Lampion Banking Malware Deploys ClickFix Lures to Harvest Banking Information

A newly identified cyber campaign, orchestrated by actors behind Lampion banking malware, has escalated threats against Portuguese organizations, with a significant uptick observed between late 2024 and early 2025.

The campaign, primarily targeting entities across government, finance, and transportation sectors, is notable for its integration of the emerging “ClickFix” social engineering lure a tactic that manipulates victims into executing malicious system commands under the guise of technical remediation.

Lampion, an infostealer active since at least 2019, continues to evolve its tactics to evade detection and maximize data theft, particularly of sensitive banking information.

Lampion Banking Malware
Lampion’s ClickFix infection chain.

The latest attack wave mirrors previous campaigns in target selection and use of heavily obfuscated Visual Basic (VB) scripting, but stands out by adopting the ClickFix method, which has recently gained traction among diverse malware families.

Complex Multi-Stage Infection Chain

According to the Report, the infection sequence commences with a phishing email containing a ZIP archive.

Inside, a malicious HTML document redirects users to a website impersonating the legitimate Portuguese tax authority.

Victims are then prompted to copy and execute a PowerShell command the essence of the ClickFix lure purportedly to “enable file preview” or resolve technical issues.

This command discreetly downloads and launches an obfuscated VBScript from a remote server, igniting a sophisticated, multi-stage attack chain.

Each stage of the malware executes as a separate process, complicating forensic efforts by breaking up the process tree and camouflaging malicious actions as isolated events.

  • Stage 1: The initial VBScript, bloated with junk variables and indirect ASCII encoding, writes a second-stage, equally obfuscated script to the system’s temporary directory. Rather than executing directly, it schedules the subsequent stage via a hidden Windows task at a random future time.
  • Stage 2: This downloader retrieves another VBScript stager from a cloud-hosted server, disguised as a PHP file.
  • Stage 3: A robust, large VBScript (30–50 MB), equipped with evasion and reconnaissance capabilities, checks for security solutions, gathers machine fingerprints, and communicates encoded identifiers to the command-and-control (C2) infrastructure.
  • Stage 4: The final payload comprises a massive DLL loader (>700 MB), fetched from a cloud destination, with execution transpiring via a startup-scheduled command and triggered by system reboot. The DLL’s entry point references functions named in Portuguese, diverging from the randomized function identifiers typical of earlier Lampion samples.
Lampion Banking Malware
Comments in Portuguese by the threat actors.

While this observed campaign did not ultimately download the final Lampion payload (the relevant code was commented out), the infection chain’s sophistication indicates continued malware development and possible future deployment of more destructive final stages.

Lampion’s reliance on multi-layered obfuscation and staged scheduling, often leveraging scheduled tasks and benign-looking scripts, hinders detection by traditional security tools.

The recent adoption of ClickFix techniques further increases risk by circumventing common user skepticism about macros or executable attachments.

Security specialists recommend proactive user training on ClickFix lures, vigilant monitoring for unusual clipboard and PowerShell activity, and employing behavioral analytics for identifying obfuscated scripting attacks.

Advanced endpoint protection platforms, like Palo Alto Networks Cortex XDR with its VBS Local Analysis Module, have demonstrated heightened efficacy in detecting these variants by recognizing obfuscated script behaviors.

Lampion’s integration of the ClickFix tactic exemplifies the rapid evolution of malware delivery techniques in financial cybercrime.

As criminals adopt increasingly convincing social engineering strategies, organizations – especially in Portuguese-speaking markets must bolster technical and educational defenses to mitigate these advanced persistent threats.

Indicators of Compromise (IOC)

TypeValue/Description
Phishing Email Hashee4c8e4cce55bd40afa1fb0bc0eee3d7c23d0ebe2db48c2092e854f6ca1472ce
Stage 1 VBS4aeb84dd71588a35084109ff5525c7bff2f30e0ed58ce139621b17f2374bdb35
Stage 2 VBSbba48cf24bb9e6bdcbc79c2241f101e3dd4127ab450e3dbbe1b79fa738f06483
29b63fcf8e5f08fd12166507b3a85746e3ec685ae0620a124e64125ecd9ccf9b
Stage 3 VBS58fe2a7d4435c9c24c98d33aff1110add4bf95add31558f51289a028ddafcc6e
334dfbaefbf7e6301d2385f95d861eb6dae9018c48fb298a2cbf5f364fbcdb2d
1681c3b88ed315543ac1bf07d258d560cf2f85bfd26c10471d71700eaeb57fb3
Stage 4 Loader (IPs)5.8.9[.]77, 83.242.96[.]159
DomainsInde-faturas[.]com, autoridade-tributaria[.]com
C2 URLshttp://18.116.63[.]61/ifeellike.php, http://18.116.63[.]61/trogloditas.php (and others)
C2 Cloud IPs18.221.69[.]167, 18.222.97[.]143, 18.116.15[.]129, 18.220.96[.]58, etc.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here