General

  • Target

    9e76980bf46e67c2cd318a74a7aa58328dfa7442d346fbb96206bebb8ed58eaf

  • Size

    253KB

  • MD5

    6e8e022cc13dbf81ad6f64df301c5ca5

  • SHA1

    bd4bada49725daff995e4d7d3554aaee7d737bab

  • SHA256

    9e76980bf46e67c2cd318a74a7aa58328dfa7442d346fbb96206bebb8ed58eaf

  • SHA512

    3f2741f551891c30740d533627ab98ecd1795f43800f229bd0a6a684a97a86d2e6947aa5805b38ccddbf753d2f5ed260a77778488714ded72a30ebaa9292686f

  • SSDEEP

    3072:228Slj6zAjvgRYll9qRtTx4JVXM1Ymko:2kleArlKHkM1Yro

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • 9e76980bf46e67c2cd318a74a7aa58328dfa7442d346fbb96206bebb8ed58eaf
    .exe windows x64

    e61a21c9de57d8b69b5aa68737ec1341


    Code Sign

    Headers

    Imports

    Exports

    Sections