General

  • Target

    618333fb5987ea84fc859f11c3f4b8ddcef811028f36011a277ba79126183550

  • Size

    47KB

  • Sample

    241120-jjs87atbpg

  • MD5

    a2aa76baceeec9d53c212bb30b202515

  • SHA1

    d6c3ab92ce14e7700f0ac41af1a0a40b290a5539

  • SHA256

    618333fb5987ea84fc859f11c3f4b8ddcef811028f36011a277ba79126183550

  • SHA512

    68f2fba8236555cde6621dc82f07b9b7cd402a8069694e83aa95b8791e42360048e6a1382ac390baf54ffa91b88e6489680827e7ec03b5c0ea939bff161ee3a5

  • SSDEEP

    768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxF6:462tfQXi8vgLZkTOHkQT51Vp6AwPe8go

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.escueladecinemza.com.ar/_installation/IBlj/

Targets

    • Target

      618333fb5987ea84fc859f11c3f4b8ddcef811028f36011a277ba79126183550

    • Size

      47KB

    • MD5

      a2aa76baceeec9d53c212bb30b202515

    • SHA1

      d6c3ab92ce14e7700f0ac41af1a0a40b290a5539

    • SHA256

      618333fb5987ea84fc859f11c3f4b8ddcef811028f36011a277ba79126183550

    • SHA512

      68f2fba8236555cde6621dc82f07b9b7cd402a8069694e83aa95b8791e42360048e6a1382ac390baf54ffa91b88e6489680827e7ec03b5c0ea939bff161ee3a5

    • SSDEEP

      768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxF6:462tfQXi8vgLZkTOHkQT51Vp6AwPe8go

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks