General

  • Target

    archive.rar

  • Size

    9.7MB

  • Sample

    240623-c5l9fawhkb

  • MD5

    0a006e9b4fbfc5d97e977f9faeb08032

  • SHA1

    126705eb8c9ef8fb8ed5298f090c977acc8a3ff3

  • SHA256

    71d5519808acc096442cfe563f176726faed6ec7ffef19694c09597dc3f33e7c

  • SHA512

    d52e71bb791c197a271adbc9b8063dd687a8101010688a9594b7c658bd0873e5470f832df197c89e28ab368944a76a4f1e7fded1eb23e8342b73064ec868d62b

  • SSDEEP

    196608:N3wJD+zZcLYX2P63//Vifq0xYhJDdaPjGaqdAzJ5rFs49gCsLdKSncSJxFObNawL:NgJazwzP63//VF0xYRaPjGaqIxFOJxFG

Malware Config

Extracted

Family

risepro

C2

77.91.77.66:58709

Targets

    • Target

      amdhip64.dll

    • Size

      10.1MB

    • MD5

      da6bba744ffe35bd63e61ef2824ff15d

    • SHA1

      54f12b2bc458c72e071cdff727c4a2f7a33d0ab5

    • SHA256

      66d5725519eec9f0c16696c9bcf32ba3442551f36ec4bdb17e12f6e0d24027c7

    • SHA512

      74ba3f3c817fb0519b42e7f68ac8d87692e461c1a8529ae86051bbf891350bab05023046da6b69648681e26656624c97bac9707938511190e1dab8afd45ded4a

    • SSDEEP

      98304:FqFhXse/Y7jUHRRFcwETkorMg/696ffjZMXNDVjCXN2MX2:AXs37juRTcwETkGMUjZMXNDVjCXN2V

    Score
    1/10
    • Target

      concrt140.dll

    • Size

      309KB

    • MD5

      31f210ed5c6f2d8faa1d896cda18584b

    • SHA1

      5444d919f5014fb6bf58cefc6f01088c32a24a00

    • SHA256

      5393f592cded7bd8ae07b2afc3efdcc4a0b05f7e8e74380a267398266fc02d41

    • SHA512

      d39aa7acfd982759825b537a9ca5b04e6cdd9c0a28089e0f666ae4b75e84e2e2e58180103da38bea79efe3252cb9f1932efa69b64461cb76173645e8b6ddf3f6

    • SSDEEP

      6144:Ylm+bq4hSdOec4xWMXdtvo4KbrniIzb7wQjnWzgCE33g:pmP/eJXzvSCzW3g

    Score
    1/10
    • Target

      res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc

    • Size

      114KB

    • MD5

      a2f3ded45da8870e93e5d2186dab27e8

    • SHA1

      3f8e0cddecc3827b33ec02cd78d192c18f1ddf82

    • SHA256

      fc19237a4e9ae65829dbde384ce0de2c78b22d9577384dded9d4cde569a12742

    • SHA512

      438621491061c7f14f59c48d0d2fdd637a17c058df13417e21d660d81632dbb826a6144032f6f9192ab9bb0afb46b8f6cf3982879dc9942261c2538dbd17187c

    • SSDEEP

      3072:k6BVH7SBjeSCbupKVfG2yQJ23J+Svsy9k/TukuPMh:zrbKeWmDyQ+13kOPMh

    Score
    3/10
    • Target

      setup.exe

    • Size

      783.9MB

    • MD5

      19eea7f3029f18151248d8b9da4a7dc8

    • SHA1

      27ef2f1d259d6e0dc46b7d9d5c6b536aa375ee66

    • SHA256

      5480c04777da228035aa559b44ada97522ad74fec8ccce7ceb68aecb5037c713

    • SHA512

      1f82f9d66b7d82658da3c013087b6a556276f11ae9e9e4de086f8b6abfbc483b4f23bbfae0ee1b7fb107a5db425e912219cae8943e6de0992a52e2e86f1665e9

    • SSDEEP

      98304:H0GY5U8qanZoRgrR7OzJEKMxoi1JuwendJHlc24euTPCTGrQl:HrY5DqS4gEzJEKMDjLadjLGrQl

    • Modifies firewall policy service

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks