General

  • Target

    r.zip

  • Size

    22.5MB

  • Sample

    240524-mxkqraed49

  • MD5

    18bfae76ab819f24d88fbfcb200562d1

  • SHA1

    c3764f0492f1588f97d8e66e3f3dcb17d4507fa1

  • SHA256

    3bad5318d1eadf9f6d544fc5ed49c1e737fb2db130f60b70bab6f26392c87c30

  • SHA512

    33ee2df1d3d97ffd27a748581c249bd6db15e0d79166bab10f52b1b44ea5c849ea311e0d2a4d9df8d5b106f885cb64910ae32da34a0b39177c957ed7437c42ae

  • SSDEEP

    393216:djKXkNMCwwfhtdWpL5K/0VWxfOrM1U5RmpDa/ZqBvZvS2paNWqU24rQnbEHvU:9KUNBJWO/qWB9J5a/ZKvMN15eQbEPU

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Extracted

Family

risepro

C2

194.49.94.152

193.233.132.51

Extracted

Family

mystic

C2

http://5.42.92.211/

Extracted

Family

redline

Botnet

lutyr

C2

77.91.124.55:19071

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Extracted

Family

smokeloader

Version

2022

C2

http://81.19.131.34/fks/index.php

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

taiga

C2

5.42.92.51:19057

Extracted

Family

redline

Botnet

kedru

C2

77.91.124.86:19084

Targets

    • Target

      09d331a688384c2805b4ec4c498f7514d5a4bc6b953eff0ac62ec7820785b5e1

    • Size

      1.1MB

    • MD5

      a27c8f92315fff917e750c7b89355067

    • SHA1

      f65c7a885fddf4bf583dbab9bc512e789aaba54b

    • SHA256

      09d331a688384c2805b4ec4c498f7514d5a4bc6b953eff0ac62ec7820785b5e1

    • SHA512

      e73ce1b88e20897d61bb259b0ca7110684c734add5ca22f7ed919a9d1fe711dd42a2b58b4a8c359463e29720770ae2ec12d9853d6be390d2f0eafff828219364

    • SSDEEP

      24576:eyHOpuii4QQInraJDD2qk1cFF7K6AFjv6ojMmDo9kQaYo:tHUi4QTraDD2qk1a0fzBVWx

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      0e5a6d1212e96cbec9340713347cf31edfd53309be8f47f64e346582b70d4ac7

    • Size

      1.4MB

    • MD5

      7837fbac380dc8a10ad779861b8ee3db

    • SHA1

      bf713fc0637bcce4923f8ff4beaf7aa59e3505fd

    • SHA256

      0e5a6d1212e96cbec9340713347cf31edfd53309be8f47f64e346582b70d4ac7

    • SHA512

      b5d95777ce044dddd1c58635130f8fa80ad0ea7f70fa22c5e28e0109c1b531f6f26598bc7518f1bd498439bb8dfbaf248b6eb4f54d6f83bf8b382f8325eadef9

    • SSDEEP

      24576:GyY5vgwLFrmztJHfpp84qup6DeEFO/gZ3Ufui4SyDUkPUYvnbAQsvcl:VYFpRrmLZqup6K2OohHkyDUkPhPbAb

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      18791f14fb58ffbff4ff37ff130565a68896eb2ff4866deeb21e8c1911b86749

    • Size

      1.5MB

    • MD5

      b23eabcdc1fee8a2709e000cf0b7ddad

    • SHA1

      31970d062ede14d475d8eb2bc32700bed180b876

    • SHA256

      18791f14fb58ffbff4ff37ff130565a68896eb2ff4866deeb21e8c1911b86749

    • SHA512

      e9876a547eb5a78221e37b311af3f5aadbd28bb172dcd7aa53a80dade36c468922b3e4ca194c0e6e56122cac2e238053b9c8fd4c4af6f88e1f4adfafce719381

    • SSDEEP

      24576:HyhP8luo3ui/TREl1jNbyKsbpougGpk2ei0dnIwwROSclqIUMo/wxC:Scuo35TMNSFoFGpk3HdIvUlqI8/w

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      192d57a5a279ef9bb8cdb35f53d0fc7c8893aca2545c81175b23857bc54fc125

    • Size

      1.4MB

    • MD5

      540279474adae3b36deb77ab62dbfd44

    • SHA1

      fb2f936ecc76d7949c101fb665f5d0ea8d4c04ff

    • SHA256

      192d57a5a279ef9bb8cdb35f53d0fc7c8893aca2545c81175b23857bc54fc125

    • SHA512

      45311689850dd286fdc30ff2bdca66d5bed753311974ce98150755ba6fe59a95806154abe685ef6ff2a45d87384e119df791cdbace9f6f56749f047bbab112ff

    • SSDEEP

      24576:VyM5eKaQAhJoi25ceRIsZ7rGDEqDj2vVnZ3mdHC8a0rvlNmFcAkXqu4fLmd8o:w3m2y7SeKqPGzGvj3m1FNm+/XJm

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Target

      1f41b39d2b8ae20411682600943b3adf98567e247168192fb07ff103e71c9710

    • Size

      909KB

    • MD5

      89eb57f8336e4fa95663f64fd2ba5fdc

    • SHA1

      30bc23cd4d7c49326423ffea9e9fd24a60214ca1

    • SHA256

      1f41b39d2b8ae20411682600943b3adf98567e247168192fb07ff103e71c9710

    • SHA512

      4c9811e15a74664c58f2f00efae5d607fcc576ae98de97e993eac663b90281e33b9634c88f1ce702cd04f5e24418b8c4117ed5fd0a2ab39debf3276de8d9f18c

    • SSDEEP

      12288:SMrfy90DOZ2s5Ze9aC1cx+aA8q7PPCxXaFFn/sAONQzkuuvtICQPQGG:ByHo+8kCS4aubCY//kSkBmCQPQGG

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      2298c1857648a2d03e7260fec6bd85ba96ff550973a7c8df1efc3ff5ee212abb

    • Size

      1.1MB

    • MD5

      be180dec7e13fe1c2b75fde7469e9c23

    • SHA1

      cda46df97e37b55146d41e4d5710f4bc511f8d58

    • SHA256

      2298c1857648a2d03e7260fec6bd85ba96ff550973a7c8df1efc3ff5ee212abb

    • SHA512

      dee4b6e2700fd94e814706e1721bd342fbe433671780d2bf1e59c3541d52a791aa0204a1900293a584d9fa2cdbf6dc214e742283a07bbc0e832f3605c2a35194

    • SSDEEP

      24576:HyiVlna2DSBNRzXuTJ0RqbsvdLh+BOyvr7W3tvzAg+bGtK6Z:SWpENcVGqQvdgBOyvr7W3tvzAgTM

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Target

      2ec7b7ec25de047e7eb1cd8f27cc8f7e111c7ac68d37c56e3938dee25147cbb3

    • Size

      1.1MB

    • MD5

      cf1fdcfe7b25b7ebfd12dcaa33226982

    • SHA1

      2d143f32b6229858603a3392b2d464c30c950cc3

    • SHA256

      2ec7b7ec25de047e7eb1cd8f27cc8f7e111c7ac68d37c56e3938dee25147cbb3

    • SHA512

      853a78a93e86582ae51e0df7ff03e94d34c3ebdf2a9e8c9f6db8460e3d603db184bdd3ff1316ac771655025a307da938f7de64540937830f939a31d3070437eb

    • SSDEEP

      24576:oyx0bVLDdTBOpukxKa031MMxngQJhcRPR6OEMrQniGG469pMyFYWXtEB1nXg:vSVLhgpvY3CdPMpnXGLMa9EX

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      2ff63e46365253076d5f6b65419f2c4110f1ceb32dbb57c43db28076bdd031cd

    • Size

      1.5MB

    • MD5

      aae7f482bfe7c21a481723c9a5899652

    • SHA1

      318847e283e35ff787b107c9c983475695e4c610

    • SHA256

      2ff63e46365253076d5f6b65419f2c4110f1ceb32dbb57c43db28076bdd031cd

    • SHA512

      0cbdfb10b2688cc78211761c958e4ee59ade8d22d4d9b7d9ca631b356e16718af7cca3b6801469198635591692a6b3a82f8e037e736767ef5993b8b0cb12776a

    • SSDEEP

      24576:pyLBNmVT0hDWpuvzN9YvucPnqKuzvPhSj/zRroKW:c0kDUurN9YvZP/uzvZCl1

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Detected potential entity reuse from brand paypal.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • Target

      3105fb3a2cc9654d1eac3354da0a10dfc792e32266a2a7a18fe16764e0b6bff2

    • Size

      753KB

    • MD5

      bb9c11cf568dbae8bd9f0e19d562235a

    • SHA1

      08ef37baa4e2574ebed4d616dd2a8a8f2087c13f

    • SHA256

      3105fb3a2cc9654d1eac3354da0a10dfc792e32266a2a7a18fe16764e0b6bff2

    • SHA512

      20bb622e938e58ce20de3ba1db3359c420895ca631024f8792dc37c7840aafc67f0e26abac0cb6ff87fc27f255e87ad18d190a2306cd6bc657d16a898b7b2478

    • SSDEEP

      12288:/Mr6y90RYqYRxyO2Yky7fmE1ynuR/mJKv6G9rr0Q2LN6izy8cFvlXp:dyI9YRxD7FSE0nuRqA6GwQ2R6JZFvlXp

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      5233b9c00ad7ff437dc70a2133e2e6251bcd63221cf9acbc7f1f8b00c9305c79

    • Size

      895KB

    • MD5

      0721b544aaf0359c0f310cbc448d3d65

    • SHA1

      a4f8593939e868dbae1d8b1323b58124e3741a52

    • SHA256

      5233b9c00ad7ff437dc70a2133e2e6251bcd63221cf9acbc7f1f8b00c9305c79

    • SHA512

      10a70297d06cbcd968b6c3490c4ed12dcbe074038ac169bdca48e540814d7732b26d7d1861b360e0749cda83e82e9da90ba21ef53d0957b40737b8151abb51b4

    • SSDEEP

      12288:nMrOy901KMmvVAZdBzcW7jPw+i4P5dOglj/jPd+69FzvPUQOIxLaJh5li+7GSAYc:dy5aZdBcW7jo+iY5jlnPdtzzcaG1c

    • Detect Mystic stealer payload

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      71ffbb500f4a8485edaa4aaeea3a716a9bbef886b7e16859b9f251f26a975963

    • Size

      888KB

    • MD5

      b9525c7d048b2fbda76cb69db016a079

    • SHA1

      c2f87a4214b6c1394192bbe4a32a68c5b0f2c70b

    • SHA256

      71ffbb500f4a8485edaa4aaeea3a716a9bbef886b7e16859b9f251f26a975963

    • SHA512

      672398598b3a5a56727cf2a87c5c9bb28d5ac92a53ad5d456f669c327bbfa0dcf97d4dc1fce3ca5a3d1bba5af14e8d1efd3703034881bb2cbcb4d1253dc2510e

    • SSDEEP

      24576:/yPXtYjSDrBNRzGDFv1JkyKbo+2VV+OI5+X9:KPXtY+5NwDVDrK8+22OI

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Target

      88b74d8884f09632e668bea54668a44beb33e28e6d34636e7b8888fffc0f0f16

    • Size

      646KB

    • MD5

      0298257cd8a0b8b794370bac343a2112

    • SHA1

      ef4bdd3a890c35d404fb860b0d303239ea4bba09

    • SHA256

      88b74d8884f09632e668bea54668a44beb33e28e6d34636e7b8888fffc0f0f16

    • SHA512

      0e045ee6a7e7d290b8221efe28bc9f434f92c9864ac5b0d8409e3e0e9a9ff702daaab9dfce9032eafabb680aa76a7ffe684f5bb93612c71f8ad1ec006d4b0afd

    • SSDEEP

      12288:1Mrfy90I6MtVRZJn8mMJqSxdWmWdrBPqsJGm/qBIH7/rwIg3pEvUnF:eyRpZh8xhWdrtXkfeTL2pEqF

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      93a899efb0c194800223fca15c717009673f08a1a62d33fa602dfbcbc0b26454

    • Size

      2.1MB

    • MD5

      155d142955e7ff8f5534710b55af6954

    • SHA1

      6ed09060a0d774842db8eba25e78e987009a7522

    • SHA256

      93a899efb0c194800223fca15c717009673f08a1a62d33fa602dfbcbc0b26454

    • SHA512

      e4cdbbdbbeab5d787ce36ca403d6427cf77c9464bea4b3d1ac9c89febac4d5c71f3a25ff9895b63a37e79026900629b4bc0af4953dac8cb7acdf8769c623af68

    • SSDEEP

      49152:yVE8IIQ+bv+WEgM+KqugEd0Yo2v4ooB6hbc6vKX4E:jIQ16Ct0YoHEM

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Target

      99144a8cae61109b46016ef756589ba3aa71222da541e3bda432b738f7469d06

    • Size

      1.3MB

    • MD5

      904fc61b1f44c5223a3c954b4cc2752d

    • SHA1

      fff176e87a9300b428235e8c991fc4620002e646

    • SHA256

      99144a8cae61109b46016ef756589ba3aa71222da541e3bda432b738f7469d06

    • SHA512

      dc2eca434302c7988352395784452acf238aa57c440e789e8d507a695a10856aa36cbd2fdbd72854862b30350c8150c02e7e807ea6f2f76b18be46a376dd8749

    • SSDEEP

      24576:0yzM9afmu263sRRmqwwLa5kbuI1T6CYDjJWjCCJIEFcOrrG4KRNy:DGHM8RRm55kiIgCEkj2EFcOfGX

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      9c6fad81c8c5b4e4185f597e8ecb47fd56f1147c7c2bc851eb0e36a99fa9b019

    • Size

      1.1MB

    • MD5

      58d2366a7da08273a6dbfac85d214bc8

    • SHA1

      1b4da509e7014c5e346c95adb1d4bf23aa451a96

    • SHA256

      9c6fad81c8c5b4e4185f597e8ecb47fd56f1147c7c2bc851eb0e36a99fa9b019

    • SHA512

      ad5d49b9ed43893f1a01aee6b99e6b029506837d645265ca4f4d8a41bea35b0ba370a63a315bac9b1379a01d79d8b1e34d0ddc68132c774fd1fda38b53a55ee7

    • SSDEEP

      24576:WywbLHyczegdbC1KHBVDqOgSaPQ77kLW/X6FBKnoqyEA:lwPH7qgFC1KHrDozI7Yo6FGyE

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      b0c7a00ab444001cd63f40a54db27100ea773e014721080a2b1279c33f37269d

    • Size

      1.1MB

    • MD5

      a36615107717ece0c2cfacb7d7c76907

    • SHA1

      d8158782d730be783d9400f822dc38deeb87fcb3

    • SHA256

      b0c7a00ab444001cd63f40a54db27100ea773e014721080a2b1279c33f37269d

    • SHA512

      bcd47adbc0f9ec17d917954ee968ec1cb73280979e6edfec2980c95be1355407b65ce4bac92ac0df2401917d388776c53577eff8a0c85dc97d3bf69501547b0c

    • SSDEEP

      24576:5yo/X7xqtcdAeeeRv8CntOFdrANsA/Veji5:s67xucdp82tOHpS8

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      cbf11756881901fd292b570bc3bb19b579c924b2d7f37bb2cf69de109a1da4f7

    • Size

      398KB

    • MD5

      6926a7c5164bb1bce0fb0fc33212c8b6

    • SHA1

      cda8612e09133e99c3ff370a94c5cca211e0124b

    • SHA256

      cbf11756881901fd292b570bc3bb19b579c924b2d7f37bb2cf69de109a1da4f7

    • SHA512

      2202c376244694891ea3ee0498cb28078471ce17f274875baa4065cbb65568a3e62bc95b21e60893c0896f4878751ccee533bec6d58821e1f059c6e9dcde79e1

    • SSDEEP

      6144:Kly+bnr+1p0yN90QEFEEnhxIdGdj8+bRLW0V7t5J56AVOL+tBckozYmN8T:LMrxy90DEEwm8KLW0pt5J5pV8+okcE

    • Detect Mystic stealer payload

    • Mystic

      Mystic is an infostealer written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      d722251ee6167c7e35bae3b84b679d483609f718be9b0d4851cca6d9ccfdee28

    • Size

      494KB

    • MD5

      cc17f7fd65eb5807c669a72e1ebce8e0

    • SHA1

      ccb2679da3d2c11a41afa43b1478a0a1fecc7d28

    • SHA256

      d722251ee6167c7e35bae3b84b679d483609f718be9b0d4851cca6d9ccfdee28

    • SHA512

      2c46d80178f89757c5a5b4f793f03227f1d7d63eb0e56a5fbadf0f891828cfe3e59678ff8721336c2b12c65a35f52418fa72d52d500cc1d4ed6fa371e511f0ad

    • SSDEEP

      12288:ZMrTy90wT1Wf73gyrtJ/xO6gn9t3bqS1HDUY7QYbhkc:KylT1Wfbgy//Sz3vHDUYk6kc

    • Detect Mystic stealer payload

    • Modifies Windows Defender Real-time Protection settings

    • Mystic

      Mystic is an infostealer written in C++.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      daa8bcc1daced201a8aefaa114e1461b21ab9e5e8728c6d43210d648bb0ba0f2

    • Size

      2.1MB

    • MD5

      afe0c2cf35bf507d5ddf98521f598c8d

    • SHA1

      f29f846fe109d71c7b06effb62c725400f92eba2

    • SHA256

      daa8bcc1daced201a8aefaa114e1461b21ab9e5e8728c6d43210d648bb0ba0f2

    • SHA512

      235876257c8fb6cd4c185f1b8c7ea5499b5da6abaed35efac4363d1f150440de8ac11f41f422e73ca5d191ab5b25df0f663b651bb1e8dbb068a9b1791c56d6ff

    • SSDEEP

      49152:uxIYb9oY0LW8LicTGjz0neoPAkhqVP58xilKRLDzMRAIXCaMVgC:32qYZ1cKE4kCP5ArRvzwXEVgC

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      e2046b06e3810ca229ccfdfa24bc43ef690f3fb1808988596f1eec296ceadf39

    • Size

      1.6MB

    • MD5

      25eceff587aa9a2c07d4908c965120b0

    • SHA1

      27e6af6ffccb125ed6baa1160d2bee315425bcc2

    • SHA256

      e2046b06e3810ca229ccfdfa24bc43ef690f3fb1808988596f1eec296ceadf39

    • SHA512

      2f85ec186fceb18c1f1776ccdf6c5f4e3cc9b3c78c8cebe348f403a5bf7aec9fcd9ce960e1c9b17ffd4eae4910b1acd8a216d67e48329dd31c42a5129c844f0e

    • SSDEEP

      49152:AfAwDCP8V0NvKYbn1w1JudvDO6EM+w6ac:cD0NieLOFb

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks

static1

Score
3/10

behavioral1

privateloaderredlineriseprohordainfostealerloaderpersistencestealer
Score
10/10

behavioral2

mysticredlinekukishinfostealerpersistencestealer
Score
10/10

behavioral3

mysticredlinesmokeloaderbrehabackdoorinfostealerpersistencestealertrojan
Score
10/10

behavioral4

paypalpersistencephishing
Score
7/10

behavioral5

redlinetaigainfostealerpersistence
Score
10/10

behavioral6

privateloaderriseproloaderpersistencestealer
Score
10/10

behavioral7

mysticredlinekukishinfostealerpersistencestealer
Score
10/10

behavioral8

privateloaderredlineriseprosmokeloaderhordabackdoorpaypalinfostealerloaderpersistencephishingstealertrojan
Score
10/10

behavioral9

mysticredlinekedruinfostealerpersistencestealer
Score
10/10

behavioral10

mysticsmokeloaderbackdoorevasionpersistencestealertrojan
Score
10/10

behavioral11

privateloaderriseproloaderpersistencestealer
Score
10/10

behavioral12

mysticredlinelutyrinfostealerpersistencestealer
Score
10/10

behavioral13

privateloaderriseproloaderpersistencestealer
Score
10/10

behavioral14

mysticredlinesmokeloaderbrehabackdoorinfostealerpersistencestealertrojan
Score
10/10

behavioral15

privateloaderredlineriseprohordainfostealerloaderpersistencestealer
Score
10/10

behavioral16

privateloaderredlineriseprohordainfostealerloaderpersistencestealer
Score
10/10

behavioral17

mysticredlinekukishinfostealerpersistencestealer
Score
10/10

behavioral18

mysticevasionpersistencestealertrojan
Score
10/10

behavioral19

privateloaderriseprosmokeloaderbackdoorloaderpersistencestealertrojan
Score
10/10

behavioral20

privateloaderriseproloaderpersistencestealer
Score
10/10