General

  • Target

    2ef3c8666132e14c9211fcdf4397e4892e4d22c929e87c2bb3512683d6b32e1c

  • Size

    2.3MB

  • Sample

    240619-1dvcqssepc

  • MD5

    8da841cb866d453b27bc8e92094dad37

  • SHA1

    44edc58498b4ddaefffa502e42225fd52724cdff

  • SHA256

    2ef3c8666132e14c9211fcdf4397e4892e4d22c929e87c2bb3512683d6b32e1c

  • SHA512

    4fc3f745121a4c7ea627555fe39115afe5caecdea852a6b9afe411bac25ac3a0db72d0fcb193ab27ad1d373cd5c619b4115a61eedc887c1eea88949aa6f40bdb

  • SSDEEP

    49152:lK1JcS/9er1e5QT7Qweox9fjb52K1NxSHnugtWNtD4bgfJwRnVjOyTyhLIp:lEJRug5oE1215t1InugtW34MgbILIp

Score
10/10

Malware Config

Extracted

Family

risepro

C2

147.45.47.126:58709

Targets

    • Target

      2ef3c8666132e14c9211fcdf4397e4892e4d22c929e87c2bb3512683d6b32e1c

    • Size

      2.3MB

    • MD5

      8da841cb866d453b27bc8e92094dad37

    • SHA1

      44edc58498b4ddaefffa502e42225fd52724cdff

    • SHA256

      2ef3c8666132e14c9211fcdf4397e4892e4d22c929e87c2bb3512683d6b32e1c

    • SHA512

      4fc3f745121a4c7ea627555fe39115afe5caecdea852a6b9afe411bac25ac3a0db72d0fcb193ab27ad1d373cd5c619b4115a61eedc887c1eea88949aa6f40bdb

    • SSDEEP

      49152:lK1JcS/9er1e5QT7Qweox9fjb52K1NxSHnugtWNtD4bgfJwRnVjOyTyhLIp:lEJRug5oE1215t1InugtW34MgbILIp

    Score
    10/10
    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks