Technical Analysis of RiseLoader
Dec. 17, 2024, 10:04 a.m.
Tags
External References
Description
RiseLoader, a new malware loader family observed in October 2024, implements a custom TCP-based binary network protocol similar to RisePro. It uses VMProtect for obfuscation and has been observed dropping malware families like Vidar, Lumma Stealer, XMRig, and Socks5Systemz. The malware collects information about installed applications and browser extensions related to cryptocurrency. RiseLoader's network communication protocol involves exchanging various message types with the C2 server, including system information, payload instructions, and task execution status. The similarities between RiseLoader and RisePro suggest they may be developed by the same threat actor, with RiseLoader potentially still in development for future information stealing and anti-analysis features.
Date
Published: Dec. 16, 2024, 11:06 p.m.
Created: Dec. 16, 2024, 11:06 p.m.
Modified: Dec. 17, 2024, 10:04 a.m.
Attack Patterns
RiseLoader
Socks5Systemz
Lumma Stealer
StealC
XMRig
Vidar
PrivateLoader
RisePro
T1559.001
T1553.002
T1027.002
T1571
T1497
T1071.001
T1204.002
T1106
T1082
T1105
T1071
T1140
T1027
T1112
T1059