General

  • Target

    39483496950b1a7bbd28617e6006efeb.bin

  • Size

    4.1MB

  • Sample

    240625-b8ehbsxeln

  • MD5

    c0f70e7b9b96da65289e39acfc8ccf44

  • SHA1

    44644d92c73c38da1b0c41ae6f843bacfe6342bc

  • SHA256

    2ed29be41d21b657d0ac82b64c0201d2ab4b10bc7b81b40328e5c662e9a23274

  • SHA512

    62ec677e38b5bf10ecd6feb753691577523c18e2393c52d724eddc6e4b5459a9c258a39f9a6dce3d96235fafa285a1683ba49887ce498620c6f4ab5eefd2edeb

  • SSDEEP

    98304:lJXTmKBLHleyfzweTuH51NUBWTsaqZPnxT/7HHfEst5S7kmFVGyk9JkP:lJXTLuyfzw8uZgBMzqZPd7nJt5S7DlvP

Malware Config

Extracted

Family

risepro

C2

5.42.66.10

191.101.209.39

Targets

    • Target

      9e711f696ed3c36e8333a62b6cb8184a715d3a9ce2ff61b60bcd547ce550bf3a.exe

    • Size

      4.2MB

    • MD5

      39483496950b1a7bbd28617e6006efeb

    • SHA1

      d922c857874fd52067791397128e62267cd0cd56

    • SHA256

      9e711f696ed3c36e8333a62b6cb8184a715d3a9ce2ff61b60bcd547ce550bf3a

    • SHA512

      6443f9a2956b3600aae04c862cf2e070435fe44d6df853cfaa213d097322bcbaffb83af7451d035bd674d72670ff377c46572822f68f61bac78d7f49467df8e2

    • SSDEEP

      98304:/j+Am4UGrNsnH/vmbOPRYc43/8ToqX2yV4DyWQOEK5AUvpA3IktHhjWi3Ec:JUGrNsnHGb6T43/8Mu2rTkKiUheIejW4

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks