General

  • Target

    b0250ebf28def9886afdab5cbe5c9cd3b073b54ad6b512a7d8aa7e0fe453cdb7

  • Size

    47KB

  • Sample

    241120-p29xjs1pfn

  • MD5

    4b62a660d524be0108d60e34cf414aca

  • SHA1

    1f020a6c98feead640bf5b02c701a265ac02cc1e

  • SHA256

    b0250ebf28def9886afdab5cbe5c9cd3b073b54ad6b512a7d8aa7e0fe453cdb7

  • SHA512

    0df7d2725fc4c18c97ad957ab6512396856a1b4f96867ca4b4d2efb129b64657c0d9d064464de1651e9fc1ef9f658e51c77b6ba3871bf4bce431b90a72438da6

  • SSDEEP

    768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxFW:462tfQXi8vgLZkTOHkQT51Vp6AwPe8gD

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.escueladecinemza.com.ar/_installation/IBlj/

Targets

    • Target

      b0250ebf28def9886afdab5cbe5c9cd3b073b54ad6b512a7d8aa7e0fe453cdb7

    • Size

      47KB

    • MD5

      4b62a660d524be0108d60e34cf414aca

    • SHA1

      1f020a6c98feead640bf5b02c701a265ac02cc1e

    • SHA256

      b0250ebf28def9886afdab5cbe5c9cd3b073b54ad6b512a7d8aa7e0fe453cdb7

    • SHA512

      0df7d2725fc4c18c97ad957ab6512396856a1b4f96867ca4b4d2efb129b64657c0d9d064464de1651e9fc1ef9f658e51c77b6ba3871bf4bce431b90a72438da6

    • SSDEEP

      768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxFW:462tfQXi8vgLZkTOHkQT51Vp6AwPe8gD

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks