General

  • Target

    6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d

  • Size

    162KB

  • MD5

    dd1d2518d48b0c9b15dc426816f627b5

  • SHA1

    e26d5ed1aa0c38a64f0f9c2f85fc144b320c0147

  • SHA256

    6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d

  • SHA512

    dea2c64e3b245d00afc1bfa0b8f2e8baa9559e11b1af81dc25eb8d9a6e17460be9357aa3ba0a3f2d2a618b550a45a9ec23a1fe3edf0a123dc0bb95901d1b4840

  • SSDEEP

    3072:tDNlyQv7jH3T69In5Aiv2T/Pknce7cf+Fyj1hJAPJ5/bvTAKS:XEQv7jHzn5AZTXne7C8Kk/TT7S

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • 6c7847d103de865f906c2e1b7372f2e11ceebec890a68ee6532cebeab852618d
    .exe windows x86

    3ca0b9f4c6370d5891b4cff3cbfe250f


    Code Sign

    Headers

    Imports

    Sections