
This week, the SonicWall Capture Labs threat research team analyzed a sample of NetSupport RAT malware. OSINT shows that this malware has been regularly seen in Ukraine and Poland as of mid- to late-2024. It is a complete Remote Access Tool capable of avoiding AV detection, detecting and breaking analysis tools, persistence, data exfiltration and privilege escalation.
The parent file is ‘setup.rar’. It has no defining characteristics beyond being a 2.12MB RAR file.

Unpacking this gives a file named ‘sshes64install.exe’, a self-extracting and installing CAB file. The immediate red flag is a timestamp of ‘2062-07-25’. Second, the file itself is 695MB in size.

A signed certificate is attached to the file by ‘Investintech.com Inc.’, but it expired in 2021.

The inflation is artificial. Running the extracted file through a debloat tool shows that the size is due to a single repeating byte in the resources section. This is an anti-analysis/evasion technique, as many tools do not scan files this large.

Carving out the contents of this CAB file shows a variety of DLL and configuration files, all of which are in plaintext and unencoded. Please note that the ‘msvcr100.dll’ is a valid DLL from Microsoft; it’s abused to allow for malicious operations.

Client32.exe is the main executable that uses the provided libraries during runtime, each with a suite of capabilities. PCICL32 has the most functionality, performing the following:
Anti-Debug:
Anti-VM:
Enumeration:
Collection:
Network:
Control:
There is also a snippet of the SFX script shown during extraction:



During runtime, ‘client32.exe’ opens local ports 5405, 49556, 49691, 49694-49697, then sends data to ‘5.252.178.165:1500’ and ‘172.67.68.212’, as well as getting the victim’s geolocation via ‘http://geo.netsupportsoftware.com/location/loca.asp’. The ports are opened using what appears to be a ‘use-after-free’ exploit with afd.sys, as the program uses multiple anonymous named pipes. This also allows privilege escalation.

No traffic was observed during runtime from an attacker's IP. Along with this, firewall settings are changed using INetFwPolicy, INetFwRule, and INetFwMgr to allow for further access.
Persistence is set in the registry at ‘HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce’, as well as dropped files being moved into the ‘~\Startup’ directory. If detected, the malware has the ability to self-delete using a COMSPEC environment variable.
To ensure SonicWall customers are prepared for any exploitation that may occur due to this malware, this is covered by the following rule:
Share This Article

An Article By
An Article By
Security News
Security News