Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

RisePro

62
Global rank
40 infographic chevron month
Month rank
39 infographic chevron week
Week rank
0
IOCs

RisePro, an information-stealing malware, targets a wide range of sensitive data, including credit cards, passwords, and cryptocurrency wallets. By compromising infected devices, RisePro can steal valuable information and potentially cause significant financial and personal losses for victims.

Stealer
Type
ex-USSR
Origin
1 December, 2022
First seen
22 September, 2025
Last seen

How to analyze RisePro with ANY.RUN

Type
ex-USSR
Origin
1 December, 2022
First seen
22 September, 2025
Last seen

IOCs

IP addresses
95.214.25.205
194.169.175.128
185.216.70.238
5.42.92.51
194.49.94.152
193.233.132.51
193.233.132.55
147.45.47.93
85.206.175.219
185.192.16.38
194.49.94.53
191.96.9.69
45.15.156.137
194.169.175.123
194.169.175.124
5.42.67.8
193.42.33.14
141.98.10.48
82.115.223.71
168.100.10.122
Hashes
6c54458a3df80f3801df48d60cbafaa64b643f155bdd608140ef508134d52d68
d6a1a23efa1aa9e632f9e111e21070f0390678592d94fc75370d4325f45cf5d7
bf495c5a855f4b1310fcf361ed2c60eff29d16be51a56c7b15609599fe55dd64
d210b038c83af1db1e65d2531b094451830722acaacbecce0048b62a4aa68c25
2f5370312110028e933cdcb12b331523010b79293fc924ec3ff316ffcafdef23
e3ecfadcc199765a2ad369615ec17b5b95cb0f5a29cc45eb2e8d2e9d575807d1
b61877825d8cff4454bab969656df67196bdf02d86704ab3821845d57023bc5e
daa0bee69a38ffc5f464e45f61c7fdb81fde523da1d6bb5cefd7156ec1e4e13c
d4163f1179d58f842ba3b9cd28cd315de031669b93d87111c40fbc13167e42ab
b45cf2386ead3e4664e4e3e1e324ae9e87034e9a6a612ffc76482fe777b507b2
a7655e6138351b583484d0312b1720dcc893915297b4226594d77551103b0b0d
ad2de4c275c5d84c667feed2bb77431e9c86d3d26c57dd30c18b574524b5fa0f
3337230aca7cf37e144531642e68b35c509c97bb18fbe44b4b51bf115b764bd2
5cf86ba05142f996a55404131658a4380e49b07abf87c55eb25fc3867552311d
b842762c149efe9593a7bedbc6629d8f9647180a67e41223a3495c330ca6e032
eff0ff1a9186ca9d78eeb78f24b97d2a7e558f57bae5f3e1de7b0a7283e78e37
37a6ef95815119e73613aa856f88a70ace7ce8dffa6e0b131b6f148f2dd37fc8
cc408445bd7856d4a94e8e70d6dd3952e45f43b3fba07b254af15f948138c9c5
a7238762ab2470f525fd71cab2f58710d9e6d850501a06c7be51025b47fee7c1
4e39fb3fcbcd2a8c6063cd905142601cba90d7b657fe9cfce55641ffad87cb5c
Domains
filefactory.com
api.my-rise.cc
api.db-ip.com
URLs
http://108.174.200.11/MWTSL
http://content.elite-hacks.ru/test/setStats.php
https://t.me/RiseProSUPPORT
Last Seen at

Recent blog posts

post image
Efficient SOC: How to Detect and Solve Incide...
watchers 616
comments 0
post image
ANY.RUN & Palo Alto Networks Cortex XSOAR...
watchers 705
comments 0
post image
Lazarus Group Attacks in 2025: Here's Everyth...
watchers 4251
comments 0

What is RisePro malware?

RisePro is a malware program primarily designed to exfiltrate sensitive information from compromised devices. It is often distributed through deceptive methods, such as fake cracks sites or malicious email attachments. Once installed, RisePro infiltrates the target system and silently collects a variety of personal and financial data.

First detected in late 2022, the malware continues to be actively updated and developed by its creators. It is sold openly online, including via a Telegram bot, where users can choose a preferred subscription plan and control the malware.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Technical details of the RisePro malicious software

RisePro's underlying architecture is similar to Vidar’s, another well-known password-stealing malware. It employs a system of embedded DLL dependencies to achieve its malicious goals.

The malware's typically focuses on stealing the following types of information:

  • Web browser credentials: RisePro can steal login credentials and cookies from various web browsers, including Google Chrome, Mozilla Firefox, and Microsoft Edge.
  • Crypto wallets: The malware can identify and steal cryptocurrency wallet addresses and private keys, granting attackers access to victims' digital assets.
  • Credit card information: RisePro may collect credit card numbers, expiration dates, and CVV codes.

Additionally, RisePro gathers information about the compromised system, including operating system, installed software, and hardware specifications. It can also capture screenshots of the victim's desktop, providing attackers with visual insights into their activities.

Once collected, the stolen data is bundled and sent to the attacker's command and control (C2) server. As mentioned, RisePro is constantly evolving, as its creators continue to enhance its capabilities. In a recent development, the malware has transitioned from HTTP-based C2 communication to a custom TCP protocol.

Check out a comprehensive analysis of RisePro’s C2 communication.

RisePro employs various obfuscation techniques to evade detection by security software, making it more challenging for antivirus and anti-malware solutions to identify and neutralize the threat.

Execution process of RisePro

To see how RisePro behaves on an actual system, let’s upload its sample to ANY.RUN sandbox for detailed analysis.

Like most malware, RisePro's execution chain can vary significantly even within one version. It can be either a single process performing all malicious activities or multiple processes involving the operating system's system utilities.

In our case, using the Static discovering function, we can see that a macro launches a process named crome.exe, which was downloaded from a remote server with the address 89.23.98.22.

Subsequently, we can use Script Tracer to verify this information and ensure that this process was also launched after the download. The WINWORD process, through macros, downloaded and initiated the crome process, which was the RisePro stealer, and carried out the main malicious activity. Additionally, the malware added itself to the Task Scheduler to ensure persistence on the infected system.

RisePro process graph shown in ANY.RUN RisePro`s process graph demonstrated in ANY.RUN

Distribution methods of the RisePro malware

RisePro is often spread by a loader called PrivateLoader. PrivateLoader is a pay-per-install service that charges malware distributors for each installation of their harmful software.

PrivateLoader's most common tactic is to disguise itself as pirated software. This means that they create websites that look like they are offering free downloads of popular programs.

One way that PrivateLoader makes its websites look legitimate is by using SEO poisoning. This is a technique that involves manipulating search engines to rank websites higher in search results.

Conclusion

As RisePro is constantly changing, it's important for individuals and organizations to take steps to protect themselves from its attacks. To make sure you avoid downloading any suspicious files or clicking links, it’s crucial you check them in a malware analysis sandbox.

ANY.RUN helps you identify if a suspicious file or link is safe by analyzing it in seconds. It provides detailed threat reports with all the necessary information, such as indicators of compromise (IOCs), for effective prevention and incident response.

Try ANY.RUN for free – request a demo!

HAVE A LOOK AT

BlackMatter screenshot
BlackMatter
blackmatter
BlackMatter is a ransomware strain operating as a Ransomware-as-a-Service (RaaS), designed to encrypt files, remove recovery options, and extort victims across critical industries. Emerging in 2021, it quickly became a major concern due to its ability to evade defenses, spread across networks, and cause large-scale operational disruption, forcing security teams to act against a highly destructive and persistent threat.
Read More
Maze screenshot
Maze
maze ransomware
Maze is ransomware — a malware type that encrypts the victim’s files and restores the data in exchange for a ransom payment. One of the most distinguishable features of Maze is that it is one of the first malware of the kind to publicly release stolen data.
Read More
PureCrypter screenshot
PureCrypter
purecrypter
First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system.
Read More
Ramnit screenshot
Ramnit
ramnit
Ramnit is a highly modular banking trojan and worm that evolved from a file-infecting virus into a powerful cybercrime tool. It specializes in financial fraud, credential theft, remote access, and malware delivery, being a serious threat to businesses and individuals. First spotted in 2010, Ramnit became popular after the 2014 takedown of the GameOver Zeus botnet, as cybercriminals sought alternatives for banking fraud.
Read More
Spyware screenshot
Spyware
spyware
Spyware is a stealth form of malware whose primary objective is to gather sensitive information, such as personal data, login credentials, and financial details, by monitoring user activities and exploiting system vulnerabilities. Spyware operates secretly in the background, evading detection while transmitting collected data to cybercriminals, who can then use it for malicious purposes like identity theft, financial fraud, or espionage.
Read More
Fog Ransomware screenshot
Fog is a ransomware strain that locks and steals sensitive information both on Windows and Linux endpoints. The medial ransom demand is $220,000. The medial payment is $100,000. First spotted in the spring of 2024, it was used to attack educational organizations in the USA, later expanding on other sectors and countries. Main distribution method — compromised VPN credentials.
Read More