General

  • Target

    b5949697c64f6067497b277e05c9ad0c38adae8c1ef2208e9d00c687f21a7aad

  • Size

    2.4MB

  • Sample

    240626-ktq29ayhkm

  • MD5

    ef3d0f403a4c93c65ffe12fe0c53afa6

  • SHA1

    d8804cb6c657ff39afdf9d194245c15bfb50a58f

  • SHA256

    b5949697c64f6067497b277e05c9ad0c38adae8c1ef2208e9d00c687f21a7aad

  • SHA512

    146da034513f585723431aca690376cdf5270a706640bddc40e197e4c4409cd2d85df1fd67afceb36a2ad5f4aa63d002e462763250e64482abd95f1f72defd2e

  • SSDEEP

    49152:WloR1qO2TTzANiJR2xaSAkLrAbZqvyo5UbJYb1BtAaooNOc+GRvVvMzqN1SDk7M:WKv52TgNiJeTAFqP6KT+GRpMzw

Score
10/10

Malware Config

Extracted

Family

risepro

C2

77.91.77.66:58709

Targets

    • Target

      b5949697c64f6067497b277e05c9ad0c38adae8c1ef2208e9d00c687f21a7aad

    • Size

      2.4MB

    • MD5

      ef3d0f403a4c93c65ffe12fe0c53afa6

    • SHA1

      d8804cb6c657ff39afdf9d194245c15bfb50a58f

    • SHA256

      b5949697c64f6067497b277e05c9ad0c38adae8c1ef2208e9d00c687f21a7aad

    • SHA512

      146da034513f585723431aca690376cdf5270a706640bddc40e197e4c4409cd2d85df1fd67afceb36a2ad5f4aa63d002e462763250e64482abd95f1f72defd2e

    • SSDEEP

      49152:WloR1qO2TTzANiJR2xaSAkLrAbZqvyo5UbJYb1BtAaooNOc+GRvVvMzqN1SDk7M:WKv52TgNiJeTAFqP6KT+GRpMzw

    Score
    10/10
    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

1
T1082

Tasks