Hackers drop RisePro data stealers by way of GitHub repositories


A number of GitHub repositories posing as cracked software program codes had been discovered making an attempt to drop the RisePro info-stealer onto sufferer techniques.

The marketing campaign delivers a brand new variant of the RisePro info-stealing malware designed to crash malware evaluation instruments like IDA and ResourceHacker.

G Information CyberDefense, the German cybersecurity firm that made the invention, reported that it had discovered a minimum of 13 such repositories belonging to a RisePro stealer marketing campaign that was named Gitgub by the menace actors. The repositories are all related,  and embody a README.md file promising free cracked software program.

Bloated installer for evasion

With the intention to complicate the evaluation of the malware by way of reverse engineering, the marketing campaign used an installer that was bloated to 699 MB. The bloating was achieved by way of repeat blocks of code inside the unique installer.

“The visualization of the pattern by PortexAnalyzer reveals that the bloat is non-trivial. Whereas many bloated information function appended zero bytes, this file has excessive entropy and no overlay,” G Information wrote in a report on the marketing campaign. “Figuring out that the self-extracting archive from which we unpacked the pattern compressed this file to 70 MB, we suspected a repeating sample.”

The bloated knowledge resided in a uncooked knowledge useful resource named MICROSOFTVISUALSTUDIODEBUGGERI, which was eliminated utilizing CFF Explorer to squeeze the file all the way down to its unique 3.43 MB.


Lascia un commento

Il tuo indirizzo email non sarà pubblicato. I campi obbligatori sono contrassegnati *