Behavioral task
behavioral1
Sample
6963be621a68bb3cc32c7ac16d5f8a08422655a3e612ade89bc4147e32df4c77.msi
Resource
win7-20240508-es
Behavioral task
behavioral2
Sample
6963be621a68bb3cc32c7ac16d5f8a08422655a3e612ade89bc4147e32df4c77.msi
Resource
win10v2004-20240508-es
General
-
Target
6963be621a68bb3cc32c7ac16d5f8a08422655a3e612ade89bc4147e32df4c77.msi
-
Size
21.6MB
-
MD5
5f58b5535023560bb651d77ca8bc1171
-
SHA1
bde0c7f11d4f5a4a84db9d09f97eb70737932fe6
-
SHA256
6963be621a68bb3cc32c7ac16d5f8a08422655a3e612ade89bc4147e32df4c77
-
SHA512
2382e7eaa793ab8c94a780186b246a0c05eb67c7bf9ecf9107c6c2400bdcea1d6c8f58b9a457ac51e9d59908e4892c52763cdfb9b28fdc3824be04697a2a093c
-
SSDEEP
196608:OCMZTzpJafm/XeAx4ovO1XpA38FhlIrHttuAkeQoM:OzZTFCAWOO15A3GhlIrNcejM
Malware Config
Signatures
-
Detects common strings, DLL and API in Banker_BR 1 IoCs
Hunting by known PDB files - Trojan Banker LATAM.
resource yara_rule sample Detect_MSI_LATAM_Banker_From_LatAm
Files
-
6963be621a68bb3cc32c7ac16d5f8a08422655a3e612ade89bc4147e32df4c77.msi.msi