General

  • Target

    e26bebf6dba8ac26e3854097f27dfc78963dde417b465f16643ea13ce3e6c975

  • Size

    47KB

  • Sample

    241120-l58l4szmcp

  • MD5

    3a2529f4db50ffff2c9a4cfe0356c006

  • SHA1

    3c389d0b6040defffb09fcecd18b1ef66de29dd2

  • SHA256

    e26bebf6dba8ac26e3854097f27dfc78963dde417b465f16643ea13ce3e6c975

  • SHA512

    4da61a6a617283c468bfc335c1219253342c432ccaa1cc56611ece547f74356d6e726dc3cc41d42791ecfd1afbd544ce6186ece86f2f03680c89f25388c6edd5

  • SSDEEP

    768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxF6:462tfQXi8vgLZkTOHkQT51Vp6AwPe8go

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.escueladecinemza.com.ar/_installation/IBlj/

Targets

    • Target

      e26bebf6dba8ac26e3854097f27dfc78963dde417b465f16643ea13ce3e6c975

    • Size

      47KB

    • MD5

      3a2529f4db50ffff2c9a4cfe0356c006

    • SHA1

      3c389d0b6040defffb09fcecd18b1ef66de29dd2

    • SHA256

      e26bebf6dba8ac26e3854097f27dfc78963dde417b465f16643ea13ce3e6c975

    • SHA512

      4da61a6a617283c468bfc335c1219253342c432ccaa1cc56611ece547f74356d6e726dc3cc41d42791ecfd1afbd544ce6186ece86f2f03680c89f25388c6edd5

    • SSDEEP

      768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxF6:462tfQXi8vgLZkTOHkQT51Vp6AwPe8go

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks