MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4e4d4e52ad156dc7b32a4010134ba2b0fb56dea2d47c8bf562e5cc587a165faa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RiseProStealer


Vendor detections: 9


Intelligence 9 IOCs YARA 3 File information Comments

SHA256 hash: 4e4d4e52ad156dc7b32a4010134ba2b0fb56dea2d47c8bf562e5cc587a165faa
SHA3-384 hash: 9355309b11af83c746ca2b7e4f0a12308c046a016551639963734fcdbbfd96ff5fdfec16ac4a77c6cb0ffec85c864281
SHA1 hash: 518afba92088cf9228cdef4fb1d4c94c74ef4e5a
MD5 hash: 3355e8cdfa1a9dbe0b51468287da4ca2
humanhash: august-march-april-mike
File name:file
Download: download sample
Signature RiseProStealer
File size:5'923'328 bytes
First seen:2024-02-05 10:43:49 UTC
Last seen:2024-02-05 12:45:16 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 940b3a5d63813005f48f6ae4f0c3b75e (5 x RiseProStealer)
ssdeep 98304:wIZh0xSrUhq023L2QwR8be0eaQofwXwN9BMRUSPW0TA8zOlLdPj9OIQf1xSAzeBk:nKSAhH9i/x8waPeXBLdb9OnSACBk
TLSH T1BF56330A7C8A68C6C085AA780129EEFF31BD6E281170C527A2742F9FC9F76F51F35546
TrID 45.5% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
19.1% (.SCR) Windows screen saver (13097/50/3)
9.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.5% (.EXE) Win32 Executable (generic) (4504/4/1)
File icon (PE):PE icon
dhash icon b8f0e0f8e098989c (1 x RiseProStealer, 1 x Arechclient2)
Reporter Bitsight
Tags:exe RiseProStealer


Avatar
Bitsight
Sample downloaded from https://vk.com/doc481075715_673430133?hash=BXzHlnOZO5hoEnZ0kFEN6MzOvGYnznj2yrTryha0I1c&dl=3SbZmhmZu7aQNTO5rKX5kbGPEZiMhJ5dFczXaSHzSZH&api=1&no_preview=1#retailer_rise

Intelligence


File Origin
# of uploads :
2
# of downloads :
314
Origin country :
US US
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
crypto fingerprint lolbin packed setupapi shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RisePro Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Contains functionality to check for running processes (XOR)
Contains functionality to inject threads in other processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected RisePro Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1386709 Sample: file.exe Startdate: 05/02/2024 Architecture: WINDOWS Score: 100 38 ipinfo.io 2->38 46 Snort IDS alert for network traffic 2->46 48 Multi AV Scanner detection for domain / URL 2->48 50 Antivirus detection for URL or domain 2->50 52 7 other signatures 2->52 8 file.exe 1 78 2->8         started        13 MSIUpdaterV1.exe 2 2->13         started        15 AdobeUpdaterV1.exe 2 2->15         started        17 2 other processes 2->17 signatures3 process4 dnsIp5 40 193.233.132.67, 49705, 49711, 49712 FREE-NET-ASFREEnetEU Russian Federation 8->40 42 ipinfo.io 34.117.186.192, 443, 49706, 49713 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 8->42 44 195.20.16.46, 49710, 80 EITADAT-ASFI Finland 8->44 30 C:\Users\user\...\1oHbMoT1qMi7KNimz5lg.exe, PE32 8->30 dropped 32 C:\Users\user\AppData\...\RetailerRise[1].exe, PE32 8->32 dropped 34 C:\Users\user\AppData\...\AdobeUpdaterV1.exe, PE32 8->34 dropped 36 2 other malicious files 8->36 dropped 62 Contains functionality to check for running processes (XOR) 8->62 64 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 8->64 66 Tries to steal Mail credentials (via file / registry access) 8->66 74 3 other signatures 8->74 19 1oHbMoT1qMi7KNimz5lg.exe 2 8->19         started        22 schtasks.exe 1 8->22         started        24 schtasks.exe 1 8->24         started        68 Antivirus detection for dropped file 13->68 70 Multi AV Scanner detection for dropped file 13->70 72 Machine Learning detection for dropped file 13->72 file6 signatures7 process8 signatures9 54 Antivirus detection for dropped file 19->54 56 Multi AV Scanner detection for dropped file 19->56 58 Contains functionality to check for running processes (XOR) 19->58 60 3 other signatures 19->60 26 conhost.exe 22->26         started        28 conhost.exe 24->28         started        process10
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2024-02-05 10:44:08 UTC
File Type:
PE (Exe)
Extracted files:
18
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
risepro
Score:
  10/10
Tags:
family:risepro stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
RisePro
Malware Config
C2 Extraction:
193.233.132.67:50500
Unpacked files
SH256 hash:
4becd45647e4a8cad1cbd5b92c837bbbe68a6d20937f89e816e919ba662a4da9
MD5 hash:
a098fe6a2c6adffe9eaa2bf511c7de6c
SHA1 hash:
f8a0f24530585992ef45145f0f990ddf520e490a
SH256 hash:
4e4d4e52ad156dc7b32a4010134ba2b0fb56dea2d47c8bf562e5cc587a165faa
MD5 hash:
3355e8cdfa1a9dbe0b51468287da4ca2
SHA1 hash:
518afba92088cf9228cdef4fb1d4c94c74ef4e5a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments