MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 07eaa6e88904f46157a5e5e45dd70d6e14d5d06aae7dc17e8a2c440ff403a51e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 8


Intelligence 8 IOCs 2 YARA File information Comments 1

SHA256 hash: 07eaa6e88904f46157a5e5e45dd70d6e14d5d06aae7dc17e8a2c440ff403a51e
SHA3-384 hash: 1573917e569b3b53d5dcce31ac2d476ccc1534c8ac721ed7f6b267bcd04b0d17157e6056cdf672db1676b261e3979889
SHA1 hash: 3fd6debb83d6b9b6240408fecef9946163d5a493
MD5 hash: 7b030fd1473bd9b213a6da3ef3adc19e
humanhash: robin-bravo-blossom-october
File name:7B030FD1473BD9B213A6DA3EF3ADC19E.exe
Download: download sample
Signature NetSupport
File size:2'142'720 bytes
First seen:2021-05-07 20:26:27 UTC
Last seen:2021-05-07 21:01:47 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 530c2a5d4e324018cfaa979ca3d61019 (1 x NetSupport)
ssdeep 24576:lqHY/QnvorgplWSIoi2H2B8bLSUXSatAH5ZdIZpWnygytoMWcy/XByaGERWqSUOo:lqHmweDUO1vxwt8cyOjxHHkb
Threatray 541 similar samples on MalwareBazaar
TLSH FAA57E21B2C2C837D577263C9D5FA3985829BE301D38A44B7FE45E4C1F796813A2E297
Reporter abuse_ch
Tags:coinduck.duckdns.org exe NetSupport


Avatar
abuse_ch
NetSupport C2:
http://92.38.184.216/4dcYcWsw3/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://92.38.184.216/4dcYcWsw3/index.php https://threatfox.abuse.ch/ioc/32788/
62.173.140.217:1337 https://threatfox.abuse.ch/ioc/32789/

Intelligence


File Origin
# of uploads :
3
# of downloads :
146
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Creating a file
Creating a process from a recently created file
Creating a process with a hidden window
Running batch commands
Sending an HTTP GET request
Sending an HTTP POST request
Launching a process
Creating a file in the %temp% directory
Launching the default Windows debugger (dwwin.exe)
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
96 / 100
Signature
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.BunituCrypt
Status:
Malicious
First seen:
2021-05-05 01:37:00 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
netsupport
Score:
  10/10
Tags:
family:amadey family:netsupport rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Loads dropped DLL
Reads local data of messenger clients
Reads user/profile data of web browsers
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
Amadey
NetSupport
Malware Config
C2 Extraction:
92.38.184.216/4dcYcWsw3/index.php
Unpacked files
SH256 hash:
72fd878b019dd3b5b2f05dc63bf3f9921e10808c79a8fe5d0e6a7be1b542c4cf
MD5 hash:
d6fe51ea59f385a3fe127604326fb846
SHA1 hash:
f458395ce3b26a0a12e3af1311ab0fc119536ce9
SH256 hash:
07eaa6e88904f46157a5e5e45dd70d6e14d5d06aae7dc17e8a2c440ff403a51e
MD5 hash:
7b030fd1473bd9b213a6da3ef3adc19e
SHA1 hash:
3fd6debb83d6b9b6240408fecef9946163d5a493
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-07 21:28:19 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0001.025] Anti-Behavioral Analysis::Software Breakpoints
1) [B0001.032] Anti-Behavioral Analysis::Timing/Delay Check GetTickCount
2) [B0009.029] Anti-Behavioral Analysis::Instruction Testing
3) [B0012.001] Anti-Static Analysis::Argument Obfuscation
4) [F0002.002] Collection::Polling
6) [B0030.002] Command and Control::Receive Data
7) [B0030.001] Command and Control::Send Data
8) [C0002.009] Communication Micro-objective::Connect to Server::HTTP Communication
9) [C0002.012] Communication Micro-objective::Create Request::HTTP Communication
10) [C0002.017] Communication Micro-objective::Get Response::HTTP Communication
11) [C0002.005] Communication Micro-objective::Send Data::HTTP Communication
12) [C0002.003] Communication Micro-objective::Send Request::HTTP Communication
13) [C0019] Data Micro-objective::Check String
14) [C0026.001] Data Micro-objective::Base64::Encode Data
15) [C0026.002] Data Micro-objective::XOR::Encode Data
18) [C0047] File System Micro-objective::Delete File
19) [C0051] File System Micro-objective::Read File
20) [C0052] File System Micro-objective::Writes File
21) [E1510] Impact::Clipboard Modification
22) [C0007] Memory Micro-objective::Allocate Memory
23) [C0036.004] Operating System Micro-objective::Create Registry Key::Registry
24) [C0036.003] Operating System Micro-objective::Open Registry Key::Registry
25) [C0036.006] Operating System Micro-objective::Query Registry Value::Registry
26) [C0042] Process Micro-objective::Create Mutex
27) [C0017] Process Micro-objective::Create Process
28) [C0038] Process Micro-objective::Create Thread
29) [C0041] Process Micro-objective::Set Thread Local Storage Value
30) [C0018] Process Micro-objective::Terminate Process