MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 63d71439ce3193d8dc6b3ebaaee3ddd9e2b6c81b033c96c662c0d6aa0e70f67c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 15


Intelligence 15 IOCs 1 YARA 28 File information Comments

SHA256 hash: 63d71439ce3193d8dc6b3ebaaee3ddd9e2b6c81b033c96c662c0d6aa0e70f67c
SHA3-384 hash: 8050618e4198caf3e4cb419227e3f06836708ef13368cd2a5ea9101b4c8ab3c4ecfe231f8d485f0183ac911aaa2505dc
SHA1 hash: a2cbada70f8322b1f065adcd0a5425d80323d192
MD5 hash: 0e3bf3f2526d5c3947a1fcca03ad1254
humanhash: crazy-lion-uranus-colorado
File name:0E3BF3F2526D5C3947A1FCCA03AD1254.exe
Download: download sample
Signature NetSupport
File size:13'038'029 bytes
First seen:2025-05-24 14:15:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 8afb7dbddc4d76a6ff1b5559b62d7325 (3 x NetSupport, 2 x AsyncRAT)
ssdeep 196608:RrkCDFxgtiWe4/RSgOqTn9nBIzuZrSW+xHGoFlaSDKVH4dY7pe539Qko2I:teiYRNXnDZrSF8oFHuB9pc39Q52I
Threatray 934 similar samples on MalwareBazaar
TLSH T1E2D6C030B38ACA37DC8601B0993DAB9F913D7A79076190CB72D86D6D1C716D22B35B63
TrID 36.8% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
21.6% (.EXE) InstallShield setup (43053/19/16)
15.7% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
8.3% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
5.2% (.EXE) Win64 Executable (generic) (10522/11/4)
Magika pebin
dhash icon 68f4c854d4ccd46d (1 x CoinMiner, 1 x NetSupport)
Reporter abuse_ch
Tags:101-99-91-21 exe NetSupport


Avatar
abuse_ch
NetSupport C2:
101.99.91.21:1488

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
101.99.91.21:1488 https://threatfox.abuse.ch/ioc/1533480/

Intelligence


File Origin
# of uploads :
1
# of downloads :
577
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
netsupport
ID:
1
File name:
0E3BF3F2526D5C3947A1FCCA03AD1254.exe
Verdict:
Malicious activity
Analysis date:
2025-05-24 14:16:38 UTC
Tags:
netsupport remote rmm-tool auto-reg tool

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
vmdetect netsup madi
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
Connection attempt to an infection source
Sending an HTTP GET request to an infection source
Searching for the window
Creating a file in the %AppData% subdirectories
Running batch commands
Launching a process
Creating a process from a recently created file
Creating a process with a hidden window
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context anti-debug aspnet_compiler bash cmd dotnet evasive expand expired-cert fingerprint lolbin lolbin microsoft_visual_cc overlay overlay packed packed packer_detected strictor
Malware family:
NetSupport Ltd
Verdict:
Suspicious
Result
Threat name:
NetSupport RAT
Detection:
malicious
Classification:
rans.troj.evad
Score:
92 / 100
Signature
Contains functionality to detect sleep reduction / modifications
Contains functionality to prevent local Windows debugging
Contains functionalty to change the wallpaper
Creates an autostart registry key pointing to binary in C:\Windows
Found evasive API chain (may stop execution after checking computer name)
Joe Sandbox ML detected suspicious sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Uses known network protocols on non-standard ports
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1698462 Sample: GCTJ6ISmU5.exe Startdate: 24/05/2025 Architecture: WINDOWS Score: 92 42 pki-goog.l.google.com 2->42 44 geo.netsupportsoftware.com 2->44 46 c.pki.goog 2->46 52 Suricata IDS alerts for network traffic 2->52 54 Multi AV Scanner detection for dropped file 2->54 56 Multi AV Scanner detection for submitted file 2->56 58 2 other signatures 2->58 8 GCTJ6ISmU5.exe 1 16 2->8         started        12 explorer.exe 2->12         started        14 explorer.exe 2->14         started        16 3 other processes 2->16 signatures3 process4 file5 34 C:\Users\user\AppData\...\remcmdstub.exe, PE32 8->34 dropped 36 C:\Users\user\AppData\Roaming\...\pcicapi.dll, PE32 8->36 dropped 38 C:\Users\user\AppData\...\msvcr100.dll, PE32 8->38 dropped 40 6 other files (3 malicious) 8->40 dropped 66 Creates an autostart registry key pointing to binary in C:\Windows 8->66 68 Contains functionality to prevent local Windows debugging 8->68 18 cmd.exe 1 8->18         started        20 conhost.exe 8->20         started        22 client32.exe 17 12->22         started        26 client32.exe 14->26         started        28 client32.exe 16->28         started        signatures6 process7 dnsIp8 30 explorer.exe 1 18->30         started        32 conhost.exe 18->32         started        48 101.99.91.21, 1488, 49692 SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY Malaysia 22->48 50 geo.netsupportsoftware.com 104.26.1.231, 49693, 80 CLOUDFLARENETUS United States 22->50 60 Contains functionalty to change the wallpaper 22->60 62 Found evasive API chain (may stop execution after checking computer name) 22->62 64 Contains functionality to detect sleep reduction / modifications 22->64 signatures9 process10
Threat name:
Win32.Trojan.Egairtigado
Status:
Malicious
First seen:
2025-05-21 04:11:10 UTC
File Type:
PE (Exe)
Extracted files:
60
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
netsupport
Score:
  10/10
Tags:
family:netsupport discovery persistence rat
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
System Location Discovery: System Language Discovery
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
NetSupport
Netsupport family
Unpacked files
SH256 hash:
8fcffc98c2566c32d3518c114078762045748576440ade701ffb0bcb34d126ae
MD5 hash:
5f3c65d74f691114a5c44890ac15a790
SHA1 hash:
d1d8dbe3d0ee0464702f2ed138c993328ec4927a
SH256 hash:
281ea4f1a38ae4e178cbd0df8f21b0f4aa011592ca13bede30f93359b4c3d9dd
MD5 hash:
91fd9fd2e83e23cae10ae9117abd7556
SHA1 hash:
2dfa06c3ac331db2fa4bb02851f8e2df74d768a5
SH256 hash:
308078090393096e63a12d563b2614a899efcaceaca7d5abfac2ae94d2fd9a7d
MD5 hash:
6ad896de18629121e4e53e86930bae29
SHA1 hash:
1c616250ef8d4b7e25035e3680189bc8284b5327
SH256 hash:
3194d2d3ad79b458113f532749e1917a45935bbf20f5ecb7e192098c749272c4
MD5 hash:
f65b7dd01c33d99a4bd756724bbc5c1a
SHA1 hash:
dae1b7ac6ec8caebe5ebfc5d200254550e36e2cf
SH256 hash:
06c570de1689a3cc9e136ceee82184dfc342f6f62cdd7ce66f8d711ef8500de0
MD5 hash:
18c08e221f672f581b6290ddaae96134
SHA1 hash:
8bd907f142e595a2daf8212feb7e3e099f30d1f8
SH256 hash:
fd100b20ea63d855227469d5110d9c6cbc2ffa10774898d0b14d8ff2b330d121
MD5 hash:
6cd76dace140e78a3d642b433e88890f
SHA1 hash:
29139a7124c2bf9bf560b75224619cb9bed6026a
SH256 hash:
8e1b3676a32ef7d5bcad1c69a1418c493d1f7b2fa5b99175d108b4733d4a66da
MD5 hash:
c7de0d7058755e44acf52251d56b2b14
SHA1 hash:
f0c8f9cee2b9fa1674b43b0b05083a424865acf2
SH256 hash:
fc9123a246644a319fd8bbcbbd68231795ed84b98e40e4f6491649054d57de07
MD5 hash:
12ec7b4e4bdfe8240b9246d117fd3788
SHA1 hash:
0f00c05849c15d1448024819aa8f833c41c176c9
SH256 hash:
7104223f48289e0123284bbf5441e2aeb050e4c39b841ea8d5a0979bf0abd8bc
MD5 hash:
0b25945de1744752361dbe4d09efd81f
SHA1 hash:
81e3093c6e7bd3c18ce7917cde523d0e2ec0d88d
SH256 hash:
5754e4f956a42d36ba28fa8ecf9c02d00d38780ca5e6fa81651c25988c754c8a
MD5 hash:
d89c7b7cc5d59f5cf2d461ac6c47d1ba
SHA1 hash:
770ad6b3149956716a4a18500895fa4babc51baa
SH256 hash:
d26ad1c164713eb302bfbd032d311f58023ca49f9ccfb1e840273406931c7c28
MD5 hash:
efb1243561240af56bae5bd82549d828
SHA1 hash:
2ce697878ed515f3dc81c192428a83b4b95f9556
SH256 hash:
764a5acfb8c35385f0fee58cec8fbec09ae2aca8ce038a043f3af9cf617bc153
MD5 hash:
1770693b7cba83bad703398d9c069499
SHA1 hash:
2ce90b940e400bc1d21ebe186f6eb00e300ead47
SH256 hash:
983671d738672572c839e03247fab4323d27b1beea9b2a8a4a86963974120317
MD5 hash:
dd5e7246af495fd7b8c59b2291a29e2d
SHA1 hash:
d556f69d7af2baaff53f9b45d112d1d08ffcb1da
SH256 hash:
a5256f2eacf86756d19deaf28d62365133eabc4362776d962d935e4d5d65f01e
MD5 hash:
832e659faf8fbc91d4179d2b859459d7
SHA1 hash:
9bbe2622b5158526c9b2b320ad08f43dcc3c42af
SH256 hash:
3d8e92fda2d2360b29a35702a6cd6241e40596235479f241428ffd003395b16b
MD5 hash:
51da8ce4b679abdd914e0c530acfa094
SHA1 hash:
1a61dba8915b90f49b38e882f2ebe5a7204f7161
SH256 hash:
549388d88eb2da48fac599d4d7b69154caae2aa69bbf998b13f5619ca2984dc5
MD5 hash:
ad16e865e4224b7a5a68185d5e9f4a03
SHA1 hash:
7d7db77c630c06ee7af7425e1740c69c6431c6a3
SH256 hash:
6401280c29b24002db30235f101792288f81bb87df5ff31cb825c9414d97338a
MD5 hash:
21340070388ccbdcb380f5e5097fc222
SHA1 hash:
3b50c68b8e690720e455e279922741fe9965c93e
SH256 hash:
9f683ee3e57082409f6e94d5384d7a9b07f78b84aa514f0463e226789b115d6d
MD5 hash:
a87972d52df945c3c714c537a63b1fa1
SHA1 hash:
edbcc362f11b75f887fe79b3552396c3466e785e
SH256 hash:
f556d9f3134a915613f4c29b7adadb7979eb7811816f95f84450a00bbe79a810
MD5 hash:
b4fcf398f93841e9ab2f3723e0e67ad2
SHA1 hash:
3bdc5975ad4bbc03c8a75d370a3c5d61598f775b
SH256 hash:
63d71439ce3193d8dc6b3ebaaee3ddd9e2b6c81b033c96c662c0d6aa0e70f67c
MD5 hash:
0e3bf3f2526d5c3947a1fcca03ad1254
SHA1 hash:
a2cbada70f8322b1f065adcd0a5425d80323d192
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:adonunix2
Author:Tim Brown @timb_machine
Description:AD on UNIX
Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__MemoryWorkingSet
Author:Fernando Mercês
Description:Anti-debug process memory working set size check
Reference:http://www.gironsec.com/blog/2015/06/anti-debugger-trick-quicky/
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:Jupyter_infostealer
Author:CD_R0M_
Description:Rule for Jupyter Infostealer/Solarmarker malware from september 2021-December 2022
Rule name:Lumma_Stealer_Detection
Author:ashizZz
Description:Detects a specific Lumma Stealer malware sample using unique strings and behaviors
Reference:https://seanthegeek.net/posts/compromized-store-spread-lumma-stealer-using-fake-captcha/
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:NETDLLMicrosoft
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_detect_tls_callbacks
Rule name:reverse_http
Author:CD_R0M_
Description:Identify strings with http reversed (ptth)
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:test_Malaysia
Author:rectifyq
Description:Detects file containing malaysia string
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:win32_dotnet_form_obfuscate
Author:Reedus0
Description:Rule for detecting .NET form obfuscate malware
Rule name:win_rat_generic
Author:Reedus0
Description:Rule for detecting generic RAT malware

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::GetSidSubAuthorityCount
ADVAPI32.dll::GetSidSubAuthority
ADVAPI32.dll::RevertToSelf
COM_BASE_APICan Download & Execute componentsole32.dll::CLSIDFromProgID
ole32.dll::CreateStreamOnHGlobal
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::GetTokenInformation
ADVAPI32.dll::SetKernelObjectSecurity
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
KERNEL32.dll::OpenProcess
ADVAPI32.dll::OpenProcessToken
ADVAPI32.dll::OpenThreadToken
ADVAPI32.dll::SetThreadToken
KERNEL32.dll::VirtualAllocExNuma
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::GetActiveProcessorGroupCount
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetSystemInfo
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::SetConsoleCtrlHandler
KERNEL32.dll::GetConsoleOutputCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::CreateFileA
KERNEL32.dll::CreateFileMappingW
KERNEL32.dll::CreateFileMappingA
KERNEL32.dll::RemoveDirectoryW
WIN_BASE_USER_APIRetrieves Account InformationADVAPI32.dll::LookupPrivilegeValueW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegGetValueW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW

Comments