General

  • Target

    ProtonVPN_v3.2.12.exe

  • Size

    78.7MB

  • Sample

    240726-wewjzavapk

  • MD5

    77644d398ba4a65feef7db2a367d7f00

  • SHA1

    3d32e639c7a256e54dceaaf0e7bacc28381b6494

  • SHA256

    a6b9e7faa5c41c04f71634570959415ca36c188fc761287c69f67757d90ef277

  • SHA512

    e135428843334c3146eac2dd139c65c7362bf2fa2ec7cb79ee0fe491d59f760501aa510310cc964f6f03ccbeeab6106c8c977ab6608eb515b6ef9b2c15a204af

  • SSDEEP

    1572864:NFZRlHASWb+qwdC5x0Hv62+RncyuiQamTV+CqS8Zh1mHIt12WTfHuYL:TZbHASZC5e+Rcyh7mZsPt1FTf1

Malware Config

Targets

    • Target

      ProtonVPN_v3.2.12.exe

    • Size

      78.7MB

    • MD5

      77644d398ba4a65feef7db2a367d7f00

    • SHA1

      3d32e639c7a256e54dceaaf0e7bacc28381b6494

    • SHA256

      a6b9e7faa5c41c04f71634570959415ca36c188fc761287c69f67757d90ef277

    • SHA512

      e135428843334c3146eac2dd139c65c7362bf2fa2ec7cb79ee0fe491d59f760501aa510310cc964f6f03ccbeeab6106c8c977ab6608eb515b6ef9b2c15a204af

    • SSDEEP

      1572864:NFZRlHASWb+qwdC5x0Hv62+RncyuiQamTV+CqS8Zh1mHIt12WTfHuYL:TZbHASZC5e+Rcyh7mZsPt1FTf1

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds Run key to start application

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks