General

  • Target

    19b0257608327a0f9714e5da64e4aa12586058b8fc60dfc7cb5cd671b4ccb01f

  • Size

    2.2MB

  • Sample

    240414-z9m3vsgg3y

  • MD5

    59e6684c7166fe01caaf3dbda3b25723

  • SHA1

    bf11f85d319288a077a2af6453fbf848669dd5a3

  • SHA256

    19b0257608327a0f9714e5da64e4aa12586058b8fc60dfc7cb5cd671b4ccb01f

  • SHA512

    dfc742627bf0991fcb7606c2baf539340122f5658b48c17d396b7315052643f73426ccb38d23d6d2c441879e60bd08136a5289754a7c2dd9031f0f4727303e96

  • SSDEEP

    49152:1SUl6vD5DxN6HHLJFwXgX2KbwIj/TyV2IjRlkQM5Kcqxl/I320gH6KiSdp:1SSwD5DxkU82Dw/Tlu4Q/Tw32xLd

Score
10/10

Malware Config

Extracted

Family

risepro

C2

147.45.47.93:58709

Targets

    • Target

      19b0257608327a0f9714e5da64e4aa12586058b8fc60dfc7cb5cd671b4ccb01f

    • Size

      2.2MB

    • MD5

      59e6684c7166fe01caaf3dbda3b25723

    • SHA1

      bf11f85d319288a077a2af6453fbf848669dd5a3

    • SHA256

      19b0257608327a0f9714e5da64e4aa12586058b8fc60dfc7cb5cd671b4ccb01f

    • SHA512

      dfc742627bf0991fcb7606c2baf539340122f5658b48c17d396b7315052643f73426ccb38d23d6d2c441879e60bd08136a5289754a7c2dd9031f0f4727303e96

    • SSDEEP

      49152:1SUl6vD5DxN6HHLJFwXgX2KbwIj/TyV2IjRlkQM5Kcqxl/I320gH6KiSdp:1SSwD5DxkU82Dw/Tlu4Q/Tw32xLd

    Score
    10/10
    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks