NetSupport Manager is a remote control tool that can be installed and used by ordinary or corporate users for the purpose of remotely controlling systems. However, it is being abused by many threat actors because it allows external control over specific systems.
Unlike backdoors and RATs (Remote Access Trojans), which are mostly based on command lines, remote control tools (Remote Administration Tools) place emphasis on user-friendliness, so they offer remote desktops, also known as GUI environments. Even though they may not have been developed with malicious intent, if they are installed on infected systems, they can be used for malicious purposes by threat actors, such as for the installation of additional malware or information extortion.
As most remote control tools are used by countless users unlike other backdoors, it is easy for them to be recognized as normal programs. Thus, they have the advantage of allowing attackers to use remote control tools, which are normal programs, to bypass the detection of security software, while simultaneously enabling domination over the infected system in a GUI environment.
The following ASEC blog post covers cases where various remote control tools such as AnyDesk, TeamViewer, Ammyy Admin, and Tmate were used in attacks.

Figure 1. Forged Pokemon card game page
The downloaded file has both a disguised icon and version information, so users are prone to mistaking this for a game program and running it.

Figure 2. Malware disguised as a Pokemon card game
The malware is an installer malware developed with InnoSetup. When executed, it creates a folder in the %APPDATA% path and creates hidden NetSupport RAT-related files before executing them. It also creates a shortcut in the Startup folder, allowing the malware to be run even after a reboot. client32.exe, the ultimately executed file in the process tree below, is the NetSupport Manager client.

Figure 3. Process tree of NetSupport RAT
While it could be said that the installed NetSupport-related programs themselves are normal programs, we can see that the threat actor’s C&C server address is included in the “client32.ini” configuration file, as shown below. When NetSupport is executed, it reads this configuration file, access and establishes a connection to the threat actor’s NetSupport server, and then allows the operator to control the infected system.

Figure 4. Installed NetSupport files and the configuration file

Figure 5. Packet data of NetSupport RAT
While relevant files were being examined with our ASD (AhnLab Smart Defense) infrastructure and VirusTotal, we identified a different phishing page with the same format as a fake Pokemon card game page. Each phishing page has been distributing multiple NetSupport RAT Dropper malware since around December 2022. Moreover, while the files themselves are all different, they all include the same C&C server address in the “client32.ini” configuration file.
Among the ones uploaded to VirusTotal, there were malware samples with icons disguised as Visual Studio, and just like the original program, NetSupport RAT is installed in the path %APPDATA%\Developer\. From this, we can infer that the threat actor is using normal programs other than the Pokemon game to distribute malware.

Figure 6. NetSupport RAT dropper disguised as Visual Studio
There was also a type that creates the file “csvs.exe” disguised as a normal Windows program, svchost.exe, instead of installing the NetSupport client, “client32.exe” in the installation directory. While the icon and file size are different, the internal routine or PDB information shows that this is a “client32.exe” file modified by the threat actor to bypass detection.

Figure 7. client32.exe seen to have been modified by the threat actor
NetSupport RAT is being used by various threat actors. Major cases show that they are recently being distributed through spam emails disguised as those for invoices, shipment documents, and purchase orders.[1] Additionally, in the second half of the year, there was a case where users were led to install the malware themselves from a phishing page disguised as an update page for a software called SocGholish.[2]
When NetSupport RAT is installed, the threat actor can gain control over the infected system. Features supported by NetSupport by default include not only remote screen control but also system control features such as screen capture, clipboard sharing, collecting web history information, file management, and command execution. This means that the threat actor can perform various malicious behaviors such as extorting user credentials and installing additional malware.

Figure 8. Features supported by NetSupport
Recently, threat actors have been abusing remote control tools used by various users such as NetSupport in their attacks. When infected with such remote control malware, the system is overtaken by the threat actor and becomes subject to damages such as information extortion and additional malware installation.
When installing externally sourced software, users are advised to purchase or download them from their official websites and refrain from opening attachments in suspicious emails. Users should also apply the latest patch to programs such as their OS and internet browsers and update V3 to the latest version to prevent malware infection in advance.
File Detection
– Dropper/Win.NetSupport.C5345365 (2022.12.30.01)
– Malware/Win.Generic.C5339867 (2022.12.23.03)
– Malware/Win.Generic.C5335414 (2022.12.17.01)
– Malware/Win.Generic.C5333592 (2022.12.15.01)
– Malware/Win.Malware-gen.C5331507 (2022.12.13.02)
– Trojan/Win.NetSupport.C5345361 (2022.12.30.01)
– Backdoor/Text.NetSupport (2022.12.30.02)
IOC
MD5
– 097051905db43d636c3f71f3b2037e02 : NetSupport RAT dropper (PokemonBetaGame.exe)
– 1dc87bfb3613d605c9914d11a67e2c94 : NetSupport RAT dropper disguised as a Pokemon card game
– 5e6b966167c7fd13433929e774f038ee : NetSupport RAT dropper disguised as a Pokemon card game
– a9dba73b0cf1c26008fc9203684c6c22 : NetSupport RAT dropper disguised as a Pokemon card game
– adbe1069f82a076c48f79386812c1409 : NetSupport RAT dropper disguised as a Pokemon card game
– fcdc884dd581701367b284ad302efe4d : NetSupport RAT dropper disguised as a Pokemon card game
– ed68e69534ebdf6c8aa1398da032c147 : NetSupport RAT dropper disguised as Visual Studio (source.sdf)
– e7792e09b0283b87b9de37b3420f69d5 : NetSupport RAT dropper disguised as a Pokemon card game (creates csvs.exe)
– 7ca97fe166c4d8a23d7d9505d9fcc1c0 : Patched client32.exe (csvs.exe)
– 59048c3248025a7d4c7c643d9cf317a5 : NetSupport configuration file (client32.ini)
– f26b26f6d29a4e584bd85f216b8254b9 : NetSupport configuration file (client32.ini)
C&C
– tradinghuy.duckdns[.]org:1488
Phishing Page
– hxxps://pokemon-go[.]io/
– hxxps://beta-pokemoncards[.]io/
Download
– hxxps://pokemon-go[.]io/PokemonBetaGame.exe
– hxxps://beta-pokemoncards[.]io/PokemonCardGame.exe
– hxxps://beta-pokemoncards[.]io/PokemonBetaCard.exe
– hxxps://beta-pokemoncards[.]io/PokenoGameCard.exe
Subscribe to AhnLab’s next-generation threat intelligence platform ‘AhnLab TIP’ to check related IOC and detailed analysis information.
Categories:Malware Information
[…] the popular Japanese media franchise.However, an arm of the South Korean cybersecurity firm AhnLab warned the public about the website on Jan. 6, noting that instead of downloading agame, users were […]
[…] The stellar popularity of Pokemon makes this marketing campaign easy to sell to innocent fans and collectors of the franchise. The ASEC advises people to be wary of the threat group and spread the word among the community to stop the spread of the malicious software attack. The NetSupport RAT is a legitimate program that gives system administrators remote access to devices. Due to this reason, hackers commonly use it to evade security software measures. You may read more about this specific attack on the official ASEC statement. […]
[…] the popular Japanese media franchise.However, an arm of the South Korean cybersecurity firm AhnLab warned the public about the website on Jan. 6, noting that instead of downloading agame, users were […]
[…] The stellar reputation of Pokemon makes this advertising and marketing marketing campaign simple to promote to harmless followers and collectors of the franchise. The ASEC advises individuals to be cautious of the menace group and unfold the phrase among the many neighborhood to cease the unfold of the malicious software program assault. The NetSupport RAT is a reputable program that provides system directors distant entry to units. Because of this cause, hackers generally use it to evade safety software program measures. You could learn extra about this particular assault on the official ASEC statement. […]
[…] an arm of the South Korean cybersecurity firm AhnLab warned the public about the website on Jan. 6, noting that instead of downloading agame, users were […]
[…] The stellar popularity of Pokemon makes this marketing campaign easy to sell to innocent fans and collectors of the franchise. The ASEC advises people to be wary of the threat group and spread the word among the community to stop the spread of the malicious software attack. The NetSupport RAT is a legitimate program that gives system administrators remote access to devices. Due to this reason, hackers commonly use it to evade security software measures. You may read more about this specific attack on the official ASEC statement. […]
[…] The stellar reputation of Pokemon makes this advertising marketing campaign straightforward to promote to harmless followers and collectors of the franchise. The ASEC advises folks to be cautious of the risk group and unfold the phrase among the many neighborhood to cease the unfold of the malicious software program assault. The NetSupport RAT is a legit program that offers system directors distant entry to units. Because of this purpose, hackers generally use it to evade safety software program measures. Chances are you’ll learn extra about this particular assault on the official ASEC statement. […]
[…] an arm of the South Korean cybersecurity agency AhnLab warned the general public concerning the web site on Jan. 6, noting that as a substitute of downloading […]
[…] Source : ASEC […]
[…] la spécialité de la congrégation sud-coréenne de cybersécurité AhnLab averti éprouvé tout autour du parage Web le 6 janvier, déclarant qu’au angle de télécharger le […]
[…] ASEC reports different phishing websites using the same fake Pokemon game to distribute multiple NetSupport droppers. However, while the dropper files might differ, they’re all linked to the same C2 server address. […]
[…] operation was uncovered by analysts at ASEC, who reports there was also a second site used in the campaign, at […]
[…] the popular Japanese media franchise.However, an arm of the South Korean cybersecurity firm AhnLab warned the public about the website on Jan. 6, noting that instead of downloading agame, users were […]
[…] the popular Japanese media franchise.However, an arm of the South Korean cybersecurity firm AhnLab warned the public about the website on Jan. 6, noting that instead of downloading agame, users were […]
[…] discovered by security researchers at ASEC who detailed their findings in a new report (opens in new tab), the campaign has been active since December of last year. Unlike with malicious […]
[…] Fuente: UN SEGUNDO […]
[…] on January 6, a division of the South Korean cybersecurity firm AhnLab issued a public warning about the website, noting that instead of downloading a game, users were downloading a remote […]
[…] Звездная популярность Pokemon позволяет легко продавать эту маркетинговую кампанию невинным фанатам и коллекционерам франшизы. ASEC советует людям опасаться группы угроз и распространять информацию среди сообщества, чтобы остановить распространение атаки вредоносного программного обеспечения. NetSupport RAT — это законная программа, которая предоставляет системным администраторам удаленный доступ к устройствам. По этой причине хакеры обычно используют его, чтобы обойти меры безопасности программного обеспечения. Вы можете прочитать больше об этой конкретной атаке в официальном заявлении ASEC. […]
[…] Source: ASIC […]
[…] embargo, como explican analistas de ASEC, la descarga real del juego instaló un troyano NetSupport el que está conectado a un servidor […]
[…] discovered by security researchers at ASEC who detailed their findings in a new report (opens in new tab), the campaign has been active since December of last year. Unlike with malicious […]
[…] Through: ASEC Ahnlab […]
[…] discovered by security researchers at ASEC who detailed their findings in a new report (opens in new tab), the campaign has been active since December of last year. Unlike with malicious […]
[…] Distribution of NetSupport RAT Malware Disguised as a Pokemon Game – ASEC BLOG (ahnlab.com) […]
[…] cybercriminals they are using a legit looking pokemon game for Deploy NetSupport Remote Access Tool and Gain Control of […]
[…] embargo, como explican Analistas de ASEC, en realidad descargando el juego instaló un troyano NetSupport conectado a un servidor controlado […]
[…] According to the report by ASEC (AhnLab Smart Defense), the malware is disguised as a game and is installed in a hidden folder in the device. It also creates a shortcut in the Startup folder, allowing it to run even after a device is restarted. […]
[…] The stellar popularity of Pokemon makes this marketing campaign easy to sell to innocent fans and collectors of the franchise. The ASEC advises people to be wary of the threat group and spread the word among the community to stop the spread of the malicious software attack. The NetSupport RAT is a legitimate program that gives system administrators remote access to devices. Due to this reason, hackers commonly use it to evade security software measures. You may read more about this specific attack on the official ASEC statement. […]
[…] discovered by security researchers at ASEC who detailed their findings in a new report (opens in new tab), the campaign has been active since December of last year. Unlike with malicious […]
[…] Definitely, scams are on the rise for NFT games. While American youtuber Logan Paul is still trying to get out of the CryptoZoo case, another scam is pointed out. AhnLab Security Emergency Response Center (ASEC) experts so just pinned the site pokemon-go.io. […]
[…] analyst from ASEC has reported that there is a second site that has been used in this […]
[…] The stellar popularity of Pokemon makes this marketing campaign easy to sell to innocent fans and collectors of the franchise. The ASEC advises people to be wary of the threat group and spread the word among the community to stop the spread of the malicious software attack. The NetSupport RAT is a legitimate program that gives system administrators remote access to devices. Due to this reason, hackers commonly use it to evade security software measures. You may read more about this specific attack on the official ASEC statement. […]
[…] operation was uncovered by analysts at ASEC, who reports there was also a second site used in the campaign, at […]
[…] operation was uncovered by analysts at ASEC, who reports there was also a second site used in the campaign, at […]
[…] The stellar reputation of Pokemon makes this advertising and marketing marketing campaign simple to promote to harmless followers and collectors of the franchise. The ASEC advises folks to be cautious of the menace group and unfold the phrase among the many neighborhood to cease the unfold of the malicious software program assault. The NetSupport RAT is a professional program that provides system directors distant entry to units. As a result of this purpose, hackers generally use it to evade safety software program measures. You could learn extra about this particular assault on the official ASEC statement. […]
[…] researchers at ASEC detected this new technique used by hackers. The researchers report that the hackers also used a website called “beta-pokenmoncards[io] to promote a similar game. […]
[…] The stellar reputation of Pokemon makes this advertising and marketing marketing campaign simple to promote to harmless followers and collectors of the franchise. The ASEC advises folks to be cautious of the menace group and unfold the phrase among the many group to cease the unfold of the malicious software program assault. The NetSupport RAT is a reputable program that offers system directors distant entry to units. Because of this cause, hackers generally use it to evade safety software program measures. Chances are you’ll learn extra about this particular assault on the official ASEC statement. […]
[…] fez a descoberta foi um analista do ASEC, que também descobriu outra página falsa de cards Pokémon, mas que já estava fora do […]
[…] The stellar popularity of Pokemon makes this marketing campaign easy to sell to innocent fans and collectors of the franchise. The ASEC advises people to be wary of the threat group and spread the word among the community to stop the spread of the malicious software attack. The NetSupport RAT is a legitimate program that gives system administrators remote access to devices. Due to this reason, hackers commonly use it to evade security software measures. You may read more about this specific attack on the official ASEC statement. […]
[…] The stellar recognition of Pokemon makes this advertising marketing campaign simple to promote to harmless followers and collectors of the franchise. The ASEC advises folks to be cautious of the risk group and unfold the phrase among the many group to cease the unfold of the malicious software program assault. The NetSupport RAT is a official program that provides system directors distant entry to gadgets. As a consequence of this motive, hackers generally use it to evade safety software program measures. Chances are you’ll learn extra about this particular assault on the official ASEC statement. […]
[…] The stellar reputation of Pokemon makes this advertising marketing campaign simple to promote to harmless followers and collectors of the franchise. The ASEC advises individuals to be cautious of the risk group and unfold the phrase among the many group to cease the unfold of the malicious software program assault. The NetSupport RAT is a reputable program that provides system directors distant entry to gadgets. As a consequence of this cause, hackers generally use it to evade safety software program measures. It’s possible you’ll learn extra about this particular assault on the official ASEC statement. […]
[…] von Sicherheitsforschern bei ASEC entdeckt, die ihre Ergebnisse in a neuer Bericht (öffnet in neuem Tab), die Kampagne ist seit Dezember letzten Jahres aktiv. Anders als bei […]
[…] the popular Japanese media franchise.However, an arm of the South Korean cybersecurity firm AhnLab warned the public about the website on Jan. 6, noting that instead of downloading agame, users were […]
[…] The stellar popularity of Pokemon makes this marketing campaign easy to sell to innocent fans and collectors of the franchise. The ASEC advises people to be wary of the threat group and spread the word among the community to stop the spread of the malicious software attack. The NetSupport RAT is a legitimate program that gives system administrators remote access to devices. Due to this reason, hackers commonly use it to evade security software measures. You may read more about this specific attack on the official ASEC statement. […]
[…] The stellar recognition of Pokemon makes this advertising marketing campaign straightforward to promote to harmless followers and collectors of the franchise. The ASEC advises folks to be cautious of the risk group and unfold the phrase among the many neighborhood to cease the unfold of the malicious software program assault. The NetSupport RAT is a respectable program that offers system directors distant entry to units. As a result of this motive, hackers generally use it to evade safety software program measures. You could learn extra about this particular assault on the official ASEC statement. […]
[…] cartes Pokémon en ligne! Les experts du centre sud-coréen AhnLab pour la sécurité informatique (ASEC) ont découvert un nouveau piège se servant de la technique d’hameçonnage pour pirater des […]
[…] Website promoting fake Pokémon card game with download button (source: ASEC) […]
[…] empresa de segurança notificado a comunidade que o malware relatado foi distribuído por meio de um site de phishing disfarçado […]
[…] security firm notified the community that the reported malware was distributed through a phishing page disguised as a […]
[…] fez a descoberta foi um analista do ASEC, que também descobriu outra página falsa de cards Pokémon, mas que já estava fora do […]