Behavioral task
behavioral1
Sample
bb9e84b094c1cc85550cbb8ba9efc2e7b335a9fc422ca472c9cd7130a7dc8600.msi
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
bb9e84b094c1cc85550cbb8ba9efc2e7b335a9fc422ca472c9cd7130a7dc8600.msi
Resource
win10v2004-20240419-en
General
-
Target
bb9e84b094c1cc85550cbb8ba9efc2e7b335a9fc422ca472c9cd7130a7dc8600
-
Size
6.9MB
-
MD5
51eabc9cda5972e8062753ec9d181d58
-
SHA1
337a06cb3f2e658c4680da91f446b35deb7cb40c
-
SHA256
bb9e84b094c1cc85550cbb8ba9efc2e7b335a9fc422ca472c9cd7130a7dc8600
-
SHA512
8cc89c04684d96175a2898b43c5a76886ccdb45a80b8e10f39be903406b5afce96371eac507e5917cd85551f927214d676b94131af0ba8a8273f7b24f4f6971a
-
SSDEEP
196608:WNMX+vKcvmZKSSwKLHMqUKPevD5wrgvB7:WqX+dvSKr/YD5wr+B7
Malware Config
Signatures
-
Detects common strings, DLL and API in Banker_BR 1 IoCs
Hunting by known PDB files - Trojan Banker LATAM.
resource yara_rule sample Detect_MSI_LATAM_Banker_From_LatAm
Files
-
bb9e84b094c1cc85550cbb8ba9efc2e7b335a9fc422ca472c9cd7130a7dc8600.msi