MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 42c24e5ea82db961c718b4ec041202f85de3cdf6d35dd99d83a753f9a175945d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RiseProStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: 42c24e5ea82db961c718b4ec041202f85de3cdf6d35dd99d83a753f9a175945d
SHA3-384 hash: 9c201b030861a7cb456be98c62d54e4912c8b1287ecb8b9c25f847ed3085c63119f9c040183676fdf727454177dbed90
SHA1 hash: 74576503141f26edab05ce2da89b66cb3bcf293b
MD5 hash: d08e21ef739bcb9d74508790a6e6238f
humanhash: sodium-johnny-freddie-moon
File name:file
Download: download sample
Signature RiseProStealer
File size:5'914'112 bytes
First seen:2024-02-05 10:14:43 UTC
Last seen:2024-02-05 12:45:17 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 930dd563daeb0071b0a2e064c8e3b25f (1 x RiseProStealer)
ssdeep 98304:eImo/NRpwP2DkKA+Ga5q73V41AmcR1Miq465iU7Fem+KOd8PbXLgKiOvG6ZB6Q3H:Xm0Rouq61i1U5Um+J+jkjEG6Zw
TLSH T137562347EB92F4DCD44171B85B22BCDC78F4A960011AF83ADCACB5C642B65A952BC3C7
TrID 50.9% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
27.6% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
3.9% (.EXE) Win32 Executable (generic) (4504/4/1)
File icon (PE):PE icon
dhash icon e0e8b8f8f88a8c8c (1 x RiseProStealer)
Reporter Bitsight
Tags:exe RiseProStealer


Avatar
Bitsight
Sample downloaded from https://vk.com/doc481075715_673429805?hash=ztxKLky0Xlk2evItARsU7l9NoRH2aH4MDA9fwZSROAH&dl=uZGhHAUmKYBxeZ0HGA9tct68DzpusO2LhRWz89KzSfk&api=1&no_preview=1#11

Intelligence


File Origin
# of uploads :
2
# of downloads :
304
Origin country :
US US
Vendor Threat Intelligence
Verdict:
No Threat
Threat level:
  10/10
Confidence:
100%
Tags:
fingerprint installer lolbin packed packed shell32 vmprotect
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
PrivateLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds extensions / path to Windows Defender exclusion list (Registry)
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Exclude list of file types from scheduled, custom, and real-time scanning
Machine Learning detection for sample
Modifies Group Policy settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected PrivateLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1386683 Sample: file.exe Startdate: 05/02/2024 Architecture: WINDOWS Score: 100 29 iplogger.org 2->29 31 iplis.ru 2->31 33 2 other IPs or domains 2->33 45 Snort IDS alert for network traffic 2->45 47 Multi AV Scanner detection for domain / URL 2->47 49 Antivirus detection for URL or domain 2->49 51 4 other signatures 2->51 8 file.exe 14 230 2->8         started        signatures3 process4 dnsIp5 35 77.105.147.130, 49734, 49737, 49742 PLUSTELECOM-ASRU Russian Federation 8->35 37 ipinfo.io 34.117.186.192, 443, 49736 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 8->37 39 4 other IPs or domains 8->39 19 C:\Windows\System32behaviorgraphroupPolicybehaviorgraphPT.INI, ASCII 8->19 dropped 21 C:\Users\user\AppData\...\Secure Preferences, JSON 8->21 dropped 53 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 8->53 55 Disables Windows Defender (deletes autostart) 8->55 57 Tries to harvest and steal browser information (history, passwords, etc) 8->57 59 4 other signatures 8->59 13 chrome.exe 1 8->13         started        file6 signatures7 process8 dnsIp9 41 192.168.2.4, 138, 443, 49303 unknown unknown 13->41 43 239.255.255.250 unknown Reserved 13->43 16 chrome.exe 13->16         started        process10 dnsIp11 23 173.194.219.139, 443, 49774 GOOGLEUS United States 16->23 25 clients.l.google.com 64.233.177.139, 443, 49748 GOOGLEUS United States 16->25 27 5 other IPs or domains 16->27
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2024-02-05 10:15:09 UTC
File Type:
PE (Exe)
Extracted files:
35
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
risepro
Score:
  10/10
Tags:
family:risepro spyware stealer
Behaviour
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in System32 directory
Drops Chrome extension
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Reads user/profile data of web browsers
RisePro
Unpacked files
SH256 hash:
c47d2f2601db250a034cb57bf72613a15e79b675fb2fc233c09a6260cee596f8
MD5 hash:
7f19b0b1ac7a434ab38cff85628c4f88
SHA1 hash:
4fe9464388950b1554fbe469d7ab36c9a249a005
SH256 hash:
42c24e5ea82db961c718b4ec041202f85de3cdf6d35dd99d83a753f9a175945d
MD5 hash:
d08e21ef739bcb9d74508790a6e6238f
SHA1 hash:
74576503141f26edab05ce2da89b66cb3bcf293b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments