MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8d6c081ac54baaa002cff13ce739d3f7745dc646d021f103a0b59807db5143b7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 8d6c081ac54baaa002cff13ce739d3f7745dc646d021f103a0b59807db5143b7
SHA3-384 hash: cb51dbf090aa6f9ee3cc14a27d91fb909547130b6f960fdc10449d157c268e0bd7ec769a2e3aff7dc92e3e14f7931664
SHA1 hash: 8bbef15eef96bad76b1cf8fb29895191a0d8bb84
MD5 hash: a02ae4594adc3ed2a6160c84f5cb3a9e
humanhash: lemon-wyoming-oxygen-white
File name:file1.ps1
Download: download sample
Signature NetSupport
File size:2'229 bytes
First seen:2023-05-12 10:45:04 UTC
Last seen:2023-05-17 11:53:01 UTC
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 48:gGfZjFWuJqs9HZNjd+SfprcKyK0hQeJYS1FtfsC5P3RX5ZmpiaoIhSNtM:gGfdFW87jd+SfpbaLJYS1FtfsC5P39Wn
Threatray 208 similar samples on MalwareBazaar
TLSH T13E41CB79CF69F8E0032D719088492E2620D89B57D6B58E34D9574AE92D7C206CF1B19C
Reporter Anonymous
Tags:NetSupport ps1

Intelligence


File Origin
# of uploads :
3
# of downloads :
147
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Base64 Encoded Powershell Directives
Detected one or more base64 encoded Powershell directives.
Base64 Encoded URL
Detected an ANSI or UNICODE http:// or https:// base64 encoded URL prefix.
Empire PowerShell Request
Detected a base64 encoded Powershell HTTP request that is likely sourced from Empire.
Result
Threat name:
NetSupport RAT
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
Delayed program exit found
Encrypted powershell cmdline option found
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Potential dropper URLs found in powershell memory
Powershell drops PE file
Sigma detected: Powershell drops NetSupport RAT client
Snort IDS alert for network traffic
Uses known network protocols on non-standard ports
Very long command line found
Behaviour
Behavior Graph:
Threat name:
Text.Trojan.Generic
Status:
Suspicious
First seen:
2023-05-12 10:46:06 UTC
File Type:
Text (Batch)
AV detection:
3 of 24 (12.50%)
Threat level:
  5/5
Result
Malware family:
netsupport
Score:
  10/10
Tags:
family:netsupport persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
NetSupport
Malware Config
Dropper Extraction:
https://centrovetluanda.com/apply.php
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments