Behavioral task
behavioral1
Sample
d8d23239462799edbfba7fd4cc66f46adf36f8636ba4519378f34a86c7ca72fc.msi
Resource
win7-20240419-es
Behavioral task
behavioral2
Sample
d8d23239462799edbfba7fd4cc66f46adf36f8636ba4519378f34a86c7ca72fc.msi
Resource
win10v2004-20240508-es
General
-
Target
d8d23239462799edbfba7fd4cc66f46adf36f8636ba4519378f34a86c7ca72fc
-
Size
6.2MB
-
MD5
515b7e357b43c7c63bd302d66919391a
-
SHA1
88e4fc99ba0196d6268ffb3a821aa9da3ab5bb52
-
SHA256
d8d23239462799edbfba7fd4cc66f46adf36f8636ba4519378f34a86c7ca72fc
-
SHA512
20d8151694639a49348e60b04b37ba3d0990005e2d3f16c22e7f7da228104b7ca0078db19e93b0bf351590a3d28acfe9f5e58eeb95d7130c80d47061441934d3
-
SSDEEP
98304:lPG6LBY5AjwBXHsL+SzJvGYIEIlbQOEZjX6q2pA0xdkHzKLUSBeidoj9/ybm1:lPBI9MLtzhGEjuXd0zoU+ah+G
Malware Config
Signatures
-
Detects common strings, DLL and API in Banker_BR 1 IoCs
Hunting by known PDB files - Trojan Banker LATAM.
resource yara_rule sample Detect_MSI_LATAM_Banker_From_LatAm
Files
-
d8d23239462799edbfba7fd4cc66f46adf36f8636ba4519378f34a86c7ca72fc.msi