General

  • Target

    b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329

  • Size

    162KB

  • Sample

    220128-xkk6vsbcd7

  • MD5

    ae48b4d1d0da879512b495ec1f80cf67

  • SHA1

    b388243bf5899c99091ac2df13339f141659bbd4

  • SHA256

    b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329

  • SHA512

    463df35f9275cd96a65d6db32ab33d8664daa413e4d0ff8c2da670c804468c8b8181db3a140f5d156300701b0647e52c0d15042ff81cb72bbac8e32f4aa643d4

Score
10/10

Malware Config

Targets

    • Target

      b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329

    • Size

      162KB

    • MD5

      ae48b4d1d0da879512b495ec1f80cf67

    • SHA1

      b388243bf5899c99091ac2df13339f141659bbd4

    • SHA256

      b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329

    • SHA512

      463df35f9275cd96a65d6db32ab33d8664daa413e4d0ff8c2da670c804468c8b8181db3a140f5d156300701b0647e52c0d15042ff81cb72bbac8e32f4aa643d4

    Score
    10/10
    • AnchorDNS Backdoor

      A backdoor which communicates with C2 through DNS, attributed to the creators of Trickbot and Bazar.

    • Detected AnchorDNS Backdoor

      Sample triggered yara rules associated with the AnchorDNS malware family.

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix

Tasks