Operation CLICKSMOKE -- Deno-Based ClickFix MaaS Platform
TLP: WHITE Date: 2026-04-03 Analyst: GHOST (Breakglass Intelligence) Classification: Cybercrime -- Malware-as-a-Service (MaaS) Source: @malwrhunterteam Twitter lead; ThreatFox IOC #1780556
Executive Summary
Investigation of dakatawebstick[.]com revealed a live, operational Deno-based ClickFix malware delivery platform operated by a threat actor using the alias "Smokest" (userId: 1943c7b8c0a029e2). The domain serves an obfuscated JavaScript payload (0/57 VT detection) that runs on the Deno runtime and implements a full implant lifecycle: victim fingerprinting, C2 session management, PowerShell-based persistence, and modular payload execution. The embedded JWT token exposed the entire build configuration, operator identity, and platform architecture. The infrastructure is hosted on Dedik Services Limited (AS207043), a bulletproof hosting provider registered in London by a Latvian individual, operating 16+ announced /24 prefixes. The C2 is confirmed LIVE as of 2026-04-03.
Key Findings
- ZERO-DETECTION PAYLOAD: The JS implant (SHA256: 8ceb89e7e4c4cfe20ea5df2f0762967fa8f3f502f2696abbe2baa0c6b437841b) has 0/57 detections on VirusTotal as of 2026-04-03
- JWT TOKEN EXPOSED: Hardcoded Bearer token decoded to reveal operator alias "Smokest", build ID, build type, and access token hash
- MaaS PLATFORM: The build system uses structured JWT payloads with buildId, buildNote ("BatClickFixPS1NewV1"), buildType ("ps1"), and userId fields -- indicating a multi-tenant malware builder platform
- DENO RUNTIME ABUSE: Uses the Deno JavaScript runtime for Windows implant execution, a relatively novel technique that bypasses traditional AV/EDR signatures
- BULLETPROOF HOSTING: Hosted on Dedik Services Limited (AS207043), a known BPH provider with 16+ /24 prefixes, operated by Hramcovs Eduards (Latvia) from a London shell address
- ADJACENT INFRASTRUCTURE: Port 1337 self-signed certificates across 94.26.90.0/24 expose Windows hostnames (DESKTOP-7J5DM9J, DESKTOP-7VF601O, WIN-DUJLB409JRK, DESKTOP-3KQVK7B, DESKTOP-AQEU99M) suggesting RDP/VNC-accessible Windows VPS fleet
- FRESH CAMPAIGN: Domain registered 2026-03-25, JWT issued 2026-03-31, ThreatFox reported 2026-04-02 -- this campaign is less than 9 days old
What Was Found vs. What Was Known
| Aspect | Prior Reporting | Our Findings |
|---|---|---|
| Domain | ThreatFox IOC (tags: ClickFix, Deno, payload) | Full JWT config, operator alias, build platform architecture |
| Operator | Unknown | "Smokest" (userId: 1943c7b8c0a029e2) |
| Infrastructure | Single domain | Full /24 subnet mapped, 5 Windows hostnames extracted, BPH provider identified |
| Detection | Unknown | 0/57 on VirusTotal (the payload is invisible to all AV engines) |
| Payload | "Unknown malware" on ThreatFox | Complete behavioral analysis: persistence, fingerprinting, C2 protocol, module loader |
| Platform | Not identified | Multi-tenant MaaS with JWT-based build management, health-check failover, session-based module delivery |
Attack Chain
[1] Social Engineering (ClickFix)
| User tricked into running clipboard command
v
[2] PowerShell / BAT Execution (T1059.001)
| buildType: "ps1" / "BatClickFixPS1NewV1"
v
[3] Deno Runtime Download & Execution (T1059.007)
| Fetches 3c736f7304ddeadb.js from C2
v
[4] Host Fingerprinting (T1082, T1033)
| USERNAME, hostname, memory, OS release -> HUID
v
[5] TCP Mutex (127.0.0.1 bind)
| Prevents duplicate execution
v
[6] Persistence Installation (T1547.001, T1053.005)
| Registry Run key + Scheduled Task + File copy to APPDATA/TEMP
v
[7] C2 Session Establishment (T1071.001)
| GET /session with JWT auth + HUID + username + hostname
v
[8] Module Download & Execution (T1105, T1106)
| Fetched module saved to disk, executed via Deno.Command()
v
[9] Ongoing C2 Loop
Retry with URL rotation on failure, sleep between cycles
Infrastructure Analysis
Network Infrastructure
| IP | ASN | Provider | Ports | Services | Status | Notes |
|---|---|---|---|---|---|---|
| 94.26.90.100 | AS207043 | Dedik Services Ltd | 80 | HTTP (C2) | LIVE | Primary C2, Cloudflare proxied |
| 94.26.90.95 | AS207043 | Dedik Services Ltd | 1337 | Self-signed TLS | LIVE | CN=WIN-DUJLB409JRK (created 2026-03-25) |
| 94.26.90.91 | AS207043 | Dedik Services Ltd | 1337 | Self-signed TLS | LIVE | CN=DESKTOP-7J5DM9J (created 2026-03-22) |
| 94.26.90.96 | AS207043 | Dedik Services Ltd | 1337 | Self-signed TLS | LIVE | CN=DESKTOP-7VF601O (created 2026-03-23) |
| 94.26.90.101 | AS207043 | Dedik Services Ltd | 1337 | Self-signed TLS | LIVE | CN=DESKTOP-3KQVK7B (created 2025-12-22) |
| 94.26.90.102 | AS207043 | Dedik Services Ltd | 1337 | Self-signed TLS | LIVE | CN=DESKTOP-AQEU99M (created 2025-12-22) |
| 94.26.90.103 | AS207043 | Dedik Services Ltd | 80,445,1337,33060 | IIS 10.0 + SMB + MySQL | LIVE | Windows server, CVE-2020-0796 vuln |
| 94.26.90.99 | AS207043 | Dedik Services Ltd | 22,80 | nginx 1.29.7 + SSH | LIVE | Linux host |
| 94.26.90.98 | AS207043 | Dedik Services Ltd | 22,2222 | OpenSSH 8.4/9.6 | LIVE | Dual SSH |
| 94.26.90.105 | AS207043 | Dedik Services Ltd | 22,80,443 | HTTP/HTTPS + SSH | LIVE | Self-signed |
| 94.26.90.114 | AS207043 | Dedik Services Ltd | 80,1337,3001 | HTTP + TLS + Node? | LIVE | Port 3001 suggests dev/panel |
Domain Infrastructure
| Domain | Registrar | Created | NS | Purpose | Status |
|---|---|---|---|---|---|
| dakatawebstick[.]com | CNOBIN Information Technology Ltd (HK) | 2026-03-25 | ram.ns.cloudflare.com / tess.ns.cloudflare.com | ClickFix C2 proxy | LIVE |
Certificate Analysis
CT Log Certificates (crt.sh):
| Issuer | Serial | Not Before | Not After | SANs |
|---|---|---|---|---|
| Let's Encrypt E7 | 06e20d83c877f14e927f8509762a925d4473 | 2026-03-24 | 2026-06-22 | *.dakatawebstick[.]com, dakatawebstick[.]com |
| Sectigo DV E36 | 0095d8052741eb8475f0f42444cc4045d7 | 2026-03-25 | 2026-06-23 | *.dakatawebstick[.]com, dakatawebstick[.]com |
Key observations:
- Both wildcard and apex certs issued on registration day -- automated setup
- Dual CA (Let's Encrypt + Sectigo) suggests Cloudflare Universal SSL + origin cert
- Cloudflare NS pair (ram + tess) shared within a single Cloudflare account -- other domains on this account are potential related infrastructure
Self-Signed Certificates on Subnet (Port 1337):
| IP | CN (Hostname) | Created | Purpose |
|---|---|---|---|
| 94.26.90.91 | DESKTOP-7J5DM9J | 2026-03-22 | Windows VPS (RDP?) |
| 94.26.90.95 | WIN-DUJLB409JRK | 2026-03-25 | Windows VPS (RDP?) |
| 94.26.90.96 | DESKTOP-7VF601O | 2026-03-23 | Windows VPS (RDP?) |
| 94.26.90.101 | DESKTOP-3KQVK7B | 2025-12-22 | Windows VPS (older) |
| 94.26.90.102 | DESKTOP-AQEU99M | 2025-12-22 | Windows VPS (older) |
The hostnames follow Windows default naming patterns (DESKTOP-XXXXXXX, WIN-XXXXXXXXXXX), indicating freshly provisioned Windows VPS instances. Port 1337 is commonly used for remote management tools (RDP tunneling, remote access panels, C2 listeners).
Hosting Hierarchy
Tier 0 (Upstream): OVH SAS (AS16276)
|
Tier 1 (Transit): Dedik Services Limited (AS207043)
| UK shell company, Latvian operator
| 16+ announced /24 prefixes
| abuse@dedik.io
|
Tier 2 (Operational): 94.26.90.0/24
| Mix of Linux (SSH/nginx) and Windows (IIS/RDP) VPS
| Port 1337 management plane
|
Tier 3 (C2): 94.26.90.100 -> Cloudflare -> dakatawebstick[.]com
ASN 207043 Route Announcements
Dedik Services announces at least these prefixes (partial list):
- 2.27.160.0/24, 2.27.248.0/24
- 82.25.63.0/24
- 85.11.161.0/24, 85.239.144.0/24, 85.239.149.0/24
- 94.26.90.0/24
- 109.160.37.0/24
- 151.240.151.0/24, 151.243.18.0/24, 151.243.28.0/24, 151.243.113.0/24, 151.243.150.0/24
- 151.247.228.0/24
- 167.148.195.0/24
- 193.111.117.0/24
Malware Analysis
Sample Details
| Property | Value |
|---|---|
| Filename | 3c736f7304ddeadb.js |
| SHA256 | 8ceb89e7e4c4cfe20ea5df2f0762967fa8f3f502f2696abbe2baa0c6b437841b |
| MD5 | ed716e3c2565426559c31b66a9c897b6 |
| Size | 14,762 bytes |
| Type | JavaScript (Deno runtime) |
| VT Detection | 0/57 (2026-04-03) |
| First Seen | 2026-04-02 (ThreatFox) |
| Build ID | 3c736f7304ddeadb |
| Build Note | BatClickFixPS1NewV1 |
| Build Type | ps1 |
| Family | ClickFix/Deno MaaS |
Obfuscation Layers
Layer 1: String Table Rotation
- 252-entry array of base64-encoded strings (
Settingsarray) - Array rotated by 198 positions at initialization
- parseInt checksum validation loop ensures correct rotation
Layer 2: Custom Base64 Decoder
channel()function implements standard base64 with URI decoding- Lookup function maps hex indices (offset 0x121) to decoded strings
Layer 3: Variable/Function Name Mangling
- All meaningful names replaced with generic names (Store, Stream, Token, etc.)
- Object property access via computed hex indices
Extracted Configuration (from JWT)
{
"buildId": "3c736f7304ddeadb",
"buildNote": "BatClickFixPS1NewV1",
"buildType": "ps1",
"proxyUrls": ["http://dakatawebstick[.]com"],
"userId": "1943c7b8c0a029e2",
"userNote": "Smokest",
"accessTokenHash": "2e9812a0dc5998a3f9a59fe64193884a67dadac05171494ffd2b81a711eb1359",
"iat": 1774976839,
"exp": 2090552839
}
JWT Timestamps:
- Issued: 2026-03-31T17:07:19Z
- Expires: 2036-03-31T05:07:19Z (10-year validity)
- JWT Algorithm: HS256
Behavioral Analysis
1. Anti-Duplicate Execution (Mutex)
- Binds TCP socket on 127.0.0.1 using
Deno.listen() - If
Deno.errors.AddrInUsecaught, exits silently - Effective single-instance lock without file/registry mutex
2. Host Fingerprinting
- Collects: USERNAME/USER env var, hostname, system memory, OS release
- Generates hardware UID (HUID) via custom hash function
U() - HUID sent with every C2 request for victim tracking
3. C2 Communication Protocol
- Health Check:
GET /health-- expects response body to trim to"ok" - Session Fetch:
GET /sessionwith headers:x-module-request: mainauthorization: Bearer <JWT>x-huid: <hardware_uid>x-username: <username>x-hostname: <hostname>
- Failover:
Promise.any()across proxy URL list; rotate on failure - Retry: Infinite loop with sleep timer between attempts
4. Persistence Mechanisms
- File Persistence: Copies self to
%APPDATA%\<hash>.jsand%TEMP%\<hash>.js - Registry Run Key:
HKCU:\Software\Microsoft\Windows\CurrentVersion\Run\<hash>- Value: PowerShell command launching Deno with the implant script
- Execution Method:
conhost.exe --headless powershell.exe -WindowStyle Hidden -Command <deno_path> -A <script_path> - Scheduled Task: Persistence via
Set-ItemPropertyon Run key with-Forceflag
5. Module Execution
- Downloads module from
/sessionendpoint - Saves to local file path
- Executes via
Deno.Command()withstdout: "inherit"andstderr: "inherit" - Module runs as child process of Deno runtime
Threat Actor Profile
Attribution Assessment
- Confidence: MEDIUM
- Alias: Smokest (from JWT
userNotefield) - User ID: 1943c7b8c0a029e2 (platform-assigned)
- Motivation: Financial (MaaS customer / cybercrime)
- OPSEC Failures:
- JWT token hardcoded in cleartext within obfuscated JS -- trivially extractable
- Operator alias "Smokest" embedded in production payload
- Platform userId leaked, enabling cross-campaign correlation
- accessTokenHash leaked (SHA256: 2e9812a0dc5998a3f9a59fe64193884a67dadac05171494ffd2b81a711eb1359), enabling auth token cracking
- Build metadata (BatClickFixPS1NewV1) reveals versioning scheme and TTPs
- Platform Role: Smokest appears to be a customer/operator of a larger MaaS platform, not the platform developer. The structured JWT with userId, buildId, and buildType fields indicates a managed builder service.
Actor Timeline
| Date | Event | Evidence |
|---|---|---|
| 2026-03-22 | Adjacent Windows VPS provisioned (DESKTOP-7J5DM9J) | Self-signed cert on 94.26.90.91:1337 |
| 2026-03-23 | Another Windows VPS provisioned (DESKTOP-7VF601O) | Self-signed cert on 94.26.90.96:1337 |
| 2026-03-25 | Domain dakatawebstick[.]com registered | WHOIS creation date |
| 2026-03-25 | TLS certificates issued (LE + Sectigo) | crt.sh CT logs |
| 2026-03-25 | Windows VPS provisioned (WIN-DUJLB409JRK) | Self-signed cert on 94.26.90.95:1337 |
| 2026-03-31 | JWT token issued (build compiled) | JWT iat claim |
| 2026-04-02 | ThreatFox IOC submitted | ThreatFox #1780556 by HuntYethHounds |
| 2026-04-02 | @malwrhunterteam tweets about domain | Twitter OSINT |
| 2026-04-03 | C2 confirmed LIVE | Breakglass recon (GET /health -> "ok") |
Victim Analysis
Confirmed Victims
No confirmed victims identified at this time. The C2 session endpoint requires valid HUID authentication, preventing passive victim enumeration.
Targeting Patterns
- Delivery Method: ClickFix social engineering (trick users into copying/pasting malicious commands)
- Target OS: Windows (PowerShell/BAT execution, Registry Run key, APPDATA/TEMP paths)
- Build Type: ps1 (PowerShell) -- indicates targeting of standard Windows desktop users
- Campaign Age: < 9 days -- likely still in early deployment phase
MITRE ATT&CK Mapping
| Tactic | Technique | ID | Application |
|---|---|---|---|
| Initial Access | User Execution: Malicious Link | T1204.001 | ClickFix social engineering |
| Execution | Command and Scripting: PowerShell | T1059.001 | PS1 build type, conhost --headless powershell |
| Execution | Command and Scripting: JavaScript | T1059.007 | Deno runtime JS implant |
| Persistence | Boot/Logon Autostart: Registry Run Key | T1547.001 | HKCU:...\Run registry persistence |
| Persistence | Scheduled Task/Job | T1053.005 | Scheduled task creation |
| Defense Evasion | Obfuscated Files or Information | T1027 | 252-entry rotated string table + base64 |
| Defense Evasion | Hide Artifacts: Hidden Window | T1564.003 | conhost --headless, -WindowStyle Hidden |
| Discovery | System Information Discovery | T1082 | hostname, OS release, system memory |
| Discovery | System Owner/User Discovery | T1033 | USERNAME/USER env var collection |
| C2 | Application Layer Protocol: HTTP | T1071.001 | HTTP-based C2 on port 80 |
| C2 | Data Encoding: Standard Encoding | T1132.001 | JWT Bearer token auth |
| Exfiltration | Ingress Tool Transfer | T1105 | Module download from /session |
IOC Summary
Network Indicators
Domains:
- dakatawebstick[.]com (ClickFix C2 proxy)
IP Addresses:
- 94.26.90[.]100 (C2 origin, AS207043 Dedik Services)
URLs:
- hxxp://dakatawebstick[.]com/3c736f7304ddeadb.js (JS implant delivery)
- hxxp://dakatawebstick[.]com/health (C2 health check)
- hxxp://dakatawebstick[.]com/session (C2 session/module endpoint)
Adjacent Infrastructure (94.26.90.0/24):
- 94.26.90[.]91 (port 1337, CN=DESKTOP-7J5DM9J)
- 94.26.90[.]95 (port 1337, CN=WIN-DUJLB409JRK)
- 94.26.90[.]96 (port 1337, CN=DESKTOP-7VF601O)
- 94.26.90[.]101 (port 1337, CN=DESKTOP-3KQVK7B)
- 94.26.90[.]102 (port 1337, CN=DESKTOP-AQEU99M)
- 94.26.90[.]103 (ports 80,445,1337,33060 -- IIS + SMB + MySQL)
- 94.26.90[.]114 (ports 80,1337,3001)
File Indicators
| Hash | Type | Value |
|---|---|---|
| SHA256 | JS Payload | 8ceb89e7e4c4cfe20ea5df2f0762967fa8f3f502f2696abbe2baa0c6b437841b |
| MD5 | JS Payload | ed716e3c2565426559c31b66a9c897b6 |
Behavioral Indicators
Persistence Artifacts:
- Registry:
HKCU:\Software\Microsoft\Windows\CurrentVersion\Run\<8-char-hash> - File:
%APPDATA%\<hash>.js - File:
%TEMP%\<hash>.js
Network Signatures:
- HTTP GET to
/healthexpecting bodyok - HTTP GET to
/sessionwith headers:x-module-request,x-huid,x-username,x-hostname - Authorization header:
Bearer eyJhbGciOiJIUzI1NiI...(HS256 JWT)
Process Indicators:
conhost.exe --headless powershell.exe -WindowStyle Hidden- Deno runtime (
deno.exe) executing.jsfiles from APPDATA/TEMP - TCP listener on localhost (mutex)
JWT Build Identifiers:
- buildId: 3c736f7304ddeadb
- userId: 1943c7b8c0a029e2
- userNote: Smokest
- accessTokenHash: 2e9812a0dc5998a3f9a59fe64193884a67dadac05171494ffd2b81a711eb1359
YARA Rules
See yara_rules/clickfix_deno_smokest.yar
Suricata Rules
See suricata_rules.rules
Recommended Actions
Immediate (24-48 hours)
- Block dakatawebstick[.]com and 94.26.90[.]100 at DNS/firewall
- Hunt for
deno.exeprocesses executing.jsfiles from%APPDATA%or%TEMP% - Hunt for Registry Run keys containing
denoand.jsfile paths - Hunt for
conhost.exe --headless powershell.exe -WindowStyle Hiddenprocess chains - Deploy YARA and Suricata rules from this report
Short-term (1-2 weeks)
- Block the entire 94.26.90.0/24 range if feasible (Dedik Services BPH)
- Monitor for new domains on Cloudflare NS pair ram/tess
- Submit IOCs to MalwareBazaar, URLhaus, and PhishTank
- Report to Cloudflare abuse (CF proxying the C2)
Medium-term (1-3 months)
- Track userId 1943c7b8c0a029e2 and alias "Smokest" across platforms
- Monitor Dedik Services (AS207043) route announcements for new prefixes
- Develop detection for Deno runtime abuse patterns (novel delivery mechanism)
- Research the MaaS platform behind the JWT build system (BatClickFixPS1NewV1)
Abuse Reports
Cloudflare
Domain dakatawebstick[.]com is proxied through Cloudflare and serves as a ClickFix malware C2. The origin IP is 94.26.90[.]100 (Dedik Services AS207043). Request immediate suspension of DNS resolution.
Dedik Services (abuse@dedik.io)
IP 94.26.90[.]100 hosts an active ClickFix malware C2 server. Related infrastructure across the 94.26.90.0/24 subnet includes Windows VPS instances with self-signed certificates on port 1337. Request suspension of 94.26.90[.]100.
CNOBIN Information Technology (registrar)
Domain dakatawebstick[.]com (Registry ID: 3080420187_DOMAIN_COM-VRSN) registered 2026-03-25 is used exclusively for malware distribution. Request domain suspension.
References
- ThreatFox IOC #1780556: dakatawebstick[.]com (ClickFix, Deno, payload)
- ThreatFox IOC #1780557: hxxp://dakatawebstick[.]com/3c736f7304ddeadb.js
- @malwrhunterteam Twitter lead (2026-04-02)
- HuntYethHounds ThreatFox reporter
- Dedik Services RIPE: ORG-DSL56-RIPE, AS207043
GHOST -- Breakglass Intelligence "One indicator. Total infrastructure."