General

  • Target

    c342f7e0b2ed766ed2bbfc8a68481975d45d523b15f93a82d1eb67e108c27684

  • Size

    47KB

  • Sample

    241120-rjkaaaxeje

  • MD5

    a8731954da1354174433d7dcd0986ce7

  • SHA1

    d6d55165450c4987079ab257a2f0b2f94e119712

  • SHA256

    c342f7e0b2ed766ed2bbfc8a68481975d45d523b15f93a82d1eb67e108c27684

  • SHA512

    b5fa3b3cb1c272a524975826a91dfdcfee7dc377b212e624b0b7c76144e3adb58b6c0bc0b472a7016e3fe5c0f4a0a6287f4ac5c26f62ec1bdc51d15a92f77935

  • SSDEEP

    768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxFK:462tfQXi8vgLZkTOHkQT51Vp6AwPe8gv

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.escueladecinemza.com.ar/_installation/IBlj/

Targets

    • Target

      c342f7e0b2ed766ed2bbfc8a68481975d45d523b15f93a82d1eb67e108c27684

    • Size

      47KB

    • MD5

      a8731954da1354174433d7dcd0986ce7

    • SHA1

      d6d55165450c4987079ab257a2f0b2f94e119712

    • SHA256

      c342f7e0b2ed766ed2bbfc8a68481975d45d523b15f93a82d1eb67e108c27684

    • SHA512

      b5fa3b3cb1c272a524975826a91dfdcfee7dc377b212e624b0b7c76144e3adb58b6c0bc0b472a7016e3fe5c0f4a0a6287f4ac5c26f62ec1bdc51d15a92f77935

    • SSDEEP

      768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxFK:462tfQXi8vgLZkTOHkQT51Vp6AwPe8gv

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks