General

  • Target

    b344307eef7af6f9d4be08b2083a53e8a3bf2a0a082caea0480093745522423e_NeikiAnalytics.exe

  • Size

    5.0MB

  • Sample

    240629-t2dlka1drd

  • MD5

    bbc420393f77fb1ddff1c15197834390

  • SHA1

    1aaeed804f66c58929d2afed87a0f95bd83d308c

  • SHA256

    b344307eef7af6f9d4be08b2083a53e8a3bf2a0a082caea0480093745522423e

  • SHA512

    cff5432167eb5a637e517c2c34447703794967cba9111a7c5e542589255fe441498fc17fa5bca84c5eec2e287e99fef04619fbe2177cd136a5f1ac6b3b21312e

  • SSDEEP

    98304:U9kjXlE9W6Djdvyj/uNHqJMsXBg/qMBBmuOeJMvFbgWWZcOlgOU:U2jXO9WgEJRXBg4unM+NcUA

Malware Config

Extracted

Family

risepro

C2

77.91.77.66:58709

Targets

    • Target

      b344307eef7af6f9d4be08b2083a53e8a3bf2a0a082caea0480093745522423e_NeikiAnalytics.exe

    • Size

      5.0MB

    • MD5

      bbc420393f77fb1ddff1c15197834390

    • SHA1

      1aaeed804f66c58929d2afed87a0f95bd83d308c

    • SHA256

      b344307eef7af6f9d4be08b2083a53e8a3bf2a0a082caea0480093745522423e

    • SHA512

      cff5432167eb5a637e517c2c34447703794967cba9111a7c5e542589255fe441498fc17fa5bca84c5eec2e287e99fef04619fbe2177cd136a5f1ac6b3b21312e

    • SSDEEP

      98304:U9kjXlE9W6Djdvyj/uNHqJMsXBg/qMBBmuOeJMvFbgWWZcOlgOU:U2jXO9WgEJRXBg4unM+NcUA

    • RisePro

      RisePro stealer is an infostealer distributed by PrivateLoader.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks