Behavioral task
behavioral1
Sample
e8f4a99c8e370389909ba4676a8e205cce9231a3a31495297ad03fc2e6f537a8.msi
Resource
win7-20240221-es
Behavioral task
behavioral2
Sample
e8f4a99c8e370389909ba4676a8e205cce9231a3a31495297ad03fc2e6f537a8.msi
Resource
win10v2004-20240508-es
General
-
Target
e8f4a99c8e370389909ba4676a8e205cce9231a3a31495297ad03fc2e6f537a8
-
Size
20.0MB
-
MD5
be72a90ffba219631663936de126971e
-
SHA1
bc6daa18476936038cf8b395b0a9737eb93878e5
-
SHA256
e8f4a99c8e370389909ba4676a8e205cce9231a3a31495297ad03fc2e6f537a8
-
SHA512
f96a5742e24710e18ba07a6143053b5621e3ba03a360543c7eb7bac7fa73323eb486cf3c40e4785d965733f91be9628fd8efa39220404dc6825b778c5e3d18d1
-
SSDEEP
196608:dnCBIHCFJSydc+bpKGuZwDs9L7eY9+UVKFaiMTj+:dnCiH9ec+93uZz7ec+UVU8K
Malware Config
Signatures
-
Detects common strings, DLL and API in Banker_BR 1 IoCs
Hunting by known PDB files - Trojan Banker LATAM.
resource yara_rule sample Detect_MSI_LATAM_Banker_From_LatAm
Files
-
e8f4a99c8e370389909ba4676a8e205cce9231a3a31495297ad03fc2e6f537a8.msi