MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 606bc55fad2b4b1ec117c8df11571f153ac95736e6fcfa8dd8874d88eaa1a48b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RiseProStealer


Vendor detections: 15


Intelligence 15 IOCs YARA File information Comments

SHA256 hash: 606bc55fad2b4b1ec117c8df11571f153ac95736e6fcfa8dd8874d88eaa1a48b
SHA3-384 hash: 486de28a9e44a740cfc8cf43c7ffb4420c4e088de0e12914e360169cfced2fea23e6cf455b3ceca4a82e08493f711a12
SHA1 hash: a7c1289cf1e2ae758d8c1ef409a9b4b8a468da1a
MD5 hash: c2111e61e7ba399ef043c265c4215de2
humanhash: fanta-mississippi-zulu-zebra
File name:4qL162Qw.exe
Download: download sample
Signature RiseProStealer
File size:1'526'272 bytes
First seen:2023-12-27 03:04:25 UTC
Last seen:2023-12-27 04:18:07 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2e5467cba76f44a088d39f78c5e807b6 (131 x DCRat, 112 x njrat, 79 x RedLineStealer)
ssdeep 24576:CDbFcjYvZFMgVVyEl1/g9rmqezyyVgTN9OVPuSWb4gchWQuUZj+:CPFcjYvZ2cVNNtqFySTCVPl+bcAO
Threatray 232 similar samples on MalwareBazaar
TLSH T15F6533FB90D14879F155BF7C0DF96A9096B0568390306A130D442B230E677FA6DB2A7E
TrID 25.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
19.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.1% (.EXE) Win32 Executable (generic) (4505/5/1)
7.8% (.EXE) Win16/32 Executable Delphi generic (2072/23)
7.8% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter ukycircle
Tags:exe RiseProStealer

Intelligence


File Origin
# of uploads :
3
# of downloads :
286
Origin country :
JP JP
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
New Text Document mod.zip
Verdict:
Malicious activity
Analysis date:
2023-12-27 00:53:33 UTC
Tags:
risepro stealer evasion loader hausbomber amadey botnet stealc opendir metasploit kelihos trojan lumma nanocore agenttesla neoreklami vodkagats ransomware stop vidar redline adware purplefox backdoor dupzom servstart

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a file
Creating a file in the %temp% subdirectories
Running batch commands
Launching a process
Searching for the window
Connecting to a non-recommended domain
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Reading critical registry keys
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Stealing user critical data
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
enigma lolbin obfuscated packed packed risepro shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Result
Threat name:
RisePro Stealer, Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Yara detected RisePro Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1367242 Sample: 4qL162Qw.exe Startdate: 27/12/2023 Architecture: WINDOWS Score: 100 63 ipinfo.io 2->63 69 Snort IDS alert for network traffic 2->69 71 Found malware configuration 2->71 73 Antivirus / Scanner detection for submitted sample 2->73 75 7 other signatures 2->75 8 4qL162Qw.exe 16 72 2->8         started        13 FANBooster131.exe 2->13         started        15 OfficeTrackerNMP131.exe 60 2->15         started        17 3 other processes 2->17 signatures3 process4 dnsIp5 65 193.233.132.62, 49705, 49706, 49707 FREE-NET-ASFREEnetEU Russian Federation 8->65 67 ipinfo.io 34.117.186.192, 443, 49708, 49709 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 8->67 59 5 other malicious files 8->59 dropped 87 Detected unpacking (changes PE section rights) 8->87 89 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 8->89 91 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 8->91 93 Found many strings related to Crypto-Wallets (likely being stolen) 8->93 19 cmd.exe 1 8->19         started        22 cmd.exe 1 8->22         started        24 WerFault.exe 8->24         started        45 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 13->45 dropped 47 C:\...\sHa59rKKBildoeSIqf2c1ltXj6f8bcjV.zip, Zip 13->47 dropped 95 Antivirus detection for dropped file 13->95 97 Multi AV Scanner detection for dropped file 13->97 99 Tries to steal Mail credentials (via file / registry access) 13->99 101 Tries to harvest and steal browser information (history, passwords, etc) 13->101 26 WerFault.exe 13->26         started        49 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 15->49 dropped 51 C:\...\PHoq8lx75tdMDxbPiOPhNoCjARSCGWGz.zip, Zip 15->51 dropped 103 Machine Learning detection for dropped file 15->103 105 Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes) 15->105 107 Queries memory information (via WMI often done to detect virtual machines) 15->107 28 WerFault.exe 15->28         started        53 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 17->53 dropped 55 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 17->55 dropped 57 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 17->57 dropped 61 3 other malicious files 17->61 dropped 109 Hides threads from debuggers 17->109 30 WerFault.exe 17->30         started        32 WerFault.exe 17->32         started        34 WerFault.exe 17->34         started        file6 signatures7 process8 signatures9 77 Uses schtasks.exe or at.exe to add and modify task schedules 19->77 36 schtasks.exe 1 19->36         started        39 conhost.exe 19->39         started        41 conhost.exe 22->41         started        43 schtasks.exe 1 22->43         started        process10 signatures11 79 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 36->79 81 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 36->81 83 Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes) 36->83 85 Queries memory information (via WMI often done to detect virtual machines) 36->85
Threat name:
Win32.Trojan.RiseProStealer
Status:
Malicious
First seen:
2023-12-26 04:41:15 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
22 of 23 (95.65%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
collection discovery persistence spyware stealer
Behaviour
Creates scheduled task(s)
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses Microsoft Outlook profiles
Adds Run key to start application
Checks installed software on the system
Looks up external IP address via web service
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
606bc55fad2b4b1ec117c8df11571f153ac95736e6fcfa8dd8874d88eaa1a48b
MD5 hash:
c2111e61e7ba399ef043c265c4215de2
SHA1 hash:
a7c1289cf1e2ae758d8c1ef409a9b4b8a468da1a
Detections:
SUSP_XORed_URL_In_EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments