in-depth analysis. Using the configuration included within the executable, the following indicators of compromise (IOCs) were observed.
DCRat malware (sha256 of ckjg.exe)
Filename of DCRat when saved to disk
DCRat C2 servers
Server within ClickFix PowerShell command
Server hosting DCRat payload
Emerging Threats Network IDS Signature
Sublime's AI-powered detection engine prevented this attack. Some of the top signals for this attack were:
ASA, Sublime’s Autonomous Security Analyst, flagged this email as malicious. Here is ASA’s analysis summary:
Attackers are always testing new ways to deliver payloads. That’s why the most effective email security platforms are adaptive, using AI and machine learning to shine a spotlight on seemingly minor discrepancies.
If you enjoyed this Attack Spotlight, be sure to check our blog every week for new blogs, subscribe to our RSS feed, or sign up for our monthly newsletter. Our newsletter covers the latest blogs, detections, product updates, and more.
Read more Attack Spotlights:
Sublime releases, detections, blogs, events, and more directly to your inbox.
The latest research, attack spotlights, and product updates.
Experience Sublime’s adaptable email security platform and take control of your email environment today.