General

  • Target

    e49e6f0b194ff7c83ec02b3c2efc9e746a4b2ba74607a4aad8fbdcdc66baa8dc

  • Size

    191KB

  • MD5

    ad4e7904c241bb64955bd066806b25a8

  • SHA1

    33c9a73ec1150f0b55903537e79e11413954e58f

  • SHA256

    e49e6f0b194ff7c83ec02b3c2efc9e746a4b2ba74607a4aad8fbdcdc66baa8dc

  • SHA512

    7a89b977c576cca3ae6ddf6fa841297301d31b0b109a1d52929969d2e264ba38d66a45da2547c9030ac9b1d9cec11d5766c1acbd3d6276b573f0203612d5b122

  • SSDEEP

    3072:KJoDSPaxzfnpvqZR/UFZpKTLJVdFaVilMjjHCuyYzkRUM4av1dZUUpnKDh+:CoD6oLnpvqZR/8pKXfdFjOnyc09UMn8

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • e49e6f0b194ff7c83ec02b3c2efc9e746a4b2ba74607a4aad8fbdcdc66baa8dc
    .exe windows x64

    ff0faef0f8d024c17528877028e5c53d


    Code Sign

    Headers

    Imports

    Sections