General

  • Target

    0e1d5d891662f275badff2f98e24600d36db462bd30f84fba71ebf67142b460b

  • Size

    481KB

  • MD5

    300ebc9b82049ce2f97a7669e8d71247

  • SHA1

    dd3421cf241ec2058167122ce6af0184fb1666ce

  • SHA256

    0e1d5d891662f275badff2f98e24600d36db462bd30f84fba71ebf67142b460b

  • SHA512

    f5252183760db2a9d7c2a70fd1c8858fbf1218ae394ce863fd5045632598f2aabe0bc27b958b7a5771b09a532b0cf811b64aafdffee9219bd0b27ce255e0009a

  • SSDEEP

    6144:Fn57dKJSu3MkHUsgOPTNGpOPNSY0HALVDroae/R4W7BFbISDOAj:F570JD3MERPpyOlSY0H+D7e/OW7BZ4

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • 0e1d5d891662f275badff2f98e24600d36db462bd30f84fba71ebf67142b460b
    .exe windows x64

    4ed5dfc8ec9520fe86d07e7f7705a8a3


    Code Sign

    Headers

    Imports

    Sections