MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 37e389db3f9b285e00e11260c0c3656e026f0627bfbbe42b3e9e07f8899f5838. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RiseProStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 9 File information Comments

SHA256 hash: 37e389db3f9b285e00e11260c0c3656e026f0627bfbbe42b3e9e07f8899f5838
SHA3-384 hash: 19ebcb1fb2d8b7582ca076f6f92d447943483f75de3871fc248f38975b249310afd596a4175853de31e0ac9bb527369d
SHA1 hash: fd9b8ed403cdc57734964d16b3c603b73ffd755c
MD5 hash: 622836a63efb05e7ae4067cb283a3189
humanhash: glucose-nine-may-cold
File name:file
Download: download sample
Signature RiseProStealer
File size:959'488 bytes
First seen:2024-04-17 13:47:39 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 17ccf166284947c6d6cbcd86ca514021 (3 x Stealc, 1 x RiseProStealer)
ssdeep 24576:sdZwl68DbMAX0rApfkYck0ZlxLTT+paFlbj31zdKbw:YZwltMAkQ8ZDTTnFlb9dm
Threatray 22 similar samples on MalwareBazaar
TLSH T1A0150102B6D0B872F573473A5D6DC6A0763EFDA14E166B5B2F485E3F04740A0D622FA2
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
File icon (PE):PE icon
dhash icon 0008184802030200 (1 x Stealc, 1 x RiseProStealer)
Reporter Bitsight
Tags:exe RiseProStealer


Avatar
Bitsight
url: http://193.233.132.139/wingo/menta.exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
318
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
37e389db3f9b285e00e11260c0c3656e026f0627bfbbe42b3e9e07f8899f5838.exe
Verdict:
Malicious activity
Analysis date:
2024-04-17 14:11:25 UTC
Tags:
risepro stealer evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Launching a process
Moving a file to the Program Files subdirectory
Replacing files
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
fingerprint packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RisePro Stealer
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Connects to many ports of the same IP (likely port scanning)
Contains functionality to check for running processes (XOR)
Contains functionality to inject threads in other processes
Country aware sample found (crashes after keyboard check)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after checking mutex)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found stalling execution ending in API Sleep call
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected RisePro Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1427411 Sample: file.exe Startdate: 17/04/2024 Architecture: WINDOWS Score: 100 45 ipinfo.io 2->45 47 db-ip.com 2->47 55 Snort IDS alert for network traffic 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 Antivirus / Scanner detection for submitted sample 2->59 61 5 other signatures 2->61 8 MPGPH131.exe 2 2->8         started        11 file.exe 1 9 2->11         started        15 RageMP131.exe 2 2->15         started        17 MPGPH131.exe 2 2->17         started        signatures3 process4 dnsIp5 63 Antivirus detection for dropped file 8->63 65 Multi AV Scanner detection for dropped file 8->65 67 Detected unpacking (changes PE section rights) 8->67 77 5 other signatures 8->77 19 WerFault.exe 19 16 8->19         started        29 3 other processes 8->29 49 147.45.47.93, 49705, 49713, 49714 FREE-NET-ASFREEnetEU Russian Federation 11->49 51 ipinfo.io 34.117.186.192, 443, 49717, 49718 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 11->51 53 db-ip.com 104.26.4.15, 443, 49720, 49721 CLOUDFLARENETUS United States 11->53 41 C:\Users\user\AppData\Local\...\RageMP131.exe, PE32 11->41 dropped 43 C:\ProgramData\MPGPH131\MPGPH131.exe, PE32 11->43 dropped 69 Detected unpacking (overwrites its own PE header) 11->69 71 Found evasive API chain (may stop execution after checking mutex) 11->71 73 Found stalling execution ending in API Sleep call 11->73 75 Uses schtasks.exe or at.exe to add and modify task schedules 11->75 21 schtasks.exe 1 11->21         started        23 schtasks.exe 1 11->23         started        25 WerFault.exe 19 16 11->25         started        31 3 other processes 11->31 33 3 other processes 15->33 27 WerFault.exe 16 17->27         started        35 3 other processes 17->35 file6 signatures7 process8 process9 37 conhost.exe 21->37         started        39 conhost.exe 23->39         started       
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2024-04-17 11:07:11 UTC
File Type:
PE (Exe)
Extracted files:
29
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
risepro
Score:
  10/10
Tags:
family:risepro stealer
Behaviour
RisePro
Malware Config
C2 Extraction:
147.45.47.93:58709
Unpacked files
SH256 hash:
2dbc1727a7a407df18f098e6036e76aa90551812313b98c530834f6603074c9a
MD5 hash:
552dd6174c15a231393118a5b2efa99a
SHA1 hash:
ee127ba599261d96443bc874566dc12157bc519e
SH256 hash:
37e389db3f9b285e00e11260c0c3656e026f0627bfbbe42b3e9e07f8899f5838
MD5 hash:
622836a63efb05e7ae4067cb283a3189
SHA1 hash:
fd9b8ed403cdc57734964d16b3c603b73ffd755c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Active
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:EXE_Stealer_StealC_Feb2024
Author:Yashraj Solanki - Cyber Threat Intelligence Analyst at Bridewell
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:Windows_Trojan_Generic_2993e5a5
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RiseProStealer

Executable exe 37e389db3f9b285e00e11260c0c3656e026f0627bfbbe42b3e9e07f8899f5838

(this sample)

  
Dropped by
Privateloader
  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetVolumeInformationW
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AddConsoleAliasW
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleInputA
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileA
KERNEL32.dll::CreateHardLinkW
KERNEL32.dll::CreateFileW
KERNEL32.dll::GetWindowsDirectoryA
KERNEL32.dll::RemoveDirectoryW
WIN_HTTP_APIUses HTTP servicesWINHTTP.dll::WinHttpReadData

Comments