General

  • Target

    4c6b33d0b0523ba1443c8c16333c979ec2e7b4f05bc58d4b09099e1a617e2d1f

  • Size

    2.3MB

  • Sample

    240626-xq8jcaycmg

  • MD5

    0df68e63389c04b56adc6948df9df126

  • SHA1

    02a10add18b3256587df8a78d38ebf1b57ca6d48

  • SHA256

    4c6b33d0b0523ba1443c8c16333c979ec2e7b4f05bc58d4b09099e1a617e2d1f

  • SHA512

    52ba4ad56211e08862d15ef1c2018bfd19d9b339089bea9337af8772280c9eea3c73d5267d715c26ecd8fe6351ea3dd598181f2638d51c4cc076978931a57739

  • SSDEEP

    49152:I6uJL5kP4CLXqfpbhCLG0srJ1NMsOsuUEJvA6F1w/:VuYRzqxwLG0sj/du3u6F14

Score
10/10

Malware Config

Extracted

Family

risepro

C2

77.91.77.66:58709

Targets

    • Target

      4c6b33d0b0523ba1443c8c16333c979ec2e7b4f05bc58d4b09099e1a617e2d1f

    • Size

      2.3MB

    • MD5

      0df68e63389c04b56adc6948df9df126

    • SHA1

      02a10add18b3256587df8a78d38ebf1b57ca6d48

    • SHA256

      4c6b33d0b0523ba1443c8c16333c979ec2e7b4f05bc58d4b09099e1a617e2d1f

    • SHA512

      52ba4ad56211e08862d15ef1c2018bfd19d9b339089bea9337af8772280c9eea3c73d5267d715c26ecd8fe6351ea3dd598181f2638d51c4cc076978931a57739

    • SSDEEP

      49152:I6uJL5kP4CLXqfpbhCLG0srJ1NMsOsuUEJvA6F1w/:VuYRzqxwLG0sj/du3u6F14

    Score
    10/10
    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks