Skip to content Dark Web Informer - Cyber Threat Intelligence
IOC

IOC Alert: NetSupport Manager RAT Payload Delivery

📖 Overview
A URL-based indicator has been identified tied to NetSupport Manager RAT distribution. The malicious script is hosted on a compromised website belonging to a legitimate nonprofit organization, demonstrating the SmartApeSG campaign’s continued abuse of trusted infrastructure to deliver remote access tools.


📌 Key Details

FieldInformation
TypeURL
Indicatoraftermaths-attraction[.]com/ajax/pixi.min.js
Threat TypePayload Delivery
Malwarewin.netsupportmanager_rat
Confidence100%
Date10 Sep 2025 – 15:34:52 UTC
TagsSmartApeSG
Reportermonitorsg

🔎 URLScan Result
Page Title: Inland Valley Hope Partners
Screenshot: https://urlscan.io/screenshots/0199343b-b344-73eb-a40b-38bfc012958f.png
Result: https://urlscan.io/result/0199343b-b344-73eb-a40b-38bfc012958f/


📡 Related Intelligence
VirusTotal Report: https://www.virustotal.com/gui/url/e0f8548d3da4f0451dbe01fac1b21dba854163145283bfca296cf30e3afcc3a9
Reference: https://infosec.exchange/@monitorsg/115180731792855034


🛡️ Defensive Guidance

  • Block aftermaths-attraction[.]com and its hosted payloads at DNS, proxy, and endpoint layers.
  • Monitor for unauthorized script loads (pixi.min.js) from non-standard domains.
  • Hunt for NetSupport RAT persistence mechanisms across endpoints.
  • Review DNS and proxy logs for suspicious requests tied to this campaign.

⚠️ This IOC highlights the compromise of legitimate nonprofit infrastructure to host malicious payloads, increasing the likelihood of successful delivery against unsuspecting targets.

Latest