Behavioral task
behavioral1
Sample
a55ffb4266145f28841e965b89ee141d7c7bc63eb0af8226699a92c57c881b5e.msi
Resource
win7-20240221-es
6 signatures
150 seconds
General
-
Target
a55ffb4266145f28841e965b89ee141d7c7bc63eb0af8226699a92c57c881b5e
-
Size
34.9MB
-
MD5
fa761f6aae5cedcdcc309f1d7fdd63f3
-
SHA1
1c1c7ac9159b0969f40fd5a6f27c5f6212284c93
-
SHA256
a55ffb4266145f28841e965b89ee141d7c7bc63eb0af8226699a92c57c881b5e
-
SHA512
652e1f52e1bcb697465ae949897893c570d214b6e0885627de6d7762e5d0d75d0aaa90769a296eb7ac0847906ec4c9eab1f1822589b87bcf27da92068a3bd4bb
-
SSDEEP
786432:IiSadibrhOfNR2UXhFs/BvMMR+mPXBxRk0E8WolU9n4kX:1ibUlXzs/X+uLk0gSU9n
Score
10/10
Malware Config
Signatures
-
Detects common strings, DLL and API in Banker_BR 1 IoCs
Hunting by known PDB files - Trojan Banker LATAM.
resource yara_rule sample Detect_MSI_LATAM_Banker_From_LatAm
Files
-
a55ffb4266145f28841e965b89ee141d7c7bc63eb0af8226699a92c57c881b5e.msi