General

  • Target

    7200f9364828363f2edc0098f1541026e2f97ea723c8fdd36f0109d2a6028f48

  • Size

    47KB

  • Sample

    241120-s4tvwsycna

  • MD5

    520f87333344cc5e634b8e29440604b7

  • SHA1

    b7abcb017847ecbc0884d0d2ddf777df1692503a

  • SHA256

    7200f9364828363f2edc0098f1541026e2f97ea723c8fdd36f0109d2a6028f48

  • SHA512

    928a2b138291c61e002b89a39071cc4df46344829e7f98976fce8d73cce199ce49fbca16b56c5a5fcb35b6fab2896b67a49bd40deb6a9fe910704fbc73b62614

  • SSDEEP

    768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxF2:462tfQXi8vgLZkTOHkQT51Vp6AwPe8gj

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.escueladecinemza.com.ar/_installation/IBlj/

Targets

    • Target

      7200f9364828363f2edc0098f1541026e2f97ea723c8fdd36f0109d2a6028f48

    • Size

      47KB

    • MD5

      520f87333344cc5e634b8e29440604b7

    • SHA1

      b7abcb017847ecbc0884d0d2ddf777df1692503a

    • SHA256

      7200f9364828363f2edc0098f1541026e2f97ea723c8fdd36f0109d2a6028f48

    • SHA512

      928a2b138291c61e002b89a39071cc4df46344829e7f98976fce8d73cce199ce49fbca16b56c5a5fcb35b6fab2896b67a49bd40deb6a9fe910704fbc73b62614

    • SSDEEP

      768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxF2:462tfQXi8vgLZkTOHkQT51Vp6AwPe8gj

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks