MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6ef6d6f7ec972df6ddc37c20cdb758e8383ab105b443d0f04f8f82e7708923b7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RiseProStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 6 File information Comments 1

SHA256 hash: 6ef6d6f7ec972df6ddc37c20cdb758e8383ab105b443d0f04f8f82e7708923b7
SHA3-384 hash: 202ceaebb69e6fc0df33105fbba0af9ab5ac3794c72d4301bf4c0e7e990161d9f0c67413c929ad22f5a8a9e0074cec8f
SHA1 hash: 95e6d780413459934f0c1de0c7acbc9b35d71235
MD5 hash: b91651a6bbf433e114769060aaf3722f
humanhash: bluebird-mexico-idaho-six
File name:b91651a6bbf433e114769060aaf3722f
Download: download sample
Signature RiseProStealer
File size:3'126'272 bytes
First seen:2024-03-20 16:14:55 UTC
Last seen:2024-03-20 18:27:41 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash baa93d47220682c04d92f7797d9224ce (139 x RiseProStealer, 26 x Xtrat, 18 x CoinMiner)
ssdeep 49152:wjJJqTKDD4uXAjAIBQ4IES8W4hu5IvTrY6rxqm2D5Mb46LpF8f:wKWDDdAMIBQ4Ie9U5WTHOMb4oF8
TLSH T122E54B92A40972DFD48F27799427CE825A5D43F9471009D3DC69B8BA7DE3CC126BAC38
TrID 32.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
28.9% (.EXE) Win32 Executable (generic) (4504/4/1)
13.0% (.EXE) OS/2 Executable (generic) (2029/13)
12.8% (.EXE) Generic Win/DOS Executable (2002/3)
12.8% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon 0fd6b2b29abbb90f (26 x RiseProStealer)
Reporter zbetcheckin
Tags:32 exe RiseProStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
465
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6ef6d6f7ec972df6ddc37c20cdb758e8383ab105b443d0f04f8f82e7708923b7.exe
Verdict:
Malicious activity
Analysis date:
2024-03-20 16:17:43 UTC
Tags:
risepro

