Behavioral task
behavioral1
Sample
d1be12188b3cdb1dc06e9f40f29da78d65edf2eaf750957057f5571f03e88363.msi
Resource
win7-20240508-es
Behavioral task
behavioral2
Sample
d1be12188b3cdb1dc06e9f40f29da78d65edf2eaf750957057f5571f03e88363.msi
Resource
win10v2004-20240508-es
General
-
Target
d1be12188b3cdb1dc06e9f40f29da78d65edf2eaf750957057f5571f03e88363
-
Size
12.5MB
-
MD5
f35b1b56918a59cd861c258f92a591af
-
SHA1
5af21000bf8bdcb938ae9a572f33cfc2423c44a5
-
SHA256
d1be12188b3cdb1dc06e9f40f29da78d65edf2eaf750957057f5571f03e88363
-
SHA512
cd7c2f906411bff7f168e1f1588f09e617683475ebc4f2a0f3b3556ed628274b09935307c16510f7ef65e3a5da3b4d2dcd6591b99d013207eed70950f7010105
-
SSDEEP
98304:bm26QQTGDvBrdyrma0JSJo9ZOoQrGtt39DulYZplG7e1qeNesej13BKYQ0KVd//h:bj6YfSJ+KroLehKPP9OH
Malware Config
Signatures
-
Detects common strings, DLL and API in Banker_BR 1 IoCs
Hunting by known PDB files - Trojan Banker LATAM.
resource yara_rule sample Detect_MSI_LATAM_Banker_From_LatAm
Files
-
d1be12188b3cdb1dc06e9f40f29da78d65edf2eaf750957057f5571f03e88363.msi