General
-
Target
BLTools v2.7.1 [PRO2].zip
-
Size
13.8MB
-
Sample
250106-jptrxa1kav
-
MD5
01952f721e3cebff244c689b5cd24756
-
SHA1
d77afa2071c5487b0cc39243a75e1aaab082975c
-
SHA256
aafde59bd18e2ea55967da235f68985cbd0e17cd39ae625fd5fae8ce001a4c4b
-
SHA512
93259ccbd91be6f62fc1b2b0d818773702a2166835dff67eab33ee27537ed452f38e61dcc6651d328d87011fb38cb243aca99ffdc78fa3b66f19fa48ae75fe53
-
SSDEEP
196608:DCKyX8k4lfzoILWsniW8lnJ45/9iD54+V11bFv4zmkt/P:Gtskkb1LWsnk+h
Static task
static1
Behavioral task
behavioral1
Sample
BLTools v2.7.1 [PRO2].zip
Resource
win10ltsc2021-20241211-en
Malware Config
Extracted
risepro
193.233.254.67:50500
Targets
-
-
Target
BLTools v2.7.1 [PRO2].zip
-
Size
13.8MB
-
MD5
01952f721e3cebff244c689b5cd24756
-
SHA1
d77afa2071c5487b0cc39243a75e1aaab082975c
-
SHA256
aafde59bd18e2ea55967da235f68985cbd0e17cd39ae625fd5fae8ce001a4c4b
-
SHA512
93259ccbd91be6f62fc1b2b0d818773702a2166835dff67eab33ee27537ed452f38e61dcc6651d328d87011fb38cb243aca99ffdc78fa3b66f19fa48ae75fe53
-
SSDEEP
196608:DCKyX8k4lfzoILWsniW8lnJ45/9iD54+V11bFv4zmkt/P:Gtskkb1LWsnk+h
-
Lucastealer family
-
Risepro family
-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: currency-file@1
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-