MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b50becdb79b109e85caa4f588343fdd7e96152f4e23f40ad213a0336118bc87b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RiseProStealer


Vendor detections: 11


Intelligence 11 IOCs YARA 7 File information Comments 1

SHA256 hash: b50becdb79b109e85caa4f588343fdd7e96152f4e23f40ad213a0336118bc87b
SHA3-384 hash: a2191a6aaca51b34b0a2e8f0504a309a8758df8ddf0d1d90f918b9821150a81b10bf0aceaf04056628c78339beea448f
SHA1 hash: fa534e53d645f69d1c950d8ff17e11e877ca970b
MD5 hash: 758c5213c3ffebe919633188f8c07747
humanhash: nuts-asparagus-california-april
File name:758c5213c3ffebe919633188f8c07747
Download: download sample
Signature RiseProStealer
File size:2'328'576 bytes
First seen:2024-02-21 11:27:19 UTC
Last seen:2024-02-21 14:21:47 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 49152:ov+pa5Mxg2VmKxuou1saUJ3iuL+y8g9Rdi8ZNaFwbdwUdUL:1pa5Mx9oKhaKdL+Lgo8ZoF0dw5L
TLSH T1E4B53381F88175B1EC3B00B958BF4F136F2EC64691F44E79369E2348ADF36589069AB1
TrID 32.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
28.9% (.EXE) Win32 Executable (generic) (4504/4/1)
13.0% (.EXE) OS/2 Executable (generic) (2029/13)
12.8% (.EXE) Generic Win/DOS Executable (2002/3)
12.8% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon b3b2b3b2cceee7b2 (146 x RiseProStealer, 7 x CoinMiner, 1 x AgentTesla)
Reporter zbetcheckin
Tags:32 exe RiseProStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
580
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
lolbin msbuild packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, RisePro Stealer
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Potentially malicious time measurement code found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys stealer DLL
Yara detected RisePro Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1396093 Sample: I2jCDr35mu.exe Startdate: 21/02/2024 Architecture: WINDOWS Score: 100 120 Multi AV Scanner detection for domain / URL 2->120 122 Antivirus detection for URL or domain 2->122 124 Antivirus detection for dropped file 2->124 126 7 other signatures 2->126 8 I2jCDr35mu.exe 2 95 2->8         started        13 MPGPH131.exe 81 2->13         started        15 MPGPH131.exe 2->15         started        17 8 other processes 2->17 process3 dnsIp4 102 185.215.113.46 WHOLESALECONNECTIONSNL Portugal 8->102 104 34.117.186.192 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 8->104 106 193.233.132.62 FREE-NET-ASFREEnetEU Russian Federation 8->106 86 18 other malicious files 8->86 dropped 138 Detected unpacking (changes PE section rights) 8->138 140 Binary is likely a compiled AutoIt script file 8->140 142 Tries to steal Mail credentials (via file / registry access) 8->142 162 5 other signatures 8->162 19 idPXKSo93Tb9SEEu9e8w.exe 8->19         started        23 KFLpYwMPXjapw3SVf9HA.exe 8->23         started        25 schtasks.exe 1 8->25         started        34 3 other processes 8->34 74 C:\Users\user\...\yk50FvD1XOCg2Y2iAkjB.exe, PE32 13->74 dropped 76 C:\Users\user\...\dZPbe9okQutRw6uffMvo.exe, PE32 13->76 dropped 78 C:\Users\user\...\aCN0ucpg7A4ErZQbp9NR.exe, PE32 13->78 dropped 88 5 other malicious files 13->88 dropped 144 Multi AV Scanner detection for dropped file 13->144 146 Machine Learning detection for dropped file 13->146 148 Found many strings related to Crypto-Wallets (likely being stolen) 13->148 80 C:\Users\user\...\sy4bhhGvZ9bFDDZTr89U.exe, PE32 15->80 dropped 82 C:\Users\user\...\soOc6NhyUO7lFaV2eQJV.exe, PE32 15->82 dropped 84 C:\Users\user\...\UdgmfEtw7ukqXx7vdO3L.exe, PE32 15->84 dropped 90 10 other malicious files 15->90 dropped 150 Tries to harvest and steal browser information (history, passwords, etc) 15->150 152 Hides threads from debuggers 15->152 154 Tries to detect sandboxes / dynamic malware analysis system (registry check) 15->154 156 Antivirus detection for dropped file 17->156 158 Tries to detect sandboxes and other dynamic analysis tools (window names) 17->158 160 Tries to evade debugger and weak emulator (self modifying code) 17->160 27 firefox.exe 17->27         started        30 msedge.exe 17->30         started        32 firefox.exe 17->32         started        file5 signatures6 process7 dnsIp8 68 C:\Users\user\AppData\Local\...\explorgu.exe, PE32 19->68 dropped 128 Detected unpacking (changes PE section rights) 19->128 130 Tries to evade debugger and weak emulator (self modifying code) 19->130 132 Hides threads from debuggers 19->132 136 2 other signatures 19->136 134 Binary is likely a compiled AutoIt script file 23->134 36 chrome.exe 23->36         started        39 chrome.exe 23->39         started        41 chrome.exe 23->41         started        51 10 other processes 23->51 43 conhost.exe 25->43         started        108 142.250.176.206 GOOGLEUS United States 27->108 110 142.250.31.84 GOOGLEUS United States 27->110 116 18 other IPs or domains 27->116 70 C:\Users\user\AppData\...\gmpopenh264.dll.tmp, PE32+ 27->70 dropped 72 C:\Users\user\...\gmpopenh264.dll (copy), PE32+ 27->72 dropped 53 4 other processes 27->53 112 13.107.21.239 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 30->112 114 13.107.246.40 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 30->114 118 37 other IPs or domains 30->118 45 conhost.exe 34->45         started        47 conhost.exe 34->47         started        49 conhost.exe 34->49         started        file9 signatures10 process11 dnsIp12 92 192.168.2.6 unknown unknown 36->92 94 239.255.255.250 unknown Reserved 36->94 55 chrome.exe 36->55         started        58 chrome.exe 39->58         started        60 chrome.exe 41->60         started        62 chrome.exe 51->62         started        64 msedge.exe 51->64         started        66 msedge.exe 51->66         started        process13 dnsIp14 96 13.107.42.14 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 55->96 98 144.2.9.1 LINKEDINUS Netherlands 55->98 100 29 other IPs or domains 55->100
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2024-02-21 11:28:11 UTC
File Type:
PE (Exe)
Extracted files:
14
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
risepro
Score:
  10/10
Tags:
family:risepro evasion stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks BIOS information in registry
Identifies Wine through registry keys
Identifies VirtualBox via ACPI registry values (likely anti-VM)
RisePro
Malware Config
C2 Extraction:
193.233.132.62
Unpacked files
SH256 hash:
525e634d347e92113c686cf52a6b41f89d1d5b6bf11de88770e69452658af12b
MD5 hash:
6d00b8d497de8b08ba931846739edcd6
SHA1 hash:
ed88b3a1edbf9521812c19bde9b96356b097cb52
SH256 hash:
b50becdb79b109e85caa4f588343fdd7e96152f4e23f40ad213a0336118bc87b
MD5 hash:
758c5213c3ffebe919633188f8c07747
SHA1 hash:
fa534e53d645f69d1c950d8ff17e11e877ca970b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:NET
Author:malware-lu
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques
Rule name:Windows_Generic_Threat_e5f4703f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RiseProStealer

Executable exe b50becdb79b109e85caa4f588343fdd7e96152f4e23f40ad213a0336118bc87b

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2024-02-21 11:27:20 UTC

url : hxxp://147.45.47.101/dino/gemoru.exe