Monday, March 31, 2025
HomeCyber AttackRiseLoader Attack Windows By Employed A VMProtect To Drop Multiple Malware Families

RiseLoader Attack Windows By Employed A VMProtect To Drop Multiple Malware Families

Published on

SIEM as a Service

Follow Us on Google News

RiseLoader, a new malware family discovered in October 2024, leverages a custom TCP-based binary protocol similar to RisePro for downloading and executing second-stage payloads. 

Despite RisePro’s development discontinuation in June 2024, RiseLoader’s emergence suggests a potential connection to the threat group behind RisePro and PrivateLoader. 

The malware often employs VMProtect for code obfuscation and has been observed distributing various malware families, including Vidar, Lumma Stealer, XMRig, and Socks5Systemz, aligning with PrivateLoader’s modus operandi. 

It also collects information about cryptocurrency-related applications and browser extensions, further highlighting its malicious intent. 

Free Webinar on Best Practices for API vulnerability & Penetration Testing:  Free Registration

RiseLoader network communication protocol
RiseLoader network communication protocol

Researchers analyzed RiseLoader malware and found it uses VMProtect packer and obfuscates strings related to debuggers and analysis tools, which are present but unused, suggesting potential future implementation of anti-analysis features that check for the presence of these tools. 

Unlike its relatives, RisePro and PrivateLoader, RiseLoader currently lacks stack-based string obfuscation techniques, which establish persistence by creating a mutex and randomly selecting a C2 server and communicating with it to receive commands and payload URLs. 

It creates multiple threads to handle these operations, including one to continuously check for and process C2 commands and another to download and execute payloads from the provided URLs. 

According to Zscaler, payloads are executed using appropriate methods, such as rundll32 for DLLs and process creation for executables and once all payloads are executed, RiseLoader terminates.

message types exchanged in both directions 
message types exchanged in both directions 

RiseLoader establishes a TCP connection with a C2 server, exchanging XOR keys for encrypted communication and sending system information and a unique identifier, where the server sends payload URLs and execution instructions. 

It downloads and executes these payloads, reporting back success or failure.

Both client and server periodically send KEEPALIVE messages to maintain the connection, where the server can force a shutdown or change the campaign ID.

 comparison of RiseLoader’s C2 handshake and RisePro’s handshake
 comparison of RiseLoader’s C2 handshake and RisePro’s handshake

By establishing an encrypted connection with its C2 server, it exchanges XOR keys for secure communication and then gathers system information and sends it to the server.

Upon receiving payload URLs, it downloads and executes them, potentially creating a registry key as an infection marker. 

After payload execution, it downloads a tracking pixel and terminates. The communication protocol shares similarities with RisePro, including a custom binary TCP-based protocol with encrypted JSON messages and a similar handshake process. 

While behavioral similarities and dropped malware families point to a connection, RiseLoader’s unique communication protocol strongly aligns with RisePro’s, as this shared protocol, including message structure, initialization, and payload format, further strengthens the evidence of a common origin. 

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Canon Printer Vulnerability Allows Attackers to Execute Arbitrary Code

A security vulnerability, tracked as CVE-2025-1268, has been found in certain Canon printer drivers, potentially...

Mitel Alerts Users to Severe XSS Vulnerability in MiContact Center

Mitel has issued a security advisory (MISA-2025-0003) to notify users of its MiContact Center...

ClickFix Captcha – A New Technique Hackers Used to Deliver Infostealers, Ransomware, & Quakbot Malware

Cybercriminals are leveraging fake CAPTCHA verification pages dubbed ClickFix to distribute malware, including infostealers,...

Multiple Dell Unity Vulnerabilities Allow Attackers to Compromise Systems

Dell Technologies has released a security advisory detailing multiple critical vulnerabilities in its Dell...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Canon Printer Vulnerability Allows Attackers to Execute Arbitrary Code

A security vulnerability, tracked as CVE-2025-1268, has been found in certain Canon printer drivers, potentially...

Mitel Alerts Users to Severe XSS Vulnerability in MiContact Center

Mitel has issued a security advisory (MISA-2025-0003) to notify users of its MiContact Center...

ClickFix Captcha – A New Technique Hackers Used to Deliver Infostealers, Ransomware, & Quakbot Malware

Cybercriminals are leveraging fake CAPTCHA verification pages dubbed ClickFix to distribute malware, including infostealers,...