General

  • Target

    2aa995b0a818fa730f176f261b23dab7a32d49de598ad7dbb35f913a1fa4bd48

  • Size

    134KB

  • MD5

    ad7b4feba1bc01cdc6a6dff64ebe468c

  • SHA1

    bd26238fb7d7e16ea79073d882bba00d34dd859c

  • SHA256

    2aa995b0a818fa730f176f261b23dab7a32d49de598ad7dbb35f913a1fa4bd48

  • SHA512

    e9a9b4213125b11332e10598ff99d5b2304098f0dc742af4f948abd74506a668cbe0e271ea37ca9b1acbc6e410d5236de100ffbadf869137112cb5a6b7a42b96

  • SSDEEP

    3072:G1eWdu3jat9zE1DrmYqdGmKyilfcW56sV9lic1n:cPdu3jaktr+dGmKy6LV

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • 2aa995b0a818fa730f176f261b23dab7a32d49de598ad7dbb35f913a1fa4bd48
    .dll windows x86

    c8e87885eccf0f6b9172857a84584f93


    Code Sign

    Headers

    Imports

    Exports

    Sections