MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 111d1529eb5320465bc09a12146b321b0f4409372a8b73048b7798904082068c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 8


Intelligence 8 IOCs 1 YARA File information Comments

SHA256 hash: 111d1529eb5320465bc09a12146b321b0f4409372a8b73048b7798904082068c
SHA3-384 hash: e928d9aedb1894649bf1ddc34bb04bb982ac9ed23de02138641fea6ba137db345ebe110da20957be06634ad92354c3eb
SHA1 hash: 4c9fb7f4c8c5a84cf9a4155a5dca7ce2327c2057
MD5 hash: d4592bea4b9264201e62c1a111e0b2eb
humanhash: video-finch-oklahoma-romeo
File name:D4592BEA4B9264201E62C1A111E0B2EB.exe
Download: download sample
Signature NetSupport
File size:1'682'966 bytes
First seen:2021-05-26 16:55:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5a594319a0d69dbc452e748bcf05892e (21 x ParallaxRAT, 20 x Gh0stRAT, 15 x NetSupport)
ssdeep 24576:N4nXubIQGyxbPV0db26ZbqKnmW+vogz2dbFFv0S6dS/01icZOEOR5QvKO:Nqe3f6t5D+DidXvh6dS/04OOR5QvKO
Threatray 24 similar samples on MalwareBazaar
TLSH C275CF3FB268A53EC4AA0B3245B39360997BBA61B81B8C1F47F0490DCF664711F3B655
Reporter abuse_ch
Tags:exe NetSupport


Avatar
abuse_ch
NetSupport C2:
185.230.143.208:1203

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.230.143.208:1203 https://threatfox.abuse.ch/ioc/64464/

