MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b238491cbf41c1927953a5907b8e1782375602e5a6b62d32dc686fd8e866f421. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 13


Intelligence 13 IOCs 1 YARA File information Comments

SHA256 hash: b238491cbf41c1927953a5907b8e1782375602e5a6b62d32dc686fd8e866f421
SHA3-384 hash: 2841319a0173d6ffa30a1df122dfe2b5b0f59f87be5a179f552fe91c9391700a4b5e6231405a38c77a681614699e2b38
SHA1 hash: 7fe98e503bf6bb4f2104c15f86b02880ec112fc6
MD5 hash: 06e59bcca37006851032f99abfdc6918
humanhash: king-magazine-michigan-hamper
File name:06e59bcca37006851032f99abfdc6918.exe
Download: download sample
Signature NetSupport
File size:2'660'415 bytes
First seen:2022-05-28 17:16:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bf8e93937f9e7494ce0335cf5d059356 (8 x NetSupport)
ssdeep 49152:/yrIitxv7IehafNELosmBMRdBmmnQI2KlDF+eXU/sJCKeZxEzhReGS:/yrXxTvhalEomDRdq0JWQjpS
Threatray 122 similar samples on MalwareBazaar
TLSH T13EC52311F3C825BAC8294B70CDA6D534C37B3D746AB8E40DBB86372F75B19268297B11
TrID 73.9% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
8.7% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
4.6% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.6% (.SCR) Windows screen saver (13101/52/3)
2.9% (.EXE) Win64 Executable (generic) (10523/12/4)
File icon (PE):PE icon
dhash icon 60646060eeec6c89 (1 x NetSupport)
Reporter abuse_ch
Tags:exe NetSupport


Avatar
abuse_ch
NetSupport C2:
160.20.147.39:3377

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
160.20.147.39:3377 https://threatfox.abuse.ch/ioc/643057/

Intelligence


File Origin
# of uploads :
1
# of downloads :
338
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
netsupport
ID:
1
File name:
06e59bcca37006851032f99abfdc6918.exe
Verdict:
Malicious activity
Analysis date:
2022-05-28 17:19:38 UTC
Tags:
unwanted netsupport

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Creating a process from a recently created file
DNS request
Using the Windows Management Instrumentation requests
Sending an HTTP GET request
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware netsupportmanager overlay packed remoteadmin shell32.dll update.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
72 / 100
Signature
Antivirus detection for URL or domain
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Uses known network protocols on non-standard ports
Behaviour
Behavior Graph:
Gathering data
Threat name:
Win32.Infostealer.ChePro
Status:
Malicious
First seen:
2022-04-01 17:35:27 UTC
File Type:
PE (Exe)
Extracted files:
478
AV detection:
16 of 26 (61.54%)
Threat level:
  5/5
Result
Malware family:
netsupport
Score:
  10/10
Tags:
family:netsupport rat
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Enumerates physical storage devices
Checks computer location settings
Drops startup file
Loads dropped DLL
Executes dropped EXE
NetSupport
Unpacked files
SH256 hash:
712ff54148b9eb195057e48f8d30f2f05abc6a980c5d9bdf552ceb4507c1cfb9
MD5 hash:
5d2303e4ff60395b01b0d9d3a9481718
SHA1 hash:
f9cf9faafe79f4c1714cce4ae7726c98653c097a
SH256 hash:
2025eaca35bc0ae40dc35b665f919c0e868dacb9a6cbbffea6f42c8380c375a3
MD5 hash:
d6afe503514b3c2cc62ff03d46777d30
SHA1 hash:
ea765faf0b6cb3b72b4628d5a5764b76c2804356
SH256 hash:
7ad690c34bb26904fc2321991f21c9f0c91893dc9c5bb9ae0890457a533433fe
MD5 hash:
6493ce272814d37c709cb44e916a24c2
SHA1 hash:
d231c14e0ea45b95a5c074ec2420877cb681b5da
SH256 hash:
f0d305e9ea81296bbad0d1fad08f9db7ef9b400d1bc4340146e38910d629ca2a
MD5 hash:
53267e76d05e98fcd27856eeb4e12c0b
SHA1 hash:
80008356fe0659e54e1bf2f7bbf08842db70e24f
SH256 hash:
c14f52f2f2ff6849f62aec0d673a30b642ace947b87bac737b1042c2ca85e2a7
MD5 hash:
cd90644efd4ec4bf9d63bf7e5b374fb8
SHA1 hash:
56e23964cf6589eee766b003d04a8df8a0b085b9
SH256 hash:
460d715b3d5a7d6e9dd5f9429be99d8780075a1eb401ee47f1df11d7ca0ef580
MD5 hash:
5141a2c24263b4d2fe4f060a4ffe4df3
SHA1 hash:
20b47aa9430c966c0d5536d91ff4a357dc0a5f7b
SH256 hash:
b238491cbf41c1927953a5907b8e1782375602e5a6b62d32dc686fd8e866f421
MD5 hash:
06e59bcca37006851032f99abfdc6918
SHA1 hash:
7fe98e503bf6bb4f2104c15f86b02880ec112fc6
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments