General

  • Target

    1a63d8983b428b10a63f39c32963efeac4a3748c02c11c7c0c6ff956161f696c.exe

  • Size

    5.7MB

  • Sample

    240314-cjjanaac23

  • MD5

    0c299a10aae5a99733228d9ad1e1a658

  • SHA1

    277eee7771e3b90c69ed761d62d989e9805ed422

  • SHA256

    1a63d8983b428b10a63f39c32963efeac4a3748c02c11c7c0c6ff956161f696c

  • SHA512

    eeda45fc7e020bce454762c71d01ab29716ea6874c5833d4f51fabe76793adafc7abb113910051dad0d74b3ba5490cd001b3b6b1cfcd685b8cd0bc8937e88c4d

  • SSDEEP

    98304:rtVOpgZT/20v/q3ewOt+nZSKhFr9QKHq34bzw/92J+C:rtg+Z9/6ewOPs9U4fwY4

Malware Config

Extracted

Family

risepro

C2

193.233.132.57:50500

Targets

    • Target

      1a63d8983b428b10a63f39c32963efeac4a3748c02c11c7c0c6ff956161f696c.exe

    • Size

      5.7MB

    • MD5

      0c299a10aae5a99733228d9ad1e1a658

    • SHA1

      277eee7771e3b90c69ed761d62d989e9805ed422

    • SHA256

      1a63d8983b428b10a63f39c32963efeac4a3748c02c11c7c0c6ff956161f696c

    • SHA512

      eeda45fc7e020bce454762c71d01ab29716ea6874c5833d4f51fabe76793adafc7abb113910051dad0d74b3ba5490cd001b3b6b1cfcd685b8cd0bc8937e88c4d

    • SSDEEP

      98304:rtVOpgZT/20v/q3ewOt+nZSKhFr9QKHq34bzw/92J+C:rtg+Z9/6ewOPs9U4fwY4

    • Detect ZGRat V1

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Detects executables packed with Dotfuscator

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks