Sample details: 01e0cf87ee2e22ff40e648aa82409ce4 --

Hashes
MD5: 01e0cf87ee2e22ff40e648aa82409ce4
SHA1: 2aa19e481bf8a214b00a03f602b10dbb8fe357b9
SHA256: c3f43896913c17f91c0d95924ac426e89928b8eef93da7dc107a7a0891c7a860
SSDEEP: 384:VwN3mgrd1jQkwzNRk85tHNcbSal/0791aOmPSpDk+F:Vq3hJ1ytHSbZ/07XHbr
Details
File Type: PE32
Yara Hits
YRP/IsPE32 | YRP/IsConsole | YRP/HasModified_DOS_Message | YRP/domain | YRP/contentis_base64 | YRP/SEH__vectored |
Strings
		`.rdata
@.data
.reloc
Bnewiat
newimpdi
LdrGetProcedureAddress
sample
mlwr_smpl
artifact.exe
TEQUILABOOMBOOM
Wilbert
SystemIT
KLONE_X64-PC
LoadLibraryA
UnmapViewOfFile
GetProcAddress
VirtualAlloc
VirtualProtect
AddVectoredExceptionHandler
RemoveVectoredExceptionHandler
just string
HSVWjD3
WWWSWV
VVVVSPVh
QQQQh|
hldf9j	
advapi32.dll
GetUserNameA
ntdll.dll
RtlAllocateHeap
kernel32.dll
GetCurrentProcess
SetLastError
HeapFree
GetCurrentProcessId
FreeConsole
GetModuleFileNameA
lstrlenW
lstrcatW
FindFirstFileW
lstrcmpW
lstrcpyW
FindNextFileW
FindClose
GetModuleHandleA
GetComputerNameA
GetComputerNameExA
lstrlen
lstrcpy
lstrcat
lstrcmpA
GetLastError
GetProcessHeap
msvcrt.dll
strchr
malloc
user32.dll
wsprintfA