General

  • Target

    c6d466600371ced9d962594474a4b8b0ccff19adc59dbd2027c10d930afbe282

  • Size

    214KB

  • MD5

    7dd84d1e59e01f4409e5239bae78ae23

  • SHA1

    8b185b88519206b883554613a8660cd73dc8fff5

  • SHA256

    c6d466600371ced9d962594474a4b8b0ccff19adc59dbd2027c10d930afbe282

  • SHA512

    5b947afb95be1e67cf1fc905c7907466876563af79a1aa65ffc729005e4b5cc687c1d72a902ebb94f1aa8d4c6d1e37d6cedaefe9afe739b972db54e9b485484d

  • SSDEEP

    3072:ammCnB8TGfAqM0FhHY1peaKPP4DZEYVyLm5IqPy1tMB/tzvs3NSyw+:SC4ChHAs/PMZbYLkby1OKgyw+

Score
10/10

Malware Config

Signatures

  • Anchordns family
  • Detected AnchorDNS Backdoor 1 IoCs

    Sample triggered yara rules associated with the AnchorDNS malware family.

Files

  • c6d466600371ced9d962594474a4b8b0ccff19adc59dbd2027c10d930afbe282
    .exe windows x64

    9f4d11b9d1e1bf849d9ba2486bb3e69d


    Code Sign

    Headers

    Imports

    Sections