
Any syntax errors will be displayed, and they must be corrected before the script can run. Scripts are optimized and validated when launched. However, in the absence of hotkeys and hotstrings, a script will perform its commands sequentially from top to bottom the moment it is launched. A script may also contain hotkeys and hotstrings, or even consist entirely of them. "Every day we find the same clipbankers/droppers/keyloggers that only have minor changes done to their code as well as samples that even employ complex obfuscation techniques and file structure," Ixia security researcher Gabriel Cirlig said at the time.Home | Download | Documentation | Changelog | Support | Forum ScriptsĮach script is a plain text file containing commands to be executed by the program (AutoHotkey.exe). One month later, the Cybereason Nocturnus research team stumbled upon an AHK-based malware strain which they dubbed Fauxpersky given its attempts to pass as a legitimate Kaspersky antivirus copy. AHK-based malware strains surfaced in 2018ĪutoHotkey-based malware started surfacing during early 2018 in the form of various aimbots and game cheating tools, while multiple AHK malware samples were seen by Ixia's security research team distributing cryptominers and a clipboard hijacker in February. However, the attackers might employ the seemingly harmless AutoHotkey scripts which help avoid detection to drop any other possible payload, from banking Trojans, coinminer, and backdoors to the more dangerous ransomware or wiper malware.


While this malicious campaign's purpose is not yet known or obvious, it might be used by the threat actors behind it for cyber-espionage information collecting tasks given that it targets victims potentially interested in Defense Security Cooperation Agency military financing programs.
