General

  • Target

    5d8af0dc9132493cd4b7a509f2d89cd82d9370c23cb745232e5ceed8a5919115

  • Size

    2.3MB

  • Sample

    240526-w2tznagb84

  • MD5

    b06e29cf7cb9e9b0155886ea9d10d263

  • SHA1

    d5a8afc042d33558e50896439e1ce06af1e23cc0

  • SHA256

    5d8af0dc9132493cd4b7a509f2d89cd82d9370c23cb745232e5ceed8a5919115

  • SHA512

    8e0309065b3e142004ceda88b8314c1f63449f0ae63fb33660f016c977ed82d1dcc7f4ff2ebe3dcb50e11dc856b9f2175807c55bc2dcec181d4fb5ec07b00a00

  • SSDEEP

    49152:9kmKhyq24kI3qebVaTGfyP0yj/OZU9X+3RWnjT5sd2KyzSN:9kmKEqlkAbkSfyP0yaZUNkYnjT5IyzS

Score
10/10

Malware Config

Extracted

Family

risepro

C2

147.45.47.126:58709

Targets

    • Target

      5d8af0dc9132493cd4b7a509f2d89cd82d9370c23cb745232e5ceed8a5919115

    • Size

      2.3MB

    • MD5

      b06e29cf7cb9e9b0155886ea9d10d263

    • SHA1

      d5a8afc042d33558e50896439e1ce06af1e23cc0

    • SHA256

      5d8af0dc9132493cd4b7a509f2d89cd82d9370c23cb745232e5ceed8a5919115

    • SHA512

      8e0309065b3e142004ceda88b8314c1f63449f0ae63fb33660f016c977ed82d1dcc7f4ff2ebe3dcb50e11dc856b9f2175807c55bc2dcec181d4fb5ec07b00a00

    • SSDEEP

      49152:9kmKhyq24kI3qebVaTGfyP0yj/OZU9X+3RWnjT5sd2KyzSN:9kmKEqlkAbkSfyP0yaZUNkYnjT5IyzS

    Score
    10/10
    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

1
T1082

Tasks