General

  • Target

    3dbb8aa00e1cb82555860839271560e1d701e4c7cb1a6211e808ba91bb106034

  • Size

    2.3MB

  • Sample

    240624-ty25raveqj

  • MD5

    d6f71c348a73e9cde5155f26b82c88b2

  • SHA1

    89e4b53a9eecb6f532d9f71d9c4d9927436252bf

  • SHA256

    3dbb8aa00e1cb82555860839271560e1d701e4c7cb1a6211e808ba91bb106034

  • SHA512

    21795b17b3ff7d1060aa12cd98bd5931b1b3bfff7e4d70f9601f58ade87205ed0db0e9a79a7170c3f3f3b3b04d51204a043cf4f0dae40632c56fb1cf72097cf4

  • SSDEEP

    49152:pzMhj5qobyRgmwWf/qsJ8zZNgY4Z1hhy7risGEpv3Yw2jNj5+/5u:JoO5yHz34d0dI76/

Score
10/10

Malware Config

Extracted

Family

risepro

C2

77.91.77.66:58709

Targets

    • Target

      3dbb8aa00e1cb82555860839271560e1d701e4c7cb1a6211e808ba91bb106034

    • Size

      2.3MB

    • MD5

      d6f71c348a73e9cde5155f26b82c88b2

    • SHA1

      89e4b53a9eecb6f532d9f71d9c4d9927436252bf

    • SHA256

      3dbb8aa00e1cb82555860839271560e1d701e4c7cb1a6211e808ba91bb106034

    • SHA512

      21795b17b3ff7d1060aa12cd98bd5931b1b3bfff7e4d70f9601f58ade87205ed0db0e9a79a7170c3f3f3b3b04d51204a043cf4f0dae40632c56fb1cf72097cf4

    • SSDEEP

      49152:pzMhj5qobyRgmwWf/qsJ8zZNgY4Z1hhy7risGEpv3Yw2jNj5+/5u:JoO5yHz34d0dI76/

    Score
    10/10
    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks