MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6fe99e1ad9f91735ffecf032c4bc4f57a16a21f104a34442381b23b259fd9c9c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 10


Intelligence 10 IOCs 1 YARA File information Comments

SHA256 hash: 6fe99e1ad9f91735ffecf032c4bc4f57a16a21f104a34442381b23b259fd9c9c
SHA3-384 hash: 9a110ca6a608f86f7e2c069ba670863f9b5a6c81f32a66f153928ef5102720daad4bd83fd9fe28fcf6f0d91b91a0656b
SHA1 hash: cdad65b7feebba5424833a18caddf1637f9144d3
MD5 hash: bee80f46b4e751c29c4d329150245cb3
humanhash: ack-pluto-robert-black
File name:6FE99E1AD9F91735FFECF032C4BC4F57A16A21F104A34.exe
Download: download sample
Signature NetSupport
File size:4'356'920 bytes
First seen:2022-04-03 00:10:46 UTC
Last seen:2022-04-03 00:56:18 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5a594319a0d69dbc452e748bcf05892e (21 x ParallaxRAT, 20 x Gh0stRAT, 15 x NetSupport)
ssdeep 98304:kSirmeIqavWz5SBCOrpRwN3Y/7UBTNFgK0vfjnr5:cUZrrIK/7URNW3jt
Threatray 323 similar samples on MalwareBazaar
TLSH T10916023BB268613ED56E0B3245738360587BBE65A81A8C1F07F0790DCF365612F3BA56
File icon (PE):PE icon
dhash icon 00001a8e0f0b0008 (1 x NetSupport)
Reporter abuse_ch
Tags:exe NetSupport


Avatar
abuse_ch
NetSupport C2:
95.217.40.216:1488

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
95.217.40.216:1488 https://threatfox.abuse.ch/ioc/487372/

Intelligence


File Origin
# of uploads :
2
# of downloads :
269
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
netsupport
ID:
1
File name:
6fe99e1ad9f91735ffecf032c4bc4f57a16a21f104a34442381b23b259fd9c9c.zip
Verdict:
Malicious activity
Analysis date:
2022-04-03 08:02:42 UTC
Tags:
unwanted netsupport

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckNumberOfProcessor
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control.exe expand.exe overlay packed setupapi.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
troj.evad
Score:
34 / 100
Signature
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Obfuscated command line found
Uses dynamic DNS services
Uses known network protocols on non-standard ports
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.ChePro
Status:
Malicious
First seen:
2022-02-08 18:37:33 UTC
AV detection:
11 of 26 (42.31%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
066c50c2a3a774d6a6275e206a1d9ace2429febb9ae2b86c7e25f07d057fa7ad
MD5 hash:
c200fa15186e226f244de77eb4d7862e
SHA1 hash:
b1b227b79d35d1c1c76b9f4a3579e69e09c3198f
SH256 hash:
6fe99e1ad9f91735ffecf032c4bc4f57a16a21f104a34442381b23b259fd9c9c
MD5 hash:
bee80f46b4e751c29c4d329150245cb3
SHA1 hash:
cdad65b7feebba5424833a18caddf1637f9144d3
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments