General

  • Target

    7fbfc88255e9f681ca08d07150119d643ca9776e5e22987ebe73870ca651c6d7

  • Size

    47KB

  • Sample

    241120-edxxza1dmk

  • MD5

    984908c2b1090d3cd49e98c60d0f6404

  • SHA1

    5fb42d2be7fb955a7f5650fda2befd1c550ed7b5

  • SHA256

    7fbfc88255e9f681ca08d07150119d643ca9776e5e22987ebe73870ca651c6d7

  • SHA512

    305a94d413c718308a7578380c8f71247aa94fb2b47fb916709a063c668abe8649bde93bd99f9a4ad2c56fe7499cf4f9b216c96a1f617f7fee2a2174fe67bbbd

  • SSDEEP

    768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxFq:462tfQXi8vgLZkTOHkQT51Vp6AwPe8gP

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.escueladecinemza.com.ar/_installation/IBlj/

Targets

    • Target

      7fbfc88255e9f681ca08d07150119d643ca9776e5e22987ebe73870ca651c6d7

    • Size

      47KB

    • MD5

      984908c2b1090d3cd49e98c60d0f6404

    • SHA1

      5fb42d2be7fb955a7f5650fda2befd1c550ed7b5

    • SHA256

      7fbfc88255e9f681ca08d07150119d643ca9776e5e22987ebe73870ca651c6d7

    • SHA512

      305a94d413c718308a7578380c8f71247aa94fb2b47fb916709a063c668abe8649bde93bd99f9a4ad2c56fe7499cf4f9b216c96a1f617f7fee2a2174fe67bbbd

    • SSDEEP

      768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxFq:462tfQXi8vgLZkTOHkQT51Vp6AwPe8gP

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks