MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cea3f6928121bf4382e7144b9a900cdcbecb7b7f95a14531ec0c04286a08489e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 8


Intelligence 8 IOCs YARA 16 File information Comments

SHA256 hash: cea3f6928121bf4382e7144b9a900cdcbecb7b7f95a14531ec0c04286a08489e
SHA3-384 hash: a6dfd9266f3231989fbc3829224bc882ae070176b35820e56f0d5cc4e3f4b10176b9d2732293e9d8bf59720019a6a49c
SHA1 hash: 5eefa6d5af3adc5a84a5e7ba66de87779221cc02
MD5 hash: 8970fccd38432d3a6eefed2f274709df
humanhash: golf-timing-delaware-leopard
File name:lolo.7z
Download: download sample
Signature NetSupport
File size:2'306'944 bytes
First seen:2023-08-02 08:21:02 UTC
Last seen:Never
File type: 7z
MIME type:application/x-7z-compressed
ssdeep 49152:rDHf7GK0RIZLYUIFWsFYL7084J3Sr7Y1t/iAJkxNkvTMTTi0oIFJePBM5Pl:rDHfcyZ8/FW8Y9m9i5IvEP
TLSH T136B5332D13EACB4C98624DACA560B157A115137898760DF7C9D7D8B9372BFE2FC83908
TrID 57.1% (.7Z) 7-Zip compressed archive (v0.4) (8000/1)
42.8% (.7Z) 7-Zip compressed archive (gen) (6000/1)
Reporter JAMESWT
Tags:7z 94-158-247-23 NetSupport zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
93
Origin country :
IT IT
File Archive Information

This file archive contains 21 file(s), sorted by their relevance:

File name:rot-13.pscript
File size:1'274 bytes
SHA256 hash: 2e4bd5557aedd1743da5fab1b6995fbc447d6e9491d9ec59fa93ab889d8bccd1
MD5 hash: ac1cd856f434464d3f68465061171d0a
MIME type:text/plain
Signature NetSupport
File name:nskbfltr.inf
File size:328 bytes
SHA256 hash: d96856cd944a9f1587907cacef974c0248b7f4210f1689c1e6bcac5fed289368
MD5 hash: 26e28c01461f7e65c402bdf09923d435
MIME type:application/x-setupscript
Signature NetSupport
File name:TCCTL32.DLL
File size:396'664 bytes
SHA256 hash: 6795d760ce7a955df6c2f5a062e296128efdb8c908908eda4d666926980447ea
MD5 hash: eab603d12705752e3d268d86dff74ed4
MIME type:application/x-dosexec
Signature NetSupport
File name:CacheDate.dat
File size:0 bytes
SHA256 hash: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
MD5 hash: d41d8cd98f00b204e9800998ecf8427e
MIME type:inode/x-empty
Signature NetSupport
File name:insert_delimiter.pscript
File size:1'286 bytes
SHA256 hash: 4b460fde39403b5fc251388363565bdcf4b3eb1fd23873154efe61e6fc482042
MD5 hash: 3c0c93f687dce4d43bdb60237bbd0b54
MIME type:text/plain
Signature NetSupport
File name:NSM.ini
File size:6'458 bytes
SHA256 hash: 60fe386112ad51f40a1ee9e1b15eca802ced174d7055341c491dee06780b3f92
MD5 hash: 88b1dab8f4fd1ae879685995c90bd902
MIME type:application/x-wine-extension-ini
Signature NetSupport
File name:CacheURL.dat
File size:48 bytes
SHA256 hash: 54b920f5b87019fcf313bec4d9f4639a932b8268e5183b29804e91e29ed6f726
MD5 hash: 39f6d8fa3bd905e03b0cc8cc16707e2b
MIME type:text/plain
Signature NetSupport
File name:client32.ini
File size:714 bytes
SHA256 hash: dc020c98ed1d39721ad1f127dc0c04a0735bd47c6b6ecd222683210a601d90db
MD5 hash: a61475b49fea7e08719a7e8ad1c5d278
MIME type:text/plain
Signature NetSupport
File name:PCICHEK.DLL
File size:18'808 bytes
SHA256 hash: 956b9fa960f913cce3137089c601f3c64cc24c54614b02bba62abb9610a985dd
MD5 hash: 104b30fef04433a2d2fd1d5f99f179fe
MIME type:application/x-dosexec
Signature NetSupport
File name:desktop.ini
File size:96 bytes
SHA256 hash: bb2df21d474ed3e383fe56691dd5fe9e441f2b163a82a2d4d1042783f249b70f
MD5 hash: b21bf903986ac0ce3b7bb2371c8502d2
MIME type:application/x-wine-extension-ini
Signature NetSupport
File name:putty.exe
File size:1'647'912 bytes
SHA256 hash: fc6f9dbdf4b9f8dd1f5f3a74cb6e55119d3fe2c9db52436e10ba07842e6c3d7c
MD5 hash: f838fdafd0881cf1e6040a07d78e840d
MIME type:application/x-dosexec
Signature NetSupport
File name:HTML_Obj_list.txt
File size:298 bytes
SHA256 hash: d9ae5dc5f2c4964c1e7ba3be64cba37f3043484db9056d3a828102275d7d4101
MD5 hash: 3fa98ac589ac2b284f4d625a620d66bc
MIME type:text/plain
Signature NetSupport
File name:msvcr100.dll
File size:773'968 bytes
SHA256 hash: 8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
MD5 hash: 0e37fbfa79d349d672456923ec5fbbe3
MIME type:application/x-dosexec
Signature NetSupport
File name:pcicapi.dll
File size:33'144 bytes
SHA256 hash: 2d6c6200508c0797e6542b195c999f3485c4ef76551aa3c65016587788ba1703
MD5 hash: 34dfb87e4200d852d1fb45dc48f93cfc
MIME type:application/x-dosexec
Signature NetSupport
File name:PCICL32.DLL
File size:3'740'024 bytes
SHA256 hash: 38684adb2183bf320eb308a96cdbde8d1d56740166c3e2596161f42a40fa32d5
MD5 hash: d3d39180e85700f72aaae25e40c125ff
MIME type:application/x-dosexec
Signature NetSupport
File name:NSM.LIC
File size:258 bytes
SHA256 hash: f4e2f28169e0c88b2551b6f1d63f8ba513feb15beacc43a82f626b93d673f56d
MD5 hash: 1b41e64c60ca9dfadeb063cd822ab089
MIME type:text/plain
Signature NetSupport
File name:nsm_vpro.ini
File size:46 bytes
SHA256 hash: 4bfa4c00414660ba44bddde5216a7f28aeccaa9e2d42df4bbff66db57c60522b
MD5 hash: 3be27483fdcdbf9ebae93234785235e3
MIME type:text/plain
Signature NetSupport
File name:client32.exe
File size:101'680 bytes
SHA256 hash: 213af995d4142854b81af3cf73dee7ffe9d8ad6e84fda6386029101dbf3df897
MD5 hash: f70b67c2b3204b7ddd8b755799cccff0
MIME type:application/x-dosexec
Signature NetSupport
File name:remcmdstub.exe
File size:63'864 bytes
SHA256 hash: fedd609a16c717db9bea3072bed41e79b564c4bc97f959208bfa52fb3c9fa814
MD5 hash: 6fca49b85aa38ee016e39e14b9f9d6d9
MIME type:application/x-dosexec
Signature NetSupport
File name:Settings.txt
File size:729 bytes
SHA256 hash: 8cb0f6d438db151ed507299a64031b5c957141cfc632ace95b9135168e0fd121
MD5 hash: bccc9e937d8d72a12743d75a6b396a34
MIME type:application/x-wine-extension-ini
Signature NetSupport
File name:HTCTL32.DLL
File size:328'056 bytes
SHA256 hash: 3c072532bf7674d0c5154d4d22a9d9c0173530c0d00f69911cdbc2552175d899
MD5 hash: c94005d2dcd2a54e40510344e0bb9435
MIME type:application/x-dosexec
Signature NetSupport
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm netsupportmanager overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.PUA.NetSupportRAT
Status:
Malicious
First seen:
2023-07-29 20:03:01 UTC
File Type:
Binary (Archive)
Extracted files:
1048
AV detection:
15 of 38 (39.47%)
Threat level:
  1/5
Result
Malware family:
netsupport
Score:
  10/10
Tags:
family:netsupport rat
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_NetSupportRAT_Config
Author:abuse.ch
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__ConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

NetSupport

7z cea3f6928121bf4382e7144b9a900cdcbecb7b7f95a14531ec0c04286a08489e

(this sample)

  
Delivery method
Distributed via web download

Comments