New Variant of RisePro Malware: Enhanced Communication Protocol and Remote Access Capabilities

DUBAI, UNITED ARAB EMIRATES, November 28, 2023 /EINPresswire.com/ — Researchers at ANY.RUN, a leading malware sandbox provider, have analyzed a new variant of the RisePro malware that features a significantly overhauled communication protocol and remote access capabilities. The malware, which has two versions written in C# and C++, has been observed targeting victims worldwide.

𝐊𝐞𝐲 𝐅𝐒𝐧𝐝𝐒𝐧𝐠𝐬

β€’ The new variant employs a custom protocol over TCP for communication, marking a departure from the previous HTTP-based method.

β€’ The malware has expanded data exfiltration capabilities, now stealing passwords, browsing history, and sensitive documents from a broader range of applications.

β€’ The malware collects information about the user’s IP address, locale, system details, and other computer specifications.

β€’ The malware exfiltrates stolen data in a .zip archive named with the country code, IP address, and .zip extension.

π“π‘πž π”π¬πž 𝐨𝐟 𝐇𝐕𝐍𝐂

The malware optionally deploys remote control functionality via Hidden Virtual Network Computing (HVNC), allowing attackers to take complete control of infected systems.

πƒπžπ­πžπœπ­π’π¨π§ 𝐨𝐟 𝐭𝐑𝐞 𝐧𝐞𝐰 π‘π’π¬πžππ«π¨ 𝐯𝐚𝐫𝐒𝐚𝐧𝐭

The analysis results enabled the team to update the detection capabilities of the ANY.RUN sandbox to identify any malicious files or links related to RisePro attacks.

Learn more in ANY.RUN’s blog

Vlada Belousova
ANYRUN FZCO
2027889264
email us here
Visit us on social media:
Twitter
YouTube