Sample details: 58685083b698610e970f5b0766517eb0

Hashes
MD5: 58685083b698610e970f5b0766517eb0
SHA1: d3f7173e3dbedd99482ff58f42f44a978d9761e6
SHA256: eecdc674c9e86dd45fc485b0f25829367eb2e805c920d746682c16636819f7cb
SSDEEP: 12288:tf9hv84Qe79qQOOThLWHNsmtqxfjFSgxLK6nLyXpy41fwzjAEaYT1f9mgs8+3Rfs:t0OD3ThLWHKm4xBZxRnZ7AVYTmJrjpt
Details
File Type: PE32
Yara Hits
YRP/Microsoft_Visual_Studio_NET | YRP/Microsoft_Visual_C_v70_Basic_NET_additional | YRP/Microsoft_Visual_C_Basic_NET | YRP/Microsoft_Visual_Studio_NET_additional | YRP/Microsoft_Visual_C_v70_Basic_NET | YRP/NET_executable_ | YRP/NET_executable | YRP/NETexecutableMicrosoft | YRP/IsPE32 | YRP/IsNET_EXE | YRP/IsWindowsGUI | YRP/IsPacked | YRP/IsBeyondImageSize | YRP/domain | YRP/IP | YRP/contentis_base64 | YRP/suspicious_packer_section |
Source
http://kamyn9ka.com/lodurb.exe