General

  • Target

    d6981c5e7749ba2b9131b73137d9e4996ba2bebfc891fb4f8eef8f3754a47add

  • Size

    47KB

  • Sample

    241120-kme2eatgja

  • MD5

    1f5223e70178f64721f359e72c61fe0f

  • SHA1

    0cc8c5e341a764294627dd623a2357b533bf4de0

  • SHA256

    d6981c5e7749ba2b9131b73137d9e4996ba2bebfc891fb4f8eef8f3754a47add

  • SHA512

    42be28582c0a22f7bd32664feb5790eb07225520cfaed2baa3350ef912339ad517764b4c6acfbe6e6e5570077cf2075dcb42691c22659adcbcc609462578ee8c

  • SSDEEP

    768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxFa:462tfQXi8vgLZkTOHkQT51Vp6AwPe8gf

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.escueladecinemza.com.ar/_installation/IBlj/

Targets

    • Target

      d6981c5e7749ba2b9131b73137d9e4996ba2bebfc891fb4f8eef8f3754a47add

    • Size

      47KB

    • MD5

      1f5223e70178f64721f359e72c61fe0f

    • SHA1

      0cc8c5e341a764294627dd623a2357b533bf4de0

    • SHA256

      d6981c5e7749ba2b9131b73137d9e4996ba2bebfc891fb4f8eef8f3754a47add

    • SHA512

      42be28582c0a22f7bd32664feb5790eb07225520cfaed2baa3350ef912339ad517764b4c6acfbe6e6e5570077cf2075dcb42691c22659adcbcc609462578ee8c

    • SSDEEP

      768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxFa:462tfQXi8vgLZkTOHkQT51Vp6AwPe8gf

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks