CrashFix - Malicious Chrome Extension targeting Corporate Environments

BLUF

 A new variant of the "ClickFix" attack, dubbed CrashFix, uses a malicious Chrome extension (NexShield) impersonating an ad blocker to crash browsers and lure users into executing malicious PowerShell commands that install ModeloRAT.

Executive Cost Summary

This cost analysis was developed by the CyberDax team using expert judgment and assisted analytical tools to support clarity and consistency.

 

For organizations affected by the CrashFix malicious Chrome extension campaign targeting domain-joined corporate systems:

·       Low-end total cost: $500K – $1.0M

o   (limited infections, rapid containment, no confirmed data access)

·       Typical expected range: $1.2M – $2.5M

o   (multiple endpoints affected, credential resets, extended investigation)

·       Upper-bound realistic scenarios: $3.0M – $5.0M

o   (broader credential exposure, regulatory review, prolonged remediation)

Key Cost Drivers

·       Number of domain-joined endpoints requiring investigation or reimaging

·       Scope and privilege level of credentials exposed via infected systems

·       Duration of undetected activity prior to containment

·       Strength of browser extension governance and endpoint controls

·       Insurance coverage terms, deductibles, and post-incident premium adjustments

Targeted Sectors

Corporate environments, specifically domain-joined systems.

Countries

·       Global

Date of First Reported Activity

·       Early 2025

Date of Last Reported Activity Update

·       January 19, 2026

APT Names

·       KongTuke.

Associated Criminal Organization Names

·       N/A

IOCs

Extension Name

·       NexShield (impersonating uBlock Origin Lite)

Extension Chrome Web Store URL

·       hxxps[://]chromewebstore[.]google[.]com/detail/nexshield-%E2%80%93-advanced-web/cpcdkmjddocikjdkbbeiaafnpdbdafmi

Developer Email

alaynna6899@gmail.com

Associated Malware Component

·       ModeloRAT (a Python-based remote access trojan)

Behavioral Indicators

·       Forces unexpected browser crashes (CrashFix).

·       Impersonates legitimate ad blockers.

·       Uses malicious service workers

Malware

·       ModeloRAT.

Tools Used in Campaign

·       Malicious Chrome extensions

·       PowerShell

CVEs and CVSS Vectors

·       There have been no CVEs tied to this activity at this time

Nessus ID

·       There have been no CVEs tied to this activity at this time.

Mitigation Data

·       Administrators should block the NexShield extension

·       Implement strict browser extension whitelisting

Malware Names

·       ModeloRAT

Malware Samples

sha256

2672B6688D7B32A90F9153D2FF607D6801E6CBDE61F509ED36D0450745998D58

Malware Name

·       ModeloRAT

Malware Family

·       Python-based Remote Access Trojan (RAT)

Known Decoding Key

·       Uses two-layered encryption for its command-and-control (C2) communication

o   Specific static keys are often obfuscated within its Python codebase to hinder analysis.

Verdict

·       Malicious

o   It is classified as an advanced, fully-featured backdoor targeting corporate environments.

Primary Objectives

·       System Reconnaissance

o   Gathering detailed information about the host and network.

·       Credential and Data Theft

o   Specifically targeting Active Directory environments and sensitive corporate data.

·       Remote Command Execution

o   Providing threat actors with full control over infected systems.

Threat Actor Context

Actor

·       Attributed to KongTuke, a threat actor group active since early 2025.

Targeting

·       Exclusively targets domain-joined hosts, effectively filtering out home users to focus on high-value corporate targets.

Behavior Analysis

·       Infection Chain (CrashFix): Victims are lured via malicious Google Chrome extensions (e.g., NexShield, impersonating uBlock Origin Lite).

·       The extension triggers

o   a browser crash via a denial-of-service loop

o   Prompts the user to run a "fix" (a malicious PowerShell command copied to the clipboard).

Evasion

·       Employs delayed execution (triggering crashes ~1 hour after installation) and anti-analysis measures to bypass sandboxes.

Persistence

·       Establishes persistence on the machine to survive reboots.

Adaptive Beaconing

Features C2 beaconing that adapts based on network connectivity status to maintain stealth.

TTPs

·       T1071.001 Application Layer Protocol: Web Protocols

o   The malware utilizes HTTP/HTTPS for command and control (C2) communications to blend in with legitimate web traffic.

·       T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

o   It establishes persistence by modifying Windows registry keys (such as HKCU\Software\Microsoft\Windows\CurrentVersion\Run) to ensure it executes automatically upon system boot.

·       T1055 Process Injection

o   ModeloRAT often employs process injection to execute malicious code within the memory space of a legitimate process (e.g., explorer.exe or svchost.exe) to evade detection.

·       T1027 Obfuscated Files or Information

o   The malware's payload and configuration files are typically encrypted or obfuscated to hinder static analysis and security software detection.

·       T1113 Screen Capture

o   A primary function of this RAT is the ability to capture screenshots of the victim's desktop for data collection.

·       T1056.001 Input Capture: Keylogging

o   It includes modules for logging keystrokes to steal sensitive information such as credentials and personal messages.

·       T1005 Data from Local System

o   The malware searches for and collects files and data directly from the local system's hard drive for exfiltration.

Suggested Rules / potential hunts

As a reminder, these are indicator rules. They are likely to be noisy.

For best results consider creating a data model and reviewing the traffic as a report.

Suricata

alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET MALWARE ModeloRAT Checkin"; content:"/api/v1/checkin"; sid:1000001; rev:1;)

SentinelOne

Identify Browser Extensions (NexShield ID)

ObjectType = "File" AND (FilePath contains "cpcdkmjddocikjdkbbeiaafnpdbdafmi")

 

PowerShell Execution from Clipboard (ClickFix/CrashFix Pattern)

ObjectType = "Process" AND (ProcessName = "powershell.exe") AND (CommandLine contains "Invoke-WebRequest" OR CommandLine contains "IEX" OR CommandLine contains "-enc")

 

Network Communication to C2 Domains

ObjectType = "DNS" AND (DNSRequest in ("nexsnield.com"))

 

Splunk

index=windows sourcetype=WinEventLog:Microsoft-Windows-PowerShell/Operational EventCode=4104 "powershell" AND ("clipboard" OR "FromBase64String")

 

Delivery Method

·       Browser-based luring via fake "fix" prompts after a forced browser crash.

Email Samples

·       Not applicable

References

Security Week

·       hxxps://www.securityweek.com/malicious-chrome-extension-crashes-browser-in-clickfix-variant-crashfix/

VirusTotal

·       hxxps://www.virustotal.com/gui/file/2672b6688d7b32a90f9153d2ff607d6801e6cbde61f509ed36d0450745998d58

Previous
Previous

“Evelyn Stealer “ Targeting Software Developers via VS Code

Next
Next

Boto Cor-de-Rosa (WhatsApp Web Banking Trojan)