General

  • Target

    1f27d56f0a1d1598591124f21a4a13cc7ae88e1b69ae208f06326b390bb5065b

  • Size

    47KB

  • Sample

    241120-z6x4natarf

  • MD5

    07a8e6bd83c12cd49647fcc32353da25

  • SHA1

    06b0b3eede09550e8c89fa0e44693d852c188895

  • SHA256

    1f27d56f0a1d1598591124f21a4a13cc7ae88e1b69ae208f06326b390bb5065b

  • SHA512

    f4e6b8fab8387d2778699f42a45455ba58a50a4b63a0165b72150464b980fb1913bc958e95103b113f046c2fd039a3642be93b14a537bf7ba60ba7d9a159f607

  • SSDEEP

    768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxFW:462tfQXi8vgLZkTOHkQT51Vp6AwPe8gD

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://www.escueladecinemza.com.ar/_installation/IBlj/

Targets

    • Target

      1f27d56f0a1d1598591124f21a4a13cc7ae88e1b69ae208f06326b390bb5065b

    • Size

      47KB

    • MD5

      07a8e6bd83c12cd49647fcc32353da25

    • SHA1

      06b0b3eede09550e8c89fa0e44693d852c188895

    • SHA256

      1f27d56f0a1d1598591124f21a4a13cc7ae88e1b69ae208f06326b390bb5065b

    • SHA512

      f4e6b8fab8387d2778699f42a45455ba58a50a4b63a0165b72150464b980fb1913bc958e95103b113f046c2fd039a3642be93b14a537bf7ba60ba7d9a159f607

    • SSDEEP

      768:4DM52tfQXi8vgLZkTOHkQT51Vp6AwPdM8gQ6JT5X6DGwUdh+pqjeSLjcvLtzrxFW:462tfQXi8vgLZkTOHkQT51Vp6AwPe8gD

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks