Summary | ZeroBOX

tndv.zip

ZIP Format
Category Machine Started Completed
FILE s1_win7_x6402 June 20, 2023, 5:56 p.m. June 20, 2023, 5:59 p.m.
Size 2.2MB
Type Zip archive data, at least v2.0 to extract
MD5 83b338082fc994430cd4c0c27077f1c9
SHA256 d15938851d2b1340c537fe0e08dd6fac4255440fd361ef3599a1a490f3dea139
CRC32 5E7A3419
ssdeep 49152:HZjQXorDcQhg7dMnEBJCgkh3V/4msgNbbZnN7p4lVG5PWZ5FvcBQ:HqWg7OEB1kh3VuGZp4bIP+UQ
Yara
  • zip_file_format - ZIP file format

IP Address Status Action
164.124.101.2 Active Moloch
209.250.244.251 Active Moloch
62.172.138.8 Active Moloch

suspicious_features GET method with no useragent header suspicious_request GET http://geo.netsupportsoftware.com/location/loca.asp
request GET http://geo.netsupportsoftware.com/location/loca.asp
Lionic Riskware.ZIP.NetSup.1!c
DrWeb Program.RemoteAdmin.837
Alibaba RiskWare:Win32/NetSup.552dec19
Cyren W32/Tool.EQYN-2153
ESET-NOD32 Win32/NetSupportManager.AD
Kaspersky not-a-virus:RemoteAdmin.Win32.NetSup.i
Tencent Win32.Trojan.Netsup.Rimw
Zillya Trojan.GenCBL.Win32.9416
McAfee-GW-Edition Artemis!PUP
Jiangmin RemoteAdmin.NetSup.h
ZoneAlarm not-a-virus:HEUR:RemoteAdmin.Win32.NetSup.gen
GData Archive.Trojan.Agent.FW3MVG
Google Detected
Rising HackTool.NetSupport!1.E317 (CLASSIC)
Yandex Riskware.RemoteAdmin!myez5VmqQPE
Ikarus Trojan.RAT.Netsupportmanager
MaxSecure Trojan.Malware.73446946.susgen
Fortinet Riskware/Application