General

  • Target

    fe5be5ff162a221b24a51de0d95f8162d2e17d93ca42676e28f4382213b2e41b

  • Size

    2.3MB

  • Sample

    240604-plre9sfh6y

  • MD5

    4b37f77b92e8746d59ce93213330eeb0

  • SHA1

    298b7007838487c21189ac353f5166004bbfb584

  • SHA256

    fe5be5ff162a221b24a51de0d95f8162d2e17d93ca42676e28f4382213b2e41b

  • SHA512

    6ff3b4f668e3708821036be68567ff74f0eba9a07fb0c05afd4a1a254ba0471f3e8ba2e14d7e2e1227d4eaa93586f8f0cfe119cf891ff28f05c27779f5e32ec9

  • SSDEEP

    49152:uX+O1msuCzqAqHBHj/Npl3tMRYlGYlGop1hsYBUJQolBtVGH4rqvRGh0v:uX+aucq9/Npl3b3wopDZUJP1/rqvck

Score
10/10

Malware Config

Extracted

Family

risepro

C2

147.45.47.126:58709

Targets

    • Target

      fe5be5ff162a221b24a51de0d95f8162d2e17d93ca42676e28f4382213b2e41b

    • Size

      2.3MB

    • MD5

      4b37f77b92e8746d59ce93213330eeb0

    • SHA1

      298b7007838487c21189ac353f5166004bbfb584

    • SHA256

      fe5be5ff162a221b24a51de0d95f8162d2e17d93ca42676e28f4382213b2e41b

    • SHA512

      6ff3b4f668e3708821036be68567ff74f0eba9a07fb0c05afd4a1a254ba0471f3e8ba2e14d7e2e1227d4eaa93586f8f0cfe119cf891ff28f05c27779f5e32ec9

    • SSDEEP

      49152:uX+O1msuCzqAqHBHj/Npl3tMRYlGYlGop1hsYBUJQolBtVGH4rqvRGh0v:uX+aucq9/Npl3b3wopDZUJP1/rqvck

    Score
    10/10
    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks