General

  • Target

    0eaadae1b9d4cd115e39d6d3722f210acafeb4f8135dab43239da892d4513800.exe

  • Size

    5.0MB

  • Sample

    240109-wyyhnsgeb8

  • MD5

    d3b79089bc4e4047ffc70e47f4a46658

  • SHA1

    ad99a99c45d66615adb1ad418709aaa9044670b2

  • SHA256

    0eaadae1b9d4cd115e39d6d3722f210acafeb4f8135dab43239da892d4513800

  • SHA512

    ec85fbf7811088a8728572dc904c682bc8c5cbae4f030b5c39d7e26d4daf36650f4dbf7c98f3de5b524d49da6c79638d0679fe22bce7957c76b365c536eaedd8

  • SSDEEP

    98304:dZMZuky3clfKTRmmnCrDYgL5+VwNLGHj5O8alQ6lZ2Yk8yfasbE0My2L:dSk8xA40wNLa5nyXryffx2

Malware Config

Extracted

Family

risepro

C2

193.233.132.62:50500

Targets

    • Target

      0eaadae1b9d4cd115e39d6d3722f210acafeb4f8135dab43239da892d4513800.exe

    • Size

      5.0MB

    • MD5

      d3b79089bc4e4047ffc70e47f4a46658

    • SHA1

      ad99a99c45d66615adb1ad418709aaa9044670b2

    • SHA256

      0eaadae1b9d4cd115e39d6d3722f210acafeb4f8135dab43239da892d4513800

    • SHA512

      ec85fbf7811088a8728572dc904c682bc8c5cbae4f030b5c39d7e26d4daf36650f4dbf7c98f3de5b524d49da6c79638d0679fe22bce7957c76b365c536eaedd8

    • SSDEEP

      98304:dZMZuky3clfKTRmmnCrDYgL5+VwNLGHj5O8alQ6lZ2Yk8yfasbE0My2L:dSk8xA40wNLa5nyXryffx2

    • Detected google phishing page

    • Modifies Windows Defender Real-time Protection settings

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks