Sample details: dcfc60cc21da43f07c3d62c441e7cea1 --

Hashes
MD5: dcfc60cc21da43f07c3d62c441e7cea1
SHA1: c596b0972a352e4b8689d58bc3e12b5b433b3509
SHA256: 73dda2402802fb8e59da71329874b6d323d7acc2afbf9b88356a588cf97475c3
SSDEEP: 12288:4G28SNYGp0829UpAuLFVswhX0APWJs0Z80t90EnfgATXKFCitQFS9EbYu4j6htJC:4lnNdf/swuAPWJDn0EfglBQej6htJd
Details
File Type: MS-DOS
Added: 2019-06-11 12:07:47
Yara Hits
YRP/MPRESS_V200_V20X_MATCODE_Software_20090423 | YRP/yodas_Protector_v1033_dllocx_Ashkbiz_Danehkar_h | YRP/mpress_2_xx_x86 | YRP/IsPE32 | YRP/IsWindowsGUI | YRP/IsPacked | YRP/HasModified_DOS_Message | YRP/maldoc_getEIP_method_1 | YRP/domain | YRP/IP | YRP/contentis_base64 | YRP/Qemu_Detection | YRP/win_registry | YRP/suspicious_packer_section |
Source
http://vsecurelevel.com/kres.exe