General

  • Target

    ProtonVPN_v3.4.3_x64 (1).exe

  • Size

    81.0MB

  • Sample

    241120-n2pqyawdjb

  • MD5

    e81875952d0f175a0f05a467a5d2250f

  • SHA1

    2b50466195e392fc94a1911029a32d477fd602f4

  • SHA256

    d7805bc980f3a338b2a462b16efaf804a1d46dc804bf0fdab5e8ebc5fe8e1015

  • SHA512

    e2d2d7c7752b07f607c57ecb4686240b32a2d91a640019037f978ab385678ee4b8738e92a6ffec61f14b5b5ef91731661bbbdcab8c642e5cd846b78b6d899c9f

  • SSDEEP

    1572864:sBT1gGA/5WgAPXMgpfOd0MOGFFlrnDo5HP2Tl+MWBqEc3FtKovY20/4nzMXLsca9:CJ5ARzAXHfOdNHF7nU5HOR+MqtcDKo/x

Malware Config

Targets

    • Target

      ProtonVPN_v3.4.3_x64 (1).exe

    • Size

      81.0MB

    • MD5

      e81875952d0f175a0f05a467a5d2250f

    • SHA1

      2b50466195e392fc94a1911029a32d477fd602f4

    • SHA256

      d7805bc980f3a338b2a462b16efaf804a1d46dc804bf0fdab5e8ebc5fe8e1015

    • SHA512

      e2d2d7c7752b07f607c57ecb4686240b32a2d91a640019037f978ab385678ee4b8738e92a6ffec61f14b5b5ef91731661bbbdcab8c642e5cd846b78b6d899c9f

    • SSDEEP

      1572864:sBT1gGA/5WgAPXMgpfOd0MOGFFlrnDo5HP2Tl+MWBqEc3FtKovY20/4nzMXLsca9:CJ5ARzAXHfOdNHF7nU5HOR+MqtcDKo/x

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Adds Run key to start application

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks