Sample details: 02efc767e21b3e1c8f9ba198fe3c36e0

Hashes
MD5: 02efc767e21b3e1c8f9ba198fe3c36e0
SHA1: 164da30f6ea8d78b6dc6d9f090d1bcdc7f3a1ff8
SHA256: 09e61e4543462191171ae41b77a6acd067c913533e655978dd85c8a36c9226b3
SSDEEP: 1536:4KpMj1IqTTa2KFvqMX62gauIksceskOT4uATvoEKQkzmI:/pmSX1gavOlJEKsI
Details
File Type: PE32
Yara Hits
YRP/Microsoft_Visual_Cpp_v50v60_MFC | YRP/IsPE32 | YRP/IsWindowsGUI | YRP/IsBeyondImageSize | YRP/maldoc_find_kernel32_base_method_1 | YRP/domain | YRP/IP | YRP/url | YRP/contentis_base64 | YRP/Browsers | YRP/escalate_priv | YRP/cred_local | YRP/cred_ff | YRP/win_token | YRP/win_files_operation | YRP/MD5_Constants | YRP/RIPEMD160_Constants | YRP/SHA1_Constants | YRP/DES_sbox | YRP/with_sqlite | YRP/pony |
Source
http://svit-zer.com/microsoft2018/crosssv.exe