Sample details: 00eff06b0b6791dc22c4a3a5bb4054fe --

Hashes
MD5: 00eff06b0b6791dc22c4a3a5bb4054fe
SHA1: f8394391ae9cecbdcee14099fe6bd78d1eee93b2
SHA256: 6bd3c470a8ab0465e966734209933e42b80a064824265e674fb28b0c2d7253e0
SSDEEP: 6144:TwyMmniQtRkLOsXin5YZtNK9PEnv3ksupARYJWxwRxkw4VdxVcKDtQz5W8kC1L8n:shciQtiPS5YZtyc3qpAGCrcVkW4JgL5u
Details
File Type: MS-DOS
Added: 2018-05-25 00:52:33
Yara Hits
YRP/MPRESS_V200_V20X_MATCODE_Software_20090423 | YRP/yodas_Protector_v1033_dllocx_Ashkbiz_Danehkar_h | YRP/mpress_2_xx_x86 | YRP/IsPE32 | YRP/IsWindowsGUI | YRP/IsPacked | YRP/HasModified_DOS_Message | YRP/maldoc_getEIP_method_1 | YRP/domain | YRP/IP | YRP/contentis_base64 | YRP/win_registry | YRP/suspicious_packer_section |
Source
http://elizvanroos.info/ug/ucg.exe