General
-
Target
b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329
-
Size
162KB
-
Sample
220128-xkk6vsbcd7
-
MD5
ae48b4d1d0da879512b495ec1f80cf67
-
SHA1
b388243bf5899c99091ac2df13339f141659bbd4
-
SHA256
b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329
-
SHA512
463df35f9275cd96a65d6db32ab33d8664daa413e4d0ff8c2da670c804468c8b8181db3a140f5d156300701b0647e52c0d15042ff81cb72bbac8e32f4aa643d4
Behavioral task
behavioral1
Sample
b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329.exe
Resource
win7-en-20211208
Malware Config
Targets
-
-
Target
b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329
-
Size
162KB
-
MD5
ae48b4d1d0da879512b495ec1f80cf67
-
SHA1
b388243bf5899c99091ac2df13339f141659bbd4
-
SHA256
b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329
-
SHA512
463df35f9275cd96a65d6db32ab33d8664daa413e4d0ff8c2da670c804468c8b8181db3a140f5d156300701b0647e52c0d15042ff81cb72bbac8e32f4aa643d4
-
Detected AnchorDNS Backdoor
Sample triggered yara rules associated with the AnchorDNS malware family.
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Drops file in System32 directory
-