Behavioral task
behavioral1
Sample
b089485a125e744a166fc05cef1ec2ed5eeaa51b12f3b8e8d0adc73e7579cc5a.msi
Resource
win7-20240508-es
11 signatures
150 seconds
General
-
Target
b089485a125e744a166fc05cef1ec2ed5eeaa51b12f3b8e8d0adc73e7579cc5a
-
Size
35.0MB
-
MD5
f21f1b608d45926927f6178511bdd579
-
SHA1
a1a251359d7cea7dfeb52d1314bc460144533eca
-
SHA256
b089485a125e744a166fc05cef1ec2ed5eeaa51b12f3b8e8d0adc73e7579cc5a
-
SHA512
66521db47efc6a6f82693330af0e612886e7f0f13c7737da6459c0abb937ad1cbcd1376dc9fbddd6d78af551bc38913871e2e21e48e8d5ed630377b523e8f276
-
SSDEEP
786432:tlC27h2QVu9cCct5rB9rIX9gW6cnzELhEe2x53gpY:tldA+ptO2Cnne2xUY
Score
10/10
Malware Config
Signatures
-
Detects common strings, DLL and API in Banker_BR 1 IoCs
Hunting by known PDB files - Trojan Banker LATAM.
resource yara_rule sample Detect_MSI_LATAM_Banker_From_LatAm
Files
-
b089485a125e744a166fc05cef1ec2ed5eeaa51b12f3b8e8d0adc73e7579cc5a.msi