MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 64339638d9234ab1efe25fe180b3097a6614687c8f83b1cc0c5a1dde570aaf81. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 64339638d9234ab1efe25fe180b3097a6614687c8f83b1cc0c5a1dde570aaf81
SHA3-384 hash: 22f6a970f823ed649dcf7a2bd2239c2cf0548ba5c806ee741440df0b00a065bad72dcf4fa7b7c6393b3e0786d0fcd5e5
SHA1 hash: 54d8be3eb5bdd4a788dcef3265cab6c314be1ccc
MD5 hash: c80a26b806b3486c6157d8904c2e13e7
humanhash: wisconsin-whiskey-blossom-undress
File name:c80a26b806b3486c6157d8904c2e13e7.js
Download: download sample
Signature NetSupport
File size:1'439 bytes
First seen:2023-05-27 06:46:24 UTC
Last seen:2023-05-27 08:56:53 UTC
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 24:Q7LFycSVa4rfcGfHg+lIKS7q/CbEbrTjarIWwofHg+l8VKS7+F/Q4AFGHwNxZAFJ:QnFrafco3WKS7qa43EMS3eVKS7W/9NHB
TLSH T14B21529815FEE3A7E78232C2B13D8955E8F1A4023288EA691C8DD5976C2185CE61A09F
Reporter abuse_ch
Tags:js NetSupport xoomep1-com xoomep2-com

Intelligence


File Origin
# of uploads :
2
# of downloads :
271
Origin country :
NL NL
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm cmd
Result
Verdict:
UNKNOWN
Result
Threat name:
NetSupport RAT
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
Creates processes via WMI
JScript performs obfuscated calls to suspicious functions
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Powershell drops PE file
Sigma detected: Powershell drops NetSupport RAT client
Snort IDS alert for network traffic
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Uses known network protocols on non-standard ports
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 876686 Sample: zQosf76qDW.js Startdate: 27/05/2023 Architecture: WINDOWS Score: 100 64 Snort IDS alert for network traffic 2->64 66 Multi AV Scanner detection for domain / URL 2->66 68 Antivirus detection for URL or domain 2->68 70 3 other signatures 2->70 8 cmd.exe 1 2->8         started        11 wscript.exe 16 2->11         started        15 cmd.exe 3 2 2->15         started        17 2 other processes 2->17 process3 dnsIp4 76 Suspicious powershell command line found 8->76 78 Bypasses PowerShell execution policy 8->78 19 cmd.exe 1 8->19         started        22 conhost.exe 8->22         started        62 188.227.59.169, 49698, 49699, 80 ITGLOBAL-NL Netherlands 11->62 42 C:\ProgramData\zayavka2.txt, Unicode 11->42 dropped 44 C:\ProgramData\BLD.bat, DOS 11->44 dropped 80 System process connects to network (likely due to code injection or exploit) 11->80 82 JScript performs obfuscated calls to suspicious functions 11->82 84 Creates processes via WMI 11->84 24 notepad.exe 15->24         started        26 conhost.exe 15->26         started        file5 signatures6 process7 signatures8 72 Suspicious powershell command line found 19->72 28 powershell.exe 1 39 19->28         started        31 powershell.exe 14 18 19->31         started        34 conhost.exe 19->34         started        process9 file10 46 C:\Users\user\AppData\...\remcmdstub.exe, PE32 28->46 dropped 48 C:\Users\user\AppData\Roaming\...\pcicapi.dll, PE32 28->48 dropped 50 C:\Users\user\AppData\...\client32.exe, PE32 28->50 dropped 54 7 other files (6 malicious) 28->54 dropped 36 client32.exe 17 28->36         started        40 conhost.exe 28->40         started        52 C:\ProgramData\archive.ps1, ASCII 31->52 dropped 86 Powershell drops PE file 31->86 signatures11 process12 dnsIp13 56 xoomep1.com 80.66.88.143, 1935, 49703 RISS-ASRU Russian Federation 36->56 58 geography.netsupportsoftware.com 62.172.138.67, 49704, 80 BTGB United Kingdom 36->58 60 geo.netsupportsoftware.com 36->60 74 Multi AV Scanner detection for dropped file 36->74 signatures14
Threat name:
Script-JS.Trojan.Netsupp
Status:
Suspicious
First seen:
2023-05-27 06:47:07 UTC
File Type:
Text (JavaScript)
AV detection:
6 of 24 (25.00%)
Threat level:
  5/5
Result
Malware family:
netsupport
Score:
  10/10
Tags:
family:netsupport persistence rat
Behaviour
Modifies registry class
Opens file in notepad (likely ransom note)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in System32 directory
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Blocklisted process makes network request
NetSupport
Process spawned unexpected child process
Malware Config
Dropper Extraction:
http://golden-scalen.com/ngg_cl.zip
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

NetSupport

Java Script (JS) js 64339638d9234ab1efe25fe180b3097a6614687c8f83b1cc0c5a1dde570aaf81

(this sample)

  
Delivery method
Distributed via web download

Comments