Intelligence


File Origin
# of uploads :
1
# of downloads :
101
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
D4592BEA4B9264201E62C1A111E0B2EB.exe
Verdict:
No threats detected
Analysis date:
2021-05-26 22:19:08 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
64 / 100
Signature
Antivirus detection for URL or domain
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Obfuscated command line found
Opens network shares
Performs DNS queries to domains with low reputation
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sigma detected: Logon Scripts (UserInitMprLogonScript)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 425302 Sample: hlqkBT8ait.exe Startdate: 26/05/2021 Architecture: WINDOWS Score: 64 120 pstbbk.com 157.230.96.32 DIGITALOCEAN-ASNUS United States 2->120 122 collect.installeranalytics.com 52.23.109.145 AMAZON-AESUS United States 2->122 124 10 other IPs or domains 2->124 156 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->156 158 Multi AV Scanner detection for domain / URL 2->158 160 Antivirus detection for URL or domain 2->160 162 4 other signatures 2->162 12 hlqkBT8ait.exe 2 2->12         started        15 msiexec.exe 2->15         started        signatures3 process4 file5 100 C:\Users\user\AppData\...\hlqkBT8ait.tmp, PE32 12->100 dropped 18 hlqkBT8ait.tmp 3 24 12->18         started        102 C:\Users\user\AppData\Local\...\shiB89F.tmp, PE32 15->102 dropped 104 C:\Users\user\AppData\Local\...\shiB811.tmp, PE32 15->104 dropped 176 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 15->176 178 Opens network shares 15->178 signatures6 process7 dnsIp8 126 distribute.takemyfile.net 213.227.154.163, 49720, 80 LEASEWEB-NL-AMS-01NetherlandsNL Netherlands 18->126 128 st.priceyam.xyz 104.21.21.21, 49718, 80 CLOUDFLARENETUS United States 18->128 130 4 other IPs or domains 18->130 72 C:\Users\user\AppData\Local\...\setup_3.exe, PE32 18->72 dropped 74 C:\Users\user\AppData\Local\...\setup_2.exe, PE32 18->74 dropped 76 C:\Users\user\AppData\Local\...\setup_0.exe, PE32 18->76 dropped 78 2 other files (none is malicious) 18->78 dropped 164 Performs DNS queries to domains with low reputation 18->164 23 setup_0.exe 2 18->23         started        26 setup_2.exe 18->26         started        28 setup_3.exe 18->28         started        file9 signatures10 process11 file12 88 C:\Users\user\AppData\Local\...\setup_0.tmp, PE32 23->88 dropped 30 setup_0.tmp 26 24 23->30         started        90 C:\Users\user\AppData\Local\...\setup_2.tmp, PE32 26->90 dropped 34 setup_2.tmp 26->34         started        92 C:\Users\user\AppData\Roaming\...\decoder.dll, PE32 28->92 dropped 94 C:\Users\user\AppData\...\Windows Updater.exe, PE32 28->94 dropped 96 C:\Users\user\...\AdvancedWindowsManager.exe, PE32+ 28->96 dropped 98 4 other files (none is malicious) 28->98 dropped process13 file14 106 C:\Users\user\AppData\...\vdi_compiler.exe, PE32 30->106 dropped 108 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 30->108 dropped 110 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 30->110 dropped 118 8 other files (none is malicious) 30->118 dropped 180 Obfuscated command line found 30->180 36 vdi_compiler.exe 1 30->36         started        39 cmd.exe 1 30->39         started        41 cmd.exe 2 13 30->41         started        46 2 other processes 30->46 112 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 34->112 dropped 114 C:\Program Files (x86)\...\is-JSK7Q.tmp, PE32 34->114 dropped 116 C:\Program Files (x86)\...\is-IHMA4.tmp, PE32 34->116 dropped 43 takemyfile.exe 34->43         started        signatures15 process16 dnsIp17 166 Detected unpacking (changes PE section rights) 36->166 168 Detected unpacking (overwrites its own PE header) 36->168 48 cmd.exe 36->48         started        170 Uses ping.exe to sleep 39->170 172 Uses ping.exe to check the status of other devices and networks 39->172 51 expand.exe 24 39->51         started        54 conhost.exe 39->54         started        56 iexplore.exe 41->56         started        59 conhost.exe 41->59         started        140 rep.pe-wok.biz 43->140 142 distribute.takemyfile.net 43->142 144 d3vzyycpfbk7qm.cloudfront.net 13.224.194.152 AMAZON-02US United States 43->144 174 Tries to harvest and steal browser information (history, passwords, etc) 43->174 146 185.230.143.208, 1203, 49705 HostingvpsvilleruRU Russian Federation 46->146 148 geography.netsupportsoftware.com 195.171.92.116, 49708, 80 BT-UK-ASBTnetUKRegionalnetworkGB United Kingdom 46->148 150 geo.netsupportsoftware.com 46->150 61 reg.exe 1 1 46->61         started        63 conhost.exe 46->63         started        signatures18 process19 dnsIp20 152 Uses ping.exe to sleep 48->152 65 conhost.exe 48->65         started        67 PING.EXE 48->67         started        80 C:\...\d92d304da9cd0e4cb46da653a0da5439.tmp, PE32 51->80 dropped 82 C:\...\a0a172f0930e5147a0535ebde791846c.tmp, PE32 51->82 dropped 84 C:\...\8a17eef09f11de45a357505c4a9f372d.tmp, PE32 51->84 dropped 86 5 other files (none is malicious) 51->86 dropped 138 rndmclothes.xyz 56->138 69 iexplore.exe 56->69         started        154 Creates an undocumented autostart registry key 61->154 file21 signatures22 process23 dnsIp24 132 rndmclothes.xyz 136.243.129.185, 49706, 49707, 80 HETZNER-ASDE Germany 69->132 134 prda.aadg.msidentity.com 69->134 136 2 other IPs or domains 69->136
Threat name:
Win32.Infostealer.ChePro
Status:
Malicious
First seen:
2021-05-23 02:41:15 UTC
AV detection:
6 of 29 (20.69%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Loads dropped DLL
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments