๐จ #Obfuscated BAT file used to deliver NetSupport RAT
At the time of the analysis, the sample had not yet been submitted to #VirusTotal โ ๏ธ
๐จโ๐ป See sandbox session: https://app.any.run/tasks/db6fcb53-6f10-464e-9883-72fd7f1db294?utm_source=mastodon&utm_medium=post&utm_campaign=obfuscated_bat_file&utm_content=linktoservice&utm_term=050625
๐ Execution chain:
cmd.exe (BAT) โก๏ธ #PowerShell โก๏ธ PowerShell โก๏ธ #client32.exe (NetSupport client) โก๏ธ reg.exe
Key details:
๐น Uses a 'client32' process to run #NetSupport #RAT and add it to autorun in registry via reg.exe
๐น Creates an 'Options' folder in %APPDATA % if missing
๐น NetSupport client downloads a task .zip file, extracts, and runs it from %APPDATA%\Application .zip
๐น Deletes ZIP files after execution
โ๏ธ BAT droppers remain a common choice in attacks as threat actors continue to find new methods to evade detection.
Use #ANYRUNโs Interactive Sandbox to quickly trace the full execution chain and uncover #malware behavior for fast and informed response.
