Oct. 30, 2023, 1:17 p.m. | /u/TheDFIRReport

Malware Analysis & Reports www.reddit.com

This intrusion began with an email delivered with a zip file containing a malicious Javascript file. Following email delivery, a user extracted and executed the Javascript file. The JavaScript code pulled down an obfuscated PowerShell script that was run in memory. The PowerShell script was responsible for deploying NetSupport onto the system along with ensuring the script was not running in a sandbox and establishing persistence using registry run keys.

[https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise/](https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise/)

code compromise delivery domain down email file intrusion javascript malicious malware memory netsupport obfuscated powershell powershell script pulled responsible results run script system zip

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineer - Vulnerability Management

@ Starling Bank | Southampton, England, United Kingdom

Manager Cybersecurity

@ Sia Partners | Rotterdam, Netherlands

Compliance Analyst

@ SiteMinder | Manila

Information System Security Engineer (ISSE)-Level 3, OS&CI Job #447

@ Allen Integrated Solutions | Chantilly, Virginia, United States

Enterprise Cyber Security Analyst – Advisory and Consulting

@ Ford Motor Company | Mexico City, MEX, Mexico