General

  • Target

    5de47f786534c1fbe8173ac71ab48602fe3462baed77eea70f2b59231ffa69c0

  • Size

    162KB

  • MD5

    ab64b81540af03005987307b784da30b

  • SHA1

    24d4bbc982a6a561f0426a683b9617de1a96a74a

  • SHA256

    5de47f786534c1fbe8173ac71ab48602fe3462baed77eea70f2b59231ffa69c0

  • SHA512

    ff61a5a57d38a646aa19a8b5d79392d355dfbf9993990f34a270cd2d3c26755dc8e739bf1cfcd41423ad62504d9df4f15ef64190528eb3305bd7a847bd68541c

  • SSDEEP

    3072:A4MyblJ8cHbH1lPbAL0sAvIsmvNg+7N/K+qOlgqxt8Uyt4K6+BliT4:DB3pHrS0fvIsCg+A+qO3RK7Y4

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • 5de47f786534c1fbe8173ac71ab48602fe3462baed77eea70f2b59231ffa69c0
    .exe windows x86

    9e136c65a8ad6fe24b32fb40d427b719


    Code Sign

    Headers

    Imports

    Sections