HomeCyber SecurityFaux DocuSign, Gitcode Websites Unfold NetSupport RAT by way of Multi-Stage PowerShell...

Faux DocuSign, Gitcode Websites Unfold NetSupport RAT by way of Multi-Stage PowerShell Assault


Jun 03, 2025Ravie LakshmananUnited States

Faux DocuSign, Gitcode Websites Unfold NetSupport RAT by way of Multi-Stage PowerShell Assault

Menace hunters are alerting to a brand new marketing campaign that employs misleading web sites to trick unsuspecting customers into executing malicious PowerShell scripts on their machines and infect them with the NetSupport RAT malware.

The DomainTools Investigations (DTI) staff mentioned it recognized “malicious multi-stage downloader Powershell scripts” hosted on lure web sites that masquerade as Gitcode and DocuSign.

“These websites try to deceive customers into copying and working an preliminary PowerShell script on their Home windows Run command,” the corporate mentioned in a technical report shared with The Hacker Information.

“Upon doing so, the powershell script downloads one other downloader script and executes on the system, which in flip retrieves extra payloads and executes them ultimately putting in NetSupport RAT on the contaminated machines.”

Cybersecurity

It is believed that these counterfeit websites could also be propagated by way of social engineering makes an attempt over electronic mail and/or social media platforms.

The PowerShell scripts current hosted on the faux Gitcode websites are designed to obtain a sequence of intermediate PowerShell scripts from an exterior server (“tradingviewtool[.]com”) which can be utilized in succession to launch NetSupport RAT on sufferer machines.

DomainTools mentioned it additionally recognized a number of web sites spoofing Docusign (e.g., docusign.sa[.]com) to ship the identical distant entry trojan however with a twist: Utilizing ClickFix-style CAPTCHA verifications to dupe victims into working the malicious PowerShell script.

Just like the just lately documented assault chains delivering the EDDIESTEALER infostealer, customers who land on the pages are requested to show they don’t seem to be a robotic by finishing the verify.

Multi-Stage PowerShell Attack

Triggering the CAPTCHA verification causes an obfuscated PowerShell command to be clandestinely copied to the consumer’s clipboard — a way known as clipboard poisoning — after which they’re instructed to launch the Home windows Run dialog (“Win + R”), paste (“CTRL + V”), and press Enter, inflicting the script to be executed within the course of.

The PowerShell script works by downloading a persistence script (“wbdims.exe”) from GitHub to make sure that the payload is launched routinely when the consumer logs in to the system.

“Whereas this payload was not out there through the time of investigation, the expectation is that it checks in with the supply web site by way of ‘docusign.sa[.]com/verification/c.php,'” DomainTools mentioned. “Upon doing so, it triggers a refresh within the browser for the web page to show the content material of ‘docusign.sa[.]com/verification/s.php?an=1.'”

This leads to the supply of a second-stage PowerShell script, which then downloads and executes a third-stage ZIP payload from the identical server by setting the URL parameter “an” to “2.” The script proceeds to unpack the archive and run an executable named “jp2launcher.exe” current inside it, finally resulting in the deployment of NetSupport RAT.

Cybersecurity

“The a number of levels of scripts downloading and working scripts that obtain and run but extra scripts is probably going an try to evade detection and be extra resilient to safety investigations and takedowns,” the corporate mentioned.

It is at present not clear who’s behind the marketing campaign, however DomainTools identified that it recognized related supply URL, area naming, and registration patterns in reference to a SocGholish (aka FakeUpdates) marketing campaign detected in October 2024.

“Notably, the methods concerned are commonplace and NetSupport Supervisor is a authentic administration device identified to be leveraged as a RAT by a number of risk teams similar to FIN7, Scarlet Goldfinch, Storm-0408, and others.”

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we publish.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments