MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 43a3298f210e773fc9a3cb53eaa8c9bace537d5604d6eb95a1304db7b41a8631. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 9


Intelligence 9 IOCs YARA 4 File information Comments

SHA256 hash: 43a3298f210e773fc9a3cb53eaa8c9bace537d5604d6eb95a1304db7b41a8631
SHA3-384 hash: ae93d95ab176d286140a4f6fd9150ac7fcb19d53ffaf68daa2b0dc69c6343c3496b0063db70b4c57ecfcfafb776b6fbf
SHA1 hash: acd04d8cc03d26bcc11c6653e2f2f516648c2403
MD5 hash: 4d66d0a0e05158f174f6bcd9058b07e9
humanhash: carolina-seventeen-bravo-king
File name:SPAM.zip
Download: download sample
Signature NetSupport
File size:22'282 bytes
First seen:2025-12-09 07:59:57 UTC
Last seen:Never
File type: zip
MIME type:application/zip
ssdeep 384:HXoDuqXts6YySzi/urdMvRLPpW4yJeBb316bq5Yp2jwRkrefnzJKSsRkeLS+5NQR:HXKuqXS69Szi/urdMt5lBUeuhJrsRxLS
TLSH T1D5A2E130AB7CD256E75C4AF7F2EB6C4D8FF8402857814289E88CF811164BA9B1126279
Magika zip
Reporter JAMESWT_WT
Tags:bellylok-com client32 ini LIC NetSupport sounard-com zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
127
Origin country :
IT IT
File Archive Information

This file archive contains 3 file(s), sorted by their relevance:

File name:client32.ini
File size:1'067 bytes
SHA256 hash: 5849be8faf98e587749bcc650ca0e776bf5c8d599db994f90f97e56f44300026
MD5 hash: fdec1568dc7a9e6c336aa4ec85695982
MIME type:text/plain
Signature NetSupport
File name:NSM.LIC
File size:253 bytes
SHA256 hash: 83a6feb6304effcd258129e5d46f484e4c34c1cce1ea0c32a94a89283ccd24f9
MD5 hash: 14ca8f4ee0dd828ecfd0c566dce00f06
MIME type:text/plain
Signature NetSupport
File name:client32.exe
File size:120'288 bytes
SHA256 hash: 06a0a243811e9c4738a9d413597659ca8d07b00f640b74adc9cb351c179b3268
MD5 hash: ee75b57b9300aab96530503bfae8a2f2
MIME type:application/x-dosexec
Signature NetSupport
Vendor Threat Intelligence
Verdict:
Malicious
Score:
90.2%
Tags:
injection netsup virus shell
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
expired-cert microsoft_visual_cc overlay packed remoteadmin signed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
inconclusive
YARA:
3 match(es)
Tags:
Executable PDB Path PE (Portable Executable) PE File Layout Zip Archive
Threat name:
Win32.PUA.Netsupportrat
Status:
Malicious
First seen:
2025-12-09 08:00:29 UTC
File Type:
Binary (Archive)
Extracted files:
20
AV detection:
15 of 37 (40.54%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
System Location Discovery: System Language Discovery
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_NetSupportRAT_Config
Author:abuse.ch
Rule name:NetSupport
Author:YungBinary
Description:Detects NetSupport Manager RAT on disk or in memory
Rule name:PE_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments