General

  • Target

    9b32c27cab30f1f56f765523ab3c70dfa7341ae6655db19326b72e33c7d97215

  • Size

    47KB

  • Sample

    241119-m6f4xszmhm

  • MD5

    ba9b8faf1b1d453b70deb06114984247

  • SHA1

    adf325e3e633693af90cf58b5987664c302943d7

  • SHA256

    9b32c27cab30f1f56f765523ab3c70dfa7341ae6655db19326b72e33c7d97215

  • SHA512

    c7b8a7e607ad5a0c6fd6441ca639528c7e87ad4771cc494f1aa5653111bd9064428e8b60b82025bd834e0091a401e86fd0b66e1895cd573d00248473e4916a8f

  • SSDEEP

    768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxF2:462tfQXi8vgLZkTOHkQT51Vp6AwPe8gj

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.escueladecinemza.com.ar/_installation/IBlj/

Targets

    • Target

      9b32c27cab30f1f56f765523ab3c70dfa7341ae6655db19326b72e33c7d97215

    • Size

      47KB

    • MD5

      ba9b8faf1b1d453b70deb06114984247

    • SHA1

      adf325e3e633693af90cf58b5987664c302943d7

    • SHA256

      9b32c27cab30f1f56f765523ab3c70dfa7341ae6655db19326b72e33c7d97215

    • SHA512

      c7b8a7e607ad5a0c6fd6441ca639528c7e87ad4771cc494f1aa5653111bd9064428e8b60b82025bd834e0091a401e86fd0b66e1895cd573d00248473e4916a8f

    • SSDEEP

      768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxF2:462tfQXi8vgLZkTOHkQT51Vp6AwPe8gj

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks