OCRFix Botnet Uses ClickFix Phishing and Blockchain C2


OCRFix botnet trojan spreads through fake CAPTCHA tricks and blockchain-stored commands. It impersonates Tesseract OCR software to infect Windows machines. Cyjax researchers uncovered this campaign blending social engineering with EtherHiding techniques.

Attackers created a typosquatted site mimicking tesseract-ocr.com. The real Tesseract lives only on GitHub with no official domain. Victims hit a fake CAPTCHA. Clicking “verify” copies obfuscated PowerShell to the clipboard. The page urges pasting it into PowerShell.

Example of the fake CAPTCHA (Source – Cyjax)

The command fetches an MSI file from opsecdefcloud.com. Execution redirects users to legit GitHub afterward. No alarms trigger. Victims stay blind to the breach.

MSI unpacks in three stages. Update1.exe queries BNB TestNet smart contracts for next steps. It grabs data.zip from attacker servers. setup_helper.exe sets persistence via scheduled tasks running every minute at max privileges. It dodges Windows Defender exclusions.

CfgHelper.exe phones home to ldture.com with system details: IP, OS, hostname, unique IDs. Cyrillic code hints at Russian operators, but stays unconfirmed.

Rendered ‘Bot Control Panel’ (Source – Cyjax)

Infection Chain

StageFileAction
1Update1.exeQueries BNB blockchain for C2, downloads data.zip
2setup_helper.exeCreates scheduled task, Defender bypass
3CfgHelper.exeSends telemetry to ldture.com bot panel

EtherHiding stores C2 URLs in BNB Smart Chain TestNet contracts. Malware reads from bsc-testnet.publicnode.com. Attackers update commands anytime without server seizures. North Korean groups used this before; now others adopt it.

Full attack flow (Source – Cyjax)

Campaign poisons SEO and LLMs like ChatGPT. It pushes the fake site in responses. YouTube tutorials spread the phishing too.

Stealth keeps bots alive long-term. Clipboard tricks fool users. Blockchain defies takedowns. Bot panel tracks thousands quietly.

Transactions found within BNB TestNet (Source – Cyjax)

Key Indicators

  • Phishing domain: tesseract-ocr[.]com
  • MSI hash: 98166e51.msi
  • C2: ldture[.]com, opsecdefcloud[.]com
  • Blockchain: BNB TestNet contracts
  • Task: Runs CfgHelper.exe every 60 seconds

Block PowerShell for non-admins. Log script blocks. Train on ClickFix CAPTCHAs. Flag WMI queries and odd tasks. Watch blockchain node traffic.

FAQ

What starts OCRFix infection?

Fake CAPTCHA on typosquatted Tesseract site copies PowerShell payload.

How does EtherHiding work?

C2 URLs hide in BNB TestNet smart contracts, read at runtime.

What does stage 2 do?

Sets scheduled task for persistence, skips Defender scans.

Who found it?

Cyjax during threat monitoring

Any IOCs?

Domains: ldture.com, opsecdefcloud.com; BNB TestNet nodes.

How to block it?

Restrict PowerShell, monitor tasks, train on phishing CAPTCHAs.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages