MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a95fe0e3b0cb3c0a172eef317d1b213f8572156dc44026f470add87e563bb3d1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: a95fe0e3b0cb3c0a172eef317d1b213f8572156dc44026f470add87e563bb3d1
SHA3-384 hash: 61aae54593a9eeb8e240e34c385aba4ce73a408283811ee80b3d52814870e006f2d79121dca0c8d48f79d82739ffc7ee
SHA1 hash: fb0597194bd59ebfd4d085380dcf4846365fdf77
MD5 hash: 9082a9dbb169613415eb7b7f57c266a1
humanhash: red-november-tango-lactose
File name:BILL47189.js
Download: download sample
Signature NetSupport
File size:7'883 bytes
First seen:2024-01-24 13:22:00 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 192:IlwJpl821uyfWwWKDbqSXGIJgE9GeBCVe0W1uyfWwWKDbqSq:IsjBfFDbqSXGIvGAB0eBfFDbqSq
TLSH T19DF16C642AC8F36427935026382BBC56E61E7D4F31F914ABB6B5E2461FD5F2180A36F0
Reporter 1ZRR4H
Tags:helasiras1i13-com js NetSupport

Intelligence


File Origin
# of uploads :
1
# of downloads :
317
Origin country :
CL CL
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
nemucod obfuscated sload virus
Result
Verdict:
MALICIOUS
Result
Threat name:
NetSupport RAT
Detection:
malicious
Classification:
rans.troj.expl.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Contains functionalty to change the wallpaper
Delayed program exit found
Found suspicious powershell code related to unpacking or dynamic code loading
JavaScript source code contains functionality to generate code involving HTTP requests or file downloads
JScript performs obfuscated calls to suspicious functions
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Powershell drops PE file
Sigma detected: Powershell drops NetSupport RAT client
Snort IDS alert for network traffic
Suspicious execution chain found
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1380302 Sample: BILL47189.js Startdate: 24/01/2024 Architecture: WINDOWS Score: 100 37 boxtechcompany.com 2->37 39 blawx.com 2->39 41 geo.netsupportsoftware.com 2->41 55 Snort IDS alert for network traffic 2->55 57 Multi AV Scanner detection for domain / URL 2->57 59 Malicious sample detected (through community Yara rule) 2->59 61 4 other signatures 2->61 8 wscript.exe 1 1 2->8         started        12 client32.exe 2->12         started        14 client32.exe 2->14         started        signatures3 process4 dnsIp5 47 blawx.com 188.127.227.29, 443, 49729 DHUBRU Russian Federation 8->47 69 System process connects to network (likely due to code injection or exploit) 8->69 71 JScript performs obfuscated calls to suspicious functions 8->71 73 Suspicious powershell command line found 8->73 75 3 other signatures 8->75 16 powershell.exe 15 39 8->16         started        signatures6 process7 dnsIp8 35 boxtechcompany.com 188.127.224.160, 443, 49730 DHUBRU Russian Federation 16->35 27 C:\Users\user\AppData\...\remcmdstub.exe, PE32 16->27 dropped 29 C:\Users\user\AppData\Roaming\...\pcicapi.dll, PE32 16->29 dropped 31 C:\Users\user\AppData\...\libssl-3-x64.dll, PE32+ 16->31 dropped 33 10 other files (9 malicious) 16->33 dropped 49 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 16->49 51 Found suspicious powershell code related to unpacking or dynamic code loading 16->51 53 Powershell drops PE file 16->53 21 client32.exe 17 16->21         started        25 conhost.exe 16->25         started        file9 signatures10 process11 dnsIp12 43 81.19.137.226, 443, 49731 IVC-ASRU Russian Federation 21->43 45 geo.netsupportsoftware.com 104.26.0.231, 49732, 80 CLOUDFLARENETUS United States 21->45 63 Multi AV Scanner detection for dropped file 21->63 65 Contains functionalty to change the wallpaper 21->65 67 Delayed program exit found 21->67 signatures13
Result
Malware family:
netsupport
Score:
  10/10
Tags:
family:netsupport persistence rat
Behaviour
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Blocklisted process makes network request
NetSupport
Malware Config
Dropper Extraction:
https://boxtechcompany.com/1/GetData.php?13708
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:SUSP_obfuscated_JS_obfuscatorio
Author:@imp0rtp3
Description:Detect JS obfuscation done by the js obfuscator (often malicious)
Reference:https://obfuscator.io

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments