Trojan.Bancteian.B
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 15,097 |
| Threat Level: | 80 % (High) |
| Infected Computers: | 2,815 |
| First Seen: | November 13, 2021 |
| Last Seen: | April 7, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Bancteian.B |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
cc8a077953371096e6a694ad143659a8
SHA1:
60ba42c64bfa372839fafb5a5230a723ec39b636
SHA256:
68A8A48E5DDB0FA0AE01291DF33B264143C013EAC23ECD8B9377E3C235A102AF
File Size:
2.99 MB, 2992665 bytes
|
|
MD5:
7e23943cc0c6f10de4802b74cfbd86ce
SHA1:
df47396a94ad527ac6e7df44ec68562c63297232
SHA256:
56132EBD74756683200B1F46DF4B421CF8EB0C25FBE0101B5ABCC11741B78B43
File Size:
2.99 MB, 2992665 bytes
|
|
MD5:
edafd0e0adc70e5fe52ed952bd69010e
SHA1:
fe37089e9b925a14ff71f7b5a0fd5a5d393cd6eb
SHA256:
B06DF61C6CE28DEFA646A86DC242127DFFCAA8610EEFF2E22826D64A8C1B559E
File Size:
2.99 MB, 2992665 bytes
|
|
MD5:
461faa05f461fbd168152c0a23e420ac
SHA1:
987049281a3aafbda166671708896ead5c5c82df
SHA256:
6F2FB506B653A1EE0FA841CD9F58DBB575BAA2E6ACCA69159A713794B5436E54
File Size:
2.99 MB, 2992665 bytes
|
|
MD5:
bfb0282c3956b4768c93bc97b303a2cc
SHA1:
29bf2495de20a201dbc724d213d485cf008bb3bb
SHA256:
2C286C3D42D74C849F19E3798AA33D019F798EC1EFB74D31F187074B5D297DDA
File Size:
3.30 MB, 3299862 bytes
|
Show More
|
MD5:
e4c2e077aa2495df6d11688c91a13cbb
SHA1:
8e65c8f388160d113c023a7192c75ccca2f9fc99
SHA256:
BCDD370F9D8E15C66147EFCB2E9E36BE22746B1698CC995D4A33BB1976C54B56
File Size:
2.99 MB, 2992665 bytes
|
|
MD5:
135bd6a5e253b931630cdc28aa2f9f8a
SHA1:
0568d35c4534de659f74b8d22897ccc645e559dd
SHA256:
F36E9E0585CD857CEFEAA58233C986005541B709C9AF53CE24F0CAB613366E32
File Size:
2.99 MB, 2992665 bytes
|
|
MD5:
f32a5326a8d23a091c045c9d25607b1b
SHA1:
61579940347406e68f6b455cc11508119e3d46ac
SHA256:
39482438755DD72D6B0953E8966AA2ADDFBA51B2735A1C05190875480ADF67B0
File Size:
2.99 MB, 2992665 bytes
|
|
MD5:
f62546c785064c664264c91be35871da
SHA1:
bc69b719a0698f5e24c41dab9c6dd4fd8330faa9
SHA256:
00EDC860269777B0B936D2DB0618183F52D5549FC2F255CCB0ACDA520961E9AA
File Size:
2.99 MB, 2992665 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have security information
- File has exports table
- File has TLS information
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
Show More
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| File Version | 1.0.0.0 |
| Product Version | 1.0.0.0 |
File Traits
- 2+ executable sections
- VirtualQueryEx
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 7,551 |
|---|---|
| Potentially Malicious Blocks: | 124 |
| Whitelisted Blocks: | 7,427 |
| Unknown Blocks: | 0 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.DSS
- Bancteian.B
- Banker.FD
- Danabot.DI
- Injector.JDA
Show More
- Vadokrist.B