MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1444e6dec6532f7da647c2bfa82bbbdc7b4957dcba60d343a501101581b4e417. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 3


Intelligence 3 IOCs YARA 20 File information Comments

SHA256 hash: 1444e6dec6532f7da647c2bfa82bbbdc7b4957dcba60d343a501101581b4e417
SHA3-384 hash: 0e0d8e6c91513877ea48dd9c464ac3ee915ebb2b520aec5521d7943c9d45df60154de83231f72884abba4202f7a97c94
SHA1 hash: 5f0dac50d9b96fd400e4fae9944dd40943835557
MD5 hash: 2b08a12c5bebdff3609d12a02efe5eb8
humanhash: pip-leopard-whiskey-island
File name:AltPayload.7z
Download: download sample
Signature NetSupport
File size:1'527'120 bytes
First seen:2026-05-15 05:55:55 UTC
Last seen:Never
File type: 7z
MIME type:application/x-7z-compressed
Note:This file is a password protected archive. The password is: fantombot
ssdeep 24576:wmtx6KAFu4gjuV5rvSnZ3JWrnTWZZt/H2/C4Xxj+dZy:hx6KAlgqV5r6CrTW5voC5y
TLSH T1B0653371C2E610DBE0C54028078CC4F9DD84C887659ABEB0BCD7679DE7B2B7234E9986
TrID 57.1% (.7Z) 7-Zip compressed archive (v0.4) (8000/1)
42.8% (.7Z) 7-Zip compressed archive (gen) (6000/1)
Magika sevenzip
Reporter JAMESWT_WT
Tags:147-45-45-245 7z 95-85-246-222 booking NetSupport

Intelligence


File Origin
# of uploads :
1
# of downloads :
67
Origin country :
IT IT
File Archive Information

This file archive contains 15 file(s), sorted by their relevance:

File name:nskbfltr.inf
File size:328 bytes
SHA256 hash: d96856cd944a9f1587907cacef974c0248b7f4210f1689c1e6bcac5fed289368
MD5 hash: 26e28c01461f7e65c402bdf09923d435
MIME type:application/x-setupscript
Signature NetSupport
File name:HTCTL32.DLL
File size:323'912 bytes
SHA256 hash: 6562585009f15155eea9a489e474cebc4dd2a01a26d846fdd1b93fdc24b0c269
MD5 hash: 051cdb6ac8e168d178e35489b6da4c74
MIME type:application/x-dosexec
Signature NetSupport
File name:TCCTL32.DLL
File size:387'400 bytes
SHA256 hash: 6ffe12cdfe0a36dec4b4a40ecdafb4097b1af7c340b0fcecf9f5c67b7fa8b299
MD5 hash: 1e6e804ca71eaf5bef0abef95c578cf0
MIME type:application/x-dosexec
Signature NetSupport
File name:sysinfo.exe
File size:120'256 bytes
SHA256 hash: 56ebaf8922749b9a9a7fa2575f691c53a6170662a8f747faeed11291d475c422
MD5 hash: 0e660f7e5a6621a9185a7b8080364500
MIME type:application/x-dosexec
Signature NetSupport
File name:NSM.ini
File size:6'099 bytes
SHA256 hash: e0ed36c897eaa5352fab181c20020b60df4c58986193d6aaf5bf3e3ecdc4c05d
MD5 hash: 99f493dce7fab330dc47f0cab8fe6172
MIME type:text/plain
Signature NetSupport
File name:client32.ini
File size:694 bytes
SHA256 hash: 72425cdb44dc5640ffeb38f09958e9e713e6afc4b5db670e08bbe8131e36bbe7
MD5 hash: 4bcbb6776001e8fb7b6aa68c70fb5c95
MIME type:text/plain
Signature NetSupport
File name:AudioCapture.dll
File size:89'416 bytes
SHA256 hash: 2cc8ebea55c06981625397b04575ed0eaad9bb9f9dc896355c011a62febe49b5
MD5 hash: 7629af8099b76f85d37b3802041503ee
MIME type:application/x-dosexec
Signature NetSupport
File name:PCICHEK.DLL
File size:14'664 bytes
SHA256 hash: 0cff893b1e7716d09fb74b7a0313b78a09f3f48c586d31fc5f830bd72ce8331f
MD5 hash: 3aabcd7c81425b3b9327a2bf643251c6
MIME type:application/x-dosexec
Signature NetSupport
File name:msvcr100.dll
File size:773'968 bytes
SHA256 hash: 8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
MD5 hash: 0e37fbfa79d349d672456923ec5fbbe3
MIME type:application/x-dosexec
Signature NetSupport
File name:client32u.ini
File size:696 bytes
SHA256 hash: 4016c569d0520a51da65e735881ed842cfada13d85a8d9926bbe2dde393e12b9
MD5 hash: 1b8b16f7b7a63416a3f8a3be96057e12
MIME type:text/plain
Signature NetSupport
File name:pcicapi.dll
File size:108'944 bytes
SHA256 hash: 2dfdc169dfc27462adc98dde39306de8d0526dcf4577a1a486c2eef447300689
MD5 hash: 67c53a770390e8c038060a1921c20da9
MIME type:application/x-dosexec
Signature NetSupport
File name:PCICL32.DLL
File size:3'710'280 bytes
SHA256 hash: 07a191254362664b3993479a277199f7ea5ee723b6c25803914eedb50250acf4
MD5 hash: ad51946b1659ed61b76ff4e599e36683
MIME type:application/x-dosexec
Signature NetSupport
File name:NSM.LIC
File size:251 bytes
SHA256 hash: e09980d1b1c508eb29d2931ac92f8d0a7e49ca5fe6ab6277fabf097a0b033b63
MD5 hash: 5d7445efa8a5560842c868369127cd79
MIME type:text/plain
Signature NetSupport
File name:nsm_vpro.ini
File size:46 bytes
SHA256 hash: 4bfa4c00414660ba44bddde5216a7f28aeccaa9e2d42df4bbff66db57c60522b
MD5 hash: 3be27483fdcdbf9ebae93234785235e3
MIME type:text/plain
Signature NetSupport
File name:remcmdstub.exe
File size:59'728 bytes
SHA256 hash: b11380f81b0a704e8c7e84e8a37885f5879d12fbece311813a41992b3e9787f2
MD5 hash: 5be6fb8f28544d4f83c25a2b76ff7890
MIME type:application/x-dosexec
Signature NetSupport
Vendor Threat Intelligence
No detections
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
7z Archive SFX 7z
Threat name:
Binary.Trojan.Generic
Status:
Suspicious
First seen:
2026-05-13 05:50:38 UTC
File Type:
Binary (Archive)
AV detection:
3 of 24 (12.50%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Armadillov1xxv2xx
Author:malware-lu
Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__ConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:NetSupport
Author:YungBinary
Description:Detects NetSupport Manager RAT on disk or in memory
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:VECT_Ransomware
Author:Mustafa Bakhit
Description:Detects activity associated with VECT ransomware. This includes registry modifications and deletions, execution of system and defense-evasion commands, suspicious API usage, mutex creation, file and memory manipulation, ransomware note generation, anti-debugging and anti-analysis techniques, and embedded cryptographic constants (SHA256) characteristic of this malware family. Designed for threat intelligence and malware detection environments.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments