Behavioral task
behavioral1
Sample
30bd6eaa640a6bc523fb09f9796678370d28a255a1478d86bd0dad473771a90c.msi
Resource
win7-20240221-es
Behavioral task
behavioral2
Sample
30bd6eaa640a6bc523fb09f9796678370d28a255a1478d86bd0dad473771a90c.msi
Resource
win10v2004-20240508-es
General
-
Target
30bd6eaa640a6bc523fb09f9796678370d28a255a1478d86bd0dad473771a90c
-
Size
24.5MB
-
MD5
6818cdc83cf0e9e00e153faf62d6da4b
-
SHA1
f1fdc1b7873334055a6327e37b3b4dedeb5b0052
-
SHA256
30bd6eaa640a6bc523fb09f9796678370d28a255a1478d86bd0dad473771a90c
-
SHA512
61eb6bca710626d2ea63e6b286ca8e2b9b26a6f36ecf48cc64d8cf0b7bd7b9482218186fcf9e8f7109704beaa8237f8435a24622a1ddceb32262f69b87f915ae
-
SSDEEP
393216:trPNxuJNuJApUUPi636A5gwMkXejbMhkQBAMWLvVH3IgUSBtlAeqq:hPD2NrDi6KA5gVTjbwtlWLRYhqKeZ
Malware Config
Signatures
-
Detects common strings, DLL and API in Banker_BR 1 IoCs
Hunting by known PDB files - Trojan Banker LATAM.
resource yara_rule sample Detect_MSI_LATAM_Banker_From_LatAm
Files
-
30bd6eaa640a6bc523fb09f9796678370d28a255a1478d86bd0dad473771a90c.msi