MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 94627d8117da7cccd8c34a1d8ad88d988a26ec6337d0d66559ee6943f2c2a233. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RiseProStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 21 File information Comments

SHA256 hash: 94627d8117da7cccd8c34a1d8ad88d988a26ec6337d0d66559ee6943f2c2a233
SHA3-384 hash: 5068781c5ccaa492ca107e2cc3fcf87b9f709dc7ad58a166c3c0002f84058cfe38a499a287ba86121b1a4765a6f8fc70
SHA1 hash: da095b411cb6c6e49cc04eda43a839e0141da075
MD5 hash: dfed4e36537ae0dcc15fd7ecf432e074
humanhash: lemon-asparagus-lemon-eighteen
File name:94627d8117da7cccd8c34a1d8ad88d988a26ec6337d0d66559ee6943f2c2a233.exe
Download: download sample
Signature RiseProStealer
File size:2'476'544 bytes
First seen:2024-01-02 18:57:22 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 49152:ZOng5rnpYo9282VV9Mg/WihJvjwbE9o/NYswY8hwjVpPmynUz61ryRwf:B5rnP9AX9Mg/WkJ01Zqgv3H1ryRs
TLSH T1ECB53383A6D19531CAE127B164F767C31A30BEA3AA28171F3940DBD508F35A5B13673E
TrID 41.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
22.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
11.8% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
7.5% (.EXE) Win64 Executable (generic) (10523/12/4)
4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter adm1n_usa32
Tags:exe RiseProStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
286
Origin country :
RO RO
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Launching a process
Searching for the browser window
Searching for the window
DNS request
Сreating synchronization primitives
Sending a custom TCP request
Reading critical registry keys
Blocking the Windows Defender launch
Verdict:
Malicious
Threat level:
  10/10
Confidence:
91%
Tags:
advpack anti-vm azorult CAB control explorer installer lolbin packed risepro rundll32 setupapi sfx shell32 smokeloader
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RisePro Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
Contains functionality to modify clipboard data
Detected unpacking (changes PE section rights)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Found API chain indicative of sandbox detection
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected RisePro Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1368940 Sample: xCejm48O7D.exe Startdate: 02/01/2024 Architecture: WINDOWS Score: 100 124 youtube-ui.l.google.com 2->124 126 www.youtube.com 2->126 128 3 other IPs or domains 2->128 140 Snort IDS alert for network traffic 2->140 142 Antivirus detection for URL or domain 2->142 144 Antivirus detection for dropped file 2->144 146 8 other signatures 2->146 10 xCejm48O7D.exe 1 4 2->10         started        13 FANBooster131.exe 2->13         started        16 MaxLoonaFest131.exe 2->16         started        18 5 other processes 2->18 signatures3 process4 file5 104 C:\Users\user\AppData\Local\...\IQ4uA69.exe, PE32 10->104 dropped 106 C:\Users\user\AppData\Local\...\6BN2It1.exe, PE32 10->106 dropped 20 IQ4uA69.exe 1 4 10->20         started        108 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 13->108 dropped 110 C:\...\efGgeGvS3cCnAVIw54H3g30RtLm4VXwr.zip, Zip 13->110 dropped 176 Antivirus detection for dropped file 13->176 178 Multi AV Scanner detection for dropped file 13->178 180 Detected unpacking (changes PE section rights) 13->180 194 4 other signatures 13->194 24 WerFault.exe 13->24         started        112 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 16->112 dropped 114 C:\...\sYCV9nH1sS3ORD3Zif0knrsGbqXqyQ5q.zip, Zip 16->114 dropped 182 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 16->182 184 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 16->184 186 Tries to steal Mail credentials (via file / registry access) 16->186 26 WerFault.exe 16->26         started        116 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 18->116 dropped 118 C:\...\MkN4tXxmWdIUpPZpW15ZzdildSf7LyWy.zip, Zip 18->118 dropped 188 Machine Learning detection for dropped file 18->188 190 Found many strings related to Crypto-Wallets (likely being stolen) 18->190 192 Modifies Windows Defender protection settings 18->192 28 powershell.exe 18->28         started        30 powershell.exe 18->30         started        32 powershell.exe 18->32         started        34 22 other processes 18->34 signatures6 process7 file8 92 C:\Users\user\AppData\Local\...\5zg3Oh1.exe, PE32 20->92 dropped 94 C:\Users\user\AppData\Local\...\2BI8713.exe, PE32 20->94 dropped 148 Antivirus detection for dropped file 20->148 150 Multi AV Scanner detection for dropped file 20->150 152 Binary is likely a compiled AutoIt script file 20->152 154 Machine Learning detection for dropped file 20->154 36 5zg3Oh1.exe 21 29 20->36         started        41 2BI8713.exe 12 20->41         started        43 conhost.exe 28->43         started        45 conhost.exe 30->45         started        47 conhost.exe 32->47         started        49 conhost.exe 34->49         started        51 conhost.exe 34->51         started        53 conhost.exe 34->53         started        55 18 other processes 34->55 signatures9 process10 dnsIp11 130 193.233.132.62 FREE-NET-ASFREEnetEU Russian Federation 36->130 132 ipinfo.io 34.117.186.192 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 36->132 96 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 36->96 dropped 98 C:\Users\user\AppData\...\FANBooster131.exe, PE32 36->98 dropped 100 C:\Users\user\AppData\...\MaxLoonaFest131.exe, PE32 36->100 dropped 102 C:\ProgramData\...\OfficeTrackerNMP131.exe, PE32 36->102 dropped 156 Antivirus detection for dropped file 36->156 158 Multi AV Scanner detection for dropped file 36->158 160 Detected unpacking (changes PE section rights) 36->160 170 4 other signatures 36->170 57 cmd.exe 36->57         started        60 powershell.exe 36->60         started        62 cmd.exe 36->62         started        71 13 other processes 36->71 162 Binary is likely a compiled AutoIt script file 41->162 164 Machine Learning detection for dropped file 41->164 166 Found API chain indicative of sandbox detection 41->166 168 Contains functionality to modify clipboard data 41->168 64 chrome.exe 1 41->64         started        67 chrome.exe 41->67         started        69 chrome.exe 41->69         started        file12 signatures13 process14 dnsIp15 172 Uses schtasks.exe or at.exe to add and modify task schedules 57->172 86 2 other processes 57->86 174 Found many strings related to Crypto-Wallets (likely being stolen) 60->174 73 conhost.exe 60->73         started        88 2 other processes 62->88 120 192.168.2.4 unknown unknown 64->120 122 239.255.255.250 unknown Reserved 64->122 75 chrome.exe 64->75         started        78 chrome.exe 64->78         started        80 chrome.exe 64->80         started        82 chrome.exe 67->82         started        84 chrome.exe 69->84         started        90 11 other processes 71->90 signatures16 process17 dnsIp18 134 142.250.113.139 GOOGLEUS United States 75->134 136 accounts.google.com 142.250.113.84 GOOGLEUS United States 75->136 138 42 other IPs or domains 75->138
Threat name:
Win32.Trojan.Smokeloader
Status:
Malicious
First seen:
2024-01-02 06:29:18 UTC
File Type:
PE (Exe)
Extracted files:
165
AV detection:
24 of 36 (66.67%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:lumma persistence stealer
Behaviour
Creates scheduled task(s)
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
AutoIT Executable
Adds Run key to start application
Looks up external IP address via web service
Executes dropped EXE
Loads dropped DLL
Detect Lumma Stealer payload V4
Lumma Stealer
Unpacked files
SH256 hash:
d4d7d2fab7a6666da15eab711c1d70bafe0be08dbd27e3a6a60c3cc313edf7af
MD5 hash:
72f78ac855a823c3fce8e24f4f043783
SHA1 hash:
a266ee5f98147466975b791a9a50df939b5093cf
Detections:
AutoIT_Compiled
SH256 hash:
94627d8117da7cccd8c34a1d8ad88d988a26ec6337d0d66559ee6943f2c2a233
MD5 hash:
dfed4e36537ae0dcc15fd7ecf432e074
SHA1 hash:
da095b411cb6c6e49cc04eda43a839e0141da075
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Borland
Author:malware-lu
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerHiding__Thread
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:EnigmaStub
Author:@bartblaze
Description:Identifies Enigma packer stub.
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:win_redline_wextract_hunting_oct_2023
Author:Matthew @ Embee_Research
Description:Detects wextract archives related to redline/amadey

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments