Behavioral task
behavioral1
Sample
bd4f77fab5f0b23d7bdd4fc59eda4ea29888c049acbae9293b02ea9bb90c2947.msi
Resource
win7-20240215-es
Behavioral task
behavioral2
Sample
bd4f77fab5f0b23d7bdd4fc59eda4ea29888c049acbae9293b02ea9bb90c2947.msi
Resource
win10v2004-20240508-es
General
-
Target
bd4f77fab5f0b23d7bdd4fc59eda4ea29888c049acbae9293b02ea9bb90c2947
-
Size
22.6MB
-
MD5
8483bf7c4976434e3b17314cf88421dd
-
SHA1
4e366c1777e22df3fedd95b9c10f5c6458043b7e
-
SHA256
bd4f77fab5f0b23d7bdd4fc59eda4ea29888c049acbae9293b02ea9bb90c2947
-
SHA512
c1f0cd2c30f041ff1d4ea533723993249abf1f6b5acddce9a5108c028153f3250f72ab0eb69a91005af8080c5acacaeec79a5cc5969fa5d3a5869b7fcce9a114
-
SSDEEP
196608:TbMpO6vsGbhrSu3CEde9ocED+KiCya6nJmR:TbQ6u3LdeWc2yhJm
Malware Config
Signatures
-
Detects common strings, DLL and API in Banker_BR 1 IoCs
Hunting by known PDB files - Trojan Banker LATAM.
resource yara_rule sample Detect_MSI_LATAM_Banker_From_LatAm
Files
-
bd4f77fab5f0b23d7bdd4fc59eda4ea29888c049acbae9293b02ea9bb90c2947.msi