General

  • Target

    b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329

  • Size

    162KB

  • MD5

    ae48b4d1d0da879512b495ec1f80cf67

  • SHA1

    b388243bf5899c99091ac2df13339f141659bbd4

  • SHA256

    b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329

  • SHA512

    463df35f9275cd96a65d6db32ab33d8664daa413e4d0ff8c2da670c804468c8b8181db3a140f5d156300701b0647e52c0d15042ff81cb72bbac8e32f4aa643d4

  • SSDEEP

    3072:7/gh9/7DnAiGOVnywTvTY/PCHc0DChGx5E1hJAPJ5z6kb/SrKS:zu9/7Dn/nywPYXJ0DWU5IkzNDSGS

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • b02494ffc1dab60510e6caee3c54695e24408e5bfa6621adcd19301cfc18e329
    .exe windows x86

    3ca0b9f4c6370d5891b4cff3cbfe250f


    Code Sign

    Headers

    Imports

    Sections