Is a random number generated by a CSRNG equivalently secure as the SHA hash of that number?
Security is not a single parameter. Equivalently secure under which requirements, under which scope and which pre-conditions?
I know that RNGs generate numbers that look random, and aren't necessarily random.
Random number generations may not produce unpredictable output, but a well seeded CSPRNG, a cryptographically secure random number generator is - of course - supposed to do that.
For example, in a range of [1, 2^256], number 100 might be picked randomly, but it isn't secure, so it needs to be changed.
Any element, when securely generated, is as secure as the next.
Note that SHA-256 generates 256 bits, which may be interpreted as a number afterwards, although we then usually assume it is in the range $[0, 2^{256})$.
However, the SHA256 hash of a number that looks random has the same chances to be 100 just like any other result.
"Looks random" is not a good assumption. 43573405478350 may "look random", but it won't ever generate the value 100.
A CSPRNG and a cryptographically secure hash such as SHA-256 should have the same probability to generate a specific number when well seeded.
Does this mean that the SHA256 hash of a pseudo-random number is inferior in terms of security?
As indicated, that mainly depends on the input. Many CSPRNG's are actually build upon hash algorithms. Adding another hash iteration probably won't do much with regards to security, assuming that you will at least feed it 256 bits of course.