{"id":177152,"date":"2023-11-27T08:31:36","date_gmt":"2023-11-27T16:31:36","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=177152"},"modified":"2024-02-26T22:45:24","modified_gmt":"2024-02-27T06:45:24","slug":"beneath-the-surface-how-hackers-turn-netsupport-against-users","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/","title":{"rendered":"Beneath the Surface: How Hackers Turn NetSupport Against Users"},"content":{"rendered":"<p>NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical analysis, we delve into the infection chain, technical intricacies, and IOCs (Indicators of Compromise) of distinct NetSupport variants.<\/p>\n<p>The following is a heatmap depicting the current prevalence of NetSupport in the field. This malware is spreading across the United States and Canada, signifying its geographical reach.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177153\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture1-1.png\" alt=\"\" width=\"614\" height=\"343\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture1-1.png 614w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture1-1-300x168.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture1-1-205x115.png 205w\" sizes=\"auto, (max-width: 614px) 100vw, 614px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 1 : NetSupport Heat Map<\/p>\n<p>McAfee Labs recently identified a new variation of NetSupport malware, which was distributed through JavaScript, highlighting the evolving tactics employed by cybercriminals.<\/p>\n<p><strong>Infection Chain<\/strong><\/p>\n<ul>\n<li>The infection begins with obfuscated JavaScript files, serving as the initial point of entry for the malware.<\/li>\n<li>Upon execution of the JavaScript file, it invokes the Windows Script Host (wscript.exe).<\/li>\n<li>Subsequently, the wscript.exe process initiates PowerShell, employing specific commands to advance the infection.<\/li>\n<li>Under the attacker&#8217;s control, PowerShell proceeds to download the NetSupport payload, a remote administration tool with malicious intent.<\/li>\n<li>Once downloaded, the malware executes the &#8216;client32.exe&#8217; binary, which is the NetSupport client responsible for establishing control over the compromised system.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177671 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture2-2.png\" alt=\"\" width=\"1538\" height=\"457\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture2-2.png 1538w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture2-2-300x89.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture2-2-1024x304.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture2-2-768x228.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture2-2-1536x456.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture2-2-205x61.png 205w\" sizes=\"auto, (max-width: 1538px) 100vw, 1538px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 2 : Infection Chain<\/p>\n<h2><strong>Technical Analysis<\/strong><\/h2>\n<h3><strong>Variant 1: <\/strong><\/h3>\n<p>This Variant starts with a very long JS file. It follows an intricate infection chain, utilizing PowerShell commands. Key steps include changing the directory to the user&#8217;s AppData, setting variables, downloading files, and eventually executing &#8216;client32.exe&#8217;. This executable establishes control over the compromised system and registers for auto-startup through Windows Registry, following which the &#8216;client32.exe&#8217; binary is placed in the <em>&#8216;MsEdgeSandbox&#8217;<\/em> folder under AppData, providing persistence.<\/p>\n<p>The JS code looks like as shown in the picture below. Attackers leverage obfuscated JavaScript files as the starting point of an infection chain. These files are designed to bypass security mechanisms and initiate the delivery of malicious payloads.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177181 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture3.png\" alt=\"\" width=\"305\" height=\"255\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture3.png 305w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture3-300x251.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture3-154x129.png 154w\" sizes=\"auto, (max-width: 305px) 100vw, 305px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 3: Encoded Java Script File<\/p>\n<p>It contains a long list of string literals, each consisting of random characters and sequences of letters. These strings are typically used for various purposes in the code, such as constructing URLs, setting values for variables, or possibly for other purposes. The code defines several variables (hy, hY, hE, hi) and a function named &#8216;y&#8217;.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177195 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture4.png\" alt=\"\" width=\"600\" height=\"312\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture4.png 600w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture4-300x156.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture4-205x107.png 205w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 4 : Encoded Java Script File<\/p>\n<ul>\n<li>Then it sets up different variables and objects and does some calculations or operations.<center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177209 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture5.png\" alt=\"\" width=\"439\" height=\"338\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture5.png 439w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture5-300x231.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture5-168x129.png 168w\" sizes=\"auto, (max-width: 439px) 100vw, 439px\" \/><\/center><\/li>\n<\/ul>\n<p style=\"text-align: center;\">Figure 5 : Encoded Java Script File<\/p>\n<ul>\n<li>The S function appears to decode a base64-encoded string and returns a decoded string. The R function takes two arguments, a decoded string, and another string (g). It uses a custom algorithm to perform XOR operations and returns the result.<\/li>\n<li>The function appears to cache decoded values in the h array to avoid redundant decoding. If a decoded value is found in the cache, it is returned directly; otherwise, it is decoded using the Y[&#8216;YUlcMP&#8217;] function and stored in the cache.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177223 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture6.png\" alt=\"\" width=\"626\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture6.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture6-300x72.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture6-205x49.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 6 : Encoded Java Script File<\/p>\n<ul>\n<li>It creates a Windows notification using \u201cwscript\u201d, and temp file in the temp directory.<\/li>\n<li>Then it runs that file using shell and deletes the file after execution.<\/li>\n<\/ul>\n<p>The script shown in the AMSI buffer dumps in Figure 7, begins by changing the directory to the user&#8217;s AppData folder. It then sets up variables and proceeds to download and execute files. If certain commands are unavailable, it uses &#8216;bitsadmin&#8217; for file downloads. The script ensures persistence by altering directory attributes, launching &#8216;client32.exe,&#8217; and adding a Windows registry entry for automatic execution.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177237 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture7.png\" alt=\"\" width=\"784\" height=\"264\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture7.png 784w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture7-300x101.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture7-768x259.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture7-205x69.png 205w\" sizes=\"auto, (max-width: 784px) 100vw, 784px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 7 : AMSI Dump<\/p>\n<ul>\n<li>First, the script changes the current directory to the user&#8217;s AppData directory.<\/li>\n<li>As shown in figure 8, it defines several variables, including URLs for downloading files, file paths, and commands to be executed.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177251 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture8.png\" alt=\"\" width=\"560\" height=\"183\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture8.png 560w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture8-300x98.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture8-205x67.png 205w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 8 : Code block<\/p>\n<ul>\n<li>Then it checks whether the expand-archive command is available ($g3tSp4), and whether the Start-Bits Transfer command is available ($PsaB17). If both are available, it uses Start-BitsTransfer to download and transfer files, and then extracts them using expand-archive. If these commands are not available.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177265 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture9.png\" alt=\"\" width=\"624\" height=\"316\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture9.png 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture9-300x152.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture9-205x104.png 205w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">\u00a0 \u00a0 Figure 9 : Code block<\/p>\n<ul>\n<li>It downloads Client32.exe and other required dll and config files from https:[\/][\/]tukudewe[.]com[\/]js[\/]h3b2_jsg.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177279 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture10.png\" alt=\"\" width=\"744\" height=\"243\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture10.png 744w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture10-300x98.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture10-205x67.png 205w\" sizes=\"auto, (max-width: 744px) 100vw, 744px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 10 : Code block<\/p>\n<ul>\n<li>Then it sets the attributes of a directory to &#8216;Hidden&#8217;, changes the current directory, starts the client32.exe executable, and adds an entry to the Windows Registry to execute the client32.exe file at startup (as shown in Figure 11).<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177294 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture11.png\" alt=\"\" width=\"784\" height=\"198\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture11.png 784w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture11-300x76.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture11-768x194.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture11-205x52.png 205w\" sizes=\"auto, (max-width: 784px) 100vw, 784px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 11 : Code block<\/p>\n<h3><strong>Variant 2: <\/strong><\/h3>\n<p>Variant 2 of this malware shares a similar infection chain as Variant 1. Like Variant 1, it starts with obfuscated but different JavaScript files and subsequently invokes PowerShell. However, what sets Variant 2 apart is its distinct approach to manipulating files and content. It downloads a text file from a website, decodes base64-encoded data, and creates a ZIP file with potentially malicious content. Variant 2 differs significantly when it comes to file manipulation. Instead of placing the &#8216;client32.exe&#8217; in the &#8216;MsEdgeSandbox&#8217; folder like Variant 1, it follows an alternative path. In this case, it establishes the &#8216;client32.exe&#8217; in a folder labeled <em>&#8216;D&#8217;<\/em> under AppData. This distinct approach to file placement sets it apart from Variant 1, despite the shared initial infection chain.<\/p>\n<p>The JS file as shown in Figure 12, includes two variables, &#8216;F4f&#8217; and &#8216;EQGMUD.&#8217; &#8216;F4f&#8217; is set to a specific value, 140743580. &#8216;EQGMUD&#8217; is a bit more complex; it&#8217;s a string formed by converting numerical values into characters. These values are derived by subtracting &#8216;F4f&#8217; (140743580) from them. Finally, the &#8216;eval&#8217; function is used to run the code stored in &#8216;EQGMUD&#8217; as JavaScript, essentially executing this string as a script.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177308 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture12.png\" alt=\"\" width=\"673\" height=\"406\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture12.png 673w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture12-300x181.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture12-205x124.png 205w\" sizes=\"auto, (max-width: 673px) 100vw, 673px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 12 : Encoded Java Script File<\/p>\n<p>The AMSI buffer dumps as shown in Figure 13, contains PowerShell commands that perform several actions, including downloading a file from the internet, extracting it, and making changes to the windows registry.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177322 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture13.png\" alt=\"\" width=\"637\" height=\"112\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture13.png 637w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture13-300x53.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture13-205x36.png 205w\" sizes=\"auto, (max-width: 637px) 100vw, 637px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 13 : AMSI Dump<\/p>\n<ul>\n<li>hxxps:\/\/svirtual[.]sanviatorperu[.]edu[.]pe\/readme[.]txt, this is a text file hosted on a website. It first downloads the content from this website and stores it in $6.<\/li>\n<li>Then the script decodes the base64-encoded data stored in $6 and stores the result in $a, which is binary data.<\/li>\n<li>Then it sets the variable $d to a path in the user\u2019 \u201cApplication Data\u201d directory with a subdirectory named \u2018D\u2019.<\/li>\n<li>Then it checks whether the $d path exists, if it doesn\u2019t, then it creates the path.<\/li>\n<li>It constructs a path to a file named &#8216;p.zip&#8217; inside the directory specified in $d and stores it in the variable $p.<\/li>\n<li>Then it writes the binary data stored in $a to the file specified in $p. This essentially creates a ZIP file with potentially malicious contents.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177364 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture14.png\" alt=\"\" width=\"626\" height=\"146\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture14.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture14-300x70.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture14-205x48.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><strong><br \/>\n<\/strong>Figure 14 : Directory Created<\/p>\n<ul>\n<li>It attempts to extract the contents of zip file \u2018$p\u2019 into the directory specified in $d. A try\/catch block, handles exceptions.<\/li>\n<li>It constructs a path to an executable file named &#8216;client32.exe&#8217; inside the directory specified in $d and stores it in the variable $e.<\/li>\n<li>if (Test-Path $e -PathType Leaf) {Start-Process -FilePath $e} else {Write-Host &#8216;No exe.&#8217; };: This section checks if the file specified in $e exists and is a valid executable file. If it is, it attempts to start the executable using Start-Process. Otherwise, it writes &#8216;No exe.&#8217; to the console.<\/li>\n<li>Then it constructs a path to &#8216;client32.exe&#8217; inside the directory specified in $d and stores it in the variable $s.<\/li>\n<li>It sets the variable $k to a Windows Registry key path used to add programs to run at user logon.<\/li>\n<\/ul>\n<h3><strong>Process Tree<\/strong><\/h3>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177350 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture15.png\" alt=\"\" width=\"424\" height=\"140\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture15.png 424w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture15-300x99.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture15-205x68.png 205w\" sizes=\"auto, (max-width: 424px) 100vw, 424px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 15 : Process Tree<\/p>\n<p>Once the JavaScript file is executed, it launches wscript.exe and then launches PowerShell with the following command.<\/p>\n<p><em>powershell.exe -ExecutionPolicy Bypass -V<\/em><\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177378 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture16.png\" alt=\"\" width=\"600\" height=\"48\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture16.png 600w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture16-300x24.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture16-205x16.png 205w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 16 : PowerShell Command<\/p>\n<p>This way, PowerShell with the execution policy set to \u201cBypass\u201d, which means that PowerShell will not enforce any execution restrictions. This allows scripts to run without any policy-related restrictions.<\/p>\n<h3><strong>Persistence<\/strong><\/h3>\n<p>This malware is known for its persistence and attempts to hide within the user&#8217;s profile directories, which makes it challenging to remove.<\/p>\n<p>It creates a \u201c<em>MsEdgeSandbox<\/em>\u201d folder in AppData in the first variant and downloads the following files in that folder.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177392 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture17.png\" alt=\"\" width=\"626\" height=\"331\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture17.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture17-300x159.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture17-205x108.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 17 : Created Directory<\/p>\n<p>Various installation paths were seen in different variants.<\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\Apple2q6lxy6v\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\Apple2q6lxy6v\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\Apple2abm1oct\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\Apple2w35hfwm7\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user&gt;\\AppData\\Roaming\\Apple2abm1oct\\client32.exe<\/em><\/p>\n<p><em>c:\\users\\user\\appdata\\roaming\\apple2u8g65jb\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\Apple22w3r7sx\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\Apple2hnrvoo\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\Apple2kvu25\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\Apple25aoyh\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\Apple2i262cp\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\Apple2hnrvoo\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\Apple2g057yi\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\Apple22fu82\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\Apple25aoyh\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\Apple2kvu25\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\Apple22fu82\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\ Apple2_5frlv9\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\ Apple2_y8yyxp\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\ Apple2_v8qm4f\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\ Apple2_y44ztr\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\ Apple2_joafqo\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\ Apple2_ncfy5n\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\ Apple2_v8qm4f\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\ Apple2_y44ztr\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\ Apple2_y8yyxp\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\ Apple2_ncfy5n\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\ Apple2_joafqo\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\ Apple2_5frlv9\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\ Apple2_z8yde3x\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\ Apple2_z8yde3x\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Local\\Temp\\o2pi4q4o.i1y\\client32.exe<\/em><\/p>\n<p><em>c:\\users\\user \\appdata\\roaming\\d\\client32.exe<\/em><\/p>\n<p><em>C:\\Users\\user\\AppData\\Roaming\\D\\client32.exe<\/em><\/p>\n<p><em>client32<\/em><\/p>\n<p><em>c:\\users\\user\\appdata\\roaming\\d\\client32.exe<\/em><\/p>\n<p><em>C:\\Program Files (x86)\\NetSupport\\NetSupport DNA\\Client\\dnarc.exe<\/em><\/p>\n<p><em>c:\\program files (x86)\\netsupport\\netsupport dna\\client\\dnarc.exe<\/em><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Payload Overview<\/strong><\/h3>\n<ul>\n<li><strong>Client32.exe<\/strong>: This executable file is a component of NetSupport Manager Client, a widely used software solution for remote desktop management and support.<\/li>\n<li>The folder contains various files, which is typical of software installations. These files include DLLs, EXEs, INIs, INFs, and LICs, each serving a specific purpose within the software.<\/li>\n<li>NetSupport Manager Client is a commercially available software product that can be purchased or obtained through a free trial.<\/li>\n<li>To confirm the authenticity of the software, a hash query was performed using the executable file&#8217;s hash value. The query was submitted to VT, the results of the VT query indicated that Client32.exe is legitimately signed, reaffirming its status as a genuine software component.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177406 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture18.png\" alt=\"\" width=\"592\" height=\"106\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture18.png 592w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture18-300x54.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture18-205x37.png 205w\" sizes=\"auto, (max-width: 592px) 100vw, 592px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 18 : File Signature<\/p>\n<p><strong>Client32.ini<\/strong>: This file contains the configuration settings for NetSupport Manager. It governs how NetSupport Manager interacts with managed hosts and allows operators to configure various options.<\/p>\n<p><strong>NSM.LIC<\/strong>: The LIC file contains license details related to the NetSupport Manager installation, which are essential for proper licensing and software activation.<\/p>\n<ul>\n<li>The Client32.ini file provides operators with a range of configuration options. These options enable NetSupport Manager operators to manage remote hosts effectively or remain concealed when necessary.<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177420 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture19.png\" alt=\"\" width=\"296\" height=\"376\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture19.png 296w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture19-236x300.png 236w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture19-102x129.png 102w\" sizes=\"auto, (max-width: 296px) 100vw, 296px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 19 : INI File<\/p>\n<ul>\n<li>For this specific installation, the INI file indicates the presence of two NetSupport Manager console addresses:<\/li>\n<\/ul>\n<p><em>jokosampbulid1.com:1412<\/em><\/p>\n<p><em>Domain: jokosampbulid1.com<\/em><\/p>\n<p><em>Port: 1412<\/em><\/p>\n<ul>\n<li>Upon querying the domain &#8220;jokosampbulid1.com&#8221; on VirusTotal, it was identified as a C2 server associated with the NetSupport Manager RAT.<\/li>\n<\/ul>\n<p><strong>C2<\/strong><\/p>\n<ul>\n<li>Client32.exe establishes a communication channel with a remote server located at IP address 45.15.158.212 on port 1412.<\/li>\n<li>The choice of port 1412 suggests that it may be a specific port designated for NetSupport Manager&#8217;s communication protocol.<\/li>\n<li>15.158.212<\/li>\n<li>port: 1412<\/li>\n<\/ul>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177434 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture20.png\" alt=\"\" width=\"626\" height=\"266\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture20.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture20-300x127.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture20-205x87.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/center><\/p>\n<p style=\"text-align: center;\">Figure 20 : C2 Communication<\/p>\n<ul>\n<li>&#8220;NetSupport Manager\/1.3&#8221; indicates that the communication originates from a NetSupport Manager Client with version 1.3.<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-177462 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture21.png\" alt=\"\" width=\"373\" height=\"706\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture21.png 373w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture21-158x300.png 158w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/Picture21-68x129.png 68w\" sizes=\"auto, (max-width: 373px) 100vw, 373px\" \/><br \/>\nFigure 21 : HXXP Stream<\/p>\n<h3><strong>Conclusion:\u00a0<\/strong><\/h3>\n<p>The analysis of NetSupport malware variants has revealed a persistent and continually evolving threat landscape. These variants employ intricate infection chains and technical intricacies to accomplish their malicious goals. Our investigation has provided insights into their modus operandi, including downloading, and executing files through obfuscated JavaScript code and altering the Windows Registry for persistence.<\/p>\n<p>At McAfee Labs, our commitment is unwavering. We strive to provide robust and effective threat defense mechanisms to safeguard our users from a wide array of threats, including NetSupport and its various iterations. Our security software harnesses the power of signature-based, machine learning, threat intelligence, and behavior-based detection techniques, all working together to identify and thwart threats effectively. In an ever-changing digital landscape, our focus remains on keeping you safe and secure from emerging threats.<\/p>\n<h3><strong>IOCs<\/strong><\/h3>\n<h3><strong>Variant 1:<\/strong><\/h3>\n<table>\n<thead>\n<tr>\n<td><strong>Type<\/strong><\/td>\n<td><strong>SHA256<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>JS<\/td>\n<td>5ffb5e9942492f15460e58660dd121b31d4065a133a6f8461554ea8af5c407aa<\/td>\n<\/tr>\n<tr>\n<td>EXE<\/td>\n<td>89F0C8F170FE9EA28B1056517160E92E2D7D4E8AA81F4ED696932230413A6CE1<\/td>\n<\/tr>\n<tr>\n<td>URL<\/td>\n<td>hxxp:\/\/45[.]15[.]158[.]212\/fakeurl.htm<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3><strong>Variant 2:<\/strong><\/h3>\n<table>\n<thead>\n<tr>\n<td><strong>Type<\/strong><\/td>\n<td><strong>SHA256<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>JS<\/td>\n<td>48bc766326068e078cf258dea70d49dcce265e4e6dbf18f1a0ce28d310f6a89a<\/p>\n<p>73e0975c94ebcdec46fd23664ccecf8953dd70eea1f4e5813e7f8cd8d2dbc4f9<\/td>\n<\/tr>\n<tr>\n<td>URL<\/td>\n<td>hxxps:\/\/svirtual[.]sanviatorperu[.]edu[.]pe\/readme.txt<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical analysis, we delve&#8230;<\/p>\n","protected":false},"author":695,"featured_media":177476,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-177152","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Beneath the Surface: How Hackers Turn NetSupport Against Users | McAfee Blog<\/title>\n<meta name=\"description\" content=\"NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical analysis, we\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beneath the Surface: How Hackers Turn NetSupport Against Users | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical analysis, we\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-27T16:31:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-27T06:45:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_NetSupport.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Beneath the Surface: How Hackers Turn NetSupport Against Users\",\"datePublished\":\"2023-11-27T16:31:36+00:00\",\"dateModified\":\"2024-02-27T06:45:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/\"},\"wordCount\":2210,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_NetSupport.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/\",\"name\":\"Beneath the Surface: How Hackers Turn NetSupport Against Users | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_NetSupport.png\",\"datePublished\":\"2023-11-27T16:31:36+00:00\",\"dateModified\":\"2024-02-27T06:45:24+00:00\",\"description\":\"NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical analysis, we\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_NetSupport.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_NetSupport.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Beneath the Surface: How Hackers Turn NetSupport Against Users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beneath the Surface: How Hackers Turn NetSupport Against Users | McAfee Blog","description":"NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical analysis, we","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Beneath the Surface: How Hackers Turn NetSupport Against Users | McAfee Blog","og_description":"NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical analysis, we","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2023-11-27T16:31:36+00:00","article_modified_time":"2024-02-27T06:45:24+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_NetSupport.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Beneath the Surface: How Hackers Turn NetSupport Against Users","datePublished":"2023-11-27T16:31:36+00:00","dateModified":"2024-02-27T06:45:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/"},"wordCount":2210,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_NetSupport.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/","name":"Beneath the Surface: How Hackers Turn NetSupport Against Users | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_NetSupport.png","datePublished":"2023-11-27T16:31:36+00:00","dateModified":"2024-02-27T06:45:24+00:00","description":"NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical analysis, we","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_NetSupport.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_NetSupport.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/beneath-the-surface-how-hackers-turn-netsupport-against-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Beneath the Surface: How Hackers Turn NetSupport Against Users"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/177152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=177152"}],"version-history":[{"count":20,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/177152\/revisions"}],"predecessor-version":[{"id":184252,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/177152\/revisions\/184252"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/177476"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=177152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=177152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=177152"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=177152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}