MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c9344193ec791722aa75893010b4da6401f88029a7786b78f132e4cf5605d907. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 7


Intelligence 7 IOCs 1 YARA File information Comments

SHA256 hash: c9344193ec791722aa75893010b4da6401f88029a7786b78f132e4cf5605d907
SHA3-384 hash: 873ce42c8cbec1cbf15162a8d488505d6f22092d54380a76babb56ef82108d739bf69d39c100c9dfb15581ec4f63779f
SHA1 hash: 11b4c12d1c8711b3f59c1e8d4eab495ee3cc01e6
MD5 hash: 25f44f844ccbb398c89027745c1a57eb
humanhash: mobile-london-nineteen-ink
File name:pampereddislocate.ps1
Download: download sample
Signature NetSupport
File size:5'403'076 bytes
First seen:2026-03-16 09:01:04 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 49152:VLY8R5lE8ZU0Z97+78zB9W8UP60wVO8Hx5w89jC8YI8Eh81y28yN8v8uO828MI8j:y
TLSH T10C4692D97AC413F09929ABDC824374CD0395A17E6FBB584D02E448BE3D1AE1766E0CBD
Magika powershell
Reporter JAMESWT_WT
Tags:91-219-23-145 NetSupport ps1 t-rpl-mrg-nod-in-net

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
46.151.25.175:443 https://threatfox.abuse.ch/ioc/1767940/

Intelligence


File Origin
# of uploads :
1
# of downloads :
83
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
crypt evasive obfuscated powershell
Gathering data
Threat name:
Win32.Trojan.Alevaul
Status:
Malicious
First seen:
2026-03-06 23:43:33 UTC
File Type:
Text (PowerShell)
AV detection:
7 of 24 (29.17%)
Threat level:
  5/5
Result
Malware family:
netsupport
Score:
  10/10
Tags:
family:netsupport discovery execution rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
System Location Discovery: System Language Discovery
Executes dropped EXE
Loads dropped DLL
Badlisted process makes network request
NetSupport
Netsupport family
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments