General

  • Target

    6a1cb476361b5a6f4ed81601776c9f6fc1de2db9787f35782b82afd5234f26cb

  • Size

    2.3MB

  • Sample

    240622-jp4xwa1frd

  • MD5

    f9f8c0f34e831c22d45caef48211c8fb

  • SHA1

    3066976d87c2b6a6f576c6eea4e1658da54208a8

  • SHA256

    6a1cb476361b5a6f4ed81601776c9f6fc1de2db9787f35782b82afd5234f26cb

  • SHA512

    bbb3eb9f8954fcbc60a8d6a3f84c11e4345d822d278d30ce64bbcc070016c36dc11b77a8f99d05ee637853f8b650e460722d94446ff4fbefcf1fe28ac4cf2c93

  • SSDEEP

    49152:s3i8ryVjMj9k6xowXYEbOcSQArd992CA1GK3PDv11W2V6NgGSE2Xs:s3hWK5x1t6N59I1GWj1s2DGoX

Score
10/10

Malware Config

Extracted

Family

risepro

C2

77.91.77.66:58709

Targets

    • Target

      6a1cb476361b5a6f4ed81601776c9f6fc1de2db9787f35782b82afd5234f26cb

    • Size

      2.3MB

    • MD5

      f9f8c0f34e831c22d45caef48211c8fb

    • SHA1

      3066976d87c2b6a6f576c6eea4e1658da54208a8

    • SHA256

      6a1cb476361b5a6f4ed81601776c9f6fc1de2db9787f35782b82afd5234f26cb

    • SHA512

      bbb3eb9f8954fcbc60a8d6a3f84c11e4345d822d278d30ce64bbcc070016c36dc11b77a8f99d05ee637853f8b650e460722d94446ff4fbefcf1fe28ac4cf2c93

    • SSDEEP

      49152:s3i8ryVjMj9k6xowXYEbOcSQArd992CA1GK3PDv11W2V6NgGSE2Xs:s3hWK5x1t6N59I1GWj1s2DGoX

    Score
    10/10
    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks