Behavioral task
behavioral1
Sample
0b3675187c991e601bf397400567c0d1924faede23975a18b13595324327afb1.msi
Resource
win7-20240221-es
Behavioral task
behavioral2
Sample
0b3675187c991e601bf397400567c0d1924faede23975a18b13595324327afb1.msi
Resource
win10v2004-20240426-es
General
-
Target
0b3675187c991e601bf397400567c0d1924faede23975a18b13595324327afb1
-
Size
13.6MB
-
MD5
efcfcf6480dbba4869bd694ded0d47cb
-
SHA1
97431fda55a55ae247f90375aca951b17d3df2d4
-
SHA256
0b3675187c991e601bf397400567c0d1924faede23975a18b13595324327afb1
-
SHA512
93be29fcb1959d54a8e260eb4684a46a194fa8e94717cc09d886cfa57e90eee6834f122dc300f0b70407fbade13cf8d4ac7bc6a7abdbf63be389388dd49955bd
-
SSDEEP
196608:igNeSJurmWRWzNzuN+CSyh4wQF3GK0JW:igNFZxCNLph3QF3G+
Malware Config
Signatures
-
Detects common strings, DLL and API in Banker_BR 1 IoCs
Hunting by known PDB files - Trojan Banker LATAM.
resource yara_rule sample Detect_MSI_LATAM_Banker_From_LatAm
Files
-
0b3675187c991e601bf397400567c0d1924faede23975a18b13595324327afb1.msi