MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6b11ce7c0306afb09c81991aa88969f585e0a53bb6249346395c55970b85ae31. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 3


Intelligence 3 IOCs YARA 1 File information Comments

SHA256 hash: 6b11ce7c0306afb09c81991aa88969f585e0a53bb6249346395c55970b85ae31
SHA3-384 hash: f8f82375a2032880c0581967818a91e3761471357c1b0ac675329586cc482821ade505d4ef15e2521577302b05798b80
SHA1 hash: 2e1945b198efa5a48fbe451e33a350e726e01cf5
MD5 hash: 3910fd66e7a8df6b635662838092c2bd
humanhash: spring-cat-romeo-queen
File name:Install%20Updater%20(V105.215.8412_silent).url
Download: download sample
Signature NetSupport
File size:152 bytes
First seen:2023-07-24 17:40:18 UTC
Last seen:Never
File type:
MIME type:text/plain
ssdeep 3:HRAbABGQYmqSsbIHtzKEgDgFFHvUo1YSo/QJ5FLvyYesbBSn:HRYFVmqSsbw1fSgnPISoIJ5FLvyYesbw
TLSH T116C08C60863EC0BC89A3162CC80A8C6DEA825042227AD9B143E12A8AF8530A54F8CDA5
TrID 91.6% (.URL) Windows URL shortcut (11000/1/2)
8.3% (.INI) Generic INI configuration (1000/1)
Reporter rmceoin
Tags:FakeSG NetSupport url


Avatar
rmceoin
Infection chain
compromised site
-->
google-analytiks.com/sBY76j
-->
esteticalocarno.com/wp-content/uploads/2023/02/Install%20Updater%20(V105.215.8412_silent).url
-->
http://185.252.179.64:80/Downloads/shdeulerinstall.lnk
-->
www.esteticalocarno.com/wp-content/uploads/2018/04/HHYGASDBBBX.hta
-->
NetSupport GatewayAddress conluase62.com:5051

Intelligence


File Origin
# of uploads :
1
# of downloads :
113
Origin country :
US US
Vendor Threat Intelligence
Gathering data
Result
Verdict:
MALICIOUS
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Methodology_Contains_Shortcut_OtherURIhandlers
Author:@itsreallynick (Nick Carr)
Description:Detects possible shortcut usage for .URL persistence
Reference:https://twitter.com/cglyer/status/1176184798248919044

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via drive-by

Comments