Sample details: 1e5a88fc919f1dde5ce8c69cac45dc94

Hashes
MD5: 1e5a88fc919f1dde5ce8c69cac45dc94
SHA1: fbbc3ee1afd262a4e02cb85a7efe9576b26edb44
SHA256: e4be8ad4a01c3d5a4f9095d98184a15863ebb0c6ad8a23b1f6128ef045e8281f
SSDEEP: 6144:BsRLCvErMSrJ1767DCwGjkKc8L3X50X3UQdy2RT+Wb:KRL/FrP67DCwGjtc8L3X50nUQs2Rfb
Details
File Type: PE32
Yara Hits
CuckooSandbox/vmdetect | YRP/Microsoft_Visual_Studio_NET | YRP/Microsoft_Visual_C_v70_Basic_NET_additional | YRP/Microsoft_Visual_C_Basic_NET | YRP/Microsoft_Visual_Studio_NET_additional | YRP/Microsoft_Visual_C_v70_Basic_NET | YRP/NET_executable_ | YRP/NET_executable | YRP/NETexecutableMicrosoft | YRP/IsPE32 | YRP/IsNET_EXE | YRP/IsWindowsGUI | YRP/IsBeyondImageSize | YRP/domain | YRP/IP | YRP/contentis_base64 | YRP/VMWare_Detection | YRP/vmdetect | YRP/suspicious_packer_section |
Source
http://wesleymedsupply.com/Geek/Test.exe
http://wesleymedsupply.com/Geek/Test.exe