MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a7b0e2d3354a350f9652e570b3bc0a5223dbf7f250dd772900beddecdb749929. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: a7b0e2d3354a350f9652e570b3bc0a5223dbf7f250dd772900beddecdb749929
SHA3-384 hash: 554f59f49bf21c0d7816d0be0fd39a677b0bddd60a02089052752d870f69b26ec0d6a3014bc3e46869504b41202110e0
SHA1 hash: 10c65de1edd53a9187ad877702b43587c36abef1
MD5 hash: 887852b971351bacd528d47a68f2e9ea
humanhash: india-apart-cup-mockingbird
File name:file3.ps1
Download: download sample
Signature NetSupport
File size:2'233 bytes
First seen:2023-05-12 12:25:55 UTC
Last seen:2023-05-12 13:53:26 UTC
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 48:gGfwTURYjOqgfS1vmLtvvluC07lyvpPIos/58ElawZFFq4aBM4T/:gGfwOfS1vmvUlyvSog58ElawZFFOMo
Threatray 211 similar samples on MalwareBazaar
TLSH T1A241CBB9CEBCF5E0037C71E485152A1B10946E23D7F59E20E90248E61C78705EF2B28C
Reporter Anonymous
Tags:NetSupport ps1

Intelligence


File Origin
# of uploads :
2
# of downloads :
167
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Base64 Encoded Powershell Directives
Detected one or more base64 encoded Powershell directives.
Base64 Encoded URL
Detected an ANSI or UNICODE http:// or https:// base64 encoded URL prefix.
Empire PowerShell Request
Detected a base64 encoded Powershell HTTP request that is likely sourced from Empire.
Result
Threat name:
NetSupport RAT
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
Antivirus detection for URL or domain
Bypasses PowerShell execution policy
Encrypted powershell cmdline option found
Multi AV Scanner detection for dropped file
Potential dropper URLs found in powershell memory
Powershell drops PE file
Sigma detected: Powershell drops NetSupport RAT client
Snort IDS alert for network traffic
Uses known network protocols on non-standard ports
Very long command line found
Behaviour
Behavior Graph:
Result
Malware family:
netsupport
Score:
  10/10
Tags:
family:netsupport persistence rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
NetSupport
Malware Config
Dropper Extraction:
https://stackapk.com/pages/apostrk.php
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments