General

  • Target

    09949e70c26db70e2f15c29a95fe129b6827ae1d035eb62f66a9ef761f5c4a7c

  • Size

    4.5MB

  • Sample

    240415-mqldpscd88

  • MD5

    7f8c46da5979128e26c7b1f1b008cc9f

  • SHA1

    f960a8158b430c6953e8c609cb18b60deda961e1

  • SHA256

    09949e70c26db70e2f15c29a95fe129b6827ae1d035eb62f66a9ef761f5c4a7c

  • SHA512

    b6362d99f5d848c68c1af06b89fc9a7bc7630230c3b7ae47c3cbdfd385d72924803019215e7c3694de50a50978112543b64bb98cb10906d061ea28f5955b9370

  • SSDEEP

    98304:43cjQaNlzzLeQFK7eCL/s2x4rRJMSMOJnEizIx/7S:4sjQarjeLe04rR+/aEzxm

Malware Config

Extracted

Family

risepro

C2

193.233.132.253:50500

Targets

    • Target

      09949e70c26db70e2f15c29a95fe129b6827ae1d035eb62f66a9ef761f5c4a7c

    • Size

      4.5MB

    • MD5

      7f8c46da5979128e26c7b1f1b008cc9f

    • SHA1

      f960a8158b430c6953e8c609cb18b60deda961e1

    • SHA256

      09949e70c26db70e2f15c29a95fe129b6827ae1d035eb62f66a9ef761f5c4a7c

    • SHA512

      b6362d99f5d848c68c1af06b89fc9a7bc7630230c3b7ae47c3cbdfd385d72924803019215e7c3694de50a50978112543b64bb98cb10906d061ea28f5955b9370

    • SSDEEP

      98304:43cjQaNlzzLeQFK7eCL/s2x4rRJMSMOJnEizIx/7S:4sjQarjeLe04rR+/aEzxm

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks