MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5c8d532a1142f0396b6c4742b9762dca824a448afa857f8da08c51129187c829. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 5c8d532a1142f0396b6c4742b9762dca824a448afa857f8da08c51129187c829
SHA3-384 hash: ce3ec2a76b7ef2a7e7eb4c512695318bf629e85c4370cc2b23b0ad7197a9f7d48e2970bc9b072b7040df64edaa2725be
SHA1 hash: 6d78a27d95300017e76622c92cceb3d260525082
MD5 hash: 6cd3999044cc8c9ca5957c4ca83bb398
humanhash: delta-colorado-minnesota-neptune
File name:DHL_____TBAR9300026763.js
Download: download sample
Signature NetSupport
File size:12'126'529 bytes
First seen:2023-09-07 16:15:02 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 24576:btzcvlXnwGoD3AQM53F+l8aT4W9aeUP916gGuFeK3mePXGv9kS9Y2tDEbOBGIGxm:r
TLSH T157C640E85B80DC076A8C1D43BF55BFE94172A6639BEC72C782287BCC05E91D385A5CC9
Reporter abuse_ch
Tags:DHL js NetSupport

Intelligence


File Origin
# of uploads :
1
# of downloads :
636
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
masquerade powershell vjworm
Result
Verdict:
MALICIOUS
Result
Threat name:
NetSupport RAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
Contains functionality to modify clipboard data
Delayed program exit found
Found evasive API chain (may stop execution after checking computer name)
Found suspicious powershell code related to unpacking or dynamic code loading
JavaScript source code contains functionality to generate code involving a shell, file or stream
Malicious sample detected (through community Yara rule)
Powershell drops PE file
Sigma detected: Powershell drops NetSupport RAT client
Snort IDS alert for network traffic
Uses known network protocols on non-standard ports
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1305585 Sample: DHL_____TBAR9300026763.js Startdate: 07/09/2023 Architecture: WINDOWS Score: 100 36 falafelgoo1.com 2->36 38 geography.netsupportsoftware.com 2->38 40 geo.netsupportsoftware.com 2->40 50 Snort IDS alert for network traffic 2->50 52 Malicious sample detected (through community Yara rule) 2->52 54 Antivirus detection for URL or domain 2->54 56 4 other signatures 2->56 8 wscript.exe 1 2 2->8         started        12 client32.exe 2->12         started        14 client32.exe 2->14         started        signatures3 process4 file5 34 C:\Users\user\AppData\Roaming\gk5y42t.ps1, ASCII 8->34 dropped 64 Wscript starts Powershell (via cmd or directly) 8->64 66 Bypasses PowerShell execution policy 8->66 68 Windows Scripting host queries suspicious COM object (likely to drop second stage) 8->68 16 powershell.exe 1 29 8->16         started        signatures6 process7 file8 26 C:\Users\user\AppData\...\remcmdstub.exe, PE32 16->26 dropped 28 C:\Users\user\AppData\Roaming\...\pcicl32.dll, PE32 16->28 dropped 30 C:\Users\user\AppData\Roaming\...\pcicapi.dll, PE32 16->30 dropped 32 7 other files (6 malicious) 16->32 dropped 46 Found suspicious powershell code related to unpacking or dynamic code loading 16->46 48 Powershell drops PE file 16->48 20 client32.exe 17 16->20         started        24 conhost.exe 16->24         started        signatures9 process10 dnsIp11 42 falafelgoo1.com 79.137.202.177, 3725, 49759 PSKSET-ASRU Russian Federation 20->42 44 geography.netsupportsoftware.com 51.142.119.24, 49761, 80 MICROSOFT-CORP-MSN-AS-BLOCKUS United Kingdom 20->44 58 Found evasive API chain (may stop execution after checking computer name) 20->58 60 Contains functionality to modify clipboard data 20->60 62 Delayed program exit found 20->62 signatures12
Threat name:
Script-JS.Malware.Vjworm
Status:
Malicious
First seen:
2023-09-07 16:16:07 UTC
File Type:
Text (JavaScript)
AV detection:
3 of 24 (12.50%)
Threat level:
  2/5
Result
Malware family:
netsupport
Score:
  10/10
Tags:
family:netsupport persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
NetSupport
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

NetSupport

Java Script (JS) js 5c8d532a1142f0396b6c4742b9762dca824a448afa857f8da08c51129187c829

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments