Sample details: 64cba588c748c3e7ccbc42591740f69f --

Hashes
MD5: 64cba588c748c3e7ccbc42591740f69f
SHA1: 2ddc109667ef6f0d54cda270237ef547029f9997
SHA256: 72679abb2ee859a6a00349a90d680819f1e3e439c6fd72704b91d3200c43923f
SSDEEP: 96:Z1LCMbMohNqpB6upyKMznZpiAqarswvKQW0FlId00S500S+2mp:PvAohNq/TUjCh0r50r+P
Details
File Type: PE32
Added: 2018-05-15 04:47:19
Yara Hits
YRP/Safeguard_103_Simonzh | YRP/IsPE32 | YRP/IsWindowsGUI | YRP/FASM | YRP/domain | YRP/IP | YRP/contentis_base64 | YRP/win_mutex | FlorianRoth/DragonFly_APT_Sep17_3 |
Strings
		!This program cannot be run in DOS mode.
.asdasi
.c231asc
`.rsrc
kernel32.dll
user32.dll
CloseHandle
CreateMutexA
CreateToolhelp32Snapshot
ExitProcess
GetCurrentProcessId
GetLastError
GetModuleHandleA
GetProcAddress
LoadLibraryA
OpenProcess
Process32First
Process32Next
RtlZeroMemory
TerminateThread
VirtualAlloc
WaitForSingleObject
lstrcpyA
lstrlenA
ShowWindow
ntdll.dll
RtlAdjustPrivilege
s2lxza0d
3rYt3J
5qYt3B
sJu[`n
wx""'w
rr"""w
r'wrwrw
r'wwwrw
r''wwww
r"'w""w
w"'wr"w
r"'w""w
wwr""rw