NetSupport RAT is a malicious repurposing of the legitimate remote administration tool, NetSupport Manager, which has been available for over 30 years. While the original software is designed for valid technical support and system management, threat actors have co-opted its robust feature set to conduct unauthorized surveillance and establish persistent control over victim environments.
The malware is often distributed through complex social engineering campaigns, including drive-by downloads, compromised sites, and phishing schemes that masquerade as browser updates (such as Google Chrome) or popular gaming applications like Pokémon.
Once inside the network, the RAT establishes persistence through registry modifications or scheduled tasks and communicates with Command and Control (C2) servers, using standard HTTP/HTTPS protocols to blend in with normal traffic. Post-compromise activities frequently involve credential harvesting and the deployment of additional payloads, such as ransomware.
In this post, we will explain the technical structure of NetSupport RAT. We will detail its infection lifecycle, utilizing deceptive vectors like "ClickFix" and fake updates. Furthermore, we will analyze its core surveillance capabilities and the specific persistence mechanisms. Finally, we will demonstrate how Picus helps simulate this threat.
The operation of NetSupport RAT follows a distinct lifecycle, moving from initial delivery via social engineering to deep system integration and persistent command and control (C2) communication.
Threat actors primarily utilize deceptive "lures" to trick users into initiating the infection chain. Common vectors include:
After the victim executes the lure, the dropped files contain the legitimate NetSupport binaries alongside malicious configuration files:, the dropped files contain the legitimate NetSupport binaries alongside malicious configuration files [4]:
Threat actors utilizing NetSupport RAT possess extensive capabilities for input manipulation and surveillance, including the ability to lock a victim's mouse and keyboard and execute system commands like shutdowns or reboots. The malware is also capable of capturing audio, video, and screenshots from the infected machine to monitor user activity [3].
Regarding system administration, the RAT facilitates robust file management, enabling file transfers and the general ability to upload, download, run, and view files. Attackers can further manipulate computer settings [1].
For post-exploitation activities, the tool serves as a launchpad to deploy additional malware, such as ransomware or other malicious payloads. Once established, it allows for lateral movement to other devices within the network, often utilizing supplementary tools like the Impacket framework. Attackers may also deploy utilities such as ProcDump to extract authentication data and credentials from system memory [4].
The malware employs a combination of distinct techniques to maintain persistence on the system. It secures execution by adding an entry to the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run registry key [4], as well as placing shortcut (.url) files within the user's Startup directory. Additionally, the malware configures scheduled tasks with various triggers to ensure it is automatically relaunched periodically [3].
We also strongly suggest simulating NetSupport RAT Attacks to test the effectiveness of your security controls against real-life cyber attacks using the Picus Security Validation Platform. You can also test your defenses against hundreds of other malware variants, such as BRICKSTORM, VenomRAT, Chinotto, and Rustonotto, within minutes with a 14-day free trial of the Picus Platform.
Picus Threat Library includes the following threats for the NetSupport RAT Attacks:
|
Threat ID |
Threat Name |
Attack Module |
|
57814 |
NetSupport RAT Download Threat |
Network Infiltration |
|
68079 |
NetSupport RAT Email Threat |
E-mail Infiltration |
|
30615 |
NetSupport Loader Download Threat |
Network Infiltration |
|
71937 |
NetSupport Loader Email Threat |
E-mail Infiltration |
|
26890 |
NetSupportRAT Malware Downloader Download Threat |
Network Infiltration |
|
90807 |
NetSupportRAT Malware Downloader Email Threat |
E-mail Infiltration |
|
63243 |
NetSupportRAT Malware Dropper Download Threat |
Network Infiltration |
|
82958 |
NetSupportRAT Malware Dropper Email Threat |
E-mail Infiltration |
|
92719 |
Mustard Tempest Threat Group Campaign Malware Downloader Download Threat |
Network Infiltration |
|
96850 |
Mustard Tempest Threat Group Campaign Malware Downloader Email Threat |
E-mail Infiltration |
|
90693 |
Mustard Tempest Threat Group Campaign Malware Dropper Download Threat |
Network Infiltration |
|
52045 |
Mustard Tempest Threat Group Campaign Malware Dropper Email Threat |
E-mail Infiltration |
|
97567 |
HornsAndHooves Campaign Malware Download Threat |
Network Infiltration |
|
91237 |
HornsAndHooves Campaign Malware Email Threat |
E-mail Infiltration |
|
41347 |
NetSupport Malware Dropper Download Threat |
Network Infiltration |
|
98643 |
NetSupport Malware Dropper Email Threat |
E-mail Infiltration |
|
55267 |
FakeSG Campaign Malware Download Threat |
Network Infiltration |
|
58682 |
FakeSG Campaign Malware Email Threat |
E-mail Infiltration |
Start simulating emerging threats today and get actionable mitigation insights with a 14-day free trial of the Picus Security Validation Platform.
References
[1] A. Ngo, A. Schneider, and F. Carlisle, “NetSupport RAT: The RAT King Returns,” VMware Security Blog. Accessed: Jan. 26, 2026. [Online]. Available: https://blogs.vmware.com/security/2023/11/netsupport-rat-the-rat-king-returns.html
[2] “Deploying NetSupport RAT via WordPress & ClickFix.” Accessed: Jan. 26, 2026. [Online]. Available: https://www.cybereason.com/blog/net-support-rat-wordpress-clickfix
[3] J. Walter, “Gotta Catch ’Em All,” SentinelOne. Accessed: Jan. 26, 2026. [Online]. Available: https://www.sentinelone.com/blog/gotta-catch-em-all-understanding-the-netsupport-rat-campaigns-hiding-behind-pokemon-lures/
[4] Microsoft Corporation, “Trojan:Win32/NetSupportRat!MTB.” Accessed: Jan. 26, 2026. [Online]. Available: https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Trojan:Win32/NetSupportRat!MTB&ocid=magicti_blog_ency