
This report analyzes a malware distribution campaign leveraging a spoofed OpenClaw platform to deliver an infostealer payload. The campaign relies on ClickFix-style social engineering to trick users into executing malicious commands manually, bypassing browser-based security controls.
Once executed, the payload initiates a staged infection chain involving a loader, a masqueraded executable, and a malicious DLL deployed via sideloading. The final payload focuses on browser credential harvesting and data exfiltration over HTTPS using WinHTTP APIs, enabling stealthy communication with attacker-controlled infrastructure.
The campaign uses a typosquatted domain designed to impersonate the legitimate OpenClaw platform. The website closely mimics the original branding and user interface to establish trust.
ClickFix is a social engineering technique where users are instructed to manually execute commands, effectively bypassing browser-based download protections.
![Figure 1: Spoofed OpenClaw website (app-clawbot[.]org) impersonating the legitimate platform to lure users into initiating the infection chain.](https://gurucul.com/wp-content/uploads/2026/04/Fake-OpenClaw-AI-Tool-Used-to-Deliver-Infostealer-via-ClickFix-Attack-Chain-1-1024x746.png)
Instead of providing a standard installer, the site redirects users to a ClickFix-style interface that instructs them to manually execute a command via Command Prompt.

The infection chain is initiated when the user executes the provided command via Command Prompt.
Execution occurs in the context of the logged-in user, with no evidence of privilege escalation observed during initial stages.

The command performs the following actions:
curl%AppData%
User → ClickFix → cmd.exe → curl → Loader → AvastSvc.exe → aswCmnOS.dll → Browser Data → C2
Following execution, the malware proceeds through a staged deployment:
AvastSvc.exe(masqueraded executable)aswCmnOS.dll

As shown above, the process tree highlights the transition from initial execution to payload activation, confirming a multi-stage infection model.
The absence of a legitimate parent application chain and execution from user-writable directories further reinforces that the observed activity is malicious and not part of standard software installation behavior.
The malware abuses DLL sideloading by bundling a legitimate-looking executable with a malicious DLL in the same directory.

Due to Windows DLL search order behavior:
Additionally, the use of the filename AvastSvc.exe mimics legitimate security software, further reducing suspicion.
Before executing its primary functionality, the malware performs basic host identification.
It queries the following registry key:
HKLM\System\CurrentControlSet\Control\ComputerName\ActiveComputerName\ComputerName

This behavior supports:
No advanced sandbox evasion techniques were observed in the analyzed sample.
The file aswCmnOS.dll acts as the primary payload and is loaded via DLL sideloading.
The DLL serves as the primary execution component, orchestrating credential harvesting and command-and-control communication:
This modular architecture enhances evasion by separating execution stages and reducing observable indicators per component.
Static analysis of aswCmnOS.dll indicates that execution is initiated through standard DLL entry mechanisms, followed by initialization routines responsible for loading embedded configuration data. Observed API usage and string references suggest a staged execution model, where browser targeting and network communication components are initialized sequentially.
The malware includes logic to selectively target browser processes, ensuring focused data collection.

Based on this logic, the malware targets:
Data of interest includes:
Selective execution minimizes noise and increases efficiency in credential harvesting.
Data extraction likely targets SQLite-based browser storage files, including credential and cookie databases commonly used by Chromium-based browsers.
The malware communicates with attacker-controlled infrastructure using WinHTTP APIs.


Observed APIs include:
WinHttpConnectWinHttpOpenRequestWinHttpSendRequestThese are used for:
The use of HTTPS (port 443) ensures encrypted communication, reducing visibility in network monitoring systems.
The use of WinHTTP enables the malware to blend with legitimate system traffic, reducing the likelihood of detection by security tools that rely on identifying anomalous networking libraries.
The campaign aligns with the following techniques:
Mappings are limited to confirmed behaviors to maintain analytical accuracy.
cmd.exe → curl.exe → %AppData%\*.exeAvastSvc.exe outside expected installation pathsAvastSvc.exe) outside standard installation directoriesComputerName%AppData%\This campaign demonstrates a structured and effective infection chain combining social engineering and execution evasion techniques.
Key characteristics include:
The reliance on legitimate tools and user interaction reduces detection by traditional security controls, emphasizing the need for behavioral monitoring and endpoint visibility.
This campaign highlights the growing effectiveness of user-driven execution techniques in bypassing traditional security controls.
Contributors:
Siva Prasad Boddu

Pandurang Terkar

Rudra Pratap
