Seeing new #NetSupport campaigns that use a new PowerShell-based loader that drops/executes NetSupport and deletes RunMRU registry values in order to hide evidence of #ClickFix execution! This one has a licensee named KAKAN, though is likely related to EVALUSION campaigns. C2:…

YungBinary's tweet image. Seeing new #NetSupport campaigns that use a new PowerShell-based loader that drops/executes NetSupport and deletes RunMRU registry values in order to hide evidence of #ClickFix execution! This one has a licensee named KAKAN, though is likely related to EVALUSION campaigns.

C2:…

#NetSupport #Rat 👇 Client32.ini MD5 👇 3106d32d0a7e71a30d05bac9abeec324 ⛔️88.214.27.]75:443 e1236f231b6bfef71f73927efdee847e ⛔️5.181.156.]244:443 1416fa393fd5164f00d09fbb84363fd1 ⛔️5.181.156.]238:443 cc @500mk500

JAMESWT_WT's tweet image. #NetSupport #Rat 
👇
Client32.ini MD5
👇
3106d32d0a7e71a30d05bac9abeec324 
⛔️88.214.27.]75:443

e1236f231b6bfef71f73927efdee847e 
⛔️5.181.156.]244:443

1416fa393fd5164f00d09fbb84363fd1
⛔️5.181.156.]238:443

cc @500mk500

New blog on #NetSupport RAT: a year's worth of incidents, identified 3 threat groups using it maliciously, and created an unpacking tool for PowerShell-based loader variants! esentire.com/blog/unpacking…

YungBinary's tweet image. New blog on #NetSupport RAT: a year's worth of incidents, identified 3 threat groups using it maliciously, and created an unpacking tool for PowerShell-based loader variants!

esentire.com/blog/unpacking…
YungBinary's tweet image. New blog on #NetSupport RAT: a year's worth of incidents, identified 3 threat groups using it maliciously, and created an unpacking tool for PowerShell-based loader variants!

esentire.com/blog/unpacking…
YungBinary's tweet image. New blog on #NetSupport RAT: a year's worth of incidents, identified 3 threat groups using it maliciously, and created an unpacking tool for PowerShell-based loader variants!

esentire.com/blog/unpacking…

#webshell #opendir #netsupport #rat at: https://appointedtimeagriculture\.com/wp-includes/blocks/post-content/ GatewayAddress=95.179.158.213:443 RADIUSSecret=dgAAAPpMkI7ke494fKEQRUoablcA

James_inthe_box's tweet image. #webshell #opendir #netsupport #rat at:

https://appointedtimeagriculture\.com/wp-includes/blocks/post-content/

GatewayAddress=95.179.158.213:443
RADIUSSecret=dgAAAPpMkI7ke494fKEQRUoablcA

What a fantastic buzz at the ICT for Education show in Birmingham! 🤩 Our team is loving chatting with everyone about how NetSupport's solutions can transform learning. Come say hello on the stand! buff.ly/h9KabC8 #ICTforEducation #EdTech #NetSupport #Birmingham

NetSupportGroup's tweet image. What a fantastic buzz at the ICT for Education show in Birmingham! 🤩 Our team is loving chatting with everyone about how NetSupport's solutions can transform learning. Come say hello on the stand! buff.ly/h9KabC8 

#ICTforEducation #EdTech #NetSupport #Birmingham

This obfuscation was crazy 🤩 I found it in some .bat files used to infect with #NetSupport RAT in July (#HANEYMANEY/#ZPHP distribution), C2: 5.252.178.48. Does anyone know what this type of obfuscation is called? 🧐 I shared the samples on Bazaar, for anyone who wants to dig…

1ZRR4H's tweet image. This obfuscation was crazy 🤩 I found it in some .bat files used to infect with #NetSupport RAT in July (#HANEYMANEY/#ZPHP distribution), C2: 5.252.178.48.

Does anyone know what this type of obfuscation is called? 🧐

I shared the samples on Bazaar, for anyone who wants to dig…

Thanks for sharing! #PureCrypter leads to #NetSupport RAT - 1st stage from: /centredesoinsanj.test-sites.fr/wp-admin/images/css/hills/bo/Zbstsgyoyuo.bmp (+#opendir) - 2nd stage from: /github.com/BotTradingg/loader/releases NetSupport C2: http://176.124.216.31/fakeurl.htm

1ZRR4H's tweet image. Thanks for sharing!

#PureCrypter leads to #NetSupport RAT
- 1st stage from: /centredesoinsanj.test-sites.fr/wp-admin/images/css/hills/bo/Zbstsgyoyuo.bmp (+#opendir)
- 2nd stage from: /github.com/BotTradingg/loader/releases

NetSupport C2:
http://176.124.216.31/fakeurl.htm

#netsupport #rat Client32.ini MD5 7a9adb61e63b59a6a94ba289082ccfdd GatewayAddress=5.181.156.]153:443 Samples👇 bazaar.abuse.ch/browse/tag/5-1… @500mk500

JAMESWT_WT's tweet image. #netsupport #rat
Client32.ini
MD5
7a9adb61e63b59a6a94ba289082ccfdd
GatewayAddress=5.181.156.]153:443

Samples👇
bazaar.abuse.ch/browse/tag/5-1…

@500mk500

🚩 #404TDS#NetSupport RAT (seen 10 days ago, link still active). 1.- https://accesstobenefits[.]com/cjb1z ↩️ 2.- https://ziahasanexposed[.]com/temp/Update_Accounting_billing_details_dtd_0026032024_pdf.zip NetSupport C2: dcnlaleanae8[.]com:3120 dcnlaleanae9[.]com:3120 +…

1ZRR4H's tweet image. 🚩 #404TDS → #NetSupport RAT
(seen 10 days ago, link still active).

1.- https://accesstobenefits[.]com/cjb1z ↩️
2.- https://ziahasanexposed[.]com/temp/Update_Accounting_billing_details_dtd_0026032024_pdf.zip

NetSupport C2: 
dcnlaleanae8[.]com:3120
dcnlaleanae9[.]com:3120

+…
1ZRR4H's tweet image. 🚩 #404TDS → #NetSupport RAT
(seen 10 days ago, link still active).

1.- https://accesstobenefits[.]com/cjb1z ↩️
2.- https://ziahasanexposed[.]com/temp/Update_Accounting_billing_details_dtd_0026032024_pdf.zip

NetSupport C2: 
dcnlaleanae8[.]com:3120
dcnlaleanae9[.]com:3120

+…
1ZRR4H's tweet image. 🚩 #404TDS → #NetSupport RAT
(seen 10 days ago, link still active).

1.- https://accesstobenefits[.]com/cjb1z ↩️
2.- https://ziahasanexposed[.]com/temp/Update_Accounting_billing_details_dtd_0026032024_pdf.zip

NetSupport C2: 
dcnlaleanae8[.]com:3120
dcnlaleanae9[.]com:3120

+…

'BL3.ps1' looks like #NetSupport @abuse_ch bazaar.abuse.ch/sample/446e471… 193.143.1(.)216:443 (Proton66)

smica83's tweet image. 'BL3.ps1' looks like #NetSupport @abuse_ch 
bazaar.abuse.ch/sample/446e471…  
193.143.1(.)216:443 (Proton66)

Compromised site blawx[.]com downloads Javascript file BILL47189.js (bazaar.abuse.ch/sample/a95fe0e…) which eventually leads to #Netsupport RAT. "Exclusive Insights: Unveiling 2024's Lucrative Payouts!" Next stages: - https://blawx[.]com/letter.php?36393 -…

1ZRR4H's tweet image. Compromised site blawx[.]com downloads Javascript file BILL47189.js (bazaar.abuse.ch/sample/a95fe0e…) which eventually leads to #Netsupport RAT. "Exclusive Insights: Unveiling 2024's Lucrative Payouts!"

Next stages:
- https://blawx[.]com/letter.php?36393
-…
1ZRR4H's tweet image. Compromised site blawx[.]com downloads Javascript file BILL47189.js (bazaar.abuse.ch/sample/a95fe0e…) which eventually leads to #Netsupport RAT. "Exclusive Insights: Unveiling 2024's Lucrative Payouts!"

Next stages:
- https://blawx[.]com/letter.php?36393
-…
1ZRR4H's tweet image. Compromised site blawx[.]com downloads Javascript file BILL47189.js (bazaar.abuse.ch/sample/a95fe0e…) which eventually leads to #Netsupport RAT. "Exclusive Insights: Unveiling 2024's Lucrative Payouts!"

Next stages:
- https://blawx[.]com/letter.php?36393
-…
1ZRR4H's tweet image. Compromised site blawx[.]com downloads Javascript file BILL47189.js (bazaar.abuse.ch/sample/a95fe0e…) which eventually leads to #Netsupport RAT. "Exclusive Insights: Unveiling 2024's Lucrative Payouts!"

Next stages:
- https://blawx[.]com/letter.php?36393
-…

❌ WARNING 🚨 Hackers have used a well-crafted #PokemonNFT card game website to distribute the #NetSupport remote access tool 💀 They can now remotely connect to a user's device to steal data, install other malware, etc #pokemonCards #Hacked #GamingNews #NFTs

solicydotnet's tweet image. ❌ WARNING 🚨

Hackers have used a well-crafted #PokemonNFT card game website to distribute the #NetSupport remote access tool 💀

They can now remotely connect to a user's device to steal data, install other malware, etc 

#pokemonCards #Hacked #GamingNews #NFTs

🚩 "svcservice.exe": bazaar.abuse.ch/sample/0fdc3d4…. Next stages: hxxp://andater393[.]net/see1.zip hxxp://andater393[.]net/see2.zip hxxp://andater393[.]net/see3.zip #NetSupport RAT C2: svanaten1[.]com:1061 svanaten2[.]com:1061 licensee=DERRJON34 serial_no=NSM186593 [+]…

1ZRR4H's tweet image. 🚩 "svcservice.exe": bazaar.abuse.ch/sample/0fdc3d4….

Next stages:
hxxp://andater393[.]net/see1.zip
hxxp://andater393[.]net/see2.zip
hxxp://andater393[.]net/see3.zip

#NetSupport RAT C2:
svanaten1[.]com:1061
svanaten2[.]com:1061

licensee=DERRJON34
serial_no=NSM186593

[+]…

📣 Need to get in touch with NET? 🤝 We are here to help. For any inquiries, questions, or assistance, you can contact us through the following channels. Our team is ready to assist you! Don't hesitate to reach out. 🔗 #ContactUs #NETSupport

nettrke's tweet image. 📣 Need to get in touch with NET? 🤝 We are here to help.

For any inquiries, questions, or assistance, you can contact us through the following channels. 

Our team is ready to assist you! Don't hesitate to reach out. 🔗 #ContactUs #NETSupport

#NetSupport #Rat Client32.ini MD5 de6d8f6af4bf9087a4d2ab3c88e2cb14 👇 ⛔️194.0.234.]17:443 Client32.ini MD5 006a74830a4047fe9e1d5e574a2e6eba 👇 ⛔️193.24.123.]37:443 Samples bazaar.abuse.ch/browse/tag/194… bazaar.abuse.ch/browse/tag/193… cc @500mk500 @skocherhan @abuse_ch

JAMESWT_WT's tweet image. #NetSupport #Rat 
Client32.ini
MD5 de6d8f6af4bf9087a4d2ab3c88e2cb14
👇
⛔️194.0.234.]17:443

Client32.ini
MD5 006a74830a4047fe9e1d5e574a2e6eba
👇
⛔️193.24.123.]37:443

Samples
bazaar.abuse.ch/browse/tag/194…
bazaar.abuse.ch/browse/tag/193…

cc @500mk500 @skocherhan @abuse_ch

Wonderful to finally meet and chat with the fab @OliverSlt IRL! Great #NetSupportInsights episode to come all about #Leadership. @NetSupportGroup #NetSupport #SE51 @Bett_show #Bett23

K_Cauchi's tweet image. Wonderful to finally meet and chat with the fab @OliverSlt IRL! Great #NetSupportInsights episode to come all about #Leadership. @NetSupportGroup #NetSupport #SE51 @Bett_show #Bett23

Finally met the beautiful @pennywpennyw! She's even lovelier in person. Meeting all the best people here on the @NetSupportGroup #SE51! #NetSupport #Bett23 @Bett_show

K_Cauchi's tweet image. Finally met the beautiful @pennywpennyw! She's even lovelier in person. Meeting all the best people here on the @NetSupportGroup #SE51!  #NetSupport #Bett23 @Bett_show
K_Cauchi's tweet image. Finally met the beautiful @pennywpennyw! She's even lovelier in person. Meeting all the best people here on the @NetSupportGroup #SE51!  #NetSupport #Bett23 @Bett_show

What a fantastic buzz at the ICT for Education show in Birmingham! 🤩 Our team is loving chatting with everyone about how NetSupport's solutions can transform learning. Come say hello on the stand! buff.ly/h9KabC8 #ICTforEducation #EdTech #NetSupport #Birmingham

NetSupportGroup's tweet image. What a fantastic buzz at the ICT for Education show in Birmingham! 🤩 Our team is loving chatting with everyone about how NetSupport's solutions can transform learning. Come say hello on the stand! buff.ly/h9KabC8 

#ICTforEducation #EdTech #NetSupport #Birmingham

Breaking news! 🤩 We're a finalist in the Digital/Technology category for the Peterborough Business Awards (@NatWorldEvents)! We'll be celebrating the best of the region’s businesses on 20th November. Stay tuned! buff.ly/TgAAbh9 #Finalist #PBA #NetSupport #TechNews

NetSupportNSM's tweet image. Breaking news! 🤩 We're a finalist in the Digital/Technology category for the Peterborough Business Awards (@NatWorldEvents)!

