General

  • Target

    3ddd70c84a9ec071b512b06856d3671215d3e42854a7e0a8df1a357c8b0a2040

  • Size

    2.3MB

  • Sample

    240508-2s7gaaec35

  • MD5

    bc65c00ac467a16ea04730cc9d3bec2f

  • SHA1

    6453823b40cba73746b2bf0580b0835dfaf8182f

  • SHA256

    3ddd70c84a9ec071b512b06856d3671215d3e42854a7e0a8df1a357c8b0a2040

  • SHA512

    b7a7e60186fe117f2273c7298a7a668b5432b3a05363a52ae2be0af6c3ebd72971eeecccb2480f41d3d4bf1f37f7e7acb29912be4519c79f5332156fb14b09cc

  • SSDEEP

    49152:5GY5918NqwTEgTcQqlnKxbyXyXtQL5jDt9/ws2oIy2N4cojcECI2BDo:2hTPinKxbyiXSH9/ioHknrBM

Score
10/10

Malware Config

Extracted

Family

risepro

C2

147.45.47.93:58709

Targets

    • Target

      3ddd70c84a9ec071b512b06856d3671215d3e42854a7e0a8df1a357c8b0a2040

    • Size

      2.3MB

    • MD5

      bc65c00ac467a16ea04730cc9d3bec2f

    • SHA1

      6453823b40cba73746b2bf0580b0835dfaf8182f

    • SHA256

      3ddd70c84a9ec071b512b06856d3671215d3e42854a7e0a8df1a357c8b0a2040

    • SHA512

      b7a7e60186fe117f2273c7298a7a668b5432b3a05363a52ae2be0af6c3ebd72971eeecccb2480f41d3d4bf1f37f7e7acb29912be4519c79f5332156fb14b09cc

    • SSDEEP

      49152:5GY5918NqwTEgTcQqlnKxbyXyXtQL5jDt9/ws2oIy2N4cojcECI2BDo:2hTPinKxbyiXSH9/ioHknrBM

    Score
    10/10
    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks