MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b3a2bc42672492c4a0d3a7fa4f0ad1352f3ccbc245903fd6010079903656f884. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: b3a2bc42672492c4a0d3a7fa4f0ad1352f3ccbc245903fd6010079903656f884
SHA3-384 hash: 4e389f3cfb59d463fb33766cf68b3fb49dda6f3b21542314dee7479344a043b8c10dee7b5fd9c8a2bc32a0f492671c88
SHA1 hash: dee0ebac7bcd49109d56a896d12dbc142e46f3db
MD5 hash: 38daa65155587e7fea048f60ab55ee6b
humanhash: wyoming-mobile-chicken-white
File name:b3a2bc42672492c4a0d3a7fa4f0ad1352f3ccbc245903fd6010079903656f884
Download: download sample
Signature NetSupport
File size:4'968'336 bytes
First seen:2021-08-05 07:49:25 UTC
Last seen:2021-08-05 09:22:03 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5a594319a0d69dbc452e748bcf05892e (21 x ParallaxRAT, 20 x Gh0stRAT, 15 x NetSupport)
ssdeep 98304:8SijExiybDRi7Eh6M4NnyWrsh85GraC/MDkr+DidXvh6d204OOR5qUf:GExiWR1kMAybhRmpLgJ6M8YYE
Threatray 90 similar samples on MalwareBazaar
TLSH T14536123FB268653ED46A0B3246B3D350987BBA61B91A8C1F17F0091DCF664A10E3F756
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter JAMESWT_WT
Tags:exe Knassar DK ApS NetSupport signed

Code Signing Certificate

Organisation:Knassar DK ApS
Issuer:DigiCert EV Code Signing CA (SHA2)
Algorithm:sha256WithRSAEncryption
Valid from:2021-03-04T00:00:00Z
Valid to:2022-03-09T23:59:59Z
Serial number: 025020668f51235e9ecfff8cf00da63e
Intelligence: 5 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: c3692225dad4b5b1ff909f3a769cd913f644a93b1953e149cfd612848af02007
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
121
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
288EF7708FC85BCCFB47C21943727B39.exe
Verdict:
Suspicious activity
Analysis date:
2021-06-24 19:24:52 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
rans.evad
Score:
26 / 100
Signature
Contains functionalty to change the wallpaper
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.ChePro
Status:
Malicious
First seen:
2021-06-24 19:23:22 UTC
File Type:
PE (Exe)
AV detection:
15 of 47 (31.91%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
25a6b49a3886d0c4c95427cbf65576241cf6c79b6f4ac8cf98c0f4c5cd11eae2
MD5 hash:
13359f2ce34a0fcb7b826b1699cba1b7
SHA1 hash:
43e74b681e1f54dadd575b08291c85291cbb847b
SH256 hash:
b3a2bc42672492c4a0d3a7fa4f0ad1352f3ccbc245903fd6010079903656f884
MD5 hash:
38daa65155587e7fea048f60ab55ee6b
SHA1 hash:
dee0ebac7bcd49109d56a896d12dbc142e46f3db
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments