{"id":6274,"date":"2023-11-28T08:08:08","date_gmt":"2023-11-28T08:08:08","guid":{"rendered":"\/cybersecurity-blog\/?p=6274"},"modified":"2025-07-17T08:27:24","modified_gmt":"2025-07-17T08:27:24","slug":"risepro-malware-communication-analysis","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/","title":{"rendered":"RisePro Malware Analysis: Exploring C2 Communication of a New\u00a0Version"},"content":{"rendered":"\n<p>RisePro is a malware-as-a-service info-stealer, first identified in 2022. Recently, we&#8217;ve detected a spike in it&#8217;s activity and decided to conduct an investigation, which led to interesting findings.&nbsp;<\/p>\n\n\n\n<p>RisePro is a well-documented malware, but&nbsp;we quickly realized that the network traffic patterns of our samples did not match the existing literature. It seemed like we had a new version on our hands.&nbsp;<\/p>\n\n\n\n<p>Further analysis revealed that RisePro changed the way it communicates with C2 and that it has gained new capabilities \u2014 in particular, remote-control functions, making it capable of operating as a RAT.&nbsp;<\/p>\n\n\n\n<p>This article will focus on&nbsp;this malware&#8217;s new network communication patterns, but first, a quick refresher about what RisePro malware is.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is RisePro malware?<\/h2>\n\n\n\n<p>RisePro, an information-stealing malware, was first detected by cybersecurity firms Flashpoint and Sekoia. It is distributed through fake cracks sites operated by the PrivateLoader pay-per-install (PPI) malware distribution service. It is designed to steal credit cards, passwords, and crypto wallets from infected devices.&nbsp;<\/p>\n\n\n\n<p>RisePro is potentially based on the Vidar password-stealing malware and it employs a system of embedded DLL dependencies. RisePro&#8217;s modus operandi includes fingerprinting the compromised system, writing stolen data to a text file, taking screenshots, and then bundling and sending this data to the attacker&#8217;s server.&nbsp;<\/p>\n\n\n\n<p>The PrivateLoader service, which distributes RisePro, is known for disguising malware as software cracks, key generators, and game modifications. It was first spotted by Intel471 in February 2022. Sekoia&#8217;s findings <a href=\"https:\/\/blog.sekoia.io\/new-risepro-stealer-distributed-by-the-prominent-privateloader\/\" target=\"_blank\" rel=\"noreferrer noopener\">indicate<\/a> that RisePro shares significant code overlaps with PrivateLoader, suggesting a deeper connection between the two.&nbsp;<\/p>\n\n\n\n<p>Like we said earlier, our analysis focuses on the recent changes in RisePro&#8217;s C2 communication and network traffic patterns of its latest version, which differ drastically from previous iterations.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Traffic analysis of the new RisePro malware sample&nbsp;<\/h2>\n\n\n\n<p>There\u2019s a big change to highlight right of the bat. <strong>Our sample uses custom protocol over TCP for communication. <\/strong>&nbsp;This indicates a complete overhaul of the communication method, which previously transmitted instructions over HTTP.&nbsp;<\/p>\n\n\n\n<p>Let\u2019s start our deep dive into this variant\u2019s communication patterns. Here\u2019s a screenshot of a network packet from <a href=\"http:\/\/any.run\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=risepro_analysis&amp;utm_content=linktolanding&amp;utm_term=281123\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN online malware sandbox,<\/a> which was the starting point of our investigation:<\/p>\n\n\n\n<p>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img1-1-1024x538.webp\" alt=\"\" class=\"wp-image-6276\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img1-1-1024x538.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img1-1-300x158.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img1-1-768x403.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img1-1-1536x806.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img1-1-370x194.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img1-1-270x142.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img1-1-740x389.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/img1-1.webp 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Comparing encrypted (left) and decrypted (right) packet content<\/figcaption><\/figure><\/div>\n\n\n<p>Upon examining the packet bytes (right column), it&#8217;s evident that the traffic is encrypted, making it indecipherable. The first task, then, was to decrypt it.&nbsp;<\/p>\n\n\n\n<p>Sekoia researchers have already <a href=\"https:\/\/blog.sekoia.io\/new-risepro-stealer-distributed-by-the-prominent-privateloader\/\" target=\"_blank\" rel=\"noreferrer noopener\">cracked<\/a> this encryption, so, to start, we decided to try and apply their decryption algorithm. Surprisingly, it successfully decrypted the data. This means the same encryption is still used.&nbsp;<\/p>\n\n\n\n<p>The&nbsp;encryption algorithm is a basic substitution cipher followed by XOR with key 0x36. By Testing it with different ports we were able to find multiple keys. For example, the key for port 50500 is 0x36, and for port 50505 it is 0x79. Interestingly, opcodes take on different meanings depending on the port. In this article we will provide examples for port 50500.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Diving deeper in the packet analysis&nbsp;<\/h2>\n\n\n\n<p>But let&#8217;s get back to the traffic analysis. Since we decrypted the TCP stream, we can begin to understand the structure of each packet.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"488\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/2-1024x488.webp\" alt=\"\" class=\"wp-image-6277\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/2-1024x488.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/2-300x143.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/2-768x366.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/2-1536x731.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/2-370x176.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/2-270x129.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/2-740x352.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/2.webp 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Each packet has 3 blocks that follow a set pattern<\/figcaption><\/figure><\/div>\n\n\n<p>In the image above, we see several packets (the first being the initialization packet). Three distinct blocks are noticeable, following a clear pattern. We can represent this structure as follows:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"448\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/3-1024x448.webp\" alt=\"\" class=\"wp-image-6278\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/3-1024x448.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/3-300x131.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/3-768x336.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/3-370x162.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/3-270x118.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/3-740x324.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/3.webp 1268w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Packet structure<\/figcaption><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li>The first 4 bytes, labeled as <strong>magic<\/strong>, are always repeated and determine the beginning of the packet.&nbsp;<\/li>\n\n\n\n<li>The next 4 bytes define the length of the data attached to the packet, labeled as <strong>payload_len<\/strong>.&nbsp;<\/li>\n\n\n\n<li>And, as you can see from the screen above, immediately following is <strong>packet_type<\/strong>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>During the analysis, we discovered the following <strong>packet_types, <\/strong>which represent various opcodes:&nbsp;<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-41\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"4\"\n           data-rows=\"23\"\n           data-wpID=\"41\"\n           data-responsive=\"0\"\n           data-has-header=\"1\">\n\n                    <thead>        <tr class=\"wpdt-cell-row \" >\n                                <th class=\"wpdt-cell wpdt-bold wpdt-align-left\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:25%;                    padding:10px;\n                    \"\n                    >\n                                        Packet type\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell wpdt-bold wpdt-align-left\"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:25%;                    padding:10px;\n                    \"\n                    >\n                                        Value\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell wpdt-bold wpdt-align-left\"\n                                            data-cell-id=\"C1\"\n                    data-col-index=\"2\"\n                    data-row-index=\"0\"\n                    style=\" width:25%;                    padding:10px;\n                    \"\n                    >\n                                        Payload\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell wpdt-bold wpdt-align-left\"\n                                            data-cell-id=\"D1\"\n                    data-col-index=\"3\"\n                    data-row-index=\"0\"\n                    style=\" width:25%;                    padding:10px;\n                    \"\n                    >\n                                        Description\u00a0                    <\/th>\n                                        <\/tr>\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A2\"\n                    data-col-index=\"0\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        SERVER_PING\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B2\"\n                    data-col-index=\"1\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x2710\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C2\"\n                    data-col-index=\"2\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        (OPTIONAL) text string\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D2\"\n                    data-col-index=\"3\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Default response, \u00a0Keep-Alive (heartbeat)\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A3\"\n                    data-col-index=\"0\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        CLIENT_PING\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B3\"\n                    data-col-index=\"1\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x2711\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C3\"\n                    data-col-index=\"2\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D3\"\n                    data-col-index=\"3\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Keep-Alive (heartbeat)\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A4\"\n                    data-col-index=\"0\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        SERVER_INIT\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B4\"\n                    data-col-index=\"1\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x2712\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C4\"\n                    data-col-index=\"2\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        24 bytes string \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D4\"\n                    data-col-index=\"3\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Server Hello \u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A5\"\n                    data-col-index=\"0\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        SET_TIMEOUT\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B5\"\n                    data-col-index=\"1\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x2713\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C5\"\n                    data-col-index=\"2\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Number string\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D5\"\n                    data-col-index=\"3\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Server\/client timeout for action (e.g. upload)\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A6\"\n                    data-col-index=\"0\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        CLIENT_REQUEST_FILE\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B6\"\n                    data-col-index=\"1\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x2714\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C6\"\n                    data-col-index=\"2\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        File name (string)\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D6\"\n                    data-col-index=\"3\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Request file from server                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A7\"\n                    data-col-index=\"0\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        SERVER_SEND_FILE\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B7\"\n                    data-col-index=\"1\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x2715\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C7\"\n                    data-col-index=\"2\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        File name, compressed file (zlib)\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D7\"\n                    data-col-index=\"3\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Used by server to send additional libraries\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A8\"\n                    data-col-index=\"0\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        CLIENT_CONFIRM_IP\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B8\"\n                    data-col-index=\"1\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x2716\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C8\"\n                    data-col-index=\"2\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Response string\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D8\"\n                    data-col-index=\"3\"\n                    data-row-index=\"7\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        IP receive confirmation\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A9\"\n                    data-col-index=\"0\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        SERVER_SEND_MARKS\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B9\"\n                    data-col-index=\"1\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x2717\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C9\"\n                    data-col-index=\"2\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        JSON string\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D9\"\n                    data-col-index=\"3\"\n                    data-row-index=\"8\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        List of marks configs\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A10\"\n                    data-col-index=\"0\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        CLIENT_CONFIRM_MARKS\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B10\"\n                    data-col-index=\"1\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x2718\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C10\"\n                    data-col-index=\"2\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Response string\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D10\"\n                    data-col-index=\"3\"\n                    data-row-index=\"9\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Marks receive confirmation\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A11\"\n                    data-col-index=\"0\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        SERVER_SEND_GRAB_CONFIG\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B11\"\n                    data-col-index=\"1\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x2719\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C11\"\n                    data-col-index=\"2\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        JSON string\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D11\"\n                    data-col-index=\"3\"\n                    data-row-index=\"10\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Settings and grabbers\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A12\"\n                    data-col-index=\"0\"\n                    data-row-index=\"11\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        CLIENT_CONFIRM_GRAB_CONFIG\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B12\"\n                    data-col-index=\"1\"\n                    data-row-index=\"11\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x271A\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C12\"\n                    data-col-index=\"2\"\n                    data-row-index=\"11\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Response string\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D12\"\n                    data-col-index=\"3\"\n                    data-row-index=\"11\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Settings receive confirmation\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A13\"\n                    data-col-index=\"0\"\n                    data-row-index=\"12\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        SERVER_SEND_LOADER_CONFIG\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B13\"\n                    data-col-index=\"1\"\n                    data-row-index=\"12\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x271B\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C13\"\n                    data-col-index=\"2\"\n                    data-row-index=\"12\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        JSON string\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D13\"\n                    data-col-index=\"3\"\n                    data-row-index=\"12\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        List of loader configs, includes urls and execution conditions\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A14\"\n                    data-col-index=\"0\"\n                    data-row-index=\"13\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        CLIENT_CONFIRM_LOADER_CONFIG\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B14\"\n                    data-col-index=\"1\"\n                    data-row-index=\"13\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x271C\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C14\"\n                    data-col-index=\"2\"\n                    data-row-index=\"13\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Response string\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D14\"\n                    data-col-index=\"3\"\n                    data-row-index=\"13\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Loader configs receive confirmation\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A15\"\n                    data-col-index=\"0\"\n                    data-row-index=\"14\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        SERVER_SET_FILE_FILTER\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B15\"\n                    data-col-index=\"1\"\n                    data-row-index=\"14\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x271D\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C15\"\n                    data-col-index=\"2\"\n                    data-row-index=\"14\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        JSON string\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D15\"\n                    data-col-index=\"3\"\n                    data-row-index=\"14\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        List of file filtration rules\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A16\"\n                    data-col-index=\"0\"\n                    data-row-index=\"15\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        CLIENT_CONFIRM_LOADER_EXECUTION\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B16\"\n                    data-col-index=\"1\"\n                    data-row-index=\"15\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x271E\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C16\"\n                    data-col-index=\"2\"\n                    data-row-index=\"15\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Name from loader config\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D16\"\n                    data-col-index=\"3\"\n                    data-row-index=\"15\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Confirmation of execution load target from particular config\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A17\"\n                    data-col-index=\"0\"\n                    data-row-index=\"16\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        CLIENT_SEND_FILE\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B17\"\n                    data-col-index=\"1\"\n                    data-row-index=\"16\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x271F\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C17\"\n                    data-col-index=\"2\"\n                    data-row-index=\"16\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        File name, response string, build id, compressed file (zip)\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D17\"\n                    data-col-index=\"3\"\n                    data-row-index=\"16\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Exfiltrated files in archive with name representing geolocation and IP address\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A18\"\n                    data-col-index=\"0\"\n                    data-row-index=\"17\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        CLIENT_INIT\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B18\"\n                    data-col-index=\"1\"\n                    data-row-index=\"17\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x2720\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C18\"\n                    data-col-index=\"2\"\n                    data-row-index=\"17\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        (OPTIONAL) text string\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D18\"\n                    data-col-index=\"3\"\n                    data-row-index=\"17\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Client Hello, optional authentication in format \u201c{HWID}|{response string}\u201d\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A19\"\n                    data-col-index=\"0\"\n                    data-row-index=\"18\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        SERVER_SEND_IP\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B19\"\n                    data-col-index=\"1\"\n                    data-row-index=\"18\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x2721\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C19\"\n                    data-col-index=\"2\"\n                    data-row-index=\"18\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        IP string\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D19\"\n                    data-col-index=\"3\"\n                    data-row-index=\"18\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Used by server to send client\u2019s public IP\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A20\"\n                    data-col-index=\"0\"\n                    data-row-index=\"19\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        CLIENT_SEND_UNKNOWN\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B20\"\n                    data-col-index=\"1\"\n                    data-row-index=\"19\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x2722\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C20\"\n                    data-col-index=\"2\"\n                    data-row-index=\"19\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D20\"\n                    data-col-index=\"3\"\n                    data-row-index=\"19\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Mentioned in code, not used\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A21\"\n                    data-col-index=\"0\"\n                    data-row-index=\"20\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        SERVER_SEND_UNKNOWN\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B21\"\n                    data-col-index=\"1\"\n                    data-row-index=\"20\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x2723\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C21\"\n                    data-col-index=\"2\"\n                    data-row-index=\"20\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D21\"\n                    data-col-index=\"3\"\n                    data-row-index=\"20\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Mentioned in code, not used\u00a0\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A22\"\n                    data-col-index=\"0\"\n                    data-row-index=\"21\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        SERVER_SEND_HWID\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B22\"\n                    data-col-index=\"1\"\n                    data-row-index=\"21\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x2724\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C22\"\n                    data-col-index=\"2\"\n                    data-row-index=\"21\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        HWID string\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D22\"\n                    data-col-index=\"3\"\n                    data-row-index=\"21\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Used by server to send HWID as step of HVNC maintenance\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A23\"\n                    data-col-index=\"0\"\n                    data-row-index=\"22\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        SERVER_SEND_FORCE_QUIT\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B23\"\n                    data-col-index=\"1\"\n                    data-row-index=\"22\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0x272B\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C23\"\n                    data-col-index=\"2\"\n                    data-row-index=\"22\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        \u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"D23\"\n                    data-col-index=\"3\"\n                    data-row-index=\"22\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Force client to call ExitProcess(0)\u00a0                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-41'>\ntable#wpdtSimpleTable-41{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-41 td, table.wpdtSimpleTable41 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<p>It is evident that this is a client-confirmed protocol, as most messages include a CONFIRM response. From the table above we can see that the protocol supports functionalities like loading configuration settings, sending files, and more.&nbsp;<\/p>\n\n\n\n<p>Examining various packets reveals that the payload is typically an encrypted UTF-8 encoded string. However, it&#8217;s worth noting that the payload length can be zero.&nbsp;<\/p>\n\n\n\n<p>Moreover, there are two distinct packet types that deviate from the usual string payload: <strong>CLIENT_SEND_FILE <\/strong>and <strong>SERVER_SEND_FILE<\/strong>. &nbsp;<\/p>\n\n\n\n<p>Packet_type <strong>0x271F<\/strong> (<strong>CLIENT_SEND_FILE<\/strong>) has this payload structure, represented here:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"448\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/4-1024x448.webp\" alt=\"\" class=\"wp-image-6279\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/4-1024x448.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/4-300x131.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/4-768x336.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/4-370x162.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/4-270x118.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/4-740x324.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/4.webp 1268w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">packet_type&nbsp;0x271F (CLIENT_SEND_FILE)<\/figcaption><\/figure><\/div>\n\n\n<p>And here\u2019s representation of <strong>packet_type 0x2715<\/strong> (<strong>SERVER_SEND_FILE<\/strong>):<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"448\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/5-1024x448.webp\" alt=\"\" class=\"wp-image-6280\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/5-1024x448.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/5-300x131.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/5-768x336.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/5-370x162.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/5-270x118.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/5-740x324.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/5.webp 1268w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">packet_type 0x2715 (SERVER_SEND_FILE)&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>As you can see from the images above, these packets contain substructures in place of strings to handle file data.<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\"> \nANY.RUN Enterprise plan at a discount\n<br>\nUse promo:<span class=\"highlight\"> SANDBOXSAVER<\/span>&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/calendly.com\/svasiliev\/\" rel=\"noopener\" target=\"_blank\">\nBook a call\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Packet order&nbsp;<\/h2>\n\n\n\n<p>Having established the packet structure, we can now observe the typical sequence in which they arrive. If we were to illustrate the entire communication sequence in a flowchart, it would be represented as follows:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"579\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/39-579x1024.png\" alt=\"\" class=\"wp-image-6322\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/39-579x1024.png 579w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/39-170x300.png 170w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/39-768x1357.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/39-869x1536.png 869w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/39-1159x2048.png 1159w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/39-370x654.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/39-270x477.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/39-740x1308.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/39.png 1200w\" sizes=\"(max-width: 579px) 100vw, 579px\" \/><figcaption class=\"wp-element-caption\">Communication flow of RisePro illustrated in a flow chart&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The communication protocol with the Command and Control (C2) server is broken down into three main stages:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Initialization<\/strong>: This is the first step where the client establishes a connection with the server and initializes the communication session.&nbsp;<\/li>\n\n\n\n<li><strong>Getting the configuration<\/strong>: In this stage, the client retrieves configuration details from the server, which may include commands, operational parameters, or target information.&nbsp;<\/li>\n\n\n\n<li><strong>Performing stealer and loader functions<\/strong>: Here, the client executes its intended malicious activities such as stealing data (stealer function) and confirming receipt of payloads (loader function).<\/li>\n<\/ul>\n\n\n\n<p>There\u2019s also an optional 4th Stage &#8211; HVNC launch: it involves the initiation of Hidden Virtual Network Computing (HVNC), allowing for remote control without detection.<\/p>\n\n\n\n<p>Let&#8217;s delve into each stage one by one for a detailed understanding.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Stage 1: Initialization&nbsp;<\/h3>\n\n\n\n<p>The default initialization flow for the communication with the C2 server is as follows, with the dotted line indicating an optional packet:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"808\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/31-1024x808.png\" alt=\"\" class=\"wp-image-6314\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/31-1024x808.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/31-300x237.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/31-768x606.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/31-370x292.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/31-270x213.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/31-740x584.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/31.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Initialization flow<\/figcaption><\/figure><\/div>\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li>Communication begins with a <strong>SERVER_INIT <\/strong>packet following the establishment of the connection.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>The client may send a <strong>CLIENT_INIT <\/strong>packet right after connecting, before the server sends its packet. If the client initiates with <strong>CLIENT_INIT<\/strong>, the server responds with a <strong>SERVER_PING<\/strong> by default.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li>The <strong>SERVER_INIT <\/strong>packet includes a session token, which is used to uniquely identify the session.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li>Subsequently, the server sends the public IP address of the victim to the client.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\">\n<li>The client acknowledges the IP address by sending back a confirmation along with an additional string in its response.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>With these steps, the connection initialization between the client and the server is completed.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Stage 2: Getting the configuration&nbsp;<\/h3>\n\n\n\n<p>The configuration stage involves the server sending configurations in a particular order, and the client sending back confirmations with additional payload.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"863\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/8-863x1024.webp\" alt=\"\" class=\"wp-image-6283\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/8-863x1024.webp 863w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/8-253x300.webp 253w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/8-768x911.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/8-1295x1536.webp 1295w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/8-1727x2048.webp 1727w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/8-370x439.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/8-270x320.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/8-740x878.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/8.webp 1800w\" sizes=\"(max-width: 863px) 100vw, 863px\" \/><figcaption class=\"wp-element-caption\">Getting the configuration<\/figcaption><\/figure><\/div>\n\n\n<p>The server sends the <strong>marks_config<\/strong>, <strong>grab_config<\/strong>, and <strong>loader_config<\/strong> in a strict sequence to set the malware&#8217;s behavior. Having received the configurations, we can now examine what they entail.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>A deeper look at the config<\/strong>&nbsp;<\/h2>\n\n\n\n<p>The first thing that comes from the server is marks config, shown below:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/9-1024x538.webp\" alt=\"\" class=\"wp-image-6284\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/9-1024x538.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/9-300x158.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/9-768x403.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/9-1536x806.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/9-370x194.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/9-270x142.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/9-740x389.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/9.webp 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Screenshot of the marks_config<\/figcaption><\/figure><\/div>\n\n\n<p>The configuration we&#8217;re looking at likely dictates how the domain-related data, as presented, will be color-highlighted. This seems to correspond to the color coding of data within the admin panel. It&#8217;s an unusual feature \u2014 the purpose of which is not completely clear for the client.&nbsp;<\/p>\n\n\n\n<p>Moving on, the server always sends a <strong>grab_config<\/strong>, which is illustrated in the screenshot below:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/10-1024x538.webp\" alt=\"\" class=\"wp-image-6285\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/10-1024x538.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/10-300x158.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/10-768x403.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/10-1536x806.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/10-370x194.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/10-270x142.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/10-740x389.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/10.webp 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Screenshot of the grab_config&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The grab_config specifies the data collection scope, the destination for the collected information, and the functions the malware will utilize.&nbsp;<\/p>\n\n\n\n<p>For instance, it enables the malware to configure a proxy server on the victim\u2019s computer, initiate HVNC, and transmit data to Telegram (with <strong>tg_ids<\/strong> specifying the recipients of the message and <strong>tg_token<\/strong> being the bot token within Telegram). Additionally, the malware is capable of capturing a screenshot at the time of execution (<strong>grab_screen<\/strong>) and exfiltrating data from applications like Telegram and Discord.&nbsp;<\/p>\n\n\n\n<p>Following this, we have the <strong>loader_config<\/strong>, as seen below:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"507\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/11-1024x507.webp\" alt=\"\" class=\"wp-image-6286\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/11-1024x507.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/11-300x149.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/11-768x380.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/11-1536x760.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/11-370x183.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/11-270x134.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/11-740x366.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/11.webp 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Screenshot of the loader_config<\/figcaption><\/figure><\/div>\n\n\n<p>Here are some noteworthy details from the configuration:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>ld_geo<\/strong>: This setting likely activates a geographical filter. If set, it probably checks for a specific country code, allowing the loader to execute only if there&#8217;s a match.&nbsp;<\/li>\n\n\n\n<li><strong>ld_marks<\/strong>: These are additional conditions that determine when the loader should be activated.&nbsp;<\/li>\n\n\n\n<li><strong>ld_name<\/strong>: This is the identifier for the specific configuration.&nbsp;<\/li>\n\n\n\n<li><strong>ld_url<\/strong>: This specifies the source URL from which the payload will be downloaded.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>This configuration structure differs in new and old samples of this malware. It is noteworthy, that when the server is updated, older versions of the malware, such as earlier iterations of RisePro, will continue to function. However, they might ignore some of the new data or configuration values introduced in the updates.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Stage 3: Performing stealer and loader functions&nbsp;<\/h3>\n\n\n\n<p>At this stage in the process, the server issues a command specifying the data to be collected, and in response, the client compiles and sends back a .zip archive containing all the stolen data.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"817\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/32-1024x817.png\" alt=\"\" class=\"wp-image-6315\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/32-1024x817.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/32-300x239.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/32-768x612.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/32-370x295.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/32-270x215.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/32-740x590.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/32.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Network communication for performing stealer and loader functions<\/figcaption><\/figure><\/div>\n\n\n<p>The server essentially sets the type of data to be collected.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"817\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/33-1024x817.png\" alt=\"\" class=\"wp-image-6316\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/33-1024x817.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/33-300x239.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/33-768x612.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/33-370x295.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/33-270x215.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/33-740x590.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/33.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Setting exfiltration scope and stealing data &nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Here&#8217;s an example of the rules for data exfiltration:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/14-1024x538.webp\" alt=\"\" class=\"wp-image-6289\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/14-1024x538.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/14-300x158.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/14-768x403.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/14-1536x806.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/14-370x194.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/14-270x142.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/14-740x389.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/14.webp 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">An example of data exfiltration rules&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Here are some key aspects to note in these rules:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>rule_collect_recursv<\/strong>: This indicates that the malware will search through folders recursively, delving into subfolders to locate files.&nbsp;<\/li>\n\n\n\n<li><strong>rule_exceptions<\/strong>: This defines specific locations or files that the malware should avoid.&nbsp;<\/li>\n\n\n\n<li><strong>rule_files<\/strong>: This is a pattern or set of file extensions that the malware targets for theft.&nbsp;<\/li>\n\n\n\n<li><strong>rule_folder<\/strong>: This specifies the path from which files, as defined by the environment configurations, will be extracted.&nbsp;<\/li>\n\n\n\n<li><strong>rule_name<\/strong>: This is the internal identifier for the rule. There can be multiple such rules, as observed.&nbsp;&nbsp;<\/li>\n\n\n\n<li><strong>rule_size_kb<\/strong>: This likely sets a maximum file size limit. Files larger than this specified value will not be collected.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Exfiltrated data&nbsp;<\/h2>\n\n\n\n<p>Upon receiving the configuration, the client steals specific data and sends it back in a zip archive. In our case, the contents of this archive were as displayed on the screenshot below:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/15-1024x538.webp\" alt=\"\" class=\"wp-image-6290\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/15-1024x538.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/15-300x158.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/15-768x403.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/15-1536x806.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/15-370x194.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/15-270x142.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/15-740x389.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/15.webp 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Contents of the archive containing exfiltrated data&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Packets that transmit this data have a set structure, which we can express as follows:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"448\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/16-1024x448.webp\" alt=\"\" class=\"wp-image-6291\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/16-1024x448.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/16-300x131.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/16-768x336.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/16-370x162.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/16-270x118.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/16-740x324.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/16.webp 1268w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Structure of packets that transmit data<\/figcaption><\/figure><\/div>\n\n\n<p>The structure of the packet for sending stolen data includes the country code, followed by an underscore (_), then the IP address, and finally the .zip extension. For instance, &#8220;<strong>DE_127.0.0.1.zip<\/strong>&#8220;.&nbsp;<\/p>\n\n\n\n<p>An additional name, formatted as described, accompanies the archive. This includes the response code and the build identifier, which specify which client is to process or merge the data.<\/p>\n\n\n\n<p>This stage involves actions that are contingent on the specified configuration, like loader functions.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"817\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/35-1024x817.png\" alt=\"\" class=\"wp-image-6317\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/35-1024x817.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/35-300x239.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/35-768x612.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/35-370x295.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/35-270x215.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/35-740x590.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/35.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Performing loader functions is optional&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>If a loader config is provided, the client will download a file and execute it using scheduled tasks (schtasks). This indicates that the malware has loader functions.&nbsp;<\/p>\n\n\n\n<p>Further details are encompassed in the \u201c<strong>CLIENT_CONFIRM_LOADER_EXECUTION<\/strong>\u201d&nbsp;packet. Following the execution, the client sends a confirmation back to the server, including the value of \u201c<strong>ld_name<\/strong>.\u201d Above is an example illustrating how the client communicates with the server to download additional malicious code and the corresponding server response.<\/p>\n\n\n\n<p>Referring to the flowchart above, the first packet contains the number <strong>9<\/strong>. This corresponds to <strong>LD-name<\/strong>, which is the identifier for the first loader configuration.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Stage 4: Optional HVNC launch&nbsp;<\/h3>\n\n\n\n<p>This new version of RisePro also possesses remote control capabilities, which means it can now function as a Remote Access Trojan. The ability to enable HVNC is included in the <strong>grab_config<\/strong>, as shown in the screenshot provided.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"457\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/18-1024x457.webp\" alt=\"\" class=\"wp-image-6293\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/18-1024x457.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/18-300x134.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/18-768x343.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/18-1536x686.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/18-370x165.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/18-270x121.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/18-740x331.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/18.webp 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Use of HVNC is set to true in the grab_config<\/figcaption><\/figure><\/div>\n\n\n<p>If HVNC is enabled, RisePro initiates another instance of itself, specifically to download a DLL and run a server for the remote control functionality.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"303\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/19-1024x303.webp\" alt=\"\" class=\"wp-image-6294\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/19-1024x303.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/19-300x89.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/19-768x227.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/19-1536x455.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/19-370x110.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/19-270x80.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/19-740x219.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/19.webp 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Multiple TCP streams as seen in ANY.RUN<\/figcaption><\/figure><\/div>\n\n\n<p>The screenshot above reveals an interesting aspect of the malware&#8217;s operation: communication occurs across multiple TCP streams.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"590\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/36-590x1024.png\" alt=\"\" class=\"wp-image-6318\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/36-590x1024.png 590w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/36-173x300.png 173w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/36-768x1332.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/36-885x1536.png 885w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/36-1180x2048.png 1180w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/36-370x642.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/36-270x468.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/36-740x1284.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/36.png 1200w\" sizes=\"(max-width: 590px) 100vw, 590px\" \/><figcaption class=\"wp-element-caption\">Network communication involved in HVNC&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>First connection (process 2600)<\/strong>: This includes all the previously discussed stages, such as initialization, configuration, and data exfiltration.&nbsp;<\/li>\n\n\n\n<li><strong>Two connections from process 2612<\/strong>: These represent two distinct activities:<\/li>\n<\/ul>\n\n\n\n<p>The first connection is for receiving a DLL module.<\/p>\n\n\n\n<p>The second connection is for maintaining an HVNC server, which facilitates remote connections.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Stage 4.1: Requesting HVNC module&nbsp;<\/h3>\n\n\n\n<p>To understand how the HVNC connection is established, let&#8217;s examine the process as it occurs in the second TCP stream. This will provide insights into the steps and communications involved in initiating an HVNC connection. Using a flowchart, the process can be described as follows:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"701\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/21-1024x701.webp\" alt=\"\" class=\"wp-image-6296\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/21-1024x701.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/21-300x205.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/21-768x526.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/21-1536x1051.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/21-370x253.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/21-270x185.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/21-740x506.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/21.webp 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Initial stage of HVNC launch<\/figcaption><\/figure><\/div>\n\n\n<p>Let\u2019s explain what actually takes place step-by-step:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Client&#8217;s file request<\/strong>: The client sends a request for a DLL file, including a string that specifies the file name.&nbsp;<\/li>\n\n\n\n<li><strong>Server&#8217;s response and file transmission<\/strong>: The server acknowledges the request, sends a token for the session, and then transmits the requested file.<\/li>\n<\/ul>\n\n\n\n<p>Having established the sequence, let\u2019s examine the structure of these packets in pseudocode:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"448\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/22-1024x448.webp\" alt=\"\" class=\"wp-image-6297\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/22-1024x448.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/22-300x131.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/22-768x336.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/22-370x162.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/22-270x118.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/22-740x324.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/22.webp 1268w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Packet structure in the HVNC communication sequence&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">Stage 4.2: Third connection &nbsp;<\/h3>\n\n\n\n<p>In the third connection, if the server initiates the communication, the process generally unfolds as follows:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"925\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/38-925x1024.png\" alt=\"\" class=\"wp-image-6319\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/38-925x1024.png 925w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/38-271x300.png 271w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/38-768x851.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/38-370x410.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/38-270x299.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/38-740x820.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/38.png 1200w\" sizes=\"(max-width: 925px) 100vw, 925px\" \/><figcaption class=\"wp-element-caption\">Data transmission during the second stage of HVNC launch and maintaining conneciton<\/figcaption><\/figure><\/div>\n\n\n<p>During the third connection, the communication involving HVNC is characterized by two main stages:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li><strong>Data transmission from server<\/strong>: Initially, the server sends specific data related to the HVNC operation.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><strong>Cyclic pinging<\/strong>: Subsequently, to maintain the connection, the server periodically sends ping messages to the client.&nbsp;<br>&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>Unfortunately, we weren\u2019t able to analyze&nbsp;the packet structure when someone connects to the victim using this system, so we can\u2019t provide specific details about that aspect of the communication process.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Data exfiltration&nbsp;<\/h2>\n\n\n\n<p>Having explored network communication patterns of RisePro, we can move on to examine the contents of the files sent by the malware. This will help us understand what data the malware is designed to collect and transmit.&nbsp;<\/p>\n\n\n\n<p>We\u2019ll examine a file called information.txt first, shown below:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"905\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/24-1024x905.webp\" alt=\"\" class=\"wp-image-6299\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/24-1024x905.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/24-300x265.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/24-768x678.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/24-1536x1357.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/24-370x327.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/24-270x239.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/24-740x654.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/24.webp 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Information.txt file<\/figcaption><\/figure><\/div>\n\n\n<p>This file contains various details. Here are some of the higlights:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Malware version<\/strong>: Specifies the version of the malware.&nbsp;<\/li>\n\n\n\n<li><strong>Launch date<\/strong>: The date when the malware was activated.&nbsp;<\/li>\n\n\n\n<li><strong>GUID<\/strong>: Likely used to uniquely identify the computer.&nbsp;<\/li>\n\n\n\n<li><strong>Hardware ID<\/strong>: A unique identifier for the hardware of the infected system.&nbsp;<\/li>\n\n\n\n<li><strong>Launch path<\/strong>: The file path from where the malware was executed.&nbsp;<\/li>\n\n\n\n<li><strong>Temporary data storage folder<\/strong>: A folder created by the malware to temporarily store stolen data.&nbsp;<\/li>\n\n\n\n<li><strong>Victim\u2019s computer data<\/strong>: Information like IP address, locale, system details, and other typical computer specifications.&nbsp;<\/li>\n\n\n\n<li><strong>Hardware information<\/strong>: Details about the video card, processor, RAM, etc.&nbsp;<\/li>\n\n\n\n<li><strong>Running processes<\/strong>: Names and IDs of system processes, likely used to check if any antivirus software is active.&nbsp;<\/li>\n\n\n\n<li><strong>Registered software<\/strong>: Lists software registered in the machine&#8217;s registry.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>In addition, the malware sends out stolen passwords in a separate file named passwords.txt. It is formatted rather elaborately:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/25-1024x538.webp\" alt=\"\" class=\"wp-image-6300\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/25-1024x538.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/25-300x158.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/25-768x403.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/25-1536x806.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/25-370x194.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/25-270x142.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/25-740x389.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/25.webp 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">passwords.txt file<\/figcaption><\/figure><\/div>\n\n\n<p>Immediately noticeable is a conspicuous link to a Telegram support group associated with the malware&#8217;s operation, likely provided for further assistance or instructions. The file also lists passwords that have been extracted from databases of browsers, email clients, and other software.&nbsp;<\/p>\n\n\n\n<p>For each set of credentials, the following details are included:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li>URL of the Site: The web address for which the credentials are used.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>Login: The username or login ID.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li>Password: The corresponding password.&nbsp;<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Wrapping up: a look at the known versions&nbsp;<\/h2>\n\n\n\n<p>There are numerous versions of RisePro, and we have only analyzed one specific variant. Consequently, the details may vary across different versions.&nbsp;<\/p>\n\n\n\n<p>As of November 22, 2023, the current version is labeled as 1.0. It appears that the versioning was reset to the beginning when the communication protocol underwent significant changes. &nbsp;<\/p>\n\n\n\n<p>Additionally, it is noted on the malware&#8217;s Telegram support channel that there are two main versions of this stealer: one written in C# and another in C++. The C++ version of the stealer is usually protected with VMProtect and is obfuscated to evade detection and analysis.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"431\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/26-1024x431.webp\" alt=\"\" class=\"wp-image-6301\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/26-1024x431.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/26-300x126.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/26-768x323.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/26-1536x647.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/26-370x156.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/26-270x114.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/26-740x312.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/26.webp 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">C++ version of the stealer is usually protected with VMProtect&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>This C# malware is obfuscated, potentially using Confuser.Core. You&nbsp;can see the C# version of RisePro in <a href=\"https:\/\/app.any.run\/tasks\/88f133ad-338b-43bb-a2fd-e093616219d5\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=risepro_analysis&amp;utm_content=linktoservice&amp;utm_term=281123\" target=\"_blank\" rel=\"noreferrer noopener\">this sample<\/a>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"501\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/27-1024x501.webp\" alt=\"\" class=\"wp-image-6302\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/27-1024x501.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/27-300x147.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/27-768x376.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/27-1536x752.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/27-370x181.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/27-270x132.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/27-740x362.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/27.webp 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">C# version of RisePro is obfuscated, potentially using Confuser.Core<\/figcaption><\/figure><\/div>\n\n\n<p>\u0421++ version of RisePro can inject into processes. This behavior is evident in <a href=\"https:\/\/app.any.run\/tasks\/d34ad531-7b30-46cb-922a-718e4bd6a9d8\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=risepro_analysis&amp;utm_content=linktoservice&amp;utm_term=281123\" target=\"_blank\" rel=\"noreferrer noopener\">this task<\/a>.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"437\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/28-1024x437.webp\" alt=\"\" class=\"wp-image-6303\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/28-1024x437.webp 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/28-300x128.webp 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/28-768x328.webp 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/28-1536x655.webp 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/28-370x158.webp 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/28-270x115.webp 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/28-740x316.webp 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/11\/28.webp 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Injection behaviour<\/figcaption><\/figure><\/div>\n\n\n<p>As usual, we\u2019ll leave you with some essential resources for detecting this malware and IOCs we\u2019ve collected during our research:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">IOCs&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>RisePro v0.9, C++ build, HVNC <\/strong><\/h3>\n\n\n\n<p><strong>Sample:<\/strong> <a href=\"https:\/\/app.any.run\/tasks\/01a74cc5-b571-4879-9104-e3f2383ba391\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/01a74cc5-b571-4879-9104-e3f2383ba391\/<\/a>&nbsp;<\/p>\n\n\n\n<p><strong>SHA256<\/strong>: e95d8c7cf98dc1ed3ec0528b05df7c79bae2421ba2ad2b671d54d8088238f205&nbsp;<\/p>\n\n\n\n<p><strong>Files<\/strong>:<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-42\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"2\"\n           data-rows=\"1\"\n           data-wpID=\"42\"\n           data-responsive=\"0\"\n           data-has-header=\"0\">\n\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:50%;                    padding:10px;\n                    \"\n                    >\n                                        C:\\Users\\admin\\AppData\\Local\\MaxLoonaFest1\\MaxLoonaFest1.exe\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:50%;                    padding:10px;\n                    \"\n                    >\n                                        e95d8c7cf98dc1ed3ec0528b05df7c79bae2421ba2ad2b671d54d8088238f205\u00a0                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-42'>\ntable#wpdtSimpleTable-42{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-42 td, table.wpdtSimpleTable42 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<p><strong>IP<\/strong>: 194[.]169.175.128<\/p>\n\n\n\n<p><strong>URL:<\/strong> http:\/\/91[.]92.245.23\/download\/k\/KL.exe&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>RisePro v0.7, C++ build, loader<\/strong> <\/h3>\n\n\n\n<p><strong>Sample:<\/strong> <a href=\"https:\/\/app.any.run\/tasks\/992ee8b9-b53a-489f-a97a-49798b125183\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/992ee8b9-b53a-489f-a97a-49798b125183\/<\/a>&nbsp;<\/p>\n\n\n\n<p><strong>SHA256<\/strong>: 973867150fd46e2de4b3d375d9c2d59eeda808a9dd1d137bd020b2f15c155ede&nbsp;<\/p>\n\n\n\n<p><strong>Files<\/strong>:<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-47\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"2\"\n           data-rows=\"1\"\n           data-wpID=\"47\"\n           data-responsive=\"0\"\n           data-has-header=\"0\">\n\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:50%;                    padding:10px;\n                    \"\n                    >\n                                        C:\\Users\\admin\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\K78MRVB5\\KL[1].exe\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:50%;                    padding:10px;\n                    \"\n                    >\n                                        f327c2b5ab1d98f0382a35cd78f694d487c74a7290f1ff7be53f42e23021e599\u00a0                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-47'>\ntable#wpdtSimpleTable-47{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-47 td, table.wpdtSimpleTable47 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<p><strong>IP<\/strong>: 194[.]169.175.123&nbsp;<\/p>\n\n\n\n<p><strong>URL<\/strong>:&nbsp;http:\/\/91[.]92.245.23\/download\/k\/KL.exe&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>RisePro v0.6, C# build<\/strong> <\/h3>\n\n\n\n<p><strong>Sample:<\/strong> <a href=\"https:\/\/app.any.run\/tasks\/88f133ad-338b-43bb-a2fd-e093616219d5\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/88f133ad-338b-43bb-a2fd-e093616219d5<\/a>&nbsp;<\/p>\n\n\n\n<p><strong>SHA256<\/strong>: ba7f4474a334d79dd16cfb8a082987000764ff24c8a882c696e4c214b0e5e9cf&nbsp;<\/p>\n\n\n\n<p><strong>Files<\/strong>:<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-43\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"2\"\n           data-rows=\"1\"\n           data-wpID=\"43\"\n           data-responsive=\"0\"\n           data-has-header=\"0\">\n\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:50%;                    padding:10px;\n                    \"\n                    >\n                                        C:\\Users\\admin\\AppData\\Local\\Temp\\tempAVS1DYR2zldnwaG\\sqlite3.dll\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:50%;                    padding:10px;\n                    \"\n                    >\n                                        0c7cd52abdb6eb3e556d81caac398a127495e4a251ef600e6505a81385a1982d\u00a0                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-43'>\ntable#wpdtSimpleTable-43{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-43 td, table.wpdtSimpleTable43 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<p><strong>IP<\/strong>: 194[.]169.175.128&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>RisePro v0.9, C++ build, C# injector<\/strong> <\/h3>\n\n\n\n<p><strong>Sample:<\/strong> <a href=\"https:\/\/app.any.run\/tasks\/d34ad531-7b30-46cb-922a-718e4bd6a9d8\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/d34ad531-7b30-46cb-922a-718e4bd6a9d8\/<\/a>&nbsp;<\/p>\n\n\n\n<p><strong>SHA256<\/strong>: D440EEB8FD204EF2B3845894FE4E256E6505796B75FE5201CFFA7F5453C2FB5F<\/p>\n\n\n\n<p><strong>Files<\/strong>:<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-44\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"2\"\n           data-rows=\"1\"\n           data-wpID=\"44\"\n           data-responsive=\"0\"\n           data-has-header=\"0\">\n\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:50%;                    padding:10px;\n                    \"\n                    >\n                                        C:\\Users\\admin\\AppData\\Local\\LegalHelper130\\LegalHelper130.exe\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:50%;                    padding:10px;\n                    \"\n                    >\n                                        D440EEB8FD204EF2B3845894FE4E256E6505796B75FE5201CFFA7F5453C2FB5F\u00a0                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-44'>\ntable#wpdtSimpleTable-44{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-44 td, table.wpdtSimpleTable44 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<p><strong>IP: <\/strong>194[.]49.94.53<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>RisePro botnet version, communication over TCP:50505<\/strong> <\/h3>\n\n\n\n<p><strong>Sample:<\/strong> <a href=\"https:\/\/app.any.run\/tasks\/f841e850-d97a-4395-93cb-c2dff7e7bf7e\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/f841e850-d97a-4395-93cb-c2dff7e7bf7e\/<\/a>&nbsp;<\/p>\n\n\n\n<p><strong>SHA256<\/strong>: 4435DA81D8BC840408AFED9E993B3F0CC1AA08FF1CD03BBEC609379517EC1379&nbsp;<\/p>\n\n\n\n<p><strong>Files<\/strong>:<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-45\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"2\"\n           data-rows=\"3\"\n           data-wpID=\"45\"\n           data-responsive=\"0\"\n           data-has-header=\"0\">\n\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:50%;                    padding:10px;\n                    \"\n                    >\n                                        C:\\ProgramData\\WinTrackerSP\\WinTrackerSP.exe\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:50%;                    padding:10px;\n                    \"\n                    >\n                                        7F17D3D47F053498A3EFECAB532932DCC8018E3EE0DA60FB090BE0ABC3FA5A82\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A2\"\n                    data-col-index=\"0\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        C:\\Users\\admin\\AppData\\Local\\Temp\\tmpSTLpopstart\\stlmapfrog\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B2\"\n                    data-col-index=\"1\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        (encrypted json, contains start timestamp and IP)\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A3\"\n                    data-col-index=\"0\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        C:\\Users\\admin\\AppData\\Local\\Temp\\tmpSTLpopstart\\todelete\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B3\"\n                    data-col-index=\"1\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        (json with file paths)\u00a0                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-45'>\ntable#wpdtSimpleTable-45{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-45 td, table.wpdtSimpleTable45 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<p><strong>IP: <\/strong>194[.]169.175.128<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>SIGMA<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>title: RisePro Rule \n\nid: aba15bdd-657f-422a-bab3-ac2d2a0d6f1c \n\nstatus: experimental \n\ndescription: Detects RisePro malware \n\nauthor: ANY.RUN \n\ndate: 2023\/11\/17 \n\ntags: \n\n    - windows \n\n    - RisePro \n\nlogsource: \n\n    category: file_event \n\n    product: windows \n\ndetection: \n\n    selection: \n\n             TargetFilename|regex: \n\n           - \"(?i)\\\\\\\\AppData\\\\\\\\Local\\\\\\\\Temp\\\\\\\\.*\\\\\\\\passwords\\\\.txt$\" \n\n           - \"(?i)\\\\\\\\AppData\\\\\\\\Local\\\\\\\\Temp\\\\\\\\.*\\\\\\\\information\\\\.txt$\" \n\n    condition: selection \n\nlevel: medium <\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\">YARA<\/h2>\n\n\n\n<p>We\u2019ve created a YARA rule to detect these updated versions of RisePro. You can find it in our <a href=\"https:\/\/github.com\/anyrun\/YARA\/blob\/main\/RisePro.yar\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub<\/a>.<\/p>\n\n\n\n<p><strong>TCP stream decoder (python script)<\/strong>&nbsp;<\/p>\n\n\n\n<p>For further investigation, we\u2019ve prepared for you a script, that can be used to decrypt and parse the TCP stream to a JSON file. This allows for easier visualization and processing of RisePro communication. The script can be found in our <a href=\"https:\/\/github.com\/anyrun\/blog-scripts\/tree\/main\/Scripts\/RisePro\/risepro_tcp_decoder.py\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub<\/a>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SURICATA Rule structure&nbsp;<\/h2>\n\n\n\n<p>After detecting RisePro traffic in our sandbox environment, we shared our insights on network rule configurations with the Emergency Threats community. You can view the thread discussing these network rules with the ET community <a href=\"https:\/\/community.emergingthreats.net\/t\/risepro-tcp-v-0-1\/647\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The Suricata rules are defined by multiple conditions:<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-46\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"3\"\n           data-rows=\"7\"\n           data-wpID=\"46\"\n           data-responsive=\"0\"\n           data-has-header=\"1\">\n\n                    <thead>        <tr class=\"wpdt-cell-row \" >\n                                <th class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:33.333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Conditions in the rule\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:33.333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Value\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C1\"\n                    data-col-index=\"2\"\n                    data-row-index=\"0\"\n                    style=\" width:33.333333333333%;                    padding:10px;\n                    \"\n                    >\n                                        Description\u00a0                    <\/th>\n                                        <\/tr>\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-merged-cell \"\n                     colspan=\"1\"  rowspan=\"3\"                     data-cell-id=\"A2\"\n                    data-col-index=\"0\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        tcp $HOME_NET any -> $EXTERNAL_NET ![80,443,445,5938]                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B2\"\n                    data-col-index=\"1\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        tcp\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C2\"\n                    data-col-index=\"2\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        TCP protocol\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                            <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B3\"\n                    data-col-index=\"1\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        $EXTERNAL_NET\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C3\"\n                    data-col-index=\"2\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Direction to external network\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                            <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B4\"\n                    data-col-index=\"1\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        ![80,443,445,5938]\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C4\"\n                    data-col-index=\"2\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Unused port exceptions\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A5\"\n                    data-col-index=\"0\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        dsize:>1100;\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B5\"\n                    data-col-index=\"1\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        1100\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C5\"\n                    data-col-index=\"2\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        TCP packet payload size\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left wpdt-merged-cell \"\n                     colspan=\"1\"  rowspan=\"2\"                     data-cell-id=\"A6\"\n                    data-col-index=\"0\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        content:\"|00 1F 27 00 00|\"; offset:7; depth:5                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B6\"\n                    data-col-index=\"1\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        00\u00a0\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C6\"\n                    data-col-index=\"2\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Limit uploaded file length values to three bytes\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                            <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"B7\"\n                    data-col-index=\"1\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        1F 27 00 00;\u00a0\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"C7\"\n                    data-col-index=\"2\"\n                    data-row-index=\"6\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Packet type CLIENT_SEND_FILE\u00a0                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-46'>\ntable#wpdtSimpleTable-46{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-46 td, table.wpdtSimpleTable46 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<p>Suricata IDS rules for detecting RisePro are available at <a href=\"https:\/\/rules.emergingthreats.net\/open\/suricata\/rules\/emerging-malware.rules\" target=\"_blank\" rel=\"noreferrer noopener\">Emerging Threats \u2014 Suricata Rules<\/a>. Relevant rule IDs include 2046267, 2046269, 2046268, 2046266, 2046270, and 2049060.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RisePro is a malware-as-a-service info-stealer, first identified in 2022. Recently, we&#8217;ve detected a spike in it&#8217;s activity and decided to conduct an investigation, which led to interesting findings.&nbsp; RisePro is a well-documented malware, but&nbsp;we quickly realized that the network traffic patterns of our samples did not match the existing literature. It seemed like we had [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6308,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[57,15,34,40],"class_list":["post-6274","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-anyrun","tag-malware","tag-malware-analysis","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>RisePro Malware Analysis: New Version&#039;s C2 Communication<\/title>\n<meta name=\"description\" content=\"Discover an in-depth analysis of the new version of RisePro to see the recent changes in its C2 communication and network traffic patterns.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"19 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"RisePro Malware Analysis: Exploring C2 Communication of a New\u00a0Version\",\"datePublished\":\"2023-11-28T08:08:08+00:00\",\"dateModified\":\"2025-07-17T08:27:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/\"},\"wordCount\":3261,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"malware\",\"malware analysis\",\"malware behavior\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/\",\"name\":\"RisePro Malware Analysis: New Version's C2 Communication\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-11-28T08:08:08+00:00\",\"dateModified\":\"2025-07-17T08:27:24+00:00\",\"description\":\"Discover an in-depth analysis of the new version of RisePro to see the recent changes in its C2 communication and network traffic patterns.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"RisePro Malware Analysis: Exploring C2 Communication of a New\u00a0Version\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RisePro Malware Analysis: New Version's C2 Communication","description":"Discover an in-depth analysis of the new version of RisePro to see the recent changes in its C2 communication and network traffic patterns.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"19 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"RisePro Malware Analysis: Exploring C2 Communication of a New\u00a0Version","datePublished":"2023-11-28T08:08:08+00:00","dateModified":"2025-07-17T08:27:24+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/"},"wordCount":3261,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","malware","malware analysis","malware behavior"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/","url":"https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/","name":"RisePro Malware Analysis: New Version's C2 Communication","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-11-28T08:08:08+00:00","dateModified":"2025-07-17T08:27:24+00:00","description":"Discover an in-depth analysis of the new version of RisePro to see the recent changes in its C2 communication and network traffic patterns.\u00a0","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/risepro-malware-communication-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"RisePro Malware Analysis: Exploring C2 Communication of a New\u00a0Version"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6274"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=6274"}],"version-history":[{"count":20,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6274\/revisions"}],"predecessor-version":[{"id":6366,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6274\/revisions\/6366"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/6308"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=6274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=6274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=6274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}