Threat Database Trojans Trojan.Spy.Banker.A

Trojan.Spy.Banker.A

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 20,452
Threat Level: 80 % (High)
Infected Computers: 34
First Seen: May 25, 2021
Last Seen: January 1, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.Spy.Banker.A
Signature status: No Signature

Known Samples

MD5: 460242330918033e604fed1b8b9a15d6
SHA1: a4ca610f30b3b056b0876f6c2c5c18c1d382adb9
SHA256: DC5875E8E0CEFBD2422D8D4FF876957008D9CA91BA9D4283E1F5813E47E2EE6A
File Size: 4.82 MB, 4823826 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This installation was built with Inno Setup.
Company Name DiasSoftware
File Version 2.53.2.53
Legal Copyright Copyright © 2014, DiasSoftware.
Product Name Λογισμικό ΔΙΑΣ
Product Version 2.53.2.53

File Traits

  • HighEntropy
  • x86

Files Modified

File Attributes
c:\users\user\appdata\local\temp\is-lsmko.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-lsmko.tmp\_isetup\_shfoldr.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-vn1g8.tmp\a4ca610f30b3b056b0876f6c2c5c18c1d382adb9_0004823826.tmp Generic Write,Read Attributes

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
User Data Access
  • GetUserObjectInformation
Keyboard Access
  • GetKeyState

Shell Command Execution

"C:\Users\Sqqdmlcl\AppData\Local\Temp\is-VN1G8.tmp\a4ca610f30b3b056b0876f6c2c5c18c1d382adb9_0004823826.tmp" /SL5="$40348,4412639,119808,c:\users\user\downloads\a4ca610f30b3b056b0876f6c2c5c18c1d382adb9_0004823826"

Related Posts

Trending

Most Viewed

Loading...