Today > 2 Critical | 11 High | 12 Medium vulnerabilities   -   You can now download lists of IOCs here!

Technical Analysis of RiseLoader

Dec. 17, 2024, 10:04 a.m.

Description

RiseLoader, a new malware loader family observed in October 2024, implements a custom TCP-based binary network protocol similar to RisePro. It uses VMProtect for obfuscation and has been observed dropping malware families like Vidar, Lumma Stealer, XMRig, and Socks5Systemz. The malware collects information about installed applications and browser extensions related to cryptocurrency. RiseLoader's network communication protocol involves exchanging various message types with the C2 server, including system information, payload instructions, and task execution status. The similarities between RiseLoader and RisePro suggest they may be developed by the same threat actor, with RiseLoader potentially still in development for future information stealing and anti-analysis features.

Date

Published: Dec. 16, 2024, 11:06 p.m.

Created: Dec. 16, 2024, 11:06 p.m.

Modified: Dec. 17, 2024, 10:04 a.m.

Attack Patterns

RiseLoader

Socks5Systemz

Lumma Stealer

StealC

XMRig

Vidar

PrivateLoader

RisePro

T1559.001

T1553.002

T1027.002

T1571

T1497

T1071.001

T1204.002

T1106

T1082

T1105

T1071

T1140

T1027

T1112

T1059