General

  • Target

    8c6050562fb1fa12ccce3927ec34fb8c438f9f150127394f4a990c2725ac3208

  • Size

    47KB

  • Sample

    241120-krdzxavjbx

  • MD5

    29a0503fa57baaa51f275cfd23032d6b

  • SHA1

    5ac196717d529bbbe69dba4cb8041a97440dc388

  • SHA256

    8c6050562fb1fa12ccce3927ec34fb8c438f9f150127394f4a990c2725ac3208

  • SHA512

    351c4a5a0dca29c95ceffa5af87343bb2bc2934fb63d86dd13cee4704436940df3aea75453d0f2c1a2bdb287e12e5b78efd8903f6a35937b1124ef73978c62d9

  • SSDEEP

    768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxFm:462tfQXi8vgLZkTOHkQT51Vp6AwPe8gz

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.escueladecinemza.com.ar/_installation/IBlj/

Targets

    • Target

      8c6050562fb1fa12ccce3927ec34fb8c438f9f150127394f4a990c2725ac3208

    • Size

      47KB

    • MD5

      29a0503fa57baaa51f275cfd23032d6b

    • SHA1

      5ac196717d529bbbe69dba4cb8041a97440dc388

    • SHA256

      8c6050562fb1fa12ccce3927ec34fb8c438f9f150127394f4a990c2725ac3208

    • SHA512

      351c4a5a0dca29c95ceffa5af87343bb2bc2934fb63d86dd13cee4704436940df3aea75453d0f2c1a2bdb287e12e5b78efd8903f6a35937b1124ef73978c62d9

    • SSDEEP

      768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxFm:462tfQXi8vgLZkTOHkQT51Vp6AwPe8gz

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks