MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 cc6a9c67aab8b828de9342bf348f131b8d255a5d3a88bfd439c76717867a58ba. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RiseProStealer
Vendor detections: 14
| SHA256 hash: | cc6a9c67aab8b828de9342bf348f131b8d255a5d3a88bfd439c76717867a58ba |
|---|---|
| SHA3-384 hash: | 8d0bf45084de1d19e8eeb29a04503004c03dc1f6fb706876b53388bf4c58723171821c3457fe96dc6a748d852fb81614 |
| SHA1 hash: | ba39251b7d152d1b1c8377f63df47ed67ce04113 |
| MD5 hash: | c3f91b46a22380f7d299ad9bc1857650 |
| humanhash: | three-alaska-lamp-mockingbird |
| File name: | c3f91b46a22380f7d299ad9bc1857650.exe |
| Download: | download sample |
| Signature | RiseProStealer |
| File size: | 2'024'448 bytes |
| First seen: | 2023-11-29 14:35:39 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 49152:XQzVwBriUH9kJtyrdzf7fvKcpw5+W93EHPgfnF5J9u1:seBriUHO0FwAC3EH0F5J9u |
| TLSH | T17D953313E7D8C112C9F66FB914FB17AB0E3A3CE6FEA493365B49A5451820560C96233F |
| TrID | 41.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 22.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 11.8% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 7.5% (.EXE) Win64 Executable (generic) (10523/12/4) 4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RiseProStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
fd13cdd897c6f627ad8b02ef425687b81109a71eccd213a989744b15d70547e6
b2ce4969d9a32bb0825f61ae01a0b789f6fefab7cec1cd3eb155c2d098ac8b0b
8f682183913956c6d0414d2ee9165d9f31957934507b4fb010e1eafd29b3cf0e
19b2a5a72d27f8841152bca2694ce3d720dca29885a588443a375dec9c0a7b52
e72b8d48554951d7c19ac727e4718ed0f7e72e095f47cfc9cf8669dc6dcff3ad
80521b1682d5e13e9bbeeadfd585ad3bf51bcf6164d378fce34a512056f4fa3f
914fb27e6fcc06d274cb0803c948b798f24a89133b07089c4c5d1c5d1330a492
cc6a9c67aab8b828de9342bf348f131b8d255a5d3a88bfd439c76717867a58ba
428d3eac1d6720cca1a2461153b8e39b5ac10340f458c1c5ae93d2c85cebc054
34a44460dfa558f27fdfc643168a0190092488bb868d6533d6bd3db8c6fa317f
b29809c5475a8caf8702bd71952cce6fb585444cd54334977a97ebb6f27c4884
102a9ec729b9c7d22477ef5614608cb6d53f00947a1dc10ac28475416d2f1ac5
f2bad17c95df7a75caa22ceccf738c99e0678ab671c05d15f188912c8031076c
718e5e29921b3376f1b3e1073915d61d74ac5541b3b7a11c24588ddb253da307
4f05a5578ecdf2695c30935820746aee082b63f0da0e9343e03ae3651de312af
f09ccf0fbb63f17669b32ca8cda1140ec02798acb94d5630d9ea829ce10811a4
c92353fc93904cff5198ccddebdd3381d94a9a4f05e8256cd96fd4c3b00bddcf
efd7aa7d7abc3cfc31ab83c5086b82da3253fa4a477956825e73d64d8386586f
9e1aada06c334b3d3e9220affa9dc56b5689b1df0615899026510b1a8f0ebb78
c9787d0e39bee301e56e16b4834799f8ada277062bcde961b2f46a355fe5a8f0
279cdbdbe98ad615ecf2f4d29117506258987b3c656ee983c88fb7d0830158f8
d652a76c1139883ad6af8660b00dd54d5237faf7e62f18dbb954ab3f1ac033a5
5c4d93be7d334a4ce5884cc29b1dba7b67fc0d7cf1e7b11d02108fd979f53871
e821aecbe1ff17494e6390117f8f8b5ddfe9d811a1c78e07edf831d652f247f5
5148d1d1fccca6226ee17d6abe0866e4f309b8d4144d99c4a37fd4b44809566d
6414d22bde2e1e36e1d822eff0abdaddd93e026af05b22149d759b9fdacdf75a
f87d53c27725ade58b2717a2bcf96a76ca0efec6d5ebc08a3b335fe4d388d5c6
e1ce6041d3b57827447bc59e6bf6ba9ab43b41763b351740bc1dbd851d747d18
cc6a9c67aab8b828de9342bf348f131b8d255a5d3a88bfd439c76717867a58ba
4c98667e55e0241bc8475bfdafa7847d1708e3d004d7190fca89fa10fa088123
a2a1aa7c9939633566c1449fd70c8f452ac60ad28f4e17bbd303f952b11ef5ca
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | win_redline_wextract_hunting_oct_2023 |
|---|---|
| Author: | Matthew @ Embee_Research |
| Description: | Detects wextract archives related to redline/amadey |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.