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Launching a process
Creating a file in the %temp% directory
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Сreating synchronization primitives
Reading critical registry keys
Sending an HTTP GET request to an infection source
Creating a process from a recently created file
Moving a file to the Program Files subdirectory
Replacing files
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Connection attempt to an infection source
Sending a TCP request to an infection source
Stealing user critical data
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm anti-vm evasive fingerprint packed packed themidawinlicense
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Amadey, RisePro Stealer
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
PE file contains section with special chars
Sample uses string decryption to hide its real strings
Sigma detected: Capture Wi-Fi password
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected RisePro Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1412592 Sample: mILFpGSna9.exe Startdate: 20/03/2024 Architecture: WINDOWS Score: 100 123 ipinfo.io 2->123 125 db-ip.com 2->125 137 Snort IDS alert for network traffic 2->137 139 Found malware configuration 2->139 141 Antivirus detection for URL or domain 2->141 143 15 other signatures 2->143 12 mILFpGSna9.exe 3 93 2->12         started        17 MPGPH131.exe 73 2->17         started        19 MPGPH131.exe 75 2->19         started        21 13 other processes 2->21 signatures3 process4 dnsIp5 129 193.233.132.62, 49699, 49702, 49703 FREE-NET-ASFREEnetEU Russian Federation 12->129 131 ipinfo.io 34.117.186.192, 443, 49700, 49704 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 12->131 133 2 other IPs or domains 12->133 105 C:\Users\user\...\jmJZKtLgmmhinrhwJBz0.exe, PE32 12->105 dropped 115 12 other malicious files 12->115 dropped 197 Detected unpacking (changes PE section rights) 12->197 199 Tries to steal Mail credentials (via file / registry access) 12->199 201 Found many strings related to Crypto-Wallets (likely being stolen) 12->201 217 6 other signatures 12->217 23 YvmigqbulWL7xjMmy_a2.exe 12->23         started        27 jmJZKtLgmmhinrhwJBz0.exe 12->27         started        29 schtasks.exe 1 12->29         started        41 5 other processes 12->41 107 C:\Users\user\...\Q7Bz77e66s2hmbeGX_09.exe, PE32 17->107 dropped 109 C:\Users\user\...\9Gs1Nl5nLoWYYER_JQLp.exe, PE32 17->109 dropped 117 3 other malicious files 17->117 dropped 203 Multi AV Scanner detection for dropped file 17->203 205 Machine Learning detection for dropped file 17->205 207 Found stalling execution ending in API Sleep call 17->207 31 9Gs1Nl5nLoWYYER_JQLp.exe 17->31         started        33 Q7Bz77e66s2hmbeGX_09.exe 17->33         started        111 C:\Users\user\...\bWOGLsmD36E9qXI9TQyZ.exe, PE32 19->111 dropped 113 C:\Users\user\...\9RpvHKsdWW1n94nnkklV.exe, PE32 19->113 dropped 119 3 other malicious files 19->119 dropped 209 Tries to detect sandboxes / dynamic malware analysis system (registry check) 19->209 35 9RpvHKsdWW1n94nnkklV.exe 19->35         started        121 4 other malicious files 21->121 dropped 211 Antivirus detection for dropped file 21->211 213 Tries to detect sandboxes and other dynamic analysis tools (window names) 21->213 215 Tries to harvest and steal browser information (history, passwords, etc) 21->215 219 2 other signatures 21->219 37 bGBVrJDXCWLpLHVmWx96.exe 21->37         started        39 conhost.exe 21->39         started        file6 signatures7 process8 file9 85 C:\Users\user\AppData\Local\...\explorha.exe, PE32 23->85 dropped 161 Antivirus detection for dropped file 23->161 163 Detected unpacking (changes PE section rights) 23->163 165 Machine Learning detection for dropped file 23->165 43 explorha.exe 23->43         started        167 Multi AV Scanner detection for dropped file 27->167 169 Tries to evade debugger and weak emulator (self modifying code) 27->169 171 Tries to detect virtualization through RDTSC time measurements 27->171 48 conhost.exe 29->48         started        173 Hides threads from debuggers 31->173 175 Tries to detect sandboxes / dynamic malware analysis system (registry check) 31->175 177 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 31->177 50 conhost.exe 41->50         started        52 conhost.exe 41->52         started        54 conhost.exe 41->54         started        56 conhost.exe 41->56         started        signatures10 process11 dnsIp12 127 193.233.132.56 FREE-NET-ASFREEnetEU Russian Federation 43->127 95 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+ 43->95 dropped 97 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 43->97 dropped 99 C:\Users\user\AppData\...\7a50e0cd1f.exe, PE32 43->99 dropped 101 4 other malicious files 43->101 dropped 189 Antivirus detection for dropped file 43->189 191 Detected unpacking (changes PE section rights) 43->191 193 Machine Learning detection for dropped file 43->193 195 6 other signatures 43->195 58 7a50e0cd1f.exe 43->58         started        62 explorha.exe 43->62         started        65 rundll32.exe 43->65         started        67 rundll32.exe 43->67         started        file13 signatures14 process15 dnsIp16 87 C:\Users\user\...\zVWlnvMEbzyqzvlqaHY9.exe, PE32 58->87 dropped 89 C:\Users\user\...\zrvVM0Sy1tgEqvulcC7aMT3.zip, Zip 58->89 dropped 179 Multi AV Scanner detection for dropped file 58->179 181 Detected unpacking (changes PE section rights) 58->181 183 Tries to steal Mail credentials (via file / registry access) 58->183 187 4 other signatures 58->187 69 zVWlnvMEbzyqzvlqaHY9.exe 58->69         started        135 193.233.132.74 FREE-NET-ASFREEnetEU Russian Federation 62->135 91 C:\Users\user\...tn9GAEtSkjtAA5F0gn3.exe, PE32 62->91 dropped 93 C:\Users\user\...\Fo7FAAj73jVeBkS_EBFQZtI.zip, Zip 62->93 dropped 72 Etn9GAEtSkjtAA5F0gn3.exe 62->72         started        74 rundll32.exe 65->74         started        185 System process connects to network (likely due to code injection or exploit) 67->185 file17 signatures18 process19 signatures20 145 Tries to detect sandboxes / dynamic malware analysis system (registry check) 69->145 147 Multi AV Scanner detection for dropped file 72->147 149 Detected unpacking (changes PE section rights) 72->149 151 Tries to evade debugger and weak emulator (self modifying code) 72->151 153 Tries to steal Instant Messenger accounts or passwords 74->153 155 Uses netsh to modify the Windows network and firewall settings 74->155 157 Tries to harvest and steal ftp login credentials 74->157 159 2 other signatures 74->159 76 powershell.exe 74->76         started        79 netsh.exe 74->79         started        process21 file22 103 C:\Users\user\...\246122658369_Desktop.zip, Zip 76->103 dropped 81 conhost.exe 76->81         started        83 conhost.exe 79->83         started        process23
Threat name:
Win32.Trojan.Znyonm
Status:
Malicious
First seen:
2024-03-20 16:15:07 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
24 of 24 (100.00%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
risepro
Score:
  10/10
Tags:
family:risepro evasion stealer
Behaviour
Checks BIOS information in registry
Identifies Wine through registry keys
Identifies VirtualBox via ACPI registry values (likely anti-VM)
RisePro
Malware Config
C2 Extraction:
193.233.132.62:58709
Unpacked files
SH256 hash:
240cccaa55703d8236927e9f5bac11d1b54ec3ca17fac7499a1ed0d175de786e
MD5 hash:
92bf9b308117451df454dcd2892d27cd
SHA1 hash:
234adffa83e274840491e7a571d868351aa200ad
SH256 hash:
0a92e088e809872b651e4b2cf9bdcc88d37276f2f9b4d04b1c5d6fba66cdfe1f
MD5 hash:
1dc372e3948c93e61e12c087f6e257ee
SHA1 hash:
222fee580edba050f0d35cd5a15b028c1c252d62
SH256 hash:
03c52a626e46be156b74228b16144a95057a0353424cd51570b1ddd6e9827be9
MD5 hash:
5d27f812f0859eb27770e395f20def05
SHA1 hash:
10a97fe6cce8e9e800c4eea793e53cf8ed413dca
SH256 hash:
6ef6d6f7ec972df6ddc37c20cdb758e8383ab105b443d0f04f8f82e7708923b7
MD5 hash:
b91651a6bbf433e114769060aaf3722f
SHA1 hash:
95e6d780413459934f0c1de0c7acbc9b35d71235
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:Windows_Generic_Threat_e5f4703f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RiseProStealer

Executable exe 6ef6d6f7ec972df6ddc37c20cdb758e8383ab105b443d0f04f8f82e7708923b7

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical

Comments



Avatar
zbet commented on 2024-03-20 16:14:56 UTC

url : hxxp://193.233.132.167/cost/random.exe