MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e96789d697301017c3c5f2332f7f74fd5aabbee70373e2d7af8c7ebd24ab22e0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RiseProStealer


Vendor detections: 16


Intelligence 16 IOCs YARA File information Comments

SHA256 hash: e96789d697301017c3c5f2332f7f74fd5aabbee70373e2d7af8c7ebd24ab22e0
SHA3-384 hash: 9f0e9fa05a082b618959b41c2b1f4534761d49ee395487fba3eb7699742b85837c6ec8d1096d06f72080f04a50ed8c6b
SHA1 hash: 81f3b5282d453b70724ffbe70e7298389dd1194c
MD5 hash: ac18ad4de0d70e7cbbfb829afea0dd45
humanhash: kilo-california-victor-pasta
File name:ac18ad4de0d70e7cbbfb829afea0dd45.exe
Download: download sample
Signature RiseProStealer
File size:1'014'784 bytes
First seen:2023-12-18 22:15:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 24576:zy2I2Sr+pny1Aed6Dk9y6mEG0HqpNo1tUbJfk:G2I5Ked3nmDSTU
TLSH T18525221297E86877D4B127B42CF723530739BCA10C788A7F7656A4584C72AE8B07276F
TrID 41.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
22.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
11.8% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
7.5% (.EXE) Win64 Executable (generic) (10523/12/4)
4.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe RiseProStealer


Avatar
abuse_ch
RiseProStealer C2:
77.105.132.87:17066

Intelligence


File Origin
# of uploads :
1
# of downloads :
355
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Launching a process
Behavior that indicates a threat
Searching for the browser window
Searching for the window
DNS request
Sending a custom TCP request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
advpack anti-vm CAB control explorer installer installer lolbin packed rundll32 setupapi sfx shell32 stealer
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba, RedLine, RisePro Stealer, Smok
Detection:
malicious
Classification:
phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Contains functionality to modify clipboard data
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
DLL side loading technique detected
Found API chain indicative of sandbox detection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Windows Defender protection settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Phishing site detected (based on logo match)
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Sigma detected: Powershell downloading file from url shortener site
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
UAC bypass detected (Fodhelper)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected Glupteba
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1364196 Sample: S34LLQSfIU.exe Startdate: 18/12/2023 Architecture: WINDOWS Score: 100 181 Found malware configuration 2->181 183 Malicious sample detected (through community Yara rule) 2->183 185 Antivirus detection for URL or domain 2->185 187 19 other signatures 2->187 10 S34LLQSfIU.exe 1 4 2->10         started        13 svchost.exe 1 2 2->13         started        16 svchost.exe 2->16         started        18 4 other processes 2->18 process3 dnsIp4 129 C:\Users\user\AppData\Local\...\lP8PV47.exe, PE32 10->129 dropped 131 C:\Users\user\AppData\Local\...\6qY7ld8.exe, PE32 10->131 dropped 20 6qY7ld8.exe 10->20         started        23 lP8PV47.exe 1 4 10->23         started        161 23.204.76.112 AKAMAI-ASN1EU United States 13->161 163 127.0.0.1 unknown unknown 13->163 26 WerFault.exe 16->26         started        165 40.126.29.6 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 18->165 file5 process6 file7 189 Antivirus detection for dropped file 20->189 191 Machine Learning detection for dropped file 20->191 193 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 20->193 199 3 other signatures 20->199 28 explorer.exe 20->28 injected 125 C:\Users\user\AppData\Local\...\4Uh436mr.exe, PE32 23->125 dropped 127 C:\Users\user\AppData\Local\...\1pH71tZ8.exe, PE32 23->127 dropped 195 Multi AV Scanner detection for dropped file 23->195 197 Binary is likely a compiled AutoIt script file 23->197 33 4Uh436mr.exe 23->33         started        35 1pH71tZ8.exe 12 23->35         started        signatures8 process9 dnsIp10 155 185.215.113.68 WHOLESALECONNECTIONSNL Portugal 28->155 157 5.42.65.125 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 28->157 159 5 other IPs or domains 28->159 133 C:\Users\user\AppData\Roaming\idirrfe, PE32 28->133 dropped 135 C:\Users\user\AppData\Local\Temp\DEDB.exe, PE32 28->135 dropped 137 C:\Users\user\AppData\Local\Temp\B8D4.exe, PE32 28->137 dropped 139 5 other malicious files 28->139 dropped 251 System process connects to network (likely due to code injection or exploit) 28->251 253 Benign windows process drops PE files 28->253 255 Hides that the sample has been downloaded from the Internet (zone.identifier) 28->255 37 DEDB.exe 28->37         started        41 B8D4.exe 28->41         started        43 9DD8.exe 28->43         started        54 4 other processes 28->54 257 Multi AV Scanner detection for dropped file 33->257 259 Machine Learning detection for dropped file 33->259 261 Contains functionality to inject code into remote processes 33->261 269 3 other signatures 33->269 46 AppLaunch.exe 21 70 33->46         started        263 Binary is likely a compiled AutoIt script file 35->263 265 Found API chain indicative of sandbox detection 35->265 267 Contains functionality to modify clipboard data 35->267 48 chrome.exe 9 35->48         started        50 chrome.exe 35->50         started        52 chrome.exe 35->52         started        56 6 other processes 35->56 file11 signatures12 process13 dnsIp14 99 C:\Users\user\AppData\Local\Temp\tuc3.exe, PE32 37->99 dropped 101 C:\Users\user\AppData\Local\...\toolspub2.exe, PE32 37->101 dropped 103 C:\Users\user\AppData\...\InstallSetup9.exe, PE32 37->103 dropped 105 C:\...\31839b57a4f11171d6abc8bbc4451ee4.exe, PE32 37->105 dropped 201 Antivirus detection for dropped file 37->201 203 Multi AV Scanner detection for dropped file 37->203 205 Machine Learning detection for dropped file 37->205 58 toolspub2.exe 37->58         started        70 4 other processes 37->70 107 C:\Users\user\AppData\...\Protect544cd51a.dll, PE32 41->107 dropped 207 Writes to foreign memory regions 41->207 209 Allocates memory in foreign processes 41->209 211 Sample uses process hollowing technique 41->211 213 Injects a PE file into a foreign processes 41->213 61 RegSvcs.exe 41->61         started        145 77.105.132.87 PLUSTELECOM-ASRU Russian Federation 43->145 215 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 43->215 147 91.92.249.253 THEZONEBG Bulgaria 46->147 149 34.117.186.192 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 46->149 109 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32 46->109 dropped 111 C:\...\iLSMbxvP9lstbnnAR2Caqodt3Opwsk3k.zip, Zip 46->111 dropped 113 C:\Users\user\AppData\...\FANBooster131.exe, PE32 46->113 dropped 115 2 other files (none is malicious) 46->115 dropped 217 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 46->217 219 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 46->219 221 Found many strings related to Crypto-Wallets (likely being stolen) 46->221 223 7 other signatures 46->223 73 15 other processes 46->73 151 192.168.2.5 unknown unknown 48->151 153 239.255.255.250 unknown Reserved 48->153 75 3 other processes 48->75 64 chrome.exe 50->64         started        66 chrome.exe 52->66         started        68 cmd.exe 54->68         started        77 6 other processes 56->77 file15 signatures16 process17 dnsIp18 225 Multi AV Scanner detection for dropped file 58->225 227 Detected unpacking (changes PE section rights) 58->227 229 Injects a PE file into a foreign processes 58->229 79 toolspub2.exe 58->79         started        167 195.20.16.103 EITADAT-ASFI Finland 61->167 231 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 61->231 233 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 61->233 235 Tries to harvest and steal browser information (history, passwords, etc) 61->235 237 Suspicious powershell command line found 68->237 82 powershell.exe 68->82         started        85 conhost.exe 68->85         started        169 173.231.16.77 WEBNXUS United States 70->169 177 2 other IPs or domains 70->177 117 C:\Users\user\AppData\Local\Temp\...\Math.dll, PE32 70->117 dropped 119 C:\Users\user\AppData\Local\...\INetC.dll, PE32 70->119 dropped 121 C:\Users\user\AppData\...\nstA22.tmp.exe, PE32 70->121 dropped 123 3 other malicious files 70->123 dropped 239 Antivirus detection for dropped file 70->239 241 Detected unpacking (overwrites its own PE header) 70->241 243 UAC bypass detected (Fodhelper) 70->243 249 3 other signatures 70->249 87 BroomSetup.exe 70->87         started        89 tuc3.tmp 70->89         started        171 52.168.117.172 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 73->171 245 Found many strings related to Crypto-Wallets (likely being stolen) 73->245 247 Uses schtasks.exe or at.exe to add and modify task schedules 73->247 91 conhost.exe 73->91         started        93 conhost.exe 73->93         started        95 conhost.exe 73->95         started        97 13 other processes 73->97 173 104.244.42.130 TWITTERUS United States 75->173 175 104.244.42.133 TWITTERUS United States 75->175 179 76 other IPs or domains 75->179 file19 signatures20 process21 dnsIp22 271 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 79->271 273 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 79->273 275 Maps a DLL or memory area into another process 79->275 279 2 other signatures 79->279 141 67.199.248.11 GOOGLE-PRIVATE-CLOUDUS United States 82->141 143 93.184.216.34 EDGECASTUS European Union 82->143 277 Multi AV Scanner detection for dropped file 87->277 signatures23
Threat name:
Win32.Trojan.SmokeLoader
Status:
Malicious
First seen:
2023-12-18 22:16:06 UTC
File Type:
PE (Exe)
Extracted files:
100
AV detection:
18 of 37 (48.65%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:zgrat botnet:666 botnet:livetraffic botnet:up3 backdoor brand:google brand:paypal collection evasion infostealer persistence phishing rat trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
AutoIT Executable
Detected potential entity reuse from brand paypal.
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Drops startup file
Executes dropped EXE
Loads dropped DLL
Downloads MZ/PE file
Detect ZGRat V1
Detected google phishing page
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine payload
SmokeLoader
ZGRat
Malware Config
C2 Extraction:
http://185.215.113.68/fks/index.php
77.105.132.87:17066
195.20.16.103:18305
Unpacked files
SH256 hash:
7c96f01840ec6ca5401f82ca1a4f76987f98c34c3a68b2a946c04f355e3addb2
MD5 hash:
7561884d01fc728145e6235ba817f2d5
SHA1 hash:
ff1b81f9c08a01ccad47181ac5b59f4950c79dc5
SH256 hash:
fb2ffd61b1600b318a5814d60601afd0d9b4602b6fb4bf8e13f21da7fff2cabd
MD5 hash:
51056dd7b1a40e49623a28e27ef8aa19
SHA1 hash:
4f603d1c71429f03a7762347845ba1d0f8c47b10
Detections:
AutoIT_Compiled
Parent samples :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 hash:
648774a6de3e30c45c11f328696daeae8f3c7d859a09da8264cf1928c6970425
MD5 hash:
2b42d68cf3b3932dd10b37eacf7fd95a
SHA1 hash:
14f5608d7f18941e17bde7552cc312e26d4379f9
Detections:
win_smokeloader_a2
SH256 hash:
e96789d697301017c3c5f2332f7f74fd5aabbee70373e2d7af8c7ebd24ab22e0
MD5 hash:
ac18ad4de0d70e7cbbfb829afea0dd45
SHA1 hash:
81f3b5282d453b70724ffbe70e7298389dd1194c
Detections:
win_redline_wextract_hunting_oct_2023
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RiseProStealer

Executable exe e96789d697301017c3c5f2332f7f74fd5aabbee70373e2d7af8c7ebd24ab22e0

(this sample)

  
Delivery method
Distributed via web download

Comments