Sample details: 83e22838a0bf6e84a8ff58233c08e8dc

Hashes
MD5: 83e22838a0bf6e84a8ff58233c08e8dc
SHA1: e8acfafd15771efe49564c1de192400296eba4ed
SHA256: 7637d583f51a425799c8297bada4fbc3eb95d4aa2c305aa00736c3d6e4c4ad71
SSDEEP: 12288:aOQJmIZCi5u47wog7n8Fe1X2yXsiAr0yDJXGW:qgIZCkr7wog7n84wyX9nZW
Details
File Type: PE32
Yara Hits
YRP/Armadillo_v1xx_v2xx_additional | YRP/Microsoft_Visual_Cpp_60_DLL_additional | YRP/Microsoft_Visual_Cpp_v70_DLL | YRP/Microsoft_Visual_Cpp_v50v60_MFC | YRP/Microsoft_Visual_Cpp_60_DLL_Debug | YRP/Armadillo_v1xx_v2xx | YRP/Microsoft_Visual_Cpp_v60_DLL | YRP/Microsoft_Visual_Cpp_60_DLL | YRP/Microsoft_Visual_Cpp_60 | YRP/Armadillov1xxv2xx | YRP/IsPE32 | YRP/IsDLL | YRP/IsWindowsGUI | YRP/IsPacked | YRP/HasRichSignature | YRP/domain | YRP/contentis_base64 | YRP/Misc_Suspicious_Strings | YRP/suspicious_packer_section |
Source
http://barksupport.at/omelia.bin