Monday, August 25, 2025

Quick Malware Analysis: NETSUPPORT RAT pcap from 2025-08-20

Thanks to Brad Duncan for sharing this pcap from 2025-08-20 on his malware traffic analysis site! Due to issues with Google flagging a warning for the site, we're not including the actual hyperlink but it should be easy to find.


We did a quick analysis of this pcap using Security Onion 2.4.170:

https://blog.securityonion.net/2025/08/security-onion-24170-now-available.html


If you'd like to follow along, you can do the following:



The screenshots at the bottom of this post show some of the interesting alerts and their associated AI Summaries and Guided Analysis. Keep in mind that this is not some contrived demo, we simply downloaded a recent malware PCAP from Brad Duncan's site and imported it into Security Onion. Also keep in mind that this was just a PCAP and so there was no endpoint data. Had there been endpoint data, the results would have been even more in-depth.



Want more practice? Check out our other Quick Malware Analysis posts at:

https://blog.securityonion.net/search/label/quick%20malware%20analysis


About Security Onion


Security Onion is a versatile and scalable platform that can run on small virtual machines and can also scale up to the opposite end of the hardware spectrum to take advantage of extremely powerful server-class machines.  Security Onion can also scale horizontally, growing from a standalone single-machine deployment to a full distributed deployment with tens or hundreds of machines as dictated by your enterprise visibility needs. To learn more about Security Onion, please see:
https://securityonion.net


Screenshots


Let's start with an overview of all logs generated by Security Onion:


Next, let's focus on just the alerts:


Let's start at the top of the list and work our way down. The first alert is "ET REMOTE_ACCESS NetSupport Remote Admin Checkin". We first review the AI Summary on the right and then we go through the Guided Analysis:


Continuing through the Guided Analysis:


Finishing the Guided Analysis:


Now let's move on to the "ET REMOTE_ACCESS NetSupport Remote Admin Response" alert. We start with AI Summary on the right and then go through the Guided Analysis:


Finishing the Guided Analysis:


Our next alert is "ET EXPLOIT_KIT ZPHP Domain in DNS Lookup (isonline[.]org). We start with the AI Summary on the right and then go through the Guided Analysis:


The next alert is "ET EXPLOIT_KIT ZPHP Domain in TLS SNI (isonline[.]org). We start with the AI Summary on the right and then go through the Guided Analysis:


Finishing the Guided Analysis:


Our next alert is "ET INFO DNS Query for Suspicous .icu Domain". We start with the AI Summary on the right and then go through the Guided Analysis:


Finishing the Guided Analysis:


Our final alert is "ET REMOTE_ACCESS NetSupport GeoLocation Lookup Request". We start with the AI Summary on the right and then go through the Guided Analysis:


Continuing through the Guided Analysis:


Finishing the Guided Analysis:



No comments:

Search This Blog

Featured Post

Quick Malware Analysis: NETSUPPORT RAT pcap from 2025-08-20

Thanks to Brad Duncan for sharing this pcap from 2025-08-20 on his malware traffic analysis site! Due to issues with Google flagging a warni...

Popular Posts

Blog Archive