Behavioral task
behavioral1
Sample
3048-2-0x00000000003A0000-0x0000000000D67000-memory.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
3048-2-0x00000000003A0000-0x0000000000D67000-memory.exe
Resource
win10v2004-20231023-en
General
-
Target
3048-2-0x00000000003A0000-0x0000000000D67000-memory.dmp
-
Size
9.8MB
-
MD5
b147a3073521e7dc5101b641ec06cdbf
-
SHA1
ce2cbd48efc79712c4e0bbdda4b5f6a53ff8ee7b
-
SHA256
6fef518f30b29275cb75da54b8ebd776f7d7639a7eb463fd6baedac38063be95
-
SHA512
6d10928471f0ee3d6f16a2598174d600aa136e014f20f02874cfabec521b8396616d3b1326743529b78f5530e4c9b672cedb3927c1fd591f5dafbb8395150428
-
SSDEEP
196608:vNkTYby+wFgiPaBAaGQ1ptNd4a71DgVVFiQhifHEu7w9np/HR:rbmgiPw5GWia7GVPiQ7u76HR
Malware Config
Extracted
risepro
194.169.175.128
Signatures
-
Privateloader family
-
Risepro family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3048-2-0x00000000003A0000-0x0000000000D67000-memory.dmp
Files
-
3048-2-0x00000000003A0000-0x0000000000D67000-memory.dmp.exe windows:6 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
‹¿/.� Size: - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
‹¿/.� Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
‹¿/.� Size: 5.5MB - Virtual size: 5.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 167KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