Trojan.Banker.R
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 7,331 |
| Threat Level: | 80 % (High) |
| Infected Computers: | 243 |
| First Seen: | May 28, 2021 |
| Last Seen: | March 28, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Trojan.Banker.R |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
f40a08abe836bed551c478ac4b3ebb79
SHA1:
5aaca2b27d7f990769e2e57e16053a0c896d9ba3
SHA256:
C9C0A2B42B6ECEEA91B0BB8D33C1E61C99803E2AE4FEA27BC8454F60579ADB17
File Size:
3.08 MB, 3079680 bytes
|
|
MD5:
fadfff45436f92e8fb1824c678a40344
SHA1:
a2072d19a64314c1638d7db7e8ffab60067a9c4a
SHA256:
D68AB4FB1C6962017CAAFAA9E5159CA634DF214D2F24317FEE981719628E142B
File Size:
2.43 MB, 2430976 bytes
|
|
MD5:
84f80ed9826fda11b94538ff1afbb610
SHA1:
65a3b891e380e83fb6a57a04a9806a3ebf6696fc
SHA256:
185BD0496636DB322E03E59F00A7CA6F067587DEBECA2027EC22A8E0DD01876C
File Size:
3.08 MB, 3079680 bytes
|
|
MD5:
efc5891a7fe154b8241ff5b4ded4da07
SHA1:
7abab4d57a80cc6a5f9ecb4f17904790637a1d55
SHA256:
59B892654E8864813F0D9BC1DC5AB3D90D44973B85A19C8995F3AF66F16B3259
File Size:
5.43 MB, 5434273 bytes
|
|
MD5:
e037364315283a30045a90a1e2de7917
SHA1:
065c60a98c375b42ad55e26fbca1814eafec5dee
SHA256:
AF4096EC193F8C090C68B472BCC0E9E199514C83D5B89EEA6B6C8A7C659CB7AA
File Size:
3.08 MB, 3078144 bytes
|
Show More
|
MD5:
06f60ab67a3c7f1d3973cdcd4f2f614a
SHA1:
c2774b84c34dd7adad75788d04b1da4691eaab14
SHA256:
C52D2C30654CA1AD2E780A0256D77D128EA8DC66806B9194D6AFFAE9BBF4DB3B
File Size:
1.26 MB, 1259520 bytes
|
|
MD5:
040f8d67e084a3cd865fedfca73e3334
SHA1:
ca518af4174ac23994a51f0a46491e6fe42a4735
SHA256:
09765A3D6C1EDAE249FD3E26A098639C2B7F3EE1379534FC53F98F6117418AD7
File Size:
3.08 MB, 3079680 bytes
|
|
MD5:
7ab80568b8acdb42b4606a02f9a8c084
SHA1:
5da1ba1e56b6b101b2d18426f3c1eb795feffbc2
SHA256:
898974AA44EC6DBED4F4B488BF55E839115328118F38CB75A22084F5D81460DD
File Size:
6.88 MB, 6877911 bytes
|
|
MD5:
93f8de9df73acf3f6ea802a96b0f6cfa
SHA1:
b724dc000c7658010ab4b5c90276412a04fca76b
SHA256:
9837F7920F31A917BF75C65FF4A9106DDF3F45FC26FA88DE4DC55B5C5077117B
File Size:
4.17 MB, 4173312 bytes
|
|
MD5:
ff6add633f358e170eb37c7793209600
SHA1:
6e7876ae2f375ee67baa42fdda5604c352d311e8
SHA256:
01C8E68FDEBFABAC0D40E8702D2FA7CAACD500C63165D16432BBEB1AB82522BA
File Size:
4.54 MB, 4537344 bytes
|
|
MD5:
102a0f46252f5fba05080d904f578ae6
SHA1:
2f9080a4d1ae2ea95d6483e10c799d6090a3f035
SHA256:
6469BE2D8A98BB98221425FA35A1BCAA4BD67469C1123DC4D08294FF05704E52
File Size:
3.11 MB, 3105792 bytes
|
|
MD5:
cf04b201a4bda334fe2ea7e992e178ae
SHA1:
5905c48df02cad0c587e715e9759ca67e0c90b52
SHA256:
AC441CFB6F822ECA9ADF3393998B4E263E42D649E6F6AD626341E489601DB884
File Size:
2.43 MB, 2430976 bytes
|
|
MD5:
1a0d133b994094af748f3f4e320c5024
SHA1:
ebc0e0b514fceea59399ddd6fd560e5ab9d67b39
SHA256:
61372E4E911A1C441A4422345C83D8E075D10D0763B8EFC0043E1CAE34C047D2
File Size:
3.13 MB, 3128320 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have security information
- File has exports table
- File has TLS information
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
Show More
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Comments | Suporte Remoto DS Infromática |
| File Description | Suporte Remoto |
| File Version |
Show More
|
| Internal Name | Suporte Remoto |
| Original Filename | Suporte Remoto DS Infromática |
| Product Name |
|
| Product Version |
Show More
|
File Traits
- 2+ executable sections
- big overlay
- dll
- HighEntropy
- VirtualQueryEx
- WriteProcessMemory
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 7,409 |
|---|---|
| Potentially Malicious Blocks: | 55 |
| Whitelisted Blocks: | 7,311 |
| Unknown Blocks: | 43 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.DSS
- BadJoke.XA
- Banker.GF
- Banload.XG
- Banload.XH
Show More
- Banload.XJ
- Casbaneiro.A
- Casbaneiro.G
- Danabot.DI
- Delf.OF
- Downloader.Delf.C
- Filecoder.IFA
- Injector.KPP
- Injector.XN
- Lamer.B
- Lokorrito.C
- Malat.A
- Ousaban.C
- Ousaban.D
- Ropalidia.D
- Ulise.BE
- Vadokrist.B
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| c:\users\user\downloads\config_suporte.ini | Generic Read,Write Data,Write Attributes,Write extended,Append data |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
|
| Process Shell Execute |
|
| Anti Debug |
|
| User Data Access |
|
| Network Winsock2 |
|
| Network Winsock |
|
| Process Manipulation Evasion |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\5aaca2b27d7f990769e2e57e16053a0c896d9ba3_0003079680.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\a2072d19a64314c1638d7db7e8ffab60067a9c4a_0002430976.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\65a3b891e380e83fb6a57a04a9806a3ebf6696fc_0003079680.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\7abab4d57a80cc6a5f9ecb4f17904790637a1d55_0005434273.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\065c60a98c375b42ad55e26fbca1814eafec5dee_0003078144.,LiQMAxHB
|
Show More
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\ca518af4174ac23994a51f0a46491e6fe42a4735_0003079680.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\5da1ba1e56b6b101b2d18426f3c1eb795feffbc2_0006877911.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\b724dc000c7658010ab4b5c90276412a04fca76b_0004173312.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\6e7876ae2f375ee67baa42fdda5604c352d311e8_0004537344.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\2f9080a4d1ae2ea95d6483e10c799d6090a3f035_0003105792.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\5905c48df02cad0c587e715e9759ca67e0c90b52_0002430976.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\ebc0e0b514fceea59399ddd6fd560e5ab9d67b39_0003128320.,LiQMAxHB
|