Technical Analysis & Remediation
Threat Track 1 Stan Ghouls (NetSupport RAT)
Vector
Phishing emails with malicious PDF attachments or fake software updates leading to a Java-based loader.
Mechanism
The loader checks for previous infection attempts (limit of 3) to evade sandbox analysis before fetching the RAT.
Persistence
Misuse of legitimate NetSupport Manager connectivity tools (client32.ini) to maintain persistent remote access.
Key Indicator
Fake error messages displayed to victims, e.g., "This application cannot be run in your OS."
MITRE ATT&CK Mapping
T1219 (Remote Access Software)
NetSupport Manager.
T1497 (Virtualization/Sandbox Evasion) Execution limit checks.
T1059.007 (Command and Scripting Interpreter: JavaScript) Malicious loaders.
Threat Track 2: CVE-2023-23397 (Outlook NTLM Leak)
CVE Profile
CVE-2023-23397 (CVSS 9.8).
CISA KEV Status
ACTIVE (Added: 2023-03-14).
Mechanism
Exploits Extended MAPI properties in Outlook. An attacker sends a message/task with a custom reminder sound set to a UNC path (e.g., \\AttackerIP\share).
Impact
When Outlook processes the reminder (even in the background), it attempts to authenticate to the attacker's SMB share, leaking the user's Net-NTLMv2 hash. This allows for offline cracking or NTLM relay attacks.
Live Evidence Extraction (Anchor Protocol)
Stan Ghouls String Literal
"Urinishlar chegarasidan oshildi" (Translation: Attempt limit reached).
Stan Ghouls C2
hgame33[.]com:443.
CVE-2023-23397 UNC Path \\213.32.252[.]221\silence.
CVE-2023-23397 UNC Path
\\5.199.162[.]132\SCW.
CVE-2023-23397 Attacker IP
113.160.234[.]229.
Remediation - THE ENTERPRISE TRACK (SANS PICERL)
Phase 1: Identification & Containment
Hunt for CVE-2023-23397
Use the Microsoft script (CVE-2023-23397.ps1) to scan Exchange/Outlook items for UNC paths in the PidLidReminderFileParameter property.
Firewall Block
Immediate block of outbound TCP/445 (SMB) to the internet.
Hunt for Stan Ghouls
Search for client32.ini files in non-standard directories (e.g., %APPDATA%, %TEMP%).
Query process logs for client32.exe execution without approved change management tickets.
Network Isolation
Isolate hosts communicating with hgame33[.]com or the IP 5.199.162[.]132.
Phase 2: Eradication
Patching
Ensure Microsoft Outlook is patched against CVE-2023-23397. This vulnerability bypasses traditional Outlook security zones if unpatched.
Removal
Delete identified malicious Tasks/Emails. Remove unauthorized NetSupport installations and associated registry run keys.
Phase 3: Recovery
Credential Reset
MANDATORY password reset for any user identified with a triggered CVE-2023-23397 IOC, as their NTLM hash is compromised.
Validation
Verify outbound SMB is blocked at the perimeter firewall.
Phase 4: Lessons Learned
Policy Update
Disallow NTLM authentication where possible (move to Kerberos). Implement legitimate remote access software allowlisting (application control).
Remediation - THE HOME USER TRACK
Priority 1: Safety
Update Immediately
Run Windows Update to ensure Microsoft Outlook is patched. This vulnerability requires no user interaction to trigger.
Disconnect
If you suspect infection (e.g., fake error messages), disconnect from the internet immediately.
Priority 2: Identity
Scan for RATs
Use a reputable anti-malware solution to scan for "NetSupport" or "RAT" signatures.
Password Reset
If you use Outlook, change your Windows/Email password immediately, as it may have been intercepted.
Priority 3: Persistence
Check Startup Items
Open Task Manager (Ctrl+Shift+Esc) > Startup apps. Disable and investigate any unknown entries, especially those named "Client32" or referencing random .bat files.
Hardening & References
Baseline
CIS Benchmark for Microsoft Outlook (Disable NTLM authentication for remote servers).
Framework
NIST SP 800-61r2 (Incident Handling Guide).
Tactical
Block outbound SMB (Port 445) at the perimeter firewall. This kills the NTLM exfiltration vector for CVE-2023-23397.
Reference
Original Research (Kaspersky)