We'll be celebrating the best of the region’s businesses on 20th November. Stay tuned! buff.ly/TgAAbh9 

#Finalist #PBA #NetSupport #TechNews

Breaking news! 🤩 We're a finalist in the Digital/Technology category for the Peterborough Business Awards (@NatWorldEvents)! We'll be celebrating the best of the region’s businesses on 20th November. Stay tuned! buff.ly/GRukqby #Finalist #PBA #NetSupport #TechNews

NetSupport_Corp's tweet image. Breaking news! 🤩 We're a finalist in the Digital/Technology category for the Peterborough Business Awards (@NatWorldEvents)!

We'll be celebrating the best of the region’s businesses on 20th November. Stay tuned! buff.ly/GRukqby 

#Finalist #PBA #NetSupport #TechNews

#NetSupport #Rat 👇 Client32.ini MD5 👇 3106d32d0a7e71a30d05bac9abeec324 ⛔️88.214.27.]75:443 e1236f231b6bfef71f73927efdee847e ⛔️5.181.156.]244:443 1416fa393fd5164f00d09fbb84363fd1 ⛔️5.181.156.]238:443 cc @500mk500

JAMESWT_WT's tweet image. #NetSupport #Rat 
👇
Client32.ini MD5
👇
3106d32d0a7e71a30d05bac9abeec324 
⛔️88.214.27.]75:443

e1236f231b6bfef71f73927efdee847e 
⛔️5.181.156.]244:443

1416fa393fd5164f00d09fbb84363fd1
⛔️5.181.156.]238:443

cc @500mk500

#NetSupport #Rat Client32.ini MD5 e6286f82fd32f5a9baf88eb256c17694 GatewayAddress=perropa.]com:443 SecondaryGateway=menuderg.]com:443 88.218.64.]49:443 Samples bazaar.abuse.ch/browse/tag/88-… cc @500mk500 @VirITeXplorer @c_APT_ure

JAMESWT_WT's tweet image. #NetSupport #Rat

Client32.ini MD5
e6286f82fd32f5a9baf88eb256c17694

GatewayAddress=perropa.]com:443
SecondaryGateway=menuderg.]com:443

88.218.64.]49:443

Samples
bazaar.abuse.ch/browse/tag/88-…

cc @500mk500 @VirITeXplorer @c_APT_ure

'payload_1.ps1' @abuse_ch bazaar.abuse.ch/sample/7e5caa7… C2: hxxp://88.218.64(.)49/fakeurl.htm hxxp://88.218.64(.)49:443/fakeurl.htm VT FUD but 9 @nextronresearch comments

smica83's tweet image. 'payload_1.ps1' @abuse_ch 
bazaar.abuse.ch/sample/7e5caa7… 
C2: 
hxxp://88.218.64(.)49/fakeurl.htm
hxxp://88.218.64(.)49:443/fakeurl.htm 
VT FUD but 9 @nextronresearch comments


#netsupport #rat Samples Collection updated/tagged Client32.ini (MD5) f95f40e6a0f9c20369f95aa88d03f2b5 atmospheredast.]com:443 generationkasdm.]com:443 3bdea8a253b8f6aefb1a9cb4bf221a48 5.181.156.]97:1203 641b7b91479e9c44e03771740c5b3713 benafaciario.]com:444 chiklx.]com:444


#netsupport #rat GatewayAddress=sonosnewfq[.]com:2081 SecondaryGateway=sonosnewbh[.]net:2081 Client32.ini a9cdf2b5b8d7de09a04176bff77dc4a8 (MD5) LIC 7a8a0027f479608173a1087818d3722c(MD5) Samples bazaar.abuse.ch/browse/tag/son… cc @500mk500

JAMESWT_WT's tweet image. #netsupport #rat
GatewayAddress=sonosnewfq[.]com:2081
SecondaryGateway=sonosnewbh[.]net:2081

Client32.ini
a9cdf2b5b8d7de09a04176bff77dc4a8 (MD5)
LIC
7a8a0027f479608173a1087818d3722c(MD5)

Samples
bazaar.abuse.ch/browse/tag/son…

cc @500mk500

NetSupport RAT Signed "Advik Tech Corporation" (SSL[.com) acfa8e673b641ed1be17dff41f52589605abbd3afe305a1580b3c8977e90a7fa Snake(?) same signer (GlobalSign) fc3471e819eafc1640b51c5c8d4bd36db60dc96d912769fa0dfd619f3ec6ff09 h/t @malwrhunterteam

SquiblydooBlog's tweet image. NetSupport RAT Signed "Advik Tech Corporation" (SSL[.com)
acfa8e673b641ed1be17dff41f52589605abbd3afe305a1580b3c8977e90a7fa

Snake(?) same signer (GlobalSign)
fc3471e819eafc1640b51c5c8d4bd36db60dc96d912769fa0dfd619f3ec6ff09

h/t @malwrhunterteam


New blog on #NetSupport RAT: a year's worth of incidents, identified 3 threat groups using it maliciously, and created an unpacking tool for PowerShell-based loader variants! esentire.com/blog/unpacking…

YungBinary's tweet image. New blog on #NetSupport RAT: a year's worth of incidents, identified 3 threat groups using it maliciously, and created an unpacking tool for PowerShell-based loader variants!

esentire.com/blog/unpacking…
YungBinary's tweet image. New blog on #NetSupport RAT: a year's worth of incidents, identified 3 threat groups using it maliciously, and created an unpacking tool for PowerShell-based loader variants!

esentire.com/blog/unpacking…
YungBinary's tweet image. New blog on #NetSupport RAT: a year's worth of incidents, identified 3 threat groups using it maliciously, and created an unpacking tool for PowerShell-based loader variants!

esentire.com/blog/unpacking…

eSentire TRU uncovered multiple 2025 campaigns abusing NetSupport Manager via ClickFix, using PowerShell/JSON, Run Prompt loaders, and MSI installers. Activity grouped into EVALUSION, FSHGDREE32/SGI, and XMLCTL actors. #RemoteAccess #NetSupport ift.tt/cmj49uw


gatewayaddress[.]benafaciario[.]com secondarygoteway[.]chiklx[.]com balofult[.]com mugolens[.]com chiklx[.]com benafaciario[.]com 88[.]214[.]27[.]48:444 AS209272 Alviva Holding Limited 🇩🇪 #NetSupport

skocherhan's tweet image. gatewayaddress[.]benafaciario[.]com
secondarygoteway[.]chiklx[.]com
balofult[.]com
mugolens[.]com
chiklx[.]com
benafaciario[.]com

88[.]214[.]27[.]48:444
AS209272 Alviva Holding Limited 🇩🇪
#NetSupport

'dynatrc.ps1' is a new record for @nextronresearch with 9 thor detection hit. bazaar.abuse.ch/sample/33c017a… URL: hxxp://144.31.0(.)44/dynatrc.php

smica83's tweet image. 'dynatrc.ps1' is a new record for @nextronresearch with 9 thor detection hit. 
bazaar.abuse.ch/sample/33c017a… 
URL: 
hxxp://144.31.0(.)44/dynatrc.php


#netsupport #rat Client32.ini MD5 7a9adb61e63b59a6a94ba289082ccfdd GatewayAddress=5.181.156.]153:443 Samples👇 bazaar.abuse.ch/browse/tag/5-1… @500mk500

JAMESWT_WT's tweet image. #netsupport #rat
Client32.ini
MD5
7a9adb61e63b59a6a94ba289082ccfdd
GatewayAddress=5.181.156.]153:443

Samples👇
bazaar.abuse.ch/browse/tag/5-1…

@500mk500

🚨 Stop losing critical alerts in email! NetSupport Notify delivers instant, full-screen messages to every user. Speed up your crisis comms. Learn more: buff.ly/JcACnlG #MassNotification #ITAlerts #NetSupport

NetSupport_Corp's tweet image. 🚨 Stop losing critical alerts in email!

NetSupport Notify delivers instant, full-screen messages to every user.

Speed up your crisis comms. Learn more:
buff.ly/JcACnlG

#MassNotification #ITAlerts #NetSupport

🚨 Stop losing critical alerts in email! NetSupport Notify delivers instant, full-screen messages to every user. Speed up your crisis comms. Learn more: buff.ly/JcACnlG #MassNotification #ITAlerts #NetSupport

NetSupportICorp's tweet image. 🚨 Stop losing critical alerts in email!

NetSupport Notify delivers instant, full-screen messages to every user.

Speed up your crisis comms. Learn more:
buff.ly/JcACnlG

#MassNotification #ITAlerts #NetSupport

Seeing new #NetSupport campaigns that use a new PowerShell-based loader that drops/executes NetSupport and deletes RunMRU registry values in order to hide evidence of #ClickFix execution! This one has a licensee named KAKAN, though is likely related to EVALUSION campaigns. C2:…

YungBinary's tweet image. Seeing new #NetSupport campaigns that use a new PowerShell-based loader that drops/executes NetSupport and deletes RunMRU registry values in order to hide evidence of #ClickFix execution! This one has a licensee named KAKAN, though is likely related to EVALUSION campaigns.

C2:…

Seeing new #NetSupport campaigns that use a new PowerShell-based loader that drops/executes NetSupport and deletes RunMRU registry values in order to hide evidence of #ClickFix execution! This one has a licensee named KAKAN, though is likely related to EVALUSION campaigns. C2:…

YungBinary's tweet image. Seeing new #NetSupport campaigns that use a new PowerShell-based loader that drops/executes NetSupport and deletes RunMRU registry values in order to hide evidence of #ClickFix execution! This one has a licensee named KAKAN, though is likely related to EVALUSION campaigns.

C2:…

New blog on #NetSupport RAT: a year's worth of incidents, identified 3 threat groups using it maliciously, and created an unpacking tool for PowerShell-based loader variants! esentire.com/blog/unpacking…

YungBinary's tweet image. New blog on #NetSupport RAT: a year's worth of incidents, identified 3 threat groups using it maliciously, and created an unpacking tool for PowerShell-based loader variants!

esentire.com/blog/unpacking…
YungBinary's tweet image. New blog on #NetSupport RAT: a year's worth of incidents, identified 3 threat groups using it maliciously, and created an unpacking tool for PowerShell-based loader variants!

esentire.com/blog/unpacking…
YungBinary's tweet image. New blog on #NetSupport RAT: a year's worth of incidents, identified 3 threat groups using it maliciously, and created an unpacking tool for PowerShell-based loader variants!

esentire.com/blog/unpacking…

#ClickFix campaign targeting web3 users on YouTube sponsored videos spreading #Netsupport RAT Malicious paste: /pastesnip.com/raw/sNu60aPq Video: //www.youtube.com/watch?v=Qabajxy0OKY Detonation: app.any.run/tasks/f993b425…

g0njxa's tweet image. #ClickFix campaign targeting web3 users on YouTube sponsored videos spreading #Netsupport RAT

Malicious paste: /pastesnip.com/raw/sNu60aPq
Video: //www.youtube.com/watch?v=Qabajxy0OKY

Detonation: app.any.run/tasks/f993b425…
g0njxa's tweet image. #ClickFix campaign targeting web3 users on YouTube sponsored videos spreading #Netsupport RAT

Malicious paste: /pastesnip.com/raw/sNu60aPq
Video: //www.youtube.com/watch?v=Qabajxy0OKY

Detonation: app.any.run/tasks/f993b425…

#webshell #opendir #netsupport #rat at: https://appointedtimeagriculture\.com/wp-includes/blocks/post-content/ GatewayAddress=95.179.158.213:443 RADIUSSecret=dgAAAPpMkI7ke494fKEQRUoablcA

James_inthe_box's tweet image. #webshell #opendir #netsupport #rat at:

https://appointedtimeagriculture\.com/wp-includes/blocks/post-content/

GatewayAddress=95.179.158.213:443
RADIUSSecret=dgAAAPpMkI7ke494fKEQRUoablcA

Interesting #FakeSG execution from an HTA payload that leads to #NetSupport. Find my SIGMA rule for detecting this cool cmstp.exe execution technique below: ➡️Lots of initial PowerShell obfuscated scripts ➡️Using cmstp.exe to install a fake connection manager service profile…

Kostastsale's tweet image. Interesting #FakeSG execution from an HTA payload that leads to #NetSupport. Find my SIGMA rule for detecting this cool cmstp.exe execution technique below:

➡️Lots of initial PowerShell obfuscated scripts
➡️Using cmstp.exe to install a fake connection manager service profile…
Kostastsale's tweet image. Interesting #FakeSG execution from an HTA payload that leads to #NetSupport. Find my SIGMA rule for detecting this cool cmstp.exe execution technique below:

➡️Lots of initial PowerShell obfuscated scripts
➡️Using cmstp.exe to install a fake connection manager service profile…
Kostastsale's tweet image. Interesting #FakeSG execution from an HTA payload that leads to #NetSupport. Find my SIGMA rule for detecting this cool cmstp.exe execution technique below:

➡️Lots of initial PowerShell obfuscated scripts
➡️Using cmstp.exe to install a fake connection manager service profile…

Thanks for sharing! #PureCrypter leads to #NetSupport RAT - 1st stage from: /centredesoinsanj.test-sites.fr/wp-admin/images/css/hills/bo/Zbstsgyoyuo.bmp (+#opendir) - 2nd stage from: /github.com/BotTradingg/loader/releases NetSupport C2: http://176.124.216.31/fakeurl.htm

1ZRR4H's tweet image. Thanks for sharing!

#PureCrypter leads to #NetSupport RAT
- 1st stage from: /centredesoinsanj.test-sites.fr/wp-admin/images/css/hills/bo/Zbstsgyoyuo.bmp (+#opendir)
- 2nd stage from: /github.com/BotTradingg/loader/releases

NetSupport C2:
http://176.124.216.31/fakeurl.htm

5[.]181[.]157[.]34 AS39798 MivoCloud SRL 🇲🇩 #NetSupport @JAMESWT_WT

skocherhan's tweet image. 5[.]181[.]157[.]34
AS39798 MivoCloud SRL 🇲🇩
#NetSupport @JAMESWT_WT

This obfuscation was crazy 🤩 I found it in some .bat files used to infect with #NetSupport RAT in July (#HANEYMANEY/#ZPHP distribution), C2: 5.252.178.48. Does anyone know what this type of obfuscation is called? 🧐 I shared the samples on Bazaar, for anyone who wants to dig…

1ZRR4H's tweet image. This obfuscation was crazy 🤩 I found it in some .bat files used to infect with #NetSupport RAT in July (#HANEYMANEY/#ZPHP distribution), C2: 5.252.178.48.

Does anyone know what this type of obfuscation is called? 🧐

I shared the samples on Bazaar, for anyone who wants to dig…

#NetSupport #Rat 👇 Client32.ini MD5 👇 3106d32d0a7e71a30d05bac9abeec324 ⛔️88.214.27.]75:443 e1236f231b6bfef71f73927efdee847e ⛔️5.181.156.]244:443 1416fa393fd5164f00d09fbb84363fd1 ⛔️5.181.156.]238:443 cc @500mk500

JAMESWT_WT's tweet image. #NetSupport #Rat 
👇
Client32.ini MD5
👇
3106d32d0a7e71a30d05bac9abeec324 
⛔️88.214.27.]75:443

e1236f231b6bfef71f73927efdee847e 
⛔️5.181.156.]244:443

1416fa393fd5164f00d09fbb84363fd1
⛔️5.181.156.]238:443

cc @500mk500

🚩 "svcservice.exe": bazaar.abuse.ch/sample/0fdc3d4…. Next stages: hxxp://andater393[.]net/see1.zip hxxp://andater393[.]net/see2.zip hxxp://andater393[.]net/see3.zip #NetSupport RAT C2: svanaten1[.]com:1061 svanaten2[.]com:1061 licensee=DERRJON34 serial_no=NSM186593 [+]…

1ZRR4H's tweet image. 🚩 "svcservice.exe": bazaar.abuse.ch/sample/0fdc3d4….

Next stages:
hxxp://andater393[.]net/see1.zip
hxxp://andater393[.]net/see2.zip
hxxp://andater393[.]net/see3.zip

#NetSupport RAT C2:
svanaten1[.]com:1061
svanaten2[.]com:1061

licensee=DERRJON34
serial_no=NSM186593

[+]…

A brief example analysis of the malware spread over SEO Poisoning, delivering #Lumma Stealer and #NetSupport targeting hard crypto wallets Thread👇👇

g0njxa's tweet image. A brief example analysis of the malware spread over SEO Poisoning, delivering #Lumma Stealer and #NetSupport targeting hard crypto wallets

Thread👇👇

144[.]172[.]104[.]121 AS14956 ROUTERHOSTING 🇺🇸 #NetSupport

skocherhan's tweet image. 144[.]172[.]104[.]121
AS14956 ROUTERHOSTING 🇺🇸
#NetSupport

🚩 #404TDS#NetSupport RAT (seen 10 days ago, link still active). 1.- https://accesstobenefits[.]com/cjb1z ↩️ 2.- https://ziahasanexposed[.]com/temp/Update_Accounting_billing_details_dtd_0026032024_pdf.zip NetSupport C2: dcnlaleanae8[.]com:3120 dcnlaleanae9[.]com:3120 +…

1ZRR4H's tweet image. 🚩 #404TDS → #NetSupport RAT
(seen 10 days ago, link still active).

1.- https://accesstobenefits[.]com/cjb1z ↩️
2.- https://ziahasanexposed[.]com/temp/Update_Accounting_billing_details_dtd_0026032024_pdf.zip

NetSupport C2: 
dcnlaleanae8[.]com:3120
dcnlaleanae9[.]com:3120

+…
1ZRR4H's tweet image. 🚩 #404TDS → #NetSupport RAT
(seen 10 days ago, link still active).

1.- https://accesstobenefits[.]com/cjb1z ↩️
2.- https://ziahasanexposed[.]com/temp/Update_Accounting_billing_details_dtd_0026032024_pdf.zip

NetSupport C2: 
dcnlaleanae8[.]com:3120
dcnlaleanae9[.]com:3120

+…
1ZRR4H's tweet image. 🚩 #404TDS → #NetSupport RAT
(seen 10 days ago, link still active).

1.- https://accesstobenefits[.]com/cjb1z ↩️
2.- https://ziahasanexposed[.]com/temp/Update_Accounting_billing_details_dtd_0026032024_pdf.zip

NetSupport C2: 
dcnlaleanae8[.]com:3120
dcnlaleanae9[.]com:3120

+…

'BL3.ps1' looks like #NetSupport @abuse_ch bazaar.abuse.ch/sample/446e471… 193.143.1(.)216:443 (Proton66)

smica83's tweet image. 'BL3.ps1' looks like #NetSupport @abuse_ch 
bazaar.abuse.ch/sample/446e471…  
193.143.1(.)216:443 (Proton66)

Compromised site blawx[.]com downloads Javascript file BILL47189.js (bazaar.abuse.ch/sample/a95fe0e…) which eventually leads to #Netsupport RAT. "Exclusive Insights: Unveiling 2024's Lucrative Payouts!" Next stages: - https://blawx[.]com/letter.php?36393 -…

1ZRR4H's tweet image. Compromised site blawx[.]com downloads Javascript file BILL47189.js (bazaar.abuse.ch/sample/a95fe0e…) which eventually leads to #Netsupport RAT. "Exclusive Insights: Unveiling 2024's Lucrative Payouts!"

Next stages:
- https://blawx[.]com/letter.php?36393
-…
1ZRR4H's tweet image. Compromised site blawx[.]com downloads Javascript file BILL47189.js (bazaar.abuse.ch/sample/a95fe0e…) which eventually leads to #Netsupport RAT. "Exclusive Insights: Unveiling 2024's Lucrative Payouts!"

Next stages:
- https://blawx[.]com/letter.php?36393
-…
1ZRR4H's tweet image. Compromised site blawx[.]com downloads Javascript file BILL47189.js (bazaar.abuse.ch/sample/a95fe0e…) which eventually leads to #Netsupport RAT. "Exclusive Insights: Unveiling 2024's Lucrative Payouts!"

Next stages:
- https://blawx[.]com/letter.php?36393
-…
1ZRR4H's tweet image. Compromised site blawx[.]com downloads Javascript file BILL47189.js (bazaar.abuse.ch/sample/a95fe0e…) which eventually leads to #Netsupport RAT. "Exclusive Insights: Unveiling 2024's Lucrative Payouts!"

Next stages:
- https://blawx[.]com/letter.php?36393
-…

What a fantastic buzz at the ICT for Education show in Birmingham! 🤩 Our team is loving chatting with everyone about how NetSupport's solutions can transform learning. Come say hello on the stand! buff.ly/h9KabC8 #ICTforEducation #EdTech #NetSupport #Birmingham

NetSupportGroup's tweet image. What a fantastic buzz at the ICT for Education show in Birmingham! 🤩 Our team is loving chatting with everyone about how NetSupport's solutions can transform learning. Come say hello on the stand! buff.ly/h9KabC8 

#ICTforEducation #EdTech #NetSupport #Birmingham

#NetSupport #Rat Client32.ini MD5 de6d8f6af4bf9087a4d2ab3c88e2cb14 👇 ⛔️194.0.234.]17:443 Client32.ini MD5 006a74830a4047fe9e1d5e574a2e6eba 👇 ⛔️193.24.123.]37:443 Samples bazaar.abuse.ch/browse/tag/194… bazaar.abuse.ch/browse/tag/193… cc @500mk500 @skocherhan @abuse_ch

JAMESWT_WT's tweet image. #NetSupport #Rat 
Client32.ini
MD5 de6d8f6af4bf9087a4d2ab3c88e2cb14
👇
⛔️194.0.234.]17:443

Client32.ini
MD5 006a74830a4047fe9e1d5e574a2e6eba
👇
⛔️193.24.123.]37:443

Samples
bazaar.abuse.ch/browse/tag/194…
bazaar.abuse.ch/browse/tag/193…

cc @500mk500 @skocherhan @abuse_ch

Loading...

Something went wrong.


Something went wrong.


United States Trends