MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 84172e09798be8252fb18887e9cd29e47279df9641ab50185a6eea50f4c02fef. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 8


Intelligence 8 IOCs YARA 5 File information Comments

SHA256 hash: 84172e09798be8252fb18887e9cd29e47279df9641ab50185a6eea50f4c02fef
SHA3-384 hash: 7ff14e9b6f821a359426327cee45cd52642dbba4716b8680ab05ca33feeeec8d4fcc918a394089ecfbd6311fa5487582
SHA1 hash: d9ccf012e7d06de46415f4d6152451842c1bdd9f
MD5 hash: fcfd7e25e415f1d9ee598ab41ca31840
humanhash: minnesota-leopard-timing-lion
File name:shdeulerinstall.lnk
Download: download sample
Signature NetSupport
File size:1'394 bytes
First seen:2023-07-24 17:32:51 UTC
Last seen:Never
File type:Shortcut (lnk) lnk
MIME type:application/octet-stream
ssdeep 24:8mN4OglPNTJjaMcK9rhW8pThAcWQCa+/CWzyKMgDB3Y7l7aWyImdab/2XT:8mNXglLofYCuKMgDB387aIuab2j
TLSH T13B219A141BF60706C6B68B3ABCE6B366D977BC09EA459B9E1690C3880815610F815F2F
Reporter rmceoin
Tags:FakeSG lnk


Avatar
rmceoin
Infection chain
compromised site
-->
google-analytiks.com/sBY76j
-->
esteticalocarno.com/wp-content/uploads/2023/02/Install%20Updater%20(V105.215.8412_silent).url
-->
http://185.252.179.64:80/Downloads/shdeulerinstall.lnk
-->
www.esteticalocarno.com/wp-content/uploads/2018/04/HHYGASDBBBX.hta
-->
NetSupport GatewayAddress conluase62.com:5051

Intelligence


File Origin
# of uploads :
1
# of downloads :
151
Origin country :
US US
Vendor Threat Intelligence
Result
Verdict:
Malicious
File Type:
LNK File - Malicious
Payload URLs
URL
File name
https://www.esteticalocarno.com/wp-content/uploads/2018/04/HHYGASDBBBX.hta')
LNK File
Behaviour
BlacklistAPI detected
Gathering data
Result
Verdict:
MALICIOUS
Result
Threat name:
NetSupport RAT
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Encrypted powershell cmdline option found
Found suspicious powershell code related to unpacking or dynamic code loading
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Powershell drops PE file
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Powershell drops NetSupport RAT client
Suspicious command line found
Suspicious powershell command line found
Very long command line found
Windows shortcut file (LNK) starts blacklisted processes
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1278559 Sample: shdeulerinstall.lnk Startdate: 24/07/2023 Architecture: WINDOWS Score: 100 90 Multi AV Scanner detection for domain / URL 2->90 92 Malicious sample detected (through community Yara rule) 2->92 94 Antivirus detection for URL or domain 2->94 96 10 other signatures 2->96 12 powershell.exe 11 2->12         started        15 powershell.exe 2->15         started        17 taskkill.exe 2->17         started        19 client32.exe 2->19         started        process3 signatures4 116 Suspicious powershell command line found 12->116 118 Very long command line found 12->118 120 Encrypted powershell cmdline option found 12->120 122 3 other signatures 12->122 21 mshta.exe 23 12->21         started        25 conhost.exe 1 12->25         started        27 client32.exe 15->27         started        29 conhost.exe 15->29         started        31 reg.exe 15->31         started        33 conhost.exe 17->33         started        process5 dnsIp6 76 esteticalocarno.com 217.160.0.218, 443, 49712, 49714 ONEANDONE-ASBrauerstrasse48DE Germany 21->76 78 www.esteticalocarno.com 21->78 104 Windows shortcut file (LNK) starts blacklisted processes 21->104 106 Suspicious powershell command line found 21->106 108 Very long command line found 21->108 35 powershell.exe 12 21->35         started        80 conluase62.com 94.158.247.27, 5051 MIVOCLOUDMD Moldova Republic of 27->80 82 geography.netsupportsoftware.com 62.172.138.67, 49717, 80 BTGB United Kingdom 27->82 84 geo.netsupportsoftware.com 27->84 signatures7 process8 signatures9 98 Windows shortcut file (LNK) starts blacklisted processes 35->98 100 Very long command line found 35->100 102 Suspicious command line found 35->102 38 cmd.exe 1 35->38         started        41 conhost.exe 35->41         started        process10 signatures11 110 Windows shortcut file (LNK) starts blacklisted processes 38->110 112 Suspicious powershell command line found 38->112 114 Very long command line found 38->114 43 powershell.exe 14 53 38->43         started        48 powershell.exe 15 38->48         started        50 conhost.exe 38->50         started        process12 dnsIp13 86 esteticalocarno.com 43->86 88 149677182.v2.pressablecdn.com 192.0.77.39, 443, 49713 AUTOMATTICUS United States 43->88 68 C:\Users\user\AppData\Roaming\client32.exe, PE32 43->68 dropped 70 C:\Users\user\AppData\Roaming\...\pcicapi.dll, PE32 43->70 dropped 72 C:\Users\user\AppData\...\client32.exe (copy), PE32 43->72 dropped 74 6 other files (5 malicious) 43->74 dropped 124 Windows shortcut file (LNK) starts blacklisted processes 43->124 126 Suspicious powershell command line found 43->126 128 Very long command line found 43->128 130 Encrypted powershell cmdline option found 43->130 52 powershell.exe 22 43->52         started        file14 signatures15 process16 file17 62 C:\Users\user\AppData\Local\Temp\CMSTP.inf, Windows 52->62 dropped 64 C:\Users\user\AppData\...\3ycyy5ei.cmdline, Unicode 52->64 dropped 55 csc.exe 3 52->55         started        58 cmstp.exe 52->58         started        process18 file19 66 C:\Users\user\AppData\Local\...\3ycyy5ei.dll, PE32 55->66 dropped 60 cvtres.exe 55->60         started        process20
Threat name:
Shortcut.Trojan.Generic
Status:
Suspicious
First seen:
2023-07-24 14:54:43 UTC
File Type:
Binary
AV detection:
8 of 25 (32.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Blocklisted process makes network request
Malware Config
Dropper Extraction:
https://www.esteticalocarno.com/wp-content/uploads/2018/04/HHYGASDBBBX.hta
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Download_in_LNK
Author:@bartblaze
Description:Identifies download artefacts in shortcut (LNK) files.
Rule name:EXE_in_LNK
Author:@bartblaze
Description:Identifies executable artefacts in shortcut (LNK) files.
Rule name:LNK_sospechosos
Author:Germán Fernández
Description:Detecta archivos .lnk sospechosos
Rule name:PS_in_LNK
Author:@bartblaze
Description:Identifies PowerShell artefacts in shortcut (LNK) files.
Rule name:SUSP_LNK_PowerShell
Author:SECUINFRA Falcon Team
Description:Detects the reference to powershell inside an lnk file, which is suspicious

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments