Behavioral task
behavioral1
Sample
a6855417b084c87c67edd1fce67e80999efe35c1bd18c32d8f057aeb4d5c58d7.msi
Resource
win7-20240508-es
Behavioral task
behavioral2
Sample
a6855417b084c87c67edd1fce67e80999efe35c1bd18c32d8f057aeb4d5c58d7.msi
Resource
win10v2004-20240508-es
General
-
Target
a6855417b084c87c67edd1fce67e80999efe35c1bd18c32d8f057aeb4d5c58d7
-
Size
11.5MB
-
MD5
9c7a1c277eadfbcf15f530887c461875
-
SHA1
51c3dcf6658739733600ff6fb96ccde8f6a2821a
-
SHA256
a6855417b084c87c67edd1fce67e80999efe35c1bd18c32d8f057aeb4d5c58d7
-
SHA512
75857a1ebe47d284862bc44751290bced11bed5b1ab4687d599ffa0d3f765c3f8061eff871484c088251182c7764e62bd6bf8aab44aa18886b3e11962e1cc019
-
SSDEEP
196608:4e+STLghR+Li0M2ZQU05ikb7dSMwI0sn1/20O9F5UbtPBlUFHYBFGyLqMmEpCRjL:J+oE+Li0M2Zf0rb7dlwILnRm5UbtP8IC
Malware Config
Signatures
-
Detects common strings, DLL and API in Banker_BR 1 IoCs
Hunting by known PDB files - Trojan Banker LATAM.
resource yara_rule sample Detect_MSI_LATAM_Banker_From_LatAm
Files
-
a6855417b084c87c67edd1fce67e80999efe35c1bd18c32d8f057aeb4d5c58d7.msi