Sample details: fabf28c4c960d0f4de2a57e45e438569

Hashes
MD5: fabf28c4c960d0f4de2a57e45e438569
SHA1: e46c41f627647361faea8d482fbb295cd1fb240e
SHA256: 5d9e56fc83a670b61fdc3db0ac34cd87ed28bb493b96f0b56bb9a64665ce9ac0
SSDEEP: 49152:vPiffOJsaOVHZ/juYitQpUDoKEvWgEdHtulTMqYjvTAUihZGy/98phPiUMNA1P1/:vP4fm2BWr+D/mLqUP19/
Details
File Type: PE32
Yara Hits
YRP/Borland_Delphi_40_additional | YRP/Microsoft_Visual_Cpp_v50v60_MFC | YRP/Borland_Delphi_30_additional | YRP/Borland_Delphi_30_ | YRP/Borland_Delphi_Setup_Module | YRP/Borland_Delphi_40 | YRP/Borland_Delphi_v40_v50 | YRP/BobSoft_Mini_Delphi_BoB_BobSoft_additional | YRP/Borland_Delphi_v60_v70 | YRP/Borland_Delphi_v30 | YRP/Borland_Delphi_DLL | YRP/Borland | YRP/BobSoftMiniDelphiBoBBobSoft | YRP/IsPE32 | YRP/IsWindowsGUI | YRP/IsPacked | YRP/IsBeyondImageSize | YRP/borland_delphi | YRP/domain | YRP/contentis_base64 | YRP/screenshot | YRP/keylogger | YRP/win_registry | YRP/win_files_operation | YRP/win_hook | YRP/Delphi_FormShow | YRP/Delphi_CompareCall | YRP/Delphi_Copy | YRP/Delphi_StrToInt | YRP/Delphi_DecodeDate | YRP/suspicious_packer_section |
Source
http://www.wehrmachtluftwaffe3213.ru/fia2.exe
http://www.wehrmachtluftwaffe3213.ru/fia2.exe