MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 255f81a760ca5f92ba93273cd332bbc9d17e3af2e706d301ae5a9980b8ae24e6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RiseProStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 6 File information Comments

SHA256 hash: 255f81a760ca5f92ba93273cd332bbc9d17e3af2e706d301ae5a9980b8ae24e6
SHA3-384 hash: 77cef00b345e5efb7fcb785774ffaafd867ee8cd2c471f0b99819dbfa9ee3a4a0659d4c119449e8e8b46330aa886e2c5
SHA1 hash: 95aa87b6a5ebc9c28c22eb7322dd56925964c83e
MD5 hash: 9ec4f90795990f9cdc212a8aeb1d4950
humanhash: eight-october-glucose-echo
File name:9ec4f90795990f9cdc212a8aeb1d4950.exe
Download: download sample
Signature RiseProStealer
File size:3'220'992 bytes
First seen:2024-03-18 04:20:11 UTC
Last seen:2024-03-18 06:20:19 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash baa93d47220682c04d92f7797d9224ce (139 x RiseProStealer, 26 x Xtrat, 18 x CoinMiner)
ssdeep 49152:hDPPBnOH3/nkaafC0XWtzeh+HmlMwKT6ghYnMqe:FPc3Poq0XWtzehqmewENGMj
Threatray 14 similar samples on MalwareBazaar
TLSH T1E8E54B62B40879CFD48E22789467CD826D5D47F9471088E7A87C78FEBDA3CC121B9D29
TrID 32.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
28.9% (.EXE) Win32 Executable (generic) (4504/4/1)
13.0% (.EXE) OS/2 Executable (generic) (2029/13)
12.8% (.EXE) Generic Win/DOS Executable (2002/3)
12.8% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon b3b2b3b2cceee7b2 (146 x RiseProStealer, 7 x CoinMiner, 1 x AgentTesla)
Reporter abuse_ch
Tags:exe RiseProStealer


Avatar
abuse_ch
RiseProStealer C2:
193.233.132.62:58709

Intelligence


File Origin
# of uploads :
2
# of downloads :
376
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
255f81a760ca5f92ba93273cd332bbc9d17e3af2e706d301ae5a9980b8ae24e6.exe
Verdict:
Malicious activity
Analysis date:
2024-03-18 04:21:11 UTC
Tags:
risepro

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Launching a process
Creating a file in the %temp% directory
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Сreating synchronization primitives
Reading critical registry keys
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Connection attempt to an infection source
Sending a TCP request to an infection source
Stealing user critical data
Enabling autorun by creating a file
Sending an HTTP GET request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
lolbin msbuild packed packed themidawinlicense
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, RisePro Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Country aware sample found (crashes after keyboard check)
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadey
Yara detected Amadeys stealer DLL
Yara detected RisePro Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1410555 Sample: y4UKGr8tzW.exe Startdate: 18/03/2024 Architecture: WINDOWS Score: 100 75 ipinfo.io 2->75 77 db-ip.com 2->77 87 Snort IDS alert for network traffic 2->87 89 Multi AV Scanner detection for domain / URL 2->89 91 Found malware configuration 2->91 93 15 other signatures 2->93 9 y4UKGr8tzW.exe 3 95 2->9         started        14 MPGPH131.exe 78 2->14         started        16 MPGPH131.exe 2->16         started        18 10 other processes 2->18 signatures3 process4 dnsIp5 79 185.172.128.19 NADYMSS-ASRU Russian Federation 9->79 81 193.233.132.62, 49705, 49708, 49709 FREE-NET-ASFREEnetEU Russian Federation 9->81 85 3 other IPs or domains 9->85 67 15 other malicious files 9->67 dropped 123 Detected unpacking (changes PE section rights) 9->123 125 Tries to steal Mail credentials (via file / registry access) 9->125 127 Found many strings related to Crypto-Wallets (likely being stolen) 9->127 147 4 other signatures 9->147 20 NsNU6guuWdshwhAgqWNX.exe 9->20         started        23 iY4K4Wb9pVVWlawDW07Z.exe 9->23         started        38 7 other processes 9->38 55 C:\Users\user\...\pIWGeOzHnaMy3zDq8CwP.exe, PE32 14->55 dropped 69 6 other malicious files 14->69 dropped 129 Multi AV Scanner detection for dropped file 14->129 131 Machine Learning detection for dropped file 14->131 133 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 14->133 25 lS3_v9QAuBFoVNCSC8je.exe 14->25         started        27 EGimGn1zxdQzzRWJcCkN.exe 14->27         started        29 pIWGeOzHnaMy3zDq8CwP.exe 14->29         started        57 C:\Users\user\...\vlw3EdCnJZYkA6yF2ZpV.exe, PE32 16->57 dropped 59 C:\Users\user\...\l_PSl96Pkd9yci1_r93K.exe, PE32 16->59 dropped 61 C:\Users\user\...\0Bt7cZw4zOpK_ygZrm9K.exe, PE32 16->61 dropped 71 4 other malicious files 16->71 dropped 135 Tries to harvest and steal browser information (history, passwords, etc) 16->135 137 Tries to detect sandboxes / dynamic malware analysis system (registry check) 16->137 31 l_PSl96Pkd9yci1_r93K.exe 16->31         started        34 vlw3EdCnJZYkA6yF2ZpV.exe 16->34         started        36 0Bt7cZw4zOpK_ygZrm9K.exe 16->36         started        83 193.233.132.56 FREE-NET-ASFREEnetEU Russian Federation 18->83 63 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+ 18->63 dropped 65 C:\Users\user\AppData\Local\...\cred64[1].dll, PE32+ 18->65 dropped 139 Tries to evade debugger and weak emulator (self modifying code) 18->139 141 Tries to detect virtualization through RDTSC time measurements 18->141 143 Hides threads from debuggers 18->143 145 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 18->145 file6 signatures7 process8 file9 95 Multi AV Scanner detection for dropped file 20->95 97 Tries to detect virtualization through RDTSC time measurements 20->97 99 Creates an undocumented autostart registry key 23->99 40 schtasks.exe 23->40         started        101 Antivirus detection for dropped file 25->101 103 Machine Learning detection for dropped file 25->103 105 Tries to detect sandboxes / dynamic malware analysis system (registry check) 25->105 73 C:\Users\user\AppData\Local\...\explorha.exe, PE32 31->73 dropped 107 Detected unpacking (changes PE section rights) 31->107 109 Tries to evade debugger and weak emulator (self modifying code) 31->109 111 Hides threads from debuggers 31->111 113 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 31->113 42 explorha.exe 31->42         started        45 conhost.exe 38->45         started        47 conhost.exe 38->47         started        49 conhost.exe 38->49         started        51 3 other processes 38->51 signatures10 process11 signatures12 53 conhost.exe 40->53         started        115 Antivirus detection for dropped file 42->115 117 Detected unpacking (changes PE section rights) 42->117 119 Tries to detect sandboxes and other dynamic analysis tools (window names) 42->119 121 5 other signatures 42->121 process13
Threat name:
Win32.Trojan.Znyonm
Status:
Malicious
First seen:
2024-03-18 03:57:40 UTC
File Type:
PE (Exe)
Extracted files:
13
AV detection:
18 of 23 (78.26%)
Threat level:
  5/5
Result
Malware family:
risepro
Score:
  10/10
Tags:
family:risepro evasion stealer
Behaviour
Checks BIOS information in registry
Identifies Wine through registry keys
Identifies VirtualBox via ACPI registry values (likely anti-VM)
RisePro
Malware Config
C2 Extraction:
193.233.132.62:58709
Unpacked files
SH256 hash:
b3445c28196a3bd3bc9117527e5fc9a4324d1926574ad7045c04c084c4e07f59
MD5 hash:
0b08946bc46828b47334cab263ce7061
SHA1 hash:
57be3b69f601c8c9207d6453f36650a77309c130
SH256 hash:
7a09b4d35d2e71b06b3554f6760cee8639637a1caf2f6bf9d76a21811d9b738d
MD5 hash:
ef62f2fc9caf8c80258a42c431a2351c
SHA1 hash:
55896e52a0507c417f156f19dc3a3d34ffc8cae8
SH256 hash:
255f81a760ca5f92ba93273cd332bbc9d17e3af2e706d301ae5a9980b8ae24e6
MD5 hash:
9ec4f90795990f9cdc212a8aeb1d4950
SHA1 hash:
95aa87b6a5ebc9c28c22eb7322dd56925964c83e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:NET
Author:malware-lu
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RiseProStealer

Executable exe 255f81a760ca5f92ba93273cd332bbc9d17e3af2e706d301ae5a9980b8ae24e6

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical

Comments