MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 56ebaf8922749b9a9a7fa2575f691c53a6170662a8f747faeed11291d475c422. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 9


Intelligence 9 IOCs YARA 2 File information Comments

SHA256 hash: 56ebaf8922749b9a9a7fa2575f691c53a6170662a8f747faeed11291d475c422
SHA3-384 hash: 7be80c666ed940c5d54dbf520fa35076c5a56e141c44ff1c4654996e27ead75b31bd319b4c9fccbf79cbfd20b5acd3bd
SHA1 hash: 3b7b47b6260ab67c120a13a9c207efa91ebb7ace
MD5 hash: 0e660f7e5a6621a9185a7b8080364500
humanhash: social-jersey-earth-xray
File name:Service.exe
Download: download sample
Signature NetSupport
File size:120'256 bytes
First seen:2026-03-15 00:07:54 UTC
Last seen:2026-03-16 02:45:53 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash a9d50692e95b79723f3e76fcf70d023e (12 x NetSupport)
ssdeep 768:NEVZl6FhWr80/0KEvr2bhuRLKzCKZikEr2bhugkKzCKZikW:NG0hG8KEj2hu1vN2hubvN
TLSH T1E4C3B40F4699E173EA42E97DC8809B050C64BEC9B5F458FB005EF63E3E3178E2B6415A
TrID 21.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
21.2% (.EXE) Win64 Executable (generic) (6522/11/2)
16.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
14.6% (.EXE) Win32 Executable (generic) (4504/4/1)
6.6% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter Lenard
Tags:Falsepositive NetSupport signed

Code Signing Certificate

Organisation:NETSUPPORT LTD.
Issuer:GlobalSign GCC R45 EV CodeSigning CA 2020
Algorithm:sha256WithRSAEncryption
Valid from:2025-05-29T15:13:17Z
Valid to:2028-07-17T13:01:15Z
Serial number: 21e317fd888c9704e61de9b0
Thumbprint Algorithm:SHA256
Thumbprint: 84118e100bbc2719d149f06e6cc0753dddd0c6082eb7a49891c1de7aa6db1e14
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
105
Origin country :
US US
Vendor Threat Intelligence
No detections
Malware family:
netsupport
ID:
1
File name:
_340e5d67e5cd7587c28fe69773466c5b56760baeb049e024f2266e2458d7c1ae.txt
Verdict:
Malicious activity
Analysis date:
2026-03-02 14:09:36 UTC
Tags:
auto netsupport rat rmm-tool remote tool

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
injection netsup obfusc virus
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
microsoft_visual_cc netsupport packed remoteadmin signed virus
Verdict:
Adware
File Type:
exe x32
First seen:
2025-07-23T14:20:00Z UTC
Last seen:
2026-02-13T17:38:00Z UTC
Hits:
~100000
Gathering data
Result
Malware family:
n/a
Score:
  3/10
Tags:
discovery
Behaviour
System Location Discovery: System Language Discovery
Unpacked files
SH256 hash:
56ebaf8922749b9a9a7fa2575f691c53a6170662a8f747faeed11291d475c422
MD5 hash:
0e660f7e5a6621a9185a7b8080364500
SHA1 hash:
3b7b47b6260ab67c120a13a9c207efa91ebb7ace
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NetSupport
Author:YungBinary
Description:Detects NetSupport Manager RAT on disk or in memory
Rule name:PE_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments