General

  • Target

    file

  • Size

    894KB

  • Sample

    240130-ecvq8ahccm

  • MD5

    394053225ce68ffda0130ac44b5dd267

  • SHA1

    d28c4eb5a5549ee167202632b76d668a481439b5

  • SHA256

    33ff064aa88074215128f29b64291eb475fbd49f9eaa915ead4f56dc4501d37a

  • SHA512

    198e8b2acc91cbc149c9a0cdae89cdd7c24032faac829f7c020d51140141b15930043a034d843f43b37d8f4a3cf66a880c50f744364b1e944a98b702d4cdbee3

  • SSDEEP

    12288:KqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgaE7b:KqDEvCTbMWu7rQYlBQcBiT6rprG8aMb

Malware Config

Extracted

Family

risepro

C2

193.233.132.62:50500

Targets

    • Target

      file

    • Size

      894KB

    • MD5

      394053225ce68ffda0130ac44b5dd267

    • SHA1

      d28c4eb5a5549ee167202632b76d668a481439b5

    • SHA256

      33ff064aa88074215128f29b64291eb475fbd49f9eaa915ead4f56dc4501d37a

    • SHA512

      198e8b2acc91cbc149c9a0cdae89cdd7c24032faac829f7c020d51140141b15930043a034d843f43b37d8f4a3cf66a880c50f744364b1e944a98b702d4cdbee3

    • SSDEEP

      12288:KqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgaE7b:KqDEvCTbMWu7rQYlBQcBiT6rprG8aMb

    • Detected google phishing page

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks