MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f6925e8b8e1990fa9b33356c02a8fae4cfef192bae27bdea92a0e2e46eb23aef. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



NetSupport


Vendor detections: 7


Intelligence 7 IOCs 1 YARA File information Comments

SHA256 hash: f6925e8b8e1990fa9b33356c02a8fae4cfef192bae27bdea92a0e2e46eb23aef
SHA3-384 hash: 75df45276ee1b516cf5cab8d88e44fe8241bfca770bd507683868ed45bf004ccbbedfda1a06f56d5852fe746f3cf2bc6
SHA1 hash: 580d7a5655ed3413cb738f5c25ef02f6997dff70
MD5 hash: dda9d3cb3f539a2653a627f28f04f644
humanhash: four-finch-social-eleven
File name:skimokeep.ps1
Download: download sample
Signature NetSupport
File size:5'408'929 bytes
First seen:2026-03-16 09:01:17 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 49152:VLY8R5lE8ZU0Z97+78zB9W8UP60wVO8Hx5w89jC8YI8Eh81y28yN8v8uO828MI8d:a
TLSH T13A4692D97AC413F09929ABDC824374CD0395A17E6FBB584D02E448BE3D1AE1766E0CBD
Magika powershell
Reporter JAMESWT_WT
Tags:91-219-23-145 aff-shrd-rt-in-net NetSupport ps1

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
89.124.75.72:443 https://threatfox.abuse.ch/ioc/1767941/

Intelligence


File Origin
# of uploads :
1
# of downloads :
91
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
crypt emmenhtal evasive obfuscated powershell
Gathering data
Threat name:
Script-PowerShell.Trojan.Heuristic
Status:
Malicious
First seen:
2026-03-06 23:43:32 UTC
File Type:
Text (PowerShell)
AV detection:
7 of 24 (29.17%)
Threat level:
  2/5
Result
Malware family:
netsupport
Score:
  10/10
Tags:
family:netsupport discovery execution rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
System Location Discovery: System Language Discovery
Executes dropped EXE
Loads dropped DLL
Badlisted process makes network request
NetSupport
Netsupport family
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments