Sample details: d56c99b19bd3279426234753d3573d43 --

Hashes
MD5: d56c99b19bd3279426234753d3573d43
SHA1: dc32eededd2d8457d2df9ff2f8ad8640ffb1c052
SHA256: 7c02ec6be84ad05163ea59ef5d160b0e82d33ba9a9e4bfedd394eedd5c483f28
SSDEEP: 12288:WEAj+BtkJun4LDheATYUtf8MbMHr9NafrF/M:LjkJKoeaf8MYr9NafRU
Details
File Type: PE32
Yara Hits
YRP/possible_includes_base64_packed_functions | YRP/Microsoft_Visual_Studio_NET | YRP/Microsoft_Visual_C_v70_Basic_NET_additional | YRP/Microsoft_Visual_C_Basic_NET | YRP/Microsoft_Visual_Studio_NET_additional | YRP/Microsoft_Visual_C_v70_Basic_NET | YRP/NET_executable_ | YRP/NET_executable | YRP/IsPE32 | YRP/IsNET_EXE | YRP/IsWindowsGUI | YRP/IsPacked | YRP/domain | YRP/IP | YRP/contentis_base64 | YRP/Misc_Suspicious_Strings | YRP/keylogger | YRP/android_meterpreter |
Source
http://posqit.net/CTW/Scan091019
Strings