Description

A new malicious campaign that threat hunters alerted is using disguised websites that impersonate Gitcode and DocuSign to trick users into running PowerShell scripts on their systems getting infected with NetSupport RAT. These spoofed sites often appear through phishing links on email or social media, by captcha verifications which copy and download malicious script to be run on windows prompt. In initial stage of attack, when a user visits a fake Gitcodes site like gitcodes[.]org or docusign.sa[.]com, a script often obfuscated using ROT13 is copied to the clipboard and executed on Windows run prompt. This script downloads second stage PowerShell script, which then makes 3 or more requests to domains like tradingviewtool[.]com and tradingviewtoolz[.]com to retrieve more payloads including zip utility used to unpack a malicious file named client32.exe, which is added to the system’s startup registry under the name “My Support” for persistence. The fake DocuSign CAPTCHA verifications also use similar PowerShell script to the clipboard copy, which downloads and runs a persistence script wbdims.exe from GitHub and auto-runs on login to launch payload automatically. After system checks with a remote server, a second script is deployed, unpacks and run third-stage payload (jp2launcher.exe) from a zip archive, that installs the NetSupport RAT and communicates with remote servers like mhousecreative[.]com and tailored IP address, thereby compromising. The threat actors employed multistaging of scripts downloads and execution to evade detection. Users must avoid copying and run code from untrusted websites. Organizations should block known malicious domains, monitor PowerShell activity, and educate users on phishing tactics. Security admins are advised to disable clipboard access for unknown websites and implement endpoint detection to detect multi-stage script execution.