MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 100280d707aa062cf347c7b975cfbeb94e2b238ff61dfa1412e11ac75045ac4a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RiseProStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 7 File information Comments

SHA256 hash: 100280d707aa062cf347c7b975cfbeb94e2b238ff61dfa1412e11ac75045ac4a
SHA3-384 hash: e779d2346e382bc2e7d04e82fd451210221a097f068c69abccc1a4a698d0b8b0c7ea4a0fcc501ebd365991f0c1a5e0a6
SHA1 hash: f28e1bf205bd10505072d1e070c083426b06e7a5
MD5 hash: af3258731f255fc2c09975000d3cffc6
humanhash: seven-lemon-social-texas
File name:file
Download: download sample
Signature RiseProStealer
File size:3'216'896 bytes
First seen:2024-03-14 00:23:25 UTC
Last seen:2024-03-14 02:28:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 110a9f45d4a7b5222808ebecd21907e8 (5 x RiseProStealer)
ssdeep 98304:KkHxLK8JFEjK2utsXU8sLcU1hE64eGRa:KkHxWyFEjK2uWXU8+Efo
TLSH T158E533165AB04FE3D1A1A2B721670DFABDECEC285DE7BA50B13F30E5619701E8BC6105
TrID 32.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
28.9% (.EXE) Win32 Executable (generic) (4504/4/1)
13.0% (.EXE) OS/2 Executable (generic) (2029/13)
12.8% (.EXE) Generic Win/DOS Executable (2002/3)
12.8% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon b3b2b3b2cceee7b2 (146 x RiseProStealer, 7 x CoinMiner, 1 x AgentTesla)
Reporter Bitsight
Tags:exe RiseProStealer


Avatar
Bitsight
url: http://193.233.132.139:30468/zidan/frukt.exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
383
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
100280d707aa062cf347c7b975cfbeb94e2b238ff61dfa1412e11ac75045ac4a.exe
Verdict:
Malicious activity
Analysis date:
2024-03-14 00:26:34 UTC
Tags:
risepro

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Launching a process
Creating a file in the %temp% directory
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Сreating synchronization primitives
Moving a file to the Program Files subdirectory
Replacing files
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Connection attempt to an infection source
Sending a TCP request to an infection source
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
crypto lolbin msbuild packed packed setupapi shell32 themidawinlicense
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Amadey, RisePro Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Contains functionality to check for running processes (XOR)
Contains functionality to inject threads in other processes
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys stealer DLL
Yara detected RisePro Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1408714 Sample: file.exe Startdate: 14/03/2024 Architecture: WINDOWS Score: 100 72 ipinfo.io 2->72 74 db-ip.com 2->74 82 Snort IDS alert for network traffic 2->82 84 Multi AV Scanner detection for domain / URL 2->84 86 Antivirus detection for URL or domain 2->86 88 8 other signatures 2->88 8 file.exe 3 92 2->8         started        13 MPGPH131.exe 72 2->13         started        15 MPGPH131.exe 73 2->15         started        17 14 other processes 2->17 signatures3 process4 dnsIp5 76 193.233.132.62, 49729, 49732, 49733 FREE-NET-ASFREEnetEU Russian Federation 8->76 78 ipinfo.io 34.117.186.192, 443, 49730, 49734 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 8->78 80 2 other IPs or domains 8->80 54 C:\Users\user\...\zw0h9Kvk7ZHHCJlnFc66.exe, PE32 8->54 dropped 56 C:\Users\user\...\2HS2pO9WQwLop6DlVYbJ.exe, PE32 8->56 dropped 66 11 other malicious files 8->66 dropped 114 Contains functionality to check for running processes (XOR) 8->114 116 Query firmware table information (likely to detect VMs) 8->116 118 Tries to steal Mail credentials (via file / registry access) 8->118 136 2 other signatures 8->136 19 zw0h9Kvk7ZHHCJlnFc66.exe 8->19         started        23 2HS2pO9WQwLop6DlVYbJ.exe 8->23         started        25 schtasks.exe 1 8->25         started        37 6 other processes 8->37 58 C:\Users\user\...\f5iREq9zhV1AM_Us4iQx.exe, PE32 13->58 dropped 60 C:\Users\user\...\5_b8UMgH1Xze_ppRYnnI.exe, PE32 13->60 dropped 68 3 other malicious files 13->68 dropped 120 Multi AV Scanner detection for dropped file 13->120 122 Machine Learning detection for dropped file 13->122 124 Contains functionality to inject threads in other processes 13->124 27 5_b8UMgH1Xze_ppRYnnI.exe 13->27         started        29 f5iREq9zhV1AM_Us4iQx.exe 13->29         started        62 C:\Users\user\...\MUp3BpPMte7RbouG15wN.exe, PE32 15->62 dropped 64 C:\Users\user\...\6VD76t5vyqCJrridJA8V.exe, PE32 15->64 dropped 70 2 other malicious files 15->70 dropped 126 Tries to harvest and steal browser information (history, passwords, etc) 15->126 128 Tries to detect sandboxes / dynamic malware analysis system (registry check) 15->128 31 MUp3BpPMte7RbouG15wN.exe 15->31         started        33 6VD76t5vyqCJrridJA8V.exe 15->33         started        130 Antivirus detection for dropped file 17->130 132 Detected unpacking (changes PE section rights) 17->132 134 Tries to evade debugger and weak emulator (self modifying code) 17->134 138 3 other signatures 17->138 35 explorha.exe 17->35         started        file6 signatures7 process8 file9 52 C:\Users\user\AppData\Local\...\explorha.exe, PE32 19->52 dropped 90 Antivirus detection for dropped file 19->90 92 Detected unpacking (changes PE section rights) 19->92 94 Machine Learning detection for dropped file 19->94 39 explorha.exe 19->39         started        96 Tries to detect virtualization through RDTSC time measurements 23->96 42 conhost.exe 25->42         started        98 Tries to evade debugger and weak emulator (self modifying code) 27->98 100 Hides threads from debuggers 27->100 102 Tries to detect sandboxes / dynamic malware analysis system (registry check) 27->102 104 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 31->104 44 conhost.exe 37->44         started        46 conhost.exe 37->46         started        48 conhost.exe 37->48         started        50 2 other processes 37->50 signatures10 process11 signatures12 106 Antivirus detection for dropped file 39->106 108 Detected unpacking (changes PE section rights) 39->108 110 Tries to detect sandboxes and other dynamic analysis tools (window names) 39->110 112 5 other signatures 39->112
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2024-03-14 00:24:07 UTC
File Type:
PE (Exe)
Extracted files:
13
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
risepro
Score:
  10/10
Tags:
family:risepro evasion stealer themida trojan
Behaviour
Checks whether UAC is enabled
Checks BIOS information in registry
Themida packer
Identifies VirtualBox via ACPI registry values (likely anti-VM)
RisePro
Malware Config
C2 Extraction:
193.233.132.62
Unpacked files
SH256 hash:
e4f135018aa74e4fe0e86a01ca38fb218274f674e7003cdfb6c51898a039b02c
MD5 hash:
c8bee40ae09433dd57990041d40a2ff8
SHA1 hash:
a3c9b5d5a19de6a0d64167874096423e10cd4eaf
Detections:
INDICATOR_EXE_Packed_Themida
SH256 hash:
100280d707aa062cf347c7b975cfbeb94e2b238ff61dfa1412e11ac75045ac4a
MD5 hash:
af3258731f255fc2c09975000d3cffc6
SHA1 hash:
f28e1bf205bd10505072d1e070c083426b06e7a5
Detections:
INDICATOR_EXE_Packed_Themida
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_Themida
Author:ditekSHen
Description:Detects executables packed with Themida
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:Windows_Generic_Threat_e5f4703f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RiseProStealer

Executable exe 100280d707aa062cf347c7b975cfbeb94e2b238ff61dfa1412e11ac75045ac4a

(this sample)

  
Dropped by
Privateloader
  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
Reviews
IDCapabilitiesEvidence
DP_APIUses DP APICRYPT32.dll::CryptUnprotectData
GDI_PLUS_APIInterfaces with Graphicsgdiplus.dll::GdiplusStartup
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteA
WIN_CRED_APICan Manipute Windows CredentialsADVAPI32.dll::CredEnumerateA

Comments