General

  • Target

    b4fd92ece09ae2db9f8d30b897ab2a5f521854654fd9d2defd558b9c2a9bcd95

  • Size

    2.3MB

  • Sample

    240524-stt3xaag93

  • MD5

    15800b4c891ac090707181ce15ab1e23

  • SHA1

    3a6b0713a33ec01b7ec6d004cc1b9ef075c2851e

  • SHA256

    b4fd92ece09ae2db9f8d30b897ab2a5f521854654fd9d2defd558b9c2a9bcd95

  • SHA512

    2b0bff85a7c89cac91d7d23b1f1153e3452e8a9df3761802714706131980d7400b79427dcb89c381ebedca3185fb7b7c957b1cd629e6cefc2cdb600d2fb57634

  • SSDEEP

    49152:QkmKhyq24kI3qebVa9MZLNg4huWHfYiTH+a6TlSsyI4Ec116:QkmKEqlkAbkom4hRHfrj+PMsyEcb

Score
10/10

Malware Config

Extracted

Family

risepro

C2

147.45.47.126:58709

Targets

    • Target

      b4fd92ece09ae2db9f8d30b897ab2a5f521854654fd9d2defd558b9c2a9bcd95

    • Size

      2.3MB

    • MD5

      15800b4c891ac090707181ce15ab1e23

    • SHA1

      3a6b0713a33ec01b7ec6d004cc1b9ef075c2851e

    • SHA256

      b4fd92ece09ae2db9f8d30b897ab2a5f521854654fd9d2defd558b9c2a9bcd95

    • SHA512

      2b0bff85a7c89cac91d7d23b1f1153e3452e8a9df3761802714706131980d7400b79427dcb89c381ebedca3185fb7b7c957b1cd629e6cefc2cdb600d2fb57634

    • SSDEEP

      49152:QkmKhyq24kI3qebVa9MZLNg4huWHfYiTH+a6TlSsyI4Ec116:QkmKEqlkAbkom4hRHfrj+PMsyEcb

    Score
    10/10
    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

1
T1082

Tasks