Sample details: d079b02b6a21bc70f10e60c20394bec6

Hashes
MD5: d079b02b6a21bc70f10e60c20394bec6
SHA1: 8bc1ec67d99180524327c1dddb1f9912d04dc414
SHA256: 8730a228e70d039515b3390186f207028a337a64fdf7545be554933797945238
SSDEEP: 12288:CIwR9YVsNiXfvlSfc6grVEam++wqSq6T:CIIYVyyvlSfc6gr+a0Sq6
Details
File Type: PE32
Yara Hits
YRP/PackerUPX_CompresorGratuito_wwwupxsourceforgenet | YRP/UPX_wwwupxsourceforgenet_additional | YRP/yodas_Protector_v1033_dllocx_Ashkbiz_Danehkar_h | YRP/Netopsystems_FEAD_Optimizer_1 | YRP/UPX_290_LZMA | YRP/UPX_290_LZMA_Markus_Oberhumer_Laszlo_Molnar_John_Reiser | YRP/UPX_290_LZMA_additional | YRP/UPX_wwwupxsourceforgenet | YRP/Borland | YRP/UPXv20MarkusLaszloReiser | YRP/UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser | YRP/UPX20030XMarkusOberhumerLaszloMolnarJohnReiser | YRP/UPX290LZMAMarkusOberhumerLaszloMolnarJohnReiser | YRP/upx_3 | YRP/IsPE32 | YRP/IsWindowsGUI | YRP/IsPacked | YRP/IsBeyondImageSize | YRP/domain | YRP/contentis_base64 | YRP/UPX | YRP/suspicious_packer_section |
Source
http://justloki.com/bin/cj.exe