MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 221c9baeadb9db299900f69c50fb086bd65d3079c59a7d2e09d6a4cb9cab87aa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 221c9baeadb9db299900f69c50fb086bd65d3079c59a7d2e09d6a4cb9cab87aa
SHA3-384 hash: c521858edfacf568e7e1533c02865cf7c9f52942c368c9a1f6366d473b09190812aafff3ae54889c8afe17d12e7a5486
SHA1 hash: bc1894ef2a79368d8db303354d49c21cc7b20cc8
MD5 hash: 4890239e749f98c54fb1bcbddc46f00f
humanhash: victor-eight-solar-oxygen
File name:readme.ps1
Download: download sample
Signature NetSupport
File size:3'296 bytes
First seen:2023-06-14 08:48:00 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 48:/jpR02qj5dR1KSF4FhPEuPXbJ4PJSE8vIPqN9WWOOsYeM366n4+RAVEgYJc4cJe:deP5oKmEgIPqN9W7OsYeS6UsVEgSJ
Threatray 253 similar samples on MalwareBazaar
TLSH T1FE611A935F49A295C3B3FFE2C9C668C8647C964B80AF30A052DC914D79A41E967CF111
Reporter JAMESWT_WT
Tags:NetSupport norominis1-com norominis2-com ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
163
Origin country :
IT IT
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm anti-vm cmd.exe control.exe cscript.exe evasive explorer.exe fingerprint greyware hacktool keylogger lolbin lolbin packed shdocvw.dll shell32.dll wscript.exe
Result
Verdict:
UNKNOWN
Result
Threat name:
NetSupport RAT
Detection:
malicious
Classification:
troj.evad
Score:
68 / 100
Signature
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Powershell drops PE file
Sigma detected: Powershell drops NetSupport RAT client
Behaviour
Behavior Graph:
Result
Malware family:
netsupport
Score:
  10/10
Tags:
family:netsupport persistence rat
Behaviour
Download via BitsAdmin
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
NetSupport
Malware Config
Dropper Extraction:
http://navitainer.net/4th.zip
http://YOUR.LINK/files/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments