⚠️ Security Warning

ClickFix lures can lead to malware and computer viruses. If you see text like this online, it's likely a scam.

Back to Techniques

nslookup.exe

nslookup.exe is a built-in Windows DNS lookup utility. In February 2026, KongTuke began using nslookup against attacker-controlled DNS servers to retrieve payloads via DNS response fields. The technique replaces commonly blocked PowerShell/mshta approaches and blends into normal network traffic. The nslookup output is filtered to extract the DNS response Name field, which is then executed as a second-stage payload. Final payloads include ModeloRAT.

windows cli CLI

A verification step is required. Please follow the instructions below to complete the security check.

  1. Press Win-R on your keyboard

  2. Press Ctrl-V to paste the command

  3. Press Enter to run

Mitigations:

  • Monitor for nslookup invocations with non-default DNS servers from the Run dialog

  • Alert on nslookup commands initiated by explorer.exe or via RunMRU

  • Block outbound DNS queries to non-corporate DNS resolvers

  • Monitor for Python ZIP archive downloads following nslookup execution


Contributor: Michael Haag (2026-03-14)