MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0cd797b4d57fe925015dff8b00484e1724672353ba9c34f3c93383032f673474. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 7


Intelligence 7 IOCs 1 YARA File information Comments

SHA256 hash: 0cd797b4d57fe925015dff8b00484e1724672353ba9c34f3c93383032f673474
SHA3-384 hash: b6cd44229c10245f46312bf331e48072c14ee313014f341af74f6f656fc5bb2e76ad057e5b9168d6a022b0dde92021f1
SHA1 hash: f2d02cd081628ba38e6e6a0c1ccc207aad81cc68
MD5 hash: 9371f0a40619e8db3f0fd35069c48614
humanhash: north-echo-spring-king
File name:9371F0A40619E8DB3F0FD35069C48614.exe
Download: download sample
Signature NetSupport
File size:1'682'831 bytes
First seen:2021-06-07 05:41:34 UTC
Last seen:2021-06-07 07:18:10 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5a594319a0d69dbc452e748bcf05892e (21 x ParallaxRAT, 20 x Gh0stRAT, 15 x NetSupport)
ssdeep 24576:N4nXubIQGyxbPV0db26gbqKng+vogz2dbFFv0S6dS/01icZOEOR5QvsP:Nqe3f605g+DidXvh6dS/04OOR5QvsP
TLSH 8075CF3FB268A53EC4AA0B3245B39360997BBA61B81B8C1F47F0490DCF664711F3B655
Reporter abuse_ch
Tags:exe NetSupport


Avatar
abuse_ch
NetSupport C2:
5.252.179.50:1203

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
5.252.179.50:1203 https://threatfox.abuse.ch/ioc/72133/

Intelligence


File Origin
# of uploads :
2
# of downloads :
126
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
9371F0A40619E8DB3F0FD35069C48614.exe
Verdict:
No threats detected
Analysis date:
2021-06-07 05:59:30 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
50 / 100
Signature
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for submitted file
Obfuscated command line found
Opens network shares
Performs DNS queries to domains with low reputation
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sigma detected: Logon Scripts (UserInitMprLogonScript)
Uses known network protocols on non-standard ports
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 430295 Sample: 85OpNw6eXm.exe Startdate: 07/06/2021 Architecture: WINDOWS Score: 50 132 110.t.keepitpumpin.io 163.172.204.15, 49772, 49825, 49830 OnlineSASFR United Kingdom 2->132 134 111.t.keepitpumpin.io 212.83.141.61, 49778, 49824, 8080 OnlineSASFR France 2->134 136 7 other IPs or domains 2->136 162 Multi AV Scanner detection for submitted file 2->162 164 Performs DNS queries to domains with low reputation 2->164 166 Uses known network protocols on non-standard ports 2->166 168 Sigma detected: Logon Scripts (UserInitMprLogonScript) 2->168 12 85OpNw6eXm.exe 2 2->12         started        15 msiexec.exe 2->15         started        18 msiexec.exe 2->18         started        21 2 other processes 2->21 signatures3 process4 dnsIp5 102 C:\Users\user\AppData\...\85OpNw6eXm.tmp, PE32 12->102 dropped 23 85OpNw6eXm.tmp 3 23 12->23         started        104 C:\Users\user\AppData\Local\...\shiB911.tmp, PE32 15->104 dropped 106 C:\Users\user\AppData\Local\...\shiB883.tmp, PE32 15->106 dropped 188 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 15->188 190 Opens network shares 15->190 138 pstbbk.com 157.230.96.32, 49764, 80 DIGITALOCEAN-ASNUS United States 18->138 140 collect.installeranalytics.com 54.226.29.2, 443, 49763, 49765 AMAZON-AESUS United States 18->140 108 C:\Users\user\AppData\Local\...\shiD6AB.tmp, PE32 18->108 dropped 110 C:\Users\user\AppData\Local\...\shiD64C.tmp, PE32 18->110 dropped 28 taskkill.exe 18->28         started        142 www.allroadslimit.com 104.21.74.109, 443, 49771, 49775 CLOUDFLARENETUS United States 21->142 144 www.happybrewfriends.com 104.21.84.125, 443, 49780, 49784 CLOUDFLARENETUS United States 21->144 146 2 other IPs or domains 21->146 file6 signatures7 process8 dnsIp9 148 st.priceyam.xyz 172.67.195.252, 49743, 80 CLOUDFLARENETUS United States 23->148 150 www.findmemolite.com 46.101.214.246, 49746, 80 DIGITALOCEAN-ASNUS Netherlands 23->150 152 2 other IPs or domains 23->152 86 C:\Users\user\AppData\Local\...\setup_0.exe, PE32 23->86 dropped 88 C:\Users\user\AppData\Local\...\setup_2.exe, PE32 23->88 dropped 90 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 23->90 dropped 92 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 23->92 dropped 176 Performs DNS queries to domains with low reputation 23->176 30 setup_0.exe 2 23->30         started        33 setup_2.exe 23->33         started        36 conhost.exe 28->36         started        file10 signatures11 process12 dnsIp13 112 C:\Users\user\AppData\Local\...\setup_0.tmp, PE32 30->112 dropped 38 setup_0.tmp 26 20 30->38         started        122 52.23.109.145, 443, 49827 AMAZON-AESUS United States 33->122 124 collect.installeranalytics.com 33->124 114 C:\Users\user\AppData\Roaming\...\decoder.dll, PE32 33->114 dropped 116 C:\Users\user\AppData\...\Windows Updater.exe, PE32 33->116 dropped 118 C:\Users\user\...\AdvancedWindowsManager.exe, PE32+ 33->118 dropped 120 4 other files (none is malicious) 33->120 dropped 42 msiexec.exe 33->42         started        file14 process15 file16 78 C:\Users\user\AppData\...\vdi_compiler.exe, PE32 38->78 dropped 80 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 38->80 dropped 82 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 38->82 dropped 84 4 other files (none is malicious) 38->84 dropped 174 Obfuscated command line found 38->174 44 vdi_compiler.exe 1 38->44         started        47 cmd.exe 1 38->47         started        49 svrwebui.exe 1 18 38->49         started        52 2 other processes 38->52 signatures17 process18 dnsIp19 178 Detected unpacking (changes PE section rights) 44->178 180 Detected unpacking (overwrites its own PE header) 44->180 54 cmd.exe 44->54         started        182 Uses ping.exe to sleep 47->182 184 Uses ping.exe to check the status of other devices and networks 47->184 57 expand.exe 24 47->57         started        60 conhost.exe 47->60         started        126 workttwork.xyz 5.252.179.50, 1203, 49724 MIVOCLOUDMD Moldova Republic of 49->126 128 geography.netsupportsoftware.com 195.171.92.116, 49726, 80 BT-UK-ASBTnetUKRegionalnetworkGB United Kingdom 49->128 130 geo.netsupportsoftware.com 49->130 186 Performs DNS queries to domains with low reputation 49->186 62 iexplore.exe 52->62         started        65 reg.exe 1 1 52->65         started        67 conhost.exe 52->67         started        69 conhost.exe 52->69         started        signatures20 process21 dnsIp22 170 Uses ping.exe to sleep 54->170 71 conhost.exe 54->71         started        73 PING.EXE 54->73         started        94 C:\...\eb48899bd36c6146980b0241e810235f.tmp, PE32 57->94 dropped 96 C:\...\d76246caafc8e841aaf0951c58538cfb.tmp, PE32 57->96 dropped 98 C:\...\bca528b46286604392ef3d16549f1aa5.tmp, PE32 57->98 dropped 100 5 other files (none is malicious) 57->100 dropped 160 onestorepub.xyz 62->160 75 iexplore.exe 62->75         started        172 Creates an undocumented autostart registry key 65->172 file23 signatures24 process25 dnsIp26 154 onestorepub.xyz 195.245.239.250, 49727, 49728, 80 ASBAXETNRU unknown 75->154 156 prda.aadg.msidentity.com 75->156 158 2 other IPs or domains 75->158
Threat name:
Win32.Infostealer.ChePro
Status:
Malicious
First seen:
2021-06-04 01:48:02 UTC
AV detection:
7 of 29 (24.14%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
496996834c890919d7a9a0439cb05aa1981e833de584d3dadc5db9219b6b2e43
MD5 hash:
18921587c00153223ee00222aeee6fff
SHA1 hash:
47a02d8b951f09ee1a3bf9c3432cd01bacf31e68
SH256 hash:
0cd797b4d57fe925015dff8b00484e1724672353ba9c34f3c93383032f673474
MD5 hash:
9371f0a40619e8db3f0fd35069c48614
SHA1 hash:
f2d02cd081628ba38e6e6a0c1ccc207aad81cc68
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments