MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d0b4b43432238e361c9f553caa05df5c34c462d55bb18a6db5e076faaaf05da9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 7


Intelligence 7 IOCs 1 YARA 4 File information Comments

SHA256 hash: d0b4b43432238e361c9f553caa05df5c34c462d55bb18a6db5e076faaaf05da9
SHA3-384 hash: fe61e19d765c0f9cc66a511cccaacc7758d611d7d704a4dc3cc50dfdae6c68e7e296535bf1ae04497c03401b6b25aa45
SHA1 hash: cdf6e4849974c1fbd5d3075fcce91eea4f58dac1
MD5 hash: 3e263a24122e03e6793a491bfda7942a
humanhash: fourteen-single-florida-lemon
File name:3E263A24122E03E6793A491BFDA7942A.exe
Download: download sample
Signature NetSupport
File size:5'886'464 bytes
First seen:2021-08-13 07:56:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'600 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 98304:v/rXIHsZBxIj0Hnk/mA5P/BINhs1DUUmEiqeWTGnuHnJTvGQUd6kt:MHoIP5P/GNyioyup6Qzk
Threatray 125 similar samples on MalwareBazaar
TLSH T1AD563317B0449712F91908F9C4EF493803F32A9313BAEA453E5566DE0F42BC99DBE789
Reporter abuse_ch
Tags:exe NetSupport


Avatar
abuse_ch
NetSupport C2:
65.21.198.183:1337

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
65.21.198.183:1337 https://threatfox.abuse.ch/ioc/184312/

Intelligence


File Origin
# of uploads :
1
# of downloads :
136
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
3E263A24122E03E6793A491BFDA7942A.exe
Verdict:
Malicious activity
Analysis date:
2021-08-13 08:45:54 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file
Creating a window
Changing a file
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
Antivirus / Scanner detection for submitted sample
Connects to many ports of the same IP (likely port scanning)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Uses dynamic DNS services
Uses known network protocols on non-standard ports
Yara detected Costura Assembly Loader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 464643 Sample: pQsaeJrtgL.exe Startdate: 13/08/2021 Architecture: WINDOWS Score: 92 53 192.168.2.1 unknown unknown 2->53 61 Antivirus / Scanner detection for submitted sample 2->61 63 Multi AV Scanner detection for submitted file 2->63 65 .NET source code contains method to dynamically call methods (often used by packers) 2->65 67 6 other signatures 2->67 9 pQsaeJrtgL.exe 12 2->9         started        signatures3 process4 file5 43 C:\Users\user\Desktop\PlotManage.exe, PE32 9->43 dropped 45 C:\Users\user\AppData\Local\...\Plib.exe, PE32 9->45 dropped 47 C:\Users\user\AppData\Local\...\PMGR.exe, PE32 9->47 dropped 12 Plib.exe 2 9->12         started        16 PlotManage.exe 15 14 9->16         started        19 cmd.exe 1 9->19         started        21 conhost.exe 9->21         started        process6 dnsIp7 49 C:\Users\user\AppData\Local\Temp\...\Plib.tmp, PE32 12->49 dropped 69 Multi AV Scanner detection for dropped file 12->69 23 Plib.tmp 5 49 12->23         started        51 www.123xch.com 104.21.82.246, 443, 49720 CLOUDFLARENETUS United States 16->51 26 conhost.exe 19->26         started        28 choice.exe 1 19->28         started        file8 signatures9 process10 file11 35 C:\Users\user\AppData\...\is-TF7MQ.tmp, PE32 23->35 dropped 37 C:\Users\user\AppData\...\svschost.exe (copy), PE32 23->37 dropped 39 C:\Users\user\...\remcmdstub.exe (copy), PE32 23->39 dropped 41 38 other files (none is malicious) 23->41 dropped 30 svschost.exe 1 18 23->30         started        33 WCL.exe 3 23->33         started        process12 dnsIp13 55 geography.netsupportsoftware.com 195.171.92.116, 49715, 80 BT-UK-ASBTnetUKRegionalnetworkGB United Kingdom 30->55 57 geo.netsupportsoftware.com 30->57 59 donutduck.duckdns.org 65.21.198.183, 1337, 49712, 9183 CP-ASDE United States 33->59
Threat name:
ByteCode-MSIL.PUA.Wacapew
Status:
Malicious
First seen:
2021-08-10 22:48:07 UTC
AV detection:
15 of 28 (53.57%)
Threat level:
  1/5
Result
Malware family:
netsupport
Score:
  10/10
Tags:
family:netsupport rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Deletes itself
Loads dropped DLL
Executes dropped EXE
NetSupport
Unpacked files
SH256 hash:
72ed9bc107403b32d316d33a2d045bc1ce4745c217e418de750d63635fa86df6
MD5 hash:
8569197cb1bbf5c33a8294e29a5a2695
SHA1 hash:
de5ea9d65b0c07e48bda1ae8a8d64a3c1d089fa1
SH256 hash:
dfcb2ff4caea8fceeff2309f14ffe137e2df4b3cd13e1bc7c71738de520cba65
MD5 hash:
ce5c6628650010a27e6d394826e46d27
SHA1 hash:
a52ce8aaa0701e5e5e0ee3cd60e74cf2f6322fd3
SH256 hash:
d10044aa0a5744542dccc2cb4841d87ac1fa8598e3679f0096a09c3fbb108026
MD5 hash:
c90f78839e26ba74985ea99e33a69716
SHA1 hash:
63b594fc49da24e7e26c89113ce510476b77d194
SH256 hash:
93101e1979a769bffd591e8be5fa42a8e3d87aa1b59e58a7d1a40d2711c1b028
MD5 hash:
2225a7af996769188c2ed7cc035e88da
SHA1 hash:
3daa9fc40d080dcdafa3233b60106176b8f0c5ce
SH256 hash:
457f5c8ac0dd1761a4033ce649b0d347b368e9f2f5161dd5d2ba4d290d403bd6
MD5 hash:
b01741b92decb365e640e9eee5811d70
SHA1 hash:
330b502616502ddaa539969b70626cd4b8e0c667
SH256 hash:
35a088a72be2d2aa9c8f2285fbcabb5893582d6bc2dd355b107da081c999db82
MD5 hash:
669dc6230c96d8f4e1a831554f655427
SHA1 hash:
91e57ce09970cba73e638d60ef2faf8bd6aa39ba
SH256 hash:
fc2b6a671a9e7f4295344595de7fc6dab59a0beb676a3f52daf77ca603225f9d
MD5 hash:
221af18e8deba27558dcc7ad83e31a7f
SHA1 hash:
6be634e4c33de4f4f7e07e3fe4483a59ef9b595a
SH256 hash:
f9c61e3e75cb0c4caf4b2bc055c7ad2cf85ba90f858ee3a3c578d87e02376370
MD5 hash:
d030ec2a45f3b5f23e6579752ebdf928
SHA1 hash:
58b9f21d460bf338ebf180ee92c4f6c34e69f56c
SH256 hash:
cf596dbe66d32b634ab604d66bdfb817baf46ff93b2c30d32e60000174b4ee59
MD5 hash:
a210da697423aba8d659c32f2327cb1e
SHA1 hash:
54a50c4a2b491a8b9e64ea7b33419d6e9d994ed9
SH256 hash:
d0b4b43432238e361c9f553caa05df5c34c462d55bb18a6db5e076faaaf05da9
MD5 hash:
3e263a24122e03e6793a491bfda7942a
SHA1 hash:
cdf6e4849974c1fbd5d3075fcce91eea4f58dac1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments