Sample details: 6d66b183e20d5573adfc68753591a4d9 --

Hashes
MD5: 6d66b183e20d5573adfc68753591a4d9
SHA1: 86ebe1a5bc04d9d4fc56370b5cfb23df4ba60081
SHA256: 297692101013e46022a5da41cfefa80e2b64df3ed3964baa78344726ee5c9aa6
SSDEEP: 12288:Db0x4aQcubq0hDlkx1SYrNwqSDa0VsIppsOgqUnNzzpJdKZ4:30Ycubqw6xVNwqUpXgqoNz
Details
File Type: PE32
Yara Hits
YRP/Borland_Delphi_40_additional | YRP/Microsoft_Visual_Cpp_v50v60_MFC | YRP/Borland_Delphi_30_additional | YRP/Borland_Delphi_30_ | YRP/Borland_Delphi_Setup_Module | YRP/Borland_Delphi_40 | YRP/Borland_Delphi_v40_v50 | YRP/BobSoft_Mini_Delphi_BoB_BobSoft_additional | YRP/Borland_Delphi_v30 | YRP/Borland_Delphi_DLL | YRP/Borland | YRP/BobSoftMiniDelphiBoBBobSoft | YRP/IsPE32 | YRP/IsWindowsGUI | YRP/borland_delphi | YRP/maldoc_find_kernel32_base_method_1 | YRP/domain | YRP/IP | YRP/contentis_base64 | YRP/VM_Generic_Detection | YRP/Dropper_Strings | YRP/Check_OutputDebugStringA_iat | YRP/anti_dbg | YRP/network_dropper | YRP/network_dns | YRP/keylogger | YRP/win_mutex | YRP/win_registry | YRP/win_files_operation | YRP/Big_Numbers0 | YRP/Big_Numbers1 | YRP/Advapi_Hash_API | YRP/MD5_Constants | YRP/BASE64_table | YRP/Delphi_Random | YRP/Delphi_CompareCall | YRP/Delphi_Copy | YRP/Windows_Malware | YRP/with_sqlite |
Source
http://193.124.117.153/crypt/without/AU2_EXE.exe
http://193.124.117.153/crypt/without/AU2_EXE.exe