NetHelp Infostealer

Description

(Recorded Future) The NetHelp payload was only designed to work as a service (a persistence method established by the audio dropper of matching bitness). The payload dynamically links APIs at runtime via GetProcAddress and LoadLibrary.

The implant simultaneously relied on two methods of communication: creating a separate thread with an open socket to the server on port 80, as well as issuing POST requests to the C2 server with the specific User-Agent.

Names

Name
NetHelp Infostealer
NetHelp Striker

Category

Malware

Type

  • Backdoor
  • Info stealer

Information

Other Information

Uuid

7db71641-766e-4bfb-90a8-2b7626e526e7

Last Card Change

2020-04-20