General

  • Target

    11f02791e9149ac8e49c635baeb6ba319bfd7542943f68cadb1f9858fb343e73

  • Size

    47KB

  • Sample

    241120-1n6hraymgq

  • MD5

    c9c06cb5325b0fd1e8221906961adec2

  • SHA1

    d43ed3e249587707697e03385bc52780d762aebf

  • SHA256

    11f02791e9149ac8e49c635baeb6ba319bfd7542943f68cadb1f9858fb343e73

  • SHA512

    347c8a2f3b900b0a062be5bb693fe31b8645f59ecea2e93b8127dfa8c9ee161a34d8ef6d0c65d358c7641ae4b30e654e834d90fc011e224c5228b3559bc180c9

  • SSDEEP

    768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxFG:462tfQXi8vgLZkTOHkQT51Vp6AwPe8gT

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.escueladecinemza.com.ar/_installation/IBlj/

Targets

    • Target

      11f02791e9149ac8e49c635baeb6ba319bfd7542943f68cadb1f9858fb343e73

    • Size

      47KB

    • MD5

      c9c06cb5325b0fd1e8221906961adec2

    • SHA1

      d43ed3e249587707697e03385bc52780d762aebf

    • SHA256

      11f02791e9149ac8e49c635baeb6ba319bfd7542943f68cadb1f9858fb343e73

    • SHA512

      347c8a2f3b900b0a062be5bb693fe31b8645f59ecea2e93b8127dfa8c9ee161a34d8ef6d0c65d358c7641ae4b30e654e834d90fc011e224c5228b3559bc180c9

    • SSDEEP

      768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxFG:462tfQXi8vgLZkTOHkQT51Vp6AwPe8gT

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks