General

  • Target

    df44c2ed63678f5171cf770f8d6f7a2b8c12260060b70764574f83c45a3ad3e5

  • Size

    1.6MB

  • Sample

    231213-1w4n5ahfdm

  • MD5

    f7025b9f2d2dc7308a072ddc05d195b1

  • SHA1

    3204ed258d8d2d1c5b3b729f88dbfeff8d026179

  • SHA256

    df44c2ed63678f5171cf770f8d6f7a2b8c12260060b70764574f83c45a3ad3e5

  • SHA512

    87f3f3bcd401ead9d724d9e7cc57379ec6e2c81eeb074f37f7feac4fb96dbe136868546768b554914eb87f05a9d0ba48d60e63c01a701308602bfa6626fd5a2d

  • SSDEEP

    49152:80ceOGgUYYEmluRKYoFh4kGWusbQnIyDi1E1uonTKi/OjCCNG:1XOGgUYC4RKXFhrusbaDkE1u

Malware Config

Extracted

Family

risepro

C2

193.233.132.51

Targets

    • Target

      df44c2ed63678f5171cf770f8d6f7a2b8c12260060b70764574f83c45a3ad3e5

    • Size

      1.6MB

    • MD5

      f7025b9f2d2dc7308a072ddc05d195b1

    • SHA1

      3204ed258d8d2d1c5b3b729f88dbfeff8d026179

    • SHA256

      df44c2ed63678f5171cf770f8d6f7a2b8c12260060b70764574f83c45a3ad3e5

    • SHA512

      87f3f3bcd401ead9d724d9e7cc57379ec6e2c81eeb074f37f7feac4fb96dbe136868546768b554914eb87f05a9d0ba48d60e63c01a701308602bfa6626fd5a2d

    • SSDEEP

      49152:80ceOGgUYYEmluRKYoFh4kGWusbQnIyDi1E1uonTKi/OjCCNG:1XOGgUYC4RKXFhrusbaDkE1u

    • Drops startup file

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks